text
stringlengths
2.85k
2.55M
label
class label
11 classes
Indian Regional Movie Dataset for Recommender Systems Prerna Agarwal∗ IIIT Delhi [email protected] Richa Verma∗ IIIT Delhi [email protected] arXiv:1801.02203v1 [cs.IR] 7 Jan 2018 ABSTRACT Indian regional movie dataset is the first database of regional Indian movies, users and their ratings. It consists of movies belonging to 18 different Indian regional languages and metadata of users with varying demographics. Through this dataset, the diversity of Indian regional cinema and its huge viewership is captured. We analyze the dataset that contains roughly 10K ratings of 919 users and 2,851 movies using some supervised and unsupervised collaborative filtering techniques like Probabilistic Matrix Factorization, Matrix Completion, Blind Compressed Sensing etc. The dataset consists of metadata information of users like age, occupation, home state and known languages. It also consists of metadata of movies like genre, language, release year and cast. India has a wide base of viewers which is evident by the large number of movies released every year and the huge box-office revenue. This dataset can be used for designing recommendation systems for Indian users and regional movies, which do not, yet, exist. The dataset can be downloaded from https://goo.gl/EmTPv6. KEYWORDS Movie dataset, Recommender System, Metadata, Indian Regional Cinema, Crowd Sourcing, Collaborative Filtering 1 INTRODUCTION Recommendation systems [17, 18, 19, 20, 33] utilize user ratings to provide personalized suggestions of items like movies and products. Some popular brands that provide such services are Amazon [34], Netflix, IMDb, BarnesAndNoble [35], etc. Collaborative Filtering (CF) and Content-based (CB) recommendation are two commonly used techniques for building recommendation systems. CF systems [21, 22, 23]operate by gathering user ratings for different items in a given domain and compare various users, their similarities and differences, to determine the items to be recommended. Contentbased methods recommend items by comparing representations of content that a user is interested in to representations of content that an item consists of. There are several datasets like MovieLens [1] and Netflix [2] that are available for testing and bench-marking recommendation systems. We present an Indian regional movie dataset on similar lines. India has been the largest producer of movies in the world for the last ∗ Prerna Agarwal (now working with IBM Research) and Richa Verma (now working with TCS Research ) have equal contribution Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the owner/author(s). Conference’17, Washington, DC, USA © 2016 Copyright held by the owner/author(s). 978-x-xxxx-xxxx-x/YY/MM. . . $15.00 DOI: 10.1145/nnnnnnn.nnnnnnn Angshul Majumdar IIIT Delhi [email protected] few years with a lot of diversity in languages and viewers. As per the UNESCO cinema statistics [9], India produces around 1,724 movies every year with as many as 1,500 movies in Indian regional languages. India’s importance in the global film industry is largely because India is home to Bollywood in Mumbai. There’s a huge base of audience in India with a population of 1.3 billion which is evident by the fact that there are more than two thousand multiplexes in India where over 2.2 billion movie tickets were sold in 2016. The box office revenue in India keeps on rising every year. Therefore, there is a huge need for a dataset like Movielens in Indian context that can be used for testing and bench-marking recommendation systems for Indian Viewers. As of now, no such recommendation system exists for Indian regional cinema that can tap into the rich diversity of such movies and help provide regional movie recommendations for interested audiences. 1.1 Motivation As of now, Netflix and Movielens datasets do not have a comprehensive listing of regional productions as the clipping shows in Figure 1( borrowed from [39]). Therefore, a substantial source of such a data comprising movies of various regions, varying languages and genres encompassing a wider folklore is strongly needed that could provide such data in a suitable format required for building and benchmarking recommendation systems. To capture the diversity of Indian regional cinema, popular websites like Netflix are trying to shift focus towards it [36, 37]. The goal is to bring some of the greatest stories from Indian regional cinema on a global platform. Through this, viewers are exposed to a wide variety of new and diverse stories from India. As a result of this initiative, Indian regional cinema will be available across countries. Building a recommendation system using a dataset of such movies and their audience can prove to be useful in such situations. Here, we present such a dataset which is the first of its kind. 1.2 Contributions • Web portal for data collection: A web portal where a user can sign up by filling details like email, date of birth, gender, home town, languages known and occupation. The user can then provide rating to movies as like/dislike. • Indian Regional Cinema Dataset: It is the first dataset of Indian Regional Cinema which contains ratings by users for different regional movies along with user and movie metadata. User metadata is collected while signing up on the portal. Movie metadata consists of genre, release year, description, language, writer, director, cast and IMDb rating. • Detailed analysis of the dataset using some supervised and unsupervised Collaborative Filtering techniques. such as Blind Compressed Sensing, Probabilistic Matrix Factorization, Matrix completion, Supervised Matrix Factorization are used on our dataset to provide benchmarking results. These techniques are chosen over others because these techniques have proven to provide better accuracy in recent works [6]. 3 INDIAN REGIONAL MOVIE DATASET This is the first dataset of Indian regional cinema which covers movies of 18 different regional languages and a variety of user ratings for such movies. It consists of 919 users with varying demographics and 2,851 movies with different genres. It has 10K ratings from 919 users. 3.1 Metadata Information The data for movies has been scraped from IMDb [3]. IMDb has a collection of Indian movies spanning across multiple Indian regional languages and genres. Each movie is associated with the following metadata. Figure 1: Amazon and Netflix: Focus on Regional Films 2 RELATED WORK MovieLens [1] is a web-based portal that recommends movies. It uses the film preferences of its users, collected in the form of movie ratings and preferred genres and then utilizes some collaborative filtering techniques to make movie recommendations. The Department of Computer Science and Engineering at the University of Minnesota houses a research lab known as Grouplens Research that created Movielens in 1997 [38]. Indian Regional Cinema dataset is inspired from Movielens. The primary goal was to collect data for performing research on providing personalized recommendations. MovieLens released three datasets for testing recommendation systems: 100K, 1M and 10M datasets. They have released 20M dataset as well in 2016. In the dataset, users and movies are represented with integer IDs, while ratings range from 1 to 5 at a gap of 0.5. Netflix released a training data set for their contest, Netflix Prize [8], which consists of about 100,000,000 ratings for 17,770 movies given by 480,189 users. Each rating in the training dataset consists of four entries: user, movie, date of grade, grade. Users and movies are represented with integer IDs, while ratings range from 1 to 5. These datasets are largely for hollywood movies and TV series, and their viewers. They are not designed for those user communities which are inclined towards watching Indian regional cinema. From the view point of recommender systems, there have been a lot of work using user ratings for items and metadata to predict their liking and disliking towards other items [4, 5, 6, 11]. Many unsupervised and supervised collaborative filtering techniques have been proposed and benchmarked on movielens dataset. Here, in this paper, we have chosen few popular techniques such as user-user similarity to establish baseline and then other deeper techniques • Movie id: Each movie has a unique id for its representation. • Description: Description of the movie for users. • Language: Language(s) used in the movie. A movie may have been released in multiple regional languages. The distribution is shown in Table 1. • Release date: Date of release of the movie. • Rating count: As per IMDb, to judge the popularity of the movie. • Crew: Director, writer and cast of the movie. • Genre: Movie genre. It can be one or multiple out of 20 genres available on IMDb. The number of movies for each genre are shown in Figure 2. Table 1: Language Distribution Languages Hindi Bengali Assamese Tamil Nepali Punjabi Rajasthani Malayalam Bhojpuri Kannada Haryanvi Manipuri Urdu Marathi Telugu Oriya Gujarati Konkani Movie Count 615 582 22 313 51 150 18 346 26 303 3 8 129 204 338 98 49 6 User Count 902 28 9 30 9 78 14 16 21 11 18 4 23 14 18 6 7 4 Figure 2: Genre Distribution For better recommendations, it is important to include the factors which influence user ratings the most. Following is the metadata information collected for a user: • User id: A user will have a unique id for its representation. • Languages: The languages known by the users. Its count is shown in Table 1. • State: The state of India that the user belongs to. The region wise distribution is shown in Figure 3. Figure 4: Age Distribution Figure 3: Region-wise Distribution • Age: Date of birth of the user is taken as input to calculate the age of the user. The distribution is shown in Figure 4. • Gender: Denotes the gender of the user. Gender distribution of the data is shown in Figure 5. • Occupation: It denotes the occupation of the user. It can be any one out of student, self-employed, service, retired and others. Its distribution is shown in Figure 6. Figure 5: Gender Distribution Table 2: Comparison of Datasets Dataset Our Dataset Movielens 100K Movielens 1M Movie Count 2851 1700 6000 User Count 919 1000 4000 Rating Count 10,000 100,000 1,000,000 Sparsity(%) 99.96 99.94 99.96 Release Year 2017 4/1998 2/2003 Figure 6: Occupation Distribution 3.2 MovieLens vs Indian Regional Cinema Dataset The key difference between the presented dataset and movielens is that the latter does not contain movies from Indian regional cinema. Movielens only has few Hindi and Urdu movies. Also, our data has been collected mainly from the viewers of regional movies in India. The user metadata, thus, collected can be used to recommend more relevant movies for such audiences. Also, the MovieLens datasets are biased towards a certain category of users. They contain data only from users who have rated at least twenty movies. The datasets do not include the data of those users who could not find enough movies to rate or did not find the system easy enough to use. There is a possibility that there is a fundamental difference between such users and the other users in the datasets. Our dataset makes no such distinction among users based on the number of movies that they have rated. To make the process of rating multiple movies easier for a user, we have used the concept of binary rating for movies where, a user can either ”like” or ”dislike” a movie denoted by ”1” and ”-1” in the dataset. On the other hand, MovieLens uses a 10-point scale for rating (from 0 to 5). A basic comparison of these datasets are shown in Table 2. The table indicates the number of users, movies, ratings, release year and the sparsity of datasets. 3.3 Figure 7: Sign Up form on Portal information. The user can then login to the portal to rate movies as either like or dislike and the responses are recorded as shown in Figure 8. Dataset Collection For the collection of user information and movie ratings, a web portal named Fickscore [15] is created where users can sign up filling in all details as shown in Figure 7. The user has to provide the preferred languages so that the portal can ask users to rate the movies of their preferred languages. While signing up, the user is prompted to fill up the metadata Figure 8: Rating Movies on Portal 4 UNSUPERVISED COLLABORATIVE FILTERING TECHNIQUES To analyze the dataset, some unsupervised techniques are used such as user-user similarity, item-item similarity, Matrix Factorization, Probabilistic Matrix Factorization, Blind Compressed Sensing etc. The main advantage of using such techniques is the ease of implementation and their incremental nature. On the other hand, it is human data dependent its performance decreases on increase of sparsity of data. These techniques cannot address the cold start problem i.e., when a new user or item adds in the dataset whose ratings are not available because these use ratings of users to make predictions. Bias correction is performed on the dataset by calculating global mean, user bias and item bias and then the above techniques are used to predict the rating of a new user for an item. 4.1 User and Item-based similarity In user-user model, a similarity matrix A is calculated, each entry Ai j indicates the score computed by cosine similarity between a user i and another user j. It denotes how much similar are two users i and j, higher the score higher is the similarity. Similarly, in item-item model, each entry Ai j of the similarity matrix ’A’ denotes the cosine similarity score between an item i and another item j. Higher the score, the two items are more similar. Cosine similarity can be calculated for two users u and u’ using the following equations: Í ∀j ru, j ru 0, j Su,u 0 = qÍ (1) 2 Í 2 ∀j ru, j ∀j ru 0, j Where, r i, j denotes the rating by i t h user for j t h item. Prediction for u t h user for j t h item is done as: Õ wu,u 0 ru,u 0 ru,ˆ j = (2) u 0 ∈N (u), j ∈R(u 0 ) Where, wu,u 0 is the normalized similarity weight, ru,u 0 is the rating by u’ user for j t h item. Similar to user-user similarity, item-item similarity is calculated by computing cosine similarity between two items and ratings are predicted in the similar way. 4.2 Matrix factorization There are some hidden traits (latent factors) of liking/disliking of users which may depend on the pattern of their ratings. Users and movies are mapped by this model to a joint latent factor space. Each item i and user j is associated with vector q and p respectively which measures the possessiveness of an item or user for those factors. The dot product qTi pu denotes the liking of a user for a specific item which approximates the rating rui [10]. Computing the mapping of each user and item to factor vectors is a major challenge. Imputation can prove to be expensive as it noticeably increases the amount of data during calculation. To model the observed ratings directly with regularization, the following equation is used: Õ min (rui − qTi pu )2 + λ(||qi || 2 + ||pu || 2 ) (3) ∗ ∗ q .p (u,i ∈k ) Here, k is the set of those user-item pairs in the training set for which rui is known. The system uses the already observed ratings to fit a model on them and uses that model to predict the new ratings. The intuition behind using matrix factorization to analyze this dataset is that there should be some latent features that determine how a user rates an item. For example, two users may give high ratings to a certain movie if they both like the actors/actresses of the movie, or if the movie is an action movie, which is a genre preferred by both users. Hence, if we can discover these latent features, we should be able to predict the rating given by a certain user to a certain item, because the features associated with the user should match with the features associated with the item. 4.3 Probabilistic Matrix Factorization It can handle large datasets because it scales linearly with the number of observations in the dataset. Let Ri j represent the rating of a user i for a movie j. Let U and V be latent feature matrices for user and movie, respectively. The column vectors are denoted as Ui , representing user-specific latent feature vectors, and Vj , representing movie-specific latent feature vectors. [4]. The log posterior is maximized over movie and user features with hyper parameters using the following equation: N M N M λv Õ λu Õ 1 ÕÕ Ii j (Ri j − UiT Vj )2 + ||Ui ||f2 r ob + ||Vj ||f2 r ob 2 i=1 j=1 2 i=1 2 j=1 (4) Where, λu and λv are the regularization parameters for user and item respectively. A local minimum of the equation can be computed by gradient descent in U and V . The model performance is measured by computing mean average error (MAE) and root mean squared error (RMSE) on the test set. This model can be viewed as a probabilistic extension of the SVD model, since if all ratings have been observed, the objective given by the equation reduces to the SVD objective in the limit of prior variances going to infinity. This technique better addresses the sparsity and scalability problems and thus improves prediction performance. It gives an intuitive rationale for recommendation. 4.4 Blind Compressed Sensing A dense user item matrix is not a reasonable assumption as each user will like/dislike a trait to certain extent [24]. However, any item will possess only a few of the attributes and never all. Hence, the item matrix will ideally have a sparse structure rather than a dense one as formulated in earlier works. The objective of this approach is to find the user and item latent factor matrices. As per the approach, user latent factor matrix can be dense but the same does not logically follow for the item latent factor matrix. The sparsity of the item latent factor matrix increases the recommendation accuracy significantly. [5]. The following equation is minimized: min ||Y − A(UV )|| 2 + λu ||U ||f r ob + λv ||V ||f r ob (U ,V ) (5) Where λu and λv are regularization parameters for user and item respectively. A is the binary mask matrix and Y is the rating matrix. U and V is the user latent matrix and item latent matrix respectively which were assumed to be dense in earlier models. Table 3: Unsupervised Techniques Techniques Errors User-User similarity Item-Item similarity Matrix Factorization Probabilistic Matrix Factorization Blind Compressed Sensing Matrix Completion Movielens 100K MAE RMSE 0.6980 1.026 0.744 1.061 0.828 1.128 0.7564 0.9639 0.7356 0.9409 0.8324 1.102 Our Dataset MAE RMSE 0.5307 1.03 0.648 1.049 0.471 0.971 0.481 0.9372 0.463 0.9612 0.4827 0.9264 Movielens 1M MAE RMSE 0.607 0.8810 0.671 0.9196 0.6863 0.8790 0.7241 0.9127 0.6917 0.8789 0.7196 0.9102 Table 4: Supervised Technique Technique Errors Supervised Matrix Factorization 4.5 Movielens 100K MAE RMSE 0.7199 0.9196 Matrix Completion Matrix completion involves filling up the missing entries of a partially observed matrix. It aims to compute the matrix with the lowest rank or, if the rank of the completed matrix is known, a matrix of rank r that matches the known entries. A popular approach for solving the problem is nuclear-norm-regularized (NN) matrix [7] as shown in the following equation. min ||B − R||f2 r ob + λ||R||N N B = Rk −1 + M T (Y − M.Rk −1 ) (7) and, M is the binary mask. R is the rating matrix imputed and Y is the original rating matrix. 5 SUPERVISED COLLABORATIVE FILTERING TECHNIQUES To analyze the dataset, some supervised techniques are used such as supervised Matrix Factorization. The main advantage of using supervised methods is that whenever a new user or new item comes in, it can make predictions for them as well which unsupervised techniques fail to do [28, 29, 30, 31]. This is also called as cold start problem. These are scalable and are dependent on the metadata information of user and item because of which it gives more accurate predictions as it establishes relation well. Bias correction is performed on the dataset by calculating user bias and item bias and then the above technique is used to calculate the rating of a new user for an item. 5.1 Supervised Matrix Factorization The task of predicting ratings becomes difficult largely because of the sparsity of the ratings available in the database of a recommender system. Therefore, using the knowledge related to users demographics and item categories can enhance prediction accuracy [25, 26, 27, 32]. Classes are formed as per users age group, gender and occupation. A user can belong to multiple classes at a time. Class label information is important to learn the latent factor vectors of users and movies in a supervised environment, in a way that they are consistent with the class label information available. Movielens 1M MAE RMSE 0.6709 0.8567 Class label information puts in additional constraints which results in reducing the search space as a result of which determinacy of the problem is reduced. Mathematically, within the matrix factorization framework, additional information of user metadata (U) and item metadata (V) can be used and the following equation can be minimized [6]. min (U ,V ,A,C) (6) Where, Our dataset MAE RMSE 0.4367 0.9283 ||Y − M(UV )||f r ob + λu ||U ||f r ob + λv ||V ||f r ob + µu ||W − UC ||f r ob + µv ||Q − AV ||f r ob (8) Where, Wi j = 1 if user i belongs to class j else 0. C is the linear map from latent factor space to classification domain. Q is the class information matrix created similar to W . Other variables have their usual meanings. Introducing supervised learning into the latent factor model helps in improving the prediction accuracy by reducing the problem of rating matrix sparsity. The value of regularization parameters are determined using l-curve technique [16] 6 EXPERIMENTS AND RESULTS Three different datasets are used to compare the results of supervised and unsupervised collaborative filtering techniques used to predict user ratings. The datasets used for experiments are Movielens 100K, MovieLens 1M and our dataset of Indian regional movies. For error calculation, Mean absolute error (MAE) and Root mean squared error (RMSE) is calculated between the actual ratings and the predicted ratings. The datasets are divided into 5 folds for evaluation. The ratings are binarized into like/dislike (1/-1) labels for experiments. Results of different techniques on these datasets are shown in Table 3 and Table 4. As the values in the Table 2 indicate, the basic cosine similarity measures between users and movies perform fairly well on all datasets. The minimum MAE values result from the experiments using our dataset. Since the sparsity of regional cinema dataset and Movielens 1M dataset is is very high (as indicated in Table 2), techniques like Probabilistic Matrix Factorization and Blind Compressed Sensing perform better than other basic similarity measures and among them the least MAE is again shown for our dataset. To use metadata information, the information is encoded in the form of one hot vector of 1’s and 0’s where in case of languages, multiple 1’s can be present in the vector. Since supervised techniques uses both user and item metadata they outperform unsupervised collaborative filtering techniques. Among all three datasets, minimum MAE is shown on our dataset. This shows that the Indian Regional Cinema dataset can prove to be useful for building and benchmarking recommendation systems in Indian context, which has the most diverse languages and demographics. 7 CONCLUSION AND FUTURE WORK India is one of the country where not only varying languages are present, it’s population’s demographics are also very diverse in nature. Therefore, Indian regional cinema has a lot of diversity when it comes to the number of languages and the demographics of the viewers. There are thousands of such movies that are produced annually and there is a huge community of people who watch them. Therefore, a recommender system for Indian regional movies is needed to address the preferences of the growing number of their viewers. This dataset has around 10K ratings by Indian users, along with their demographic information. We believe that this dataset could be used to design, improve and benchmark recommendation systems for Indian regional cinema. We plan to release the dataset after its publication. We further want to release another version of this dataset with more number of ratings and users, which will help to improve the current state of recommender systems for the Indian audience. REFERENCES [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] [20] MovieLens: https://movielens.org/ Netflix: https://www.netflix.com/in/ IMDb: http://www.imdb.com/ A. Mnih and R. Salakhutdinov, Probabilistic matrix factorization, in Proc. Adv. Neural Inf. Process. Syst., 2007, pp. 1257-1264. A. Gogna and A. Majumdar. (2015). Blind compressive sensing framework for collaborative filtering. Available: http://arxiv.org/abs/1505.01621 A. Gogna and A. Majumdar, A Comprehensive Recommender System Model: Improving Accuracy for Both Warm and Cold Start Users, in IEEE Access, vol. 3, no. , pp. 2803-2813, 2015. T. Hastie, R. Mazumder, J. Lee, R. Zadeh, Matrix Completion and Low-Rank SVD via Fast Alternating Least Squares, https://arxiv.org/abs/1410.2596. Netflix Prize: http://www.netflixprize.com/ http://uis.unesco.org/en/news/record-number-films-produced Yehuda Koren, Matrix Factorization Techniques for Recommender Systems, Published by the IEEE Computer Society, August 2009. Xiaoyuan Su and Taghi M. Khoshgoftaar, A survey of collaborative filtering techniques, in Advances in artificial intelligence, vol. 2009, pp. 4, 2009. Thomas Hofmann, Latent semantic models for collaborative filtering, in ACM Transactions on Information Systems (TOIS), vol. 22, no. 1, pp. 89-115, 2004. Gediminas Adomavicius and Alexander Tuzhilin, Toward the next generation of recommender systems: A survey of the state-of-the-art and possible extensions, in Knowledge and Data Engineering, IEEE Transactions on, vol. 17, no. 6, pp. 734-749, 2005. Sivan Gleichman and Yonina C Eldar, Blind compressed sensing, in Information Theory, IEEE Transactions on, vol. 57, no. 10, pp. 6958-6975, 2011. Flickscore: http://flickscore.iiitd.edu.in C. L. Lawson and R. J. Hanson, Solving Least Squares Problems, vol. 161. Englewood Cliffs, NJ, USA: Prentice-Hall, 1974. M. F. Hornick and P. Tamayo, Extending recommender systems for disjoint user/item sets: The conference recommendation problem, IEEE Trans. Knowl. Data Eng., vol. 24, no. 8, pp. 1478-1490, Aug. 2012. Q.Liu, E.Chen, H.Xiong, Y.Ge, Z.Li and X.Wu, A cocktail approach for travel package recommendation, IEEE Trans. Knowl. Data Eng.,vol. 26, no. 2, pp. 278293, Feb. 2014. Y. Koren and R. Bell, Advances in collaborative filtering, in Recommender Systems Handbook. New York, NY, USA: Springer, 2011, pp. 145-186. X. Su and T. M. Khoshgoftaar, A survey of collaborative filtering techniques, Adv. Artif. Intell., vol. 2009, Jan. 2009, Art. ID 4. [21] R. M. Bell and Y. Koren, Improved neighborhood-based collaborative filtering, in Proc. KDD-Cup Workshop, 2007, pp. 7-14. [22] C.Desrosiers, and G.Karypis, A comprehensive survey of neighborhood based recommendation methods, in Recommender Systems Handbook. New York, NY, USA: Springer, 2011, pp. 107-144. [23] J. Wang, A. P. de Vries, and M. J. T. Reinders, Unifying user-based and item-based collaborative filtering approaches by similarity fusion, in Proc. 29th Annu. Int. ACM SIGIR Conf. Res. Develop. Inf. Retr., 2006, pp. 501-508. [24] S.Gleichman and Y.C.Eldar, Blind compressed sensing,IEEETrans. Inf. Theory, vol. 57, no. 10, pp. 6958-6975, Oct. 2011. [25] H.Ma, D.Zhou, C.Liu, M.R.Lyu, and I.King, Recommender systems with social regularization, in Proc. 4th ACM Int. Conf. Web Search Data Mining, 2011, pp. 287-296. [26] P. Massa and P. Avesani, Trust-aware recommender systems, in Proc.ACM Conf. Recommender Syst., 2007, pp. 17-24. [27] X.Tang, Y.Xu, and S.Geva, Learning higher order interactions for user and item profiling based on tensor factorization, in Proc. 20th Int. Conf. Intell. User Interfaces, 2015, pp. 213-224. [28] Q.Gu, J.Zhou, and C.Ding,Collaborative filtering:Weighted non negative matrix factorization incorporating user and item graphs, in Proc. SDM, 2010, pp. 199-210. [29] S.-T. Park, D. Pennock, O. Madani, N. Good, and D. DeCoste, Naive filterbots for robust cold-start recommendations, in Proc. 12th ACM SIGKDD Int. Conf. Knowl. Discovery Data Mining, 2006, pp. 699-705. [30] A. L. V. Pereira and E. R. Hruschka, Simultaneous co-clustering and learning to address the cold start problem in recommender systems, Knowl.-Based Syst., vol. 82, pp. 11-19, Jul. 2015. [31] Z.-K. Zhang, C. Liu, Y.-C. Zhang, and T. Zhou, Solving the cold-start problem in recommender systems with social tags, EPL (Europhys. Lett.), vol. 92, no. 2, p. 28002, Nov. 2010. [32] A.-T. Nguyen, N. Denos, and C. Berrut, Improving new user recommendations with rule-based induction on cold user data, in Proc. ACM Conf. Recommender Syst., 2007, pp. 121-128. [33] G. Adomavicius and A. Tuzhilin, Toward the next generation of recommender systems: A survey of the state-of-the-art and possible extensions, IEEE Trans. Knowl. Data Eng., vol. 17, no. 6, pp. 734-749, Jun. 2005. [34] Amazon: http://www.amazon.in [35] BarnesAndNoble: https://www.barnesandnoble.com [36] https://www.clickondetroit.com/entertainment/ netflix-steps-up-its-battle-with-amazon-in-india [37] http://www.financialexpress.com/industry/technology/ the-desi-content-battleground/798145/ [38] https://grouplens.org/datasets/movielens/ [39] http://timesofindia.indiatimes.com/companies/ amazon-to-join-bollywood-film-industry-hires-consultants-to-create-a-blueprint\ -for-a-hindi-film-studio/articleshow/58176571.cms
2cs.AI
Weighted Message Passing and Minimum Energy Flow for Heterogeneous Stochastic Block Models with Side Information T. Tony Cai1 , Tengyuan Liang2 and Alexander Rakhlin1 arXiv:1709.03907v1 [math.ST] 12 Sep 2017 1 2 Department of Statistics, The Wharton School at the University of Pennsylvania Econometrics and Statistics, The University of Chicago Booth School of Business Abstract We study the misclassification error for community detection in general heterogeneous stochastic block models (SBM) with noisy or partial label information. We establish a connection between the misclassification rate and the notion of minimum energy on the local neighborhood of the SBM. We develop an optimally weighted message passing algorithm to reconstruct labels for SBM based on the minimum energy flow and the eigenvectors of a certain Markov transition matrix. The general SBM considered in this paper allows for unequal-size communities, degree heterogeneity, and different connection probabilities among blocks. We focus on how to optimally weigh the message passing to improve misclassification. 1 Introduction The stochastic block model (SBM), or planted partition model, is a celebrated model that captures the clustering or community structure in large networks. Fundamental phase transition phenomena and limitations for efficient algorithms have been established for the “vanilla” SBM, with equal-size communities [9, 10, 27, 30, 31, 24, 1, 16, 2, 11]. However, when applying the algorithms to real network datasets, one needs to carefully examine the validity of the vanilla SBM model. First, real networks are heterogeneous and imbalanced; they are often characterized by unequal community size, degree heterogeneity, and distinct connectivity strengths across communities. Second, in real networks, additional side information is often available. This additional information may come, for instance, in the form of a small portion of revealed community memberships, or in the form of node features, or both. In this paper, we aim to address the above concerns by answering the following questions: Algorithm For a general stochastic block model that allows for heterogeneity and contains noisy or partial side information, how to utilize this information to achieve better classification performance? Theory What is the transition boundary on the signal-to-noise ratio for a general heterogeneous stochastic block model? Is there a physical explanation for the optimal misclassification error one can achieve? 1.1 Problem Formulation We define the general SBM with parameter bundle (n, k, N ∈ Rk ,Q ∈ Rk×k ) as follows. Let n denote the number of nodes and k the number of communities. The vector N = [n 1 , n 2 , . . . , n k ]T denotes the number of nodes in each community. The symmetric matrix Q = [Q i j ] represents the connection probability: Q i j 1 is the probability of a connection between a node in community i to a node in community j . Specifically, one observes a graph G(V, E ) with |V | = n, generated from SBM as follows. There is a latent disjoint parS tition that divides V = kl=1 Vl into k communities. Define `(·) : V → [k] to be the label (or, community) of a node v. For any two nodes v, u ∈ V , there is an edge between (u ↔ v) ∈ E with probability Q `(u),`(v) . The goal is to recover the latent label `(v) for each node v. Here we consider the following kinds of heterogeneity: unequal size communities (represented by [n i ]), different connection probabilities across communities (as given by [Q i j ]), and degree heterogeneity (due to both [n i ] and [Q i j ]). We study the problem when either noisy or partial label information is available in addition to the graph structure and show how to “optimally” improve the classification result (in terms of misclassification error). We argue that this is common for many practical problems. First, in real network datasets, a small portion of labels (or, community memberships) is often available. Second, a practitioner often has certain initial guess of the membership, either through training regression models using node features and partially revealed labels as side information, or running certain clustering algorithms (for example, spectral clustering using non-backtracking matrix, semi-definite programs or modularity method) on a subset or the whole network. We will show that as long as these initial guesses are better than random assignments, one can “optimally weigh” the initial guess according to the network structure to achieve small misclassification error. Formally, the noisy (or partial) information is defined as a labeling `˜prior on the nodes of the graph with the following stochastic description. The parameter δ quantifies either (a) the portion of randomly revealed true labels (with the rest of entries in `˜prior missing), or (b) the accuracy of noisy labeling `˜prior , meaning 1−δ P(`˜prior (v) = `(v)) = + δ, k and when `˜prior (v) 6= `(v), each label occurs with equal probability. 1.2 Prior Work In the literature on vanilla SBM (equal size communities, symmetric case), there are two major criteria — weak and strong consistency. Weak consistency asks for recovery better than random guessing in a sparse random graph regime (p, q ³ 1/n), and strong consistency requires exact recovery for each node above the connectedness theshold (p, q ³ log n/n). Interesting phase transition phenomena in weak consistency for SBM have been discovered in [10] via the insightful cavity method from statistical physics. Sharp phase transitions for weak consistency have been thoroughly investigated in [9, 30, 31, 32, 27]. In particular for k = 2, spectral algorithms on the non-backtracking matrix have been studied in [27] and the non-backtracking walk in [32]. In these two fundamental papers, the authors resolved the conjecture on the transition boundary for weak consistency posed in [10]. Spectral algorithms as initialization and belief propagation as further refinement to achieve better recovery was established in [31]. Recent work of [3] establishes the positive detectability result down to the Kesten-Stigum bound for all k via a detailed analysis of a modified version of belief propagation. For strong consistency, [1, 16, 17] established the phase transition using information-theoretic tools and semi-definite programming (SDP) techniques. In the statistics literature, [40, 14] investigated the misclassification rate of the standard SBM. For the general SBM with connectivity matrix Q, [15, 5, 7] provided sharp non-asymptotic upper bound analysis on the performance of a certain semi-definite program. They investigated the conditions on Q for a targeted recovery accuracy, quantified as the loss (as a matrix norm) between the SDP solution and the ground truth. The results are more practical for heterogeneous real networks. However, for the analysis of SDP to work, these results all assume certain density gap conditions, i.e., max1≤i < j ≤k Q i j < 2 min1≤i ≤r Q i i , which could be restrictive in real settings. Our technical approach is different, and does not require the density gap conditions. Moreover, we can quantify more detailed recovery guarantees, for example, when one can distinguish communities i , j from l , but not able to tell i , j apart. In addition, our approach can be implemented in a decentralized fashion, while SDP approaches typically do not scale well for large networks. For SBM with side information, [20, 6, 38] considered SBM in the semi-supervised setting, where the side information comes as partial labels. [20] considered the setting when the labels for a vanishing fraction of the nodes are revealed, and showed that pushing below the Kesten-Stigum bound [22, 21] is possible in this setting, drawing a connection to a similar phenomenon in k-label broadcasting processes [29]. In addition, [6, 38] studied linearized belief propagation and misclassification error on the partially labeled SBM. The focus of this paper is on local algorithms, which are naturally suited for distributed computing [25] and provide efficient solutions to certain computationally hard combinatorial optimization problems on graphs. For some of these problems, they are good approximations to global algorithms [23, 13, 36, 35]. The fundamental limits of local algorithms have been investigated, in particular, in [28] in the context of a sparse planted clique model. We also want to point out that [34] studied the local belief propagation and characterized the expected fraction of correctly labeled vertices using fixed point analysis of the density evolution, in the case of vanilla SBM with side information. Finally, we briefly review broadcasting processes on trees. Consider a Markov chain on an infinite tree rooted at ρ with branching number b. Given the label of the root `(ρ), each vertex chooses its label by applying the Markov rule M to its parent’s label, recursively and independently. The process is called broadcasting process on trees. One is interested in reconstructing the root label `(ρ) given all the nth level leaf labels. Sharp reconstruction thresholds for the broadcasting process on general trees for the symmetric Ising model setting (each node’s label is {+, −}) have been studied in [12]. [33] studied a general Markov channel on trees that subsumes k-state Potts model and symmetric Ising model as special cases, and established non-census-solvability below the Kesten-Stigum bound. [18] extended the sharp threshold to robust reconstruction, where the vertex’ labels are contaminated with noise. The transition thresholds proved in the above literature correspond to the Kesten-Stigum bound b|λ2 (M )|2 = 1 [22, 21]. 1.3 Our Contributions The main results of the present paper are summarized as follows. Weighted Message Passing We propose a new local algorithm – Weighted Message Passing (WMP) – that can be viewed as linearized belief propagation with a novel weighted initialization. The optimal weights are jointly determined by the minimum energy flow that captures the imbalance of local treelike neighborhood of SBM, and by the second eigenvectors of the Markov transition matrix for the label broadcasting process. As we will show, these initializations are crucial for the analysis of general SBM that is heterogeneous and asymmetric. For the technical contribution, we provide non-asymptotic analysis on the evolution of WMP messages. For general number of communities, it is challenging to track the densities of WMP messages during evolution. We overcome the difficulty through introducing carefully chosen weights and then prove concentration-of-measure phenomenon on messages. Misclassification Error We establish a close connection between the misclassification error and a notion called minimum energy through the optimally weighted message passing algorithm. In fact, we show 3 that asymptotically almost surely, the misclassification error of WMP Err(`ˆwmp ) satisfies µ ˆ Err(`wmp ) ≤ exp − ¶ 1 , 2E∗ (θ −2 ) where E∗ (θ −2 ) is defined as the minimum energy based on the local tree-like neighborhood, with θ 2 chosen as the conductance level on the edges of the tree. Intuitively, the smaller the energy is, the better the misclassification error one can achieve. This result provides a physical interpretation for the misclassification error. In return, the above upper bound provides a principled way of choosing the optimal weights as to minimize the energy determined by the Thomson’s principal [26]. This approach is key to dealing with asymmetric and imbalanced local neighborhoods. Transition Boundary We show that the Kesten-Stigum bound is the sharp boundary for local algorithms on the signal-to-noise ratio for the general heterogeneous SBM. Define the following quantities £ ¤−1 K := diag(QN ) Qdiag(N ), M := Qdiag(N ) (1) θ := λ2 (K ), λ := λ1 (M ), and SNR := λθ 2 , (2) where N ,Q are defined in Section 1.1, and λi (·) denotes the i -th eigenvalue. Then the Kesten-Stigum bound SNR = 1 is the threshold for local algorithms. Above it, the minimum energy E∗ (θ −2 ) is finite, which asserts a valid upper bound on the misclassification error. Below it, the minimum energy diverges and WMP fails. In fact, we show that below the threshold, no local algorithm can perform significantly better than random guessing. Set Identification When the number of communities k ≥ 3, we define a notion of set identification to describe, for two disjoint sets (of communities) S, T ⊂ [k], whether one can distinguish S from T . This notion subsumes as a special case the classic identification when S, T are singletons. However, it describes more general cases when one cannot distinguish the communities inside S and T , but is able to distinguish S and T . We provide a mathematical description of this fact using the structure of eigenvectors for the Markov transition matrix K defined in (1). Further, we show that one can weigh the labels in the “most informative direction” by initializing WMP according to the second eigenvectors. 1.4 Organization of the Paper The paper is organized as follows. Section 2 reviews the background, definitions, and theoretical tools that will be employed to solve the general SBM. To illustrate the main idea behind the theoretical analysis better, we split the main result into two sections. Section 3 resolves the k = 2 case, where we emphasize the derivation of WMP as a linearized belief propagation, and, more importantly, detail the initialization of WMP according to minimum energy flow. Then we establish the connection between misclassification and energy. In Section 4, we focus on the general k ≥ 3 case, where we incorporate an additional layer of weights on the labels introduced by the eigenvectors of the Markov transition matrix. We then describe the mathematical treatment of set identification. Discussions on the gap between local and global algorithms for growing k, and on how WMP utilizes the asymmetry follow in the end. Section 5 considers the numerical performance of the proposed algorithm. The proofs of the main results are given in Section 6. 4 2 Preliminaries 2.1 Tree, Branching Number, Flow and Energy Let T t (o) denote the tree up to depth t with root o. For a node v, the set of children is denoted by C (v), children at depth d denoted by C d (v), and the parent of v is denoted by P (v). We use |v| to denote the depth of v relative to o. If we view a tree as an electrical network, one can define the current flow and energy on the tree [26]. Later in the paper we will show the close connection between these notions and the misclassification error. Definition 1 (Electric Flow). A unit flow i(·) : V → R on a tree T is called a valid unit flow if i( for any v i( v) = X i( o) = 1 and u). u∈C (v) Definition 2 (Energy and Resistance). The energy E(r, i) of a unit flow i at resistance level r > 0 is defined as E(r, i) := X i( v)2 r|v| . v∈T The minimum energy E∗ (r) is E∗ (r) := inf E(r, i), i where the infimum is over all valid unit flows. Denote the minimum energy flow as i∗ . When assigning resistance rd to edges that are d -depth away from the root, the energy enjoys the natural physical interpretation. We also remark that for a given resistance level, one can calculate the minimum energy flow i∗ on the tree using Thomson’s principal. We identify the reciprocal of resistance level with the conductance level. Now we are ready to define the branching number of a tree T through minimum energy. Definition 3 (Branching Number). The branching number br(T ) can be defined as br(T ) := sup{r : E(r) < ∞} = sup{r : inf X i v∈T i( v)2 r|v| < ∞}. It is well known that the branching number not only captures the growth rate of the tree, but also the more detailed structure, such as imbalance [26]. 2.2 Broadcasting Trees and SBM When viewed locally, stochastic block models in the sparse regime share similarities with a label broadcasting process on a Galton-Watson tree. In fact, the local neighborhood of SBM can be coupled with a broadcasting tree with high probability as n → ∞. This phenomenon has been investigated in studying the detectability and reconstruction threshold for vanilla SBM (equal-size communities, symmetric case), as in [30]. Let us formally define the label broadcasting process conditioned on a tree T (o). 5 Definition 4 (Label Broadcasting). Given a tree T (o), the k-broadcasting process on T with the Markov transition matrix K ∈ Rk×k describes the following process of label evolution. Conditioning on a node v and its label `(v) ∈ [k], the labels of children u ∈ C (v) are sampled independently from P(`(u)|`T|v| (o) ) = P(`(u)|`(v)) = K `(v),`(u) , where the first equality is the Markov property. Let us review the definition of the multi-type Galton-Watson tree. We shall only consider the Poisson branching process. Definition 5 (Multi-type Galton-Watson Tree). Consider a k-types Galton-Watson process with the mean matrix M ∈ Rk×k . For a node v, given its type `(v) = i , the number of type j children of v enjoys a Poisson(mi j ) distribution, independently of other types. Start the process recursively for t generations from root o. The tree T t (o) is called a multi-type Galton-Watson tree. 2.3 Notation The moment generating function (MGF) for a random variable X is denoted by Ψ X (λ) = Ee λX . For asymptotic order of magnitude, we use a(n) = O (b(n)) to denote that ∀n, a(n) ≤ C b(n) for some universal constant C , and use O ∗ (·) to omit the poly-logarithmic dependence. As for notation -, %: a(n) - b(n) a(n) if and only if lim b(n) ≤ C , with some constant C > 0, and vice versa. The square bracket [·] is used to n→∞ represent the index set [k] := [1, 2, . . . , k]; in particular when k = 2, [2] := {+, −} for convenience. x −e −x Recall that the hyperbolic tangent is tanh x = ee x +e −x . The message-passing algorithm in the following sections involves a non-linear update rule defined through a function f θ1 ,θ2 (x) := log for 0 < θ1 , θ2 < 1. Note that the derivative f θ0 1 ,θ2 (0) = 1 + θ1 tanh x2 1 − θ2 tanh x2 , (3) θ1 +θ2 2 . 3 Two Communities In this Section we will illustrate the main results for the case of two, possibly imbalanced, communities. We motivate the weighted message passing algorithm, and its relation to minimum energy flow. We investigate the connection between misclassification and minimum energy, as well as the corresponding transition threshold for general SBM. 6 3.1 Main Algorithmic and Theoretical Results This section serves as an informal summary of the results for k = 2. As a start, we introduce the following weighted message passing (WMP) Algorithm 1. Algorithm 1: Weighted Message Passing Data: Graph G(V, E ) with noisy label information `˜prior . Parameters: neighborhood radius t̄ and conductance level θ̄ 2 . Result: The labeling for each node o ∈ V . for each node o ∈ V , do Open the tree neighborhood T t̄ (o) induced by the graph G(V, E ) ; Layer t̄ : for every node u ∈ C t̄ (o) with distance t̄ to the root on T t̄ (o), initialize its message M (u, 0) = θ̄ −2|u| · i∗ ( u) · sign[`˜prior (u)], where i∗ ( u) is the minimum energy flow to u calculated via Thomson’s principal on T t̄ (o) with conductance level θ̄ 2 ; for t = 1, . . . t̄ , do Layer t̄ − t : for every node u ∈ C t̄ −t (o), calculate the message M (u, t ) through the linearized update rule X M (u, t ) = θ̄M (v, t − 1). v∈C (u) end Output `ˆwmp (u) = sign[M (o, t̄ )]. end We remark that WMP can run in parallel for all nodes due to its decentralized nature. For fixed depth t̄ and sparse SBM (when n maxi , j Q i j - log n), the algorithm runs in O ∗ (n) time. The following theorem is a simplified version of Theorems 2 and 3 below: Theorem 1 (General SBM: k = 2). Consider the general stochastic block model G(V, E ) with parameter bundle (n, k = 2, N ,Q), with either partial or noisy label information `˜prior with parameter 0 < δ < 1. Assume that n maxi , j Q i j - n o(1) . For any node o ∈ V and its depth t leaf labels `˜prior (C t (o)), define the worst-case misclassification error of a local estimator σt (o) : `˜prior (C t (o)) → {+, −} as Err(σt ) := max P (σt (o) 6= `(o)|`(o) = l ) . l ∈{+,−} (4) Define µ ¶ 1 n 1Q 11 − n 2Q 12 n 2Q 22 − n 1Q 21 + 4 n 1Q 11 + n 2Q 12 n 1Q 21 + n 2Q 22 µ· ¸¶ n 1Q 11 n 2Q 12 λ := λ1 . n 1Q 21 n 2Q 22 θ̄ := Let E∗ (θ̄ −2 ) be the minimum energy on T t (o) with conductance level θ̄ 2 as t → ∞. The transition boundary for this general SBM depends on the value SNR = λθ̄ 2 . 7 (5) (6) On the one hand, if λθ̄ 2 > 1, the WMP Algorithm 1, denoted as `ˆwmp , enjoys the following upper bound on misclassification ¶ µ 1 1 ∧ , lim sup lim sup Err(`ˆwmp ) ≤ exp − (7) 2 n→∞ t →∞ 2E∗ (1/θ̄ 2 ) for any fixed δ > 0. On the other hand, if λθ̄ 2 < 1, for any local estimator σt that uses only label information on depth t leaves, the minimax misclassification error is lower bounded by 1 lim inf lim inf inf Err(σt ) = . t →∞ n→∞ σt 2 (8) Remark 1. We remark that Algorithm 1 is stated for the case when noisy label information is known for all nodes in layer t̄ . For the case of partial label information, there are two options to modify the initialization of the algorithm: (1) view the partial label information with parameter δ as the noisy label information on layer t̄ only, with P(`˜prior (u) = `(u)) = δ + (1 − δ) 12 — with probability δ, the label is revealed exactly, and with probability 1 − δ, the label is decided using coin-flip — then proceed with the algorithm; (2) view the partial information as on each layer there is a δ portion of nodes whose label is shown exactly. Call the set of these nodes V l (T t̄ (o)). Then we need to initialize the message M (u) P for all u ∈ V l (T t̄ (o)) first before using the recursion M (u) = v∈C (u) θ̄M (v). It can be shown that these two treatments enjoy similar asymptotic performance in terms of misclassification error, above the SNR threshold. However, the latter performs better numerically for fixed depth tree as it utilizes more information. We decompose the proof of Theorem 1 into several building steps: (1) conditioned on the local tree structure, prove concentration-of-measure on WMP messages when label propagates according to a Markov transition matrix K ; (2) for a typical tree instance generated from multi-type Galton-Watson process, establish connection among the misclassification rate, transition boundary and minimum energy through the concentration result; (3) show that in the sparse graph regime of interest, the local neighborhood of general SBM can be coupled with a multi-type Galton-Watson with Markov transition matrix " nQ # n Q 1 K := 11 2 n 1 Q 11 +n 2 Q 12 n 1 Q 21 n 1 Q 21 +n 2 Q 22 12 n 1 Q 11 +n 2 Q 12 n 2 Q 22 n 1 Q 21 +n 2 Q 22 for label broadcasting (the explicit expression based on Eq. (1)). We remark that (3) follows similar proof strategy as in [30], where the coupling for vanilla SBM has been established. The lower bound follows from Le Cam’s testing argument, and the difficulty lies in analyzing the distance between measures recursively on the local tree. Remark 2. When the local tree is regular and symmetric and λθ̄ 2 > 1, the minimum energy can be evaluated exactly as 1 E∗ (θ̄ −2 ) = , 2 λθ̄ − 1 ¡ ¢ −1 which implies that misclassification error takes the exponentially decaying form exp − SNR . Hence, 2 the result provides a detailed understanding of the strength of the SNR and its effect on misclassification, i.e., the inference guarantee. More concretely, for the vanilla SBM in the regime p = a/n, q = b/n, the boundary is SNR = n(p−q)2 2(p+q) > 1, which is equivalent to the boundary (a − b)2 >1 2(a + b) 8 ˆ < 1/n → for weak consistency in [32, 27]. In addition, one observes that SNR > 1 + 2 log n implies Err(`) 0, which asserts strong consistency. This condition on SNR is satisfied, for instance, by taking p = a log n/n, q = b log n/n in vanilla SBM and computing the relationship between a, b to ensure SNR = n(p−q)2 2(p+q) > 1 + 2 log n. This relationship is precisely p s p p a− b 2(a + b) 1 > 1+ · p p p > 1. 2 log n 2 a+ b The above agrees with the threshold for strong recovery in [1, 16]. 3.2 Weighted Message Passing & Minimum Energy Flow In this section, we will motivate our proposed weighted message passing (WMP) from the well-known belief propagation (BP) on trees. There are two interesting components in the WMP Algorithm 1: the linearization part, and the initialization part. We will discuss each one in details in this section. Recall the Definition 4 of the label broadcasting process on tree T (o) with k = 2. For convenience, let us denote the Markov transition matrix K to be # " K= 1+θ1 2 1−θ2 2 1−θ1 2 1+θ2 2 . (9) The BP algorithm is the Bayes optimal algorithm on trees given the labels of leaves. Define for a node u ∈ V the BP message as P(`(u) = +)|`obs (T t (u))) B (u, t ) := log , P(`(u) = −|`obs (T t (u))) which is the posterior logit of u’s label given the observed labels `obs (T t (u))). Using Bayes rule and conditional independence, one can write out the explicit evolution for BP message through f θ1 ,θ2 in (3) à B (u, t ) = X v∈C (u) = X log 1 + θ1 tanh B (v,t2 −1) ! 1 − θ2 tanh B (v,t2 −1) f θ1 ,θ2 (B (v, t − 1)) , (10) v∈C (u) with θ1 , θ2 as in Markov transition matrix K . While the method is Bayes optimal, the density of the messages B (u, t ) is difficult to analyze, due to the blended effect of the dependence on revealed labels and the non-linearity of f θ1 ,θ2 . However, the WMP Algorithm 1 — a linearized BP — shares the same transition threshold with BP, and is easier to analyze. Above a certain threshold, the WMP succeeds, which implies that the optimal BP will also work. Below the same threshold, even the optimal BP will fail, and so does the WMP. The updating rule for WMP messages M (u, t ) is simply a replacement of Eq. (10) by its linearized version, X θ1 + θ2 M (v, t − 1). M (u, t ) = 2 v∈C (u) The initialization of the WMP messages on the leaves M (u, 0) whose labels have been observed is crucial to the control of the misclassification error of the root node, especially for general SBM with heterogeneous degrees. For general SBM, one should expect to initialize the messages according to the detailed local tree structure, where the degree for each node could be very different. It turns out that 9 the optimal misclassification for WMP is related to a notion called the minimum energy E∗ . Moreover, the optimal initialization for leaf message u is proportional to the minimum energy flow i∗ ( u) on the local tree, with conductance level θ̄ 2 . In plain language, i∗ ( u) provides a quantitative statement of the importance of the vote u has for the root. Note that for imbalanced trees, i∗ could vary significantly from node to node, and can be computed efficiently given the tree structure T t (o) for a specified conductance level. 3.3 Concentration, Misclassification & Energy We now prove the concentration-of-measure phenomenon on WMP messages. Through the concentration, we will show the close connection between misclassification and energy. We will first state the result conditioned on the tree structure T t (o). Lemma 1 (Concentration on Messages). Recall the label broadcasting process with Markov transition kernel K ∈ R2×2 on tree T t̄ (o). Assume the MGF of messages on leaves M (u, 0) satisfies the following h i λ2 σ2 (u) 0 E e λM (u,0) |`(u) = + ≤ e λµ0 (u,+) e 2 h i λ2 σ2 (u) 0 E e λM (u,0) |`(u) = − ≤ e λµ0 (u,−) e 2 for any λ, with parameter ¸ · µ0 (u, +) ∈ R2 , µ0 (u) = µ0 (u, −) σ20 (u) ∈ R. Define the following updating rules for a node v µt (v) = θ̄K µt −1 (u) X (11) u∈C (v) σ2t (v) = ½ ¸ ¾ · µt −1 (u, +) − µt −1 (u, −) 2 2 θ̄ σt −1 (u) + . 2 u∈C (v) X 2 (12) Then the following concentration-of-measure holds for the root message M (o, t̄ ): M (o, t̄ )|`(o)=+ ≥ µt̄ (o, +) − x · σt̄ (o) M (o, t̄ )|`(o)=− ≤ µt̄ (o, −) + x · σt̄ (o) 2 both with probability 1 − exp(− x2 ). µ (o,+)+µt̄ (o,−) 2 In addition, if we choose t̄ fication error is upper bounded by as the cut-off to provide classification `ˆwmp , then the misclassià exp − [µt̄ (o, +) − µt̄ (o, −)]2 8σ2t̄ (o) ! . (13) The above Lemma provides an expression on the classification error. The next Theorem will show that with the “optimal” initialization for WMP, the misclassification error is connected to the minimum energy. 10 Theorem 2 (Connection between Misclassification & Energy). Define the current flow i( v) = θ̄ 2|v| [µt −|v| (v, +) − µt −|v| (v, −)] [µt (o, +) − µt (o, −)] . Then it is a valid unit flow on T t (o), and the following equation holds σ2t (o) h [µt (o,+)−µt (o,−)] 2 i2 = (1 + o t (1)) X i( ¡ ¢|v| v)2 θ̄ −2 = (1 + o t (1))Et (i, θ̄ −2 ) v∈T t (o) when limt →∞ Et (i, θ̄ −2 ) < ∞. Moreover, if we choose µ0 (v) so that i is the minimum energy flow, then under the condition br[T (o)]θ̄ 2 > 1, we have E∗ (θ̄ −2 ) < ∞ and lim inf h t →∞ i σ2t (o) [µt (o,+)−µt (o,−)] 2 i2 ≤ X i∗ ( ¡ ¢|v| v)2 θ̄ −2 = E∗ (θ̄ −2 ). (14) v∈T (o) Remark 3. The above Theorem 2 and Lemma 1 together state the fact that if br[T (o)]θ̄ 2 > 1, E∗ (θ̄ −2 ) is finite, and the optimal initialization of WMP enjoys the asymptotic misclassification error bound of µ ¶ 1 exp − . 2E∗ (θ̄ −2 ) Qualitatively, the smaller the minimum energy is, the smaller the misclassification error is, and it decays exponentially. On the contrary, if the minimum energy is infinite (br[T (o)]θ̄ 2 < 1), the misclassification error bound for WMP becomes vacuous. Another remark is that when the tree is regular, the minimum energy takes the simple form E∗ (θ̄ −2 ) = asymptotic misclassification error. θ̄ 2 −1 1 , which implies the upper bound exp(− br[T (o)] ) on 2 br[T (o)]θ̄ 2 −1 3.4 Below the Threshold: Limitation of Local Algorithms In this section, we will show that the SNR threshold (for WMP algorithm) is indeed sharp for the local algorithm class. The argument is based on Le Cam’s method. Let us prove a generic lower bound for any fixed tree T t (o), and for the k = 2 label broadcasting process with transition matrix K (as in Eq. (9)). Theorem 3 (Limitation of Local Algorithms). Recall the label broadcasting process with Markov transition kernel K on tree T t (o). Consider the case when noisy label information (with parameter δ) is known on the depth-t layer leaf nodes. Denote the following two measures π+ , π− as distributions on leaf labels ` ` T t (o) given `(o) = +, − respectively. Under the condition T t (o) br[T (o)]θ̄ 2 < 1, 2 4δ 2 if log(1 + 1−δ 2 ) ≤ 1 − br[T (o)]θ̄ , the following equality on total variation holds ³ 2 lim d TV π+ `T t →∞ t , π− `T (o) 11 ´ t (o) = 0. Furthermore, the above equation implies lim inf sup P (σt (o) 6= `(o)|`(o) = l ) = t →∞ σt l ∈{+,−} 1 2 where σt (o) : `˜prior (C t (o)) → {+, −} is any estimator mapping the prior labels in the local tree to a decision. The above theorem is stated under the case when the noisy label information is known and only known for all nodes in layer t . One can interpret the result as, below the threshold br[T (o)]θ̄ 2 < 1, one cannot do better than random guess for the root’s label based on noisy leaf labels at depth t as t → ∞. The proof relies on a technical lemma on branching number and cutset as in [37]. We would like to 4δ2 2 remark that the condition log(1 + 1−δ 2 ) ≤ 1 − br[T (o)]θ̄ can be satisfied when δ is small. 4 General Number of Communities In this section, we will extend the algorithmic and theoretical results to the general SBM for any fixed k or growing k with a slow rate (with respect to n). There are several differences between the general k case and the k = 2 case. First, algorithmically, the procedure for general k requires another layer of weighted aggregation besides the weights introduced by minimum energy flow (according to the detailed tree irregularity). The proposed procedure introduces the weights on the types of labels (k types) revealed, and then aggregates the information in the most “informative direction” to distinguish the root’s label. Second, the theoretical tools we employ enable us to formally describe the intuition that in some cases for general SBM, one can distinguish the communities i , j from k, but not being able to tell i and j apart. We will call this the set identification. 4.1 Summary of Results We summarize in this section the main results for general SBM with k unequal size communities, and introduce the corresponding weighted message passing algorithm (WMP). We need one additional notation before stating the main result. For a vector w ∈ Rk , assume there are m unique values for w l , l ∈ [k]. Denote by S i , 1 ≤ i ≤ m, the sets of equivalent values associated with w — for any l , l 0 ∈ [k], w l = w l 0 if and only if l , l 0 ∈ S i for some i ∈ [m]. Denote w S i to be the equivalent value w l , l ∈ S i . Theorem 4 (General SBM: k communities). Consider the general stochastic block model G(V, E ) with parameter bundle (n, k, N ,Q), with either partial or noisy label information `˜prior with parameter 0 < δ < 1. Assume that n maxi , j Q i j - n o(1) . For any node o ∈ V and its depth t leaf labels `˜prior (C t (o)), define the set misclassification error of a local estimator σt (o) : `˜prior (C t (o)) → [k] as, ErrS,T (σt ) := max {P (σt (o) ∈ S|`(o) ∈ T ) , P (σt (o) ∈ T |`(o) ∈ S)} , where S, T ⊂ [k] are two disjoint subsets. Define £ ¤−1 K := diag(QN ) Qdiag(N ), M = Qdiag(N ) θ := λ2 (K ), λ := λ1 (M ). (15) (16) (17) Let E∗ (1/θ 2 ) be the minimum energy on T t (o) with conductance level θ 2 as t → ∞. Assume that K is symmetric and denote V ∈ Rk to be the space spanned by the second eigenvectors of K . Choose any w ∈ V, w ⊥ 1 as the initialization vector in WMP Algorithm 2. 12 On the one hand, when λθ 2 > 1, the WMP Algorithm 2 initialized with w outputs `ˆwmp that can distinguish the indices set S i , 1 ≤ i ≤ m µ lim sup lim sup max ErrS i ,S j (`ˆwmp ) ≤ exp − t →∞ n→∞ i , j ∈[m] for any fixed δ > 0, where R 2 = maxi , j |w S i −w S j | . ¶ R2 , 2E∗ (1/θ 2 ) (18) mini , j |w S i −w S j | On the other hand, if λθ 2 < 1, for any t -local estimator σt that only based on layer t ’s noisy labels, the minimax misclassification error is lower bounded by lim inf lim inf inf t →∞ n→∞ sup σt i , j ∈[k],i 6= j Erri , j (σt ) ≥ 1 . 2k (19) The proof for general k case requires several new ideas compared to the k = 2 case. Let us first explain the intuition behind some quantities here. Again we focus on the case when the network is sparse, i.e. n maxi , j Q i j - n o(1) . According to the coupling Proposition 1, one can focus on the coupled multi-type Galton-Watson tree, for a shallow local neighborhood of a node o. K ∈ Rk×k then denotes the transition kernel for the label broadcasting process on the tree, and λ denotes the branching number of the multitype Galton-Watson tree. The transition threshold λθ 2 = 1, also called Kesten-Stigum bound, has been well-studied for reconstruction on trees [21, 22, 29, 18]. Our contribution lies in establishing the connection between the set misclassification error, minimum energy flow, as well as the second eigenvectors of K . This is done through analyzing Algorithm 2 (to be introduced next) with a novel initialization of the messages, using both minimum energy flow and the eigenvectors of K . Remark 4. One distinct difference between the general k case and the k = 2 case is the notion of set misclassification error, or set identification. This formalizes the intuition that for general SBM that is asymmetric and imbalanced, it may be possible to distinguish communities i , j from community l , yet not possible to tell i and j apart. The above Theorem provides a mathematical description of the phenomenon, for any initialization using vectors in the eigen-space corresponding to the second eigenvalue. The key new ingredient compared to the Algorithm 1 is the introduction of additional weights w ∈ Rk 13 on the labels. The choice of w will become clear in a moment. Algorithm 2: Weighted Message Passing for Multiple Communities Data: Same as in Algorithm 1 and an additional weight vector w ∈ Rk . Result: The labeling for each node o ∈ V . for each node o ∈ V , do Open the tree neighborhood T t̄ (o) ; Layer t̄ : for every node u ∈ C t̄ (o), initialize its message M (u, 0) = θ −2|u| · i∗ ( u) · w `˜prior (u) , where w `˜prior (u) denotes the `˜prior (u)-th coordinate of the weight vector w, i∗ ( u) is the minimum energy flow ; Initialize parameters µ0 (u) ∈ Rk , σ20 (u) ∈ R as µ0 (u, l ) = δ · θ −2|u| i∗ ( u) · w l , for l ∈ [k] ¢2 ¡ σ20 (u) = θ −2|u| i∗ ( u) · max |w i − w j |2 i , j ∈[k] for t = 1, . . . t̄ , do Layer t̄ − t : for every node u ∈ C t̄ −t (o), update message M (u, t ) through the linearized rule X M (u, t ) = θM (v, t − 1). v∈C (u) Update the parameters µt (u) ∈ Rk , σ2t (u) ∈ R µt (u) = X θK µt −1 (v) v∈C (u) σ2t (u) =     θ 2 σ2t −1 (v) +    v∈C (u) X max |µt −1 (v, i ) − µt −1 (v, j )| i , j ∈[k] 2 2     .   end Output `ˆwmp (o) = arg minl ∈[k] |M (o, t̄ ) − µt̄ (o, l )|. end 4.2 Vector Evolution & Concentration As in the k = 2 case, we establish the recursion formula for the parameter updates. However, unlike the k = 2 case, for a general initialization µ0 , it is much harder to characterize µt (u), σ2t (u) analytically, and thus relate the misclassification error to the minimum energy. We will show that this goal can be achieved by a judicious choice of µ0 . We will start with the following Lemma that describes the vector evolution and concentration-of-measure. Lemma 2 (Concentration, general k). Recall the label broadcasting process with Markov transition kernel 14 K ∈ Rk×k on tree T t̄ (o). Assume the MGF of messages on the leaves M (u, 0) satisfies, for any ` ∈ [k] h i λ2 σ2 (u) 0 E e λM (u,0) |`(u) = l ≤ e λµ0 (u,l ) e 2 for any λ, with parameter µ0 (u) = [µ0 (u, 1), . . . , µ0 (u, k)] ∈ Rk , σ20 (u) ∈ R. Define the following updating rules for a node v X µt (v) = θK µt −1 (u) u∈C (v)     max |µt −1 (u, i ) − µt −1 (u, j )| 2     X 2 i , j ∈[k]  . σ2t (v) = θ σ2t −1 (u) +    2   u∈C (v) The following concentration-of-measure holds for the root message M (o, t̄ ): M (o, t̄ )|`(o)=l ∈ µt̄ (o, l ) ± x · σt̄ (o) 2 with probability 1 − 2 exp(− x2 ). In addition, if we we classify the root’s label as `ˆwmp (o) = arg min |M (o, t̄ ) − µt̄ (o, l )|, l ∈[k] then the worst-case misclassification error is upper bounded by exp(− mini , j ∈[k] |µt̄ (o, i ) − µt̄ (o, j )|2 8σ2t̄ (o) ). (20) Remark 5. Unlike the k = 2 case, in general it is hard to quantitatively analyze this evolution system for µt (u), σ2t (u). The main difficulty stems from the fact that the coordinates that attain the maximum of maxi , j ∈[k] |µt −1 (u, i )−µt −1 (u, j )| vary with u, t . Hence, it is challenging to provide sharp bounds on σ2t (u). In some sense, the difficulty is introduced by the instability of the relative ordering of the coordinates of the vector µt (u) for an arbitrary initialization. As will be shown in the next section, one can resolve this problem by initializing µ0 (u, l ), l ∈ [k] in a “most informative” way. This initialization represents the additional weights on label’s types beyond the weights given by the minimum energy flow. 4.3 Additional Weighting via Eigenvectors We show in this section that the vector evolution system with noisy initialization is indeed tractable if we weigh the label’s type according to the second right eigenvector of K ∈ Rk×k . Theorem 5 (Weighting by Eigenvector). Assume that the second eigenvalue θ = λ2 (K ) of the Markov transition kernel K is a real, and denote the associated second right eigenvector by w ∈ Rk , kwk = 1, w T 1 = 0. Denote the minimum energy flow on tree T (o) with conductance level θ 2 by i∗ . In the case of noisy label information with parameter δ, if we initialize µ0 (u, l ) = δ · θ −2|u| i∗ ( 15 u) · w l , for l ∈ [k], ¡ and σ20 (u) = θ −2|u| i∗ ( bounded by u) ¢2 · maxi , j ∈[k] |w i − w j |2 , then the worst case misclassification error is upper lim sup t →∞ with R = max i , j ∈[k],i 6= j P(`ˆwmp (o) = i |`(o) = j ) ≤ exp(− R2 2E∗ (θ −2 ) ) mini , j |w i −w j | maxi , j |w i −w j | . Remark 6. Observe that the upper bound becomes trivial when mini , j |w i − w j | = 0. In this case, one can easily modify in the proof of Theorem 5 so that the following non-trivial guarantee for set misclassification error holds. Assume w has m distinct values, and denote the set S i , 1 ≤ i ≤ m to be the distinct value sets associated with w. Then one has the following upper bound on the set misclassification error lim sup t →∞ with R S = max i , j ∈[m],i 6= j P(`ˆwmp (o) ∈ S i |`(o) ∈ S j ) ≤ exp(− R S2 2E∗ (θ −2 ) ) (21) mini , j |w S i −w S j | maxi , j |w S i −w S j | . 4.4 Lower Bound: Sharp Threshold In this section we provide a new lower bound analysis through bounding the χ2 distance to the “average measure”. The lower bound shows that the transition boundary λθ 2 = 1 achieved by WMP is sharp for any k. To the best of our knowledge, the first lower bound for general k case is achieved in [18] using a notion of weighted χ2 distance. For completeness of the presentation, we provide here a different proof using the usual χ2 distance. In addition, our approach admits a clear connection to the upper bound analysis through matrix power iterations. Theorem 6 (Limitation for Local Algorithms, k-communities). Recall the label broadcasting process with Markov transition kernel K on tree T t (o). Assume K ∈ Rk×k is symmetric. Consider the case when noisy label information (with parameter δ) is known on the depth-t layer leaf nodes. Under the condition br[T (o)]θ 2 < 1 and kδ2 ( 1 δ+ 1−δ k + 1 1−δ k ) < 1 − br[T (o)]θ 2 , we have 1 1 lim inf inf max P(σt (o) 6= `(o)|`(o) = l ) ≥ (1 − ). t →∞ σt l ∈[k] 2 k where σt (o) : `˜prior (C t (o)) → [k] is any estimator mapping the prior labels on leaves in the local tree to a decision. The above inequality also implies lim inf inf t →∞ max σt i , j ∈[k],i 6= j P(σt (o) = i |`(o) = j ) ≥ 1 . 2k 1 The above result shows that even belief propagation suffers the error at least 2k in distinguishing i , j , which is within a factor of 2 from random guess. We remark in addition that the condition kδ2 ( 11−δ + δ+ 1 1−δ k 2 ) < 1 − br[T (o)]θ can be satisfied when δ is small. 16 k 4.5 Further Discussion Local versus Global Algorithms In the balanced case with k equal size communities, and p, q denoting the within- and between-community connection probabilities, the Kesten-Stigum threshold for local algorithm class takes the following expression SNR := n(p − q)2 k 2 (q + p−q k ) = 1. However, it is known that the limitation for global algorithm class for growing number of communities is log n log k SNR ³ O ( k ) ([3], weak consistency) and SNR ³ O ( k ) ([8], strong consistency). Therefore, as k grows, there is an interesting gap between local and global algorithms in terms of SNR. An interesting direction is to determine whether one can solve the problem down to the information-theoretic threshold O ∗ ( k1 ) with computationally efficient algorithms. 5 Numerical Studies We apply the message passing Algorithm 1 to the political blog dataset [4] (with a total of 1222 nodes) in the partial label information setting with δ portion randomly revealed labels. In the literature, the state-of-the-art result for a global algorithm appears in [19], where the misclassification rate is 58/1222 = 4.75%. Here we run a weaker version of our WMP algorithm as it is much easier to implement and does not require parameter tuning. Specifically, we initialize the message with a uniform flow on leaves (minimum energy flow that corresponds to a regular tree). We will call this algorithm approximate message passing (AMP) within this section. We run AMP with three different settings δ = 0.1, 0.05, 0.025, repeating each experiment 50 times. As a benchmark, we compare the results to the spectral algorithm on the (1−δ)n sub-network. We focus on the local tree with depth 1 to 5, and output the error for message passing with each depth. The results are summarized as box-plots in Figure 1. The left figure illustrates the comparison of AMP with depth 1 to 5 and the spectral algorithm, with red, green, blue boxes corresponding to δ = 0.025, 0.05, 0.1, respectively. The right figure zooms in on the left plot with only AMP depth 2 to 4 and spectral, to better emphasize the difference. Remark that if we only look at depth 1, some of the nodes may have no revealed neighbors. In this setting, we classify this node as wrong (this explains why depth-1 error can be larger than 1/2). We present in this paragraph some of the statistics of the experiments, extracted from the above Figure 1. In the case δ = 0.1, from depth 2-4, the AMP algorithm produces the mis-classification error rate (we took the median over the experiments for robustness) of 6.31%, 5.22%, 5.01%, while the spectral algorithm produces the error rate 6.68%. When δ = 0.05, i.e. about 60 node labels revealed, the error rates are 7.71%, 5.44%, 5.08% with depth 2 to 4, contrasted to the spectral algorithm error 6.66%. In a more extreme case δ = 0.025 when there are only ∼ 30 node labels revealed, AMP depth 2-4 has error 10.20%, 5.71%, 5.66%, while spectral is 6.63%. In general, the AMP algorithm with depth 3-4 uniformly beats the vanilla spectral algorithm. Note that our AMP algorithm is a distributed decentralized algorithm that can be run in parallel. We acknowledge that the error ∼ 5% (when δ is very small) is still slightly worse than the state-of-the-art degree-corrected SCORE algorithm in [19], which is 4.75%. 17 0.16 0.75 0.12 delta 0.025 0.50 0.05 0.1 error_rate error_rate delta 0.025 0.05 0.1 0.08 0.25 0.04 0.00 depth1 depth2 depth3 depth4 depth5 spectral depth2 depth_AMP depth3 depth4 spectral depth_AMP Figure 1: AMP algorithm on Political Blog Dataset. 6 Technical Proofs We will start with two useful results. The first one is a coupling proposition. The proof follows exactly the same idea as in Proposition 4.2 in [30]. The intuition is that when the depth of the tree is shallow, the SBM in the sparse regime can be coupled to a Galton-Watson tree with Poisson branching (as there are many nodes outside the radius R for the Poisson-Multinomial coupling, when R small). We want to prove a more general version for SBM with unequal size communities. The proof is delayed to Appendix 7. Proposition 1. Let R = R(n) = b 4 log[2np10 +2 log n] log nc, where p 0 = maxi , j Q i j . Denote (T, σT ) to be the multi-type Galton-Watson tree (with Poisson branching) with mean matrix Qdiag(N ) and label tran£ ¤−1 sition kernel K = diag(QN ) Qdiag(N ). Denote G R as the neighborhood of depth up to R induced by the graph G, for a particular node. There exists a coupling between (G R , `G R ) and (T, σT ) such that (G R , `G R ) = (TR , σTR ) with high probability as n → ∞. Here the tree equivalence is up to a label preserving homomorphism. Lemma 3 (Hoeffding’s Inequality). Let X be any real-valued random variable with expected value E X = 0 and such that a ≤ X ≤ b almost surely. Then, for all λ > 0, µ 2 ¶ h i λ (b − a)2 E e λX ≤ exp . 8 Proof of Lemma 1. Recall the linearized message passing rule that “approximates” the Bayes optimal algorithm: X θ1 + θ2 M (u, t ) = θ̄ · M (v, t − 1), where θ̄ = . 2 v∈C (u) Let us analyze the behavior of the linearized messages M (u, t ) for a particular node u. The proof follows by induction on t . The case t = 0 follows from the assumption about µ0 (u), σ20 (u) and Chernoff 18 bound. Now, assume that the induction premise is true for t − 1. Note that h i E e λM (u,t ) |`(u) = + h i Y = E e λθ̄M (v,t −1) |`(u) = + v∈C (u) ½ h h i 1−θ ¾ i 1+θ 1 1 + E e λθ̄M (v,t −1) |`(v) = − E e λθ̄M (v,t −1) |`(v) = + 2 2 v∈C (u) ½ ¾ Y (λθ̄)2 σ2t −1 (v) λθ̄µ (v,+) 1 + θ1 1 − θ1 t −1 2 ≤ e e + e λθ̄µt −1 (v,−) 2 2 v∈C (u) = Y ≤ Y e (λθ̄) 2 2 σt −1 (v) 2 e λθ̄[µt −1 (v,+) 1+θ1 2 +µt −1 (v,−) 1−θ1 2 ] (λθ̄)2 e [µt −1 (v,+)−µt −1 (v,−)]2 8 , v∈C (u) where the last step uses the Hoeffding’s Lemma. Rearranging the terms, λ2 θ̄ 2 i P λM (u,t ) λ v∈C (u) θ̄〈K 1· ,µt −1 (v)〉 |`(u) = + ≤ e e E e h = e λµt (u,+) e λ2 σ2 t (u) 2 P ( · ¸ ) µt −1 (v,+)−µt −1 (v,−) 2 2 v∈C (u) σt −1 (v)+ 2 2 , where K 1· denotes the first row of transition matrix K . Clearly, same derivation holds with `(u) = −. Applying the Chernoff bound and optimizing over λ, one arrives at the exponential concentration bound. Induction completes. To upper bound the error, simply plug in the standardized absolute values of the ¯ misclassification ¯ ¯ µt̄ (o,+)−µt̄ (o,−) ¯ difference, namely x = ¯ ¯. 2σ (o) t̄ Remark 7. Now let us propose the choice of µ0 (u) and σ20 (u) for the case of noisy label information with parameter δ. In WMP algorithm, choose M (u, 0) = c(u) sign(`˜prior ) with factor c(u) that depends on the node u. Using simple Hoeffding’s concentration for Bernoulli r.v., one has µ0 (u, +) = c(u)δ, µ0 (u, −) = −c(u)δ, and σ20 (u) = c(u)2 . Proof of Theorem 2. Using the result of Lemma 1, the proof analyzes evolution of σ2t (o) h i [µt (o,+)−µt (o,−)] 2 2 . First, let us derive the expression for µt (o, +) − µt (o, −). Denoting w = [1, −1]T , it is easy to verify that w T K = θ̄w T . We have, µt (o, +) − µt (o, −) = X θ̄w T K µt −1 (v) = v∈C (o) X 2 = θ̄ X θ̄ 2 w T µt −1 (v) v∈C (o) [µt −1 (v, +) − µt −1 (v, −)]. v∈C (o) 19 Using the above equation recursively, one can easily see that for any d , 1 ≤ d ≤ t , X µt (o, +) − µt (o, −) = θ̄ 2d [µt −d (v, +) − µt −d (v, −)]. (22) v∈C d (o) Now for σ2t (o) for σ2t (ρ), one has σ2t (o) = θ̄ 2 ¸ ¾ ½ · µt −1 (v, +) − µt −1 (v, −) 2 2 σt −1 (v) + 2 v∈C (o) X which can be written, in turn, as ¸ ¾ ½ · µt −2 (u, +) − µt −2 (u, −) 2 2 θ̄ θ̄ σt −2 (u) + 2 v∈C (o) u∈C (v) · ¸2 X µt −1 (v, +) − µt −1 (v, −) + θ̄ 2 2 v∈C (ρ) · ¸ · ¸ X X X µt −2 (u, +) − µt −2 (u, −) 2 µt −1 (v, +) − µt −1 (v, −) 2 4 2 = . . . . . . + θ̄ + θ̄ 2 2 v∈C (ρ) u∈C (v) v∈C (o) ¸2 · X X 2|v| µt −|v| (v, +) − µt −|v| (v, −) + θ̄ 2t σ20 (u). = θ̄ 2 t v∈T t (o) u∈C (o) 2 X 2 X Using the above equation one can bound P σ2t (o) h [µt (o,+)−µt (o,−)] 2 i2 = 2|v| v∈T t (o) θ̄ h h i µt −|v| (v,+)−µt −|v| (v,−) 2 2 [µt (o,+)−µt (o,−)] 2 i2 u∈C t (o) θ̄ P +h 2t σ20 (u) i2 [µt (o,+)−µt (o,−)] 2 £ ¤2 θ̄ 2|v| µt −|v| (v, +) − µt −|v| (v, −) +R = £ ¤2 [µt (o, +) − µt (o, −)] v∈T t (o) ¢2 ¡ X θ̄ 2|v| [µt −|v| (v, +) − µt −|v| (v, −)] θ̄ −2|v| + R = ¡ ¢2 [µt (o, +) − µt (o, −)] v∈T t (o) X where the remainder u∈C t (o) θ̄ P R= h Recall the definition of i( v) = 2t (23) σ20 (u) i2 . [µt (o,+)−µt (o,−)] 2 θ̄ 2|v| [µt −|v| (v, +) − µt −|v| (v, −)] [µt (o, +) − µt (o, −)] . It is clear from Eq.(22) that i is a valid unit flow, in the sense of Definition 1. Continuing with Eq. (23), one has inf h i σ2t (o) [µt (o,+)−µt (o,−)] 2 i2 ≤ X i∗ ( v)2 θ̄ −2|v| + R v∈T t (o) = Et (i∗ , θ̄ −2 ) + R. 20 (24) Let us now estimate R: u∈C t (o) θ̄ P R= h i∗ ( u)2 θ̄ −2t · max h t i∗ ( u)2 θ̄ −2t u∈C (o) u∈C t (o) X = σ20 (u) i2 [µt (o,+)−µt (o,−)] 2 X ≤ 2t u∈C t (o) σ20 (u) i [µ0 (u,+)−µ0 (u,−)] 2 2 1 . δ2 The last step is because for noisy label information with parameter δ, σ20 (u) h [µ0 (u,+)−µ0 (u,−)] 2 i2 = 1 . δ2 P In the case when limt →∞ Et (i∗ , θ̄ −2 ) < ∞, we know u∈C t (o) i∗ ( u)2 θ̄ −2t = Et (i∗ , θ̄ −2 ) − Et −1 (i∗ , θ̄ −2 ) → 0. Therefore, R = δ12 o t (1). Going back to Eq. (24), to minimize the LHS (ratio between noise and signal), one needs to make sure that i = i∗ , the minimum energy flow. Therefore, the optimal strategy is to initialize µ0 (u) according to i∗ ( u). Thus, if we choose µ0 (u, +) = δθ̄ −2|u| i∗ ( u), µ0 (u, −) = δθ̄ −2|u| i∗ ( u), we obtain lim inf h t →∞ i σ2t (o) i [µt (o,+)−µt (o,−)] 2 2 = E∗ (θ̄ −2 ). From Definition 3, E∗ (θ̄ −2 ) < ∞ iff θ̄ −2 < br[T (o)]. Proof of Theorem 5. Note that by Perron-Frobenius Theorem, we have |θ| = |λ2 (K )| < 1. Thanks to the choice of w, E[M 0 (u)|`(u) = l ] = δθ −2|u| i∗ ( u)w l + 1 − δ −2|u| ∗ θ i ( k u)w T 1 = δθ −2|u| i∗ ( u)w l . Let us first derive the formula for µt (o) ∈ Rk under the chosen initialization µ0 (u). We claim that µt −|v| (v) = δ · θ −2|v| i∗ ( v) · w. Proof is via induction. The base case |u| = t is exactly the choice of the initialization. Let us assume for |u| > |v| the claim is true, and prove for v: X µt −|v| (v) = θK µt −1 (u) u∈C (v) = X θK w · δθ −2|v|−2 i∗ ( u) u∈C (v) = X θ 2 w · δθ −2|v|−2 i∗ ( u∈C (v) 21 v) = δ · θ −2|v| i∗ ( v) · w, completing the induction. Now let us bound σ2t (o). Observe that in our derived formula for µt −|v| (v), all the coordinates are proportional to w. In other words, µt −|v| (v) stays in the direction of w for all v. This greatly simplifies the expression for σ2t (o). We have σ2t (o) = θ 2|v| X · maxi , j ∈[k] |µt −|v| (v, i ) − µt −|v| (v, j )| =δ · maxi , j ∈[k] |w(i ) − w( j )| · + u∈C t (o) ¸2 2 maxi , j ∈[k] |w(i ) − w( j )| i∗ ( X v∈T t (o) ¸2 X 2 Plugging in the definition R = X + 2 v∈T t (o) 2 ¸2 i∗ ( θ 2t σ20 (u) v)2 θ −2|v| v)2 θ −2|v| . v∈C t (o) mini , j |w i −w j | maxi , j |w i −w j | , under the condition br[T (o)]θ 2 > 1, we have E(i∗ , θ −2 ) < ∞, and σ2t̄ (o) h mini , j ∈[k] |µt̄ (o,i )−µt̄ (o, j )| 2 i2 = 1 1 E(i∗ , θ −2 ) + 2 2 o t (1). 2 R δ R Proof of Theorem 6. Recall that π(`∂Tt (o)∩Tt −|u| (u) |`(u) = i ) denotes the probability measure on the leaf labels on depth t , given `(u) = i . For a node u, when there is no confusion, we abbreviate the measure π(`∂Tt (o)∩Tt −|u| (u) |`(u) = i ) as πu (i ). According to Perron-Frobenius Theorem, there is a unique left eigenvector for K with eigenvalue 1, denote this by w ∈ Rk . Under the assumption K being symmetric, we P know that w = k1 1. Denote π̄u = kj=1 w( j )πu ( j ). Let us bound the d χ2 (πu (i )||π̄u ) by deriving a recursive bound: " à !# k k X k X X X £ ¤ log 1 + d χ2 (πu (i )||π̄u ) = log 1 + d χ2 K i l πv (l )|| w( j )K j l πv (l ) v∈C (u) " = X à log 1 + d χ2 v∈C (u) l =1 j =1 l =1 k X !# K i l πv (l )||π̄v l =1 since w T K = w T . By definition, the above expression is  ¤2  Z £Pk X X K π (l ) − π̄ v v i l l =1  log 1 + π̄ v v∈C (u) v∈C (u)  ¤2  Z £Pk X X K (π (l ) − π̄ ) v v i l l =1  = log 1 + π̄ v v∈C (u) v∈C (u) £Pk ¤2 X Z K (πv (l ) − π̄v ) l =1 i l ≤ . π̄v v∈C (u) 22 Now we know that £Pk ¤2 k X Z X K (πv (l ) − π̄v ) £ ¤ l =1 i l . log 1 + d χ2 (πu (i )||π̄u ) ≤ π̄v i =1 v∈C (u) i =1 k X Recall the following fact that for any z 1 , z 2 , . . . z k ≥ 0, log(1 + k X zi ) ≤ k X log(1 + z i ). i =1 i =1 Using this fact the lower bound the LHS, we reach " log 1 + k X i =1 # d χ2 (πu (i )||π̄u ) ≤ ¤2 £Pk k X Z X K (πv (l ) − π̄v ) l =1 i l π̄v i =1 Z X kK (πv (·) − π̄v 1)k2 ≤ π̄v v∈C (u) Z X k(πv (·) − π̄v 1)k2 ≤ θ2 π̄v v∈C (u) v∈C (u) k X X = θ2 v∈C (u) i =1 d χ2 (πv (i )||π̄v ) where the last two lines use the fact that πv (·) − π̄v 1 ⊥ 1, therefore kK (πv (·) − π̄v 1)k2 ≤ θ 2 kπv (·) − π̄v 1k2 . We will need the the following Lemma that describes the branching number through the cutset. Lemma 4 ([37], Lemma 3.3). Assume br[T ] < λ. Then for all ² > 0, there exists a cutset C such that µ ¶ X 1 |x| ≤² x∈C λ (25) µ ¶|x|−|v| 1 ≤ 1. x∈C ∩T (v) λ (26) and for all v such that |v| ≤ maxx∈C |x|, X Here the notation |v| denotes the depth of v. P Let us use the cutset argument to prove ki=1 d χ2 (πu (i )||π̄u ) → 0 when |u| → ∞. Fix any λ such that θ −2 > λ > br[T (o)]. For any ² small, the above Lemma claims the existence of cutset C ² such that Eq. (25) and (26) hold. Let us prove through induction on maxx∈C ² |x| − |v| that for any v such that |v| ≤ maxx∈C ² |x|, we have k X i =1 with the choice η = kδ2 ( 1 δ+ 1−δ k + d χ2 (πv (i )||π̄v ) ≤ η 1 1−δ k µ ¶|x|−|v| 1 ≤ η. x∈C ² ∩T (v) λ X (27) ). First for the base case, the claim is true because of the choice of η. 23 Preceding with the induction, assume for v such that maxx∈C ² |x|−|v| = t −1 equation (29) is satisfied, and let us prove for v : maxx∈C ² |x| − |u| = t . We recall the linearized recursion " # k k X X X log 1 + d χ2 (πu (i )||π̄u ) ≤ θ 2 d χ2 (πv (i )||π̄v ) i =1 v∈C (u) i =1 µ ¶|x|−|v| 1 v∈C (u) x∈C ² ∩T (v) λ µ ¶|x|−|u| X 1 2 = θ λ·η λ x∈C ² ∩T (u) ≤ θ2 Using the assumption θ 2 λ < η X η X 1 1+η , the above can be upper bounded by P ¡ 1 ¢|x|−|u| x∈C ² ∩T (u) λ 1+η ≤ ¡ 1 ¢|x|−|u| x∈C ² ∩T (u) λ ¡ ¢|x|−|u| P 1 + η x∈C ² ∩T (u) λ1 η P ¡ ¢|x|−|u| P where the last inequality uses the fact that x∈C ² ∩T (u) λ1 < 1. Now we know that " # Pk k 2 X i =1 d χ (πu (i )||π̄u ) ≤ log 1 + d χ2 (πu (i )||π̄u ) P 1 + ki=1 d χ2 (πu (i )||π̄u ) i =1 ¡ ¢|x|−|u| P η x∈C ² ∩T (u) λ1 ≤ ¡ ¢|x|−|u| . P 1 + η x∈C ² ∩T (u) λ1 By monotonicity of x/(1 + x) we have proved the induction claim holds as µ ¶|x|−|u| k X X 1 d χ2 (πu (i )||π̄u ) ≤ η . x∈C ² ∩T (u) λ i =1 Take ² → 0, λ → br[T (o)]. Define t ² := min{|x|, x ∈ C ² }, it is also easy to see from equation (25) that µ ¶t ² µ ¶ X 1 |x| 1 log(1/²) ≤ ≤ ² ⇒ t² > → ∞. λ log λ x∈C ² λ Putting things together, under the condition η ≤ 1 − br[T (o)]θ 2 , we have µ ¶|x| k X 1 1X η lim d χ2 (πu (i )||π̄u ) ≤ · lim = 0. t →∞ k k ²→0 x∈C ² ∩T (o) λ i =1 Finally, we invoke the multiple testing argument Theorem 2.6 in [39]). Lemma 5 ([39], Proposition 2.4, Theorem 2.6). Let P 0 , P 1 , . . . , P k be probability measures on (X , A ) satisfying k 1X d χ2 (P j , P 0 ) ≤ kα∗ k i =1 then we have for any selector ψ : X → [k] 1 1 max P i (ψ 6= i ) ≥ (1 − α∗ − ). i ∈[k] 2 k 24 Plugging in the result with P 0 = π̄o and P i = πo (i ), we conclude that 1 1 lim inf inf max P(σ(o) 6= `(o)|`(o) = l ) ≥ (1 − ). σ l ∈[k] t →∞ 2 k Proof of Theorem 1. Given Proposition 1, Theorem 2 and Theorem 3, the proof of Theorem 1 is simple. By Proposition 1, one can couple the local neighborhood of SBM with multi-type Galton Watson process asymptotically almost surely as n → ∞, where the label transition matrix is " K := n 1 Q 11 n 1 Q 11 +n 2 Q 12 n 1 Q 21 n 1 Q 21 +n 2 Q 22 n 2 Q 12 n 1 Q 11 +n 2 Q 12 n 2 Q 22 n 1 Q 21 +n 2 Q 22 # . ³ ´ For the upper bound, Theorem 2 shows that the misclassification error is upper bounded by exp − ∗ 1 −2 E (θ̄ ) as the depth of the tree goes to infinity. Note if we first send n → ∞, due to Proposition 1, the coupling is valid even when R → ∞ with a slow rate log n/ log log n. Therefore, the upper bound on misclassification error holds. One can establish the lower bound using the same argument together with Theorem 3. Finally, for the expression on transition boundary, we know that condition on non-extinction, the branching number for this coupled multi-type Galton Watson tree is λ1 (Qdiag(N )) almost surely. Proof is completed. 7 Additional Proofs Proof of Lemma 2. The proof logic here is similar to the k = 2 case. Again, we analyze the message M (u, t ) for a particular node u. Use induction on t for the claim h i λ2 σ2 t (u) E e λM (u,t ) |`(u) = l ≤ e λµt (u,l ) e 2 . The case for t = 0 follows from the assumption about µ0 (u), σ20 (u) and Chernoff bound. Assume that the induction is true for t − 1, and prove the case for t . Note that i h E e λM (u,t ) |`(u) = l h i Y = E e λθM (v,t −1) |`(u) = l v∈C (u) ( = ≤ Y h i k X E e λθM (v,t −1) |`(v) = i K l i v∈C (u) i =1 Y (λθ)2 e σ2 (v) t −1 2 Y k X e λθµt −1 (v,i ) ) Kl i i =1 v∈C (u) ≤ ( ) e (λθ̄) 2 2 σt −1 (v) 2 e λθ[ Pk i =1 µt −1 (v,i )K l i ] v∈C (u) 25 2 e (λθ) maxi , j ∈[k] |µt −1 (v,i )−µt −1 (v, j )|2 8 , where the last step uses the Hoeffding’s Lemma. Rearrange the terms, one can see that the above equation implies λ2 θ 2 h i P λM (u,t ) λ v∈C (u) θ〈K l · ,µt −1 (u)〉 e E e |`(u) = l ≤ e = e λµt (u,l ) e λ2 σ2 t (u) 2 P ( ¯ ¯2 ) ¯µ ¯ 2 ¯ t −1 (v,+)−µt −1 (v,−) ¯ ¯ v∈C (u) σt −1 (v)+maxi , j ∈[k] ¯ 2 2 , where K l · denotes the l −row of transition matrix K . Apply the Chernoff bound to optimize over λ, one can arrive the exponential concentration bound. Induction completes. To upper bound the misclassification error, simply plug in |x| = mini , j ∈[k] |µt̄ (o, i ) − µt̄ (o, j )| 2σt̄ (o) . Proof of Theorem 3. We will gave the proof of Theorem 3 (for the δ noisy label information case) here. Define the measure π+ on the revealed labels, for a depth t tree rooted from o with label `(o) = + ` T t (o) (and similarly define π− ` T t (o) ). We have the following recursion formula π+ `T t (o) = Y v∈C (o) · ¸ 1 − θ1 − 1 + θ1 + π`T (v) + π`T (v) . t −1 t −1 2 2 R µ2 Recall that the χ2 distance between two absolute continuous measures µ(x), ν(x) is d χ2 (µ, ν) = ν d x − 1, and we have the total variation distance between these two measures is upper bounded by the χ2 ¡ ¢ q ¡ ¢ distance d TV µ, ν ≤ d χ2 µ, ν . Let us upper bound the symmetric version of χ2 distance defined as n ³ ´ ³ − − + 2 π D Tt (o) := max d χ2 π+ , π , d χ `T (o) , π`T `T (o) `T (o) t t t ´o t (o) (abbreviate as D t (o) when there is no confusion), we have the following recursion ´i h ³ − log 1 + d χ2 π+ , π `T t (o) `T t (o) ¶¸ · µ X 1 − θ2 + 1 − θ1 − 1 + θ2 − 1 + θ1 + 2 π`T (v) + π`T (v) , π`T (v) + π`T (v) = log 1 + d χ t −1 t −1 t −1 t −1 2 2 2 2 v∈C (o) 1 + θ1 + 1 − θ1 − 1 − θ2 + 1 + θ2 − d χ2 π`T (v) + π`T (v) , π`T (v) + π`T (v) t −1 t −1 t −1 t −1 2 2 2 2 ³ ´2 Z π+ − π− `T t −1 (v) `T t −1 (v) 2 = θ̄ dx 1−θ2 + 1+θ2 − π π + 2 2 `T (v) `T t −1 (v) " t −1 # Z ³ ´2 1 − θ 1 1 1 + θ2 2 2 + − ≤ θ̄ π`T (v) − π`T (v) + dx t −1 t −1 2 π+ 2 π− ` ` µ T t −1 (v) 2 ≤ θ̄ D Tt −1 (v) , 26 T t −1 (v) ¶ where the second to last step follows from Jensen’s inequality for function 1/x. Now we have the following recursion relationship X log(1 + D Tt (o) ) ≤ log(1 + θ̄ 2 · D Tt −1 (v) ). v∈C (o) Invoke the following fact, log(1 + θ 2 x) ≤ (1 + η) log(1 + x) for all 0 ≤ x ≤ η, ∀θ, θ2 whose proof is in one line x log(1 + θ 2 x) ≤ x ≤ (1 + η) ≤ (1 + η) log(1 + x). θ2 1+x Thus if D Tt −1 (v) ≤ η, ∀v ∈ C (o), then the following holds X log(1 + D Tt (o) ) ≤ (1 + η)θ̄ 2 log(1 + D Tt −1 (v) ). (28) v∈C u (ρ) Denoting d Tt (o) := log(1 + D Tt (o) ), Equation (28) becomes d Tt (o) ≤ (1 + η)θ̄ 2 X v∈C u (ρ) d Tt −1 (v) . We will again need the Lemma 4 that describes the branching number through the cutset. Fix any λ such that θ̄ −2 > λ > br[T (o)]. For any ² small, Lemma 4 claims the existence of cutset C ² such that Eq. (25) and (26) holds. Let’s prove through induction on maxx∈C ² |x|−|v| that for any v such that |v| ≤ maxx∈C ² |x|, we have µ ¶|x|−|v| X η 1 η d TC² (v) ≤ ≤ . (29) 1 + η x∈C ² ∩T (v) λ 1+η Note for the start of induction v ∈ C ² , d TC² (v) = log(1 + 4δ2 η )< . 2 1−δ 1+η Now precede with the induction, assume for u such that maxx∈C ² |x|−|u| = t −1 equation (29) is satisfied, η let’s prove for v : maxx∈C ² |x| − |v| = t . Due to the fact for all u ∈ C (v), d TC² (u) ≤ 1+η ⇒ D TC² (u) ≤ η, we can recall the linearized recursion X d TC² (v) ≤ (1 + η)θ̄ 2 d T≤C² (u) u∈C (v) " µ ¶|x|−|u| # X η 1 ≤ (1 + η)θ̄ 1 + η λ x∈C ² ∩T (u) u∈C (v) µ ¶|x|−|u|+1 X X η 1 2 · (1 + η)θ̄ λ ≤ 1+η u∈C (v) x∈C ² ∩T (u) λ µ ¶|x|−|v| X X 1 ≤ ηθ̄ 2 λ λ u∈C (v) x∈C ² ∩T (u) µ ¶|x|−|v| µ ¶|x|−|v| X X 1 η 1 2 ≤ ηθ̄ λ ≤ , 1 + η x∈C ² ∩T (v) λ x∈C ² ∩T (v) λ 2 X 27 if θ̄ 2 λ ≤ 1 1+η . So far we have proved for any v, such that |v| ≤ maxx∈C ² |x| µ ¶|x|−|v| X 1 η η d T≤C² (v) ≤ ≤ 1 + η x∈C ² ∩T (v) λ 1+η which implies D T≤C² (v) ≤ η so that the linearized recursion (28) always holds. Take ² → 0, λ → br[T (o)]. Define t ² := min{|x|, x ∈ C ² }, it is also easy to see from equation (25) that µ ¶t ² µ ¶ X 1 |x| 1 log(1/²) ≤ ≤ ² ⇒ t² > → ∞. λ log λ x∈C ² λ Putting things together, under the condition ¶ µ 4δ2 ≤ 1 − br[T (o)]θ̄ 2 , log 1 + 1 − δ2 we have lim D Tt (o) = lim D TC² (o) ≤ ²→0 t →∞ µ ¶|x| X 1 η · lim = 0. 1 + η ²→0 x∈C ² ∩T (o) λ Proof of Proposition 1. The proof is a standard exercise following the idea from Proposition 4.2 in [30]. First, let’s recall Bernstein inequality. Consider X ∼ Binom(n, p 0 ), then the following concentration inequality holds t2 P(X ≥ np 0 + t ) ≤ exp(− ). 2(np 0 + t /3) p Hence if we plug in t = 32 log n + 2np 0 log n, we know st o. |∂G 1 | ≤ X ≤ np 0 + q 2 log n + 2np 0 log n ≤ 2np 0 + 2 log n 3 with probability at least 1 − n −1 . Now, through union bound, we can prove that ¡ ¢ P ∀r ≤ R, |∂G r | ≤ (2np 0 + 2 log n)r ≥ 1 −C · (2np 0 + 2 log n)R n −1 ≥ 1 − O(n −3/4 ). And we know that on the same event, |∂G r | ≤ n 1/4 , ∀r ≤ R. It is clear that bad events that G R is not a tree (with cycles) for each layer is bounded above by p 02 |∂G r | + p 0 |∂G r |2 . Take a further union bound over all layers, we know this probability is bounded by O(n −1/8 ) provided p 0 = o(n −5/8 ). Now we need to recursively use the Poisson-Binomial coupling (to achieve Poisson-Multinomial coupling). The following Lemma is taken from [30] (Lemma 4.6). Lemma 6. If m, n are positive integers then kBinom(m, c 2m m c ) − Poisson(c)kT V ≤ O( 2 + c| − 1|) n n n 28 Now we condition on all the good events up to layer G r −1 , which happens with probability at least 1− n −n −3/4 . We can couple the next layer for nodes in ∂G r . Take a node v ∈ ∂G r as an example. Assume i it is of color i , then the number of color j nodes in his children follows Binom(|V>r |, p i j ). Comparing to the Poisson version Poisson(n i p i j ), we know with probability at least −1/8 i 1 − O(n i p i2j + p i j |V>r − n i |), i − n i | ≤ |∂G r |. one can couple the Poisson and Binomial in the same probability space. Note that |V>r Repeat this recursively, and use the union bound, we can couple (G R , `G R ) = (TR , `TR ) with probability at least 1 − O(k maxi (n i )p 02 + kp 0 n 1/4 )n 1/4 log n = 1 − o(1). Therefore if np 0 = n o(1) and k - log n, we have the bad event (when we cannot couple) happens with probability going to 0 as n → ∞. And if p 0 = n o(1) , we can allow R to grow to infinity at a slow rate as log n R - log[n o(1) +log n] . Acknowledgements The authors want to thank Elchanan Mossel for many valuable discussions. References [1] E. Abbe, A. S. Bandeira, and G. Hall. Exact recovery in the stochastic block model. arXiv preprint arXiv:1405.3267, 2014. [2] E. Abbe and C. Sandon. Community detection in general stochastic block models: fundamental limits and efficient recovery algorithms. arXiv preprint arXiv:1503.00609, 2015. [3] E. Abbe and C. Sandon. Detection in the stochastic block model with multiple clusters: proof of the achievability conjectures, acyclic bp, and the information-computation gap. arXiv preprint arXiv:1512.09080, 2015. [4] L. A. Adamic and N. Glance. The political blogosphere and the 2004 us election: divided they blog. In Proceedings of the 3rd international workshop on Link discovery, pages 36–43. ACM, 2005. [5] T. T. Cai and X. Li. Robust and computationally feasible community detection in the presence of arbitrary outlier nodes. The Annals of Statistics, 43(3):1027–1059, 2015. [6] T. T. Cai, T. Liang, and A. Rakhlin. Inference via message passing on partially labeled stochastic block models. arXiv preprint arXiv:1603.06923, 2016. [7] Y. Chen, X. Li, and J. Xu. Convexified modularity maximization for degree-corrected stochastic block models. arXiv preprint arXiv:1512.08425, 2015. [8] Y. Chen and J. Xu. Statistical-computational tradeoffs in planted problems and submatrix localization with a growing number of clusters and submatrices. arXiv preprint arXiv:1402.1267, 2014. [9] A. Coja-Oghlan. Graph partitioning via adaptive spectral techniques. Combinatorics, Probability and Computing, 19(02):227–284, 2010. 29 [10] A. Decelle, F. Krzakala, C. Moore, and L. Zdeborová. Asymptotic analysis of the stochastic block model for modular networks and its algorithmic applications. Physical Review E, 84(6):066106, 2011. [11] Y. Deshpande, E. Abbe, and A. Montanari. Asymptotic mutual information for the two-groups stochastic block model. arXiv preprint arXiv:1507.08685, 2015. [12] W. Evans, C. Kenyon, Y. Peres, and L. J. Schulman. Broadcasting on trees and the ising model. Annals of Applied Probability, pages 410–433, 2000. [13] D. Gamarnik and M. Sudan. Limits of local algorithms over sparse random graphs. In Proceedings of the 5th conference on Innovations in theoretical computer science, pages 369–376. ACM, 2014. [14] C. Gao, Z. Ma, A. Y. Zhang, and H. H. Zhou. Achieving optimal misclassification proportion in stochastic block model. arXiv preprint arXiv:1505.03772, 2015. [15] O. Guédon and R. Vershynin. Community detection in sparse networks via grothendieck’s inequality. Probability Theory and Related Fields, 165(3-4):1025–1049, 2016. [16] B. Hajek, Y. Wu, and J. Xu. Achieving exact cluster recovery threshold via semidefinite programming. arXiv preprint arXiv:1412.6156, 2014. [17] B. Hajek, Y. Wu, and J. Xu. Achieving exact cluster recovery threshold via semidefinite programming: Extensions. arXiv preprint arXiv:1502.07738, 2015. [18] S. Janson and E. Mossel. Robust reconstruction on trees is determined by the second eigenvalue. Annals of probability, pages 2630–2649, 2004. [19] J. Jin. Fast community detection by score. The Annals of Statistics, 43(1):57–89, 2015. [20] V. Kanade, E. Mossel, and T. Schramm. Global and local information in clustering labeled block models. arXiv preprint arXiv:1404.6325, 2014. [21] H. Kesten and B. P. Stigum. Additional limit theorems for indecomposable multidimensional galtonwatson processes. The Annals of Mathematical Statistics, pages 1463–1481, 1966. [22] H. Kesten and B. P. Stigum. A limit theorem for multidimensional galton-watson processes. The Annals of Mathematical Statistics, 37(5):1211–1223, 1966. [23] J. Kleinberg. The small-world phenomenon: An algorithmic perspective. In Proceedings of the thirty-second annual ACM symposium on Theory of computing, pages 163–170. ACM, 2000. [24] F. Krzakala, C. Moore, E. Mossel, J. Neeman, A. Sly, L. Zdeborová, and P. Zhang. Spectral redemption in clustering sparse networks. Proceedings of the National Academy of Sciences, 110(52):20935– 20940, 2013. [25] N. Linial. Locality in distributed graph algorithms. SIAM Journal on Computing, 21(1):193–201, 1992. [26] R. Lyons and Y. Peres. Probability on trees and networks, 2005. [27] L. Massoulié. Community detection thresholds and the weak ramanujan property. In Proceedings of the 46th Annual ACM Symposium on Theory of Computing, pages 694–703. ACM, 2014. 30 [28] A. Montanari. Finding one community in a sparse graph. Journal of Statistical Physics, 161(2):273– 299, 2015. [29] E. Mossel. Reconstruction on trees: beating the second eigenvalue. Annals of Applied Probability, pages 285–300, 2001. [30] E. Mossel, J. Neeman, and A. Sly. Stochastic block models and reconstruction. arXiv preprint arXiv:1202.1499, 2012. [31] E. Mossel, J. Neeman, and A. Sly. Belief propagation, robust reconstruction, and optimal recovery of block models. arXiv preprint arXiv:1309.1380, 2013. [32] E. Mossel, J. Neeman, and A. Sly. A proof of the block model threshold conjecture. arXiv preprint arXiv:1311.4115, 2013. [33] E. Mossel and Y. Peres. Information flow on trees. The Annals of Applied Probability, 13(3):817–844, 2003. [34] E. Mossel and J. Xu. Local algorithms for block models with side information. In Proceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science, pages 71–80. ACM, 2016. [35] H. N. Nguyen and K. Onak. Constant-time approximation algorithms via local improvements. In Foundations of Computer Science, 2008. FOCS’08. IEEE 49th Annual IEEE Symposium on, pages 327– 336. IEEE, 2008. [36] M. Parnas and D. Ron. Approximating the minimum vertex cover in sublinear time and a connection to distributed algorithms. Theoretical Computer Science, 381(1):183–196, 2007. [37] R. Pemantle and J. E. Steif. Robust phase transitions for heisenberg and other models on general trees. Annals of Probability, pages 876–912, 1999. [38] A. Saade, F. Krzakala, M. Lelarge, and L. Zdeborová. Fast randomized semi-supervised clustering. arXiv preprint arXiv:1605.06422, 2016. [39] A. B. Tsybakov. Introduction to nonparametric estimation, volume 11. Springer Series in Statistics, 2009. [40] A. Y. Zhang and H. H. Zhou. Minimax rates of community detection in stochastic block models. arXiv preprint arXiv:1507.05313, 2015. 31
10math.ST
Delft University of Technology Software Engineering Research Group Technical Report Series Formalizing typical crosscutting concerns Marius Marin Report TUD-SERG-2006-010 SERG TUD-SERG-2006-010 Published, produced and distributed by: Software Engineering Research Group Department of Software Technology Faculty of Electrical Engineering, Mathematics and Computer Science Delft University of Technology Mekelweg 4 2628 CD Delft The Netherlands ISSN 1872-5392 Software Engineering Research Group Technical Reports: http://www.se.ewi.tudelft.nl/techreports/ For more information about the Software Engineering Research Group: http://www.se.ewi.tudelft.nl/ c copyright 2006, Software Engineering Research Group, Department of Software Technology, Faculty of Electrical Engineering, Mathematics and Computer Science, Delft University of Technology. All rights reserved. No part of this series may be reproduced in any form or by any means without prior written permission of the publisher. SERG Marin – Formalizing typical crosscutting concerns Formalizing typical crosscutting concerns Marius Marin Software Evolution Research Lab Delft University of Technology The Netherlands [email protected] ABSTRACT We present a consistent system for referring crosscutting functionality, relating crosscutting concerns to specific implementation idioms, and formalizing their underlying relations through queries. The system is based on generic crosscutting concerns that we organize and describe in a catalog. We have designed and implemented a tool support for querying source code for instances of the proposed generic concerns and organizing them in composite concern models. The composite concern model adds a new dimension to the dominant decomposition of the system for describing and making explicit source code relations specific to crosscutting concerns implementations. We use the proposed approach to describe crosscutting concerns in design patterns and apply the tool to an opensource system (JHotDraw). 1. INTRODUCTION Aspect-oriented programming languages provide mechanisms to enable modularization of crosscutting concerns, such as pointcut and advice or introductions [14, 7, 13]. These mechanisms address general symptoms of crosscuttingness, like scattering (i.e., a concern lacks localization being spread over several modules) and tangling (i.e., a module implements a core concern, but also crosscutting aspects). These symptoms and language mechanisms alone, however, do not ensure consistency for defining and describing crosscutting concerns. To understand concerns specific to logging mechanisms, design patterns, or implementation of business rules, one has to rely on unconstrained descriptions or sample code examples [10, 16, 20, 1]. Moreover, similar concerns are sometimes described by different names (e.g., contract enforcement [1] and policy enforcement [16]). The absence of a consistent and coherent system for defining and referring crosscutting concerns hinders their comprehension and identification in existing code (a.k.a. aspect mining). The wide variety of examples describing crosscutting functionality and proposed aspect solutions does not distinguish common properties to group similar concerns Technical Report TUD-SERG-2006-010 c copyright 2006, Software Engineering Research Group, Department of Software Technology, Faculty of Electrical Engineering, Mathematics and Computer Science, Delft University of Technology. All rights reserved. No part of this series may be reproduced in any form or by any means without prior written permission of the publisher. TUD-SERG-2006-010 and to separate between different groups. Hence, it is difficult to define requirements for aspect mining techniques, to describe and compare their results [17, 2] without an answer to the research question: What are the crosscutting concerns that we try to identify and how to consistently describe and reason about these concerns? To address this question we have previously outlined a classification system for crosscutting concerns based on sorts, and proposed an informal set of sorts [18, 19]. Crosscutting concern sorts are generic and atomic concerns described by their specific symptoms (i.e., implementation idiom in a non-aspect-oriented language), and a (desired) aspect mechanism to modularize a sort’s instances with an aspect-based solution. This work provides a formalized description of the crosscutting concern sorts and turns the list of sorts into a catalog. The catalog describes each sort as a relation between code elements and provides query templates to formalize these relations. The catalog is built on an in-depth analysis of crosscutting concerns reported in literature and practical experience with source code exploration and analysis for identification of crosscutting concerns in software systems of considerable size like PetStore, JHotDraw and Tomcat [17]. The contributions of the paper lie in several directions: A catalog of generic crosscutting concerns to ensure consistency and coherence in addressing crosscutting functionality. The paper describes unified criteria for grouping crosscutting concern as relations between code elements and provides detailed examples for each entry in the catalog. A query component and templates for each sort to formalize the relation underlined by the concerns of the sort. The templates support the development of query libraries for crosscutting concerns. Moreover, the formalization of the queries identifies relations relevant for describing crosscutting concerns and allows for extensions of existing query languages for capturing such concerns. Crosscutting concerns documented using sort queries for the catalog of design patterns described by Gamma et al. [8] and for a popular open-source system of relevant size. This documentation is available for further references as a common benchmark for aspect mining [2]. The paper also discusses in significant extent a number of relevant concerns in this system and how sorts help in describing and documenting them. 1 SERG Marin – Formalizing typical crosscutting concerns Advanced tool support for querying sort instances in code under analysis and building concern models to describe crosscutting relations in software systems. A concern model allows for grouping sort instances described by queries into composite concerns. This model adds a new dimension to the traditional representation based on a dominant decomposition of an object-oriented system [25]. This dimension relates relevant program elements in the context of a concern implementation and makes this relation explicit. The organization of relevant relations describing generic crosscutting concerns and the proposed formalization using queries is aimed at supporting crosscutting concern comprehension. Nevertheless, the descriptions of concerns using sorts contribute a first step towards refactoring to aspectoriented programming by documenting typical crosscutting relations. Aspect-oriented languages could use the contributions of this paper to further support the refactoring of concern sorts to aspect solutions. The rest of the paper is organized as follows: The next section presents related work on describing crosscutting concerns and how the existing approaches compare to the one proposed in this paper. In Section 3 we introduce the classification of crosscutting concerns on sorts, followed in Section 4 by the query component and the template to describe the sorts. Then, we present a catalog of crosscutting concerns sorts together with examples of relevant concerns and template queries for each sort. In Section 5 we look at how the proposed sorts cover the crosscutting elements occurring in the implementation of design patterns. Then, in Sections 6-7, we present the tool support and the results of applying the tool to an opensource system for describing instances of crosscutting concerns and organizing them in a composite model. We conclude with lessons learnt, opportunities for improvements and directions for future work. 2. RELATED WORK 2.1 Support for defining and describing crosscutting concerns The Feature Exploration and Analysis Tool (FEAT) and the Concern Manipulation Environment (CME) provide tool support for grouping program elements related by a crosscutting concern implementation and organizing them into more complex, composite structures. FEAT organizes program elements that implement a concern in concern graphs [22]. The user can add elements to a concern graph by investigating the incoming and outgoing relations to and from an element that is part of the concern implementation. The elements in a concern graph are classes, methods or fields connected by a call, read, write, check, create, declare, or superclass relation. Although the tool allows to add relations to the graph describing a concern, the focus is on the elements participating in the implementation of the concern. The navigation for understanding a concern and incrementally building its graph representation is from a root (class) element to other elements in the relation chain. That is, a concern is described by its elements, and an element is described by its relations. Unlike FEAT, the sorts-based approach that we propose uses relations as the main representation of a con- 2 cern and builds concern models based on these relations. CME allows for more complex queries than FEAT to define relationships between code elements, especially by providing options for restricting the query domain [11]. The query and its definition can be saved as an element in the CME concern model to describe a concern intensionally. The output of the query can also be saved to describe a concern extensionally. However, neither CME nor FEAT provide a coherent, standard way to document crosscutting functionality: no consistency is imposed for documenting instances of the same or similar concerns and no distinction is made between different concerns documented by the same or similar queries. This prevents uniformity in addressing and describing crosscutting functionality and reflects upon the efficiency of documenting concerns with, for instance, CME queries: what is the right query for describing a particular crosscutting concern, like, for example, a simple pre-condition check? Is this query the same as the other queries documenting pre-condition checks in the same system? Would it be possible (and desirable) to distinguish between a standard query documenting calls for pre-condition checks and a query to document logging calls? What queries are needed to consistently document complex relations like a design pattern implementation? 2.2 Refactoring to aspects The work on refactoring to aspect-oriented programming shows a significant number of examples of crosscutting concerns. The present approaches to aspect refactoring can generally be distinguished by their granularity. The group of aspect refactorings proposed by Laddad covers a significant number of situations where crosscutting functionality could occur in an application [16, 15]. Some of these refactorings are low level ones, closely associated with symptoms of a large variety of concern implementations, such as extract method calls into aspects or extract interface implementation. Yet most of the refactorings are relatively complex and include design patterns, transactions management, or business rules. These complex refactorings generally involve more than one concern to be refactored. Transaction management, for instance, implies to take care of committing or rolling back a transaction for a given operation, to ensure that the same connection is used for all the updates, or that there are no undesired calls on connection objects. In the literature describing this group of refactorings, there is no categorization of the various refactorings proposed nor a specific classification of the concerns involved 1 . Hannemann et al. [9, 10] propose role-based refactorings for object-oriented design patterns [8]. The refactoring relies on a library of abstract descriptions of the patterns and their role elements, and instructions to refactor to an aspect solution after mapping code elements to the abstract roles. This approach is a step further towards defining generic, abstract solutions to typical problems that involve crosscutting functionality, such as applying design patterns. However, design patterns implementations only define the context into which the crosscutting occurs, they are not concerns. Moreover, 1 Work in [16, 1] mentions an aspect classification based on the phase of the software lifecycle at which the aspects occur: development and production aspects. This classification is not related to the discussion proposed here. TUD-SERG-2006-010 SERG Marin – Formalizing typical crosscutting concerns the design patterns typically exhibit multiple crosscutting concerns, some of them sharing common properties, as we shall see in Section 3.1. Finer-grained refactorings have been proposed in form of code transformations catalogs [20] and AspectJ laws [3]. These transformations can occur as steps in the aspect refactoring of a crosscutting concern, but they are oblivious to the refactored concern. They describe mechanics of migrating Java specific units to AspectJ ones (e.g., Extract Fragment into Advice, Move Method/Field from Class to Inter-type). 2.3 Query languages and tools From the discussed tools and approaches to describing and organizing crosscutting concerns, only CME provides its own query language: Panther is a pattern-matching language that allows to search for program units and query relationships between them [24]. This language, however, lacks a precisely defined syntax, as well as a complete implementation. Alike CME, JQuery is a code browser developed as an Eclipse plug-in. JQuery uses a logic query language (TyRuBa) similar to Prolog [4]. The TyRuBa predicates supported by JQuery cover all the relationships defined by FEAT and include many others. For example, JQuery supports a number of predicates for checking the type of an argument; the recognized types are compilation units, class members, errors, tasks, warnings, etc. Among the supported binary relations some are not present neither in FEAT nor in Panther, such as relations for thrown exceptions. Despite being more flexible than CME, JQuery provides a less friendly query syntax. For example, a simple query for returning the classes implementing a specified interface can be written in Panther like: sourceof(relationship implements(type *, interface FigureChangeListener)); . The same query in JQuery is more difficult to write and understand: interface(?I), name(?I,FigureChangeListener), implements(?C, ?I); . Sextant is a tool similar to JQuery, which also enables to query different kinds of artifacts [5]. The tool stores an XML representation of a software’s artifacts and uses the XQuery 2 language to define queries across these artifacts. However, this is less relevant to our approach, which is aimed at describing crosscutting relations in source code. Eclipse IDE provides an advanced programming interface for querying source code relations and various views for visualization of results. This support is more mature than the one in CME and provides a significantly better performance (speed and resources) than JQuery. Moreover, both CME and JQuery build their own internal representations of the code to be analyzed, parallel with the one available through Eclipse. This implies recompilation of the code to be analyzed by the two tools, and additional use of resources. From the available options, we have chosen to use a pseudo query language that resembles CME’s Panther language for formalizing the sort queries. This provides us with a more elegant syntax to ease understanding. However, we have implemented our tool support as a plug-in that uses Eclipse’s 2 www.w3.org/TR/xquery TUD-SERG-2006-010 Figure 1: FigureChanged Observer infrastructure for querying source code and reporting results. This solution provides us with improved performance. 3. CROSSCUTTING CONCERN SORTS The (dominant) decomposition of a software system provided by object-oriented languages permits to make certain relations explicit in source code. Such relations include inheritance, call relationst, encapsulation of properties and containment of actions, etc. Not all relations between program elements, however, can be made explicit by objectoriented languages: the relation between a set of methods consistently invoking the same action as part of a common requirement is hindered in the code and possibly made explicit by comments and documentation. Similarly, classes that implement multiple roles (defined by different interfaces) relate secondary roles to a primary one in a given context. We refer to such relations “hidden” in the code as crosscutting concerns and further look at how these can be categorized for a consistent reference. The aim of this work is to provide a coherent system for referring crosscutting functionality, to relate crosscutting concerns to specific implementation idioms and to formalize their underlying relations. 3.1 Motivating example Design patterns, and most notably the Observer pattern, are typical examples of problems exhibiting crosscutting functionality [10]. A standard implementation of the Observer pattern introduces specific relations through the participantroles and the collaborations described by Gamma et al. [8]. The classes that participate in an implementation of the pattern play either the role of the Observer or that of the Subject. The two roles define specific members, typically abstracted in an interface definition: The Subject role knows its observers and defines methods to allow attaching and detaching Observer objects, as well as a notification method to inform the observers of changes in the Subject’s state. Actions that change the state of the Subject consistently invoke the notification method. The Observer defines a specific method to receive notifications from the Subject and update its own state consistently. 3 SERG Marin – Formalizing typical crosscutting concerns class of concerns that share a number of properties: • an intent (behavioral, design or policy requirements), • a specific implementation idiom in an (object-oriented) language and • a (desired) aspect language mechanism that supports the modularization of the sort’s concrete instances. Figure 2: Concern model for FigureChanged Observer instance Figure 1 shows an instance of the Observer pattern in a drawing application. The Figure elements play the Subject role and declare role-specific members like the changed() method to notify observers, the methods for attaching and detaching observer objects, and fields in concrete classes to store the references to the observers. The FigureChangeListener interface defines the Observer role. The atomic crosscutting relations that occur due to the implementation of the Observer pattern, like the consistent notification of observers or the implementation of multiple roles by the classes participant in the pattern, are not, however, specific to this pattern only. Implementation of multiple roles occurs in other patterns as well, like the Visitor, or in mechanisms for implementing persistence, like Java’s Serializable mechanism. Such relations exhibit a common implementation idiom, namely implementation of multiple interfaces or direct implementation of members that can be abstracted in an interface definition. Similarly, the idiom for the consistent notification consists of scattered method calls to a common functionality. This idiom is shared by other known crosscutting concerns, like, for example, consistent tracing operations. The common relations and idioms specific to crosscutting concerns like consistent notification or tracing suggest that we can define generic crosscutting concerns, which describe common properties. We call these generic crosscutting concerns, sorts. The two sorts in an implementation of the Observer pattern are Role superimposition and Consistent behavior. The Role superimposition, for example, has two instances in the Observer pattern, specific to the two roles for the participants in the pattern. 3.2 Starting point This section summarizes our past contribution to defining sorts of crosscutting concerns. A crosscutting concern sort is a generic description of a 4 Examples of aspect mechanisms include pointcut and advice or introduction, as in AspectJ [13, 1]. Concrete implementations of a crosscutting concern sort in source code represent sort instances. Together with defining the sorts, we have also provided an informal list of canonical sorts with a focus on their refactoring to aspect-oriented programming [18]. In the present paper we address the sorts as un-modularized generic relations between program elements. To capture and make explicit these relations, we provide a query component for describing sorts. We revise the previously proposed list of sorts and provide a formalized description of the sorts. Furthermore, we organize the sorts in a catalog that describes each sort in detail. Two of the sorts in the previously proposed list have been merged as they differed only by the refactoring solutions. Soares et al. [23] proposed a mechanism for introduction of throws clauses for addressing the Exception propagation sort described in Section 4.4. This is very much an alternative to the AspectJ approach that uses exception softening. The distinction between the various refactoring approaches is less important to our current focus on describing concerns by their defining relations. 3.3 A concern model based on crosscutting concern sorts Crosscutting concern sorts are, by definition, atomic elements. The atomicity of a sort provides a consistent granularity level for classifying crosscutting concerns by common properties, but also gives the level of complexity for the relations to be expressed by a sort instance. To relate sort instances in more complex relations, like participation in design patterns implementation, we use a composite concern model. A concern model organizes concerns in a hierarchical structure. Relations describing sort instances are always leaf elements and children of a composite concern model. Each model can be a child of a super-model. A concern model for a complex relation R can be formalized as: ConcernM odel(R) = n [ i=1 SIi ∪ m [ SRj j=1 This model describes a relation R as a composition of sort instances SIi and composite sub-relations SRj . Figure 2 shows the concern model for the Observer implementation previously discussed. The composite FigureChanged model groups instances of sorts like Role superimposition and Consistent behavior that participate in the implementation of the Observer pattern for figure changes. A sort instance is described by a a given name and an associated query together with the results of this query. A concern model is also described by a given name. The FigureChanged relation is part of parent, customdefined relations, like the one grouping all the instances of TUD-SERG-2006-010 SERG Marin – Formalizing typical crosscutting concerns or Member and a Type, shows the type of a field member or parameter, or the return type of a method. Note that declares relations can also be specified by using wildcards and qualified names, e.g., p.C.* for all members declared by class C of package p. In addition to these predicates, a query definition also allows for the transitive closure operator (+) and two “wildcards”: • * matches names of identifiers (element names or return types) or modifiers (visibility); • .. matches any parameters or arguments in a method or constructor. Figure 3: Relationships relevant to sort queries the Observer pattern in the JHotDraw project. In this case, the project corresponds to the top-level concern model. The next section introduces the query component for describing relations specific to crosscutting concern sorts. It is up to the software engineer to organize these instances in more complex concern models that reflect her or his design decisions, and to provide appropriate identifier names. 4. DESCRIBING CROSSCUTTING CONCERN SORTS 4.1 The query model The proposed query model is aimed at providing a standard, formalized description of the underlying relations of the crosscutting concern sorts. The model consists of a generic query definition to describe the query model, and a set of query templates (sort queries) to describe the relations specific to each of the sorts. A sort query is a binary relation between two sets of elements, the source and the target context. A context is a (restricted) set of program elements, which can also be expressed as the result of a query. The two contexts in the definition of a sort query represent the end-points of the sort’s relation. The generic query describing the model can be expressed as: relation_id (<source-ctx>, <target-ctx>); The end-points contexts can be selected by the sourceof and targetof operators, respectively. Elements in the set of results of a query sort are (e1,e2) tuples, where: (e1 in source-ctx) && (e2 in target-ctx) && relation_id(e1,e2) The two elements, e1 and e2, are program elements, such as a class or a method. The relation between them, relation id, is a (binary) relation between program elements, like call or inheritance relations, which can be extracted by a static source code analysis. The relevant relations for sort queries are shown in Figure 3. The same relations describe the list of predicates used by the sort queries. The type relation, between a Parameter TUD-SERG-2006-010 Variables are allowed and used to save (partial) results of a query, such as the set of elements that gives the end-point of a query. The variable can further serve as an end-point for another query. The notation used to declare a variable is <variable name>. The intersection of variables and end-point sets is shown through the && operator. 4.2 Template for the sort catalog entries We describe the crosscutting concern sorts and their query component by an extended template that comprises the following elements: Intent of the sort, to give a generic description of the sort’s concerns; Relation underlined by the sort, to describe the type of relation between the elements implementing instances of the sort; Idiom specific to the sort implementation in an objectoriented (particularly Java) language; Query associated with the sort to make explicit the relation between the elements implementing a sort’s instance and to formalize the sort’s definition; Example to show a concrete instance of the sort; Other instances to provide additional examples of (possible) occurrences of the sort. 4.3 Examples of sort instances For exemplification of sorts we refer to a number of concerns identified in well known applications or libraries. Where examples of sorts instances are available, we refer to the JHotDraw application, which we have used as a case-study for documenting crosscutting concern instances using sort queries. JHotDraw is a drawing editor for bi-dimensional graphics, developed as an open source project 3 with involvement from the authors of the “Design Pattern - Elements of Reusable Object-Oriented Software” book [8]. One of the application’s goal is to provide a show case for good use of design patterns in the development of graphical applications. 4.4 The catalog This section presents a catalog of crosscutting concern sorts described by the template introduced in Section 4.2. 4.4.1 Method Consistent Behavior 3 jhotdraw.org 5 SERG Marin – Formalizing typical crosscutting concerns Intent Execute consistently a specific action for a number of method elements as part of their required functionality. Relation The method elements share a (secondary) concern, which they implement through the consistent invocation of the action executing the desired functionality. The common action invocation shows the relation between the callers as participants in the implementation of a crosscutting concern. Idiom Scattered method calls to the method implementing the common action to be executed consistently. Query The sort query takes two arguments: a seed-element to define the source context, and the method implementing the action to be executed consistently by the elements in the source context. This method is the unique element of the target context. <context> = pckg.I+ || (project Proj) || type (pckg.Cls) || packge pckg; We first define the (source) context based on the seedelement passed to the query, and save the elements of the context into a variable. The context definition shows several possibilites to use structural relations for describing the elements in the context; for example, the context could consist of the elements in the hierarchy of the type I of package pckg (pckg.I+), or the elements of the project Proj, or members of the type Cls of package pckg, or elements declared in package pckg, etc. The context seed is specific to each of these cases, and that is, the type I, the project Proj, the type Cls, and the package pckg, respectively. The formalization of the context is similar to defining pointcuts in languages like AspectJ [13]. However, the context consists of program elements rather than execution points 4 . <selcallers> = <context> && sourceof( invokes(method *, * p.C.m(..))); CB(contextElem, m) = invokes(<selcallers>, * p.C.m(..)); Next, we save in the <setcallers>variable all the method members in the source context that invoke elements in the target context (in this case, the method m). The query returns the invocation relationships between the elements in the source context and the method-action in the target context. Example The notification mechanism in the previous example of the Observer pattern instance is an example of consistent behavior: the actions that change the state of the Subject object have to consistently call the notification method for allowing the observers to update their state accordingly. A different example of this sort’s instance is common to transaction management, a complex concern aimed at ensuring data integrity; this implies that an operation is committed only if it is fully completed and roll-backed otherwise. In a banking transfer operation, for example, both the debit and credit operation have to be successful at the same 4 The context definition shown for this query is common to several sorts to be discussed next. We will refer to the <context>variable, without redefining it. 6 time for keeping a consistent state of the data. Java provides various alternatives to transaction management, like JDBC transactions and Java Transaction API (JTA) 5 . A JTA transaction, for example, implies that methods implementing the transaction logic consistently invoke dedicated methods of the javax.transaction.UserTransaction interface: the begin method at the beginning and the commit (or rollback) at the end to demarcate a JTA transaction. These invocations represent instances of the consistent behavior sort covering methods whose operations have to be under transaction management. Other instances Logging of exception throwing events in a system; Wrapping of service level exceptions of business services into application level exceptions[17]; Credentials checking as part of the authorization mechanism[16]; etc. 4.4.2 Contract Enforcement Intent Comply with design by contract rules, such as executing consistent condition checks to ensure that the assumptions about a method are confirmed. Relation A set of elements are related by common condition checks. Idiom Similar to Consistent behavior, instances of this sort are implemented as scattered calls to methods checking conditions as part of contract enforcement. Query The sort is similar to the Consistent behavior sort with the difference that the action (condition check) is not part of the caller-elements’ functionality; that is, a method can fulfill all its requirements in the absence of the calls checking the conditions. Hence, the two sorts differ only in intent. The query documents this intent by its own description while the same query template as for Consistent behavior applies to this sort too. Example The use of assertions and assertions-like calls is a typical example of instances of this sort. An example of Contract enforcement instance is available through the JHotDraw drawing editor application. The application defines a hierarchy for Command operations to be executed as response to user actions, like menu items selection. The Command elements are participants in the implementation of the Command pattern, and define a no-argument execute method to carry out the specific action. Commands can be executed only if a valid view is present in the drawing editor. The Command elements check this condition through a consistent (check) call before proceeding with their execution. Other instances Pre- and post-conditions complying with design by contract rules. 5 http://java.sun.com/j2ee/1.4/docs/tutorial/doc/ TUD-SERG-2006-010 SERG 4.4.3 Entangled roles (Interfacing layer) Intent Extend an element (method or type) with a secondary role or responsibility, which is entangled with its primary concern. Relation The crosscuttingness of the concerns of this sort resides in the tight coupling between elements implementing different roles, like, for instance, relations between graphical user interface (GUI) elements and their associated model or actioncontroller elements. The GUI element knows its associated element and sends messages to it in order to be able to provide a response to an action or report about its state. The interfacing task of the GUI element results in its methods being crosscut by the logic of the model element. The methods’ implementations address a different concern than the interface declaring them. The graphical elements store references to their model and mirror its state. The relation specific to this sort is established between elements in the context of a (interfacing) class that invoke actions in the interfaced type through an object reference. This reference is typically stored in a field of the interfacing class. Idiom Redirection of calls to a specific reference. Query //the type of the interfaced object <interfacedType> = sourceof (declares(*, field p.C.field)); ER(C,field)=references(class p.C, <interfacedType>)); Example A common design practice for graphical user interface (GUI) elements, like Java Swing components, is to use a ModelView-Controller(MVC) design where the View and the Controller are implemented by the same class. The class for the graphical component keeps a reference to the model object, which determines the component’s state. Hence, the graphical component is a wrapper around the model’s state that “mirrors” the model’s state and delegates actions to this model. Swing components like buttons and menu items implement the described behavior (e.g., AbstractButton). The methods for setting or reporting about their state, such as selected armed, or enabled, redirect their calls to the model whose state they mirror. The controller functionality in the same components delegates calls to its associated command-action. The action can also play a model role: in the JHotDraw drawing editor, a menu item is enabled or disabled if the Command object associated with the item is or not executable. Other instances Swing GUI elements (like classes extending AbstractButton); Invoker-Command relation in the Command pattern. Marin – Formalizing typical crosscutting concerns Intent Define an interfacing layer to an object (add functionality or change the context) and forward the calls to dedicated methods of the object. Relation The redirection layer acts as a front-end interface that assumes calls and redirects them to dedicated methods of a specific reference, (with or without) executing additional functionality. The consistent (yet, method specific) redirection logic crosscuts this layer’s methods. Unlike the previous sort, instances of this sort do not query a model for its state, but typically add functionality dynamically to the calls. This sort is a specialization of the Interfacing layer sort. The relation specific to this sort is between the redirecting layer and the target object, and resides in consistent redirection of calls between pair methods. Idiom Identical logic in a number of methods that consistently redirect their calls to dedicated methods of a specific type. Query //C-component; D-decorator <compType> = sourceof(declares(*, field p.D.field)); //all methods of C <compMehtods> = targetof(declares(<compType>, method *)); //all decorator (D) methods <decorMehtods> = targetof(declares(type D, method *)); RL(D,field) = (invokes(<decorMehods>,<compMethods>)) && (compares(<decorMehods>,<compMethods>)); The relation is fairly complex and connects the context of the redirection layer and that of the type of the targetobject. The query takes as arguments the type element of the redirecting layer, and the field in this type that stores the reference to the object to redirect to. The two arguments define the source context, as the redirecting class, and the target context, as the type of the reference receiving the redirected calls. The query returns invocation relations between methods with the same name in the two contexts. Most relevant for this relation are the methods in the redirecting layer that consistently forward their calls. Example Implementations of the Decorator pattern are typical examples of instances of this sort. Decorator instances in JHotDraw allow to attach elements like borders to Figure objects. The decorators for figures extend DecoratorFigure that defines the set of methods to consistently forward their calls to the stored reference of the decorated object. Subclasses of DecoratorFigure can override its methods to dynamically extend its functionality. Other instances Implementations of the Decorator, Adapter, and Facade patterns[17]. 4.4.5 Add variability Intent 4.4.4 Redirection layer TUD-SERG-2006-010 Use method-objects to pass a method as an argument. 7 SERG Marin – Formalizing typical crosscutting concerns Relation Instances of the sort implement a consistent mechanism of building and passing method-objects as method arguments. Method-objects are (typically) objects of a type declaring one method. The methods expecting arguments of this type only need and invoke the specific method for the passed object. This mechanism is a substitute for passing pointers to methods as arguments. Languages like Java use this mechanism, which is also referred as closures or functors or function objects, to achieve a behavior similar to the use of callback funtions. The sort and its query describe a contract between clientcallers and server-callees that make use of method objects as a substitute to passing references to methods. Idiom A number of actions in a system require arguments of a method-object type for invoking the type’s unique method. The clients conforming to the expectations consistently build and pass wrapper objects for the expected method. Query //methods expecting args of MethodObject Type <target> = sourceof(params(method *, type MethObjT)); <mCreateMethObj> = sourceof(invokes(method *, MethObjT.new(..))); <source> = <mCreateMethObj> && sourceof(invokes(method *, <target>)); //method-variables of MethodObject Type <varsInMethods> = targetof(declares(<source>, var MethObjT *)); //methods being called with the previous variables as args <target> = sourceof(args(method *, <varsInMethods>)); AV(MethObjT) = invokes(<source>,<target>); The query documents the set of methods that create methodobjects of a specified type, and pass them as arguments to methods declaring parameters of the same type. The target end-point of the relation consists of methods declaring parameters of a method-object type. The source context is given by the intersection between (1)the set of methods creating objects of a method-object type and (2) the set of callers of the methods in the target context. Example Simple commands in JHoDraw, which do not save state, implement a number of operations like opening, printing and closing a drawing (application). The implementation follows the Command pattern and consists of associating menu items with instances of anonymous command classes that declare and implement an execute method to carry out the operation. These instances are method-objects and their execute method simply invokes a dedicated method that carries out the open (or close or etc.) operation. The Command object is hence used as a wrapper for the execute method to be invoked in response to menu item selection actions. Other example instances are related to practices specific to functional programming [12], like the use of closures (functors) that can be implemented in Java using method objects like, for instance, Runnable objects. These objects only implement a run method and are used by common Java mechanisms, like thread safety. Consider, for example, Component elements (like Swing objects) that need to execute in a specific thread, i.e. the event dispatching thread, to avoid deadlocks during painting the graphical components. Two 8 Java dedicated methods, invokeLater and invokeAndWait, ensure that these components execute in the special thread. The two methods expect an argument of type Runnable whose run method contains the code accessing functionality of the graphical (Swing) component to be executed. Other instances Similar behavior as for the Swing components is present in the implementation and use of graphical elements of the Eclipse Standard Widget Toolkit(SWT). The IRunnableWithProgress interface, for instance, has to be implemented by classes with long-running operations for displaying a progress bar. The interface defines a run method, and instances of the implementing classes are passed as arguments to a dedicated method of a specialized class for running long-running operations. SWT also defines an user-interface thread from which the SWT API methods to be called. Runnable objects are passed to this thread for (a)synchronous execution. The Visitor pattern declares a specific Visitable role with an accept method to be invoked by visitor methods receiving arguments of type Visitable. Implementations of the pattern can rely on a (Visitable) method object to pass the accept method to interested clients. Laddad proposes the worker object pattern and an implementation in AspectJ of the pattern [16]. The worker object is a method-object: an instance of a class implementing an worker method. Examples include Asynchronous method execution, Authorization using Java Authentication and Authorization Service (JAAS) API, etc. 4.4.6 Expose context Intent Expose the caller’s context to a callee by passing information to each method in the call stack of that callee. Relation Instances of this sort are implemented by methods that are part of a call chain where an additional parameter is declared and used to pass a context along the chain. The declaration of additional parameters to pass context is crosscutting. The elements related by this sort are the caller-method receiving an argument with a specific name (and type) and the callee-methods to which the caller passes the argument. To get a full description of the context passing, a transitive closure operator has to be applied to the relation associated with this sort. Idiom Methods participating in a call chain declare additional parameters to pass a specific context required for fulfilling their (secondary) requirements. Query <callees> = targetof(invokes(method p.C.caller(..), method *)); <selCallees> = <callees> && sourceof(args(method *, name argName))) && sourceof(args(method *, type ArgType))); EC(caller, argName) = invokes(method p.C.caller(..),<selCallees>); The query returns the relations between the input caller method and the callees that are passed an argument with the name specified in the query. TUD-SERG-2006-010 SERG Marin – Formalizing typical crosscutting concerns Example Intent To monitor progress evolution for long-running operations in Eclipse applications, one can use a IProgressMonitor object. The long-running operations are passed a reference to the monitor class through an additional parameter. The operation invokes methods of this reference to indicate progress, like the worked(int) method to indicate that a given number of work units of the executing task have been completed. Long-running sub-operations receive the same reference to the monitor and use it to report progress. Make the relationship between classes explicit (through nested classes) to superimpose a role (to a hierarchy). Other instances Transaction management, Authorization, the Wormhole pattern [16]; 4.4.7 Role superimposition Intent Implement a specific secondary role or responsibility. Relation A number of elements share a common role, other than their defining hierarchy. The sort is specific to classes that participate in multiple collaborations and hence implement multiple roles [21]. The concrete instances occur as multiple interfaces (or methods that can be abstracted into an interface) implementations. The crosscutting element resides in the tangling of multiple roles in the class implementing them. Relation A number of elements share a common role by enclosing support classes of a specific type. Complex roles can be implemented through nested, support classes. The nesting mechanism enforces and makes explicit the relationship between the role of the enclosing class and the one implemented by the support class. Instances of this sort occur as an alternative to multiple roles implementations: two hierarchies can interact by having common classes (classes that implement elements from both hierarchies) or by having elements from one hierarchy as support classes for the elements in the second hierarchy. Idiom Hierarchies interaction through containment of nested classes. Query <implementors> = sourceof( implements(class p.EnclosingC+.*, type Role)); SC(EnclosingC, Role) = implements(<implementors>, type Role); The query associated with this sort reports about nested classes within a given context that implement a specific role. A common context is a class hierarchy to which the role is superimposed through the nested classes. Idiom Example Implementation (and definition) of members separable in distinct interface definitions; common instances occur as classes that implement multiple interfaces. In the JHotDraw application there are two hierarchies that interact through support classes: the members of one hierarchy enclose members of the second, supporting hierarchy. The main hierarchy, Command, defines command elements for executing various application-specific activities like, copy and paste, or operations for setting the attributes of a figure. The second hierarchy, Undoable, defines operations for undo-ing and redo-ing the results of executing a command. Typically, each Command class encloses its associated Undo class. Query //role = class or interface <implementors> = sourceof(implements (*, type Role)); <selectedImpls> = <context> && <implementors> RSI(Role,contextElem) = implements(<selectedImpls>, type Role); Role superimposition documents elements that implement or extend the interface or class defining a specific role. Example Examples of role superimposition are available through implementations of design patterns defining specific roles, like the Observer pattern previously discussed, or the Visitor pattern. Implementing persistence is also possible through role superimposition: the Figure elements in a drawing application, like JHotDraw, implement a Storable interface that defines the methods for a (figure) object to write and read itself to and from a file. Each figure implements these methods in a specific way to provide persistence and recovery of drawings over work session. Other instances Implementations of design patterns that define specific roles; Implementations of multiple interfaces with dedicated, specific roles, e.g., Serializable, Cloneable, etc. 4.4.8 Support classes for role superimposition TUD-SERG-2006-010 Other instances Specialized iterators for various Collection types. 4.4.9 Policy enforcement Intent Impose a (restriction) policy between groups of elements in the system. Relation The sort describes a restrictive relation that limits certain type of interactions between a source and a target set of elements. Concerns of this sort implement relationship policies between sets of elements that can be described in a source and target context, respectively. These policies cannot be enforced by language mechanisms, like, for instance, visibility. They are crosscutting because they have to be consistently documented and followed. 9 SERG Marin – Formalizing typical crosscutting concerns Idiom Example Requirements specifications available through documentation, source code comments, etc. The file reading (writing) operations in JHotDraw implied by the drawing persistence concern, like read(StorableInput), throw exception of the java.io.IOException type if the reading or parsing operation fails. The callers of these methods re-throw the same exception to their callers, up to the driver application that catches the exception and prints an error message. Query PE(srcContextElem, targetContextElem) = references(<src_context>, <tgt_context>); The query documents (reference) relations between elements in a source and target context, respectively. If the enforced policy prohibits relations between the two contexts, the query will check the policy and report those elements that break it. This control query can be used as a complement to testing components. Example Sun provides a list of restrictions imposed to enterprise beans6 ; one of these restrictions states that: “Enterprise beans should not use the java.awt package to create a user interface ... and stop the Java virtual machine and ...”. Other instances Typical examples of instances of this sort include interaction restrictions for (formalized) sets of program elements, such as packages, and classes implementing specific functionality. Eichberg et al. also discuss several examples of enforced policies [6]. Some of their examples, however, could be addressed by conditions checks, such as methods returning non-null values. 4.4.10 Exception propagation Intent Propagate an exception for which no appropriate response is available. Relation Concerns of this sort have specific a consistent propagation (re-throwing) mechanism of the checked exceptions thrown by methods that do not have appropriate answers to these exceptions. Similar to context passing, the described relation is part of a call chain. The caller-elements implement the consistent (enforced) logic of re-throwing exceptions if not able to handle them. The transitive closure operator applied to this relation provides a full description of the elements in the call chain that re-throw exceptions. Idiom Declare throws clauses in the definition of a method for passing the responsibility of catching the exception to the callers. Query <callers> = sourceof(invokes(*, p.C.m(..))); <throw> = sourceof(throws(method *, type p.ExceptionType)); <source> = <throw> && <callers> && <context>; EP(m,ExceptionType,contextElem)=throws(<source>, p.ExceptionType); The query reports relations between methods in a given context and the thrown exception of the specified type. 6 java.sun.com/blueprints/qanda/ejb_tier/ restrictions.html 10 Other instances Checked exceptions in Java 4.4.11 Design enforcement Intent Enforce design, such as classes in an hierarchy must declare no-arguments constructors. Relation A number of elements share a design logic (e.g., no-args constructors). The sort describes concerns ensuring design rules compliance for program elements in a defined (formalized) context. The implementation of these concerns lacks language support, and relies on documentation, specifications, comments, etc. Idiom Requirements specifications available through documentation, source code comments, etc. Query //method DE(contextElem,m)=declares(<context>, member * m(..)); The design enforcement documents a relation between a set of elements that (have to) declare specific members with various signatures. If member m is a constructor, the new keyword will be used instead of the method name. The member can be a field as well. Example The documentation for the Storable interface in JHotDraw to be implemented by elements that can be stored and restored to and from a file states that “objects that implement the interface ... have to provide a default constructor with no arguments”. Similar to JavaBeans design, the no-argument constructor will be invoked to create objects after being read from the file. Other instances Serialization rules in Java require that (special) serializable classes implement special methods (writeObject(..) and readObject(..)) with specific signatures. These methods are not declared by the Serializable interfaces but the design requirements are provided through the documentation of the interface. JavaBeans design (providing classes with no-argument constructors) is similar to the discussed persistence example. 4.4.12 Dynamic behavior enforcement TUD-SERG-2006-010 SERG Intent Enforce rules for object use, like before-use initialization and post-use clean-up. Relation Shared logic of manipulating objects of a certain type. Instances of the sort implement rules for object use, like the use of lifecycle methods. Idiom Requirements specifications available through documentation, source code comments, etc. Query <context> = targetof(contains(type C, method *)); DBE(C,field)=set(<context>, C.field) || get(<context>, C.field); We assume a (crosscutting) solution aimed at checking that certain methods of an object are executed in an expected order. The solution consists of declaring a field which to be set to a different (integer) value by each executing method of the field’s object. The value of the field cannot be lower with more than one unit than the value to which a method is going to set the field. That is, each method checks the value of the counter field before executing in order to ensure proper order of the execution. Example (De-)Activation of tools in the JHotDraw graphical editor requires that the deactivate method is always used to cleanup resources when a tool has finished its execution and the user switches to a different tool. This method should be the last called for a given tool. Other instances Lifecycle concern [17]; 5. COVERAGE This section investigates how the sorts are able to cover the crosscutting concerns present in complex structures, commonly referred in literature for their crosscutting properties. To this end we consider the list of design patterns for which Hannemann and Kiczales reported improved modularity due to proposed aspect-oriented (AspectJ [1]) solutions [10]. Table 1 shows the list of these design patterns. Each pattern corresponds to a composite concern model whose crosscutting elements are described by sort instances relations. The documented crosscutting elements in the design patterns have been identified by examining the description of the patterns and the sample code in Gamma et al. [8], as well as the aforementioned AspectJ solutions 7 5.1 Design patterns Implementations of the Adapter pattern could use either multiple roles or object composition to adapt a class to an interface expected by clients. In the first case, the Adaptee role is super-imposed to the class implementing the Adapter 7 The solutions are available as a set of simple examples of design patterns implementations in Java and AspectJ at www.cs.ubc.ca/~jan/AODPs/. The crosscutting concerns discussed in this paper are, however, not limited to these examples only. TUD-SERG-2006-010 Marin – Formalizing typical crosscutting concerns functionality. The Adapter class implements both a Target interface and (extends) the Adaptee, which is an instance of the Role superimposition sort. The solution relying on object composition would typically use delegation from the Adapter to a stored reference of the Adaptee object. This is an instance of the Redirection layer sort. The State pattern comprises a number of crosscutting elements: The Context role is super-imposed and has specific members for maintaining a reference to the object defining the current state; second, the notification of changes of the current state to be stored in the Context object is an instance of the Consistent behavior sort. The third element is an instance of the redirection layer: the Context object forwards the received calls to the methods of the object storing the current state. The crosscuttigness occurring in the implementation of the Decorator pattern can be described by the Redirection layer sort. The methods in the decorator class consistently redirect their calls to dedicated methods in the decorated class, through the stored reference to the decorated object. Decorators are typical examples of instances of the Redirection layer sort. The crosscutting element of the Proxy pattern implementation resides in the consistent forwarding of the calls to the reference of the real subject class, stored by the Proxy object. Another crrosscutting concern occurs in protection proxies as an instance of Consistent behavior; this consists of a method call that checks the access permissions before executing the forwarding operation. Some implementations also consistently check if the proxy’s subject has been initialized. This check is part of the method for accessing the reference to the subject. The method is invoked by the actions in the proxy that forward their calls. The Visitor and Composite patterns are often used in combination [8, 10]. Both patterns define roles that in various implementations are super-imposed like, for instance, the Visitable role. The roles we chose to document by sort instances, Composite and Visitable, are those defining rolespecific methods. Certain implementations could make use of method objects for passing a reference of the Visitable object and its accept method to the visitors’ methods. Such an implementation could be documented by an instance of the Add varaibility sort. We show in Appendix A an AspectJ solution for the Visitor pattern, different from the one of Hannemann and Kiczales [10], that addresses the Add variability concern. The Command pattern presents several participants, like the Command ojects, the Invokers that require the execution of the command, and the Receivers to carry out the requests. These participants play specific roles in the implementation of the pattern; however, not all of them declare specific members and end up as super-imposed. The Invoker participant keeps a reference to an associated command to which it forwards the requests. Invokers like buttons and menu items in graphical user interfaces are often interfacing the command object by mirroring its state through their own display (e.g., enabled buttons correspond to commands that can be executed with the active configuration, etc.). In some implementations, the Invoker role is super-imposed 11 Marin – Formalizing typical crosscutting concerns SERG Design pattern Composition of sort instances Adapter Adapter = RSI(Adaptee, contextElem) + RL(Adapter, adapteeReference); State State = RSI(Context, contextElem1) + CB(contextElemStateChanger, Context.changeState(State)) + RL(Context, stateReference)); Decorator Decorator = RL(Decorator, componentReference); Proxy Proxy = RL(Proxy, fieldRefRealSubject); Protection proxies: document the consistent behavior of checking the credentials: CB(contextElem, checkAccessPermission()); Visitor Visitor = RSI(VisitableElement, contextElem); Specific implementations: Visitor = AV(VisitableElement); Command Command = RSI(Receiver, contextElem1) + ER(Invoker, commandReference) + RSI(Invoker, contextElem2) + CB(invokersContext, Command.execute())); Certain implementations using Command for method objects: AV(Command); Composite Composite = RSI(Composite, contextElem); RSI(Leaf, contextElem2)) - not crosscutting Iterator Iterator = RSI(Aggregate, contextElem); Flyweight Flyweight = RSI(Flyweight, contextElem1) + CB(contextElem2, FlyweightFactory.getFlyweight)); Memento Memento = RSI(Originator, contextElem1) + CB(careTakerContextElem1, Originator.createMemento)); Strategy Strategy = RSI(Context, contextElem); sometimes, we could also have: RSI(Strategy, contextElem1); Mediator Mediator = RSI(Colleague, contextElem) + CB(contextElem, notifyMediator)); Chain of Respon- ChainOfResponsibility = RSI(Handler, contextElem1) + sibility RL(Handler, successorReference)); Prototype Prototype = RSI(Prototype, contextElem); In some languages, like C++, copy constructors are required: DE(contextCloneableObjs, CloneableType.new(const CloneableType&)); A similar instance can be used for requiring implementation of the Object.clone method in Java Singleton Singleton = RSI(Singleton, contextElem1) + DE(contextElemSingleton, private Singleton.new(..)) + CB(contextElem2, Singleton.instance()); Observer Observer = RSI(Observer, contextElem1) + RSI(Subject, contextElem2) + CB(notify, contextElem3)+ CB(attachObserver, contextElem1)+ CB(dettachObserver, contextElem1); Table 1: Design patterns as compoostion of sort-instances. through interfaces that declare methods dedicated to handling events that trigger execution of commands. The implementations of these methods in the command invokers consistently call the operation in the Command class. The behavior indicates an instance of the Consistent behavior sort. Particular implemenations of the Command pattern can serve as method-objects. In this case, the class defines just an execute method and does not save state. The Command object is passed around for clients to access the functionality of its unique method. The use as method object is an instance of the Add variability sort. 12 The only crosscutting element occurring in the implementation of the Iterator pattern, is the super-imposed Aggregate role. The role defines the CreateIterator() method to create an iterator object for traversing the elements of the aggregate (structure). The concerns documented for the Flyweight pattern comprise a Role superimposition instance for the Flyweight role, and a Consistent behavior for obtaining references to a (new) flyweight object. This behavior consists of calling the accessor method in the factory class for the flyweight instances, instead of attempting to build new flyweight objects. A similar behavior is discussed below for the Singleton pattern. TUD-SERG-2006-010 SERG The refactoring of Memento pattern to AspectJ uses the introduction mechanism for superimposing the Originator role. In addition to this, we document a Consistent behavior instance, namely acquiring a memento object before performing the operation that changes the state. The Strategy pattern defines two roles, the Strategy and the (Strategy)Context. Most commonly, the Context is a super-imposed role, maintaining a reference to the Strategy object (and defining methods to access the reference) and, possibly, delegating requests from its clients to the Strategy. The Mediator pattern implies a super-imposed role (Colleague) to store and access the reference to the Mediator class. Moreover, each change in the coleague class results in a consistent notification of the mediator for coordinating the other colleague-classes. In some implementations, the Mediator role could also be super-imposed. The participants in the responsibility chain are superimposed the Handler role, which defines the method for handling specific requests, and the reference to the next Handler in the chain. The handler-methods check the request and consistenly pass it to the following handler in the chain. Because the one-to-one association between the passing and receiving methods in the chain, the call passing behavior is documented by a Redirection layer instance. One crosscutting element in a typical implementation of the Prototype pattern is due to the super-imposition of the Prototype role that declares the clone method to allow objects to generate copies of themselves. In some languages, like C++, the Prototype must declare a copy constructor for cloning. (A copy constructor receives as unique parameter a constant reference to an object of the class’ type.) This would be an instance of the design enforcement sort. In Java, the cloning is realized through the clone method in the Object class, which is extended by all Java classes. The class implementing an overriding method of clone has to implement the Cloneable interface to indicate to the clone method that it is legal to make copies of the fields of the Cloneable class. This is a design enforcement sort instance. The Singleton pattern has specific the access method to the unique instance of the singleton class, which has to be used by clients instead of calling a constructor. In some implementations, the method is declared by an interface that defines the super-imposed role of the Singleton. Singletons have special designs, most notably they have to declare the constructor as private for not allowing constructor calls from outside the class. This Design enforcement instance cannot be specified other than by comments. Similar to the Flyweight pattern, we use a Consistent behavior query to document the references to the method returning the unique instance. This behavior shows the rule for accessing the singleton’s functionality. The Observer pattern is documented as a composition of Consistent behavior and Role superimposition intances, as discussed in the previous sections. In addition to the consistent behavior of notifying changes in the Subject’s state, we also document the mechanisms for registration and deregistration of observers. Marin – Formalizing typical crosscutting concerns composite concern models 8 . The concern model supported by SoQueT is similar to that in CME, with the differences that complex concerns are expressed as compositions of sort instances [11]. SoQueT provides three main user-interface components: The interface to define a query for a specific sort based on a list of pre-defined templates is shown at the bottom of Figure 4. The template guides the user in querying for elements that pertain to a concrete sort-instance. The results of the query are displayed in the Search Sorts view, also shown in Figure 4. The view provides a number of options for navigating and investigating the results, like display and organization layouts, sorting and filtering options, source code inspection, etc. The Concern model view allows to organize sort instances in composite concerns described by their user-defined names. The concern model is a connected graph, defining a view over the system that is complementary to the Eclipse’s standard package explorer. The graph is displayed as a tree hierarchy, with sort instances as leaf elements. A sort instance element can be expanded to display the results of its associated query. The node tree representing a sort instance is labeled with a user defined name and the description of the associated query. Note that queries can be associated only to sort instances and not to a composite concern. The tool introduces the concept of virtual interface to support documenting sorts like Role superimposition. Because some super-imposed roles do not have dedicated interfaces but are tangled within other interface or class declarations, the tool allows to define virtual interfaces for these roles. The user can select in a graphical interface those members of the multi-role type that define the analyzed role. For some of the sorts that rely on a reference to a type for specifying relations, like Redirection or Interfacing layer, the referred type can be specified as either the type of a field or the return type of a method in the referring type. 7. SORTS IN PRACTICE We have documented crosscutting concerns in the JHotDraw application to test the suitability of the sorts and their associated queries for describing and documenting such concerns in real systems. JHotDraw is a relevant case for this task as it has been developed as a show-case for applying design patterns, and as we have seen, many of these patterns involve crosscutting functionality. Moreover, the application has been proposed and used as a common benchmark for aspect mining [17, 2]. We focus the discussion in this section on various instances of design patterns in JHotDraw and how they can be modeled in SoQueT. The model for the documented concerns in JHotDraw, including all those described in this paper, is available for download 9 . This model can be loaded into SoQueT and used to support concern understanding and exploration for the selected application, as well as a reference for aspect mining. 7.1 Design patterns in JHotDraw 6. TOOL SUPPORT SoQueT (SOrts QUEry Tool) is the tool support we built to query for sort instances and organize related instances in TUD-SERG-2006-010 Figure 5 shows a number of core elements in the JHotDraw application and their collaborations. The figure is 8 9 http://swerl.tudelft.nl/view/AMR/SoQueT http://swerl.tudelft.nl/view/AMR/SoQueT 13 SERG Marin – Formalizing typical crosscutting concerns Figure 4: SoQueT views aimed at supporting the understanding of the pattern implementations discussed next. Strategy The Strategy pattern in JHotDraw is implemented by a number of elements, like Connector s and Locator s. Connectors (e.g., ChopEllipseConnector, PolyLineConnector, etc.) define strategies for locating connection point on a figure, while locators (ElbowTextLocator, PolyLineLocator, etc.) locate a handle position on a figure. The Strategy role is a primary role for the interfaces defining it and the classes implementing these interfaces. The Context strategy role, however, is super-imposed, through implementations of the ConnectionFigure and LocatorHandle interfaces respectively. We document the pattern-specific roles by instances of the Role superimposition sort: a sort query asks for all implementors of ConnectionFigure to describe the Context, and a second query documents the Strategy in a similar way. We group these two instances in a composite concern bearing the name of the pattern instance, ConnectionStrategy. Another instance of the pattern implements the update strategy for drawing views. The Painter interface defines the strategy in the context of the DrawingView hierarchy. The DrawingView interface, however, defines multiple roles and participates in multiple implementations of the Strategy pattern for which it defines the context role. To document the role of interest, we use a virtual interface definition. The virtual interface definition comprises the members that are role-specific, namely the members to refer (maintain and allow access to) the Strategy object. 14 Visitor and Composite The two patterns can be discussed together for the JHotDraw case, too. The Visitor pattern in JHotDraw allows to, for instance, insert or delete figures into or from composite figures, such as drawings. To realize this functionality, the top level interface for figure elements (Figure) defines the Visitable role. The role is tangled with the other concerns common to figures, such as drawing the figure. The one member of Figure specific to the Visitable role is visit(FigureVisitor)10 . This will be part of a virtual interface definition for the super-imposed role of Visitable for figure elements. Additionally, we can document the Visitor role defined by the FigureVisitor interface. One of the two implementations of the method for accepting visitors corresponds to composite figures and passes the visitor to all the child-figures. Composite figures in JHotDraw extend the CompositeFigure abstract class, which defines and implements the method for manipulating childfigures. These methods are specific to the Composite role, in the pattern with the same name, but tangled with the definition of figure-specific methods. A new virtual interface definition for Role superimposition, which to include the methods for children manipulation, helps us to document this crosscutting concern. The Add variability instance discussed for the Visitor pattern in Section 5 is not applicable to this implementation of the pattern. 10 The name of the method could be misleading, as it corresponds to the accept method in the GoF desciption of the pattern TUD-SERG-2006-010 SERG Decorator Marin – Formalizing typical crosscutting concerns JHotDraw supports decoration of figures with borders and animations through the use of the Decorator pattern. An abstract class, DecoratorFigure, defines the decorator interface and the set of methods forwarding the requests to the decorated figure. Concrete decorators extend the interface and override some of the methods to add specific functionality. The pattern’s implementation is a standard example of Redirection layer sort instance. We document the instance accordingly, by specifying in the query template the DecoratorFigure type and its field that stores the reference to the decorated Figure. The query returns all the methods in the Decorator that consistently redirect their calls to the reference of the decorated figure. The specification and the results of the query are also shown in Figure 4. DrawingEditor mediator by using the Observer pattern: the two types of elements register themselves as listeners of the mediator and receive notifications of changes of other colleagues. The DrawingEditor interface defines the Subject role in the context of the Observer pattern for allowing the mediator to communicate with the colleague objects. We document this role by using (a virtual interface definition for) Role Superimposition. This also documents the Mediator role. The calls to the notification mechanism (the figureSelectionChanged method in DrawingEditor ) are an instance of the Consistent behavior sort. The context for the Consistent Behavior instance is given by the union of the three hierarchies defining the Colleague roles: Tool, Command, and DrawingView. This is one of the several instances of the Observer pattern that we have documented, one of them being shown in Figure 1, for listeners to changes in figure elements. State Prototype The Tool elements in JHotDraw realize an implementation of the State pattern in the the context of DrawingView s. The Tool and DrawingView interfaces define the State and Context roles, respectively, which we describe by simple instances of the Role Superimposition sort. The collaborations in the implementation of this pattern instance are, however, more complex: A DrawingView knows its DrawingEditor and through this it gets access to the active Tool object. The tools consistently notify the editor at the end of their interaction by invoking the editor’s toolDone method. The notification results in re-setting the active tool to the default one. The consistent (notification) behavior is a concern that crosscuts the tool elements. To describe the concern using sorts, we query for the calls to the editor’s toolDone method and restrict the query’s context to the Tool hierarchy. Most of the documented calls originate from mouse events in the Tool classes. The mouse events are initiated by the objects defining the State context, like a DrawingView forwards all its input events to the editor’s active tool. The forwarding operation is an instance of the Redirection layer sort. To document this concern, we query for the references from mouse events listeners in the context class to the return type of the method providing the access point to the tool (i.e., Tool DrawingView.tool()). This query, however, will return no result because of the signature mismatch between the redirecting (delegator) method, and the method to redirect to: for example, the mouseReleased(..) method of the listener calls the tool’s mouseUp(..) method, and mousePressed calls mouseDown(..). This is a limitation of the tool in documenting redirection behavior. One implementation of the Prototype pattern covers Figure elements and specific Tool elements, namely CreationTool s to create new figures from a specified prototype. The Figures explicitly (re-)declare the inherited Object’s clone method; hence, documenting the Prototype role using sort instances only requires to define a virtual interface declaring this method. To allow cloning using the Java mechanism, the Figure interface has to extend Java’s Cloneable interface. Although the interface does not declare any member, the extension declaration is part of a crosscutting concern that we document by a Role superimposition instance realized through the Cloneable interface in the context of the Figure hierarchy. Other client types using (particular) Figure prototypes include ConnectionTool and ConnectionHandle. Mediator and Observer The DrawingEditor element discussed above is participant in an implementation of the Mediator pattern by defining the interface to coordinate the different objects that participate in an editor. The participating elements (i.e., the Colleague objects) are Tool, Command, or DrawingView objects. Each of the three types defines accessor methods for the mediator object: these methods are part of the Colleague role and we document them as instances of the Role Superimposition sort by declaring virtual interfaces for the methods of interest. The Tool and Command elements communicate with the TUD-SERG-2006-010 Command The Command pattern is implemented by 40 elements in the Command hierarchy; half of these are anonymous classes. The Command classes implement the Command role in the pattern. The role can be described as an instance of the Role superimposition sort. The Receiver functionality varies for the different commands: some of them have associated a specialized Receiver, while others directly implement the command’s logic (e.g., AlignCommand ). A common receiver for commands are the Figure or Drawing elements as, for instance, for BringToFront and SendToBack-Command s. However, many commands do not carry out only a single forwarding, and the actions they delegate to are not always dedicated to the delegating command; that is, describing the Receiver role as super-imposed is often a per-case decision. We document the Receiver role, for instance, in the DrawApplication class. The class implements a method to create the standard menus of the JHotDraw drawings editor. Each menu is associated an anonymous command whose execute method delegates execution to dedicated actions in the DrawApplication class. These actions define the Receiver role, which we describe in a sort-query using a virtual interface definition (in the context of the same class). A group of Command-Invoker elements consists of MenuItems and Buttons. These elements interface the associated commands by listening for action events and triggering the execution of commands. We document this behav- 15 SERG Marin – Formalizing typical crosscutting concerns ior with instances of the Interface layer sort. Furthermore, the Command invokers implement the ActionListener interface whose unique method, actionPerformed, consistently invokes the execute method of the associated command. This is an instance of Consistent behavior. The Command hierarchy also exhibits several other crosscutting concerns, less relevant to the pattern itself: The named commands conduct a pre-condition check before execution, and a consistent notification at the end of their execution. These concerns are instances of the Contract enforcement and Consistent behavior sorts, respectively. Commands make use of support classes to implement undo functionality, as discussed in Section 4. The undo support also requires a proper, consistent initialization, which is a consistent behavior crosscutting the execute methods of the Command classes. Adapter The Adapter pattern is implemented by the Handle elements, which adapt Figures to a common interface accessed by Tool objects. Handles allow tools, like selection tools, to manipulate figures. The implementation of the Adapter pattern is based on object composition: the handle element stores a reference to its owning figure and defines an accessor method to this reference. The tool client (HandleTracker ) delegates mouse events to specific methods in the Handle interface, which in turn translates the events into actions directed to the handle’s figure. The identified crosscutting elements to be described by sort queries include the Adapter role in Handle classes to access the reference to the Adaptee (i.e., Figure). We use for this a virtual interface definition that declares the accessors method for the Adaptee reference. Although the implementation of handles is aimed at translating events into actions for figure elements, it does not follow consistent rules for redirecting functionality to the adaptee. Such a rule is apparent in the implementation of the client tool: mouse events are redirected to dedicated methods declared by the Handle interface; however, each mouse event (up, drag, down) delegates to a method with a different signature (invokeStart, invokeStep and invokeEnd). Due to limitations in the tool implementation (and the query template for the redirection layer sort), the concern remains undocumented. Nevertheless, Handles act as an interfacing layer for figures: the actions carried out by handles are in fact operations in the Figure objects. For instance, the PolygonScaleHandle for scaling and rotating PolygonFigures relies on the scaleRotate method in the Figure class to answer mousedrag events. Iterator and Singleton The FigureEnumertor class participates in the implementation of multiple patterns. The class acts as an Adapter for the standard Java Iterator, implements the Singleton pattern, and the Aggregate role in the Iterator pattern. The Singleton role is documented through a virtual interface declaring the singleton member and the method to access it. We further document the references to this method as a consistent behavior for accessing the functionality of a FigureEnumerator object. A design enforcement sort instance indicates that the class should declare (only) a private constructor. However, this implementation of the pattern 16 Figure 5: Collaborations in JHotDraw uses a public constructor for resetting the Singleton. This is rather atypical. The access method to the unique instance of FigureEnumerator is also part of the Agregate role in the context of the Iterator pattern, which is documented by a Role superimposition instance. 8. DISCUSSION The experiments conducted for describing crosscutting concerns as sort instances in complex cases, like design patterns, proved that sorts were effective in most of the cases. The analysis carried out on different sample implementations of design patterns [8, 10], as well as on real systems, like JHotDraw, shows that sorts cover well the crosscuting concerns described in literature by various authors. Moreover, we covered a larger variety of concerns with the examples shown in the proposed catalog. The sort queries and their tool support can be improved in several cases. The query for the Redirection layer sort, for instance, was not flexible enough for the cases where the methods in the redirecting layer had different names than the target methods. This limitation is due to the name matching criteria, also common in many aspect-oriented languages, such as AspectJ. However, this matching is a common practice and we expect it to be present in most cases. The formalization of the context to restrict the domain of a relation can benefit from more flexible definitions as well. Although the tool support for sort queries allows to define contexts as enumerations of program elements, like classes, packages, etc., elegant formalization of contexts give a clearer description of the concern. Since context definitions are often similar to pointcuts definitions in aspectoriented languages, improved support for defining pointcuts is equally useful for expressing contexts. We mainly used structural relations for formalizing the definition of a query’s context; however, many aspect (query) languages also allow for definitions that use name-based criteria, such as all methods whose name starts with get. Another extension could consist of using support for source code annotations to relate elements in a context by a common intent, like modifiers of the Subject state in implementations of the Observer pattern. TUD-SERG-2006-010 SERG The catalog of crosscutting concern sorts can contribute to aspect refactoring efforts and extension of query languages for aspect-oriented programming. For instance, sorts like Design enforcement cannot be expressed by CME’s query language or aspect languages like AspectJ. The sort instances allow to group elements participating in relevant crosscutting relations, which are not explicit in source code. In this respect, the sorts are modular units comparable with aspects. However, sorts are mainly aimed at supporting crosscutting concern comprehension by describing atomic elements in a standard, consistent way. Such elements can be associated template refactoring solutions based on their description provided by sort queries. This is a first step towards refactoring concerns to more complex aspect solutions. The sorts describe crosscutting concerns both intentionally and extentionally. The extent of the concern consits of the elements captured by the sort query. The intent is given by the query itself. New elements to be added to a system should be aware of the intent of the concerns documented by sort queries and be consistent with existent rules and policies. To this end, the user should be able to query the concern model for concerns that “touch” program elements of interest to a development or maintainance task. 9. Marin – Formalizing typical crosscutting concerns [6] [7] [8] [9] [10] [11] CONCLUSIONS This paper proposed a system for addressing crosscutting functionality in source code based on crosscutting concern sorts. Such a system can provide consistency and coherence for referring and describing crosscutting concerns. As a result, sorts are useful in program comprehension and areas like aspect mining and refactoring. We have described crosscutting concern sorts as relations between sets of program elements and formalized these relations through a query component. We have organized the sorts in a catalog and discussed each sort in significant detail, describing specific implementation idioms and examples of concrete instances. Sorts have been assessed for crosscutting relations present in design patterns and in a real application system. [12] [13] [14] [15] [16] 10. ACKNOWLEDGMENTS I thank Arie van Deursen, Juri Memmert and anonymous reviewers for comments and feedback on this and earlier versions of this work. 11. REFERENCES [1] The AspectJ Team. The AspectJ Programming Guide. Palo Alto Research Center, 2003. Version 1.2. [2] M. Ceccato, M. Marin, K. Mens, L. Moonen, P. Tonella, and T. Tourwé. A Qualitative Comparison of Three Aspect Mining Techniques. In Proceedings 13th International Workshop on Program Comprehension (IWPC 2005), Los Alamitos, CA, 2005. IEEE Computer Society. [3] L. Cole and P. Borba. Deriving Refactorings for AspectJ. In Proc. Int. Conf. on Aspect-Oriented Software Development (AOSD), Mar. 2005. [4] P. Deransart, A. Ed-Dbali, and L. Cervoni. Prolog, The Standard : Reference Manual. Springer Verlag, 1996. [5] M. Eichberg, M. Haupt, M. Mezini, and T. Schäfer. Comprehensive software understanding with sextant. TUD-SERG-2006-010 [17] [18] [19] [20] [21] In ICSM ’05: Proceedings of the 21st IEEE International Conference on Software Maintenance (ICSM’05), pages 315–324, Washington, DC, USA, September 2005. IEEE Computer Society. M. Eichberg, M. Mezini, T. Schäfer, C. Beringer, and K.-M. Hamel. Enforcing system-wide properties. In P. Strooper, editor, 2004 Australian Software Engineering Conference, pages 158–167, Melbourne, Australia, April 2004. IEEE Computer Society. R. E. Filman, T. Elrad, S. Clarke, and M. Akşit, editors. Aspect-Oriented Software Development. Addison-Wesley, Boston, 2005. E. Gamma, R. Helm, R. Johnson, and J. Vlissides. Design Patterns: Elements of Reusable Object-Oriented Software. Addison-Wesley, Reading, MA, 1994. J. Hannemann. Role-Based Refactoring of Crosscutting Concerns. PhD thesis, Faculty of Graduate Studies, University of British Columbia, Nov. 2005. J. Hannemann and G. Kiczales. Design Pattern Implementation in Java and AspectJ. In Proceedings of the 17th Annual ACM conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA), pages 161–173, Boston, MA, 2002. ACM Press. W. Harrison, H. Ossher, S. M. S. Jr., and P. Tarr. Concern Modeling in the Concern Manipulation Environment. In IBM Research Report RC23344, Yorktown Heights, NY, 2004. IBM Thomas J. Watson Research Center. J. Hughes. Why functional programming matters. Comput. J., 32(2):98–107, 1989. G. Kiczales, E. Hilsdale, J. Hugunin, M. Kersten, J. Palm, and W. G. Griswold. An overview of aspectj. In ECOOP ’01: Proceedings of the 15th European Conference on Object-Oriented Programming, pages 327–353, London, UK, 2001. Springer-Verlag. G. Kiczales, J. Lamping, A. Mendhekar, C. Maeda, C. Lopes, J.-M. Loingtier, and J. Irwin. Aspect-oriented programming. In 11th Europeen Conf. Object-Oriented Programming, volume 1241 of LNCS, pages 220–242. Springer Verlag, 1997. R. Laddad. Aspect-Oriented Refactoring. www.theserverside.com, Dec. 2003. R. Laddad. AspectJ in Action - Practical Aspect Oriented Programming. Manning Publications Co., Greenwich, CT, 2003. M. Marin, A. van Deursen, and L. Moonen. Identifying Aspects using Fan-In Analysis. In Proceedings of the 11th Working Conference on Reverse Engineering (WCRE2004)., pages 132–141, Los Alamitos, CA, 2004. IEEE Computer Society Press. M. Marin, L.Moonen, and A. van Deursen. A classification of crosscutting concerns. In Proceedings International Conference on Software Maintenance (ICSM 2005). IEEE Computer Society, 2005. M. Marin, L. Moonen, and A. van Deursen. An approach to aspect refactoring based on crosscutting concern types. In Int. Workshop on the Modeling and Analysis of Concerns in Software, ICSE. Software Engineering Notes (volume 30, issue 4), 2005. M. Monteiro and J. Fernandes. Towards a Catalog of Aspect-Oriented Refactorings. In International Conference on Aspect-Oriented Software Development, 2005. D. Riehle and T. Gross. Role model based framework design and integration. In Proceedings of the 13th 17 Marin – Formalizing typical crosscutting concerns [22] [23] [24] [25] 18 SERG ACM SIGPLAN OOPSLA:, pages 117–133, New York, NY, USA, 1998. ACM Press. M. Robillard and G. Murphy. Concern Graphs: Finding and Describing Concerns. In Proc. Int. Conf. on Software Engineering (ICSE). IEEE, 2002. S. Soares, E. Laureano, and P. Borba. Implementing Distribution and Persistence Aspects with AspectJ. In Proc. 17th Conf. on Object-oriented programming, systems, languages, and applications. ACM Press, 2002. P. Tarr, W. Harrison, and H. Ossher. Pervasive Query Support in the Concern Manipulation Environment. In IBM Research Report RC23343, Yorktown Heights, NY, 2004. IBM Thomas J. Watson Research Center. P. Tarr, H. Ossher, W. Harrison, and J. Stanley M. Sutton. N degrees of separation: multi-dimensional separation of concerns. In ICSE ’99: Proceedings of the 21st international conference on Software engineering, pages 107–119, Los Alamitos, CA, USA, 1999. IEEE Computer Society Press. TUD-SERG-2006-010 SERG Marin – Formalizing typical crosscutting concerns APPENDIX A. AN ASPECTJ SOLUTION TO THE VISITOR PATTERN This example shows a simplified AspectJ solution for a pricing visitor: any call to the getPrice method of a (Composite)Equipment object are advised for building a Visitable object and pass it to visitors that just invoke the accept method of the passed argument. pointcut price(Equipment equipment): call(int Equipment+.getPrice()) && target(equipment); int around(final Equipment equipment) : price(equipment) { Visitable visitable = new Visitable() { public void accept(EquipmentPriceVisitor v) { if(equipment instanceof CompositeEquipment) { List subcomponents = equipment.getComponents(); for(int i=0; i<subcomponents.size(); i++) (((Equipment)subcomponents.get(i))).getPrice(); } v.addToPrice(proceed(equipment)); } }; visitor.visitEquipment(visitable); return visitor.getTotalPrice(); } TUD-SERG-2006-010 19 Marin – Formalizing typical crosscutting concerns 20 SERG TUD-SERG-2006-010 TUD-SERG-2006-010 ISSN 1872-5392 SERG
2cs.AI
1 On the state space and dynamics selection in linear stochastic models: a spectral factorization approach arXiv:1802.00253v1 [cs.SY] 1 Feb 2018 Augusto Ferrante and Giorgio Picci Abstract—Matrix spectral factorization is traditionally described as finding spectral factors having a fixed analytic pole configuration. The classification of spectral factors then involves studying the solutions of a certain algebraic Riccati equation which parametrizes their zero structure. The pole structure of the spectral factors can be also parametrized in terms of solutions of another Riccati equation. We study the relation between the solution sets of these two Riccati equations and describe the construction of general spectral factors which involve both zeroand pole-flipping on an arbitrary reference spectral factor. I. I NTRODUCTION An important and widely used class of models in control engineering and signal processing describes an m-dimensional observed random signal {y(t)} as output of a linear system driven by white noise:  x(t + 1) = Ax(t) + Bw(t) (1) y(t) = Cx(t) + Dw(t) where A ∈ Rn×n , B ∈ Rn×m , C ∈ Rm×n , D ∈ Rm×m , w is a normalized white noise. The n-dimensional signal x is the state vector. The basic steps for the constructions of models of the form (1) from observations of {y(t)} lead to the following three problems which in various forms permeate all linear systems and control theory: 1) Estimate the spectral density Φy (z) of y, see [5], [8], [9], [15]–[17] and references therein. 2) Compute a stochastically minimal1 spectral factor of Φy (z), i.e. a matrix transfer function W (z) such that Φy (z) = W (z)W ⊤ (z −1 ), (2) see [2], [3] and references therein. 3) Fix a minimal realization W (z) = C(zI − A)−1 B + D to provide a parametrization of the model (1). The literature on these topics being enormous we have chosen to quote only a few recent papers in which one can find a more extensive bibliography. The study of models (1) of the signal y without a priori constraints of causality or analiticity is exposed in the recent book [11]. The objective of this paper is to continue the analysis and study in more depth the relations among different models (1) which are in a sense equivalent as they serve to represent the same process but may have different system-theoretic structure and properties. A. Ferrante and G. Picci are with the Department of Information Engineering, University of Padova, via Gradenigo 6/B, 35131 Padova, Italy; e-mail: [email protected], [email protected] 1 Stochastic minimality means that we are only interested in models of minimal complexity so that we only consider spectral factors W (z) of minimal McMillan degree. Indeed, representations (1) have several degrees of freedom. The most obvious (and least interesting) one is the choice of basis in the input and in the state space. In particular, the matrices A, B, C, D in step 3. are determined up to a transformation of the form T −1 AT, T −1 BU, CT, DU where T is an arbitrary invertible matrix and U is an arbitrary orthogonal matrix. Once these degrees of freedom are factored out, we are left with two more interesting objects: A. The state space as a coordinate free representative of a model (1) B. The (dynamical) causality structure (related in particular the choice of direction of the time arrow) of equivalent models. One of the key result of stochastic realization theory (see [11]) is that these two choices correspond, respectively, to the choice of zeros and poles of the spectral factor W (z) in (2). Each pole configuration of the spectral factor corresponds to a certain causality structure so that, once this configuration is fixed, one is left with the choice of the zero structure of the spectral factor, which just means choosing a (minimal) state space of the realization. Matrix spectral factorization is traditionally described as finding spectral factors having a fixed analytic pole configuration so that all corresponding models are causal, and classifying different models corresponds to parametrizing all possible zero structures of W . However, a zero structure fixes, independent of causality, a possible minimal state space2 for y. Hence, once a minimal state space (i.e. the zero structure of W ) is fixed, there is a whole family of possible causality structures which can be parametrized by the allowed pole locations of a spectral factor W . If some minimal reference spectral factor is fixed, minimal spectral factorization can be seen as a zero- or pole- flipping transformation performed on the reference factor. In this paper we analyse the interplay between this two operations in relation to the solutions sets of two families of algebraic Riccati equations. We derive closed-form formulas that allow to compute the model corresponding to a given causality structure and state space. This may be viewed as the completion of an endeavour first undertaken in [12] in continuous time but not pushed to the final consequences. Here we shall address the discrete-time situation and give a complete solution. Although our main motivation is stochastic modelling, our contribution can also be viewed as related to algebraic Riccati equations and to spectral factorization. Both have important applications in several areas of control, signal processing and 2 We stress that the choice of the state space must not be confused with the choice of basis in Rn . 2 system theory. Some technical assumptions of this paper could probably be weakened however most probably at the expense of clarity. For pedagogical reasons we have decided to work in a setting which reduces complications to a minimum. II. BACKGROUND ON SPECTRAL FACTORIZATION AND A LGEBRAIC R ICCATI EQUATIONS Let Φ(z) be a m × m rational spectral density matrix of a regular stationary process, where regularity is meant in the sense explained in [11, Sec. 6.8] and let W (z) := C(zI − A)−1 B + D (3) be a minimal realization of a minimal square spectral factor of Φ(z) so that Φ(z) = W (z)W (z)∗ , where W (z)∗ := W (z −1 )⊤ is the conjugate transpose. By regularity the matrix D is non singular, [6]; it will be assumed to be symmetric and positive definite: this rules out the uninteresting degree of freedom corresponding to multiplying a spectral factor on the right side by a constant orthogonal matrix. By regularity the numerator matrix Γ := A − BD−1 C is non-singular (see Theorem 6.8.2 in [11]). In this paper we shall moreover assume that both A and Γ are unmixed. Note in particular that we do not assume analiticity of W (z) outside of the unit disk. For the relevant definitions and facts about spectral factorization in this context we shall refer to Chap 16 of the book [11]. Definition 2.1: Let Wi (z) ; i = 1, 2 be minimal spectral factors of the same rational spectral density. We shall say that W1 (z) and W2 (z) have the same pole structure if they admit a state space realization with the same state transition matrix. Likewise, we say that W1 (z) and W2 (z) have the same zero structure if they admit a state space realization with the same numerator matrix. In classical spectral factorization one assumes that a the state matrix A has all eigenvalues inside the unit circle and one aims at classifying all different minimal spectral factors having a fixed (analytic) pole structure, in terms of their zero structure, equivalently, in terms of invariant subspaces for the transpose of the numerator matrix Γ. It is well-known that this involves the study of an algebraic Riccati equation. In the present context we have the following result, which has appeared in several places in the literature. Proposition 2.1: Let W0 (z) := C(zI − A)−1 B + D be a minimal realization of a square reference spectral factor. 1) There is a one-to-one correspondence between symmetric solutions of the homogeneous algebraic Riccati equation P = ΓP Γ⊤ − ΓP C ⊤ (DD⊤ + CP C ⊤ )−1 CP Γ⊤ (4) and minimal spectral factors of Φ(z) having the same pole structure of W0 (z). This correspondence is defined by the map assigning to each solution P the spectral factor WP (z) := C(zI − A)−1 BP + DP where BP := (BD⊤ + AP C ⊤ )(DD⊤ + CP C ⊤ )−1/2 ; DP := (DD⊤ + CP C ⊤ )1/2 . (5) (6) 2) There is a one-to-one correspondence between symmetric solutions of (4) and Γ⊤ -invariant subspaces which is defined by the map assigning to each solution P the Γ⊤ invariant subspace ker(P ). For a proof we shall just refer the reader to Corollary 16.5.7 and Lemma 16.5.8 in [11] where the equation differs by an inessential change of sign. A similar Riccati equation although in a different context is studied in [14].3 In particular, let P+ be the unique non singular solution of (4), then the corresponding Γ⊤ −invariant subspace ker P+ is trivial and the zeros of W0 (z) are all flipped to reciprocal positions. This follows from standard Riccati theory. We shall denote the corresponding spectral factor by W+ (z). Zero-flipping can also be visualized as right-multiplication of W0 (z) by a suitable square all-pass function so as to preserve minimality. The entailed factorization of WP (z) is in turn uniquely identified by the existence of a Γ⊤ −invariant subspace [4]. On the other hand, we have the following fact which describes the pole-flipping relation among spectral factors keeping a fixed zero structure. The result can be traced back to Theorem 16.4.2 of [11]. Proposition 2.2: Let W0 (z) := C(zI − A)−1 B + D be a minimal realization of a square reference spectral factor. 1) There is a one-to-one correspondence between symmetric solutions of the algebraic Riccati equation Q = A⊤ QA − A⊤ QB (I + B ⊤ QB)−1 B ⊤ QA , (7) and minimal normalized spectral factors having the same zero structure of W0 (z). This correspondence is defined by the map assigning to each solution Q the spectral factor WQ (z) := CQ (zI − AQ )−1 BQ + DQ , where (8) ∆Q := I + B ⊤ QB , ⊤ CQ := C − D∆−1 Q B QA , ⊤ AQ := A − B∆−1 Q B QA , BQ := DQ := (9) −1/2 B∆Q U , −1/2 D∆Q U , and U is the orthogonal matrix −1/2 ⊤ U := (D∆Q −1/2 ) ((D∆Q −1/2 ⊤ −1/2 )(D∆Q ) ) which is selected in such a way that DQ is symmetric and positive definite. 2) There is a one to one correspondence between symmetric solutions of (7) and A-invariant subspaces which is defined by the map assigning to each solution Q the Ainvariant subspace ker(Q). 3 Any solution P can actually be seen as the difference say X − X of 0 two arbitrary solutions of an equivalent Riccati equation parametrizing the minimal spectral factors which is defined directly in terms of a realization of Φ and does not involve a reference spectral factor, see [11, Sect. 16.5]. Here X0 is kept fixed as a reference solution and Γ describes the zero structure of the reference spectral factor W0 . 3 Proof. That the zero structures of WQ (z) and of W0 (z) coincide is the content of Theorem 16.4.5 in [11]. The rest is readily checked.  III. C OMBINING POLE AND ZERO FLIPPING We want to understand the combination of zero- and poleflipping leading to an arbitrary minimal square spectral factor W . To this end let’s consider the spectral factor WQ (z) defined in (8) as a reference spectral factor and describe the zeroflipping process on WQ (z). By direct computation we easily find that the numerator matrix of WQ (z) is the same of the numerator matrix of W0 (z), i.e. the matrix Γ. Hence the Riccati equation (4) corresponding to WQ (z) takes the form ⊤ ⊤ −1 ⊤ ) CQ PQ Γ⊤ PQ = ΓPQ Γ⊤ − ΓPQ CQ (DQ DQ + CQ PQ CQ (10) −1/2 where CQ is as defined in (9) and DQ := D∆Q U . Notice that, since equations (4) and (10) involve the same matrix Γ and each symmetric solution of either equation is uniquely attached to a Γ⊤ -invariat subspace [13], the map assigning to each solution P of (4) the solution PQ of (10) such that ker(P ) = ker(PQ ) is a one to one correspondence between the set P and the set PQ of symmetric solutions of (4) and (10). Our main contribution is to analyze the relations between P and PQ and to provide an explicit formula to compute the solution PQ from a give pair P, Q. In this way once parametrized the solutions of (4) and (7), we do not need to solve (10) and we have a closed-form formula for the spectral factor with assigned pole and zero structure, or equivalently for the model with assigned state-space and causality structure. We may of course consider a dual path to transform W0 into W by taking instead the zero-flipped WP as a reference and flipping poles by considering a solution QP of a Riccati equation similar to (7) so as to make the following diagram commutative: P W0 −−−−→ WP    Q Qy y P (11) WQ −−−−→ W PQ The resulting spectral factor should have been denoted WP Q but the simplified notation W here should not be cause of confusion. It is well-known that both (4) and (10) have a unique non-singular solution which we denote by P+ and PQ+ , respectively. The relation between these two solutions is the content of the following lemma. Lemma 3.1: The nonsingular solutions P+ and PQ+ are related by the formula −1 PQ+ = Q + P+−1 . (12) Proof. It is immediate to check that P+−1 is the (unique) solution of the discrete-time Lyapunov equation P+−1 − Γ⊤ P+−1 Γ + C ⊤ D−⊤ D−1 C = 0. (13) −1 Similarly, PQ+ is the (unique) solution of the discrete-time Lyapunov equation −1 −1 ⊤ −⊤ −1 PQ+ − Γ⊤ PQ+ Γ + CQ DQ DQ CQ = 0. (14) −1 Therefore, the difference ∆ := PQ+ − P+−1 is the (unique) solution of the discrete-time Lyapunov equation ⊤ −⊤ −1 ∆ − Γ⊤ ∆Γ + CQ DQ DQ CQ − C ⊤ D−⊤ D−1 C = 0. (15) We now compute RQ ⊤ −⊤ −1 DQ DQ CQ − C ⊤ D−⊤ D−1 C := CQ = ⊤ C ⊤ D−⊤ ∆Q D−1 C + A⊤ QB∆−1 Q B QA −C ⊤ D−⊤ B ⊤ QA − A⊤ QBD−1 C = −C ⊤ D−⊤ D−1 C C ⊤ D−⊤ B ⊤ QBD−1 C − C ⊤ D−⊤ B ⊤ QA ⊤ −A⊤ QBD−1 C + A⊤ QB∆−1 Q B QA = C ⊤ D−⊤ B ⊤ QBD−1 C − C ⊤ D−⊤ B ⊤ QA −A⊤ QBD−1 C + A⊤ QA − Q = Γ⊤ QΓ − Q This equation, together with (15) gives ∆ − Γ⊤ ∆Γ = Q − Γ⊤ QΓ and, by uniqueness, follows. −1 ∆ := PQ+ − P+−1 = Q, (16) so that (12)  Since ker P+ = {0}, all zeros of the corresponding spectral factor, denoted by the symbol W+ (z), are those of W0 flipped to their reciprocals. The same happens for WQ whatever solution Q of (7) is chosen. In particular, denoting the nonsingular solution of (7) by Q+ , all poles of the corresponding spectral factor, say W̄0 (z), will be the reciprocals of those of W0 (z). The commutative diagram (11) takes on the form P+ W0 −−−−→ W+   [QP ]+  Q+ y y + W̄0 −−−−−→ W̄+ [PQ+ ]+ where [QP+ ]+ and [PQ+ ]+ are the invertible solutions of the Riccati equations which are respectively flipping the poles of W+ (z) and the zeros of W̄0 (z). Hence, both poles and zeros of W̄+ are the reciprocals of those of W0 (z). This corresponds to “total” flipping of singularities. We would now like to derive an explicit formula generalizing (12) to a generic solution PQ expressed as a function of P and Q. To this end we shall use the following lemma which is a particular case of [1, Theorem 2.2]. An analogous result is Statement 1. (iii) of Theorem 3.1 in [7] although referring to the specific case of all-pass functions. Lemma 3.2: Any solution P of the Riccati equation (4) corresponding to a Γ⊤ -invariant subspace S can be expresses by the formula  † (17) P = (I − ΠS )P+−1 (I − ΠS ) 4 where † denotes Moore-Penrose pseudoinverse and ΠS is the orthogonal projector onto the subspace S = ker P . We are now ready to present our main result. Theorem 3.1: Let P be an arbitrary solution of (4). Then the unique solution PQ of (10) such that ker(P ) = ker(PQ ) can be expressed by the formula PQ = [P P † QP P † + P † ]† (18) wich generalizes (12). Proof. Since (I − ΠS ) projects onto the range space of P , a basic property of the Moore-Penrose pseudoinverse [10, P. 421] implies that (I−ΠS ) = P P † so that (17) can be rewritten  † P = P P † P+−1 P P † and hence P † = P P † P+−1 P P † . (19) Now, since P and PQ have the same kernel they also have the same image so that the orthogonal projectors on this image may be written in two ways as: I − ΠS = P P † = PQ PQ† . (20) Thus, the analog of formula (17) for PQ yields i† h i† h −1 −1 PQ = (I − ΠS )PQ+ (I − ΠS ) = P P † PQ+ (21) PP† where PQ+ is the only non-singular solution of (10) (such a solution corresponds to the Γ⊤ -invariant subspace {0}). Hence, after inserting (12), we get PQ = [P P † (Q + P+−1 )P P † ]† , and, finally, by using (19) we obtain the following explicit expression for PQ depending only on P and Q: PQ = [P P † QP P † + P † ]† . (22)  Finally, let us consider two arbitrary Γ⊤ and A- invariant subspaces X and Y which is to say two arbitrary zero and pole flipping transformations of the singularities of W0 (z) or, equivalently, an arbitrary state space and causality configuration for the model (1). Suppose we want to compute the corresponding minimal spectral factor W (z), or equivalently the corresponding model (1). Let P and Q be the solutions of the Riccati equations (4) and (7) corresponding to the invariant subspaces X and Y and consider the left lower path in the commutative diagram (11) so that the zero flipping is done after a pole flipping defined by Q. The relevant Riccati solution PQ is given in formula (18) so that the desired realization of W (z) can be explicitly written in closed form as WQ (z) := CQ (zI − AQ )−1 BPQ + DPQ (23) where ⊤ ⊤ ⊤ ⊤ −1/2 + AQ PQ CQ )(DQ DQ + CQ PQ CQ ) BPQ := (BQ DQ ⊤ ⊤ 1/2 + CQ PQ CQ ) , DPQ := (DQ DQ (24) PQ is given by (18) and AQ , BQ , CQ , DQ are given by (9). Naturally, an analogous procedure would work by following the upper right path; i.e. computing first P and then performing the appropriate pole flipping defined by QP . C ONCLUSION We have discussed the classification of general (not necessarily analytic) square spectral factors in terms of the solutions of two algebraic Riccati equations. We have also described the construction of general spectral factors which involve both zero- and pole-flipping on an arbitrary reference spectral factor. R EFERENCES [1] D. Alpago and A. Ferrante, Families of Solutions of Algebraic Riccati Equations. Submitted to Automatica. Preprint available at arXiv:1801.09557, 2018. [2] G. Baggio, and A. Ferrante. On Minimal Spectral Factors with Zeroes and Poles lying on Prescribed Regions. IEEE Trans. Automatic Control. Vol. AC-61(8):2251–2255, DOI: 10.1109/TAC.2015.2484330, 2016. [3] G. Baggio, and A. Ferrante. On the Factorization of Rational DiscreteTime Spectral Densities. IEEE Trans. Automatic Control. Vol. AC61(4):969–981, DOI: 10.1109/TAC.2015.2446851, 2016. [4] H. Bart, I. Gohberg and R. Kaashoek, Minimal Factorization of Matrix and Operator Functions, Operator Theory 1, Birkhäuser Verlag, Basel 1984. [5] A. Ferrante, C. Masiero, and M. Pavon. Time and Spectral Domain Relative Entropy: A New Approach to Multivariate Spectral Estimation. IEEE Trans. Automatic Control. Vol. AC-57(10):2561–2575, 2012. [6] A. Ferrante, G. Picci, and S. Pinzoni. Silverman Algorithm and the Structure of Discrete-Time Stochastic Systems. Linear Algebra and its Applications. Vol. 351–352:219–242, 2002. [7] A. Ferrante and G. Picci, Representation and Factorization of DiscreteTime Rational All-Pass Functions, IEEE Transactions on Automatic Control, vol. 62, No. 7, July 2017. [8] T. Georgiou. Spectral analysis based on the state covariance: the maximum entropy spectrum and linear fractional parameterization. IEEE Trans. Aut. Control, 47:1811–1823, 2002. [9] T. Georgiou. Relative entropy and the multivariable multidimensional moment problem. IEEE Trans. Inform. Theory, 52:1052–1066, 2006. [10] R. A. Horn and C.R. Johnson Matrix Analysis Cambridge U.P. 1985. [11] A. Lindquist and G. Picci, Linear Stochastic Systems: A Geometric Approach to Modeling, Estimation and Identification, Springer series in Contemporary Mathematics, Heidelberg, Germany: Springer Verlag, 2015. [12] G. Picci and S. Pinzoni: Acausal Models and Balanced realizations of stationary processes Linear Algebra and its Applications, vol. 205–206, pp. 957–1003, 1994. [13] J. C. Willems, Least squares stationary optimal control and the algebraic Riccati equation, IEEE Transactions on Automatic Control, vol. 16: 621634, 1971. [14] Harald K. Wimmer, A Parametrization of Solutions of the Discretetime Algebraic Riccati Equation Based on Pairs of Opposite Unmixed Solutions SIAM Journal on Control and Optimization Vol. 44 n. 6, 2006. [15] M. Zorzi. A new family of high-resolution multivariate spectral estimators. IEEE Trans. Autom. Control, 59(4):892–904, Apr. 2014. [16] M. Zorzi. Multivariate Spectral Estimation based on the concept of Optimal Prediction. IEEE Trans. Autom. Control, 60:1647–1652, Jun. 2015. [17] M. Zorzi. Rational approximations of spectral densities based on the alpha divergence. Mathematics of Control, Signals, and Systems, 26(2):259–278, 2014.
3cs.SY
arXiv:1404.0352v1 [math.AG] 1 Apr 2014 CHERN CHARACTERS FOR TWISTED MATRIX FACTORIZATIONS AND THE VANISHING OF THE HIGHER HERBRAND DIFFERENCE MARK E. WALKER Abstract. We develop a theory of “ad hoc” Chern characters for twisted matrix factorizations associated to a scheme X, a line bundle L, and a regular global section W ∈ Γ(X, L). As an application, we establish the vanishing, in certain cases, of hR c (M, N ), the higher Herbrand difference, and, ηcR (M, N ), the higher codimensional analogue of Hochster’s theta pairing, where R is a complete intersection of codimension c with isolated singularities and M and N are finitely generated Rmodules. Specifically, we prove such vanishing if R = Q/(f1 , . . . , fc ) has only isolated singularities, Q is a smooth k-algebra, k is a field of characteristic 0, the fi ’s form a regular sequence, and c ≥ 2. Such vanishing was previously established in the general characteristic, but graded, setting in [16]. Contents 1. Introduction 2. Chern classes for generalized matrix factorizations 2.1. The Jacobian complex 2.2. Matrix factorizations 2.3. Connections for matrix factorizations and the Atiyah class 2.4. Ad hoc Hochschild homology 2.5. Supports 2.6. Chern classes of matrix factorizations 2.7. Functorality of the Chern character and the top Chern class 3. Relationship with affine complete intersections 3.1. Euler characteristics and the Herbrand difference for hypersurfaces 3.2. Matrix factorizations for complete intersections 4. Some needed results on the geometry of complete intersections 5. The vanishing of Chern characters 5.1. The vanishing of the top Chern class 5.2. The Polishchuk-Vaintrob Riemann-Roch Theorem 5.3. Vanishing of the higher h and η Invariants Appendix A. Relative Connections A.1. The classical Atiyah class A.2. The vanishing of the classical Atiyah class and connections References Date: April 2, 2014. 1 2 4 5 7 10 12 14 15 17 18 18 20 21 24 24 26 27 29 29 31 32 2 MARK E. WALKER 1. Introduction This paper concerns invariants of finitely generated modules over an affine complete intersection ring R. Such a ring is one that can be written as R = Q/(f1 , . . . , fc ), where Q is a regular ring and f1 , . . . , fc ∈ Q form a regular sequence of elements. For technical reasons, we will assume Q is a smooth algebra over a field k. More precisely, this paper concerns invariants of the singularity category, Dsg (R), of R. This is the triangulated category defined as the Verdier quotient of Db (R), the bounded derived category of R-modules, by the sub-category of perfect complexes of R-modules. More intuitively, the singularity category keeps track of just the “infinite tail ends” of projective resolutions of finitely generated modules. Since R is Gorenstein, Dsg (R) is equivalent to M CM (R), the stable category of maximal Cohen-Macaulay modules over R. Thanks to a Theorem of Orlov [19, 2.1], the singularity category of R is equivalent to the singularity category of the hypersurface Y of Pc−1 = Proj Q[T1 , . . . , Tc ] Q P c−1 is cut out by the element W = i fi Ti ∈ Γ(PQ , O(1)). Since the scheme Pc−1 Q regular Dsg (Y ) may in turn be given by the homotopy category of “twisted matrix factorizations” associated to the triple (Pc−1 Q , O(1), W ) (see [21], [15], [18], [23], [2]). In general, if X is a scheme (typically smooth over a base field k), L is a line bundle on X, and W ∈ Γ(X, L) is regular global section of L, a twisted matrix factorization for (X, L, W ) consists of a pair of locally free coherent sheaves E0 , E1 on X and morphisms d1 : E1 → E0 , d0 : E0 → E1 ⊗OX L such that each composite d0 ◦ d1 and (d1 ⊗ idL ) ◦ d0 is multiplication by W . In the special case where X = Spec(Q) for a local ring Q, so that L is necessarily the trivial line bundle and W is an element of Q, a twisted matrix factorization is just a classical matrix factorization as defined by Eisenbud [10]. Putting these facts together, we get an equivalence X fi Ti ) Dsg (R) ∼ , O(1), = hmf (Pc−1 Q i between the singularity category Pof R and the homotopy category of twisted matrix factorizations for (Pc−1 , O(1), i fi Ti ). The invariants we attach to objects of Q Dsg (R) for a complete intersection ring R are actually defined, more generally, in terms of such twisted matrix factorizations. In detail, for a triple (X, L, W ) as above, let us assume also that X is smooth over a base scheme S and L is pulledback from S. In the main case of interest, namely X = Pc−1 for a smooth k-algebra Q c−1 Q, the base scheme S is taken to be Pk . In this situation, we define a certain hoc ad hoc Hochschild homology group HHad (X/S, L, W ) associated to (X, L, W ). 0 Moreover, to each twisted matrix factorization E for (X, L, W ) we attach a class hoc ch(E) ∈ HHad (X/S, L, W ), 0 called the ad hoc Chern character of E. We use the term “ad hoc” since we offer no justification that these invariants are the “correct” objects with these names given by a more theoretical framework. But, if X is affine and L is the trivial bundle, then our ad hoc Hochschild homology groups and Chern characters coincide with the usual notions found in [9], [8], [22], [7], [25], [17], [26], [20]. In particular, in this case, our definition of the Chern character of a matrix factorization is given by the “Kapustin-Li formula” [14]. CHERN CHARACTERS FOR TWISTED MATRIX FACTORIZATIONS 3 When the relative dimension n of X → S is even, we obtain from ch(E) a “top Chern class” ctop (E) ∈ H 0 (X, JW ( n2 )) where JW is the “Jacobian sheaf” associated to W . By definition, JW is the dW ∧− n−1 coherent sheaf on X given as the cokernel of the map ΩX/S ⊗ L−1 −−−−→ ΩnX/S define by multiplication by the element dW of Γ(X, Ω1X/S ⊗OX L). The top Chern class contains less information than the Chern character in general, but in the affine case with L trivial and under certain other assumptions, the two invariants coincide. The main technical result of this paper concerns the vanishing of the top Chern class: Theorem 1.1. Let k be a field of characteristic 0 and Q a smooth k-algebra of even dimension. If f1 , . . . , fc ∈ Q is a regular sequence of elements with c ≥ 2 such that the singular locus of R = Q/(f1 , . . . , fc ) is zero-dimensional, then ctop (E) = 0 ∈ H 0 (X, JW ( n2 )) P for all twisted matrix factorizations E of (Pc−1 Q , O(1), i fi Ti ). As an application of this Theorem, we prove the vanishing of the invariants ηc and hc for c ≥ 2 in certain cases. These invariants are defined for a pair of modules M and N over a complete intersection R = Q/(f1 , . . . , fc ) having the property that ExtiR (M, N ) and ToriR (M, N ) are of finite length for i ≫ 0. For example, if the non-regular locus of R is zero-dimensional, then every pair of finitely generated modules has this property. In general, for such a pair of modules, the even and odd sequences of lengths of ExtiR (M, N ) and ToriR (M, N ) are governed, eventually, by polynomials of degree at most c − 1: there exist polynomials pev (M, N )(t) = ac−1 tc−1 + lower order terms podd (M, N )(t) = bc−1 tc−1 + lower order terms with integer coefficients such that 2i+1 lengthR Ext2i (M, N ) = podd (M, N )(i) R (M, N ) = pev (M, N )(i) and lengthR ExtR for i ≫ 0, and similarly for the Tor modules. Following Celikbas and Dao [4, 3.3], we define the invariant hc (M, N ) in terms of the leading coefficients of these polynomials: ac−1 − bc−1 hc (M, N ) := c2c The invariant ηc (M, N ) is defined analogously, using Tor modules instead of Ext modules; see [5]. If c = 1 (i.e., R is a hypersurface) the invariants h1 and η1 coincide (up to a factor of 12 ) with the Herbrand difference, defined originally by Buchweitz [1], and Hochster’s θ invariant, defined originally by Hochster [12]. In this case, ExtiR (M, N ) and TorR i (M, N ) are finite length modules for i ≫ 0 and the sequence of their lengths are eventually two periodic, and h1 and η1 are determined by the formulas R R R 2hR 1 (M, N ) = h (M, n) = length Ext2i (M, N ) − length Ext2i+1 (M, N ), i ≫ 0 and R 2η1R (M, N ) = θR (M, n) = length TorR 2i (M, N ) − length Tor2i+1 (M, N ), i ≫ 0. We can now state the main application of Theorem 1.1: 4 MARK E. WALKER Theorem 1.2. Let k be a field of characteristic 0 and Q a smooth k-algebra. If f1 , . . . , fc ∈ Q is a regular sequence of elements with c ≥ 2 such that the singular locus of R = Q/(f1 , . . . , fc ) is zero-dimensional, then hR c (M, N ) = 0 and ηcR (M, N ) = 0 for all finitely generated R-modules M and N . Acknowledgements. I am grateful to Jesse Burke, Olgur Celikbas, Hailong Dao, Daniel Murfet, and Roger Wiegand for conversations about the topics of this paper. 2. Chern classes for generalized matrix factorizations In this section, we develop ad hoc notions of Hochschild homology and Chern classes for twisted matrix factorizations. The connection with the singularity category for complete intersection rings will be explained more carefully later. Assumptions 2.1. Throughout this section, we assume • S is a Noetherian scheme. • p : X → S is a smooth morphism of relative dimension n. • LS is a locally free coherent sheaf of rank one on S. Let LX := p∗ LS , the pullback of LS along p. • W ∈ Γ(X, LX ) is global section of LX . Recall that the smoothness assumption means that p : X → S is flat and of finite type and that Ω1X/S is a locally free coherent sheaf on X of rank n. Assumptions 2.2. When discussing ad hoc Hochschild homology and Chern characters (see below), we will also be assuming: • p is affine and • n! is invertible in Γ(X, OX ). It is useful to visualize Assumptions 2.1 by a diagram. Let q : LS → SL denote the geometric line bundle whose sheaf of sections is LS ; that is, LS = Spec( i≥0 L−i S ). W Then we may interpret W as a morphism X −→ LS fitting into the commutative triangle X❈ ❈❈ ❈❈W p ❈❈ ❈!  S o q LS . The data (p : X → S, L, W ) determines a closed subscheme Y of X, defined by the vanishing of W . More formally, if z : S ֒→ LS denotes the zero section of the line bundle LS , then Y is defined by the pull-back square /X Y W  S z  / LS . We often suppress the subscripts and write L to mean LS or LX . For brevity, we write F (n) to mean F ⊗OX L⊗n X if F is a coherent sheaf or a complex of such on X. In our primary application, L will in fact by the standard very ample line bundle O(1) on projective space, and so this notation is reasonable in this case. The case of primary interest for us is described in the following example: CHERN CHARACTERS FOR TWISTED MATRIX FACTORIZATIONS 5 Example 2.3. Suppose k is a field, Q is a smooth k-algebra of dimension n, and f1 , . . . , fc is regular sequence of elements of Q. Let X = Pc−1 = Proj Q[T1 , . . . , Tc ], Q S = Pc−1 = Proj k[T1 , . . . , Tc ] k and define p:X →S to be the map induced by k ֒→ Q. Finally, set LS := OS (1) and X fi Ti ∈ Γ(X, LX ). W := i Then the triple (p : X → S, L, W ) satisfies all the hypotheses in Assumptions 2.1, and moreover p is affine. The subscheme cut out by W is Y = Proj Q[T1 , . . . , Tc ]/W in this case. 2.1. The Jacobian complex. We construct a complex of locally free sheaves on X that arises from the data (p : X → S, LS , W ). Regarding W as a map W : X → LS as above, we obtain an induced map W ∗ Ω1LS /S → Ω1X/S on cotangent bundles. There is a canonical isomorphism Ω1LS /S ∼ = q ∗ L−1 S and hence −1 ∗ 1 ∼ an isomorphism L−1 → Ω1X/S , and . Using this, we obtain a map L W Ω = X X LS /S upon tensoring with L we arrive at the map: dW : OX → Ω1X/S ⊗OX LX =: Ω1X/S (1). Note that Λ·X/S (Ω1X/S ⊗OX L) ∼ = M ΩqX/S (q) q so that we may regard the right-hand side as a sheaf of graded-commutative gradedOX -algebras. Since dW is a global section of this sheaf lying in degree one, we may form the Jacobian complex with differential given as repeated multiplication by dW :   dW dW dW dW (2.4) Ω·dW := OX −−→ Ω1X/S (1) −−→ Ω2X/S (2) −−→ · · · −−→ ΩnX/S (n) . We index this complex so that ΩjX/S (j) lies in cohomological degree j. Example 2.5. Let us consider the case where X and S are affine and the line bundle L is the trivial one. That is, suppose k is a Noetherian ring, A is a smooth k-algebra, and f ∈ A, and set S = Spec(k), X = Spec(A), L = OS , and W = f ∈ Γ(X, OX ) = A. (The map p : X → S is given by the structural map k → A.) Then the Jacobian complex is formed by repeated multiplication by the degree one element df ∈ Ω1A/k :   df ∧− df ∧− df ∧− df ∧− Ω·df = A −−−→ Ω1A/k −−−→ Ω2A/k −−−→ · · · −−−→ ΩnA/k . If we further specialize to the case A = k[x1 , . . . , xn ], then we may identify Ω1A/k with An by using the basis dx1 , . . . , dxn . Then Ω·df is the A-linear dual of the ∂f ∂f Koszul complex on the sequence ∂x , . . . , ∂x of partial derivatives of f . 1 n 6 MARK E. WALKER ∂f ∂f , . . . , ∂x form an If k is a field and f has only isolated singularities, then ∂x 1 n A-regular sequence. In this case, the Jacobian complex has cohomology only in degree n and k[x1 , . . . , xn ] H n (Ω·df ) ∼ dx1 ∧ · · · ∧ dxn . = ∂f ∂f i h ∂x1 , . . . , ∂x n Example 2.6. With the notation of Example 2.3, the Jacobian complex is the complex of coherent sheaves on Pc−1 associated to the following complex of graded Q modules over the graded ring Q[T ] := Q[T1 , . . . , Tc ]: dW dW dW 0 → Q[T ] −−→ Ω1Q/k [T ](1) −−→ · · · −−→ ΩnQ/k [T ](n) → 0 Here, dW = df1 T1 +· · ·+dfc T1 , a degree one element in the graded module Ω1Q/k [T ]. P ∂f Further specializing to Q = k[x1 , . . . , xn ], we have dfi = j ∂x dxj and j   ∂f   ∂fc 1 · · · ∂x T1 ∂x1 1  ∂f1 ∂f    ∂x2 · · · ∂xc2    T2   · . dW =   ..   ..   .. .  . .  ∂f1 ∂xn ··· ∂fc ∂xn Tc It is convenient to think of Ω·dW as representing a “family” of complexes of the type occurring in Example 2.5 indexed by the Q points of Pc−1 Q . That is, given a tuple a = (a1 , . . . , ac ) of elements of Q that generated the unit ideal, we have an associated Q-point ia : Spec(Q) ֒→ Pc−1 of Pc−1 Q Q . Pulling back along ia (and ∗ identifying ia O(1) with the trivial bundle in the canonical way) gives the Jacobian P complex of Example 2.5 for (Spec(Q) → Spec(k), O, i ai fi ). We are especially interested in the cokernel (up to a twist) of the last map in the Jacobian complex (2.4), and thus give it its own name: Definition 2.7. The Jacobi sheaf associated to (p : X → S, L, W ), written J (X/S, L, W ) or just JW for short, is the coherent sheaf on X defined as   dW ∧− n−1 JW = J (X/S, L, W ) := coker ΩX/S (−1) −−−−→ ΩnX/S . In other words, JW := Hn (Ω·dW )(−n), where Hn denote the cohomology of a complex in the abelian category of coherent sheaves on X. Example 2.8. If S = Spec(k), k is a field, X = Ank = Spec(k[x1 , . . . , xn ]), L = OX and f a polynomial, then k[x1 , . . . , xn ]  dx1 ∧ · · · ∧ dxn . Jf =  ∂f ∂f , . . . , ∂x1 ∂xn Example 2.9. With the notation of 2.3, JW is the coherent sheaf associated to the graded Q[T ]-module   dW n−1 coker ΩQ/k [T ](−1) −−→ ΩnQ/k [T ] . If we further specialize to the case Q = k[x1 , . . . , xn ] = k[x], then using dx1 , . . . , dxn as a basis of Ω1Q/k gives us that JW is isomorphic to the coherent sheaf associated CHERN CHARACTERS FOR TWISTED MATRIX FACTORIZATIONS to ⊕n coker k[x, T ](−1) (T1 ,...,Tc )  ∂fi ∂xi 7 ! t −−−−−−−−−−−→ k[x, T ] . 2.2. Matrix factorizations. We recall the theory of “twisted matrix factorizations” from [21] and [3]. Suppose X is any Noetherian scheme, L is a line bundle on X and W ∈ Γ(X, L) any global section of it. (The base scheme S is not needed for this subsection, and we write L for LX .) A twisted matrix factorization for (X, L, W ) consists of the data E = (E0 , E1 , d0 , d1 ) where E0 and E1 are locally free coherent sheaves on X and d0 : E0 → E1 (1) and d1 : E1 → E0 are morphisms such that d0 ◦ d1 and d1 (1) ◦ d0 are each given by multiplication by W . (Recall that E1 (1) denotes E1 ⊗OX L.) We visualize E as a diagram of the form   d1 d0 E0 (1) E1 −→ E = E0 −→ or as the “twisted periodic” sequence d0 (−1) d1 (−1) d d0 (1) d d1 (1) 1 0 E0 (1) −−−→ E1 (1) −−−→ · · · . E1 −→ · · · −−−−→ E1 (−1) −−−−→ E0 −→ Note that the composition of any two adjacent arrows in this sequence is multiplication by W (and hence this is not a complex unless W = 0). A strict morphism of matrix factorizations for (X, L, W ), say from E to E′ = ′ (E0 , E1′ , d′0 , d′1 ) consists of a pair of morphisms E0 → E0′ and E1 → E1′ such that the evident pair of squares both commute. Matrix factorizations and strict morphisms form an exact category, which we write as mf (X, L, W ), for which a sequence of morphisms is declared exact if it is so in each degree. If V ∈ Γ(X, L) is another global section, there is a tensor product pairing − ⊗mf − : mf (X, L, W ) × mf (X, L, V ) → mf (X, L, W + V ). In the special case L = OX and V = W = 0, this tensor product is the usual tensor product of Z/2-graded complexes of OX -modules, and the general case is the natural “twisted” generalization of this. We refer the reader to [2, §7] for a more precise definition. There is also a sort of internal Hom construction. Given W, V ∈ Γ(X, L) and objects E ∈ mf (X, L, W ) and F ∈ mf (X, L, V ), there is an object Hommf (E, F) ∈ mf (X, L, V − W ). Again, if L = OX and W = V = 0, this is the usual internal Hom-complex of a pair of Z/2-graded complexes of OX -modules, and we refer the reader to [2, 2.3] for the general definition. If V = W , then Hommf (E, F) belongs to mf (X, L, 0) and hence is actually a complex. In general, we refer to an object of mf (X, L, 0) as a twisted two-periodic complex, since it is a complex of the form d0 (−1) d d d1 (1) d0 (1) 0 1 E1 (1) −−−→ E0 (1) −−−→ · · · . E0 −→ · · · −−−−→ E1 −→ In other words, such an object is equivalent to the data of a (homologically indexed) complex E· of locally free coherent sheaves and a specified isomorphism E· (1) ∼ = E· [2]. (We use the convention that E· [2]i = Ei−2 .) There is also a notion of duality. Given E ∈ mf (X, L, W ), we define E∗ ∈ mf (X, L, −W ) as Hommf (E, OX ) where here OX denotes the object of mf (X, L, 0) given by the twisted two-periodic complex · · · → 0 → OX → 0 → L → 0 → L⊗2 → · · · . 8 MARK E. WALKER (In the notation introduced below, E∗ = Hommf (E, Fold OX ).) See [2, 7.5] for a more explicit formula. These constructions are related by the natural isomorphisms (cf. [2, §7]) Hommf (E, F) ∼ = E∗ ⊗mf F and Hommf (E ⊗mf G, F) ∼ = Hommf (E, Hommf (G, F)). The construction of Hommf (E, F) is such that we have a natural identification Homstrict (E, F) = Z0 Γ(X, Hommf (E, F)). Here, Γ(X, Hommf (E, F)) is the complex of abelian groups obtained by regarding Hommf (E, F) as an unbounded complex of coherent sheaves on X and applying the global sections functor Γ(X, −) degree-wise, obtaining a complex of Γ(X, OX )modules, and Z0 denotes the cycles lying in degree 0 in this complex. Let P(X) denote the category of complexes of locally free coherent sheaves on X and let P b (X) denote the full subcategory of bounded complexes. There is a “folding” functor, Fold : P b (X) → mf (X, L, 0), defined by taking direct sums of the even and odd terms in a complex. In detail, given a complex (P, dP ) ∈ P b (X), let M M P2i+1 (i). P2i (i) and Fold(P )1 = Fold(P )0 = i i The required map Fold(P )1 → Fold(P )0 maps the summand P2i+1 (i) to the summand P2i (i) via dP (i) and Fold(P )0 → Fold(P )1 (1) maps P2i (i) to P2i−1 (i) also via dP (i). There is also an “unfolding” functor Unfold : mf (X, L, 0) → P(X) which forgets the two periodicity. In detail, Unfold(E1 → E0 → E1 (1))2i = E0 (−i) and Unfold(E1 → E0 → E1 (1))2i+1 = E1 (−i) with the evident maps. These functors are related by the following adjointness properties: Given E ∈ mf (X, L, 0) and P ∈ P b (X), there are natural isomorphisms ∼ HomP(X) (P, Unfold E) Hommf (X,L,0) (Fold P, E) = and HomP(X) (Unfold E, P) ∼ = Hommf (X,L,0) (E, Fold P). (These functors do not technically form an adjoint pair, since Unfold takes values in P(X), not P b (X).) Example 2.10. If E is a locally free coherent sheaf on X, we write E[0] for the object in P(X) with E in degree 0 and 0’s elsewhere. Then Fold(E[0]) = (0 → E → 0) = (· · · → E(−1) → 0 → E → 0 → E(1) → · · · ) indexed so that E lies in degree 0. Letting E[j] = E[0][j], we have Fold(E[2i]) = (0 → E(i) → 0) = (· · · → E(i − 1) → 0 → E(i) → 0 → E(i + 1) → · · · ) CHERN CHARACTERS FOR TWISTED MATRIX FACTORIZATIONS 9 with E(i) in degree 0, and Fold(E[2i + 1]) = (E(i) → 0 → E(i + 1)) = (· · · → E(i − 1) → 0 → E(i) → 0 → E(i + 1) → · · · ) with E(i) in homological degree 1. If P ∈ P b (X) is a bounded complex and E ∈ mf (X, L, W ) is a twisted matrix factorization, we define their tensor product to be P ⊗ E := Fold(P ) ⊗mf E ∈ mf (X, L, W ). Example 2.11. We will use this construction, in particular, for the complex P = Ω1X/S (1)[−1] consisting of Ω1X/S (1) concentrated in homological degree −1. Since Ω1 lies in odd degree, the sign conventions give us   − id ⊗d1 (1) − id ⊗d0 Ω1X/S ⊗ E1 (1) −−−−−−−→ Ω1X/S ⊗ E0 (1) . Ω1X/S (1)[−1] ⊗ E = Ω1X/S ⊗ E0 −−−−−→   dW ∧− We will also apply this construction to the complex P := OX −−−−→ Ω1X/S (1) indexed so that OX lies in degree 0 to form the matrix factorization dW ∧− (OX −−−−→ Ω1X/S (1)) ⊗OX E which is given explicitly as E1 ⊕ Ω1X/S ⊗E0   d1 0  dW − id ⊗d0 −−−−−−−−−−−−−→  E0 ⊕ Ω1X/S ⊗E1 (1)   d0 0  dW − id ⊗d1 −−−−−−−−−−−−−→  E1 (1) ⊕ Ω1X/S ⊗E0 (1) . Building on the identity Homstrict (E, F) = Z0 Γ(X, Hommf (E, F)) we obtain a natural notion of homotopy: Two strict morphisms are homotopic if their difference lies in the image of the boundary map in the complex Γ(X, Hommf (E, F)). That is, the group of equivalence classes of strict morphisms up to homotopy from E to F is H0 Γ(X, Hommf (F, E)). We define [mf (X, L, W )]naive , the “naive homotopy category”, to be the category with the same objects as mf (X, L, W ) and with morphisms given by strict maps modulo homotopy; that is, Hom[mf ]naive (E, F) := H0 Γ(X, Hommf (F, E)). Just as the homotopy category of chain complexes is a triangulated category, so too is the category [mf (X, L, W )]naive ; see [21, 1.3] or [3, 2.5] for details. The reason for the pejorative “naive” in this definition is that this notion of homotopy equivalence does not globalize well: two morphisms can be locally homotopic without being globally so. Equivalently, an objects can be locally contractible with being globally so. To rectify this, we define the homotopy category of matrix factorizations for (X, L, W ), written hmf (X, L, W ), to be the Verdier quotient of [mf (X, L, W )]naive by the thick subcategory consisting of objects that are locally contractible. (The notion appears to be originally due to Orlov, but see also [21, 3.13] where this category is referred to as the “derived category of matrix factorizations”.) We list the properties of hmf (X, L, W ) needed in the rest of this paper: 10 MARK E. WALKER (1) There is a functor mf (X, L, W ) → hmf (X, L, W ), and it sends objects that are locally contractible to the trivial object. (2) If α : E → F is strict morphism and it is locally null-homotopic, then α is sent to the 0 map in hmf (X, L, W ). (3) When W = 0, hmf (X, L, 0) is the Verdier quotient of [mf (X, L, 0]naive obtained by inverting quasi-isomorphisms of twisted two-periodic complexes. (4) At least in certain cases, the hom sets of hmf (X, L, W ) admit a more explicit description. In general, for objects E, F ∈ mf (X, L, W ) there is a natural map Homhmf (E, F) → H0 (X, Unfold Hommf (E, F)) where H0 (X, −) denotes sheaf hyper-cohomology [3, 3.5]. This map is an isomorphism when (a) W = 0 or (b) X is projective over an affine base scheme and L = OX (1) is the standard line bundle; see [3, 4.2]. 2.3. Connections for matrix factorizations and the Atiyah class. See Appendix A for recollections on the notion of a connection for a locally free coherent sheaf on a scheme. Much of the material in this subsection represents a generalization to the non-affine case of constructions found in [26], which were in turn inspired by constructions in [9]. Definition 2.12. With (p : X → S, L, W ) as in Assumptions 2.1, given E ∈ mf (X, L, W ), a connection on E relative to p, written as ∇E or just ∇, is a pair of connections relative to p ∇1 : E1 → Ω1X/S ⊗OX E1 and ∇0 : E0 → Ω1X/S ⊗OX E0 . There is no condition relating ∇E and d1 , d0 . Since each ∇i is p∗ OS -linear and L is pulled back from S, we have induced connections ∇1 (j) : E1 (j) → Ω1X/S ⊗OX E1 (j) and ∇0 (j) : E0 (j) → Ω1X/S ⊗OX E0 (j) for all j. Example 2.13. Suppose S = Spec k and X = Spec Q are affine where Q is a smooth k-algebra of dimension n, L = OX so that W ∈ Q, and thecomponents of  A E are free Q-modules. Upon choosing bases, we may represent E as Qr −=== − Qr B where A, B are r × r matrices with entries in Q such that AB = BA = W Ir . The choice of basis leads to an associated “trivial” connection ⊕r  ∇ = d : Qr → Ω1Q/k ⊗Q Qr = Ω1Q/k given by applying exterior differentiation to the components of a vector. As noted in Appendix A, if p is affine, then every vector bundle on X admits a connection relative to p and so every matrix factorization admits a connection in this case. CHERN CHARACTERS FOR TWISTED MATRIX FACTORIZATIONS 11 Definition 2.14. Given a connection ∇ relative to p for a twisted matrix factorization E ∈ mf (X, L, W ), the associated Atiyah class is defined to be the map AtE,∇ : E → Ω1X/S (1)[−1] ⊗ E given as the “commutator” [∇, δE ]. In detail, it is given by the pair of maps ∇1 (1) ◦ δ − (id ⊗δ) ◦ ∇0 : E0 → Ω1 (1) ⊗ E1 and ∇0 ◦ δ − (id ⊗δ) ◦ ∇1 : E1 → Ω1 ⊗ E0 . AtE,∇ is not a morphism of matrix factorizations in general, but by Lemma A.6 we have that AtE,∇ is OX -linear. Example 2.15. Keep the notations and assumptions of Example 2.13, so that   A r E = Qr −=== −Q . B Then 1 Ω (1)[−1] ⊗ E = 1  Ω1Q/k ⊕r ⊕r   −B 1 −==  ==− ΩQ/k −A and the map At : E → Ω (1)[−1] ⊗ E obtained by choosing the trivial connections is represented by the following diagram: A Qr dA  ⊕r  1 ΩQ/k / Qr B dB −B  ⊕r  1 / Ω Q/k / Qr dA −A  ⊕r  1 / Ω Q/k Here dA and dB denote the r×r matrices with entires in Ω1Q/k obtained by applying d entry-wise to A and B. This is not a map of matrix factorizations since the squares do not commute. Indeed, the differences of the compositions around these squares are (dB)A+B(dA) and (dA)B + A(dB). Since AB = BA = W , these expression both equal dW , a fact which is relevant for the next construction. Definition 2.16. Given a connection ∇ for a matrix factorization E , define   dW ∧− ΨE,∇ : E → OX −−−−→ Ω1X/S (1) ⊗OX E dW ∧− as idE + At∇ . (Here, OX −−−−→ Ω1X/S (1) is the complex with OX in degree 0.) In other words, ΨE,∇ is the morphism whose composition with the canonical projection   dW ∧− OX −−−−→ Ω1X/S (1) ⊗OX E −−։ E is the identity and whose composition with the canonical projection   dW ∧− OX −−−−→ Ω1X/S (1) ⊗OX E −−։ Ω1 (1)[−1] ⊗OX E is AtE,∇ . Lemma 2.17. The map ΨE,∇ is a (strict) morphism of matrix factorizations, and it is independent in the naive homotopy category [mf (X, L, W )]naive (and hence the homotopy category too) of the choice of connection ∇. 12 MARK E. WALKER Proof. The proofs found in [26], which deal with the case where X is affine and L is trivial, apply nearly verbatim. The homotopy relating ΨE,∇ and ΨE,∇′ for two different connections ∇ and ∇′ on E is given by the map ∇ − ∇′ : E → Ω1X/S ⊗ E, which is OX -linear by Lemma A.6.  Example 2.18. Continuing with Examples 2.13 and 2.15, the map Ψ in this case is represented by the diagram A Qr   1 dA   Qr  ⊕ r Ω1Q/k  A dW B / Qr 0 −B  /  1 dB / Qr   Qr  ⊕ r Ω1Q/k  B dW  0 −A /   1 dA Qr  ⊕ r Ω1Q/k . This diagram commutes, confirming that Ψ is indeed a morphism of matrix factorizations. 2.4. Ad hoc Hochschild homology. For an integer j ≥ 0, we define the twisted two-periodic complex (j) ΩdW :=   (j−2)dW (j−1)dW jdW 2dW dW −→ ΩjX/S (j)) . Fold OX −−→ Ω1X/S (1) −−−−−→ Ω2X/S (2) −−−−−→ · · · −−→ Ωj−1 X/S (j − 1) − (j) Explicitly, ΩdW is the twisted periodic complex  1   1    ΩX/S ΩX/S (1) OX  ⊕   ⊕   ⊕   3   3   2  ΩX/S (1) ΩX/S (2) ΩX/S (1)             · · · −→  ⊕  −→  4 ⊕  −→  ⊕  −→ · · · Ω5 (2)  Ω5 (3) Ω (2)  X/S   X/S   X/S   ⊕   ⊕   ⊕        . .. .. . . . . with Li=⌊ 2j ⌋ i=0 Ω2i X/S (i) in degree 0 and Li=⌊ j−1 2 ⌋ i=0 Ω2i+1 X/S (i) in degree 1. (j) The coefficients appearing in the maps of ΩdW are necessarily to make the following statement hold true. (We omit its straight-forward proof.) Lemma 2.19. The pairings ΩiX/S (i) ⊗OX ΩlX/S (l) → Ωi+l X/S (i + l) defined by exterior product induce a morphism (j) (l) (j+l) ΩdW ⊗mf ΩdW → ΩdW . in mf (X, L, 0). CHERN CHARACTERS FOR TWISTED MATRIX FACTORIZATIONS 13 If j! is invertible in Γ(X, OX ) (for example, if X is a scheme over a field k with char(k) = 0 or char(k) > j), then there is an isomorphism   dW dW dW (j) j ΩdW ∼ = Fold OX −−→ Ω1X/S (1) −−→ · · · −−→ ΩX/S (j)) 1 n(n−1)···(n−i) given by collection of isomorphisms ΩiX/S (i) −−−−−−−−−→ ΩiX/S (i), 0 ≤ i ≤ j. In particular, if n! is invertible in Γ(X, OX ), then there is an isomorphism (n) ΩdW ∼ = Fold Ω·dW . (Recall that n is the relative dimension of X of S, and hence is the rank of Ω1X/S . It follows that Ωm X/S = 0 for m > n.) Definition 2.20. Let p : X → S, L, W be as in Assumptions 2.1 and assume also that n! is invertible in Γ(X, OX ). We define the (degree 0) ad hoc Hochschild homology of mf (X, L, W ) relative to S to be hoc (X/S, L, W ) := H0 (X, Unfold Fold Ω·dW ). HHad 0 hoc As we will see in the next section, HHad (X/S, L, W ) is the target of what we 0 term the “ad hoc Chern character” of a twisted matrix factorization belonging to mf (X, L, W ). We use the adjective “ad hoc” for two reasons. The first is that we offer here no justification that this definition deserves to be called “Hochschild homology”. See, however, [22, 24] for the affine case and [20] for the non-affine case with L = OX . The second reason is that whereas the support of every object of mf (X, L, W ) is contained in the singular locus of the subscheme Y cut out by W (as will be justified in the next subsection), the twisted two-periodic complex Fold Ω·dW is not so supported in general. A more natural definition of Hochshild homology would thus be given by H0Z (X, Unfold Fold Ω·dW ), where Z is the singular locus of Y and H0Z refers to hypercomology with supports (i.e., local cohomology). Since this more sensible definition of Hochschild homology is not necessary for our purposes and hoc only adds complications to what we do, we will stick with using HHad . 0 Recall that the Jacobi sheaf is defined as   dW n−1 JW = J (X/S, L, W ) = coker ΩX/S (−1) −−→ ΩnX/S so that there is a canonical map Ω·dW → Hn (Ω·dW )[−n] = JW (n)[−n]. From it we obtain the map Fold(Ω·dW ) → Fold(JW (n)[−n]) ∼ = Fold(JW ( n2 )). Applying Unfold and using the canonical map Unfold Fold(JW ( n2 )) → JW ( n2 ) results in a map Unfold Fold Ω·dW → JW ( n2 ). Finally, applying H0 (X, −) yields the map (2.21) hoc HHad (X/S, L, W ) → H 0 (X, JW ( n2 )). 0 This map will play an important role in the rest of this paper. Let us observe that in certain situations, it is an isomorphism: 14 MARK E. WALKER Proposition 2.22. Assume S = Spec k for a field k, X = Spec(Q) for a smooth k-algebra Q, and hence LX = OX and W ∈ Q. If the morphism of smooth varieties W : X → A1 has only isolated critical points and n is even, then the canonical map HHad 0 hoc (X/S, W ) → H 0 (X, JW ( n2 )) = ΩnQ/k n−1 dW ∧ ΩQ/k is an isomorphism. Proof. These conditions ensure that the complex of Q-modules Ω·dW is exact except on the far right where it has homology J (n). The result follows since X is affine.  Example 2.23. Assume S = Spec(k) for a field k, X = Ank = Spec k[x1 , . . . , xn ], and the morphism f : Ank → A11 associated to a given polynomial f ∈ k[x1 , . . . , xn ] has only isolated critical points. Then hoc HHad (X/S, f ) ∼ = H 0 (X, Jf ( n2 )) = 0 ΩnQ/k df ∧ n−1 ΩQ/k = k[x1 , . . . , xn ] dx1 ∧ · · · ∧ dxn . ∂f ∂f ( ∂x , . . . , ∂x ) 1 n 2.5. Supports. We fix some notation. For a Noetherian scheme Y , the non-regular locus of Y is Nonreg(Y ) := {y ∈ Y | the local ring OY,y is not a regular local ring}. Under mild additional hypotheses (e.g., Y is excellent), Nonreg(Y ) is a closed subset of Y . Assume g : Y → S is a morphism of finite type. Recall that g is smooth near y ∈ Y if and only if it is flat of relative dimension n near y and the stalk of Ω1Y /S at y is a free OY,y -module of rank n. We define singular locus of g : Y → S to be the subset Sing(g) = Sing(Y /S) = {y ∈ Y | g is not smooth near y}. At least for a flat morphism g : Y → S of finite type, the singular locus of g is a closed subset of Y by the Jacobi criterion. When S = Spec(k) for a field k and there is no danger of confusion, we write Sing(Y ) instead of Sing(Y / Spec(k)). If Y is finite type over a field k, then Nonreg(Y ) ⊆ Sing(Y ) = Sing(Y / Spec(k)), and equality holds if k is perfect. Proposition 2.24. Assume X is a Noetherian scheme, L is a line bundle on X, and W is a regular global section of L. Let Y ⊆ X be the closed subscheme cut out by W . Then for every E, F ∈ mf (X, L, W ), the twisted two-periodic complex Hommf (E, F) is supported Nonreg(Y ). Proof. For x ∈ X, we have Hommf (E, F)x ∼ = Hommf (Ex , Fx ) where the hom complex on the right is for the category mf (Spec(OX,x ), Lx , Wx ). By choosing a trivialization OX ∼ = Lx , we may identify this category with mf (Q, f ) for a regular local ring Q and non-zero-divisor f . The assertion thus becomes that if f is non-zero-divisor in regular local ring Q and Q/f is also regular, then the complex Hommf (E, F) is acyclic for all objects E, F ∈ mf (Q, f ). This holds since the ∗ d Q/f (coker(E), coker(F)); cohomology modules of the complex Hommf (E, F) are Ext see Theorem 3.2 below.  CHERN CHARACTERS FOR TWISTED MATRIX FACTORIZATIONS 15 Example 2.25. Suppose k is a field, Q is a smooth k-algebra, m is a maximal ideal of Q, and f1 , . . . , fc ∈ m form a regular sequence such that the non-regular locus of the ring R := Q/(f1 , . . . , fc ) is {m}. Let X = Pc−1 = Proj Q[T1 , . . . , Tc ], Q P L = OX (1), and W = i fi Ti . Then c−1 Nonreg(Y ) = Pc−1 Q/m ⊆ PQ . 2.6. Chern classes of matrix factorizations. If E ∈ mf (X, L, W ) is a matrix factorization that admits a connection (for example, if p is affine), we define strict morphisms (j) (j) ΨE,∇ : E → ΩdW ⊗ E, for j ≥ 0, recursively, by letting (1) Ψ(0) = idE , ΨE,∇ = ΨE,∇ , (j) and, for j ≥ 2, defining ΨE,∇ as the composition of (j−1) idΩ(1) ⊗ΨE,∇ (1) (j−1) E −−−−−−−−−→ ΩdW ⊗ ΩdW ∧⊗id (j) E ⊗ E −−−−→ ΩdW ⊗ E. (j) By Lemma 2.17, ΨE,∇ is independent up to homotopy of the choice of ∇. Example 2.26. Continuing with Examples 2.13, 2.15 and 2.18, the map Ψ(∧j) arising from the trivial connection is in degree zero given by j factors }| { z (1 + dA) · · · (1 + dA)(1 + dB) for j even and by j factors }| { z (1 + dB) · · · (1 + dA)(1 + dB) for j odd, where the product is taken in the ring Matr×r (Ω·Q/k ). By the duality enjoyed by the category mf (X, L, Q), we obtain a morphism of objects of mf (X, L, 0) of the form (j) (j) Ψ̃E : Endmf (E) = E∗ ⊗mf E → ΩdW . Moreover, as a morphism in the category [mf (X, L, 0)]naive , it is independent of the choice of connection. Take j = n and assume n! is invertible, so that we have an isomorphism (n) ΩdW ∼ = Fold Ω·dW . We obtain the morphism Endmf (E) → Fold Ω·dW in mf (X, L, 0) and hence a map of unbounded complexes (2.27) chE : Unfold Endmf (E) → Unfold Fold Ω·dW . id E The identity morphism on E determines a morphism OX −−→ Unfold Endmf (E), 0 that is, an element of H (X, Unfold Endmf (E)). Definition 2.28. Under Assumptions 2.1 and 2.2, define the ad hoc Chern character of E ∈ mf (X, L, W ) relative to p : X → S to be hoc ch(E) = chE (idE ) ∈ HHad (X/S, L, W ). 0 16 MARK E. WALKER hoc Recall that when n is even, we have the map HHad (X/S, L, W ) → H 0 (X, JW ( n2 )) 0 defined in (2.21), and hence we obtain an invariant of E in H 0 (X, JW ( n2 )). Since this invariant will be of crucial importance in the rest of this paper, we give it a name: Definition 2.29. Under Assumptions 2.1 and 2.2 and with n even, define the ad hoc top Chern class of E ∈ mf (X, L, W ) relative to p : X → S to be the element ctop (E) ∈ H 0 (X, JW ( n2 )) given as the image of ch(E) under (2.21). Example 2.30. With the notation and assumptions of Example 2.13, we have   dW −−→ Ω2i+1 M ker Ω2i Q/k Q/k hoc hoc  . HHad (X/S, L, W ) = HHad (Spec(Q)/ Spec(k), O, W ) = 0 0 2i−1 dW 2i i im ΩQ/k −−→ ΩQ/k and, when n is even, H 0 (X, JW ( n2 )) is the last summand: H 0 (X, JW ( n2 )) = ΩnQ/k n−1 dW ∧ ΩQ/k . We have n factors }| { z 2 tr(dAdB · · · dB). n! Here dA and dB are r × r matrices with entries in Ω1 − Q/k and the product is occurring in the ring Matr×r (Ω·Q/k ), and the map tr : Matr×r (ΩnQ/k ) → ΩnQ/k is the usual trace map. Our formula for ctop (E) coincides with the “Kapustin-Li” formula [14] found in many other places, at least up to a sign: In the work of Polishchuck-Vaintrob [22, n Cor 3.2.4], for example, there is an additional a factor of (−1)( 2 ) in their formula for the Chern character. ctop (E) = Since the top Chern class of E ∈ mf (X, L, W ) is defined as the image of idE under the composition ch E Unfold Endmf (E) −−→ Unfold Fold Ω·dW → JW ( n2 ) of morphisms of complexes of coherent sheaves on X, the following result is an immediate consequence of Proposition 2.24. Recall that for a quasi-coherent sheaf F on X and a closed subset Z of X, HZ0 (X, F ) denotes the kernel of H 0 (X, F ) → H 0 (X \ Z, F ). Proposition 2.31. For any E ∈ mf (X, L, W ), its top Chern class is supported on Nonreg(Y ): 0 n ctop (E) ∈ HNonreg(Y ) (X, JW ( 2 )). Remark 2.32. It is also follows from what we have established so far that the Chern character of any E is supported on Nonreg(Y ) in the sense that it lifts canonically to an element of H0Nonreg(Y ) (X, Unfold Fold Ω·dW ), where in general H0Z denote local hyper-cohomology of a complex of coherent sheaves. CHERN CHARACTERS FOR TWISTED MATRIX FACTORIZATIONS 17 2.7. Functorality of the Chern character and the top Chern class. The goal of this subsection is to prove Chern character is functorial in S. Throughout, we suppose Assumptions 2.1 and 2.2 hold. Let i : S ′ → S be a morphism of Noetherian schemes and write L′ , X ′ , W ′ for the evident pull-backs: X ′ = X ×S S ′ , L′S = i∗ (LS ), and W ′ = i∗ (W ). The typical application will occur when i is the inclusion of a closed point of S. There is a functor (2.33) i∗ : mf (X, L, W ) → mf (X ′ , L′ , W ′ ) induced by pullback along the map X ′ → X induced from i. There is a canonical isomorphism i∗ Ω·dW ∼ = Ω·dW ′ and hence an hence an induced map hoc hoc i∗ : HHad (X/S, L, W ) → HHad (X ′ /S ′ , L′ , W ′ ). 0 0 Proposition 2.34. For E ∈ mf (X, L, W ), we have hoc i∗ (ch(E)) = ch(i∗ (E)) ∈ HHad (X ′ /S ′ , L′ , W ′ ). 0 Proof. Recall that the Chern character of E is determined by a map of matrix factorizations E → E ⊗ Ω·dW which is itself determined by a choice of connection Ej → Ej ⊗OX Ω1X/S for j = 0, 1. Since our connections are OS -linear, we have the pull-back connection i∗ Ej → i∗ (Ej ) ⊗OX ′ Ω1X ′ /S ′ , j = 0, 1. which we use to define the map i∗ E → i∗ E ⊗ Ω·dW ′ . Using also that i∗ End(E) = End(i∗ E), it follows that the square End(E) / Fold Ω· dW  Ri∗ End(i∗ E)  / Ri∗ Fold Ω· ′ dW commutes. Applying H0 (X, Unfold(−)) gives the commutative square H0 (X, Unfold End(E)) hoc / HHad (X/S, L, W ) 0 i∗  H0 (X ′ , Unfold End(i∗ E)) i∗  hoc / HHad (X ′ /S ′ , L′ , W ′ ). 0 The result follows from the fact that i∗ : H0 (X, Unfold End(E)) → H0 (X ′ , Unfold End(i∗ E)) sends idE to idi∗ E .  Recall from (2.21) that, when n is even, there is a natural map hoc HHad (X/S, L, W ) → Γ(X, JX/S,L,W ( n2 )) 0 Since i∗ JX/S,L,W ∼ = JX ′ /S ′ ,L′ ,W ′ , we obtain a map i∗ : Γ(X, JX/S,L,W ( n2 )) → Γ(X ′ , JX ′ /S ′ ,L′ ,W ′ ( n2 )). 18 MARK E. WALKER Corollary 2.35. When n is even, for any E ∈ mf (X, L, W ), we have i∗ (ctop (E)) = ctop (i∗ (E)) ∈ Γ(X, JX ′ /S ′ ,L′ ,W ′ ( n2 )). Proof. This follows from Proposition 2.34 and the fact that hoc HHad (X/S, L, W ) 0 / Γ(X, JX/S,L,W ( n2 )) i∗ i∗   / Γ(X ′ , JX ′ /S ′ ,L′ ,W ′ ( n2 )) hoc HHad (X ′ /S ′ , L′ , W ′ ) 0 commutes.  3. Relationship with affine complete intersections We present some previously known results that relate twisted matrix factorizations with the singularity category of affine complete intersections. We start with some basic background. For any Noetherian scheme X, we write Db (X) for the bounded derived category of coherent sheaves on X and Perf(X) for the full subcategory of perfect complexes — i.e., those complexes of coherent sheaves on X that are locally quasi-isomorphic to bounded complexes of finitely generated free modules. We define Dsg (X) to be the Verdier quotient Db (X)/ Perf(X). For a Noetherian ring R, we write Dsg (R) for Dsg (Spec(R)). The category Dsg (X) is triangulated. For a pair of finitely generated R-modules M and N , we define their stable Ext-modules as i d (M, N ) := HomD (R) (M, N [i]), Ext R sg where on the right we are interpreting M and N [i] as determining complexes (and hence objects of Dsg (R)) consisting of one non-zero component, lying in degrees 0 and −i, respectively. Note that since Db (R) → Dsg (R) is a triangulated functor by construction and the usual ExtR -modules are given by HomDb (R) (M, N [i]), there is a canonical map i d R (M, N ) ExtiR (M, N ) → Ext that is natural in both variables. Proposition 3.1. [1, 1.3] For all finitely generated R-modules M and N , the natural map i d (M, N ) Exti (M, N ) → Ext R R is an isomorphism for i ≫ 0. 3.1. Euler characteristics and the Herbrand difference for hypersurfaces. Throughout this subsection, assume Q is a regular ring and f ∈ Q is a non-zeroα divisor, and let R = Q/f . Given an object E = (E1 −== − E0 ) ∈ mf (Q, f ), define β α → E0 ). The Q-module coker(E) is annihilated by f and coker(E) to be coker(E1 − we will regard it as an R-module. Theorem 3.2 (Buchweitz). [1] If R = Q/f where Q is a regular ring and f is a non-zero-divisor, there is an equivalence of triangulated categories ∼ = hmf (Q, f ) − → Dsg (R) CHERN CHARACTERS FOR TWISTED MATRIX FACTORIZATIONS 19 induced by sending a matrix factorization E to coker(E), regarded as an object of Dsg (R). In particular, we have an isomorphisms i and d R (coker(E), coker(F)), for all i, Extihmf (E, F) := Homhmf (E, F[i]) ∼ = Ext Extihmf (E, F) ∼ = ExtiR (coker(E), coker(F)), for i ≫ 0. Since the category hmf (Qp , f ) is trivial for all f ∈ p such that Rp is regular, Homihmf (E, F) is an R-module supported on Nonreg(R), for all i. If we assume Nonreg(R) is a finite set of maximal ideals, then Homihmf (E, F) has finite length as an R-module, allowing us to make the following definition. Definition 3.3. Assume Q is a regular ring and f ∈ Q is a non-zero-divisor such that Nonreg(R) is a finite set of maximal ideals, where R := Q/f . For E, F ∈ mf (Q, f ), define the Euler characteristic of (E, F) to be χ(E, E) = length Hom0hmf (E, F) − length Hom1hmf (E, F). In light of Theorem 3.2, if M and N are the cokernels of E and F, then χ(E, F) = hR (M, N ), (3.4) where the right-hand side is the Herbrand difference of the R-modules M and N , defined as 0 1 d R (M, N ) − length Ext d R (M, N ) hR (M, N ) = length Ext 2i+1 (M, N ), i ≫ 0. = length Ext2i R (M, N ) − length ExtR Lemma 3.5. Suppose φ : Q → Q′ is a flat ring homomorphism between regular rings, f is a non-zero-divisor in Q, and f ′ := φ(f ) is a non-zero-divisor of Q′ . Assume Nonreg(Q/f ) = {m} and Nonreg(Q′ /f ′ ) = {m′ } for maximal ideals m, m′ satisfying the condition that mQ′ is m′ -primary. Then, for all E, F ∈ mf (Q, f ), χmf (Q,f ) (E, F) = λ · χmf (′ Q,f ′ ) (E ⊗Q Q′ , F ⊗Q Q′ ), where λ := lengthQ′ (Q′ /mQ′ ). Proof. Let R = Q/f and R′ = Q′ /f ′ . The induced map R → R′ is flat and hence for any pair of R-modules M and N , we have an isomorphism ExtiR (M, N ) ⊗R R′ ∼ = ExtiR′ (M ⊗R R′ , N ⊗R R′ ) of R′ -modules. For i ≫ 0, ExtiR (M, N ) is supported on {m} and ExtiR′ (M ⊗R R′ , N ⊗R R′ ) is supported on {m′ }. It follows that lengthR′ ExtiR′ (M ⊗R R′ , N ⊗R R′ ) = lengthR′ (ExtiR (M, N )⊗R R′ ) = λ lengthR ExtiR (M, N ). ′ Hence hR (M ′ , N ′ ) = λhR (M, N ) and the result follows from (3.4).  20 MARK E. WALKER 3.2. Matrix factorizations for complete intersections. Using a Theorem of Orlov [19, 2.1], one may generalize Theorem 3.2 to complete intersection rings. The precise statement is the next Theorem. Versions of it are found in [21], [15], [18], [23]; the one given here is from [2, 2.11]. Theorem 3.6. Assume Q is a regular ring of finite Krull dimension and f1 , . . . , fc is a regular sequence of elements of Q. Let R = Q/(f1 , . . . , fc ), define X = Pc−1 = Q P Proj Q[T1 , . . . , Tc ] and set W = i fi Ti ∈ Γ(X, O(1)). There is an equivalence of triangulated categories ∼ = Dsg (R) − → hmf (X, O(1), W ). The isomorphism of Theorem 3.6 has a certain naturality property that we need. Suppose a1 , . . . , ac is a sequence of element of Q that generate the unit ideal, and let i : Spec(Q) ֒→ X be the associated closed immersion. Then we have a functor X ai fi ). i∗ : hmf (X, O(1), W ) → hmf (Q, i ∗ ∗ Technically, the right hand side should P be hmf (Spec(Q), i O(1), i (W )), but it is canonically isomorphic to hmf (Q, i aP i fi ) because there is a canonical isomorphism i∗ O(1) ∼ i∗ (W ) to i ai fi . = Q that sends P Also, the quotient map Q/( i ai fi ) −−։ R has finite projective dimension, since, locally on Q, it is given by modding out by a regular sequence of length c − 1. We thus an induced functor X ai f i ) res : Dsg (R) → Dsg (Q/ i on singularity categories, given by restriction of scalars. Proposition 3.7. With the notation above, the square ∼ = Dsg (R) / hmf (Pc−1 , O(1), W ) Q res Dsg (Q/  P i i∗ ∼ = ai f i ) / hmf (Q, commutes up to natural isomorphism. P i ai f i ) Proof. To prove this, we need to describe the equivalence of Theorem 3.6 explicitly. Let Y ⊆ Pc−1 denote the closed subscheme cut out by W . Then there are a pair of Q equivalences (3.8) ∼ = ∼ = Dsg (R) − → Dsg (Y ) ← − hmf (X, O(1), W ), ∼ = which give the equivalence Dsg (R) − → hmf (X, O(1), W ) of the Theorem. The left-hand equivalence of (3.8) was established by Orlov [19, 2.1] (see also [2, A.4]), and it is induced by the functor sending a bounded complex of finitely generated R-modules M · to β∗ π ∗ (M · ), where π : Pc−1 → Spec(R) is the evident R projection and β : Pc−1 ֒→ Y is the evident closed immersion. R The right-hand equivalence of (3.8) is given by [3, 6.3], and it sends a twisted α β → E1 (1)) to coker(α) (which may be regarded → E0 − matrix factorization E = (E1 − as a coherent sheaf on Y .) CHERN CHARACTERS FOR TWISTED MATRIX FACTORIZATIONS For brevity, set g = the diagram (3.9) P i ai fi . The Proposition will follow once we establish that β∗ ◦π ∗ ∼ = / Dsg (Y ) o s ss ss k∗ s ss ∗  yss Lj Dsg (Q/g) o ∼ Dsg (R) 21 ∼ = hmf (Pc−1 Q , O(1), W ) i∗  hmf (Q, g) = commutes up to natural isomorphism, where k : Spec(R) ֒→ Spec(Q/g) is the canonical closed immersion and j : Spec(Q/g) → Y is the restriction of i. (The closed immersion j is locally a complete intersection and thus of finite flat dimension. It follows that it induces a morphism on singularity categories, which we write Lj ∗ .) The right-hand square of (3.9) commutes since for a matrix factorization E = (E1 → E0 → E1 (1)) we have j ∗ coker(E1 → E0 ) ∼ = coker(i∗ E1 → i∗ E0 ) and j ∗ coker(E1 → E0 ) ∼ = Lj ∗ coker(E1 → E0 ). The first isomorphism is evident. The second holds since j has finite flat dimension and coker(E1 → E0 ) is an “infinite syzygy”; that is, coker(E1 → E0 ) has a right resolution by locally free sheaves on Y , namely γ ∗ E1 (1) → γ ∗ E0 (1) → γ ∗ E1 (2) → · · · , where γ : Y ֒→ X is the canonical closed immersion. To show the left-hand triangle commutes, we consider the Cartesian square of closed immersions c−1 / PR O β j iR O Spec(R) / /Y O k O / Spec(Q/g), where iR denote the restriction of i to Spec(R). This square is Tor-independent Y (i.e., TorO i (β∗ OPc−1 , j∗ OSpec(Q/g) ) = 0 for i > 0), from which it follows that R Lj ∗ ◦ β∗ = k∗ ◦ Li∗R . Since Li∗R ◦ π ∗ is the identity map, the left-hand triangle of (3.9) commutes.  4. Some needed results on the geometry of complete intersections Let k be a field and Q a smooth k-algebra of dimension n. Set V = Spec(Q), a smooth affine k-variety. Given f1 , . . . , fc ∈ Q, we have the associated morphism f := (f1 , . . . , fc ) : V → Ack of smooth k-varieties, induced by the k-algebra map k[t1 , . . . , tc ] → Q sending ti to fi . Define the Jacobian of f , written Jf , to be the map Jf : Qc → Ω1Q/k 22 MARK E. WALKER given by (df1 , . . . , dfc ). (More formally, Jf is the map f ∗ Ω1Ac /k → Ω1V /k induced by k f , but we identify f ∗ Ω1Ac /k with Qc by using the basis dt1 , . . . , dtc of Ω1Ac /k . Also, k k Jf is really the dual of what is often called the Jacobian of f .) For example, if Q = k[x1 , . . . , xn ], then Jf is given by the n× c matrix (∂fi /∂xj ), using the basis dx1 , . . . , dxn of Ω1Q/k . For a point x ∈ V , let κ(x) denote its residue field and define Jf (x) = Jf ⊗Q κ(x) : κ(x)c → Ω1Q/k ⊗Q κ(x) ∼ = κ(x)n to be the map on finite dimensional κ(x)-vector spaces induced by Jf . Define (4.1) Vj := {x ∈ V | rank Jf (κ(x)) ≤ j} ⊆ V, so that we have a filtration ∅ = V−1 ⊆ V0 ⊆ · · · ⊆ Vc = V. Note that the set Vc−1 is the singular locus of the map f . For example, if Q = k[x1 , . . . , xn ], then Vj is defined by the vanishing of the (j + 1) × (j + 1) minors of the matrix (∂fi /∂xj ). Example 4.2. Let k be a field of characteristic not equal to 2, let Q = k[x1 , . . . , xn ] so that V = Ank , let c = 2, and define f1 = 21 (x21 + · · · + x2n ) and f2 = 12 (a1 x21 + · · · + an x2n ), where a1 , . . . , an ∈ k are such that ai 6= aj for all i 6= j. Thus f is a morphism between two affine spaces: f : Ank → A2k . For the usual basis, the Jacobian is the matrix   x1 a1 x1  x2 a2 x2    Jf =  . ..  .  .. .  xn an xn Then V0 is just the origin in V = Ank and V1 is the union of the coordinate axes. In the previous example, we have dim(Vj ) ≤ j for all j < c. This will turn out to be a necessary assumption for many of our result. Let us summarize the notations and assumptions we will need in much of the rest of this paper: Assumptions 4.3. Unless otherwise indicated, from now on we assume: (1) k is field. (2) V = Spec(Q) is smooth affine k-variety of dimension n. (3) f1 , . . . , fc ∈ Q is a regular sequence of elements. We write f : V → Ack for the flat morphism given by (f1 , . . . , fc ). (Note that c ≤ n.) (4) The singular locus of f −1 (0) = Spec(Q/(f1 , . . . , fc )), is zero-dimensional — say Sing(f −1 (0)) = {v1 , . . . , vm } where the vi ’s are closed points of V . (5) dim(Vj ) ≤ j for all j < c, where Vj is defined in (4.1). Observe that the singular locus of f −1 (0) may be identified with Vc−1 ∩ f −1 (0). For the results in this paper, we will be allowed to shrink about the singular locus of f −1 (0). In this situation, if char(k) = 0, the last assumption in above list is unnecessary, as we now prove: CHERN CHARACTERS FOR TWISTED MATRIX FACTORIZATIONS 23 Lemma 4.4. If all of Assumptions 4.3 hold except possibly (5) and char(k) = 0, then for a suitably small affine open neighborhood V ′ of the set {v1 , . . . , vm }, we have dim(Vj′ ) ≤ i for all j ≤ c − 1. Proof. Since the induced map Sing(f ) → Ac has finite type, the set B := {y ∈ Sing(f ) | Sing(f ) ∩ dim(f −1 (f (y)) > 0} is a closed subset of Sing(f ) by the upper-semi-continuity of fiber dimensions [EGAIV, 13.1.3]. Since Sing(f −1 (0)) = f −1 (0) ∩ Sing(f ) is a finite set of closed points, it follows that {v1 , . . . , vm } ∩ B = ∅. Thus V ′ := V \ B is an open neigh′ is quasi-finite over Ac . borhood of the vi ’s and Sing(f |V ′ ) = Sing(f ) ∩ V ′ = Vc−1 ′ Shrinking V further, we may assume it is affine. ′ ′ ) is → f (Vc−1 By [11, III.10.6], we have dim(f (Vj′ )) ≤ j for all j. Since Vc−1 quasi-finite, so is Vj′ → f (Vj′ ) for all j ≤ c − 1, and hence dim(Vj′ ) ≤ i for all j ≤ c − 1.  Example 4.5. Suppose char(k) = p > 0, Q = k[x1 , . . . , xc ], and let f1 (x) = xp1 , · · · , fc (x) = xpc . Then Jf : Qc → Ω1Q/k ∼ = Qc is the zero map, and yet p p k[x1 , . . . , xc ]/(x1 , . . . , xc ) has an isolated singularity at (x1 , . . . , xc ). This shows that the characteristic 0 hypothesis is necessary in Lemma 4.4. Given the set-up in Assumptions 4.3, we let S = Pc−1 = Proj k[T1 , . . . , Tc ] k and X = Pc−1 ×k V = Proj Q[T1 , . . . , Tc ], k and we define W = f1 T1 + · · · + fc Tc ∈ Γ(X, O(1)). As before, we have a map dW : OX → Ω1X/S (1), or, equivalently, a global section dW ∈ Γ(X, Ω1X/S (1)). Recall that Ω1S/X (1) is the coherent sheaf associated to the graded module Ω1Q/k [T1 , . . . , Tc ](1), and dW may be given explicitly as the degree one element dW = df1 T1 + · · · + dfc Tc ∈ Ω1Q/k [T1 , . . . , Tc ], or, in other words, (4.6)   T1  T2    dW = Jf ·  .  .  ..  Tc Proposition 4.7. With Assumptions 4.3, dW is a regular section of Ω1X/S (1). Proof. Since X = Pc−1 ×k V is smooth of dimension n + c − 1 and Ω1X/S is locally k free of rank n, it suffices to prove the subscheme Z cut out by dW has dimension at most c − 1. Using (4.6), we see that the fiber of Z → V over a point x ∈ V is a linear subscheme of Pc−1 κ(x) of dimension c − 1 − rank(Jf (x)). That is, if x ∈ Vj \ Vj−1 , then the fiber over Z → Y over y has dimension c − 1 − j. (This includes the case j = c in the sense that the fibers over Vc \ Vc−1 are empty.) Since dim(Vj ) ≤ j if j < c by assumption, it follows that dim(Z) ≤ c − 1.  24 MARK E. WALKER Corollary 4.8. If Assumptions 4.3 hold, then the Jacobian complex Ω·dW is exact everywhere except in the right-most position, and hence determines a resolution of JW (n) by locally free coherent sheaves. We will need the following result in the next section. Proposition 4.9. Under Assumptions 4.3, there is an open dense subset U of Pc−1 such that for every k-rational point [a1 : · · · : ac ] ∈ U , the singular locus of k the morphism X ai fi : V → A1k i has dimension 0. Proof. Let Z be the closed subvariety of Pc−1 ×k V defined by the vanishing of k dW (see (4.6)). The fiber of the projection map π : Z → Pc−1 over a k-rational k point [a : · · · : a ] may be identified with the singular locus of the morphism 1 c P 1 a f : V → A . The claim is thus that there is a open dense subset U of Pc−1 over i i k i k which the fibers of π have dimension zero. Such a U exists because dim(Z) ≤ c − 1, as we established in the proof of Proposition 4.7. (U may be taken to be the complement of π(B) where B is the closed subset {z ∈ Z | dim π −1 π(z) ≥ 1} of Z.)  5. The vanishing of Chern characters In this section, we prove that the top Chern class of a twisted matrix factorization vanishes in certain situations. We combine this with a Theorem of PolishchukVaintrob to establish the vanishing of hc and ηc under suitable hypotheses. 5.1. The vanishing of the top Chern class. The following theorem forms the key technical result of this paper. Theorem 5.1. If Assumptions 4.3 hold and in addition Pn is even, char(p) ∤ n!, c−1 and c ≥ 2, then ctop (E) = 0 for any E ∈ mf (PQ , O(1), i fi Ti ). Proof. The key point is that, under Assumptions 4.3 with c ≥ 2, we have (5.2) HP0c−1 ×{v1 ,...,vm } (Pc−1 ×k V, JW (i)) = 0 k for all i < n. To prove this, since HP0c−1 ×{v1 ,...,vm } (Pc−1 ×k V, JW (i)) = m M HP0c−1 ×{vi } (Pc−1 ×k V, JW (i)) i=1 and since we may replace V = Spec(Q) by any open neighborhood of vi without affecting the Q-module HP0c−1 ×{vi } (Pc−1 ×k V, JW (i)), we may assume m = 1 and that there exists a regular sequence of elements x1 , . . . , xn ∈ m that generate the maximal ideal m of Q corresponding to v = v1 . Write C := C(x1 , . . . , xn ) for the “augmented Cech complex”   M  1  M 1 1 Q → → ··· → Q , Q Q→ xi xi xj x1 · · · xn i,j i CHERN CHARACTERS FOR TWISTED MATRIX FACTORIZATIONS 25 with Q in cohomological degree 0. Equivalently C = C(x1 ) ⊗Q · · · ⊗Q C(xn ), where h i c−1 1 , we have C(xi ) = (Q ֒→ Q xi ). For any coherent sheaf F on PQ HP0c−1 ×{v} (Pc−1 ×k V, F ) = Γ(Pc−1 ×k V, H0 (F ⊗Q C)). (5.3) The complex C is exact in all degrees except in degree n, and we set E = H n (C). Explicitly, i h 1 Q x1 ···x n h i. E= 1 Σi Q x1 ···xˆi ···xn (The localization of E at m is an injective hull of the residue field, but we do not ∼ need this fact.) Thus we have a quasi-isomorphism C − → E[−n]. By Corollary 4.8, there is a quasi-isomorphism ∼ Ω·dW (−n)[n] − → JW . Since C is a complex of flat modules, the map ∼ → JW ⊗Q C Ω·dW (−n)[n] ⊗Q C − ∼ is also a quasi-isomorphism. Combining this with the quasi-isomorphism C − → E[−n] gives an isomorphism in the derived category Ω· (−n) ⊗Q E ∼ = JW ⊗ C. dW For any i we obtain an isomorphism H0 (JW (i) ⊗ C) ∼ = H0 (Ω·dW (i − n) ⊗Q E) of quasi-coherent sheaves. We thus obtain from (5.3) the isomorphism  Pc−1 ×k V, JW (i) ∼ (5.4) Γ c−1 = Γ Pc−1 ×k V, H0 (Ω· Pk ×{v} k dW (i k But H0 (Ω·dW (i − n) ⊗Q E) is the kernel of  − n) ⊗Q E) dW ∧− OPc−1 (i − n) ⊗Q E −−−−→ Ω1Pc−1 /Pc−1 (i − n + 1) ⊗Q E. Q Q k Since c − 1 ≥ 1, the coherent sheaf OPc−1 (i − n) has no global section when i < n, Q and hence  Γ Pc−1 ×k V, H0 (Ω·dW (i − n) ⊗Q E) = 0, k which establishes (5.2). P Let Y be the closed subscheme of X = Pc−1 × V cut out by W = i fi Ti . k c−1 We claim Sing(Y /k) ⊆ P × {v , . . . , v }. Indeed, Sing(Y /k) is defined by the 1 m k P 1 d(f )T = 0 and f = 0, i = 1, . . . c, where d(f ) ∈ Ω . The equations i i i i i Q/k first equation cuts out a subvariety contained in Pc−1 × V , where, recall, Vc−1 k c−1 k denotes the singular locus of f : V → Ack . The equations fi = 0, i = 1, . . . c, cut out Pc−1 ×k f −1 (0). But Vc−1 ∩ f −1 (0) = Sing(f −1 (0)) = {v1 , . . . , vm }. k Since Nonreg(Y ) ⊆ Sing(Y /k), we deduce from (5.2) that c−1 0 ×k V, JW (i)) = 0. HNonreg(Y ) (Pk The vanishing of ctop (E) now follows from Proposition 2.31. Corollary 5.5. If • k is a field of characteristic 0,  26 MARK E. WALKER • Q is a smooth k-algebra of even dimension, • f1 , . . . , fc ∈ Q forms a regular sequence of elements with c ≥ 2, and • the singular locus of Q/(f1 , . . . , fc ), is zero-dimensional, P then ctop (E) = 0 for all E ∈ mf (Pc−1 Q , O(1), i fi Ti ). Proof. Let {v1 , . . . , vm } be the singular locus of Q/(f1 , . . . , fc ) and let V ′ = Spec(Q′ ) be an affine open neighborhood of it such that dim(Vi′ ) ≤ i for all i ≤ c − 1. The existence of such a V ′ is given by Lemma 4.4. The result follows from the (proof of the) Theorem, since the map X X fi Ti ) fi Ti ) → HP0c−1 ×{v ,...,v } (Pc−1 HP0c−1 ×{v ,...,v } (Pc−1 Q′ , O, Q , O, k 1 m i k 1 m i is an isomorphism.  5.2. The Polishchuk-Vaintrob Riemann-Roch Theorem. We recall a Theorem of Polishchuk-Vaintrob that relates the Euler characteristic of (affine) hypersurfaces with isolated singularities to Chern characters. This beautiful theorem should be regarded as a form of a “Riemann-Roch” theorem. Since PolishchukVaintrob work in a somewhat different setting that we do, we begin by recalling their notion of a Chern character. For a field k and integer n, define Q̂ := k[[x1 , . . . , xn ]], a power series ring in n variables, and let f ∈ Q̂ be such that the only non-regular point of Q̂/f is its maximal ideal. Define Ω̂·Q̂/k to be the exterior algebra on the free Q̂-module Ω̂1Q̂/k = Q̂dx1 ⊕ · · · ⊕ Q̂dxn . In other words, Ω̂·Q̂/k = Ω·k[x1 ,...,xn ]/k ⊗k[x1 ,...,xn ] Q̂. Finally, define Note that   n−1 df ∧− Jˆ(Q̂/k, f ) = coker Ω̂Q̂/k −−−→ Ω̂nQ̂/k . k[[x1 , . . . , xn ]] dx1 ∧ . . . ∧ dxn . Jˆ(Q̂/k, f ) ∼ = ∂f ∂f h ∂x1 , . . . , ∂x i n Definition 5.6. With the notation above, given a matrix factorization E ∈ mf (Q̂, f ), A upon choosing bases, it may be written as E = (Q̂r −=== − Q̂r ) for r × r matrices B A, B with entries in Q̂. When n is even, we define the Polishchuk-Vaintrob Chern character of E to be   n factors }| { z n chPV (E) = (−1)( 2 ) tr dA ∧ dB ∧ · · · ∧ dB  ∈ Jˆ(Q̂/k, f ). Theorem 5.7 (Polishchuk-Vaintrob). Assume k is a field of characteristic 0 and f ∈ Q̂ = k[[x1 , . . . , xn ]] is a power series such that R := Q̂/f has in an isolated singularity (i.e., Rp is regular for all p 6= m). If n is odd, then χ(E, F) = 0 for all E, F ∈ mf (Q̂, f ). If n is even, there is a pairing h−, −i on Jˆ(Q̂, f ), namely the residue pairing, such that for all E, F ∈ mf (Q̂, f ), we have χ(E, F) = hchPV (E), chPV (F)i. CHERN CHARACTERS FOR TWISTED MATRIX FACTORIZATIONS 27 In particular, χ(E, F) = 0 if either chPV (E) = 0 or chPV (F) = 0. It is easy to deduce from their Theorem the following slight generalization of it, which we will need to prove Theorem 5.11 below. Corollary 5.8. Assume k is a field of characteristic 0, Q is a smooth k-algebra of dimension n, f ∈ Q is a non-zero-divisor such that the singular locus of R := Q/f is zero-dimensional. Given E ∈ mf (Q, f ), if either n is odd or n is even and n−1 ctop (E) = 0 in J (Q/k, f ) = ΩnQ/k /df ∧ ΩQ/k , then χ(E, F) = 0 for all F ∈ mf (Q, f ). Proof. We start be reducing to the case where R has just one singular point m and it is k-rational. We have X χmf (Q,f ) (E, F) = χmf (Qm ,f ) (Em , Fm ) m where the sum ranges over the singular points of R. If k is an algebraic closure of k, then for each such m we have ∼ Hom∗ Hom∗hmf (Qm ,f ) (Em , Fm ) ⊗k k = (Em ⊗k k, Fm ⊗k k) hmf (Qm ⊗k k,f ⊗1) and hence χmf (Qm ⊗k k,f ⊗1) (Em ⊗k k, Fm ⊗k k) = [Q/m : k] · χmf (Qm ,f ) (Em , Fm ). It thus suffices to prove the Corollary for a suitably small affine open neighborhood of each maximal ideal m of Q ⊗k k at which Q ⊗k k/f is singular. In this case, a choice of a regular sequence of generators x1 , . . . , xn of the maximal ideal of Qm allows us to identify the completion of Q along m with Q̂ = k[[x1 , . . . , xn ]]. By Lemma 3.5, χmf (Q,f ) (E, F) = χmf (Q̂,f ) (Ê, F̂) where Ê = E⊗Q Q̂ and F̂ = F⊗Q Q̂. Moreover, under the evident map J (Qm /k, f ) → Jˆ(Q̂/k, f ), ctop (E) is sent to a non-zero multiple of chPV (Ê) by Example 2.30. The result now follows from the Polishchuk-Vaintrob Theorem.  5.3. Vanishing of the higher h and η Invariants. We apply our vanishing result for ctop to prove that the invariants hc and ηc vanish for codimension c ≥ 2 isolated singularities in characteristic 0, under some mild additional hypotheses. First, we use the following lemma to prove the two invariants are closely related. I thank Hailong Dao for providing me with its proof. Lemma 5.9 (Dao). Let R = Q/(f1 , . . . , fc ) for a regular ring Q and a regular sequence of elements f1 , . . . , fc ∈ Q with c ≥ 1. Assume M and N are finitely geni erated R-modules and that M is MCM. If TorR i (M, N ) and ExtR (HomR (M, R), N ) have finite length for i ≫ 0, then ηcR (M, N ) = (−1)c hR c (HomR (M, R), N ). In particular, if the non-regular locus of R is zero dimensional and hc vanishes for all pairs of finitely generated R-modules, then so does ηc . Remark 5.10. The conditions that TorR i (M, N ) has finite length for i ≫ 0 and that ExtiR (HomR (M, R), N ) has finite length for i ≫ 0 are equivalent; see [13, 4.2]. 28 MARK E. WALKER Proof. We proceed by induction on c. The case c = 1 follows from the isomorphism [6, 4.2] i R d R (HomR (M, R), N ) ∼ d −i−1 (M, N ). Ext = Tor Let S = Q/(f1 , . . . , fc−1 ) so that R = S/(fc ) with fc a non-zero-divisor of S. By [5, 4.3] and [4, 3.4], TorSi (M, N ) and ExtiS (HomR (M, R), N ) have finite length for i ≫ 0 and 1 S ηcR (M, N ) = ηc−1 (M, N ) 2c 1 S hR h (HomR (M, R), N ). c (HomR (M, R), N ) = 2c c−1 Let S n −−։ M be a surjection of S-modules with kernel M ′ so that we have the short exact sequence 0 → M ′ → S n → M → 0. Observe that M ′ is an MCM S-module. Since fc ·M = 0 and fc is a non-zero-divisor ∼ = of S, we have HomS (M, S n ) = 0. Using also the isomorphism HomR (M, R) − → 1 ExtS (M, S) of S-modules coming from the long exact sequence of Ext modules fc associated to the sequence 0 → S −→ S → R → 0, we obtain the short exact sequence 0 → S n → HomS (M ′ , S) → HomR (M, R) → 0. In particular, it follows from these short exact sequences that TorSi (M ′ , N ) and ExtiS (HomS (M ′ , S), N ) have finite length for i ≫ 0. Moreover, since hSc−1 vanishes on free S-modules and is additive for short exact sequences, we have hSc−1 (HomS (M ′ , S), N ) = hSc−1 (HomR (M, R), N ). Using the induction hypotheses, we get 1 1 S S h (HomS (M ′ , S), N ) = (−1)c−1 ηc−1 (M ′ , N ). hR c (HomR (M, R), N ) = 2c c−1 2c S S Finally, ηc−1 (M ′ , N ) = −ηc−1 (M, N ), since M ′ is a first syzygy of M . Combining these equations gives ηcR (M, N ) = (−1)c hR c−1 (HomR (M, R), N ). The final assertion holds since ηc is completely determined by its values on MCM modules.  Theorem 5.11. Assume • k is field of characteristic 0, • Q is a smooth k-algebra, • f1 , . . . , fc ∈ Q form a regular sequence of elements, • the singular locus of R := Q/(f1 , . . . , fc ) is zero-dimensional, and • c ≥ 2. R Then hR c (M, N ) = 0 and ηc (M, N ) = 0 for all finitely generated R-modules M and N. Remark 5.12. Since k is a perfect field, the hypotheses that Q is a smooth k algebra is equivalent to Q being a finitely generated and regular k-algebra. Likewise, Sing(R/k) = Nonreg(R). CHERN CHARACTERS FOR TWISTED MATRIX FACTORIZATIONS 29 Proof. By Lemma 5.9, it suffices to prove hR c (M, N ) = 0. The value of this invariant is unchanged if we semi-localize at Nonreg(R). So, upon replacing Spec(Q) with a suitably small affine open neighborhood of Nonreg(R), Lemma 4.4 allows us to assume all of Assumptions 4.3 hold. Let EM , EN ∈ mf (Pc−1 Q , O(1), W ) be twisted matrix factorizations corresponding to the classes of M, N in Dsg (R) under the equivalence of Theorem 3.6. Now choose a1 , . . . , ac ∈ k as in Proposition P 4.9 so that the singular locus of Q/g is zero dimensional, where we define g := i ai fi . A key fact we use is that hR c is related to the classical Herbrand difference of the hypersurface Q/g: By [4, 3.4], for all finitely generated R-modules M and N , we have 1 Q/g hR (M, N ) = hQ/g (M, N ), c (M, N ) = h1 2 and thus it suffices to prove hQ/g (M, N ) = 0. By Proposition 3.7 the affine matrix factorizations i∗ EM , i∗ EN ∈ hmf (Q, g) represent the classes of M, N in Dsg (Q/g), where i : Spec(Q) ֒→ Pc−1 is the closed immersion associated to the k-rational Q point [a1 : · · · , ac ] of Pc−1 . It thus follows from (3.4) that k hQ/g (M, N ) = χ(i∗ EM , i∗ EN ). By Corollary 5.8, it suffices to prove ctop (i∗ EM ) = 0 in J (Qm /k) (when n is even). But ctop (i∗ EM ) = i∗ ctop (EM ) by Corollary 2.35 and ctop (EM ) = 0 by Corollary 5.5.  Appendix A. Relative Connections We record here some well known facts concerning connections for locally free coherent sheaves. Throughout, S is a Noetherian, separated scheme and p : X → S is a smooth morphism; i.e., p is separated, flat and of finite type and Ω1X/S is locally free. Definition A.1. For a vector bundle (i.e., locally free coherent sheaf) E on X, a connection on E relative to p is a map of sheaves of abelian groups ∇ : E → Ω1X/S ⊗OX E on X satisfying the Leibnitz rule on sections: given an open subset U ⊆ X and elements f ∈ Γ(U, OX ) and e ∈ Γ(U, E), we have ∇(f · e) = df ⊗ e + f ∇(e) in Γ(U, Ω1X/S ⊗OX E), where d : OX → Ω1X/S denotes exterior differentiation relative to p. Note that imply that ∇ is OS -linear — more precisely, p∗ (∇) :   the hypotheses p∗ E → p∗ Ω1X/S ⊗OX E is a morphism of quasi-coherent sheaves on S. A.1. The classical Atiyah class. Let ∆ : X → X ×S X be the diagonal map, which, since X → S is separated, is a closed immersion, and let I denote the sheaf of ideals cutting out ∆(X). Since p is smooth, I is locally generated by a regular sequence. Recall that I/I 2 ∼ = ∆∗ Ω1X/S . Consider the coherent sheaf P̃X/S := OX×S X /I 2 on X ×S X. Observe that P̃X/S is supported on ∆(X), so that (πi )∗ P̃X/S is a coherent sheaf on X, for i = 1, 2, where πi : X ×S X → X denotes projection onto the i-th factor. 30 MARK E. WALKER The two push-forwards (πi )∗ P̃X/S , i = 1, 2 are canonically isomorphic as sheaves of abelian groups, but have different structures as OX -modules. We write PX/S = P for the sheaf of abelian groups (π1 )∗ P̃ = (π2 )∗ P̃ regarded as a OX − OX -bimodule where the left OX -module structure is given by identifying it with (π1 )∗ P̃X/S the right OX -module structure is given by identifying it with (π2 )∗ P̃X/S . Locally on an affine open subset U = Spec(Q) of X lying over an affine open −·− subset V = Spec(A) of S, we have PU/V = (Q⊗A Q)/I 2 , where I = ker(Q⊗A Q −−−→ Q) and the left and right Q-module structures are given in the obvious way. There is an isomorphism of coherent sheaves on X × X ∼ ∆∗ Ω1 = I/I 2 X/S given locally on generators by dg 7→ g ⊗ 1 − 1 ⊗ g. From this we obtain the short exact sequence 0 → Ω1X/S → PX/S → OX → 0. (A.2) This may be thought of as a sequence of OX − OX -bimodules, but for Ω1X/S and OX the two structures coincide. Locally on open subsets U and V as above, we have Ω1Q/A ∼ = I/I 2 , and (A.2) takes the form 0 → I/I 2 → (Q ⊗A Q)/I 2 → Q → 0. Viewing (A.2) as either a sequence of left or right modules, it is a split exact sequence of locally free coherent sheaves on X. For example, a splitting of PX/S → OX as right modules may be given as follows: Recall that as a right module, PX/S = (π2 )∗ P and so a map of right modules OX → PX/S is given by a map π2∗ OX → PX/S . Now, π2∗ OX = OX×S X , and the map we use is the canonical surjection. We refer to this splitting as the canonical right splitting of (A.2). Locally on subsets U and V as above, the canonical right splitting of (Q ⊗A Q)/I 2 −−։ Q is given by q 7→ 1 ⊗ q. Given a locally free coherent sheaf E on X, we tensor (A.2) on the right by E to obtain the short exact sequence π i →E →0 → PX/S ⊗OX E − 0 → Ω1X/S ⊗OX E − (A.3) of OX − OX -bimodules. Taking section on affine open subsets U and V as before, letting E = Γ(U, E), this sequence has the form 0 → Ω1Q/A ⊗Q E → (Q ⊗A E)/I 2 · E → E → 0. Since (A.2) is split exact as a sequence of right modules and tensor product preserves split exact sequences, (A.3) is split exact as a sequence of right OX -modules, and the canonical right splitting of (A.2) determines a canonical right splitting of (A.3), which we write as can : E → PX/S ⊗OX E. The map can is given locally on sections by e 7→ 1 ⊗ e. In general, (A.3) need not split as a sequence of left modules. Viewed as a sequence of left modules, (A.3) determines an element of Ext1 (E, Ω1 ⊗O E) ∼ = H 1 (X, Ω1 ⊗O EndO (E)), OX X/S X X/S X X sometimes called the “Atiyah class” of E relative to p. To distinguish this class from what we have called the Atiyah class of a matrix factorization in the body of CHERN CHARACTERS FOR TWISTED MATRIX FACTORIZATIONS 31 this paper, we will call this class the classical Atiyah class of the vector bundle E, and we write it as (E) ∈ Ext1OX (E, Ω1X/S ). Atclassical X/S The sequence (A.3) splits as a sequence of left modules if and only if Atclassical = 0. X/S Lemma A.4. If p : X → S is affine, then the classical Atiyah class of any vector bundle E on X vanishes, and hence (A.3) splits as a sequence of left modules. Proof. Since p is affine, p∗ is exact. Applying p∗ to (A.3) results in a sequence of OS − OS bimodules (which are quasi-coherent for both actions). But since p ◦ π1 = p ◦ π2 these two actions coincide. Moreover, since (A.3) splits as right modules, so does its push-forward along p∗ . It thus suffices to prove the following general fact: If F := (0 → F ′ → F → F ′′ → 0) is a short exact sequence of vector bundles on X such that p∗ (F ) splits as a sequence of quasi-coherent sheaves on S, then F splits. To prove this, observe that F determines a class in H 1 (X, HomOX (F ′′ , F ′ )) and it is split if and only if this class vanishes. We may identify H 1 (X, HomOX (F ′′ , F ′ )) with H 1 (S, p∗ HomOX (F ′′ , F ′ )) since p is affine. Moreover, the class of F ∈ H 1 (S, p∗ HomOX (F ′′ , F ′ )) is the image of the class of p∗ (F ) ∈ H 1 (S, HomOS (p∗ F ′′ , p∗ F ′ )) under the map induced by the canonical map HomOS (p∗ F ′′ , p∗ F ′ ) → p∗ HomOX (F ′′ , F ′ ). But by our assumption the class of p∗ (F ) vanishes since p∗ F splits.  A.2. The vanishing of the classical Atiyah class and connections. Suppose σ : E → PX/S ⊗OX E is a splitting of the map π in (A.3) as left modules and recall can : E → PX/S ⊗OX E is the splitting of π as a morphism of right modules given locally by e 7→ 1 ⊗ e. Since σ and can are splittings of the same map regarded as a map of sheaves of abelian groups, the difference σ − can factors as i ◦ ∇σ for a unique map of sheaves of abelian groups ∇σ : E → Ω1X/S ⊗OX P. Lemma A.5. The map ∇σ is a connection on E relative to p. Proof. The property of being a connection may be verified locally, in which case the result is well known. In more detail, restricting to an affine open U = Spec(Q) of X lying over an affine open V = Spec(A) of S, we assume E is a projective Q-module and that we are given a splitting σ of the map of left Q-modules (Q ⊗A E)/I 2 · E −−։ E. The map ∇σ = (σ − can) lands in I/I 2 ⊗Q Q = Ω1Q/A ⊗Q E, and for a ∈ A, e ∈ E we have ∇σ (ae) = σ(ae) − 1 ⊗ ae = aσ(e) − 1 ⊗ ae = aσ(e) − a ⊗ e + a ⊗ e − 1 ⊗ ae = a(σ(e) − 1 ⊗ e) + (a ⊗ 1 − 1 ⊗ a) ⊗ e = a∇σ (e) + da ⊗ e, since da is identified with a ⊗ 1 − 1 ⊗ a under Ω1Q/A ∼ = I/I 2 .  32 MARK E. WALKER Lemma A.6. Suppose E, E ′ are locally free coherent sheaves on X and ∇, ∇′ are connections for each relative to p. If g : E → E ′ is a morphisms of coherent sheaves, then the map ∇′ ◦ g − (id ⊗g) ◦ ∇ : E → Ω1X/S ⊗OX E ′ is a morphism of coherent sheaves. Proof. Given an open set U and elements f ∈ Γ(U, OX ), e ∈ Γ(U, E), the displayed map sends f · e ∈ Γ(U, E) to ∇′ (g(f e)) − (id ⊗g)(df ⊗ e − f ∇(e) = ∇′ (f g(e)) − df ⊗ g(e) − f (id ⊗g)(∇(e)) = df ⊗ g(e) + f ∇′ (g(e)) − df ⊗ g(e) − f (id ⊗g)(∇(e)) = f ∇′ (g(e)) − f (id ⊗g)(∇(e)) = f ((∇′ ◦ g − (id ⊗g) ◦ ∇) (e)) .  Proposition A.7. For a vector bundle E on X, the function σ 7→ ∇σ determines a bijection between the set of splittings of the map π in (A.3) as a map of left modules and the set of connections on E relative to p. In particular, E admits a connection relative to p if and only if Atclassical (E) = 0. X/S Proof. From Lemma A.6 with g being the identity map, the difference of two connections on E is OX -linear. By choosing any one splitting σ0 of (A.3) and its associated connection ∇0 = ∇σ0 , the inverse of σ 7→ ∇σ is given by ∇ 7→ ∇ − ∇σ0 + σ0 .  References 1. R. O. Buchweitz, Maximal Cohen-Macaulay modules and Tate cohomology over Gorenstein rings, unpublished, available at http://hdl.handle.net/1807/16682, 1987. 2. Jesse Burke and Mark E. Walker, Matrix factorizations in higher codimension, ArXiv e-prints (2012). 3. Jesse Burke and Mark E. Walker, Matrix factorizations over projective schemes, Homology Homotopy Appl. 14 (2012), no. 2, 37–61. MR 3007084 4. Olgur Celikbas and Hailong Dao, Asymptotic behavior of Ext functors for modules of finite complete intersection dimension, Math. Z. 269 (2011), no. 3-4, 1005–1020. MR 2860275 5. Hailong Dao, Asymptotic behavior of Tor over complete intersections and applications, ArXiv e-prints (2007). 6. Hailong Dao, Some observations on local and projective hypersurfaces, Math. Res. Lett. 15 (2008), no. 2, 207–219. MR 2385635 (2009c:13032) 7. Tobias Dyckerhoff, Compact generators in categories of matrix factorizations, Duke Math. J. 159 (2011), no. 2, 223–274. MR 2824483 (2012h:18014) 8. Tobias Dyckerhoff and Daniel Murfet, The Kapustin-Li formula revisited, Adv. Math. 231 (2012), no. 3-4, 1858–1885. MR 2964627 , Pushing forward matrix factorizations, Duke Math. J. 162 (2013), no. 7, 1249–1311. 9. MR 3079249 10. David Eisenbud, Homological algebra on a complete intersection, with an application to group representations, Trans. Amer. Math. Soc. 260 (1980), no. 1, 35–64. MR 570778 (82d:13013) 11. Robin Hartshorne, Algebraic geometry, Springer-Verlag, New York, 1977, Graduate Texts in Mathematics, No. 52. MR 0463157 (57 #3116) CHERN CHARACTERS FOR TWISTED MATRIX FACTORIZATIONS 33 12. Melvin Hochster, The dimension of an intersection in an ambient hypersurface, Algebraic geometry (Chicago, Ill., 1980), Lecture Notes in Math., vol. 862, Springer, Berlin, 1981, pp. 93–106. 13. Craig Huneke and David A. Jorgensen, Symmetry in the vanishing of Ext over Gorenstein rings, Math. Scand. 93 (2003), no. 2, 161–184. MR 2009580 (2004k:13039) 14. Anton Kapustin and Yi Li, D-branes in Landau-Ginzburg models and algebraic geometry, J. High Energy Phys. (2003), no. 12, 005, 44 pp. (electronic). MR 2041170 (2005b:81179b) 15. Kevin H. Lin and Daniel Pomerleano, Global matrix factorizations, Math. Res. Lett. 20 (2013), no. 1, 91–106. MR 3126725 16. W. Frank Moore, Greg Piepmeyer, Sandra Spiroff, and Mark E. Walker, The vanishing of a higher codimension analogue of Hochster’s theta invariant, Math. Z. 273 (2013), no. 3-4, 907–920. MR 3030683 17. Daniel Murfet, Residues and duality for singularity categories of isolated Gorenstein singularities, Compos. Math. 149 (2013), no. 12, 2071–2100. MR 3143706 18. Dmitri Orlov, Matrix factorizations for nonaffine LG-models, Math. Ann., To appear. , Triangulated categories of singularities, and equivalences between Landau-Ginzburg 19. models, Mat. Sb. 197 (2006), no. 12, 117–132. MR 2437083 (2009g:14013) 20. D. Platt, Chern Character for Global Matrix Factorizations, ArXiv e-prints (2012). 21. Alexander Polishchuk and Arkady Vaintrob, Matrix factorizations and singularity categories for stacks, Ann. Inst. Fourier (Grenoble) 61 (2011), no. 7, 2609–2642. MR 3112502 22. , Chern characters and Hirzebruch-Riemann-Roch formula for matrix factorizations, Duke Math. J. 161 (2012), no. 10, 1863–1926. MR 2954619 23. Leonid Positselski, Coherent analogues of matrix factorizations and relative singularity categories, arXiv:1102.0261. 24. A. Preygel, Thom-Sebastiani and Duality for Matrix Factorizations, ArXiv e-prints (2011). 25. Ed Segal, The closed state space of affine Landau-Ginzburg B-models, J. Noncommut. Geom. 7 (2013), no. 3, 857–883. MR 3108698 26. Yu Xuan, Geometric study of the category of matrix factorizations, (2013), unpublished, available at http://digitalcommons.unl.edu/mathstudent/45. Department of Mathematics, University of Nebraska, Lincoln, NE 68588 E-mail address: [email protected]
0math.AC
arXiv:1706.02850v1 [cs.CV] 9 Jun 2017 Weakly supervised training of deep convolutional neural networks for overhead pedestrian localization in depth fields Alessandro Corbetta Department of Applied Physics Eindhoven University of Technology Vlado Menkovski Department of Mathematics and Computer Science Eindhoven University of Technology [email protected] [email protected] Federico Toschi Department of Applied Physics and Department of Mathematics and Computer Science Eindhoven University of Technology [email protected] 1. Introduction Abstract Depth field data encodes the distance between each recorded point and the camera plane. This allows for highly-accurate crowd dynamics analyses in real-world scenarios, i.e. outside of laboratory environments [1]. With this technology, for the first time, the ability to analyze between several thousands to few millions actual pedestrian trajectories has been achieved [3, 6, 7]. This enabled new statistical insights, unbiased by artificial laboratory conditions (e.g. need for participants to wear tracking hats or vests, and dynamics regulated by the experimenter instructions) [2, 5, 13, 16]. Furthermore, depth measurements do naturally protect the privacy of the pedestrians, since individuals remain unrecognizable. This is a requirement for real-life measurements, and a challenge for methods that use imaging rather than depth field data [8]. Pedestrian positioning from depth field data, acquired from sensors such as Microsoft Kinects [9], requires addressing two key tasks, namely: background subtraction and head localization. For a number of common cases these two tasks have a straight-forward solution. Since the camera takes a birds eye view, the background can be simply subtracted by removing all points beyond a depth threshold. The head localization can be approached similarly, in fact the points closest to the camera are part of the pedestrian heads. So far, these tasks have been tackled via hand-crafted approaches that rely on expert-tweaked depthcloud clustering algorithms [13] (CL). These approaches segment the different objects mainly based on the assumption that a cluster of neighboring points forms a pedestrian. This assumption typically holds when the dynamics on the scene involve low pedestrian densities (about 1.5 ped./m2 Overhead depth map measurements capture sufficient amount of information to enable human experts to track pedestrians accurately. However, fully automating this process using image analysis algorithms can be challenging. Even though hand-crafted image analysis algorithms are successful in many common cases, they fail frequently when there are complex interactions of multiple objects in the image. Many of the assumptions underpinning the handcrafted solutions do not hold in these cases and the multitude of exceptions are hard to model precisely. Deep Learning (DL) algorithms, on the other hand, do not require hand crafted solutions and are the current state-of-the-art in object localization in images. However, they require exceeding amount of annotations to produce successful models. In the case of object localization these annotations are difficult and time consuming to produce. In this work we present an approach for developing pedestrian localization models using DL algorithms with efficient weak supervision from an expert. We circumvent the need for annotation of large corpus of data by annotating only small amount of patches and relying on synthetic data augmentation as a vehicle for injecting expert knowledge in the model training. This approach of weak supervision through expert selection of representative patches, suitable transformations and synthetic data augmentations enables us to successfully develop DL models for pedestrian localization efficiently. 1 (A) (B) The major advantage that DL methods have over ML image analysis is that they incorporate automatic feature extraction (or representation learning) as part of the model training. However, one of the main disadvantages of these approaches is the difficulty in incorporating expert knowledge about the problem and hence the requirement of significant amount of annotations [15]. Therefore, to develop DL models for pedestrian localization, an expert needs to produce a large amount of handannotated images. These images and their annotations can then be used to train a DL model such as a Deep Convolution Neural Network (CNN) to produce the target model. As the number of annotations can be quite high, this becomes very labor intensive and diminishes the advantages of using CNNs. In this work we address this problem by proposing a method for efficient collection of expert annotations for pedestrian tracking using depth field images. Our contribution is twofold: Figure 1. (A) Example scenario of under-performing localization employing a clustering (CL) approach. The comparison with the ground truth in (B) shows some typical mistakes, e.g. the inability to disentangle close subjects, especially when they are small in size (as infants, cf. top and left of the scene). Furthermore, typical CL approaches cannot distinguish shapes, thus the localization at the bottom includes a static obstacle. max [7]), assorted homogeneously (i.e. composed of adults of similar size, with no elements such as strollers, carts, and bikes) and developing in simple geometric settings (corridors in [7, 13, 16]). However, such designed approaches do not generalize well and are sensitive to a number of special case scenarios. This can be as simple as a raised hand that is interpreted as a head, but it becomes a larger issue when pedestrian density increases and CL algorithms experience difficulties in disentangling the individuals. Furthermore, these problems only increase when there are other (i.e. non-pedestrian) objects in the scene, such as moving doors, trolleys and obstacles. Figure 1 contains a sample depth-field map picturing 9 pedestrians, 3 of which are infant (notice the smaller size), and 1 static object. The CL based localization in Fig. 1(A) shows some typical mistakes (cf. ground truth in Fig. 1(B)): twice a couple formed by an adult and a child (top and left side of the scene) is detected as a unique individual. Based on the shape of the objects, an expert instead recognizes that the likely scenario involves two individuals standing close to each other. The CL algorithms also fails to disentangle a pedestrian at the bottom from a static obstacle in their neighborhood (even though they are not connected). This follows from the small size of the object and the lack of ability of the CL approach to classify shapes. Detailing every exception and crafting appropriate rules to deal with such complexity becomes difficult and requires significant effort that does not transfer well across different measurement scenarios and implementations. On the other hand, Machine Learning (ML) methods for image analysis rely on training data rather than design of rules and exceptions. Given sufficient data and good features, these models tend to perform well and are robust to special cases. The success of these approaches has been particularly demonstrated with recent developments in Deep Learning (DL). DL models obtain excellent performance and are currently state-of-the-art in image localization [11]. • we design a CNN model that can detect a large number of objects in a high density scenario suitable for pedestrian tracking with overhead depth field images; • we develop a ’soft’ supervision procedure that provides training data for the model by selecting a number of patches in the original data, designing suitable transformations to the patches and generation of realistic synthetic data for the CNN model. The obtained model can be used for real time pedestrian detection in depth field maps, possibly on large areas exploiting Graphical Processing Units (GPU). This paper is structured as follows: in Sect. 2 we provide some selected background on depth map based crowd recording setups. On this basis, in Sect. 3 we describe our synthetic data generation procedure as well as our neural network and its training method. In Sect. 5, we examine the detection performance. A final discussion section closes the paper. 2. Depth-field measurements Overhead depth-field maps for pedestrian dynamics analyses A typical depth-field measurement apparatus for pedestrian dynamics include sensors placed overhead and aligned with the vertical axis. Bird eye view, in fact, avoid mutual occlusions thus eases localization tasks. Moreover, to bypass the limited range of commercial devices such as Microsoft KinectTM , sensors are arranged in grids to enlarge the measurement areas. This requires a merge of the individual sensor signal. Different stitching approaches have been considered: for instance, in [7], depth images are unified into large depth frames to then undergo detection and tracking algorithms. In [13], the tracking information from 2 different sensors are merged a posteriori. In the next paragraph, we review some elements of the former approach as it supports the depth maps “combination algebra” we employ to generate synthetic annotated depth maps (see Sect. 3.2) it has detected in the image. The model can also associate a class to each object. For our application we only provide detection of the objects, since we do not need to detect different types of objects. The model overlays a grid over the image, and produces a binary detection decision for each cell in the grid. It also produces an offset and the width and height of the bounding box for that object. The bounding box size is not limited to the cell size. For a S × S regular grid the model produces: Depth-field maps combination algebra In [7], depthfield maps from neighboring Kinect sensors are merged enabling to track pedestrians over a relatively large area. This requires two operations: (1) the depth-field measured from each sensor is converted from a perspective view into an axonometric view. Overhead axonometric views of pedestrians are translation invariant, which means that a pedestrian is represented with the same depth patch regardless whether they are at the center or at the edges of the sensor view (cf. patches in Fig. 1). (2) The axonometric view enables seamless combination of depth-field maps from neighboring sensors. Given two neighboring sensors returning the depth maps d1 = d1 (x, y) and d2 = d2 (x, y) we combine them as zi = (xi , yi , wi , hi , ni , pi ) with i = 1, . . . , S 2 , where xi , yi are the Cartesian coordinates of the bounding box at the i-th tile, whose width and height are, respectively, wi and hi . pi denotes the probability that zi is actually a bounding box. Namely, for ground truth data, pi = 0 whenever zi plays the role of a placeholder, conversely pi = 1 states that the i-th is a non void bounding box. Finally, ni = 1 − pi and is kept for extensibility to multi-type object detection. The network we employ is composed of a first section aimed at feature extraction. This is followed by a densely connected section that combines local features into bounding boxes estimates. The input are depth images (thus single channel) at resolution 160 × 120 (VGA resolution downsampled by a factor 4 in each direction). Feature extraction occurs through two stacked layer blocks, each of which contains two convolutional layers with small filter size (3 × 3) and a final max pool layer. This architecture is closely related to the VGG network [14]. The convolutional layers and pooling layers are followed by fully connected layers that end with the output layer consisting of linear outputs for the bounding box parameters and softmax for the detection probabilities. The diagram of the network is given in Fig. 2. As non-linear function approximators, DL models are trained through a non-convex optimization procedure that minimizes a defined loss function. Due the complex multipart output of our model, we needed to define multi-part loss function L: c((d1 , τ1 ), (d2 , τ2 )) = minimum{(d1 ◦ τ1 ), (d2 ◦ τ2 )}. (1) In words, the depth field maps are first rigidly translated (by a composition with the motions τ1 and τ2 ), to register with the relative positions of the sensors in the physical space. Then the component-wise minimum is extracted. This is used to retain for each location the value of smallest distance, actually observed from an aerial view. The operation in Eq. (1) is commutative and associative, so it can be extended to an arbitrary number of cameras (or depth patches). 3. Method 3.1. CNN model for object localization Neural networks, more particularly CNNs have demonstrated particular success in image analysis [12]. The major advantage is their hierarchical structure that allows the models to build complex features and form efficient representation of the input data. In this method we aim to leverage this advantage to improve the detection and localization of pedestrians from depth maps. We expect that efficient features and sufficient supervision will produce models that better disentangle multiple nearby objects and make more accurate distinction between pedestrian and other objects in the scene. The architecture of the proposed CNN model is closely related to the YOLO object localization approach [10]. This approach offers computationally efficient localization. This opens the possibility for real-time analysis or large number of objects, which are advantageous properties for large scale pedestrian tracking. The model processes the whole image in a single pass and produces a set of bounding boxes for each object that 2 L= S X gt 2 gt λH H̃(zi , zgt i ) + λL2 pi L̃2 (zi , zi ), (2) i=1 Respectively, it holds • the “gt” denotes a ground truth (synthetic) bounding box data; • H̃ is the categorical cross-entropy function restricted to the (ni , pi ) components of the bounding box vector zi ; • L̃2 is the ordinary Euclidean distance among the spatial components (xi , yi , wi , hi ) of the bounding box 3 Inputs 1x120x160 Feature maps 32x120x160 Feature maps 32x120x160 Feature maps 32x60x80 Feature maps 64x60x80 Feature maps 64x60x80 Feature maps 64x30x40 Hidden units 76800 Hidden units 512 Outputs S²x6 x y wh n p x y wh n p ... Convolution 3x3 kernel Act:ReLu Convolution 3x3 kernel Act:ReLu Max-pooling 2x2 kernel Convolution 3x3 kernel Act:ReLu Convolution 3x3 kernel Act:ReLu Max-pooling 2x2 kernel Flatten x y wh n p Fully connected Act:4xReLu+SoftMax Fully connected Act:ReLu Figure 2. Diagram of the neural network employed. Kernel sizes and activation functions (Act) are below each layer. vector. Notably, the function is multiplied by pgt i , which acts as a switch, turning off the loss for the location parameters when there is no object present in the ground truth; • λH and λL2 are weighting factors for the linear combination of the two metrics. 3.2. Weak supervision through synthetic data DL methods rely on training data to develop models. Beyond this and the network architecture, most of the options for adding expert knowledge are indirect. One common way to guide the training is to augment or add synthetically generated training data. This allows for adding properties to the model such as invariances to translation, rotation, mirroring and skewing. One can even go further and add noise or synthetic generation of data that relies on understanding of the domain. This way the model is exposed to larger range of variances from the input space and can achieve better generalization with smaller amount of natural data available. We use this opportunity to deal with the difficulty in providing annotations for our problem. We achieve this by selecting patches from the original data that correspond to pedestrians. The patches provide for both a example of a pedestrian and an annotation of the bounding box around the pedestrian. We then use these patches and other patches of nonpedestrian objects to build a synthetic image for training. We further inject expert knowledge about the the real data by deciding on how the synthetic images are composed and by applying carefully designed transformations to the selected patches. In this manner we achieve an outstanding amount of training data will little effort from the expert. More specifically the approach relies on a human expert to identify few hundred bounding boxes among those annotated correctly by a clustering-based algorithm (cf. Sect 1). Here we employ a random selection of real depth maps from existing crowd tracking experiments. These are typically result of the combined output of multi-sensor setups. This a set of “overhead human patches” Pu . Figure 3. A selection of patches defined by the expert and used for the synthetic data generation. The last 12 items are depth artifacts or objects to be ignored by the localization algorithm. 1.0 0.9 0.8 0.7 0.6 0.5 0.4 0.3 avg. precision (A) CNN 5 CL 5 CNN 10 CL 10 20 40 pedestrians 1.0 0.9 0.8 0.7 0.6 0.5 0.4 0.3 avg. recall (B) 1.0 IoU coefficient (C) 0.8 0.6 0.4 0.2 20 40 pedestrians 0.0 CNN 5 CL 5 CNN 10CL 10 Figure 4. Comparison between CNN and CL localization approaches in case S = Sa = 5 and S = Sa = 10. We include average precision (A) and average recall (B), both conditioned to the number of pedestrians observed, and intersection over union coefficient (C). Secondly, we ask the human expert to manually extract patches that are not pedestrians. These can be of two types: 1. objects and architectonic elements (such as bags, strollers, carts, tables, and doors), Po ; 2. depth artifacts from sensor errors (noisy “stain-looking” patches in the depth 4 (1) (A) CL (B) CNN (C) (3) (A) CL (B) CNN (C) (2) (A) CL (B) Sample Experiment Pedestrians 1 2 3 S=5 S=10 9 18 15 Precision CL CNN 1 1 0.94 1 0.75 0.82 CNN (C) Recall CL CNN 0.77 1 0.72 0.94 0.60 0.93 Figure 5. Localization algorithms in action in our two experiments. Comparison of synthetic data (A), clustering-based algorithm (B), and our CNN (C). Case (1) is analogous to Fig. 1. Precison and recall data for the three samples are in the table. A higher recall for the CNN approach can be observed as side by side subjects and static objects are typically correctly recognized. field, counting from few pixels to few dozens), Pn . We combine via Eq. (1) elements randomly extracted from augmented versions of Pu , Po and Pn , say P̂u , P̂o and P̂n . We begin with an empty depth map at VGA resolution (native output resolution of single Kinect sensors), on which we overlay a S×S regular grid (cf. network output in Sect. 3.1). For each grid tile, we choose, with probability q whether to place an additional pedestrian patch chosen randomly from P̂u . We assign to the patch centroid a position on the tile surface with uniform probability. Thus, the total number of pedestrians in the depth maps follows a binomial distribution with n = S 2 and probability q. As a second step, we extract N ∼ Poisson(λ) patches from P̂o ∪ P̂n , that we place at random in the final map. We further apply random transformation to the patches including: 90o rotations, flipping, pixel removal (i.e. pixels are replaced with the floor depth) and addition (i.e. pixels are replaced with the median value of the image), and rigid depth translation. Finally, we add Gaussian noise to the produced image as another layer of regularization. tn denote, respectively, false positives and true negatives). We consider the CNN output zi to hold a bounding box prediction if pi > 0.5. We further score the accuracy of each true positive computing the intersection over union (IoU) of predicted and actual bounding box. We keep the number of pedestrians as a parameter in the analysis, as we expect it to be a major determinant of performance degradation. Data and CNN training We employ pedestrian patches, as in Fig. 3, extracted from past measurement setups in which the sensor was located approximately 4 meters above the ground. Similarly to a single Kinect operating in these conditions, synthetic depth-field maps cover an area of about1 LM × Lm = 2.9 m × 2.2 m = 6.4 m2 . During the training phase, we expose the two networks to synthetic data featuring a cell occupation probability q respectively of qa = 0.5 and qb = 0.2. Hence, in case S = Sa , the network can detect up to 25 pedestrians and, due to the grid constraint, the minimum distance admitted between the centroids of first neighbors is, in the worst case, LM /Sa = 0.58 m. During the training the network is exposed to an average of n = 12.5 pedestrians per depth image (average density: 1.9 ped/m2 ). In case S = Sb the network can detect up to 100 pedestrians and the minimum distance between the centroid of first neighbors is 0.28 m (this potentially encompasses people walking hand in hand). During the training the network is exposed to depth images including an average of n = 20 pedestrians (average density: 3.1 ped/m2 ). We implemented and trained our networks through the Keras library [4] with tensorflow GPU backend. We trained the two networks for a total of 300 epochs, each including 64.000 random training depth maps and 6.400 random validation depth maps (batch size: 64). Clustering algorithm and test data The CL algorithm 4. Experiment design We conduct two experiments aiming at comparing the performance of our CNN with a CL algorithm. The experiments differ in the grid size adopted for the CNN, respectively S = Sa = 5 and S = Sb = 10. Each of our CNN undergoes a training phase against synthetic data (cf. Sect 3.2). Then, we expose both the CNN and the considered CL algorithm to further synthetic data (more general and not seen during the training) and we measure their performance. Performance evaluation To grade the performance of the algorithms we consider their output on a cell basis. We evaluate the algorithms precision (i.e. tp/(tp + f p), cf. explanation below) and recall (i.e. tp/(tp + f n)). We account cell measurement as a true positive, tp, if the cell is correctly predicted to hold the centroid of a bounding box (let f p and 1 Calculated considering the characteristic field of view of Kinect sensors [9] plus the assumption that individuals of height larger or equal than 1.4 m have to be fully resolved, even at the edges of the camera sight cone 5 we compare with is similar to what employed in [7, 13]. First, foreground blobs are randomly sampled. Hence, the samples undergo a complete-linkage hierarchical clustering. The clustering tree is cut at a cutoff height comparable with the average human shoulder size. Finally, the cluster larger than a threshold are retained as pedestrians. We compare, employing synthetic data, our two CNNs with one CL algorithm, which has fixed parameters. Synthesized test depth data include between 1 and 20 pedestrians (roughly uniformly distributed), for comparison with the first CNN, and between 1 and 35 for comparison with the second CNN. ples, we developed a procedure producing synthetic training data as a means for efficient delivery of ’soft’ supervision from an expert. References [1] M. Boltes and A. Seyfried. Collecting pedestrian trajectories. Neurocomputing, 100:127–133, 2013. [2] D. Brščić, T. Kanda, T. Ikeda, and T. Miyashita. Person tracking in large public spaces using 3-d range sensors. IEEE Trans. Human-Mach. Syst., 43(6):522–534, 2013. [3] D. Brščić, F. Zanlungo, and T. Kanda. Density and velocity patterns during one year of pedestrian tracking. Transportation Research Procedia, 2:77 – 86, 2014. [4] F. Chollet. Keras. https://github.com/fchollet/keras, 2015. [5] A. Corbetta, L. Bruno, A. Muntean, and F. Toschi. High statistics measurements of pedestrian dynamics. Transportation Research Procedia, 2:96–104, 2014. [6] A. Corbetta, C. Lee, R. Benzi, A. Muntean, and F. Toschi. Fluctuations around mean walking behaviours in diluted pedestrian flows. Phys. Rev. E, 95:032316, 2017. [7] A. Corbetta, J. Meeusen, C. Lee, and F. Toschi. Continuous measurements of real-life bidirectional pedestrian flows on a wide walkway. In Pedestrian and Evacuation Dynamics 2016, pages 18–24. University of Science and Technology of China press, 2016. [8] A. Johansson, D. Helbing, and P. Shukla. Specification of the social force pedestrian model by evolutionary adjustment to video tracking data. Advances in complex systems, 10(supp02):271–288, 2007. [9] Microsoft Corp. Kinect for Xbox 360, available online: http://www.xbox.com/en-us/kinect/, 2011. Redmond, WA, USA. [10] J. Redmon, S. Divvala, R. Girshick, and A. Farhadi. You only look once: Unified, real-time object detection. In The IEEE Conference on Computer Vision and Pattern Recognition (CVPR), June 2016. [11] O. Russakovsky, J. Deng, H. Su, J. Krause, S. Satheesh, S. Ma, Z. Huang, A. Karpathy, A. Khosla, M. Bernstein, A. Berg, and L. Fei-Fei. ImageNet Large Scale Visual Recognition Challenge. International Journal of Computer Vision (IJCV), 115(3):211–252, 2015. [12] O. Russakovsky, J. Deng, H. Su, J. Krause, S. Satheesh, S. Ma, Z. Huang, A. Karpathy, A. Khosla, M. Bernstein, et al. Imagenet large scale visual recognition challenge. International Journal of Computer Vision, 115(3):211–252, 2015. [13] S. Seer, N. Brändle, and C. Ratti. Kinects and human kinetics: A new approach for studying pedestrian behavior. Transport. Res. C-Emer., 48:212–228, 2014. [14] K. Simonyan and A. Zisserman. Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556, 2014. [15] F. Yu, A. Seff, Y. Zhang, S. Song, T. Funkhouser, and J. Xiao. Lsun: Construction of a large-scale image dataset using deep learning with humans in the loop. arXiv preprint arXiv:1506.03365, 2015. 5. Results and discussion In Fig. 4 we report the results of the experiments. Our CNN shows a precision equal (case S = 5) or higher (case S = 10) than the CL approach (Fig. 4(A)), and significantly better results for recall (Fig. 4(B)). For those cells in which a bounding box has been correctly localized, we evaluate the localization accuracy by measuring the IoU coefficient. In this case, the CNN performance is comparable with the CL approach. In Fig. 5 we include samples of synthetic depth field maps from our experiments for visual inspection. Following our expectations, the CNN delivers higher localization performance than the CL approach. In fact, the CNN succeeds in disentangling neighboring pedestrians and in avoiding non-pedestrian elements (cf. Fig. 5). This results in the higher recall performance. Notably, we leveraged expert knowledge efficiently to extract the patches combined in the synthetic depth maps. As the localization quality is determined by the examples rather than handcrafted procedures, we expect the method to generalize and transfer across different real-life measurement setups. Possibly with the only effort of enriching the patch library with object characteristic to specific location. 6. Consclusions We targeted a high performance pedestrian localization tool for overhead depth field data capable or running in real-time setting. Depth data is often employed in reallife pedestrian dynamics research, and, so far, hierarchical clustering-based approaches have been mostly used for localization. Here we aimed at bypassing the typical shortcomings of such approaches, leveraging the generalization power of deep learning models. We presented a convolutional neural network approach showing significantly higher recall performance than clustering methods. This was possible as the network learns the typical shape of individuals. As such it can disentangle neighboring subjects and diminish false positive outputs (e.g. objects, depth artifacts). To bypass the difficulties imposed by the need for a large number of annotated exam6 [16] F. Zanlungo, T. Ikeda, and T. Kanda. Potential for the dynamics of pedestrians in a socially interacting group. Phys. Rev. E, 89:012811, Jan 2014. 7
9cs.NE
Optimization of OFDM radar waveforms using genetic algorithms arXiv:1405.4894v1 [cs.NE] 25 Apr 2014 Gabriel Lellouch and Amit Kumar Mishra University of Cape Town, South Africa, [email protected] [email protected], Abstract. Keywords: OFDM Radar, Genetic Algorithm, NSGA-II, PSLR, ISLR, PMEPR In this paper, we present our investigations on the use of single objective and multiobjective genetic algorithms based optimisation algorithms to improve the design of OFDM pulses for radar. We discuss these optimization procedures in the scope of a waveform design intended for two different radar processing solutions. Lastly, we show how the encoding solution is suited to permit the optimizations of waveform for OFDM radar related challenges such as enhanced detection. 1 Introduction With the advent of powerful digital hardware, software defined radio and radar have become an active area of research and development [1]. This in turn has given rise to many new research directions in the radar community, which were previously not comprehensible. One such direction is the recently investigated OFDM radar [3], radars which use OFDM waveforms instead of the classic linear frequency modulated (LFM) waveform. OFDM is a special form of multicarrier modulation (MCM), where a single data stream is transmitted over a number of lower rate subcarriers. Alphabets such as BPSK, QPSK, etc., are commonly used to code the information. The resulting complex symbols, also called phase codes (-1,+1 in BPSK) are modulate the subcarriers [16]. When signal gets to the receiver, a demodulation stage retrieves the transmitted phase codes and eventually the binary message. In radar, the priority is to detect the presence of targets and possibly estimate some of their features through the following measurable quantities: range, Doppler, azimuth and elevation. It is thus of utmost interest for the radar designer to understand the possibilities offered by the OFDM structure and optimize it to suit its needs. It can be quickly verified that non-coded OFDM pulses will not be suitable in radar systems that operate with the conventional matched filter processing, since they will give rise to high sidelobes. Another drawback of non-coded OFDM pulses is their varying time domain signal. Strong variations are detrimental since these may saturate the signal and cause distortions. Therefore, the OFDM pulse needs to be tailored before it becomes a suitable radar waveform. In this work, we argue that the emerging evolutionary algorithms are particularly adapted to solve the pulse design problem when the pulse is an OFDM signal. Although a number of techniques have been proposed to mitigate the peak to mean envelope power ratio (PMEPR) and the peak-to-sidelobe ratio (PSLR) [14], their flexibility is somewhat limited. For example, the Newman phasing technique gives very low PMEPR for the single OFDM symbol case, and this for most numbers of subcarriers N . However, as soon as some subcarriers are suppressed the PMEPR deteriorates. It may be remarked here that it is not the scope of this paper to investigate the use of newer evolutionary techniques, rather we show how we can integrate some simple and easy-to-implement memetic computing techniques in the design of waveforms for OFDM radar. We will focus firstly on the genetic algorithm (GA) optimization technique and then on the multiple objective optimization genetic algorithm (MOO-GA) based technique. Although the former method offers a straightforward implementation [17], many implementations exist in the case of the MOO-GA. In this work, we use the well known non-dominated sorting genetic algorithm II (NSGA-II). It has proved to be much faster than the earlier version NSGA while providing diversity in the solutions [4]. There are two major novelties of this work. First of all, the use of OFDM pulses as a radar signal is in itself a new direction. Secondly, the use of GA based techniques to design OFDM radar pulses is also novel. The rest of the paper is organized as follows. In section 2 we present the first step of our waveform design and characterize the impact of the processing solution on this design. The objective here is to fix some of the OFDM parameters to build the frame of the waveform. We also stress the interconnection of the different OFDM parameters. In section 3 we discuss the details of the optimization. We review the various objective functions, discuss the parameters that we use in our optimization problem and give our motivations to use GA based techniques as compared to other existing methods. In section 4, we review both of our GA based optimization methods. We present the technical details of the encoding strategy as well as the population size. We then present and discuss our results in section 5. We start with the case of single objective optimization before moving on to the multiple objective optimization case. In section 6, we propose a case study where the single objective GA is integrated into a waveform design procedure for enhancing the target detection. We give our conclusions in section 5. 2 Waveform design In this section, we present the successive steps that form our design strategy for characterizing the fixed parameters of the pulses. We show how they are inferred from, on the one hand, the processing and on the other hand, the scenario. This analysis fixes the frame of our pulses. We will show in the following section how we optimize the rest of our free parameters to compose pulses with improved radar features. 2.1 Processing related constraints In the scope of a pulsed OFDM radar waveform, we proposed in [3] two processing alternatives. The first alternative is based on the combination of matched filtering and Doppler processing whilst the second alternative transforms the received signal in the frequency domain in the same way as OFDM communication systems operate. After a demodulation stage which suppresses the phase codes, two orthogonal DFT processing are applied to form a range Doppler image. The key characteristics of both processing are recalled in Table 1. In the rest of the paper we refer to the former as the conventional processing while we name the latter our frequency domain processing. Table 1. Conventional processing characteristics Conventional processing Immune to intersymbol inPros terference Doppler sidelobes are phase codes independent Cons Range sidelobes are phase codes dependent Frequency domain processing Range and Doppler sidelobes are phase codes independent Subject to intersymbol interference Because the frequency domain processing is subject to inter-symbol interference, we will use it to track targets. Indeed, in tracking configurations we can assume to have some prior knowledge of the illuminated scene and in particular the target extent. The rule of thumb is that the return echo from the closest point scatterer and the return echo from the furthest point scatterer of the target fall within the same time cell. When satisfied, this condition insures that the orthogonality between the subcarriers is maintained. This issue has been of utmost interest in the early years of OFDM signalling for communication to cope with the multipath effect. To that end the concept of cyclic prefix has been introduced [16]. In our current analysis, rather than inserting a cyclic prefix, we choose to match the size of the time cell according to the target extent. Since the conventional processing does not come up with a severe design constraint we choose to use the constraint of the frequency domain processing as the main guideline. Sampling frequency In our analysis, the received signal which we feed into either of these processing is the complex signal formed from the real and imaginary components respectively in the I and Q channels of the receiver. If the transmitted OFDM pulse has a bandwidth B, the received complex signal has the same bandwidth. Because the signal is complex, the Nyquist theorem states that the sampling frequency can be taken as low as fs = B and the time cell size is thus inversely proportional to the bandwidth, ts = 1/B. The size of the range cell is then given by c/2B, where c is the speed of light. Bandwidth As a result, if we want to design the size of the time cells such that, despite the superposition of all echoes returning from the different point scatterers of the target, the orthogonality property of the subcarriers is maintained, we shall adjust the bandwidth to comply with: c/2B ≥ ∆Rt where ∆Rt is the target range extent. Practically we can add a margin to account for the target radial velocity and the uncertainty on the target extent and position. Not only the received echoes shall remain in the same time cell as a result of the first pulse but also throughout the coherent processing interval. In the end the bandwidth can be obtained from: c (1) B= 2(∆R + α) where α is the margin in range. Therefore, if there is no need for high range resolution we suggest to base the bandwidth selection on intersymbol interference mitigation considerations instead. When the radar is in a tracking mode, the target is known and the use of high resolution range profiles is a fortiori not necessary. 2.2 Scenarios related constraints Other parameters need to be fixed. The pulse length and the number of subcarriers that will compose the OFDM signal. Pulse length Pulse compression waveforms have the unique advantage to offer low peak power transmissions over a long time to provide the same maximum detection range and the same range resolution as would be obtained from a short pulse with a high peak power. But since the radar receiver is switched off when the pulse is being transmitted we cannot afford to have a very long pulse. We commonly refer to as the eclipsed zone, the window that lies between the radar and the minimum detection range. Even though we could choose one value for each target, for simplicity we choose only one for all. If, say, we expect targets from Rmin = 1.5 km, an upper bound for the pulse length is found to be [15], tp = 2 · Rmin /c = 10 µs. Number of subcarriers The orthogonality property is another example of the unique OFDM structure. It states that the bit duration tb is inversely proportional to the subcarrier spacing ∆f , tb = 1/∆f . In the extreme case where the pulse is composed of one symbol the maximum number of subcarriers Nmax used in the pulse can be derived from: Nmax = 2BRmin c (2) For the same pulse bandwidth and pulse duration a smaller number of subcarriers can be used if we construct the pulse from several symbols. For example we can decide to use 250 subcarriers and have 4 symbols in the pulse to maintain the same duration. The subcarrier spacing is then increased from 100 kHz to 400 kHz. In light of the above analysis, the fixed parameters for our pulses are summarized in Table 2. Table 2. Scenarii characteristics for the waveform design Case 1 Case 2 (walker) (truck) Range extent (m) 2 10 Margin (m) 1 5 Bandwidth (MHz) 50 10 500 100 Maximum number of subcarriers 3 Optimizing the pulse for radar Having fixed the frame of our pulses, literally the bandwidth and the maximum number of subcarriers, we are now ready to concentrate our analysis on the optimization of the OFDM pulse for radar. Firstly, we need to define our objective functions and secondly, we need to identify the OFDM parameters that we will use to run our optimization procedure. 3.1 Objective functions An OFDM symbol is built as a sum of weighted complex sinusoids, where every sinusoid has a given starting phase. When the OFDM pulse is composed of several symbols it can be expressed as: x(t) = K N X X wn an,k rk (t) · exp(j2πn∆f t). (3) n=1 k=1 N is the number of subcarriers, wn corresponds to the weight applied on subcarrier n and the phase code an,k is attributed to subcarrier n in symbol k. K is the total number of symbols in the pulse. The function rk (t) refers to the rectangular window for every symbol:  1 (k − 1)tb ≤ t ≤ ktb rk (t) = 0 elsewhere When using OFDM for radar two important aspects must be considered. Sidelobe level Firstly, would the processing be based on a correlation function like in our conventional processing where matched filtering is applied in range, the sidelobes at the output shall be maintained as low as possible. This consideration is true for any signal and a fortiori for our OFDM signal. When both functions are equal, the correlation function becomes the autocorrelation function. The output of R(τ ) is then given by: Z ∞ R(τ ) = x(t)x∗ (t − τ )dt. (4) −∞ In our analysis, we rather use the discrete form R[m]: R[m] = NX K−1 x[p]x∗ [p − m], (5) p=0 where m takes integer values between −N K + 1 and N K − 1. x[p] represent the discrete values of the OFDM pulse taken at the discrete instants ptb /N =, where p takes integer numbers from 0 to N K − 1. If the pulse is composed of only one symbol, then p takes values from 0 to N − 1, just like n the subcarrier index. In the end, x[p] = x(ptb /N ). In Eq. 5, we assume that x[p] = 0 for all forbidden values of p, that is p < 0 and p > N K − 1. To cope with practical applications we commonly distinguish two objective functions. The first function is the peak sidelobe level ratio (PSLR). It returns the ratio between the highest sidelobe and the peak. max|R[m]| P SLR = m |R[0]| , m 6= 0 (6) The second function is the integrated sidelobe level ratio (ISLR). It returns the ratio between the cumulation of the sidelobes and the peak. P |R[m]| ISLR = m , m 6= 0 (7) |R[0]| The relative importance between these two figures of merit depends on the application as well as the environment. For example, if the radar operates in the presence of distributed clutter, it will be important to work with low ISLR in order to keep the weak targets visible. In that case, high ISLR can be interpreted as an increase of the noise floor. Conversely if the application requires detection of targets in the presence of strong discrete clutter, the PSLR is more critical and must be kept low to prevent from deceptively considering one sidelobe as another small target. Peak to mean envelope power ratio This second aspect is specific to OFDM signals. Its impact on the radar performance is less straightforward, nonetheless it is as relevant as the previous PSLR and ISLR. It characterizes the variations in time of the envelope. Too strong variations can be detrimental to the radar since the signal may saturate. A common expression for this peak-to-mean envelope power ratio (PMEPR) is given by [7]: max|x[n]|2 , P M EP R = 1 nP |x[n]|2 N (8) An important comment to make at this stage concerns the finesse of the sampling that we consider in each of our objective functions. In Eq. 6, Eq. 7 and Eq. 8, we have assumed to work at the critical sampling rate fs = B such that the sampling period is ts = tb /N , as a result of the relationships that govern the OFDM structure. In Fig. 1 we stress the impact of oversampling. Because of the quick temporal variations of the OFDM signal the PMEPR will not be the same at the critical sampling rate than it will be with an oversampling factor of 20. In [2], we stressed that the autocorrelation function of multicarrier signals presents strong variations between consecutive critically sampled instants, which is not the case of phase coded signal with a single carrier. Practically, the relevance to include or not oversampling in this analysis shall be evaluated with regard to the implementation strategy in terms of the baseband OFDM signal sampling frequency. In this work, we thus choose to oversample the OFDM signal before evaluating our objective functions. In Fig. 1(b), we show how both PSLR and ISLR calculations exclude the values around the main peak. Also discussed in [2], the total peak extent is equal to twice the Rayleigh resolution, which in time is 2/B. (a) Time domain OFDM pulse (b) Autocorrelation output Fig. 1. Pulse amplitude versus time of an uncoded OFDM pulse and autocorrelation function versus range. N = 3 and K = 3. Both functions are plotted at the critical sampling rate fs = B and with oversampling fs = 20B. Optimization strategy Thus, in the process of designing an OFDM pulse, extra care shall be employed so that the signal results in tolerable PMEPR as well as reasonable sidelobe level. Note however that in this statement we have assumed that the processing was based on a correlation function. In our case, this is valid when we intend to use our conventional processing. However, if rather, we decide to use our frequency domain processing, we have recalled in Table 1 that both the range and Doppler sidelobes were phase codes independent. In that case, the optimization can focus on the PMEPR only. In a nutshell, this analysis indicates that with our conventional processing we are interested in optimizing 3 objectives, while with our frequency domain processing, we would have a single objective. We thus have to come up with two solutions, a multi-objective solution and a single objective one. Parameters for optimization We have seen in Eq.3 that the parameters still available after our initial design in section 2 were the weights wn and the phase codes an,k . We decide to leave the weights and focus primarily on the phase codes. To justify this approach, we point out that the scattering centres of a target resonate variably at different frequencies, therefore it may be desirable to leave the weights for an optimization that would account for the target model as we will see in section 6. For now, we assume equal weights such that the pulse has normalized energy. The phase codes are also assumed to have constant modulus. Each an,k is thus a number on the unit complex circle. Existing optimization methods The problem of minimizing the PSLR and the PMEPR has been extensively researched since the emergence of the multicarrier concept. Levanon et al. [14] have reported some the major contributions in that field. Two strategies have popped up. The first strategy assumed identical sequences, such that all subcarriers are assigned the same phase code. Optimizing the PMEPR of the pulse results in optimizing the PMEPR of a single symbol. Newman, Schroeder and Narahashi have suggested different phasing methods to decrease the PMEPR. In their concept the weights wn are complex values with quadratic dependence on n. PMEPR as low as 2 (3dB) can be obtained for any relevant value of N (up to 65,000). The second design strategy is based on modulating all N subcarriers with consecutive ordered cyclic shifts (COCS) of an ideal chirplike sequence (CLS) of length K. For example, a OFDM pulse based on COCS of P4 codes can give PMEPRs below 2 and PSLR below -15 dB for a large range of N (between 0 and 70). Motivation for genetic algorithm optimization methods Although the aforementioned techniques produce excellent results in terms of PMEPR alone or PMEPR and PSLR combined, we suggest to introduce genetic algorithm based methods in this field for three main reasons. Firstly, it will diversify the solutions and increase the potential number of good codes. Not necessarily the best but those good enough for the application. Secondly, we can tune the objective functions to put emphasis on some criteria. For example, if we wish to have extremely low sidelobes close to the main peak in the autocorrelation function and can tolerate higher values further away, the objective function can be modified with no harm. Another example is the case of a banned sub-band. Assume that in the presence of a jammer we ban the use of one or few subcarriers. The energy on these subcarriers could be picked up and the presence of our transmission would be revealed. If we rely on any of the previous strategies, the loss of one or more subcarriers can potentially destroy the PMEPR, the PSLR or both. Another interesting example is the use of sparse spectrum OFDM pulses to mitigate the range ambiguity in SAR OFDM [9]. In both cases, the genetic algorithm based optimization can come up with sets of phase codes that will improve both the PMEPR and the PSLR in either of these configurations. Thirdly, we can also optimize the ISLR which is not in the focus of the other methods. Not only we can optimize it solely but we can optimize it together with the PSLR and the PMEPR by means of multi-objective optimization (MOO) techniques. 4 Optimization techniques In this section, we present the genetic algorithm based techniques that we use to find our phase codes. Problem encoding The first step in the implementation of any genetic algorithm is to generate an initial population. Following the canonical genetic algorithm guideline [17], this implies encoding each element of the population into a binary string. Note however that techniques based on real numbers have also been developed [6]. The MOO-GA that we discuss in section 4.1 applies one of them. For now, we simply encode one phase code (value between 0 and 2π) into a string of q genes. When we are dealing with a pulse composed of N subcarriers and K symbols, we end up with N K strings of q genes each. Stacking these strings together we create one element of the population, which is then formed from Q = N Kq genes. This element is called a chromosome. If we require to use for example binary phase shift keying (BPSK), then q = 1, quadrature phase shift keying (QPSK), then q = 2. In the more general case where we have no restriction we can consider the largest value authorized by our system. In our case we use q = 18. The resolution in angle is then ∆θ = 2π/2q ' 0.024 mrad. Note that the larger q the slower the algorithm. This is caused by the increase of the search space as discussed hereafter. With the values of N and K that we consider in this paper, the chromosome length can be as large as 9000, (N = 500 and K = 1). The search space S ”reduces” to the binary strings of length Q. Population size To understand what the population size L shall be, we followed the guideline given in [13]. The starting point is to say that every point in the search space shall be reachable from the initial population by crossover only. This can happen only if there is at least one instance of every gene at each locus in the entire population. On the assumption that every gene is generated with random probability (P(1)=1/2 and P(0)=1/2) the probability that at least one gene is present at each locus is given by: P = (1 − (1/2)L )Q (9) With Q = 9000 we see that L ' 23 when we take P = 99.9% and L ' 26 when we take P = 99.99%. 4.1 Genetic algorithm The genetic algorithm implemented in this work is a two-stage process. Goldberg defined this class of genetic algorithms as simple genetic algorithms (SGA) [17]. It starts with the current population. Then selection is applied to form the intermediate population. Next, recombination and mutation are applied to form the next population. The process of going from the current population to the next population represents one generation of the execution of the genetic algorithm. We mentioned earlier that we make use of this algorithm for the single objective optimization, where the objective is the PMEPR. The steps are: 1. Initialize the current population by generating L chromosomes. Each chromosome has its Q genes set to 0 or 1 with equal probability. 2. For each chromosome, convert the N K binary sequences into real numbers and create a set of N K phase codes: exp(jan,k ). 3. For any of the L sets, compute the oversampled complex OFDM signal, obtained as a result of applying an IDFT1 on the phase codes [8]. 4. Evaluate the PMEPR according to Eq. 8 and attach this number to the corresponding chromosome. 5. Form the intermediate population by discarding the weakest element (highest PMEPR) and duplicating the strongest element (lowest PMEPR). 6. Prepare for recombination by associating chromosomes by pair. Each pair shall be composed of two distinct chromosomes. 7. For each pair, apply a one point crossover [17]. This process results in the generation of L offspings. 8. Apply mutation every two generations. When the generation number is odd, select at random Lmut offsprings and for each of them apply mutation on one of their gene, again, selected at random. 9. Feed the intermediate population into the current population. Steps 2 to 9 are carried out until the stopping criteria is met. The latter is characterized by two elements. A threshold on the population mean fitness that guarantees satisfactory solutions in the current population as well as a threshold on the standard deviation which assesses the convergence of the entire population towards a minimum solution. 1 If there are several symbols in the pulse the IDFT is applied on each vector of phase codes corresponding to one symbol and so on. At the end the outputs are stacked together to form the pulse 4.2 Multi-objective genetic algorithm Our multi-objective problem could be solved as a single optimization problem by formulating an objective function in the form s = αP M EP R+βP SLR+γISLR and then optimizing with respect to s with our GA. The drawback of that solution is judicious selection of the weights. If multiple solutions are required, the problem has to be run repeatedly for different sets of weights. To overcome this difficulty, many multi-objective evolutionary optimization algorithms have been developed, which produce a set of non dominated solutions in a single run. In this work, we make use of the well-known non-dominated sorting genetic algorithm NSGA-II [4]. The principal breakthrough of this algorithm is the convergence towards the true Pareto optimal set with a good spread or diversity of the solutions [5]. When selecting the best elements not only the respective fitness functions are evaluated but also the crowding distance, which tells whether this element is in a high density zone or conversely in an low density zone. At equal fronts, we select the isolated element in order to maintain diversity in the solutions. In light of this preparation we describe the steps of this algorithm, which we use with either two or three of our objective functions. In comparison to our GA, the NSGA-II uses real numbers throughout. Genetic operations such as cross-over and mutation employ a method that simulates the equivalent binary processes. A thorough review of this technique is described in [6]. 1. Initialize the population with L sets of N K phases, all real numbers between 0 and 2π and calculate the phase codes exp(jan,k ). 2. For any of the L sets, compute the oversampled complex OFDM signal, obtained as a result of applying an IDFT on the phase codes and calculate the autocorrelation function. 3. Evaluate the objective functions following Eq. 6, Eq. 7 and Eq. 8. 4. Sort the chromosomes according to non-dominated sort and form the fronts (≡ rank). 5. Evaluate the crowding distance of each chromosome. 6. Select the parent chromosomes using binary tournament selection. In binary tournaments, two chromosomes are randomly chosen and the strongest in terms of rank is selected to be in the parent population. If individuals with the same rank are encountered, their crowding distance is compared. A lower rank and higher crowding distance is the selection criteria. The parent population has a size of L/2. 7. Apply genetic operations such as cross-over and mutation on the selected chromosomes to produce the off-springs. 8. Combine the off-spring population with the parent population and select the best L chromosomes for the next generation, again based on the rank and if needed on the crowding distance. Steps 2 to 8 are carried out until the stopping criteria is met, which occurs in this case when the total number of generations has been covered. 5 Simulation results In this section we present our simulation results. We start with the results obtained with our GA based algorithm. 5.1 Single objective: PMEPR In our simulations, we considered a population of L = 22 chromosomes, and the number of chromosomes selected for mutation every two generations was Lmut = 5. Despite the simplicity of our genetic algorithm, we are able to retrieve phase code sequences with optimal PMEPR properties. Following our previous comment, we address the interesting case of sparse spectrum. In Fig. 3, we compare the PMEPR of three sets of phase codes for two different configurations. In the first configuration, all subcarriers are enabled. We see in Fig. 2(a) that our GA solution with 10 subcarriers outperforms the Newman solution. We also show the relative gain as compared to the uncoded case. The latter results in the highest PMEPR. Possibly not harmful with 10 subcarriers it cannot be tolerated with 500 subcarriers. In Fig. 2(b) we present our GA solution when we disabled two subcarriers and compare now the PMEPR of this solution with the Newman and uncoded cases when the same subcarriers have been disabled. Our GA solution outperforms the Newman solution. (a) Full band (b) 80% of the band Fig. 2. Time domain signal of the OFDM symbol for different coding. When the coverage of the band is sparse our GA solution outperforms significantly the Newman phase coding. In Table 3, we evaluated the PMEPR for higher numbers of subcarriers. We chose to use N = 500 and N = 100 to comply with our design parameters summarized in Table 2. We observe that when we face a sparse spectrum we have no difficulty to find solutions that outperform the Newman phases. The results given in the last column were produced while using only two genes per phase, as with QPSK. This aspect is attractive in particular if we were to use a communication system for radar with a predefined alphabet, such as QPSK, etc. Table 3. Simulation results for the PMEPR (in dB) with different levels of sparsity Full N=100 70% 50% Full N=500 70% 50% No coding Newman GA solution GA solution (QPSK) 100 1.8 3.3 3.4 70 4.2 2.9 3.1 50 4.1 3.2 3.3 500 1.8 3.9 4.6 350 4.9 3.9 4.6 250 5.0 4.5 4.5 In Fig. 3, we show the convergence of our GA for both cases of ”no modulation” and QPSK modulation. We observe what we could intuitively guess. Because of the shorter chromosome size, the QPSK tends to converge in a more chaotic manner than our ”no modulation” case. In the latter, each phase code is represented by a binary string composed of 18 bits. As a result, from one generation to the next, the genetic operations will transform the phase code set (equivalent chromosome) in a less radical fashion than with QPSK. The convergence appears thus smoother. (a) No modulation (18 genes) (b) QPSK (2 genes) Fig. 3. Convergence of the SGA when using either 18 genes or 2 genes to describe one phase. The population contains 22 elements. 5.2 Multiple obectives: PMEPR and PSLR One of the benefit of the NSGA-II as compared to the prior version, NSGA is its fast computing time as a result of the selection strategy based on chromosome rank and crowding distance. On top, the use of binary simulated crossover and mutation improves the algorithm complexity. The large chromosome sizes from our GA are simply suppressed as we work throughout the algorithm with sets of real numbers for the phase codes. In Figs. 4, we present the improvement obtained with the NSGA-II when we intend to find a set of phase codes for our two design cases given in Table 2. In both cases, we have taken a smaller number of subcarriers, but the time bandwidth product remains the same, N K = 100 and N K = 500 respectively. For comparison, we plotted 100 realizations of the initial random population. With a population size equal to L = 40, our clouds comprise 4000 points. After 10000 generations our set of optimal solutions is considerably improved. (a) N =25, K=4 (b) N =125, K=4 Fig. 4. Comparison between random phases and phases resulting from the NSGA-II optimization. In Fig. 5, we propose to compare three cases, all having equal time bandwidth product, like in our design. We see that when the same number of generations is considered, the design with the smallest number of subcarrier will provide the best pareto front. Again, this results confirms an intuitive guess. 5.3 Multiple objectives: PMEPR, PSLR and ISLR As opposed to the single optimization case, which we presented in [2], we can feed our three objective functions of interest into our MOO-GA to provide us with a 3D map of solutions, related to a particular design. In light of the intended application and the design constraints the most suitable solution can be selected. Fig. 6 shows the 3D pareto fronts of the design cases evaluated in [2]. (a) N =25, K=4 (b) N =125, K=4 Fig. 5. Convergence of the NSGA-II optimization. Fig. 6. Pareto front after 10000 generations for two pulse design. 6 Case study: GA for PMEPR optimization in a target detection enhancement procedure In this section we show how our single objective GA optimization can be integrated in a procedure intended to enhance the target detection. Our OFDM pulse is tailored in two steps. Firstly, we find the best weights to enhance the detection. Secondly, we run our GA to find satisfactory sets of phase codes. Our procedure is presented in Fig. 7 Fig. 7. OFDM pulse optimization in two steps. 6.1 SNR as the design metric Unlike traditional notions where imaging-based metrics for waveform design are best for target detection and classification, which lead to our objectives of low PSLR and low ISLR, another approach relies on the well-known SNR metric. In that case, the optimum waveform will not necessarily have good PSLR nor ISLR properties. 6.2 Transmitted signal receiver-filter pair It has been shown [10] that the signal at the output of the matched filter Vs (f ), in a radar receiver, is given by the product of the target reflectivity spectrum ς(f ), the waveform spectrum X(f ) and the filter transfer function H(f ): Vs (f ) = ς(f + fc )X(f )H(f ). (10) The frequency domain operations undergone by the waveform are sumarized in Fig. 8, where Vtx (f ) is the Fourier transform of the transmitted signal vtx (t): vtx (t) = x(t) exp(j2πfc t), (11) fc is the carrier frequency and x(t) is the OFDM pulse as given in Eq. 3. In this analysis, we consider that the pulse is composed of a single OFDM symbol. Fig. 8. Model of the received signal in the frequency domain. Optimum receiver-filter pair In the case of an extended target, unlike the standard matched filtering problem applicable when the target is modelled as a point scatterer, the optimal receiver filter shall be matched to the waveform scattered by the target, not the transmitted target itself [11]. When this is the case, the maximum SNR at time t0 is given by the following equation [11]:   Z ∞ S |ς(f + fc )X(f )|2 = df. (12) N t0 Snn (f ) −∞ While previous works have researched solutions of this SNR optimization problem in the time domain, to find appropriate x(t), we argue that we can benefit from the OFDM structure and find directly X(f ). Assuming our OFDM signal to be zero outside its bandwidth2 , and considering that the stationary additive Gaussian noise is white, with one-sided power spectral density Snn (f ) = N0 , we can modify Eq. 12 into:   Z B 1 S = |X(f )ς(f + fc )|2 df, (13) N t0 N0 0 If we know the target reflectivity spectrum, we can rewrite Eq. 13 in discrete terms:   N −1 1 X S = |X[n]|2 · |ς[n]|2 , (14) N t0 N0 n=0 an where X[n] = w√nN is our discrete OFDM spectrum, X[n] = X(n∆f ) and n takes values from 0 to N − 1. Following this expression, when weights are equal to 1 the signal is normalized (unit energy). Assuming that we transmit at all subcarriers, our optimization problem reduces in finding the weights wn such that: arg max wn N −1 X wn2 2 · |ς[n]| , s.t. n=0  wn 6= 0 PN −1 2 n=0 wn = N (15) A solution to this problem is obtained when wn ∝ |ς[n]|. 6.3 Simulation setup and results In our analysis we choose to work at X-band. We consider a 2 GHz bandwidth B centred around 10 GHz, fc = 9 GHz. Before we elaborate on the reflectivity spectrum of our target within this band we stress the need to normalize ς[n] and describe our normalization strategy. Target reflectivity spectrum normalization For relevant comparisons, we normalize the discrete target reflectivity spectrum following the strategy suggested in chapter 14 in [12]. Essentially, when a flat spectrum OFDM pulse of unit energy interacts with the normalized reflectivity spectrum ςnorm [n], the 2 The OFDM spectrum of the baseband pulse is considered to spread between 0 and B rather -B/2 to B/2 frequency-domain reflected signal shall have unit average power. The discrete elements of our flat spectrum OFDM pulse of unit energy are given by X[n] = √ an / N . Hence, we find for ςnorm [n]: N2 · |ς[n]|2 , |ςnorm [n]|2 = PN −1 2 |ς[n]| n=0 6.4 (16) Complex target model In our simulation we construct a synthetic target from P = 50 point scatterers √ with equal unit reflectivity ςi = σi = 1 and located at ranges Ri from the radar. The individual point scatterers are assumed to be perfectly conducting spheres, large enough to have a reflectivity constant within the band of interest. It can be shown [15] that the compound target reflectivity spectrum ς(f ) is equal to: P X √ Ri ς(f ) = σi exp(−j4πf ). (17) c i=1 The point scatterers are randomly distributed within a rectangle, 5 meters wide and 10 meters long, whose center is 10 km away from the radar along the x axis. Fig. 9(a) shows the position of the scatterers, while Fig. 9(b) gives the target reflectivity power spectrum. As expected, we observe strong variations of the power spectrum within the frequency band. (a) Synthetic target (b) Reflectivity power spectrum Fig. 9. Complex target made of P = 50 point scatterers. 7 SNR and PMEPR improvements Following the above methodology, in the first step, the N weights are derived from the normalized target reflectivity spectrum, so that the intermediate OFDM spectrum X1 (f ) has enhanced detection capability. In the second step, X1 (f ) is fed into our GA optimization to find a set of N phase codes that will improve the PMEPR. In the end, as shown in Fig 7 our pulse Xopt (f ) has enhanced detection capabilities for the target of interest and a reasonably low PMEPR. (a) Weights (b) PMEPR improvement Fig. 10. Use of the single objective GA to optimize the PMEPR based when an optimized set of weights is applied on the subcarriers. In table 4, we show the gain in dB of the weights optimization method. Table 4. Result for the detection enhancement Average power (dB) 8 Flat spectrum Optimal weights 0 2.4 Conclusion In this paper, we showed that GA based techniques are suitable to optimize or improve the design of OFDM pulses for radar. We inspected the possibility to incorporate these optimization techniques in the more general waveform design in regards of two processing solutions. In our first conventional processing solution, primarily, the PSLR and the PMEPR need to be optimized. The former is a figure-of-merit for the detectability of small targets and the latter relates to the severity of the distortion. The MOO-GA based algorithm NGSA-II has been used to optimize this multi-objective problem. We observed that with the PMEPR and the PSLR for the objective functions a substantial improvement is achieved as compared to the case where random coding is applied. We also showed that the more symbols in the pulse the better the optimization in PMEPR and PSLR, for the same time bandwidth product. In our second, frequency domain processing solution, we stressed that the main focus should be on the minimization of the PMEPR. Therefore, the single objective GA can be used. We showed that this evolutionary technique can produce solutions that outperform the most robust methods. We also demonstrated that in some relevant cases, when the OFDM spectrum is sparse, our GA solution gives outstanding results. Finally, we presented a case study to attest the relevance of our GA optimization method where the optimization relies on the set of phase codes of the OFDM pulse. In this case study, we showed that the problem of finding a suitable radar pulse for enhancing the detection of a known target could be solved in two steps. In the first step, the weights of the subcarriers are selected in light of the target reflectivity spectrum. In the second step, our GA based optimization method is applied on this set of weights to search for the most appropriate phase codes that would minimize the PMEPR. For completeness we may conclude saying that when both PSLR and ISLR need to be optimized, we suggest to use a MOO-GA based on two objectives rather than three, and use the PMEPR as a constraint. References 1. Langman, A. and Hazarika, O. and Mishra, A.K. and Inggs, M. White RHINO: A Low Cost Whitespace Communications and Radar Hardware Platform. In Radioelektronika Conference, 2013, April. 2013. 2. Lellouch, G. and Mishra, A.K. Multi-carrier based Radar signal optimization using genetic algorithm. In Proceedings of the SocProS 2013, December. 2013. 3. Lellouch, G. and Mishra, A.K. and Inggs, M. Processing alternatives in OFDM Radar. Submitted to IEEE International Radar Conference, 2014, Oct. 2014. 4. Deb, K. and Pratap, A. and Agarwal, S. and Meyarivan, T. A fast and elitist multiobjective genetic algorithm: NSGA-II. In IEEE Transactions on Evolutionary Computation, vol. 6, number 2, pp. 182-197, 2002. 5. Seshadri, A. A fast elitist multiobjective genetic algorithm: NSGA-II. In MATLAB Central, 2006. 6. Agrawal, R.B. and Deb, K. Simulated binary crossover for continuous search space. In Citeseer, 1994. 7. Jones, A.E. and Wilkinson, T.A. and Barton S.K. Block Coding Scheme for Reduction of Peak to Mean Envelope Power Ratio of Multicarrier Transmission Schemes. In Electronics Letters,, vol. 30, issue 25, pp. 20982099, Dec. 1994. 8. Lellouch, G. and Tran, P. and Pribic, R. and Van Genderen, P. OFDM waveforms for frequency agility and opportunities for Doppler processing in radar. In IEEE Radar Conference, 2008, May. 2008, pp. 1-6. 9. Riché, V. and Meric, S. and Baudais, J-Y. and Pottier, E. Optimization of OFDM SAR signals for Range ambiguity suppression. In Radar Conference (EuRAD), 2012. 2012, pp. 278-281. 10. Wilkinson, A.J. and Lord, R.T. and Inggs, M.R. Stepped-frequency processing by reconstruction of target reflectivity spectrum. In Communications and Signal Processing, 1998. COMSIG’98.. 1998, pp. 101-104. 11. Bell, M.R. Information theory and radar waveform design. In IEEE Transactions on Information Theory, vol. 39, number 5, pp. 1578-1597, 1993. 12. Gini, F. and De Maio, A. and Patton, L. Waveform design and diversity for advanced radar systems. Institution of engineering and technology, 2012. 13. Reeves, C. Handbook of metaheuristics. 55–82 Springer, 2003. 14. Levanon, N. and Mozeson, E. Radar signals. Wiley-Interscience, 2004. 15. Richards, M.A. and Scheer, J. and Holm, W.A. Principles of modern radar: basic principles. SciTech Pub., 2010. 16. Hara, S. and Prasad, R. Multicarrier techniques for 4G mobile communications. Artech House Publishers, 2003. 17. Whitley D. A Genetic Algorithm Tutorial. Colorado State University.
9cs.NE
FINAL VERSION OF THIS PAPER AVAILABLE AT IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (HTTP://DX.DOI.ORG/10.1109/TII.2017.2676005) 1 Covert Attacks in Cyber-Physical Control Systems Alan Oliveira de Sá∗† , Luiz F. Rust da Costa Carmo∗‡ , Raphael C. S. Machado‡ of Mathematics / NCE - Tércio Pacitti Institute, Federal University of Rio de Janeiro, 21.941-901, RJ – Brazil † Admiral Wandenkolk Instruction Center – Brazilian Navy, Ilha das Enxadas, Baı́a de Guanabara – Rio de Janeiro – RJ – Brazil [email protected] † National Institute of Metrology, Quality and Technology (Inmetro) Av. Nossa Senhora das Graças, 50, Xerém, Duque de Caxias, 25.250-020, RJ – Brazil {lfrust,rcmachado}@inmetro.gov.br Index Terms—Security, Cyber-Physical Systems, Networked Control Systems. I. I NTRODUCTION T HE integration of the systems used to control physical processes via communication networks aims to assign to such systems better operational and management capabilities, as well as reduce its costs. Motivated by these advantages, there is a trend to have an increasing number of industrial process and critical infrastructure systems driven by Networked Control Systems (NCS) [1]–[4], also referred as NetworkBased Control Systems (NBCS) [5], [6]. A NCS, shown in Figure 1, consists of a physical plant, described by its transfer function G(z), a controller, which runs a control function C(z), and a communication network that interconnect both devices through a forward stream and a feedback stream. The forward stream connects the output of the controller to the plant’s actuators. The feedback stream connects the output of the plant’s sensors to the controller’s input. At the same time it brings several advantages, the integration of controllers and physical plants in a closed loop through a communication network also exposes such control systems to new threats, typical of the cyber domain. In this context, studies have been conduced aiming to characterize vulnerabilities and propose security solutions for the NCSs. Controller forward stream Plant r(k) + e(k) Control function _ C(z ) u(k) u’(k) Physical Process G(z ) Sensors Abstract—The advantages of using communication networks to interconnect controllers and physical plants motivate the increasing number of Networked Control Systems, in industrial and critical infrastructure facilities. However, this integration also exposes such control systems to new threats, typical of the cyber domain. In this context, studies have been conduced, aiming to explore vulnerabilities and propose security solutions for cyberphysical systems. In this paper, it is proposed a covert attack for service degradation, which is planned based on the intelligence gathered by another attack, herein proposed, referred as System Identification attack. The simulation results demonstrate that the joint operation of the two attacks is capable to affect, in a covert and accurate way, the physical behavior of a system. Actuators arXiv:1609.09537v3 [cs.CR] 3 Apr 2017 ∗ Institute Network y’(k) y(k) feedback stream Figure 1. Networked Control Systems (NCS) One possible way to attack a NCS is by hacking its software, i.e. changing the configuration or even the code executed by the controller, following a strategy similar to that used by the Stuxnet worm [7]. Another possible way for an attacker to negatively affect a NCS is by interfering on its communication process. Basically, an attacker may interfere in the forward and/or the feedback streams by three different means: inducing a jitter, causing data loss due to packet drop outs, or even injecting false data in the communication process. In this work, it is developed an attack where false data is injected in the communication process of a NCS. It is demonstrated the possibility to degrade the service performed by a plant, through interventions that produce subtle changes on its physical behavior. Such interventions aim to reduce the efficiency of the plant or even cause it damage in mid/long therm. It is worth mentioning that an uncontrolled intervention in a NCS may lead the plant to an immediate breakdown, or even significantly change its behavior, which may cause the disclosure of the attack and the eventual failure of the operation. Thus, the changes driven by the attack herein proposed are dimensioned so that the modifications in the plant’s behavior are physically difficult to be perceived. That is why the present attack is classified as physically covert. To ensure that the attack to a NCS is physically covert, the attacker must plan his offensive based on an accurate Copyright (c) 2017 IEEE. Personal use of this material is permitted. However, permission to use this material for any other purposes must be obtained from the IEEE by sending a request to [email protected]. The final version of this paper is available at http://dx.doi.org/10.1109/TII.2017.2676005. FINAL VERSION OF THIS PAPER AVAILABLE AT IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (HTTP://DX.DOI.ORG/10.1109/TII.2017.2676005) knowledge about the system dynamics, otherwise the consequences of the attack may be unpredictable. One possible way to obtain such knowledge is through conventional intelligence operations, performed to collect information regarding to the design and the dynamics of the NCS. Another way to gather information about the targeted system is through what we refer in this paper as a Cyber-Physical Intelligence attack. To this end, it is also proposed in this paper the System Identification attack, which aims to collect information about the plant’s transfer function G(z) and the controller’s control function C(z) of a NCS. This attack is proposed based on the Backtracking Search Optimization algorithm (BSA) [8]. This work motivated the formalization of a number of concepts related to covertness and intelligence in the context of the cyber-physical security. Thus, an additional contribution of this paper is the proposition of a terminology that encompasses a whole new class of attacks on cyber-physical systems. The proposed taxonomy establishes a new approach regarding to the covertness of attacks on cyber-physical systems, which must be analyzed from two aspects simultaneously: the physical and the cybernetic aspects. It is worth mentioning that the objective of this work is not to facilitate covert attacks for service degradation in cyberphysical control systems. The purpose of this work is to demonstrate the degree of accuracy that may be achieved in this kind of attack, especially when supported by System Identification attacks and, therefore, encourage the research for countermeasures to such attacks. The rest of this paper is organized as follows: First, in Section II, some related works are presented. Later, in Section III, it is proposed a taxonomy regarding to the cyber-physical attacks that may happen in the control loop of a NCS. In Section IV, it is described a System Identification attack. Then, in Section V, it is defined a cover attack for service degradation. After that, in Section VI, there are reported the results obtained by simulations of covert attacks for service degradation, supported by System Identification attacks. Finally, in Section VII, some conclusions and possible future works are presented. In [4], the authors present a Supervisory Control and Data Acquisition (SCADA) testbed using TrueTime, a MATLAB/Simulink based tool. They demonstrate an attack where a malicious agent sends false signals to the controller and to the actuator of a NCS. In that paper, the false signals are randomly generated aiming to make a DC motor lose its stability. This kind of attack does not require a previous knowledge about the plant and controller of the NCS. On the other hand, the desired physical effect and the covertness of the attack can not be ensured due to the unpredictable consequences of the application of random false signals to a system which the model is unknown. More recently, in [10], the authors give a general framework for the analysis of a wide variety of methods of attack in NCSs. In their classification, it is stated that covert attacks in NCSs require high level of knowledge about the targeted system. Exemples of covert attacks are provided in [11], [12]. In these works the attacks are reformed by a man-inthe-middle (MitM), where the attacker needs to know the model of the plant under attack and also inject false data in both the forward and the feedback streams. The covertness of the attacks described in [11], [12], which depends on the difference between the actual model of the plant and the model used by the attacker, is analyzed from the perspective of the signals arriving to the controller, without addressing if the physical effects on the plant are noticeable, or if they are covet when faced by a human observer. In [10]–[12], where it is required a previous knowledge about the models of the NCS under attack, it is not described how the knowledge about the system is obtained by the attacker. It is just stated that a model is previously known to subsidize the design of the attack. The joint operation, herein proposed, of a covert attack for service degradation, supported by a System Identification attack, aims to fill this hiatus, demonstrating how the data of a NCS can be obtained and how a covert attack can take advantage from it. The Table I presents a synthesis of the characteristics of the attacks referred in this section. Table I S YNTHESIS OF THE RELATED ATTACKS II. R ELATED W ORKS The possibility of cyber-physical attacks became a reality after the launch of the Stuxnet worm [7] and has been motivating researches concerning the security of NCSs. In this section, some works related to this subject are presented. In [6] the authors propose two queueing models to evaluate the impact of delay jitter and packet loss in a NCS under attack. The attack is not designed taking into account a previous knowledge about the models of the controller and the physical plant. Thus, to affect the plant’s behavior, the attacker arbitrarily floods the network with an additional traffic, causing jitter and packet loss. In this tactics, the excess of packets in the network can reduce the covertness of the attack, allowing the adoption of countermeasures, such as packet filtering [6] or blocking the malicious traffic on its origin [9]. Additionally, the arbitrary intervention in a system which the model is unknown may lead the plant to an extreme physical behavior, which is not desired if it is intended a covert attack. 2 Attack Stuxnet worm [7] Long, et al. [6] Farooqui, et al. [4] Smith [11], [12] Method Modifications in the PLC code Inducing jitter and packet loss Data injection Data injection System knowledge How the knowledge is obtained Yes None Experiments in a real system N/A None Yes N/A Not described III. TAXONOMY In this section it is presented a taxonomy concerning the possible attacks on cyber-physical control systems. In Section III-A, the attacks are briefly described and classified according to the way they act in the NCS. In Section III-B, it is proposed a new approach for the analysis of the covertness of attacks in cyber-physichal systems. A. Classification of the Attacks The attacks to cyber-physichal control systems may take place on its devices – i.e. the controller, and the plant’s sensors FINAL VERSION OF THIS PAPER AVAILABLE AT IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (HTTP://DX.DOI.ORG/10.1109/TII.2017.2676005) ^LJƐƚĞŵ<ŶŽǁůĞĚŐĞ ĐĐĞƐƐƚŽƚŚĞĚĂƚĂ ĐĐĞƐƐƚŽƚŚĞĐŽŶƚƌŽů ůŽŽƉ Ž^ͲŽŶƚƌŽůůĞĚ :ŝƚƚĞƌ Ž^ͲƌďŝƚƌĂƌLJ :ŝƚƚĞƌ Ž^ Ž^ͲƌďŝƚƌĂƌLJ ĂƚĂůŽƐƐ ZĞƋƵŝƌĞŵĞŶƚƐ and actuators – and/or on its communication system, affecting the forward and the feedback streams. As a premise, we must consider that the service intended to be attacked/protected in such system is the work performed by the physical process, controlled by the NCS. Considering the aforementioned definition of service in a NCS, the attacks may be classified within three different categories, as shown in Figure 2: • Denial-of-Service (DoS) [13]: in a NCS, the DoS attacks comprehends all kind of cyber-physical attacks that deny the operation of the physical process, interrupting the execution of the work, or service, that the controlled plant is intended to do. The attack results, for example, in behaviors that may shut the plant down or even destroy it in a short therm. • Service Degradation (SD): the SD attacks consist of malicious interventions that are done in the control loop in order to reduce the efficiency of the service, i.e. the efficiency of the physical process, or even reduce the mean time between failure (MTBF) of the plant in mid therm or long therm. • Cyber-physical Intelligence (CPI): the concept of Cyberphysical Intelligence, herein proposed, is different from the concept of where cyber-physical systems are integrated with intelligent systems [14]. In the present taxonomy, the CPI attacks comprehend actions that are performed in the control loop of a NCS in order to gather information about the system’s operation and/or its design. This attacks are intended to acquire the intelligence necessary to plan covert and controlled attacks, or even to subsidize data for replay attacks [7]. Ž^ͲƌďŝƚƌĂƌLJ ĂƚĂ/ŶũĞĐƚŝŽŶ Ž^ͲŽŶƚƌŽůůĞĚ ĂƚĂůŽƐƐ Ž^ͲŽŶƚƌŽůůĞĚ ĂƚĂ/ŶũĞĐƚŝŽŶ ^ͲŽŶƚƌŽůůĞĚ :ŝƚƚĞƌ ^ĞƌǀŝĐĞ ĞŐƌĂĚĂƚŝŽŶ ^ͲŽŶƚƌŽůůĞĚ ĂƚĂůŽƐƐ ^ͲŽŶƚƌŽůůĞĚ ĂƚĂ/ŶũĞĐƚŝŽŶ LJďĞƌͲƉŚLJƐŝĐĂů ŝŶƚĞůůŝŐĞŶĐĞ ĂǀĞƐĚƌŽƉƉŝŶŐ ;>ŽǁĞƌͿ ^LJƐƚĞŵ /ĚĞŶƚŝĨŝĐĂƚŝŽŶ ŽŵƉůĞdžŝƚLJŽĨƚŚĞĂƚƚĂĐŬ ;,ŝŐŚĞƌͿ Figure 2. Classification and requirements of the cyber-physical attacks that act in the control loop of a NCS. In Figure 2, six kinds of DoS attacks are presented, with their respective requirements. From this six DoS attacks, the less complex are the arbitrary ones: 3 DoS-Arbitrary Jitter: in this kind of attack, the delay of the forward and/or the feedback stream is arbitrarily changed, without a previous knowledge about the models of the NCS, in order to lead the system to an instability or to a condition that causes the interruption of the physical process. This attack only requires access to the control loop, once it may be performed by just consuming the resources of the system, such as the bandwidth of communication links, or the computational resources of the equipments that are in the control loop. • DoS-Arbitrary Data Loss: in this kind of attack, the attacker prevents the data from reaching the actuator and/or the controller of the NCS. The communication channel is jammed arbitrarily, without a previous knowledge about the models of the NCS, leading the system to an instability or to a condition that causes the interruption of the physical process. It is worth mentioning that some DoS-Arbitrary Jitter attack may result in a DoS-Arbitrary Data Loss attack, if an eventual higher delay cause packet drop outs. As the DoS-Arbitrary Jitter attack, this attack only requires access to the control loop of the NCS. • DoS-Arbitrary Data Injection: in such attacks, the attacker sends arbitrary false data to the controller, as it was sent by the sensors, and/or to the actuators, as it was sent by the controller. The false data is injected in the NCS closed loop without a previous knowledge about the models of the NCS. This attack is more complex than the DoSArbitrary Jitter and the DoS-Arbitrary Data Loss attacks, given that it requires access to the data that flows in the control loop of the NCS. The attacks classified as DoS-controlled – DoS-Controlled Jitter, DoS-Controlled Data Loss, and DoS-Controlled Data Injection – shown in Figure 2 interfere in the control loop of a NCS by the same means that their respective DoSArbitrary attacks. The difference between a DoS-Controlled attack and a DoS-Arbitrary attack is that, in the former, the interference caused by the attacker is precisely planned and executed, in order to achieve the exact desired behavior that leads the physical service to an interruption, in a more efficient way. Thus, to achieve such efficiency, a DoS-Controlled attack require an accurate knowledge about the NCS models, i.e. the plant and the controller transfer functions, which have to be analyzed to plan the attack. Regarding to the SD attacks, we must consider the three different kinds of attack shown in Figure 2: SD-Controlled Jitter, SD-Controlled Data Loss, and SD-Controlled Data Injection. The difference between a SD-Controlled attack and a DoSControlled attack is that the former is not intended to interrupt the physical process in a short therm. It aims to keep the process running with reduced efficiency, sometimes also targeting a gradual physical deterioration of the controlled devices. To succeed, the SD-Controlled attacks need to be planned based on an accurate knowledge about the dynamics and the design of the NCS. Otherwise, the attack can eventually interrupt the physical process, due to unpredicted reasons, evolving to a DoS attack. The system knowledge required to both DoS-Controlled and SD-Controlled attacks, can be gathered through CPI attacks, • FINAL VERSION OF THIS PAPER AVAILABLE AT IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (HTTP://DX.DOI.ORG/10.1109/TII.2017.2676005) as shown in Figure 2. The first, and simpler, CPI attack is the eavesdropping attack [15], [16], which consists of simply capturing the data transmitted through the forward and feedback streams of the NCS. The second CPI attack, herein proposed, is the System Identification attack, which aims to obtain information about the control function of the controller and the transfer function of the plant, by analyzing the signals that flow in the network between the controller and the plant. The CPI attacks by themselves do not impact on the NCS, but they are an useful tool to plan efficient and accurate DoSControlled and SD-Controlled attacks. B. Cybernetic vs. Physical Covertness The covertness of an attack regards to its capacity to not be perceived or detected. In the case of cyber-physical attacks on NCSs, the covertness must be simultaneously analyzed in two different domains: the cyber domain; and the physical domain. In this sense, it is presented in this section the definition of what is a cybernetically covert attack and what is a physically covert attack: • • Cybernetically covert attacks: are the attacks that have low probability to be detected by algorithms that monitor the softwares, communications and data of the NCS, or by systems that monitor the dynamics of the plant. Physically covert attacks: are attacks that cause physical effects that can not be easily noticed or identified by a human observer. The attack slightly modifies some behaviors of the system in a way that it physically affects the plant, but the effect is not easily perceptible or it can eventually be understood as a consequence of another root cause, other than an attack. IV. T HE S YSTEM I DENTIFICATION ATTACK The System Identification attack, herein proposed, is intended to assess the coefficients of the plant’s transfer function G(z) and the controller’s control function C(z). Both functions are linear time-invariant (LTI). The attack uses the BSA metaheuristic, proposed in [8] and briefly described in [17], to minimize the fitness function presented in this section. The BSA is an evolutionary algorithm that uses the information obtained by past generations – or iterations – to perform the search for solutions for optimization problems. The algorithm has two parameters that are empirically adjusted: the size of its population P ; and η, described in [17], that establishes the amplitude of the movements of the individuals of P . The parameter η must be adjusted aiming to assign to the algorithm both good exploration and exploitation capabilities. If the input i(k) and the output o(k) of a device of the NCS is known, the model of such device can be assessed by applying the known i(k) in an estimated model, which must be adjusted until its estimated output ô(k) converge to o(k). In this sense, the BSA is used to iteratively adjust the estimated model, by minimizing a specific fitness function, until the estimated model converge to the actual model of the real device, that can be a controller or a plant of the NCS. 4 To establish the fitness function, firstly, it must be considered a generic LTI system, whose transfer function Q(z) is represented by (1): Q(z) = O(z) an z n + an−1 z n−1 + ... + a1 z 1 + a0 , (1) = m I(z) z + bm−1 z m−1 + ... + b1 z 1 + b0 wherein I(z) is the input of the system, O(z) is the output of the system, n and m are the order of the numerator and the denominator, respectively, and [an , an−1 , ...a1 , a0 ] and [bm−1 , bm−2 , ...b1 , b0 ] are the coefficients of the numerator and the denominator, respectively, that are intended to be found by this System Identification attack. Also, it must be considered that i(k) and o(k) represent the sampled input and output of the system, respectively, where I(z) = Z[i(k)], O(z) = Z[o(k)], k is the number of the sample and Z represents the Z-transform operation. In this System Identification attack, i(k) and o(k) are firstly captured by an eavesdropping attack [15], [16], for exemple, during a monitoring period T . To deal with the eventual loss of samples, that may not be received by the attacker during T , the algorithm holds the value of the last received sample, according with (2), wherein x(k) can either be i(k) or o(k):  if the sample k is lost;  x(k − 1) (2) x(k) =  x(k) otherwise. Then, after acquiring i(k) and o(k), the captured i(k) is applied to the input of an estimated model, that is described by a transfer function whose coefficients [an,j , an−1,j , ...a1,j , a0,j , bm−1,j , bm−2,j , ...b1,j , b0,j ] are the coordinates of an individual j of the BSA. The application of i(k) to the input of the estimated model results in an output signal ôj (k). After obtaining ôj (k), the fitness fj of the individual j is computed comparing the output o(k), captured from the attacked device, with the output ôj (k) of the estimated model, according with (3): fj = N P (o(k) − ôj (k))2 k=0 , (3) N wherein N is the number of samples that exist during the monitoring period T . Note that, if the attacker do not lose any sample of i(k) and o(k) during T , then min fj = 0 when [an,j , an−1,j , ...a1,j , a0,j , bm−1,j , bm−2,j , ...b1,j , b0,j ] = [an , an−1 , ...a1 , a0 , bm−1 , bm−2 , ...b1 , b0 ], i.e. when the estimated model converges to the actual model of the attacked device. It is possible to establish an analogy between this System Identification attack and the Known Plaintext cryptanalytic attack [18], wherein i(k) and o(k) correspond to the plaintext and ciphertext, respectively, the form of the generic transfer function Q(z) corresponds to the encryption algorithm and the actual coefficients of Q(z) corresponds to the secret key. V. T HE C OVERT ATTACK FOR S ERVICE D EGRADATION Based on the taxonomy presented in Section III-A, the attack described in this section is classified as a SD-Controlled Data Injection attack. Its purpose is to reduce the MTBF of the FINAL VERSION OF THIS PAPER AVAILABLE AT IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (HTTP://DX.DOI.ORG/10.1109/TII.2017.2676005) plant and/or reduce the efficiency of the physical process that the plant performs, by inserting false data in the control loop. At the same time, the attacker desires that the attack meets the requirement of being physically covert, as the definition presented in Section III-B. One way to degrade a physical service is through the induction of an overshoot during the transient response of a plant. The overshoots, or peaks occurred when the system exceeds the targeted value during the transient response, can cause stress and possibly damage physical systems such as mechanical, chemical and electromechanical systems [19], [20]. Additionally, once they occur in a short period of time, the overshoots are difficult to be noticed by a human observer. Another way to degrade the service of a plant is causing a constant steady state error on it, i.e. producing a constant error when t → ∞. A low proportion steady state error, besides being difficult to be perceived by a human observer, may reduce the efficiency of the physical process or, occasionally, stress and damage the system in mid/long therm. In the present attack, to achieve either of the two mentioned effects, i.e. an overshoot or a constant steady state error, the attacker interfere in the NCS’s communication process by injecting false data into the system in a controlled way. To do so, the attacker act as a MitM that executes an attack function M (z), as presented in Figure 3, wherein U ′ (z) = M (z)U (z), U (z) = Z[u(k)] and U ′ (z) = Z[u′ (k)]. The function M (z) is designed based on the models of the plant and the controller, both obtained through the System Identification attack, described in Section IV. The effectiveness of the attack, therefore, depends on the design of M (z), which in turn depends on the accuracy of the System Identification attack. It is worth mentioning that, in Figure 3, although the MitM is placed in the forward stream, it is also possible perform an attack by interfering in the feedback stream of the NCS. The MitM may act in wired or wireless networks, such as in [21]. Controller forward stream e(k) Control function _ C(z ) u(k) M(z ) u’(k) MitM Physical process G(z ) Sensors r(k) + Actuators Plant Network y’(k) y(k) feedback stream Figure 3. MitM attack VI. R ESULTS In this section, there are presented the results obtained through simulations that combines the System Identification attack with physically covert SD-Controlled attacks. First, in Section VI-A, the model of the attacked system is described. Then, in Section VI-B, there are presented the results obtained by the System Identification attack. After that, in Section VI-C, 5 there are presented the results achieved by simulations of physically covert SD-Controlled Data Injection attacks, planned based on the data gathered by the System Identification attack. A. The Model of the Attacked System The attacked NCS has the same architecture of the NCS shown in Figure 1, and consists of a Proportional-Integral (PI) controller that controls the rotational speed of a DC motor. The PI control function C(z) and the DC motor transfer function G(z) are the same as in [6]. The equations of this NCS are represented in (4): C(z) = c1 z − c2 z−1 G(z) = z2 g1 z + g2 − g3 z + g4 (4) wherein c1 = 0, 1701, c2 = −0, 1673, g1 = 0, 3379, g2 = 0, 2793, g3 = −1, 5462 and g4 = 0, 5646. The sample rate of the system is 50 samples/s and the set point r(k) is an unitary step function. The network delay is not taken into account in the simulations of this paper. B. Results of the System Identification Attack In this Section, the performance of the System Identification attack is evaluated through a set of simulations performed in MATLAB. The SIMULINK tool is used to compute the output ôj of the estimated models, whose coefficients are the coordinates of an individual j of the BSA. The structure of the equations represented in (4) are previously known by the attacker once that, as a premise, it is known that the target is a NCS that controls a DC motor using a PI controller. In these simulations, the goal of the System Identification attack is to discover g1 , g2 , g3 , g4 , c1 and c2 , also taking into account scenarios in which the attacker occasionally loses samples of the forward and feedback streams. Each time that the DC motor is turned on, the forward and the feedback streams are captured by the attacker during a period T = 2s. All initial conditions are considered 0, by the time that the motor is turned on. The coefficients of G(z), [g1 , g2 , g3 , g4 ], and the coefficients of C(z), [c1 , c2 ], are computed separately considering that, albeit the closed loop, G(z) and C(z) are independent transfer functions. To assess [g1 , g2 , g3 , g4 ], the attacker considers the forward stream as the input and the feedback stream as the output of the estimated plant. In the opposite way, to assess [c1 , c2 ], the attacker considers the feedback stream as the input and the forward stream as the output of the estimated controller. To simulate the loss of samples, it is considered four different rates l of sample loss: 0, 0.05, 0.1 and 0.2. Thus, a sample is lost by the attacker every time that l < P, where P ∼ U (0, 1) and U is the uniform distribution. There are executed 100 different simulations for each rate of sample loss. In the BSA, the population is set to 100 individuals and η, empirically adjusted, is 1. To assess the coefficients of the controller [c1 , c2 ], the algorithm is executed for 600 iterations. To assess the coefficients of the plant [g1 , g2 , g3 , g4 ], the number of iterations is increased to 800, due to the higher number of dimensions of the search space in this case. The limits of each dimension of the search space are [−10, 10]. FINAL VERSION OF THIS PAPER AVAILABLE AT IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (HTTP://DX.DOI.ORG/10.1109/TII.2017.2676005) Figure 4 shows the means of 100 estimated values of g1 , g2 , g3 , g4 , c1 and c2 , with a Confidence Interval (CI) of 95%, considering different rates of sample loss. The actual values of the coefficients of C(z) and G(z) are also depicted in Figure 4. Note that the scales of Figures 4(a), 4(b), 4(c) and 4(d) are different from the scales of Figures 4(f) and 4(f), due to the smaller amplitude of the CI of c1 and c2 . In Addition, some statistics of the obtained results are presented in Table II. According with Table II the distributions of g1 , g2 , g3 and g4 have a high skewness, while the distributions of c1 and c2 have a moderate skewness. Regarding the kurtosis, the distributions of all coefficients of G(z) and C(z) are leptokurtic. However, analyzing Table II, it is not possible to state a clear general pattern of an increasing/decreasing skewness or kurtosis, in face of the growth of sample loss. In Figure 4, it is possible to verify that, in all cases, the ICs tend to grow with the increase of the sample loss. The same thing occur with the standard deviations shown in Table II. Regarding to the coefficients of G(z), Figure 4 shows that the difference between the mean and the actual value of g1 , g2 , g3 and g4 also tends to raise with the increase of sample loss. It is worth mentioning that the performance of the algorithm when computing g3 and g4 is better then when computing g1 and g2 , regarding the means and their CIs. This behavior results from the higher sensitivity that the output of G(z) has to the variation of its poles than to the variations of its zeros. It means that, in this problem, fj grows faster for errors in g3 and g4 than for errors in g1 and g2 , making the BSA population converge more accurately in dimensions g3 and g4 . In Figure 4 it is also possible to note that the accuracy obtained with the coefficients of C(z) is better than the accuracy of the coefficients of G(z), for all rates of sample loss. The means of c1 and c2 are closer to their actual values, with a smaller CI. In fact, the optimization process is more effective when computing the coefficients of C(z) due to its smaller search space, that has only two dimensions instead of the four dimensions of the G(z) problem. As an additional metric to evaluate the performance of the algorithm, it is computed |Eg | = |Gr −Ge | and |Ec | = |Cr −Ce |, that synthesize the error of the estimated coefficients of G(z) and C(z), respectively, for each solution found. Gr and Ge are vectors that contain the actual and the estimated coefficients of G(z), respectively. Similarly, Cr and Ce are vectors that contain the actual and the estimated coefficients of C(z), respectively. The histograms of |Eg | and |Ec | are presented in Figure 5, considering the mentioned rates of sample loss. The histograms graphically show that |Eg | and |Ec |, which correspond to the modulus of the error of the estimated coefficients of G(z) and C(z), respectively, tend to present higher values as the loss of samples grows. It can also be confirmed by the increase of the standard deviation of the coefficients of G(z) and C(z) presented in Table II. However, according with Figure 5, the mode of this errors remain close to zero for all considered rates of sample loss. C. Results of the Service Degradation Attacks In this section, there are presented the results obtained through simulations of SD-Controlled Data Injection attacks, 6 performed by a MitM acting in the control link of the NCS, as shown in Figure (3). The attacks were simulated in MATLAB, aiming to evaluate their accuracy when planned based on the results provided in Section VI-B, obtained by the System Identification attack. There were performed two sets of attack. The first one, aims to cause an overshoot of 50% in the rotational speed of the motor. The second one, aims to cause a stationary error of −10% in the rotational speed of the motor when it is on the steady state. In the attack aiming the overshoot, the function executed by the attacker is M (z) = Ko . Performing a root locus analysis considering the obtained models, the attacker adjusts Ko to make the system underdamped, with a peak of rotational speed 50% higher than its steady state speed. The values of Ko are adjusted considering the average of the coefficients estimated in Section III-B. Table III shows the values of Ko , estimated considering different rates of sample loss during the System Identification attack, as well as the overshoots obtained with the respective Ko in the real model. In Figure 6 it is possible to compare the response of the system without attack, with the response of the system with an attack aiming the overshoot of 50%. It is also possible to note that the attack to the actual model presents, in the time domain, a response quite similar to the attack estimated with the model obtained by the System Identification attack. This can be verified not only in the case where the system is identified with 0% of sample loss, but also in the worst considered case, i.e. with 20% of sample loss. It is worth mentioning that all responses presented in Figure 6 converge to 1 rad/s. In the attack where objective is to cause a stationary error of −10% on the rotational speed of the motor, the attacker executes (5): M (z) = KEss (z − 1) , z − 0.94 (5) wherein KEss is adjusted based on the data obtained with the System Identification attack. The pole of M (z) is added aiming to allow a stationary error in the system. The zero of M (z) is intended to format the root locus in order to guarantee the existence of a stable KEss that leads the system to a stationary error of −10%. Table III shows the KEss resultant from different rates of sample loss during the System Identification attack, as well as the stationary errors obtained with the respective KEss in the real model. According with the data presented in Table III, it is possible to state that the SD-Controlled Data Injection attack, designed based on the data gathered by the System Identification attack, is capable to modify, in an accurate way, the response of the physical system, considering all the evaluated rates of sample loss. In the worst case, i.e. with 20% of sample loss, it is obtained an overshoot of 45.94% and a stationary error of −9.8%, quite close to the desired values of 50% and −10%, respectively. Such accuracy allows the attacker to keep his offensive under control, leading the system to a behavior that is predefined as physically covert and capable to degrade the service performed by the plant under attack. FINAL VERSION OF THIS PAPER AVAILABLE AT IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (HTTP://DX.DOI.ORG/10.1109/TII.2017.2676005) 0.4 Actual 0.35 0.3 0.25 g2 0.3 0.25 0.2 0.15 −1,5 Actual −1,45 0.2 0.1 0.1 −1,3 0.05 −1,25 0 5 0 20 10 0 5 −1,2 20 10 (a) g1 of G(z) 0.18 0.5 0.17 0.45 0.165 −0,18 0.4 −0,175 Actual −0,17 0.16 0.155 0.35 −0,16 −0,155 0.3 0.15 −0,15 0.25 0.145 −0,145 5 20 10 Actual −0,165 c2 c1 0.175 20 10 (c) g3 of G(z) Actual 0 5 Loss of samples (%) (b) g2 of G(z) 0.55 0.2 0 Loss of samples (%) Loss of samples (%) g4 −1,4 −1,35 0.15 0.05 0 Actual −1,55 g3 0.35 g1 −1,6 0.4 0 Loss of samples (%) 5 20 10 0 5 Loss of samples (%) (d) g4 of G(z) 20 10 Loss of samples (%) (e) c1 of C(z) (f) c2 of C(z) Figure 4. Mean, with a CI of 95%, of the estimated coefficients of G(z) and C(z), in face of different rates of sample loss. Table II S TATISTICS OF THE RESULTS OBTAINED WITH DIFFERENT RATES OF SAMPLE LOSS Loss of samples 0% 5% 10% 20% Loss of samples Mean g1 g2 0.32793 0.31835 0.30473 0.26963 0.29652 0.29689 0.30461 0.33352 g1 g2 g3 g4 -1.54121 0.55983 -1.54251 0.56085 -1.54110 0.55925 -1.53119 0.54916 Skewness(*) g3 g4 c1 c2 g1 g2 0.16991 0.16997 0.16999 0.16989 -0.16712 -0.16719 -0.16724 -0.16716 0.03097 0.07572 0.08781 0.14120 0.04288 0.11523 0.13483 0.22378 c1 c2 0% -1.21214 1.23278 1.75298 -1.73202 -0.64331 0.79458 5% -2.34607 1.64875 1.35284 -1.41346 -0.42288 0.36037 10% -2.52938 1.97711 1.18018 -1.26045 -0.23379 0.13377 20% -3.24122 1.75186 1.68335 -1.71055 -0.40055 0.37927 nd (*) Computed in accordance with the Pearson’s 2 Coefficient of Skewness. (a) Distribution of |Eg | Figure 5. Histograms of |Eg | and |Ec | in face of different rates of sample loss g1 g2 0.18846 0.08094 0.16833 0.21292 0.19433 0.10527 0.17123 0.21127 Standard deviation g3 g4 c1 c2 0.00986 0.00944 0.03322 0.03194 0.04076 0.03922 0.08596 0.08313 Kurtosis g3 g4 0.00167 0.00287 0.00397 0.00596 0.00178 0.00287 0.00399 0.00598 c1 c2 0.21259 0.09412 0.25041 0.25054 0.15119 0.02540 0.24361 0.23883 0.16472 0.03118 0.23429 0.24441 0.21218 0.09802 0.24811 0.24932 (b) Distribution of |Ec | 7 FINAL VERSION OF THIS PAPER AVAILABLE AT IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (HTTP://DX.DOI.ORG/10.1109/TII.2017.2676005) 1.5 1.5 Without attack Estimated attack Actual attack Rotational speed (rad/s) Rotational speed (rad/s) Without attack Estimated attack Actual attack 1 0.5 0 8 0 0.2 0.4 0.6 0.8 1 Time (s) 1 0.5 0 0 0.2 0.4 0.6 0.8 1 Time (s) (a) Attack based on the data obtained without loss of samples (b) Attack based on the data obtained with 20% of sample loss Figure 6. Response of the system to attacks planned to cause an overshoot of 50% in the rotational speed of the motor. Table III VALUES OF Ko , KEss AND THE RESULTS OBTAINED WITH THE ATTACKS Sample loss in the System Identification attack 0% 5% 10 % 20 % Ko Overshoot in the real model KEss Stationary error in the real model 4.0451 48.90 % 5.7471 −10% 4.0745 49.43 % 5.7803 −10% 4.0828 49.57 % 5.8140 −9.9% 3.796 45.94 % 5.8823 −9.8% VII. C ONCLUSIONS This work proposes a physically covert attack for service degradation, which the performance depends on the knowledge about the model of the plant under attack and its controller. To obtain such knowledge, it is proposed a System Identification attack, based on the BSA algorithm. The effectiveness of the System Identification attack is demonstrated and its performance is statistically analyzed in face of different rates of sample loss. The results achieved by the physically covert attacks for service degradation, designed based on the data gathered by the System Identification attack, demonstrate the high degree of accuracy that may be achieved with the joint operation of the two attacks. In the worst case, i.e. with 20% of sample loss during the System Identification attack, the attacker attained an overshoot of 45.94% and a stationary error of −9.8%, quite close to the desired values of 50% and −10%, respectively. In both physically covert interventions, the accuracy of the attacks ensure that they will not evolve to unwanted behaviors, physically perceivable. As future work, it is encouraged the research of techniques capable to avoid, or complicate, physically convert attacks planned with the data obtained by System Identification attacks. In this sense, we plan to further investigate countermeasures capable to make it difficult to obtain information about cyber-physical control systems, which is essential for planning covert and controlled attacks. R EFERENCES [1] Y. Tipsuwan, M.-Y. Chow, and R. Vanijjirattikhan, “An implementation of a networked pi controller over ip network,” in Industrial Electronics Society, 2003. IECON’03. The 29th Annual Conference of the IEEE, vol. 3. IEEE, 2003, pp. 2805–2810. [2] R. A. Gupta and M.-Y. Chow, “Networked control system: overview and research trends,” Industrial Electronics, IEEE Transactions on, vol. 57, no. 7, pp. 2527–2535, 2010. [3] L. Zhang, L. Xie, W. Li, and Z. Wang, “Security solutions for networked control systems based on des algorithm and improved grey prediction model,” International Journal of Computer Network and Information Security, vol. 6, no. 1, p. 78, 2013. [4] A. A. Farooqui, S. S. H. Zaidi, A. Y. Memon, and S. Qazi, “Cyber security backdrop: A scada testbed,” in Computing, Communications and IT Applications Conference (ComComAp), 2014 IEEE. IEEE, 2014, pp. 98–103. [5] M.-Y. Chow and Y. Tipsuwan, “Network-based control systems: a tutorial,” in Industrial Electronics Society, 2001. IECON’01. The 27th Annual Conference of the IEEE, vol. 3. IEEE, 2001, pp. 1593–1602. [6] M. Long, C.-H. Wu, and J. Y. Hung, “Denial of service attacks on network-based control systems: impact and mitigation,” Industrial Informatics, IEEE Transactions on, vol. 1, no. 2, pp. 85–96, 2005. [7] R. Langner, “Stuxnet: Dissecting a cyberwarfare weapon,” Security & Privacy, IEEE, vol. 9, no. 3, pp. 49–51, 2011. [8] P. Civicioglu, “Backtracking search optimization algorithm for numerical optimization problems,” Applied Mathematics and Computation, vol. 219, no. 15, pp. 8121–8144, 2013. [9] A. C. Snoeren, C. Partridge, L. A. Sanchez, C. E. Jones, F. Tchakountio, B. Schwartz, S. T. Kent, and W. T. Strayer, “Single-packet ip traceback,” IEEE/ACM Transactions on Networking (ToN), vol. 10, no. 6, pp. 721– 734, 2002. [10] A. Teixeira, I. Shames, H. Sandberg, and K. H. Johansson, “A secure control framework for resource-limited adversaries,” Automatica, vol. 51, pp. 135–148, 2015. [11] R. Smith, “A decoupled feedback structure for covertly appropriating networked control systems,” in Proceedings of the 18th IFAC World Congress 2011, vol. 18, no. 1. IFAC-PapersOnLine, 2011. [12] R. S. Smith, “Covert misappropriation of networked control systems: Presenting a feedback structure,” Control Systems, IEEE, vol. 35, no. 1, pp. 82–92, 2015. [13] A. Hussain, J. Heidemann, and C. Papadopoulos, “A framework for classifying denial of service attacks,” in Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications. ACM, 2003, pp. 99–110. [14] C. Ramos, Z. Vale, and L. Faria, “Cyber-physical intelligence in the context of power systems,” in Future Generation Information Technology. Springer, 2011, pp. 19–29. [15] S. Khatri, P. Sharma, P. Chaudhary, and A. Bijalwan, “A taxonomy of physical layer attacks in manet,” International Journal of Computer Applications, vol. 117, no. 22, 2015. [16] Y. Zou and G. Wang, “Intercept behavior analysis of industrial wireless sensor networks in the presence of eavesdropping attack,” IEEE Transactions on Industrial Informatics, vol. 12, no. 2, pp. 780–787, 2016. [17] A. O. de Sá, N. Nedjah, and L. de Macedo Mourelle, “Distributed efficient localization in swarm robotic systems using swarm intelligence algorithms,” Neurocomputing, vol. 172, pp. 322–336, 2016. FINAL VERSION OF THIS PAPER AVAILABLE AT IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (HTTP://DX.DOI.ORG/10.1109/TII.2017.2676005) [18] W. Stallings, Cryptography and network security: principles and practices. Pearson Education India, 2006. [19] M. El-Sharkawi and C. Huang, “Variable structure tracking of dc motor for high performance applications,” Energy Conversion, IEEE Transactions on, vol. 4, no. 4, pp. 643–650, 1989. [20] T. Tran, Q. P. Ha, and H. T. Nguyen, “Robust non-overshoot time responses using cascade sliding mode-pid control,” Journal of Advanced Computational Intelligence and Intelligent Informatics, 2007. [21] H. Hwang, G. Jung, K. Sohn, and S. Park, “A study on mitm (man in the middle) vulnerability in wireless network using 802.1 x and eap,” in Information Science and Security, 2008. ICISS. International Conference on. IEEE, 2008, pp. 164–170. 9
3cs.SY
Even faster sorting of (not only) integers Marek Kokot, Sebastian Deorowicz, and Maciej Dlugosz arXiv:1703.00687v1 [cs.DS] 2 Mar 2017 Institute of Informatics, Silesian University of Technology, Akademicka 16, 44-100 Gliwice, Poland {marek.kokot,sebastian.deorowicz,maciej.dlugosz}@polsl.pl Abstract. In this paper we introduce RADULS2, the fastest parallel sorter based on radix algorithm. It is optimized to process huge amounts of data making use of modern multicore CPUs. The main novelties include: extremely optimized algorithm for handling tiny arrays (up to about a hundred of records) that could appear even billions times as subproblems to handle and improved processing of larger subarrays with better use of non-temporal memory stores. 1 Introduction Sorting is one of the fundamental tasks in computer science. Despite the fact that the problem was discussed many times from both theoretical and practical perspective, it remains open and improved solutions are still proposed. The main reason of its popularity is a wide range of applications. Frequently sorting is an important component of other algorithms. Ordered sequences may often be faster processed or stored in compacted form. Sorting algorithms may be divided into two groups: comparison based and non-comparison based. In the first group, the elements of input sequence are compared in pairs, which implies the lower bound of the number of comparisons Ω(n log n) [12]. In the second group, no comparisons are made, thus the lower bound may be relaxed to Ω(n). Unfortunately, non-comparison attempt requires additional assumptions about the data, which makes this group of algorithms less general. Despite the algorithm category, the technical details of implementation have crucial meaning in practice. One of such aspects is memory access pattern. In modern computer architectures, processors are equipped with small amount of fast cache memory, which minimizes the negative impact of high latency of the main memory access. The cache is usually divided into a couple of levels: L1, L2, L3. When a processor core needs to load a particular memory location, it is first checked if the required address is already in the cache (checking starts from the lowest level and continues to the highest one). If the required address is absent in the cache it must be loaded from the main memory. Such a situation is called a cache miss [5]. Algorithms should be constructed to avoid cache misses whenever possible. The second important factor on the way to fast algorithms is parallelization. Nowadays even desktop computers and laptops are equipped with multicore processors, which may be used to increase performance. In practice only for simple algorithms optimal speedup is easily achievable. For the complex ones it is often 2 Marek Kokot, Sebastian Deorowicz, Maciej Dlugosz hard to keep the desired speedup when the number of involved cores increases. Combining both cache-friendly memory access and parallelization introduces new issues that need to be addressed. In a multicore system each core has its own L1 cache, while L2 may be assigned to a single core or may be shared among a group of cores. L3 is typically common to all cores in a chip. The data in the cache is organized in lines (typically of 64 bytes). When two cores operate on a separate part of the same cache line and at least one of them performs writing, the slow synchronization occurs. Such a situation is called false sharing [10] and similarly as cache misses should be avoided. The other important factor is understanding the cost of branch mispredictions [8]. Modern processors are equipped with long pipelines [19]. For each conditional instruction processor predicts how it will be evaluated and chooses the next instructions to load into pipeline. If the actual result of comparison is different than predicted then branch misprediction occurs and the whole pipeline must be cleaned, which introduces long delay. In some cases it is possible to avoid branch mispredictions using conditional assembly instructions, e.g., CMOVcc [6]. Radix sort [4] is a non-comparison technique and has the time complexity O(kn), where n is the number of elements to be sorted and k is the length of keys in digits. The digit is a fixed-size part of a key, e.g., in case of sorting strings a single character. In general radix sort works in k phases, each phase is related to sorting keys according to the current digit. Digits are usually from a small alphabet and counting sort may be applied per single phase. There are two categories of radix sort depending on the order in which digits are processed. The first variant, LSD (least significant digit), starts sorting whole data from the least significant digit and continues to the most significant one. It is required to use a stable sort per each phase to ensure that the final result is valid. The second variant, MSD (most significant digit), works in the opposite direction and starts sorting the data according to the most significant digit. This results in partitioning data into bins that may be further processed independently in the recursive manner. The MSD radix has an important advantage over the LSD variant. The bins created after each phase tend to shrink (except bins with all keys equal). After a few phases the bins become tiny and switching to other algorithm improves the overall performance. A common approach here is to use some comparison-based sorting algorithm, e.g., insertion sort [15]. Typically, the time of handling such tiny bins could be from 10 to 50 percent of total time of radix sort. Sorting tiny arrays is a special case, which should be considered separately. Often algorithms with poor time complexity perform well for tiny arrays. Therefore many complex sorting algorithms, like introspective sort [16], uses them as subroutines. Yet tiny array sorting seems to be not fully investigated. Recently we proposed RADULS [13], the fastest existing radix sort. In this paper we present its significantly improved successor. The main novelties in RADULS2 are motivated by the following investigations. Firstly, we considered the special case of tiny array sorting. We proposed a new hybrid algorithm, which is significantly faster than the hybrid of insertion sort, Shell sort, and introspective sort used in RADULS. It also outperforms insertion sort used in common Even faster sorting of (not only) integers 3 std::sort function implementations in the C++ standard libraries. Secondly, we optimized the last phase of radix sort, in which the subarrays are small, but not so small to satisfy the tiny bin criterion. Thirdly, we improved the processing of small bins to take the most of non-temporal memory stores present at modern CPUs. The paper is organized as follows. In Section 2 we give a short description of existing radix sorters and algorithms that are capable to sort tiny arrays efficiently. Our algorithm is described in Section 3. The experimental results are presented in Section 4. In the last section we conclude the paper. 2 2.1 Related works Radix sorters Probably the fastest version of LSD radix sort was proposed by Satish et al. [17]. The main idea is to divide the scatter phase into two steps to make it cachefriendly. Before saving to the main memory, each record is stored into a cache buffer. When the buffer for some digit value becomes full, it is transfered using a non-temporal memory store to the main memory. The size of buffer per single digit value is a multiple of 64 B (size of a single memory transfer). This approach increases bandwidth utilization and reduces number of cache misses. In [2] an efficient MSD radix sort was proposed. Its in-place nature results in difficulty of parallelization. The algorithm performs series of element swaps to sort them according to the current digit. Unfortunately, there are high dependencies between the operations, which make them hard to perform in parallel. The authors introduced speculative permutation and repair phases to address this problem. Another issue occurring is significant imbalance of bins sizes. The authors handles this by a distribution-adaptive load balancing. In [13] we proposed variant of MSD radix sort. The main idea is to perform appropriate optimization depending on the current phase and size of currently processed bin. For instance, if the current bin is big enough, a buffered version of scattering inspired by Satish et al. is used. When the current bin is tiny (say contains tens of elements), some comparison-based sorting algorithm is chosen. 2.2 Tiny array sorters Sorting tiny arrays is not as widely discussed in the literature as the case of big ones. For most applications it is irrelevant which sorting algorithm is chosen if the number of records is low. Still many sorters stops their default procedure and switch to a simpler algorithm when the number of remaining records is below given threshold. Such a situation may occur billions of times for large inputs. Thus, improving tiny sorting procedure will also improve overall running time of given sorting algorithm. For example introspective sort [16], which is usually a part of standard C++ library is a hybrid of quicksort [9] and heapsort [21], yet for tiny ranges it switches to insertion sort. 4 Marek Kokot, Sebastian Deorowicz, Maciej Dlugosz In the case of sufficiently tiny arrays all the data are usually in L1 cache, so there are no cache misses, and the cost of memory accesses is low. Thus, the dominant factors that have impact on the running time are: (i ) simplicity of the algorithm, that usually is reflected in the small number of jump operations, (ii ) number of comparisons, and the cost of single comparison, (iii ) number of assignments. As the assignment is usually a simple (branchless) operation it is faster than comparison, which, especially for longer than 8 B keys, are hard to be made without jumps. As said above, insertion sort is usually taken as a “tiny sorter”. Shell sort [18] being its generalization is also an obvious candidate. Sorting networks [1] are constructed with series of so-called comparison elements or comparators. Each such element performs a conditional swap of its arguments. The number of such operations, as well as the indices of the compared records, are fixed for a given input size, i.e., they are independent on the ordering of input elements. This allows the compiler to hard-code the indices in the code, so the addressing is faster than when the index must be loaded from a variable. There are two criteria of sortingnetwork optimality. The first one is related to its depth defined as the number of layers of comparators (a layer is a set of comparators which may perform operations independently). The second criteria is sorting network size defined as the total numer of comparators. Optimal-depth sorting network are known only up to 17 records [7], optimal-size networks are known only up to 10 records [3]. In the enumeration sorting [12] the final position of each element is determined by comparing it against each other. The number of comparisons is O(n2 ), but the number of element moves is only O(n). Even if this algorithm requires high number of comparisons, they may be implemented branchless with SETcc assembly instruction. It allows casting boolean comparison result to integer value, which may be further used to update final position of the element. 3 3.1 Our algorithm General idea Our algorithm is an MSD radix sort with 1 B digits. It follows the same general scheme as its predecessor [13]: 1. Parallel processing of the whole array according to the first digit in a cacheefficient way. 2. Serial processing of small bins obtained in the previous stages, in a cacheefficient way. Several bins are processed by separate threads in the same time. 3. Serial processing of tiny bins (containing up to tens or hundreds of records) using a hybrid of insertion sort, Shell sort, introspective sort. Several threads process different bins in parallel. The main improvements in this paper are in the small and tiny bin processing subroutines. These phases constitute the majority of RADULS processing time, so the impact of the proposed novelties on the total sorting time is remarkable. Even faster sorting of (not only) integers 3.2 5 Small bin processing Small bins are processed in a decreasing order of their sizes. Each thread handles a single bin at a time. There are two cases here. In the first one, the bin is small enough to fit in a half of L2 cache, so cache misses are unlikely. In such a situation simple counting and scatter approach is chosen. Larger bins will likely do not fit into cache, so many cache misses can be expected. Thus, a buffered version similar to the first phase (motivated by Satish et al. [17]) is chosen. Nevertheless, there are some traps here. In the first pass it can be assured that the input array is aligned to 64 B which allows to use efficient non-temporal memory storage operations. In the following stages, the beginning address of subarray representing bin is likely unaligned. Thus, non-temporal memory storage operations used in RADULS are inefficient here. Depending on the CPU architecture they are a few times slower than in the case of aligned address. (Usually, the difference is larger for AMD Opteron than Intel Xeon.) To solve this problem in RADULS2 we implemented special alignment of subarrays. The beginning of the aligned bin address can be localed in other bin. Nevertheless, the transfers from buffers (located in cache) to the main memory are made in such a way that other bins are not overwritten. Such solution resulted in about two times faster scatter step than in RADULS. 3.3 Tiny bin processing Taking into account the results of our experiments on “tiny sorters” (discussed in Section 4) we constructed a hybrid algorithm that is able to handle tiny arrays efficiently. The algorithm exploits advantages of sorting networks (SN) [1] and enumeration sort (ES) [12] for the tiniest arrays, while for larger ones it uses our modification of BlockQuicksort (BQS) [6] in which we replaced insertion sort for the tiniest arrays by sorting network or enumeration sort. For the smallest records (i.e., containing just 8 B key) the hybrid switches at n = 64 elements from SN to BQS with SN for the tiniest arrays. The sorting networks for n > 64 seem to be of almost the same speed as BQS, but the source code for SN becomes long (and also the code must be prepared for each array size), which leads to long compilation and large executable. If the data field exists the situation becomes more complex as conditional swaps of records in the array takes longer time, and often cannot be made without jumps (or at least compilers tend to prepare the code with branches). Therefore, ES becomes more attractive, as it makes just n (branchless) assignments. Even the fact that ES makes O(n2 ) comparisons seems to be acceptable (at least for tiniest arrays) if we take into account that the comparisons are branchless. Therefore, for 16 B or 24 B data fields the hybrid employs ES when the number of elements is not larger than 24 and BQS with ES for the tiniest subarrays otherwise. The most complex situation is the case of 8 B data field. For n ≤ 16 the hybrid employs the ES, but then, up to 32 records, the SN is used. It seems that the quadratic number of comparisons of ES becomes the problem for larger arrays. For n > 32 BQS with SN is used. 6 Marek Kokot, Sebastian Deorowicz, Maciej Dlugosz The situation of 16 B keys and no additional data is different as it is hard to implement the comparison of elements in a branchless way. Therefore, the proposed hybrid uses ES according to the most significant 8 B word (to make use of branchless comparisons) and then fix the ordering using IS. For n > 24 we, however, employ BQS with the above ES+IS as a dispatch for tiniest subarrays. In our general radix procedure we analyze each newly created bin to make a decision about its further processing. There are bins that do not meet the requirements of being tiny, but our general radix procedure introduce observable overhead due to unnecessary analysis of empty subbins. To address this problem we treat bins of size at most 256 in a special manner. During the histogram construction we store the identifiers of subbins containing at least 2 elements that need further processing. Thus, the other subbins can be easily omitted. 4 4.1 Experimental results Tiny array sorting algorithms All tiny sorters were implemented in the C++14 programing language. A couple of SSE instructions were used to improve the performance of sorting network in case of 16 B records. For compilation we used GCC 6.3.0 and Visual C++ 2015. The experiments were run on four platforms: – – – – Laptop with Intel Core i7-4700MQ CPU clocked at 2.4 GHz (Windows), Workstation with Intel Core i7-5820K CPU clocked at 3.30 GHz (Linux), Workstation with two Intel Xeon E5-2670v3 CPUs clocked at 2.3 GHz (Linux), Server with four AMD Opteron 6320 CPUs clocked at 2.8 GHz (Linux). The results of sorting tiny arrays of size from 2 to 64 records with the following algorithms: insertion sort (IS), BlockQuicksort (BQS), enumeration sort (ES), introspective sort implemented as a part of standard C++ library (std::sort), sorting network (SN), our hybrid algorithm (Hybrid), enumeration sort followed by insertion sort (ES+IS) are shown in Fig. 1. The running times are divided by the size of the sorted array. The fastest method for records with 8 B key and no data field or 8 B data field is SN (except for the smallest number of records—up to 10). Yet it is worth mentioning, that our implementation of sorting network for 16 B records uses SSE to allow elements swapping by branchless code. Without such optimization SN performed much worse as compilers tend to produce the code with branching instructions. The cost of swapping the elements is easy observable in case of 32 B records—in such a situation ES clearly outperforms SN. The case of 16 B keys and no additional data is quite interesting. The comparison of elements cannot be performed in a single step, thereby maintaining branchless code is harder. Our implementation of SN suffers in such situation, yet it is observable that Visual C++ is able to perform better optimizations, which leads to much lower runtime than in case of GCC. Our two-stage technique helps to remove branch mispredictions overhead, in fact our hybrid algorithm in such situation is SN according to 8 B key and 8 B data field followed by IS. Even faster sorting of (not only) integers key=8B, record=8B, Windows, Intel i7 40 BQS Time [ns] 30 ES SN std::sort Hybrid 10 10 20 40 60 key=8B, record=16B, Linux, Intel i7 40 BQS 30 Time [ns] 30 20 0 0 ES SN std::sort Hybrid 10 20 40 60 0 0 20 40 60 40 40 Time [ns] 60 key=8B, record=32B, Linux, Xeon key=8B, record=32B, Linux, Opteron 20 20 BQS 0 IS ES SN std::sort Hybrid 20 40 60 0 0 40 BQS IS ES ES+IS SN Hybrid 20 40 60 key=16B, record=16B, Linux, Intel i7 key=16B, record=16B, Windows, Intel i7 Time [ns] 40 30 10 0 20 key=8B, record=16B, Linux, Xeon 40 20 0 0 IS 20 0 key=8B, record=8B, Linux, Xeon 40 IS 20 0 7 40 std::sort 20 20 0 0 20 40 Array size [elements] 60 0 0 20 40 60 Array size [elements] Fig. 1: Running times (per element) for tiny sorters. The examined algorithms: BlockQuicksort (BQS), insertion sort (IS), enumeration sort (ES), sorting networks (SN), introspective sort from C++ (std::sort), enumeration sort according to most significant 8 B word followed by insertion sort (ES+IS), our hybrid algorithm (Hybrid). The legends are the same for both charts of each row. 8 Marek Kokot, Sebastian Deorowicz, Maciej Dlugosz The sudden rise of running time of SN above 32 records is an effect of much higher number of comparison elements. For such values we used Batcher’s OddEven algorithm [1] to generate networks. For smaller values we was able to use more efficient networks. In case of std::sort similar behavior may be explained by a threshold of switching to insertion sort. 4.2 RADULS 2 The results of experiments for RADULS 2 and the fastest competitors are given in Fig. 2. Similarly as in [13] we picked for comparison the following algorithms: – TBB—the parallel comparison sort implemented in the Intel Threading Building Blocks [11] (2017 Update 3 release), – MCSTL—the parallel hybrid sort [20], included in GNU’s libstdc++ library, – Satish—the buffered LSD radix sort introduced by Satish et al. [17] with the buffer size for a specific digit equal to 4 times the cache line size, – PARADIS—the state-of-the-art in-place radix sort algorithm by Cho et al. [2], – RADULS—the state-of-the-art radix sort algorithm [13]. The main experiments are for 16 threads for 16 B records (8 B key and 8 B data). As we can see RADULS2 is the fastest sorting algorithm in all the experiments. For 1 G elements it is 23% (uniform distribution) and 28% (Zipf distribution) faster than RADULS when run at Xeon-based workstation. At Opteron-based server the advantage is 18%. The scalability experiments show that RADULS2 scales almost in the same way as RADULS. We also evaluated the behavior of RADULS2 for records of different sizes (Fig. 3). RADULS2 was noticeably faster than its predecessor, however, the difference becomes smaller for longer records. It is also interesting to compare the relative throughput for different platforms. Opterons were clocked higher (2.8 GHz) than Xeons (2.3 GHz) but sorted the data about two times slower. RADULS is used in KMC3 [14], our k-mer counter for genomic data. The excellent performance of KMC3 is in significant part due to fast sorter. When sorting KMC set from [13] the gain in throughput was 17% (413 M 16 B-key records) and 10% (1887 M 16 B-key records). 5 Conclusions In this paper we examined sorting algorithms for tiny arrays, as well as we proved the relevance of this topic by applying proposed hybrid solution to RADULS— our radix sort algorithm. We also proposed other improvements, which—together with “tiny sorters”—constitute new version, i.e., RADULS2. Our experiments confirm the significance of hardware-aware programming, especially considering cache memory and avoiding branch mispredictions. Acknowledgement The work was supported by the Polish National Science Center upon decision DEC-2015/17/B/ST6/01890. Even faster sorting of (not only) integers Throughput [M elements/s] Uniform random (Xeon) 300 200 200 TBB 100 MCSTL Satish Paradis RADULS RADULS2 100 0 1 2 3 Array size [G elements] 0 4 Uniform random (Opteron) 200 Throughput [M elements/s] Zipf theta = 0.75 random (Xeon) 300 0 9 0 1 2 3 Array size [G elements] 4 Zipf theta = 0.75 random (Xeon) 1,000 150 100 100 50 10 0 0 1 2 3 Array size [G elements] 4 1 2 3 4 6 8 No. threads 12 16 24 Fig. 2: Experimental comparison of best sorting algorithms. The right bottom chart shows how the algorithm speed ups for growing number of threads. The remaining charts present throughput for 16 threads when sorting 2 G records of size 16 B (8 B key and 8 B data). Throughput [M elements/s] Uniform random 600 400 200 0 (8,8) (16,8) (16, 16) (24,8) (32,8) OPTERON (8,8) (16,8) (16, 16) (Record size, Key size) TBB MCSTL Satish RADULS (24,8) (32,8) XEON RADULS2 Fig. 3: Experimental comparison of algorithms when sorting 2 G records of various sizes using 16 threads. 10 Marek Kokot, Sebastian Deorowicz, Maciej Dlugosz References 1. Batcher, K.: Sorting networks and their applications. Proceedings of the AFIPS Spring Joint Computing Conference 32, 307–314 (1968) 2. Cho, M., Brand, D., Bordawekar, R., Finkler, U., Kulandaisamy, V., Puri, R.: PARADIS: an efficient parallel algorithm for in-place radix sort. In: Proceedings of the VLDB Endowment. pp. 1518–1529 (2015) 3. Codish, M., Cruz-Filipe, L., Frank, M., Schneider-Kamp, P.: Sorting nine inputs requires twenty-five comparisons. Journal of Computer and System Sciences 82(3), 551–563 (2016) 4. Cormen, T., Leiserson, C., Rivest, R., Stein, C.: Introduction to algorithms, Third Edition. MIT press (2009) 5. Drepper, U.: What every programmer should know about memory. Red Hat, Inc 11 (2007) 6. Edelkamp, S., Weiß, A.: Blockquicksort: How branch mispredictions dont affect quicksort. arXiv preprint arXiv:1604.06697 (2016) 7. Ehlers, T., Müller, M.: New bounds on optimal sorting networks. Lecture Notes in Computer Science 9136, 167–176 (2015) 8. Fog, A.: The microarchitecture of Intel, AMD and VIA CPUs. an optimization guide for assembly programmers and compiler makers. (2016), http://www.agner. org/optimize/microarchitecture.pdf 9. Hoare, C.: Quicksort. The Computer Journal 5(1), 10–16 (1962) 10. Intel: Intel Guide for Developing Multithreaded Application. Intel (2011), http: //www.intel.com/software/threading-guide 11. Intel: Threading Building Blocks (2016), https://www. threadingbuildingblocks.org/ 12. Knuth, D.: The Art of Computer Programming. Addison-Wesley (1968) 13. Kokot, M., Deorowicz, S., Debudaj-Grabysz, A.: Sorting data on ultra-large scale with RADULS. arXiv preprint arXiv:1612.02557 (2016) 14. Kokot, M., Dlugosz, M., Deorowicz, S.: KMC 3: counting and manipulating k-mer statistics. arXiv preprint arXiv:1701.08022 (2017) 15. McIlroy, P., K., B., McIlroy, M.: Engineering radix sort. Computing systems 6(1), 5–27 (1993) 16. Musser, D.: Introspective sorting and selection algorithms. Software: Practice and Experience 27(8), 983–993 (1997) 17. Satish, N., Kim, C., Chhugani, J., Nguyen, A., Lee, V., Kim, D., Dubey, P.: Fast sort on CPUs and GPUs: A case for bandwidth oblivious SIMD Sort. In: Proceedings of the 2010 ACM SIGMOD International Conference on Management of Data. pp. 351–362 (2010) 18. Shell, D.: A high-speed sorting procedure. Communications of the ACM 2(7), 30–32 (1959) 19. Shen, J., Lipasti, M.: Modern processor design: fundamentals of superscalar processors. Waveland Press (2013) 20. Singler, J., Sanders, P., Putze, F.: MCSTL: The multi-core standard template library. Lecture Notes in Computer Science 4641, 682–694 (2007) 21. Williams, J.: Algorithm 232: Heapsort. Communications of the ACM 7(6), 347–348 (1964)
8cs.DS
Copyright ©2018 IEEE Accepted to 2018 IEEE International Symposium on Biomedical Imaging UNSUPERVISED DISCOVERY OF TOXOPLASMA GONDII MOTILITY PHENOTYPES Mojtaba S. Fazli1 , Stephen A. Vella2 , Silvia N.J. Moreno2 , Shannon Quinn1 1 Department of Computer Science, The University of Georgia, Athens, GA, USA arXiv:1801.02591v2 [cs.CV] 11 Jan 2018 2 Department of Cellular Biology, The University of Georgia, Athens, GA, USA ABSTRACT Toxoplasma gondii is a parasitic protozoan that causes disseminated toxoplasmosis, a disease that afflicts roughly a third of the worlds population. Its virulence is predicated on its motility and ability to enter and exit nucleated cells; therefore, studies elucidating its mechanism of motility and in particular, its motility patterns in the context of its lytic cycle, are critical to the eventual development of therapeutic strategies. Here, we present an end-to-end computational pipeline for identifying T. gondii motility phenotypes in a completely unsupervised, data-driven way. We track the parasites before and after addition of extracellular Ca2+ to study its effects on the parasite motility patterns and use this information to parameterize the motion and group it according to similarity of spatiotemporal dynamics. We linked fluctuations of fluorescence (cytosolic Ca2+ concentration) to motility patterns. Using our algorithm, we extracted and quantified motility tracks, parameterized the motion trajectories, and use spectral clustering to identify distinct motility phenotypes. In particular, we repeat this procedure for T. gondii parasites both before and after addition of extracellular Ca2+ , which results in Ca2+ influx and stimulation of motility [5]. This not only allows us to identify distinct T. gondii motility phenotypes in a completely unsupervised, data-driven way, but also enriches our knowledge of these phenotypes with respect to the conditions under which they manifest. Ideally, this work will help pave the way to understanding key differences in the biology of T. gondii and mammalian cells and the potential for future therapeutic drug discovery. Index Terms— Toxoplasma gondii, computer vision, tracking, spectral clustering, autoregressive models 2. METHODS 1. INTRODUCTION Toxoplasma gondii is the causative agent of toxoplasmosis and is considered one of the most successful parasitic infections. Approximately 1/3 of the worlds population will test positive for T. gondii, a parasite capable of infecting any nucleated cell [1]. Though T. gondii infection is usually mild or asymptomatic within in healthy host, infections are life-long, and the immunocompromised such as AIDS patients, fetuses, and organ-transplant recipients are at risk of developing severe complications from the reactivation of dormant tissue cysts [1, 2, 3]. Ca2+ is a universal signaling molecule that regulates numerous cellular processes in both prokaryotes, unicellular and multicellular eukaryotes [4]. T. gondiis pathogenesis is directly linked to its lytic cycle, comprised of invasion, replication, egress, and motility, and progression forward is regulated through Ca2+ signaling [5]. Therefore, the motion of T. gondii is critical to understanding its lytic cycle and, ultimately, in developing potential therapies. Cytosolic Ca2+ oscillations in T. gondii precede activation/enhancement of each step of the lytic cycle [5], making these oscillations a critical avenue through which to analyze T. gondii pathogenesis. Here we present an unsupervised, data-driven pipeline for identifying T. gondii motility patterns in response to cytosolic Ca2+ . We used extracellular parasites that express in vivo a derivatized variant of the Green Fluorescent Protein (GFP), GCaMP6f, whose fluorescence is directly proportional to Ca2+ concentration [6]. 2.1. Data Acquisition T. gondii tachyzoites (RH) strain were maintained as described previously using Dulbeccos modified minimal essential media with 1% FBS. GCaMP6f is genetically encoded calcium indicator whose fluorescence is sensitive to cytosolic calcium concentration (Ca2+ ) and allows us to track Ca2+ dynamics in motile cells. Construction of GCaMP6f-expressing parasites was performed by cloning the coding sequence of GCaMP6f into a ptubP30GFP (a selection-less plasmid and a kind gift from Boris Striepen). Plasmids were electroporated into RH parasites and subcloned via cell sorting. Videos were acquired using an LSM 710 confocal microscope on 10% FBS (Fetal Bovine Serum) coated glass bottom cover dishes (MATTEK) [5]. Addition of 2M Thapsigargin and/or 1.8 mM CaCl2 was noted. Images were processed using the FIJI ImageJ software suite [7] and converted to z-stacks for processing in OpenCV. For our experiments, we select 10 videos with average number of 14 cells in each video. 2.2. Software We implemented our pipeline using Python 3 and associated scientific computing libraries (NumPy, SciPy, scikit-learn, matplotlib). The core of our tracking algorithm used a combination of tools available in the OpenCV 3.1 computer vision library. The full code for our pipeline is available under the MIT open source license at https://github.com/ quinngroup/toxoplasma-isbi2018 . Accepted to 2018 IEEE International Symposium on Biomedical Imaging Copyright ©2018 IEEE 2.3.3. Parameterization of normalized KLT trajectories 2.3. Computational Pipeline 2.3.1. Tracking Algorithm We used a Kanade-Lucas-Tomasi (KLT) tracker to develop trajectories for T. gondii parasites. KLT is an optical flow approach which uses spatial intensities to conduct a focused search of high-probability object locations in the future [8][9][10]. It is fast, requiring few matches between sequential images. Here, we identify features extracted from objects in each frame and process them through the KLT module to be tracked over the entire video. The resulting tracker has been shown to be robust in our previous work (Fig. 1) [11]. Performing unsupervised discovery of T. gondii motility phenotypes required featurizing the trajectories of each object in such a way as to be invariant to the absolute spatial locations, but sensitive to relative changes over time. Therefore, we used a simple linear model that encodes a Markov-based transition prediction method: an autoregressive (AR) model. AR models are a type of stochastic process, used heavily in modeling linear systems and predicting future observations as a function of some number of previous ones; in this way, it implements the Markov assumption, in which future observations are independent of all others, conditioned on some number of immediate preceding observations. The number of prior observations used to make future predictions is referred to as the order of the system, and follows as: p X xt = Aj xt−j + C (1) j Fig. 1. (left) Object tracking results using KLT. (right) 3D visualization of a specific cells trajectory. Hue shows the fluorescence of the object, corresponding to Ca2+ concentration. 2.3.2. Preprocessing and normalization of KLT trajectories KLT trajectories for each parasite object comprised a twodimensional position vector for each frame. In order to standardize these data to be used in downstream analysis, we employed numerous preprocessing steps. First, we discarded any trajectories below a certain minimum number of frames. This happened if the KLT tracker lost an object (e.g., due to occlusion, movement outside plane of focus). Second, we split the trajectories of each object into two sets, capturing the object trajectory before and after the addition of extracellular Ca2+ , to be analyzed distinctly. Third, for each trajectory in the two sets, we truncated the number of frames to be equivalent across all objects. After applying these preprocessing steps, we ended with a corpus containing 139 trajectories, each capturing the twodimensional movement of distinct T. gondii parasites. Each trajectory consisted of 300 frames, half before and half after the addition of extracellular Ca2+ . Our data were represented in the following structures, X and Y (representing x and y coordinates of each object in each frame, respectively):   x(0,0) . . . x(0,149)   .. .. X(139,150) =  ...  . . x(138,0) ... y(138,149) y(0,0)  .. = . y(138,0) ... .. . ...  y(0,149)  ..  . y(138,149)  Y(139,150) where Eq. 1 denotes a p-order system [12]. In our work, we are interested in the transition matrices {A1, ..., Ap}, which are quantitative encodings of how the system evolves, and therefore represents a parameterization of the system that is not sensitive to absolute spatial positions. In our work, we found a system of order p = 5 worked well, whereby each 139x150x2 object was represented as five 2x2 AR motion parameters:{A1, A2, A3, A4, A5}. These parameters were flattened and concatenated into a single 20-element feature vector, and this operation was repeated for each of the 139 objects. 2.3.4. Establishing pairwise motion similarity The AR motion parameters are powerful quantitative representations of movement that are invariant to absolute spatial coordinates. Unfortunately, they are geodesics that do not span a Euclidean space [13], and therefore are not amenable to more traditional unsupervised pattern-recognition strategies such as K-means that rely on Euclidean-based pairwise distance metrics. Instead, we constructed several custom kernel matrices to capture pairwise similarity, with the goal of using these matrices as graph embeddings to use in spectral clustering. To compute a pairwise similarity (kernel) matrix, we stacked the AR parameters learned from the before and after sequences of T. gondii motility to form two matrices:   ARb(0,0) . . . ARb(0,19)   .. .. .. ARBef ore(139,20) =   . . . ARb(138,0) ... ARa(0,0)  .. = . ARa(138,0) ... .. . ...  ARAf ter(139,20) ARb(138,19)  ARa(0,19)  ..  . ARa(138,19) We then computed pairwise affinities, or similarities, using the radial-basis function (RBF) or Gaussian kernel. This kernel matrix A has the form: Accepted to 2018 IEEE International Symposium on Biomedical Imaging Copyright ©2018 IEEE clustering results. The left column indicates trajectories from before the addition of cytosolic Ca2+ , and the right column of Aij = Aji = e−γ||xi −xj || after Ca2+ addition. Each subfigure is a single object, illuswhere γ is a free parameter that designates the width of the trated by a line showing the extent of its movement over the Gaussian kernel. Unfortunately, heat kernels are very sen150-frame duration of the segment. sitive to the choice of gamma, so the value was chosen by First, we observe that object trajectories are significantly empirical cross-validation, and selected =0.1 (Fig. 2). Other richer and more dynamic after the addition of cytosolic Ca2+ kernels were also tested, including trajectory-based kernels than before; we saw this in Fig. 1 (right), and is wellsuch as spatial covariance [14], angle covariance (using disunderstood that since Ca2+ regulates the T. gondii lytic cycle, placement angles instead of position vectors), and Pearson we can expect more activity when those concentrations are covariance matrices [15]. However, these did not yield lowhigh [4, 5]. Second, and most relevant to the goal of this dimensional embeddings of sufficient rank to be useful in work, is that we can observe qualitatively unmistakable simspectral clustering. ilarity of trajectory dynamics, especially in the after-Ca2+ clusters. Most of the before-Ca2+ trajectories are largely 2.3.5. Spectral clustering to identify similar motility phenoimmotile (Fig. 3, bottom left), but there are clusters that show types similar motion motifs, including full or partial circles (Fig. 3, Clustering methods are a natural choice for unsupervised upper left). The after-Ca2+ clusters show similar groupings learning; they typically impose few assumptions on the data, of motifs: a clear partial-twirl, sometimes combined with a defining only a notion of similarity with which to group data straight trajectory (Fig. 3, lower right), or seemingly rantogether. K-means is a favorite for its speed and simplicdom motion with a long outward arc (Fig. 3, upper right). ity; unfortunately, in our case, the drawbacks of K-means Particularly when viewed in context (Fig. 4), we can clearly make it an impractical option. For one, K-means assumes Euclidean data; AR motion parameters are geodesics that do not live in a Euclidean space. For two, K-means assumes isotropic clusters; it is possible that AR motion parameters exhibit isotropy in their space, but without a proper distance metric this cannot be explicitly tested. For these reasons, we chose spectral clustering. Spectral clustering operates on the spectrum of the underlying graph of the data [16], imposed through a similarity computation using a pairwise kernel. Using this affinity kernel, a graph Laplacian is computed, and its principal eigenvectors are used to embed the original data in a low-dimensional space where they are separable by simpler clustering strategies such as K-means. While this requires a full diagonalization of the Laplacian and can therefore pose a computational bottleneck with large data, our 139 trajectories is sufficiently small for to be solved by out-of-the-box spectral clustering implementations, such as scikit-learn [17] Fig. 3. Clustering results of trajectories before (left column) and after (right column) addition of cytosolic Ca2+ . Two sample clusters are shown in each column. Subplots are aligned to center for easy viewing. Fig. 2. RBF kernels from AR motion parameters using gamma = 0.1, from AR motion parameters computed before (left) and after (right) addition of cytosolic Ca2+ . 3. RESULTS AND DISCUSSION Using established heuristics from previous work on the T. gondii parasite and its lytic cycle [5, 11], we chose k = 5 clusters for our analysis. Figure 3 shows a summary of the identify several distinct T. gondii motility phenotypes such as helical, twirling, and circularthat are identified through manual heuristics [1-5]. There are limitations to this approach. First, while the RBF kernel encodes nonlinear relationships, it still relies on a Euclidean-style pairwise comparison. Second, despite the empirical performance of AR parameters in encoding twodimensional spatial movement, this is not an ideal application of this technique; it is likely that the relative simplicity of T. gondii motility patterns, and the small number of motion motifs, are responsible for the relatively good empirical per- Accepted to 2018 IEEE International Symposium on Biomedical Imaging Copyright ©2018 IEEE [3] Jeffrey L Jones, Monica E Parise, and Anthony E Fiore, “Neformance. Third, the combination of small quantity of data glected parasitic infections in the united states: toxoplasmoand low-resolution temporal models precludes a deeper exsis,” The American journal of tropical medicine and hygiene, ploration of the manifold of T. gondii motility phenotypes. vol. 90, no. 5, pp. 794–799, 2014. Nevertheless, the results strongly suggest such a manifold ex[4] David E Clapham, “Calcium signaling,” Cell, vol. 80, no. 2, ists, and could be elucidated in future work. pp. 259–268, 1995. Fig. 4. Aggregated plotting of trajectories before (A) and after (B) addition of cytosolic Ca2+ . Each object is colored by its cluster identifier, and placed according to its original absolute spatial location. Here, some trajectories(straight lines mostly in part B) are artifacts and were excluded from the final clustering results. 4. CONCLUSION In this work, we have demonstrated a computational pipeline for tracking, extracting, parameterizing, and clustering motion trajectories of T. gondii parasites in an initial effort to elucidate discrete patterns in the parasites lytic cycle. This is a first step toward a mechanistic understanding of the parasites virulence as a function of its motility patterns. We have also demonstrated the application of a linear time series (AR) model to the parameterization of two-dimensional spatial motility, and its effectiveness in clustering for recognizing gross motion patterns. Given the relatively short tracks of the T. gondii objects, we felt AR models (i.e., a linear model) would be sufficient to parameterize motion. This technique could be applied pretty much as-is to any trajectory analysis of discrete objects. In the future, we anticipate refining the elements of this pipeline to extract finer-grained motility patterns. Specifically, we anticipate deep learning to be the next evolution of this pipeline: using segmentation and tracking tools such as Faster RCNN to track the objects, and parameterizing the motility sequences using recurrent neural networks instead of linear systems. 5. ACKNOWLEDGMENTS The authors acknowledge Zhu Hong Li for construction of the GCaMP6f non-selectable strain. This work was supported in part by AWS in Education Grant Award. We acknowledge partial support from the NSF Advances in Biological Informatics (ABI) under award number 1458766.The Toxoplasma work was funded by the National Institutes of Health (AI110027 and AI-096836 to SNJM). 6. REFERENCES [1] Geita Saadatnia and Majid Golkar, “A review on human toxoplasmosis,” Scandinavian journal of infectious diseases, vol. 44, no. 11, pp. 805–814, 2012. [2] Francis Derouin and H Pelloux, “Prevention of toxoplasmosis in transplant patients,” Clinical Microbiology and Infection, vol. 14, no. 12, pp. 1089–1101, 2008. [5] Lucas Borges-Pereira, Alexandre Budu, Ciara A McKnight, Christina A Moore, Stephen A Vella, Miryam A Hortua Triana, Jing Liu, Celia RS Garcia, Douglas A Pace, and Silvia NJ Moreno, “Calcium signaling throughout the toxoplasma gondii lytic cycle a study using genetically encoded calcium indicators,” Journal of Biological Chemistry, vol. 290, no. 45, pp. 26914–26926, 2015. [6] Tsai-Wen Chen, Trevor J Wardill, Yi Sun, Stefan R Pulver, Sabine L Renninger, Amy Baohan, Eric R Schreiter, Rex A Kerr, Michael B Orger, Vivek Jayaraman, et al., “Ultrasensitive fluorescent proteins for imaging neuronal activity,” Nature, vol. 499, no. 7458, pp. 295–300, 2013. [7] Johannes Schindelin, Ignacio Arganda-Carreras, Erwin Frise, Verena Kaynig, Mark Longair, Tobias Pietzsch, Stephan Preibisch, Curtis Rueden, Stephan Saalfeld, Benjamin Schmid, et al., “Fiji: an open-source platform for biological-image analysis,” Nature methods, vol. 9, no. 7, pp. 676–682, 2012. [8] Bruce D Lucas, Takeo Kanade, et al., “An iterative image registration technique with an application to stereo vision,” 1981. [9] Carlo Tomasi and Takeo Kanade, “Detection and tracking of point features,” 1991. [10] Jianbo Shi et al., “Good features to track,” in Computer Vision and Pattern Recognition, 1994. Proceedings CVPR’94., 1994 IEEE Computer Society Conference on. IEEE, 1994, pp. 593– 600. [11] Mojtaba Sedigh Fazli, Stephen Andrew Vella, Silvia NJ Moreno, and Shannon Quinn, “Computational motility tracking of calcium dynamics in toxoplasma gondii,” arXiv preprint arXiv:1708.01871, 2017. [12] P. BOURKE, “Auto-regression analysis (ar),” http://local.wasp.uwa.edu.au/pbourkke/other/ar/, 1998. [13] Franco Woolfe and Andrew Fitzgibbon, “Shift-invariant dynamic texture recognition,” Computer Vision–ECCV 2006, pp. 549–562, 2006. [14] Andrew Gordon Wilson, “Covariance kernels for fast automatic pattern discovery and extrapolation with gaussian processes,” University of Cambridge, 2014. [15] Bruce Weaver and Karl L Wuensch, “Spss and sas programs for comparing pearson correlations and ols regression coefficients,” Behavior Research Methods, vol. 45, no. 3, pp. 880– 895, 2013. [16] Ulrike Von Luxburg, “A tutorial on spectral clustering,” Statistics and computing, vol. 17, no. 4, pp. 395–416, 2007. [17] Fabian Pedregosa, Gaël Varoquaux, Alexandre Gramfort, Vincent Michel, Bertrand Thirion, Olivier Grisel, Mathieu Blondel, Peter Prettenhofer, Ron Weiss, Vincent Dubourg, et al., “Scikit-learn: Machine learning in python,” Journal of Machine Learning Research, vol. 12, no. Oct, pp. 2825–2830, 2011.
1cs.CV
arXiv:1711.03002v1 [math.AG] 8 Nov 2017 BERKOVICH LOG DISCREPANCIES IN POSITIVE CHARACTERISTIC ERIC CANTON Abstract. We introduce and study a log discrepancy function on the Berkovich analytifications of schemes in positive characteristic that shares many properties with the analogue in characteristic zero. We prove several theorems of Jonsson and Mustaţă regarding log canonical thresholds of graded sequences of ideals, using birational F -singularity techniques in place of log resolutions. Strong F -regularity and sharp F -purity of Cartier subalgebras are detected using log discrepancies of semivaluations in the same way Kawamata log terminal and log canonical singularities are defined using divisorial log discrepancies. We generalize a transformation formula for finite morphisms by Schwede and Tucker to all valuations. Additionally, we prove that the minimal log discrepancy is constructibly lower-semicontinuous on F -finite schemes in positive characteristic, a theorem proven for normal varieties in characteristic zero by Ambro. Contents 1. Introduction 2. Berkovich spaces 3. Log discrepancies of Cartier prealgebras 4. Connections with F -singularities 5. Lower-semicontinuity 6. Transformation of log discrepancies under finite morphisms 7. Log canonical thresholds of graded sequences of ideals References 1 4 7 15 16 19 22 33 1. Introduction We study singularities of Noetherian schemes X → Spec(k) over a field k of characteristic p > 0 using log discrepancies associated to OX -linear maps F∗e OX → OX . These log discrepancies are assigned to valuations centered on X and trivial on k, and more generally to such valuations on the function fields of integral subschemes of X; these semivaluations are the points of the Berkovich space Berk(X). Several groups of authors have used log discrepancies to study graded sequences of ideals on X using the structure of the space of valuations Val(X) for X of characteristic zero: Jonsson and Mustaţă first showed in [JM12] that when X is regular and excellent over Q, one can realize ValQ (X) as an inverse limit ValQ (X) = lim QM (Y, D) ←− (Y,D) 1 2 ERIC CANTON over the cofiltered collection of log-smooth pairs (Y, D) admitting a proper birational morphism to X. They use this description to extend the definition of log discrepancy along a divisor over X to every rank-one valuation of X, a technique extended to singular varieties by Boucksom, de Fernex, Favre, and Urbinati in [Bou+15]. Consider now a connected normal scheme X → Spec(k) of characteristic p > 0 with fraction field L and finite absolute Frobenius endomorphism F : X → X. Long have researchers known (or implicitly used, see [MR85; RR85; HW02; Sch09]) that to a nonzero OX -linear map ψ : F∗e OX → OX one can associate an effective Q-divisor ∆ψ such that KX + ∆ψ is Q-Cartier with index not divisible by p. If π : Y → X is a proper birational morphism from a normal Y , the transformation formula KY + ∆ψ,Y = π ∗ (KX + ∆ψ ) allows one to associate a new OY -linear map ψY : F∗e OY (d(pe − 1)∆ψY e) → OY . The coefficient on irreducible divisors E ⊂ Y appearing in ∆ψ,Y determine the log discrepancies A(E, X, ∆ψ ), studied heavily in the minimal model program, see e.g. [KM98; Kol97; K192; Kol13]. These coefficients are determined algebraically as e e (a/b)) := (1/b)ψ(F e bpe −1 a) follows: for a/b ∈ L with a, b ∈ OX , the equation ψ(F ∗ ∗ uniquely determines an extension of ψ to L. The log discrepancy of ∆ along E⊂Y ψ   e e b) = ordE (b) for b ∈ L such that ψ(F is equal to the supremum of the values e1 p −1 ∗ 1. Taking this as our starting point, we define the log discrepancy of maps like ψ, and, more generally, of graded OX -subsheaves of ⊕HomL (F∗e L, L) closed under selfcomposition, along a semivaluation with compatible home. This definition recovers many properties usually established using resolutions of singularities for normal excellent Q-schemes. Our methods do not rely upon such resolutions. Should we learn that log resolutions exist in positive characteristic, one then has available the definition of Jonsson and Mustaţă [JM12; Bou+15]. Our main result is that these definitions will agree, establishing our approach as an alternative formulation making essential use of Cartier subalgebras, sheaves familiar from birational F -singularity literature. Main Theorem (Theorem 3.23). Let X be a normal F -finite scheme with Cartier algebra CX , and suppose log resolutions exist in characteristic p > 0. Let ∆ ≥ 0 be a Q-divisor on X such that KX + ∆ ∼Q 0. For valuations w ∈ Val(X), denote by AX (w; ∆) the log discrepancy defined as in [JM12] and by A(w; CX · ∆) our log discrepancy from §3. Then AX (w; ∆) = A(w; CX · ∆) for all v ∈ Val(X). Essentially by definition, these log discrepancies detect F -singularities. We include a brief study of this relationship, proving that sharp F -purity and strong F -regularity are characterized using log discrepancies of semivaluations in the same way that log canonical and Kawamata log terminal singularities are characterized using divisorial valuations. Theorem (Theorem 4.4). Let X be integral with trivial valuation trivX : L× → 0. The Cartier algebra CX is (a) sharply F -pure if and only if A(ζ; CX ) ≥ 0 for all ζ ∈ Berk(X). (b) strongly F -regular if and only if A(ζ; CX ) > 0 for all ζ ∈ Berk(X), ζ 6= trivX . BERKOVICH LOG DISCREPANCIES IN POSITIVE CHARACTERISTIC 3 A consequence of the proof of this theorem is that when CX is F -pure, its F -pure centers are exactly those x ∈ X with mldB (x; CX ) = 0. Valuative measurement of sections of OX mapped to one by φ ∈ CX provides a numerical analogy between F -splitting techniques and the different ideal of field extensions from algebraic number theory. Indeed, this circle of ideas is already illustrated by Schwede and Tucker in [ST14], where they show the ramification divisor of a dominant, generically finite étale morphism π : Y → X is associated with the trace of the corresponding finite separable extension of fraction fields. Inspired by this paper, and drawing heavily from the techniques there, we prove the log-discrepant version of their transformation formula for finite morphisms. Theorem (Theorem 6.4). Let π : Y → X be a finite dominant morphism between F -finite integral schemes. For every nonzero k(X)-linear map T : k(Y ) → k(X) and every ψ ∈ CX,e , there exists a corresponding T-transpose ψT : F∗e k(Y ) → k(Y ) [ST14, Definition 5.3] and a T-log ramification function ρ(−; T) on Val(Y ) (Definition 6.2). For every w ∈ Val(Y ) with A(w; ψT ) < ∞ extending v ∈ Val(X) we have A(v; ψ) = A(w; ψT ) + ρ(w; T). The added generality over their setting of normal schemes is afforded by not using divisors. One important consequence of the description of Val(X) in [JM12] is that log discrepancy is lower-semicontinuous on Val(X); we prove this semicontinuity on the entire Berkovich space. In many ways, it is this shared property that affords us the similarity with the log discrepancies on valuation spaces in characteristic zero. As a demonstration of this assertion, we prove the main theorems from [JM12] regarding valuations computing the log canonical threshold lctB (a? ) of a multiplicatively graded sequence of ideals a? on a regular F -finite scheme. To state these results, we write jt for the ideal of those sections f ∈ OX with v(f ) + A(v; at? ) > 0 for all valuations v centered on X; this ideal is well-known as the multiplier ideal. Theorem (Theorem 7.18; cf [JM12], Theorem A). Let λ = lctB (a? ) < ∞. For any generic point x of an irreducible component of V(jλ : q) there exists a valuation with center x computing lctB (a? ), i.e. such that λ = A(v)/v(a? ). These computing valuations are obtained here and in [JM12] using a compactness argument, and their properties (e.g. Abhyankar) do not seem to be revealed from the proof. Jonsson and Mustaţă conjecture that these valuations must be quasimonomial, a condition equivalent to Abhyankar for excellent schemes in characteristic zero. We state the analogous conjectures here using locally quasi-monomial valuations, a classification that works better in positive characteristics thanks to Knaf and Kuhlmann’s local monomialization of Abhyankar valuations [KK05]. Conjecture 1 (Conjecture 7.19; cf. [JM12], Conjecture B). Let X be a regular F finite scheme and let a? be a graded sequence of ideals on X such that lct(a? ) < ∞. ◦ Weak version: there exists a locally quasi-monomial valuation that computes lctB (a? ). ◦ Strong version: any valuation computing lctB (a? ) is locally quasi-monomial. 4 ERIC CANTON Following [JM12], we reduce this conjecture to what is hopefully a more approachable form on affine spaces. Conjecture 2 (Conjecture 7.20; cf. [JM12], Conjecture C). Consider Ank , where k is an algebraically closed field of positive characteristic and n ≥ 1. Let a? be a graded sequence of ideals vanishing only at a closed point x ∈ Ank , and suppose lctqB (a? ) < ∞, where 0 6= q ⊆ OAn is an ideal. ◦ Weak version: there exists a locally quasi-monomial valuation computing lctqB (a? ) and centered at x. ◦ Strong version: any valuation of transcendence degree 0 over Ank , centered at x, and computing lctqB (a? ) must be locally quasi-monomial. Theorem (Theorem 7.23; cf. [JM12], Theorem D). If Conjecture 2 holds for all n ≤ d, then Conjecture 1 holds for all X with dim(X) ≤ d. We preceed all of this in section two with a brief sketch of the theory of Berkovich spaces as we need it for this paper; we require only the topological properties, and so do not discuss the sheaf theory. In section three, we define the log discrepancy and derive some essential elementary properties. Additionally, we prove in section five that log discrepancies are lower-semicontinuous on Berk(X), and use this to deduce constructible lower-semicontinuity on X for any F -finite scheme. 2. Berkovich spaces By a scheme we always mean a separated Noetherian scheme over a field k, and a point of a scheme refers to any (not necessarily closed) point. If X is a scheme and Z ⊆ X is an integral subscheme, we denote by k(Z) the associated function field of Z, and by OX,Z the local ring at the generic point ηZ of Z. For local sections f ∈ OX,Z , we write f + IZ for the residue of f in k(Z). If F and G are two OX -modules, we denote by HomX (F , G ) the OX -module (U 7→ HomU (F |U , G |U )). 2.1. Berkovich spaces. The center and home functions. We provide a summary of the Berkovich theory as we need it, providing sketches of proofs when the ideas involved are necessary for later sections. We refer to [DFN15] and [Con08] for more detailed developments of the following material. Definition 2.1. Let X be a scheme. (a) A (rank one, k-trivial) semivaluation on X is a pair ζ = (w, Z) consisting of an integral closed subscheme Z ⊆ X and a valuation w : k(Z) → R∞ := R ∪ {+∞}. We require w to satisfy the conditions: ◦ w(k × ) = 0 ◦ w is non-negative on some local ring OZ,z ⊆ k(Z). If f ∈ OX is a section in a neighborhood of ηZ , we define evf (ζ) = ζ(f ) =: w(f + IZ ). (b) The subscheme of ζ = (w, Z) is called the home of ζ (on X), and the home function hX : Berk(X) → X is given by hX (ζ) = ηZ , where ηZ is the generic −1 point of Z. Note that h−1 X (ηZ ) ( hX (Z) when Z is not a point. (c) We denote by Berk(X) the set of all semivaluations on X. If X is integral with generic point ηX , we also define Val(X) to be the subset of all semivaluations on X with hX (ζ) = ηX , i.e. rank one, k-trivial valuations on k(X) having center on X. BERKOVICH LOG DISCREPANCIES IN POSITIVE CHARACTERISTIC 5 (d) Since any subscheme Z ⊆ X is separated, for any semivaluation ζ = (w, Z) on X, there is a unique z ∈ Z such that OZ,z is dominated by the valuation ring Aw := w−1 [0, ∞]. This z is called the center of ζ on X, denoted cX (ζ). This defines the center function cX : Berk(X) → X. (e) When X is clear from context, we will write OX,c(ζ) for OX,cX (ζ) . We follow a similar convention with hX (ζ). Remark 2.2. Let N be the nilradical of X. Integral subschemes of X and Xred are the same, and so Berk(X) = Berk(Xred ) as sets. Moreover, f ∈ N is sent to +∞ by all ζ ∈ Berk(X), so evf = ev0 . Shortly, we will define a topology on Berk(X), and we see that Berk(X) and Berk(Xred ) also agree as topological spaces. We now topologize the set Berk(X) to define the Berkovich space of semivaluations on X. We do this in two steps, beginning with the affine case. Definition 2.3. Suppose X = Spec(R) is a reduced affine scheme. Topologize Berk(X) via the map Y Berk(X) ,→ [0, ∞] f ∈R ζ 7→ Y ζ(f ). f ∈R Here we consider [0, ∞] as a compact space. One checks easily that Berk(X) is a closed subspace of this product space, so is compact by Tychonoff’s theorem. The Hausdorff property is inherited under this embedding. Remark 2.4. It is equivalent to give the set Berk(Spec(R)) the weakest topology such that evf is continuous for all f ∈ R. Remark 2.5. The center function is well-known to be anticontinuous in the sense that for Zariski-open subsets U ⊆ X the preimage c−1 X (U ) ⊆ Berk(X) is closed [JM12]. To see this, note that f 6∈ p if and only if ζ(f ) = 0 when cX (ζ) = p. Lemma 2.6. For any affine X = Spec(R), hX : Berk(X) → X is continuous. Proof. We check that h−1 X (V(I)) is closed for all proper ideals I ⊂ R. If ηZ = hX (ζ) ∈ V(I) and pZ is prime ideal of R corresponding to ηZ , then I ⊆ pZ . Thus T −1 ζ(I) = {+∞}. We conclude h−1 (V(I)) = ev (+∞), which is closed by X f ∈I f continuity of each evf .  Remark 2.7. Any morphism f : Spec(S) = W → Spec(R) = X between affine schemes induces a continuous map f∗ : Berk(W ) → Berk(X) by restricting semivaluations, so it follows that when f is an open immersion the subspace topology on f∗ Berk(W ) agrees with the one defined directly on Berk(W ) as above. Definition 2.8 (Berkovich space of a scheme). Let X be a scheme and let U and V be two affine open subschemes of X. Since X is separated, U ∩ V is again affine, and the topology on Berk(U ∩ B) is identical to the subspace topology induced from Berk(U ) or Berk(V ). Thus, there is a unique topology on Berk(X) whose open subsets are those A such that A ∩ Berk(U ) is open for every affine subscheme. Remark 2.9. As a word of caution, it is eminently not true that Berk(U ) = h−1 X (U ) for open subsets of X. Indeed: supposing that X is integral for simplicity, every valuation having center on X lives at the generic point of X, and so Val(X) ⊆ 6 ERIC CANTON h−1 X (U ). However, not every valuation having center on X necessarily has center on −1 U . We do have Berk(U ) = c−1 X (U ) for U ⊆ X open, and Berk(X \U ) = hX (X \U ). Remark 2.10. Since the topology of Berk(X) is entirely determined by the topology of Berk(U ) as U ranges over affine subschemes U ⊂ X, checking flavors of continuity reduces to checking this continuity for affine X. Thus, cX remains anticontinuous and hX continuous for any X. 2.2. Z-valuations and the D-space of a scheme. Now we develop some basic properties of a totally disconnected subset of Berk(X) which we call D(X). This space is discrete in a kind of way, providing a fairly rigid structure that makes the center map continuous. This space nevertheless sees a great deal of the information in Berk(X): indeed, D(X) is still large in the sense that the space R>0 D(X) of R>0 multiples of semivaluations in D(X) is dense in Berk(X), since it contains all discrete valuations, which are themselves dense. Definition 2.11. We will say that a valuation w ∈ Val(X) is a Z-valuation if im(w) ⊆ Z, and denote by D(X) the set of Z-valuations. The Z-semivaluations on X are the elements in the closure D(X) of D(X) in Berk(X). Remark 2.12. Just as for Berk(X), we know that D(U ) = D(X)∩Berk(U ) for open subschemes U ⊆ X. Let us explain this statement now. First, note that for any open subscheme U ⊆ X we have Berk(U ) = c−1 X (U ), and so in particular if U = Spec(R) is an affine open subscheme of X then D(U ) = D(X) ∩ Berk(U ), as both sets are described as Z-valuations on the function field L of X that are non-negative on R. Since Berk(U ) is closed in Berk(X), the closure of D(U ) in Berk(X) must be contained in Berk(U ), and so agrees with D(U ). This implies that D(U ) ⊆ D(X) ∩ Berk(U ). For the reverse inclusion, let ζ ∈ D(X) ∩ Berk(U ) and let {vα } ⊂ D(X) be a convergent net with limit ζ. Since cX (ζ) ∈ U , we know ζ(f ) ≥ 0 for all f ∈ R, and so vα → ζ implies that there exists α0 such that for α ≥ α0 we have vα (f ) > −1. Since vα takes values only in Z, we conclude that vα (f ) ≥ 0 for all α ≥ α0 and f ∈ R, which is to say that {vα }α≥α0 ⊂ D(U ), so ζ ∈ D(U ). The case when Y ( X is a proper closed subscheme is much more difficult. In general, neither inclusion needed for this equality is clear to the author. We now conclude this section by proving that the center function becomes continuous with compact fibers upon restriction to D(X). Lemma 2.13. The center function cD = cX |D : D(X) → X is continuous. Proof. We may assume X = Spec(R) is affine. Let f ∈ R and ζ ∈ D(X). Then cD (ζ) ∈ V(f ) if and only if ζ(f ) > 0. Since ζ ∈ D(X), im(ζ) ⊆ Z, and so ζ(f ) > 0 −1 is equivalent to ζ(f ) ≥ 1. Therefore, c−1 D (V(f )) = evf [1, ∞] ∩ D(X) is closed.  Lemma 2.14. For all x ∈ X, the fiber c−1 D (x) is closed and compact. Proof. Let U = Spec(R) be an affine neighborhood of x and suppose x ∈ Spec(R) corresponds to the prime p ⊂ R. Since c−1 D (x) ⊆ D(U ), we may assume that X = Spec(R). Now, cX (ζ) = x for ζ ∈ D(X) if and only if ζ(g) = 0 for all g ∈ R \ p and ζ(f ) ≥ 1 for all f ∈ p. These are both closed conditions.  BERKOVICH LOG DISCREPANCIES IN POSITIVE CHARACTERISTIC 7 3. Log discrepancies of Cartier prealgebras Let X → Spec(k) be an integral scheme of characteristic p > 0 with fraction field L. The (absolute) Frobenius morphism F : X → X is defined by (f 7→ f p ) for f ∈ OX . We say that X is F -finite if F is a finite morphism, an assumption we generally do not need (and thus do not globally make) in this section. We begin with two classic lemmas that motivate our definitions. Both of these are special cases of Grothendieck duality. Lemma 3.1. Suppose X is an F -finite normal scheme and let KX be a canonical divisor. Then HomX (F∗e OX , OX ) ∼ = F∗e OX ((1 − pe )KX ) as F∗e OX -modules. Lemma 3.2. Let (R, m) ⊆ (S, n) be a finite local extension of Gorenstein rings. We have an isomorphism of S-modules HomR (S, R) ∼ = S. We will use this first lemma to associate φ : F∗e OX → OX with sections of OX ((1 − pe )KX ), thus to Q-divisors ∆φ on X (and schemes birational to X) having the property that (pe − 1)(KX + ∆φ ) ∼ 0. It is this association which lends these φ to birational study of singularities. Without log resolutions, we must find replacements for standard approaches in characteristic zero that make heavy use of them. However, we can use the second lemma to perform an absolute comparison between φ and ψ ∈ HomL (F∗e L, L) ∼ = F∗e L, since φ = ψ F∗e h for some h. See Proposition 3.15 and Theorem 6.4 for examples. Definition 3.3. Let Q= M e≥0 Qe ⊆ M HomL (F∗e L, L) =: CL , e≥0 be a graded quasicoherent OX -sheaf, acting on Qe as an F∗e OX -module via precomposition. We say that Q is a Cartier prealgebra on X if φ ∈ Qe implies φm := φ ◦ F∗e φm−1 ∈ Qme for all m ≥ 1 One of the main interesting examples of Cartier preaglebras are Cartier subalgebras [Sch10]. Definition 3.4. The Cartier algebra of X is CX = ⊕e HomX (F∗e OX , OX ), viewed as a graded non-commutative sheaf of rings on X. A Cartier subalgebra on X is a graded subring of CX . Remark 3.5. Cartier subalgebras can be thought of as having a similar relationship to Cartier prealgebras that effective divisors have with arbitrary divisors. To wit, we can generate a Cartier prealgebra hφiX on X for any φ ∈ HomL (F∗e L, L), and the principal Cartier subalgebras are those hφiX ⊆ CX . We temporarily introduce the following ad-hoc definition that allows us to restrict Cartier prealgebras to compatible subschemes. For subalgebras, we can take all Me below to be OX , and for individual φ : F∗e L → L on an F -finite scheme there is always (locally) an effective divisor E such that φ(F∗e OX ) ⊆ OX (E), which is to say that we can take Me to be OX (−pe E) on an appropriate neighborhood. Definition 3.6. Let I ⊆ OX be an ideal on X and Q a Cartier prealgebra on X. We will say that I is Q-compatible at x ∈ X if there exists a neighborhood U of x and a sequence of line bundles M• = {Me }e≥0 on U such that: (a) Q|U ⊆ ⊕e HomU (F∗e Me , OU ) and 8 ERIC CANTON (b) φ(F∗e (IMe )x ) ⊆ Ix for all φ ∈ Qe,x and all e ≥ 0. We will say that I is Q-compatible when I is Q-compatible for every x ∈ X. If W is the closed subscheme of X associated to I, then we also say that W is Q-compatible. We say that M• realizes the Q-compatibility of I at x. Proposition/Definition 3.7. Suppose Z is an closed integral subscheme of X that is Q-compatible at x ∈ Z, and suppose M• realizes this compatiblility. Since φ(F∗e (IZ Me )x ) ⊆ IZ,x , there is a well-defined OZ,x -linear function e φkM Z : F∗ (Me,x |Z ) → OZ,x . Since Z is integral, and Me,x |Z is a line bundle on Z, we may embed this sheaf into k(Z). The resulting generic extension φkZ : F∗e k(Z) → k(Z) does not depend on M• nor the embedding. Applying this procedure to every ψ ∈ Qx yields a Cartier prealgebra on Z that we will denote by QkZ or QkIZ , depending on the context. Proof. Fixing a sequence M• realizing the Φ-compatibility of p at x, denote by Φn kM Z the generic extension obtained from a fixed embedding of Mne |Z into k(Z). Suppose    c+p f +p n M ne = Φ kZ F∗ g+p d+p for c ∈ R and f, g, d ∈ R \ p. Then ne p (d + p)Φn kM Z (F∗ g en −1 f + p) = gc + p ∈ k(Z). en It follows that d Φn (F∗ne g p −1 f ) − gc ∈ p. In particular, by reversing this argue pen −1 f + p) = gc + p for any sequence L• realizing ment we see (d + p)Φn kL Z (F∗ g compatibility at x and any chosen embedding of each Le .  Definition 3.8 (Log discrepancy of a Cartier prealgebra). We define the log discrepancy of a Cartier prealgebra at a semivaluation in three steps: (a) Let φ ∈ HomL (F∗e L, L) and w ∈ Val(X). We define the log discrepancy of φ at w to be   1 n en A(w; φ) = sup w(b) : b ∈ L such that φ (F b) = 1 . ∗ en − 1 n≥1 p (b) Let Q be a Cartier prealgebra on X, w ∈ Val(X), and set x = cX (w). The log discrepancy of Q at w is defined by A(w; Q) = sup A(w; φ). φ∈Qx (c) Let ζ ∈ Berk(X) with home Z := hX (ζ). If Z is Q-compatible at x = cX (ζ), we define the log discrepancy of Q at ζ by A(ζ; Q) = A(ζ; QkZ ). If Z is not compatible at x then we set A(ζ; Q) = +∞. The next proposition provides a way of computing log discrepancies at semivaluations without restricting to the home. Proposition 3.9. Let R = OX,x and ζ ∈ Berk(X) with cX (ζ) = x. Set hX (ζ) = ηZ and let p ⊂ R be the ideal of Z at x. Let Φ ∈ HomL (F∗e L, L) and define the Cartier BERKOVICH LOG DISCREPANCIES IN POSITIVE CHARACTERISTIC 9 prealgebra hΦiR := ⊕n≥1 Φn F∗en R on Spec(R). Suppose p is hΦiR -compatible at x. Then A(ζ; hΦiR ) = A(ζ; Φ)   1 en n en n en = sup (ζ(r) − p ζ(Φ (F r))) : r ∈ R s.t. Φ (F r) ∈ R \ p . ∗ ∗ en − 1 n≥1 p Proof. The first equality is clear from the assumption cX (ζ) = x, which implies ζ(r) ≥ 0 for all r ∈ R and ζ(r) > 0 for r ∈ px . Let ΦkZ : F∗e k(Z) → k(Z) be the induced mapping associated to any sequence of line bundles realizing compatibility at p. Suppose    f +p n ne =1 Φ kZ F∗ g+p for f, g ∈ R \ p. Then Φn kZ (F∗ne g p n en −1 f + p) = g + p 6= 0 ∈ k(Z), en (F∗ne g p −1 f )) = ζ(g). Therefore, A(ζ; Φ) is at most the supremum on the so ζ(Φ second line above. Equality is shown by reversing this process.  The following proposition is used to prove the essential conservation property (3.18)(b), and is also quite useful when computing log discrepancies in practice. The usefulness of this proposition is the reason we imposed the power-closed property on Cartier prealgebras; everything up to this point is true for arbitrary graded subsheaves Q ⊆ CL . Proposition 3.10. Let Q be a Cartier prealgebra on X, ζ ∈ Berk(X) with Qcompatible home Z = hX (ζ). Let x = cX (ζ). Then for φ ∈ Qe,x ,   1 n ne A(ζ; φ) = lim sup w(b) : b ∈ k(Z) such that φ (F b) = 1 . ∗ pne − 1 n→∞ Similarly, we have an equality A(ζ; Q) = lim sup sup A(ζ; φ). e→∞ φ∈Qe,x Proof. The first equality follows from observing that if φm (F∗me b) = 1 then φmn (F∗mne b(p me mne −1)/(pme−1 ) (pmne −1)/(pme −1) ) = 1, mne and w(b)/(p − 1) = w(b )/(p − 1). The second equality is similar, using that φ ∈ Qe,x implies φn ∈ Qne,x and A(ζ; φ) = A(ζ; φn ).  Example 3.11 (F -finite DVRs; cf. [CMS15]). One can associate divisors to (p−1 )linear maps and deduce log discrepancies using this association. As this process is well-known to experts, we only sketch the construction and refer to [Sch09, Theorem 3.11] and [BS13, §4] for more detailed explanations. Let R = Aw be an F -finite DVR associated to a normalized discrete valuation w and E ∈ Spec(R) the closed point, and fix a local parameter t ∈ R. Then HomR (F∗e R, R) is generated by the e projection Φe onto the F∗e tp −1 factor of F∗e R. Since R is Gorenstein and F -finite, local duality implies that HomR (F∗e R, R) ∼ = F∗e R as F∗e R-modules 10 ERIC CANTON and that our choice of t fixes an isomorphism so that F∗e 1 corresponds to Φe . Therefore, if φ = Φe F∗e (utc ) ∈ HomR (F∗e R, R) and φ(F∗e b) = 1 then c + w(b) = w(utc ) + w(b) = pe − 1. Setting (pe − 1)∆φ := div(utc ) = cE gives a Q-divisor with A(E; ∆φ ) = 1 − 1 pe −1 w(b). This is the key point used by Cascini, Mustaţă, and Schwede (Lemma 3.22), and their result is crucial for proving that our definition of log discrepancy agrees with the log discrepancy defined in [JM12] should log resolutions exist. Note that by F -finiteness, for all φ : F∗e L → L we have that tc φ(F∗e R) ⊆ R for some c ≥ 0 (so in particular hφiR is a Cartier prealgebra) and that by the above computation we need only compute the supremum   1 e e (w(b) − w(φ(F∗ b)) : φ(F∗ b) 6= 0 sup pe − 1 to compute A(w; hφiR ). Example 3.12 (Regular local rings). Let κ be an F -finite field and R = κ[[x1 , . . . , xd ]] [κ:κp ] with maximal ideal m, and let {λi }i=1 be a basis for κ over κp . Then R is F -finite, F∗ R is free over R with basis {λi xa1 1 · · · xadd : 0 ≤ aj ≤ p − 1, 1 ≤ i ≤ [κ : κp ]}, and HomR (F∗ R, R) is generated canonically by the projection Φ onto the xp−1 = (x1 · · · xd )p−1 -basis element. Now if v ∈ c−1 X (x) ∩ Val(X) and Φ(F∗ b) = 1 for some b ∈ Frac(R), then b = uxp−1 for some u ∈ R× . It follows that n X A(v; Φ) = v(xi ). j=1 We reduce the case of a valuation centered on any regular local ring to this case in Lemma 7.13(a). Example 3.13. If w is a discrete valuation whose associated valuation ring R is not F -finite, then Datta and Smith proved in [DS16, Lemma 4.2.4] (see also [DS17]) that HomR (F∗e R, R) = 0 for all e ≥ 1. I claim that this implies that A(w; φ) = +∞ for any nonzero φ : F∗e L → L. This follows from observing that the set of real numbers {w(φ(F∗e r)) : φ(F∗e r) 6= 0}r∈R is unbounded below: if it were bounded below, say by −M = w(t−M ), then tM φ ∈ HomR (F∗e R, R) gives a nonzero map. Lemma 3.14. Let φ, ψ ∈ HomL (F∗e L, L) and suppose ψ = φ F∗e h for h ∈ L. For every valuation v on L with A(v; φ) < ∞, A(v; φ) + v(h)/(pe − 1) = A(v; ψ). Furthermore, A(v; φ) = +∞ implies A(v; ψ) = +∞. Proof. This follows directly from: φ(F∗e f ) = 1 if and only if ψ(F∗e (f /h)) = 1.  Proposition 3.15 (Birational transformation rule). Let π : Y → X be a proper birational morphism between regular F -finite schemes, and fix canonical divisors KX and KY agreeing wherever π is an isomorphism. Setting KY /X = KY − π ∗ KX , A(v; CX ) = A(v; CY ) + v(KY /X ) for all v ∈ Val(X) with A(v; CX ) < ∞. Here by v(KY /X ) we mean the valuation of any representative for this Cartier divisor in a neighborhood of cY (v). Proof. Suppose x = cX (v) and y = cY (v). From HomZ (F∗ OZ , OZ ) ∼ = F∗ OZ ((1 − p)KZ ) for Z ∈ {X, Y } we are given generators Φz for CZ,z ∼ = F∗ OZ ((1 − p)KZ )z such that divZ (ΦZ ) ∩ Spec(OZ,z ) = (1 − p)KZ ∩ Spec(OZ,z ). There exists hS/R ∈ L BERKOVICH LOG DISCREPANCIES IN POSITIVE CHARACTERISTIC 11 such that Φx = Φy F∗ hy/x since HomL (F∗ L, L) is one-dimensional over F∗ L. As we have seen, A(v; Φx ) = A(v; Φy F∗ hy/x ) = A(v; Φy ) − v(hy/x )/(p − 1). We know that A(v; Φx ) = A(v; CX ) and A(v; Φy ) = A(v; CY ), and so conclude that v(KY /X ) = v(KY ) − v(π ∗ KX ) = −v(hy/x )/(p − 1).  3.1. Graded sequences of ideals. We now study how Cartier prealgebras can be twisted by sequences of ideals with multiplicative structures, obtaining formulas similar to Lemma 3.14. Let {ae }e∈N1 be a collection of ideals on X. We say that {ae } is multiplicatively graded (or simply graded) if as at ⊆ as+t for all t ∈ N, and [pt ] that {ae } is F -graded if a1 = OX and as at ⊆ as+t for all s, t ≥ 0. While it is standard to use the notation a• for both of these, we have need to use these two concepts together and so we will always interpret a• as an F -graded sequence and a? as a multipliciatively graded sequence. Interesting examples of graded sequences of ideals are obtained as the base loci of |L ⊗m | for line bundles L on X. Another common source of graded sequences of ideals are those associated to a semivaluation ζ on X, defined by as (ζ) = {f ∈ OX : ζ(f ) ≥ s} for s ∈ Z≥0 . We write a? (ζ) for this graded sequence. The F -graded condition is precisely what is needed to make new Cartier prealgebras from old. Every Cartier subalgebra on a Gorenstein scheme arises in this way; see [Bli13; BST12]. One also uses F -graded sequences to study pairs (X, at ) with a ⊆ OX an ideal and t ≥ 0 a real parameter by studying the F -graded sequence e with terms ae := adt(p −1)e [Sch10]. Definition 3.16. We can twist a Cartier prealebra Q by an F -graded ideal sequence a• = {ae ⊆ OX }e∈N on X and obtain a new OX -subsheaf of CL . We do this by setting Q · a• = ⊕e≥0 (Qe · F∗e ae ) nX o (φi · F∗e ai ) : ai ∈ ae and φi ∈ Qe . = ⊕e≥0 The F -graded condition ensures that Q · a• ⊆ Q is again a Cartier prealgebra. A special case of interest is constructed from the data of a Cartier prealgebra Q on X, an ideal a ⊆ OX , and a real number t ≥ 0. We define Q · at := Q · {adt(p Note that {ae = adt(p e −1)e e −1)e }e≥1 . }e≥1 is F -graded. For ζ ∈ Berk(X) with center x and an ideal sheaf a ⊆ OX , we define ζ(a) = min{ζ(f ) : f ∈ ax }. The following lemma allows us to evaluate semivaluations on sequences of ideals in two ways; the existence of the limits is well-known. 12 ERIC CANTON Lemma 3.17. (cf. [Ein+06; JM12]) Let ζ ∈ Berk(X) and {ae }e∈N1 be a sequence of ideals on X, and suppose ζ(ae ) < ∞ for all e. If a• is F -graded, we have the limit ζ(ae ) ζ(ae ) ζF (a• ) = lim e = inf e . e→∞ p − 1 e≥1 p − 1 If a? is a graded sequence, then ζ(a? ) := lim e→∞ ζ(ae ) ζ(ae ) = inf . e≥1 e e  Proof. See [JM12, Lemma 2.3]. The following lemma is applied throughout the paper. Lemma 3.18. Let Q and R be Cartier prealgebras on X, ζ ∈ Berk(X) a semivaluation with Q-compatible home Z. (a) Monotonicity: If Q ⊆ R then A(ζ; Q) ≤ A(ζ; R). (b) Conservation: Let a• be an F -graded sequence of ideals on X. If ζF (a• ), A(ζ; Q), and A(ζ; Q · a• ) ∈ R then A(ζ; Q) = A(ζ; Q · a• ) + ζF (a• ). Proof. Monotonicity follows directly from the definition; we therefore begin with conservation. Towards this end, Q · a• ⊆ Q implies uniform compatibility of Z with Q · a• . By passing to a• OZ and QkZ we may assume ζ = w is a valuation with associated valuation ring Aw . For each e ≥ 0, since X is Noetherian we can select ge ∈ ae such that ae Aw = ge Aw ⊆ Aw . Put x = cX (w) and let φ ∈ Qe,x . From Proposition 3.10 we have   1 n ne (w(b/g ) + w(g )) : φ (F b) = 1 A(w; φ) = lim sup ne ne ∗ pne − 1 n→∞ = wF (a• ) + lim sup A(w; φn · F∗ne gne ). n→∞ ∈ (Q · a• )ne,x and that ψ(F∗ne b/gne ) = 1. Taking Note that ψ = φ · suprema above over all φ ∈ Qe,x and all ψ ∈ (Q · a• )e,x gives n (F∗ne gne ) A(w; Q) ≤ wF (a• ) + A(w; Q · a• ). We now establish the reverse inequality. Since a• is F -graded, it suffices (by Lemma 3.17) to show that for all ε > 0 there exists e > 0 such that A(w; Q · a• ) + 1 wF (ae ) < A(w; Q) + ε. pe − 1 We find e > 0, ψ ∈ (Q · a• )e,x , and b ∈ L such that ψ(F∗e b) = 1 and (3.18.1) A(w; Q · a• ) − ε < 1 w(b). pe − 1 By definition of Q · a• , there exist φ1 , . . . φn ∈ Qe,x and a1 , . . . , an ∈ ae,x such that ψ(F∗e b) = n X φi (F∗e ai b) = 1. 1 Let −c = min1≤i≤n {w(φi (F∗e ai b))} ≤ w( assume that −c = w(φ1 (F∗e a1 b)) so that φi (F∗e ai b)) = 0. By reindexing, we may e φ1 (F∗e uf p a1 b) = 1 for some unit u ∈ A× w P BERKOVICH LOG DISCREPANCIES IN POSITIVE CHARACTERISTIC 13 and some f ∈ Aw such that w(f ) = c. Since a1 ∈ ae , w(ae ) ≤ w(a1 ), and so A(w; Q · a• ) + 1 1 w(ae ) − ε ≤ A(w; Q · a• ) + e w(a1 ) − ε pe − 1 p −1 1 < e (w(b) + w(a1 ) + cpe ) p −1 ≤ A(w; Q). Here we are using (3.18.1) between the first and second line, and then using that e e φ1 ∈ Qe and φ1 (F∗e uf p a1 b) = 1, so that w(f p a1 b) ≤ (pe − 1)A(w; Q).  Remark 3.19. The assumption that ζF (a• ), A(ζ; Q), and A(ζ; Q · a• ) be finite is essential. Indeed, for a fairly trivial counterexample without these assumptions (which demonstrates the main trouble), we can take ζ = trivX , Q = CX , and ae = 0 for e > 1. Then ζF (a• ) = +∞, A(ζ; Q) = 0, and A(ζ; Q · a• ) = −∞. Alternatively, suppose X is regular, Z ⊂ X is a proper integral subscheme of [pe ] dimension at least one, let pZ be the associated prime ideal, and set ae = (pZ : pZ ) for e > 1. Then pZ is compatible with D = CX · a• , and DkZ = CZ [Fed83]. Let z ∈ Zreg and ζ = ordz be the valuation corresponding to the exceptional fiber of Blz (Z) → Z. Then A(ζ; D) = A(ζ; CZ ) = dim(Z) while ζF (a• ) = +∞ = A(ζ; CX ). Definition 3.20 (Log discrepancies of graded sequences). Let a? be a graded sequence of ideals and Q a Cartier prealgebra on X. For semivaluations ζ and a t ∈ [0, ∞) we define the log discrepancy of the sequence of Cartier prealgebras t/m Q · am to be the following supremum: A(ζ; Q · at? ) := sup A(ζ; Q · at/m m ). m≥1 If we define Q · at? = X Q · at/m m m≥1 then (Q · at? ) is a Cartier prealgebra having log discrepancy A(ζ; Q · at? ). Corollary 3.21. Let Q be a Cartier prealgebra on X, ζ ∈ Berk(X) whose home Z is uniformly Q-compatible, and let a? ⊆ OX be a multiplicatively graded sequence of ideals on X such that ζ(a? ) < ∞, and let t ≥ 0. If both A(ζ; Q) and A(ζ; Q · at ) are finite, then A(ζ; Q) = A(ζ; Q · at? ) + t ζ(a? ). We will return to studying asymptotic invariants of graded sequences of ideals in §7, turning now to prove that our definition is the “correct” one, in the sense that should log resolutions in characteristic p exist, the log discrepancy function defined here agrees with the one obtained via the techniques of [JM12] for every valuation. The first step is to establish the result for divisorial valuations; this result was shown to the author by Karl Schwede, who proved it with Paolo Cascini and Mircea Mustaţă. For Q-divisors ∆ ≥ 0 we denote by CX · ∆ the Cartier subalgebra ⊕HomX (F∗e OX (d(pe − 1)∆e), OX ) ⊆ CX . Lemma 3.22 ([CMS15]). Let ∆ ≥ 0 be a Q-Weil divisor on a normal F -finite integral scheme X such that (pe − 1)(KX + ∆) ∼ 0 for some integer e > 0. Let π : Y → X be a proper birational morphism from a normal F -finite integral scheme 14 ERIC CANTON Y and E ⊂ Y an irreducible divisor. Let AX (E; ∆) be the standard log discrepancy of ∆ on E, i.e. the coefficent of E in E − ∆Y , with ∆Y defined below: KY + ∆Y = π ∗ (KX + ∆). Then AX (E; ∆) = A(ordE ; CX · ∆). Proof. Fixing a canonical divisor KX on X induces a canonical divisor on every Y as above by requiring KY to agree with KX wherever π : Y → X is an isomorphism. The assumption that (pe − 1)(KX + ∆) ∼ 0 now gives the section F∗e 1 of ∼ F e OX ((1 − pe )(KX + ∆)) F e OX = ∗ ∼ = HomX (F∗e OX (d(pe − 1)∆e), OX ). Let ψ : F∗e OX (d(pe − 1)∆e) → OX be the map corresponding to F∗e 1. The formula (pe − 1)(KY + ∆Y ) = (pe − 1)π ∗ (KX + ∆) now gives a map ψY : F∗e OY (d(pe − 1)∆Y e) → OY whose associated divisor has coefficients described as in Example 3.11.  From this, our main theorem follows easily. Theorem 3.23. Suppose log resolutions of singularities exist in positive characteristic, let ∆ ≥ 0 be a Q-Weil divisor on X such that (pe − 1)(KX + ∆) ∼ 0 for some e > 0, and let AX (w; ∆) be the log discrepancy of (X, ∆) at w ∈ Val(X) [JM12; Bou+15]. Then A(w; CX · ∆) = AX (w; ∆). Proof. We use the notation P of [JM12]. If (Y, D) → (X, ∆) is a log smooth pair mapping to (X, ∆), D = Di , and w ∈ QM (Y, D) then X AX (w; ∆) = w(Di )AX (ordDi ; ∆) [JM12, Proposition 5.1]. X = w(Di )A(ordDi ; CX · ∆). (Lemma 3.22) Every log smooth pair (Y, D) over X induces a retraction map r(Y,D) : Val(X) → QM (Y, D) [JM12, §3.1, 4.3]. For b ∈ L, we have w(b) ≥ r(Y,D) (w)(b), and furthermore if (Y, D) is a log resolution for (X, div(b)) then w(b) = r(Y,D) (w)(b) [JM12, Corollary 4.8]. In particular (‡) w(b) = sup r(Y,D) (w)(b) for all b ∈ L. (Y,D) Therefore, if x = cX (w), we have   1 e w(b) : φ(F∗ b) = 1 for some φ ∈ (CX · ∆)e,x A(w; CX · ∆) = sup pe − 1 e≥1   1 e r(Y,D) (w)(b) : φ(F∗ b) = 1 (using (‡)) = sup sup e e≥1 (Y,D) p − 1   1 e = sup sup r (w)(b) : φ(F b) = 1 (Y,D) ∗ pe − 1 (Y,D) e≥1 = sup A(r(Y,D) (w); CX · ∆) (Y,D) = sup AX (r(Y,D) (w); ∆) = AX (w; ∆). (Y,D) Here we are using that cX (w) = cX (r(Y,D) (w)) for all (Y, D).  BERKOVICH LOG DISCREPANCIES IN POSITIVE CHARACTERISTIC 15 This theorem establishes the approach to log discrepancies put forth in this section as an alternative to the birational approach by guaranteeing that even should we learn log resolutions exist in positive characteristic, the functions on valuation spaces will agree. We note that our extension to Berk(X)\Val(X) is nonstandard, as our definition is not the maximal lsc extension to true semivaluations. It is this non-standard extension that gives our log discrepancies the ability to detect F -singularities, as shown in the next section. 4. Connections with F -singularities In this section, we briefly explore the relationship of our log discrepancies with two classes of F -singularities. We prove that sharply F -pure and strongly F -regular Cartier subalgebras are characterized using log discrepancies of semivaluations in the same way that log canonical and Kawamata log terminal singularities are defined using standard log discrepancies. Throughout, we fix a Cartier subalgebra D ⊆ CX on an F -finite scheme X. We recall the following definitions, citing only the modern incarnations defined in our setting by Schwede. See also [HR76; HH89]. Definition 4.1 ([Sch08; Sch10]). We say that D is ◦ sharply F -pure if for all x ∈ X the stalk (Dx )e contains a surjective map for some e > 0. ◦ strongly F -regular if for all x ∈ X and all f ∈ OX,x there exists e > 0 and φ ∈ (Dx )e such that φ(F∗e f ) = 1. Compatible prime ideals of D are called centers of F -purity. Note that since the zero ideal is always compatible, and minimal primes of compatible ideals are compatible (4.9, 4.10 from [Sch10]), the generic points of each irreducible component of X are centers of F -purity. For any x ∈ X, the Dx -compatible ideal of OX,x maximal under inclusion is a prime called the splitting prime, defined below. If P is the splitting prime of Dx , then DkP is a strongly F -regular Cartier subalgebra on V(P ). Definition 4.2. The splitting prime of D at x ∈ X is the ideal of R := OX,x P(Dx ) = {f ∈ R : φ(F∗e f ) ∈ m for all φ ∈ Dx , |φ| = e }. Standard facts about P = P(Dx ) include (see [AE05]): (a) P is proper if and only if D is F -pure. (b) As suggested by the name, P is prime whenever it is proper. (c) When P is proper, no prime p ∈ Spec(R) with P ( p can be D-compatible. In particular, P = 0 if and only if D is strongly F -regular. (d) The restriction DkP is strongly F -regular. Example 4.3. We can use log discrepancies of semivaluations to detect well-studied types of F -singularities. Let x ∈ X and denote by trivx the trivial semivaluation k(x)× → {0}. For any Cartier subalgebra D, there are exactly three possiblities:   −∞ iff D is not sharply F -pure at x. 0 iff x is a center of F -purity for D. A(trivx , D) =  +∞ iff D is sharply F -pure at x and P(Dx ) 6= mx . 16 ERIC CANTON We now prove our main theorem of this section, giving one way that sharply F -pure and strongly F -regular singularities should correspond to log canonical and Kawamata log terminal singularities, respectively. If X = X1 ∪ · · · ∪ Xn is an irreducible decomposition of X, and triv1 , . . . , trivn are the trivial valuations on the reductions of the components Xi , we set Berk(X)∗ = Berk(X) \ {triv1 , . . . , trivn }. Similarly, we set D(X)∗ = D(X) ∩ Berk(X)∗ . Theorem 4.4. The Cartier subalgebra D is (a) sharply F -pure if and only if A(ζ; D) ≥ 0 for all ζ ∈ Berk(X)∗ . (b) stronly F -regular if and only if A(ζ; D) > 0 for all ζ ∈ Berk(X)∗ . Moreover, the same remains true if we replace Berk(X)∗ with D(X)∗ in either part. Proof. Since A(ζ; D) depends only on φ ∈ Dc(ζ) and both sharp F -purity and strong F -regularity are local conditions, we assume Spec(R, m) = (X, cX (ζ)). Suppose first that D is sharply F -pure and let φ ∈ De be surjective with φ(F∗e f ) = 1. Then 1 A(ζ; D) ≥ e w(f ) ≥ 0. p −1 If D is not sharply F -pure then A(trivx ; D) = −∞. When D is strongly F -regular, by choosing f ∈ m the same inequality as before shows that A(ζ; D) > 0. If D is not strongly F -regular, by the first part of this theorem we may assume D is sharply F -pure. Then the splitting prime P(D) is proper (see [AE05; Sch10]), and by localizing further we may assume P(D) = m. Since we are assuming D is sharply F -pure, A(trivx ; D) = 0. Finally, note that in each case the implication “⇐” is established using only the trivial semivaluations on residue fields of points. Since trivx ∈ D(X), we can replace Berk(X) with D(X).  Question 4.5. Suppose CX is sharply F -pure but not strongly F -regular at x ∈ X. Does there exist a non-trivial ζ ∈ Berk(X) with cX (ζ) = x and A(ζ; CX ) = 0? 5. Lower-semicontinuity For this section, let X be an F -finite integral scheme of characteristic p > 0. We show that A(−; Q) is lower-semicontinuous on Berk(X) for any Cartier prealgebra Q. We then deduce that the minimal log discrepancy function derived from log discrepancies on Berk(X) is lsc on X considered with the constructible topology. Definition 5.1. Recall that a function f : Y → R±∞ = [−∞, ∞] on a topological space Y is lower-semicontinuous (lsc) at y0 ∈ Y if one of the following equivalent conditions holds: (a) For every convergent net yα → y0 , f (y0 ) ≤ lim inf α f (yα ). (b) For every ε > 0 there exists an open neighborhood U ⊆ Y of y0 such that f (y0 ) − ε < f (y) for all y ∈ U ; (c) Considering R±∞ with the toplogy of half-open intervals (a, ∞], the mapping f is continuous. Remark 5.2. Since Berk(X) is not generally first countable, we use nets and not sequences for questions of convergence and compactness. BERKOVICH LOG DISCREPANCIES IN POSITIVE CHARACTERISTIC 17 Definition 5.3. The constructible topology on X is minimal topology containing both Zariski open and Zariski closed subsets. This is equivalent to the topology with basis consisting of finite unions of locally closed subsets. The following lemma is a technical generalization of the classical way of producing a new lsc function from a given collection of lsc functions. The author thanks Kevin Tucker for suggesting this approach, which leads to a much simpler proof of lower-semicontinuity than the author’s original. Lemma 5.4 (cf. [Fol13], Proposition 7.11). Let A be a topological space and let G be a sheaf of lsc functions on A. If f (x) = sup{g(x) : g ∈ Gx }, then f is lsc. Proof. We use definition 5.1(c). For an open set (r, ∞] ⊆ R±∞ , let G = ∪{Gx : f (x) ∈ (r, ∞]}. Observe that f −1 (r, ∞] = ∪g∈G g −1 (r, ∞] is open.  Theorem 5.5. For every Cartier prealgebra Q on X, the log discrepancy A(−; Q) is lsc on Berk(X). Proof. Recall that Q is quasi-coherent, and Berk(X) has an open cover by Berk(U ) for Spec(R) = U ⊆ X affine open. Quasi-coherence gives some graded module Q ⊆ e and A( ; Q) is constructed as in Lemma 5.4 ⊕ HomL (F∗e L, L) such that Q|U = Q, from the locally constant sheaf associated to U 7→ {A( ; φ) : φ ∈ Q} for U ⊆ Berk(U ). Therefore, it is enough to assume X = Spec(R), fix φ ∈ Q, and prove that A( ; φ) is lsc. For any f ∈ L = Frac(R) and n ≥ 1, set s(f, n) = φn (F∗ne f ). Varying f ∈ L, we obtain an open cover of Berk(X) using the open subsets Uf,n = ev−1 s(f,n) (−∞, ∞) ⊆ Berk(X). On each Uf,n , the function  1  evf (ζ) − pen evs(f,n) (ζ) E(f, n, ζ) = ne p −1 is continuous. We then induce a sheaf of continuous functions on Berk(X) by G(U) = {E(f, n, )|U : U ⊆ Uf,n }. Since A(v; φ) = sup{E(f, n, ζ) : Gζ }, we apply (5.4) once again and conclude that A( ; φ) is lsc.  Remark 5.6. If A(v; φ) ∈ R for v ∈ Val(X), and ε > 0, we can be more precise in demonstrating a basic open subset U ⊆ Val(X) with A(v; φ) − ε < A(w; φ) for all w ∈ U . Indeed, keeping notation from the previous proof, suppose A(v; φ) − ε/2 < E(f, n, ζ) for some f ∈ L with φn (F∗ne f ) = 1. One can check that U = {w ∈ Val(X) : |v(f ) − w(f )| < (pen − 1)ε/2} has the desired property. Being a weak topology, a natural basis for the topology near a given ζ ∈ D(X) over an affine subscheme Spec(R) of X is given by finite intersections of sets of the form {α ∈ D(Spec(R)) : |ζ(f ) − α(f )| < ε} or {α ∈ D(Spec(R)) : α(f ) > M }, where M and ε are positive real numbers and f ∈ R. The first type of set is used in the case ζ(f ) < ∞ and the second when ζ(f ) = ∞. An important property of D(X) not shared by Berk(X) is that every open set of this form is a finite union of sets of the form {α ∈ D(X) : α(f ) = z} and {α ∈ D(X) : α(f ) ≥ z} for integers z. Therefore, any finite intersection of these sets can be written as a finite union 18 ERIC CANTON of sets of the form {β ∈ D(X) : β(f ) = a} and {β ∈ D(X) : β(g) > M } for some f, g ∈ R and a, M ∈ Z. Proposition 5.7. The image of a basic open subset of D(X) under cD is constructible, and the quotient topology induced by cD is the constructible topology. Proof. We assume that X = Spec(R) and that our basic open subset is of the form U := {α ∈ D(X) : α(fi ) = ai for 1 ≤ i ≤ s} for some fi ∈ R and ai ∈ Z; the case of α(fi ) ≥ Mi is very similar. Suppose α ∈ U. The condition that p = cD (α) is equivalent to p ∈ D(fi ) := V(fi )c for fi such that ai = 0 and p ∈ V(fi ) for ai > 0 (note that by definition α(f ) ≥ 0 for every f ∈ R). Re-numbering so that ai = 0 for 1 ≤ i ≤ t and ai > 0 for t < i ≤ s, we conclude that ! ! t s \ [ \ cD (U) = D(fi ) V(fi ) , i=1 i=t+1 which is constructible. Taking preimages gives ! t [ \ −1 −1 cD (cD (U)) = evfi (0) s \ ! ev−1 fi (0, ∞] , i=t+1 i=1 showing that the quotient topology is the constructible topology.  We use the following lemma to pass lsc functions from D(X) to X by minimizing on fibers of cD . These semicontinuity results are typically deduced for excellent schemes over Q using log resolutions (e.g. [Amb99, Theorem 2.2]); such results become special corollaries of our lemma. Lemma 5.8. Let f : Y → Z be a continuous surjective function between topological spaces. Assume that Y is compact and Z is Hausdorff. Fixing T : Y → R±∞ , define a function on Z by Tf (z) = inf T (y). f (y)=z Then Tf is lsc on Z whenever T is lsc on Y . Proof. If Tf (z) = −∞ then lower-semicontinuity is automatic at z, so we may assume Tf (z) > −∞ for all z. Fix z∗ ∈ Z; we show lower-semicontinuity of Tf in two steps, treating the case Tf (z∗ ) = +∞ first. In this case, T (y) = +∞ for all y ∈ f −1 (z∗ ). Now if zν → z∗ is a convergent net in Z, we wish to show that lim inf ν Tf (zν ) = +∞. Assume we have some subnet zµ with lim inf Tf (zµ ) = t∞ < ∞; there exists a subsequence zn with t∞ − 1/n < Tf (zn ) ≤ t∞ . We select yn ∈ f −1 (zn ) with Tf (zn ) ≤ T (yn ) < Tf (zn ) + 1, so that t∞ ≤ lim inf n T (yn ) ≤ t∞ + 1. Take a subsequence {yns } ⊆ {yn } so that lim inf n T (yn ) = lims T (yns ). Since f is continuous, f (yns ) =: zns → z∗ , so every convergent subsequence of yns must have limit y∗ ∈ f −1 (z∗ ). We know T (y) = +∞ for y ∈ f −1 (z∗ ), and T is lsc on Y , so lims T (yns ) = +∞. This contradicts t∞ ∈ R. For the final case when Tf (z∗ ) ∈ R, we follow a similar argument as before with more careful estimates. Since Tf is not lsc at z∗ , there exists a net zβ → z∗ and δ > 0 such that (lim inf Tf (zβ ) = Tf (z∗ ) − δ) < Tf (z∗ ). β For all n ≥ 1, there exists βn so that, setting zn := zβn , Tf (zn ) < (Tf (z∗ ) − δ) + δ/(2n). BERKOVICH LOG DISCREPANCIES IN POSITIVE CHARACTERISTIC 19 Since Tf (zn ) is an infemum, there must exist yn ∈ f −1 (zn ) satisfying T (yn ) < Tf (zn ) + δ/(2n). Passing to a convergent subsequence ynt → y∗ , which exists by compactness of Y , we know that f (y∗ ) = limt f (ynt ) by continuity. Since Z is Hausdorff, we conclude f (y∗ ) = limt znt = z∗ . Combining these estimates, we see Tf (z∗ ) ≤ T (y∗ ) ≤ lim inf T (ynt ) t→∞ since T is lsc on Y ≤ lim inf (Tf (znt ) + δ/(2nt )) t→∞ ≤ lim inf (Tf (z∗ ) − δ + δ/(nt )) t→∞ = Tf (z∗ ) − δ < Tf (z∗ ). This is absurd, and we conclude that Tf is lsc on Z.  Definition 5.9. The Berkovich minimal log discrepancy of Q at x ∈ X is defined to be mldB (x; Q) = min A(ζ; Q), where we minimize over ζ ∈ D(X) with cD (ζ) = x. Compactness of the fibers of cD (Lemma 2.14) proves this minimum is achieved. Note that if mldB (x; Q) < ∞ then any ζ achieving this minimum must have a Q-compatible home Z. Note also that minimizing A(−; Q) over Berk(X) instead of D(X) produces an uninteresting function: clearly A(λ ζ; Q) = λ A(ζ; Q) for all λ ∈ R>0 , so the minimum at every x ∈ X is either −∞ or 0, based on if A(−; Q) takes on negative values or not. It may be interesting to study the minimum of A(ζ; Q)/ζ(x) with ζ ∈ Berk(X), cX (ζ) = x, and ζ 6= trivx . Theorem 5.10 (cf. [Amb99]). The Berkovich minimal log discrepancy mldB (−; Q) : X → R±∞ is lsc in the constructible topology on X. Equivalently, for any x ∈ X and ε > 0, there is a constructible subset G ⊂ X containing x such that mldB (x0 ; Q) > mldB (x; Q) − ε for all x0 ∈ G. Proof. The theorem follows directly from Lemma 5.8, since cD : D(X) → X Constr satisfies the hypotheses and A(−; Q) is lsc on D(X).  Remark 5.11. It is a major open problem in the (characteristic zero) minimal model program to determine if the (usual) minimal log discrepancy is lsc in the Zariski topology on the set of closed points of a variety, as this would imply the termination of arbitrary (undirected) sequences of flips. Another natural function to consider is the appropriate version of the log canonical threshold of graded sequences of ideals with respect to strongly F -regular Cartier subalgebras. Many of the proofs found in the final sections of [JM12] can be adapted to our setting, and so we devote §7 to this function. 6. Transformation of log discrepancies under finite morphisms In this section we study how log discrepancies of valuations change under finite morphisms. We restrict ourselves to the valuation spaces in this section. The setup throughout is the following: 20 ERIC CANTON 6.1. Notation and T-transposes. Suppose L ⊆ M is a finite field extension of F -finite fields, and denote by q = pe a positive integer power of p. Fix an algebraic closure of M and denote by by L1/q ⊆ M 1/q the fields of q-th roots of L and M in this algebraic closure. As a field, M 1/q is isomorphic to M ; as an M -module, M 1/q is isomorphic to F∗e M . The following theorem of Schwede and Tucker provides maps completing certain squares set up by φ : L1/q → L and T : M → L. Theorem 6.1 (cf. [ST14]). Given nonzero L-linear maps T : M → L and φ : L1/q → L, there exists a unique M -linear map φT : M 1/q → M the diagram below commutes: M 1/q (†) T φT 1/q L1/q M T φ L Schwede and Tucker call φT the T-transpose of φ. When X and Y are normal, they describe how to assign T a divisor RT on Y , such that π ∗ ∆φ = ∆φT + RT . Our goal in this section is to show that a similar formula holds for arbitrary F -finite fields L and log discrepancies of φ and φT on valuations. We need to define a new variant of ramification adapted to our setting. 6.2. Log ramification. Definition 6.2. Let L ⊆ M be a finite extension of fields, T : M → L be nonzero and L-linear, µ ∈ Val(M ), and λ := µ|L . Define the log ramification of T along µ to be ρ(µ; T) = sup {µ(b) − λ(T(b))} = sup µ(b). b∈M × T(b)=1 2 Example 6.3 (cf. 3.4 in [ST14]). Let R = F3 [x ] ⊆ F3 [x] = S. The ramification divisor of S|R is given by div(x), which is the divisor associated to the trace TrS|R ∈ HomR (S, R) ∼ =S S. One can check that ρ(ordx ; TrS|R ) = 0 and ρ(ordf ; TrS|R ) = 1 for all irreducible f ∈ S \ {x}. Theorem 6.4. Let L ⊆ M be a finite extension of fields, T : M → L and φ : L1/q → L nonzero L-linear maps, and φT the T-transpose of φ. For µ ∈ Val(M ) with A(µ; φT ) < ∞ extending λ ∈ Val(L) we have A(λ; φ) = A(µ; φT ) + ρ(µ; T). We first prove the following lemma to lessen the notational burden in the proof of Theorem 6.4. Suppose (R, m) ⊆ (S, n) is a finite extension of local Gorenstein rings. As we saw in Lemma 3.2, there is an isomorphism of S-modules (6.4.1) HomR (S, R) = HomR (S, ωR ) ∼ =S ωS = S. This isomorphism is fundamental: [ST14] depends heavily on this isomorphism to prove existence and uniqueness of transposes, and we have already used this isomorphism in Example 3.11. BERKOVICH LOG DISCREPANCIES IN POSITIVE CHARACTERISTIC 21 Lemma 6.5. Let L ⊆ M , φ, and T be as before. For all m ∈ M × and µ ∈ Val(M ) with A(µ; φT ) < ∞ and ρ(µ; T) < ∞ we have: A(µ; φT·m ) = A(µ; φT ) + µ(m) and ρ(µ; T) = ρ(µ, T · m) + µ(m). In particular, the expression     A(µ; φT ) + ρ(µ, T) = A(µ; φT·m ) − µ(m) + ρ(µ; T · m) + µ(m) is invariant under scaling T by m ∈ M × . Proof. Both statements equations follow directly from the definitions, though before we see the log discrepancy equation we need to know how to compare φT and φT·m . Applying (6.4.1) to M ⊆ M 1/q and L ⊆ M 1/q , we see that both HomM (M 1/q , M ) and HomL (M 1/q , L) are one-dimensional M 1/q vector spaces. Composition with T now gives a nonzero M 1/q -linear isomorphism ) : HomM (M 1/q , M ) → HomL (M 1/q , L). T◦( Now recalling (†) we see (T ◦ φT ) · m1/q = (φ ◦ T1/q ) · m1/q = φ ◦ (T · m)1/q = (T · m) ◦ φT·m . Using M -linearity of φT·m we get T ◦ φT · m1/q = T ◦ (φT·m · m). Composition with T being an isomorphism tells us that φT = φT·m · m(q−1)/q = e  φT·m F∗e m(p −1) . Applying Lemma 3.14 now gives the result. Proof of Theorem 6.4. First we prove that A(λ; φ) ≤ A(µ; φT ) + ρ(µ; T). Fix ε > 0 and choose ` ∈ L such that φ(`1/q ) = 1 and 1 λ(`) > A(λ; φ) − ε/2. q−1 (6.5.1) Since T 6= 0, it is surjective, and so there exists m ∈ M such that T(m) = `. Let n  0 such that ρ(µ; T) − µ(m/`) < (q n − 1)ε/2. (6.5.2) n n Replacing ` by `(q −1)/(q−1) , m by (`(q −1)/(q−1) m/`), and q by q n leaves the quantities µ(m/`) and λ(`)/(q − 1) unchanged. This replacement also preserves the properties T(m) = ` and φ(`1/q ) = 1. Note that T(φT (m1/q )) = φ(T(m)1/q ) = 1, allowing us to conclude that   (6.5.3) − µ φT (m1/q ) ≥ −ρ(µ; T). 22 ERIC CANTON Using this, we deduce  1  µ(m) − qµ(φT (m1/q )) A(µ; φT ) ≥ q−1  1  µ(m) − λ(`) + λ(`) − qµ(φT (m1/q )) = q−1  1  = λ(`) + µ(m/`) − qµ(φT (m1/q )) q−1 1 ≥ (λ(`) + µ(m/`) − qρ(µ; T)) by (6.5.3) q−1 1 (λ(`) + ρ(µ; T) − (q − 1)ε/2 − qρ(µ; T)) by (6.5.2) > q−1 > A(λ; φ) − ε/2 − ρ(µ; T) − ε/2 by (6.5.1). This establishes the claimed inequality. We proceed to prove the reverse inequality. Towards this end, note first that, using Lemma 6.5, we may assume ρ(µ; T) = 0. The situation is then the following: ◦ µ(b) ≤ λ(T(b)) for all b ∈ M , and ◦ for all δ > 0 there exists mδ such that T(mδ ) = 1 and −δ < µ(mδ ) ≤ 0. Fix ε > 0 and choose x ∈ M such that φT (x1/q ) = 1 and 1 A(µ; φT ) − ε/2 < µ(x). q−1 Set δ = (q − 1)ε/(2q) and select mδ as mentioned. Note that φT (mδ x1/q ) = mδ so that φ(T(mqδ x)1/q ) = T(φT (mδ x1/q )) = 1. Therefore, 1 µ(b) − ε/2 A(µ; φT ) − ε < q−1 1 = (µ(mqδ b) − qµ(mδ )) − ε/2 q−1 1 < µ(mqδ b) q−1 1 ≤ λ(T(mqδ b)) q−1 ≤ A(λ; φ). Thus we have A(λ; φ) = A(µ; φT ) + ρ(µ; T).  0 Example 6.6. We can apply the previous theorem to the case T = ψ : L1/q → L. 0 0 Every λ ∈ Val(L) has a unique extension λ0 to L1/q given by λ0 (b1/q ) = λ(b)/q 0 , so we will not distinguish between λ and its extensions. By definition, we see that ρ(λ; ψ n ) ≤ A(λ; ψ)(q n − 1)/q n for all λ ∈ Val(L) with equality in the case λ corresponds to an F -finite DVR. Moreover, ρ(λ; ψ n ) ↑n A(λ; ψ). From this it follows that A(λ; φψn ) ↓n A(λ; φ) − A(λ; ψ). 7. Log canonical thresholds of graded sequences of ideals In this section, we study log canonical thresholds of graded sequences of ideals in positive characteristics, re-proving several theorems of Jonsson and Mustaţă along the way. The proofs found in [JM12] generally go through with only mild modifications, replacing characteristic zero techniques with those F -singularity techniques BERKOVICH LOG DISCREPANCIES IN POSITIVE CHARACTERISTIC 23 we have already utilized. To avoid constantly passing between points and the associated sheaf of ideals, we will generally make statements like “Let m ∈ X be a point. . . ” understanding schemes to have underlying topological spaces consisting of the set of prime ideals of OX (that is, X ∼ = Spec(OX )). Unless explicitly stated otherwise, all schemes in this section are understood to have characteristic p > 0. 7.1. Notation and LCT of graded sequences. Recall from §3.1 that we notate a? for sequences of ideals that are (multiplicatively) graded, and write b• for an F -graded sequence. Let us fix a connected F -finite regular scheme X of dimension d ≥ 1 and characteristic p > 0, and denote by L the fraction field of X. We also fix a strongly F -regular Cartier subalgebra D and a nonzero ideal q on X. Denote by trivX the trivial valuation L× → {0} and by Val(X)∗ := Val(X) \ {trivX }. Any v ∈ Val(X)∗ defines a graded sequence of nonzero ideals, denoted here by a? (v), by setting as (v) = {f ∈ R : v(f ) ≥ s}; s ∈ N0 . Jonsson and Mustaţă prove the following statement showing that w(a? (v)) compares the values of w and v, asymptotically. Lemma 7.1 (cf. Lemma 2.4 [JM12]). Let v ∈ Val(X)∗ be nontrivial and define a? (v) as above. Then w(b) w(a? (v)) = inf v(b) for every w ∈ Val(X), where b ranges over ideals on X such that v(b) > 0. Recall from §3 we define, for any graded sequence a? on X, X D · at? = D · at/m and A(ζ; D · at? ) = sup A(ζ; D · at/m m m ). m m≥1 Definition 7.2 (Log canonical threshold of graded sequence). The log canonical threshold of a? with respect to q, D, and ζ ∈ Berk(X) is lctqB (ζ; D, a? ) = sup{t ≥ 0 : ζ(q) + A(ζ; D · at? ) > 0}. Here we consider (+∞) + (−∞) ≤ 0, a situation that only arises when ζ(q) = +∞. This definition is equivalent to lctqB (ζ; D, a? ) = sup{t ≥ 0 : ζ(q) + A(ζ; D · at/m m ) > 0 for some m}. The log canonical threshold of a? with respect to q and D is lctqB (D, a? ) = inf v∈Val(X)∗ lctqB (v; D, a? ). We will show, as do Jonsson and Mustaţă, that this infemum is in fact achieved. Lower-semicontinuity of lctqB (−; D, a? ) is automatic from the second description t/m above, given that we know (q 7→ ζ(q)) is continuous and that A(−; D · am ) is lsc on Berk(X). Example 7.3. If v ∈ Val(X)∗ has A(v; D) < ∞ and v(a? ) > 0, then conservation of log discrepancy (Corollary 3.21(b)) implies A(v; D) + v(q) , v(a? ) an expression familiar from the literature regarding log discrepancies on valuation spaces (e.g. [JM12; Bou+15]). lctB (v; D, a? ) = 24 ERIC CANTON Lemma 7.4. Let v ∈ Val(X)∗ with A(v; D) < ∞ and consider graded sequences a? and b? on X. Suppose lctqB (v; D, a? ) < ∞. Then lctqB (v; D, b? ) > lctqB (v; D, a? ) Consequently, lctqB (v; D, b? ) ⇔ v(a? ) > v(b? ). = +∞ if and only if v(b? ) = 0. Proof. Write λ = lctqB (v; D, a? ). We know that A(v; D · at? ) = A(v; D) − t v(a? ) for any t ≥ 0, so finiteness of λ implies v(a? ) > 0, hence v(q) + A(v; D · aλ? ) = 0. Using the corresponding expression for A(v; D · bt? ), we see that  v(q) + A(v; D · bλ? ) = v(q) + A(v; D · aλ? ) + λ(v(a? ) − v(b? )) = λ(v(a? ) − v(b? )). Since λ ∈ (0, ∞), v(q) + A(v; D · bλ? ) > 0 if and only if v(a? ) > v(b? ), and the desired comparison between log canonical thresholds follows. Now we prove that lctqB (v; D, b? ) = +∞ if and only if v(b? ) = 0. If v(b? ) = 0, then clearly lctqB (v; D, b? ) = +∞. For the reverse direction, it suffices to prove (ε) (ε) that for any ε > 0 there exists a sequence of ideals a? such that v(a? ) = ε and (ε) q lctB (v; D, a? ) < ∞. Using Lemma 7.1, we see that this is achieved by taking (ε) w = (1/ε)v and a? = a? (w).  Example 7.5. If trivX is the trivial valuation on X, then ζ(q) = 0 = A(ζ; D) and lctqB (D, a? ) = −∞. For ζ 6= trivX , if ζ(as ) = 0 for some s ≥ 1, then (D · at? )c(ζ) = Dc(ζ) is strongly F -regular, so lctqB (ζ; D · a? ) = +∞. Alternatively, lctqB (ζ; D · a? ) = +∞ if A(ζ; D · at? ) > −∞ for all t and ζ(q) = +∞, a condition satisfied whenever ζ 6= trivX and (D · at? )h(ζ) is F -pure for all t > 0 (e.g. non-trivial valuations). On the other hand, A(ζ; D ·at? ) = −∞ for t > fpt(hX (ζ); D, a? ), the F -pure threshold of (D·at? ) at hX (ζ) (see [Sch10; Dat17]). We see that lctqB (ζ; D, a? ) = fpt(hX (ζ); D, a? ) for every q when fpt(hX (ζ); D, a? ) < ∞. 7.2. Asymptotic multiplier ideals of Cartier subalgebras. We define ideals JB (D · at? ) containing information about values, and in particular minima, of A(−; D · at? ). We model our definition on the valuation-theoretic description of asymptotic multiplier ideals, see e.g. [Laz04; JM12; Bou+15]. Definition 7.6 (Asymptotic multiplier ideal of (D · at? )). Let t ∈ R≥0 . The asymptotic multiplier ideal of (D · at? ) is JB (D · at? ) = {f ∈ OX : ∀ v ∈ Val(X)∗ = {f ∈ OX : ∀ v ∈ Val(X)∗ v(f ) + A(v; D · at? ) > 0} ∃ m s.t. v(f ) + A(v; D · at/m m ) > 0}. Remark 7.7. It follows directly from the definition that λ = lctqB (D, a? ) is also the supremum over all t ≥ 0 such that q ⊆ JB (D · at? ). We will see soon that the subscheme V(JB (D ·aλ? ) : q) defines the locus where minimum-achieving valuations can be centered. The following proposition should seem familiar from standard treatments of asymptotic multiplier ideals such as [Laz04]. We do not need this statement in the sequel, but include it for interest. Proposition 7.8. For all m, n ≥ 1 and v ∈ Val(X)∗ t/(mn) A(v; D · at/m ). m ) ≤ A(v; D · amn BERKOVICH LOG DISCREPANCIES IN POSITIVE CHARACTERISTIC 25 Consequently, there is an inclusion of multiplier ideals t/(mn) JB (D · at/m ). m ) ⊆ JB (D · amn t/m From this we deduce that the collection {JB (D · am )}m≥1 has a unique maximal element, and this element is JB (D · at? ). Proof. Note that if a ∈ N1 and b ∈ R≥0 , then dabe ≤ adbe, so E := D · {and(p m e −1)t/(mn)e }e≥1 ⊆ D · {ad(p m e −1)t/me }e≥1 = D · at/m m . nd(pe −1)t/(mn)e d(pe −1)t/(mn)e Since a? is multiplicatively graded, we know am ⊆ amn and t/(mn) so monotonicity gives A(v; E ) ≤ A(v; D · amn ). Therefore, it suffices to check t/m that A(v; D · am ) = A(v; E ). The inequalities d(pe − 1)t/me ≤ nd(pe − 1)t/(mn)e ≤ d(pe − 1)t/me + n n+d(pe −1)t/me ), and a direct computation shows imply that E ⊇ F = ⊕(De · F∗e am t/m A(v; F ) = A(v; D · am ). The inequality between log discrepancies directly implies the containment of multiplier ideals. The statement regarding the collection of multiplier ideals is standard and only relies on the Noetherian property; see [Laz04].  7.3. The Conjectures of Jonsson and Mustaţă. In [JM12], Jonsson and Mustaţă conjecture statements, here numbered 7.19 and 7.20, regarding valuations computing the log canonical threshold of a? . We say that v computes this lct when lctqB (D, a? ) = lctqB (v; D, a? ). They prove that 7.20 implies 7.19, and establish 7.20 when dim(X) ≤ 2 or each am is monomial. In positive characteristics, 7.20 follows from [DS16] in dimension two; see Example 3.13 and compare with [JM12, §9]. Continuing with our setup of D and q 6= 0 on a connected, regular, F -finite scheme X, fix a nonzero graded sequence a? . We simplify notation by writing jt for JB (D · at? ). If v ∈ Val(X)∗ computes lctqB (D, a? ) =: λ < ∞, then I claim cX (v) ∈ V(jλ : q) [JM12, §7]. Indeed, if v computes lctqB (D, a? ), then v(q) + A(v; D · aλ? ) = 0. Now consider f ∈ (jλ : q). Since f q ⊆ jλ , the definition of jλ gives the estimate v(f ) = v(f ) + v(q) + A(v; D · aλ? ) > 0. Therefore, v(f ) > 0 and cX (v) ∈ V(jλ : q). Lemma 7.9. Let Y be an integral scheme, m ⊂ OY a nonzero proper ideal, and let G be a strongly F -regular Cartier subalgebra on Y . For all N ∈ R≥0 , the subspace VN := {ζ ∈ Berk(Y ) : ζ(m) = 1 and A(ζ; G ) ≤ N } is a compact subset of Val(Y )∗ ( Berk(Y ). Proof. Since (ζ 7→ ζ(m)) is continuous and (ζ 7→ A(ζ; G )) is lsc on Berk(Y ), it is automatic that VN is closed, hence compact. Moreover, strong F -regularity implies that no non-zero primes are compatible with G . Thus, if ζ 6∈ Val(Y ) then A(ζ; G ) = +∞, and if ζ = trivX then ζ(m) = 0. Thus, VN ⊆ Val(Y )∗ .  7.4. Locally quasi-monomial valuations. Let v ∈ Val(X). The value group of v is Γv = v(L× ) ⊆ R. The rational rank of v is ratrk(v) = dimQ (Γv ⊗ Q). If (B, m) is a local subring of L dominated by the valuation ring (Av , mv ), then (B/m) = ` ⊆ κ(v) = Av /mv and we set the transcendence degree of v over B to be 26 ERIC CANTON tr. degB (v) = tr. deg(κ(v)|`). When v ∈ Val(X) with center x we set tr. degX (v) = tr. degOX,x (v). A fundamental estimate is Abhyankar’s inequality: ratrk(v) + tr. degX (v) ≤ dim(OX,x ). Valuations achieving equality are called Abhyankar valuations, and are the most geometric and well-behaved of valuations. One easy way to obtain an Abhyankar valuation is via the following construction, outlined more carefully in §3.1 of [JM12]. Let (R, m, κ) be a regular local ring. For any regular system of parameters (rsop) r1 , . . . , rd for R, there is an isomorphism R̂ ∼ , . . . , rd ]], and so we may view = κ[[r1P f ∈ R ⊆ R̂ as having an expansion of the form f = u∈Nd cu ru , where cu is either 0 zero or a unit in R̂, and r(u1 ,...,ud ) = r1u1 · · · rdud . Jonsson and Mustaţă prove in Proposition 3.1 of [JM12] that for any α = (α1 , . . . , αd ) ∈ Rd≥0 , there is a unique Pd valuation v = valα on R̂ such that v(f ) = min{ j=1 αj uj : cu 6= 0}. Restricting v to R now gives an Abhyankar valuation; see [JM12], Proposition 3.6(ii), which (as they mention in the proof) works over any ground field. In the same proposition, they show we may in fact assume that the αi are rationally independent by blowingup appropriately. Thus, there exists a regular local ring (R0 , m0 ) of dimension ratrk(v), and so that the residue field of valα is algebraic over R0 /m0 . Now let Y be a regular F -finite scheme and v ∈ Val(Y ). We say that a divisor H on Y has simple normal crossings (and that H is an SNC divisor) if for all y ∈ Y there exist r1 , . . . , rn ∈ OY,y forming part of a rsop and satisfying H ∩ Spec(OY,y ) = div(r1 · · · rn ). Fixing H with simple normal crossings, for any v ∈ Val(Y ) centered at y ∈ Y we define r(Y,H) (v) ∈ Val(Y ) by taking α = (v(r1 ), . . . , v(rd )) in the previous construction. From the definition of r(Y,H) (v) and the axioms for a valuation, we see that r(Y,H) (v)(f ) ≤ v(f ) for every f ∈ OY , hence cY (r(Y,H) (v)) ⊆ cY (v), viewing centers as identical to the associated prime ideal of OY . We call r(Y,H) the monomialization retraction associated to (Y, H). In characteristic zero, every Abhyankar valuation is obtained as the result of some monomialization retraction, induced from a proper birational Y → X and some SNC divisor H on Y (see [ELS01] and Proposition 3.7 in [JM12]). For fraction fields of finite transcendence degree over a field k ⊇ Fp , Knaf and Kuhlmann show in [KK05] that an Abhyankar valuation whose residue field is separable over k admits a local monomialization over X, essentially removing the properness assumption on Y → X. Since valuations arising from monomialization seem to work best when passing to completions, and we make essential use of this soon, we introduce the following definition. Definition 7.10. Let v ∈ Val(X) with center x ∈ X. We say that v is locally quasimonomial if there exists a regular local ring (R, m) dominating and birational to OX,x , and a rsop for R giving the SNC divisor H on Y = Spec(R) such that v = r(Y,H) (v). The following lemmas allow us to pass locally quasi-monomial valuations on a regular F -finite scheme to an appropriate affine space via completion. The proofs for these lemmas given in [JM12] are independent of characteristic. Lemma 7.11 (cf. [JM12, Lemma 3.10]). Let x ∈ X and consider the completion 0 0 [ morphism φ : X 0 = Spec(R0 ) → X, where R0 = O X,x . If v ∈ Val(X ) has center 0 0 the closed point and v = v |X , then κ(v) = κ(v ) and the value groups of v and v 0 are equal. In particular, tr. degX 0 (v 0 ) = tr. degX (v) and ratrk(v 0 ) = ratrk(v). BERKOVICH LOG DISCREPANCIES IN POSITIVE CHARACTERISTIC 27 Lemma 7.12 (cf. [JM12, Lemma 3.11]). Let k ⊆ K be an algebraic field extension and φ : AnK → Ank the corresponding morphism of affine spaces. Suppose that v 0 is a valuation on K(x1 , . . . , xn ) with center 0 ∈ AnK , and let v be its restriction to k(x1 , . . . , xn ). Then v is centered at 0 ∈ Ank , tr. degAnK (v 0 ) = tr. degAnk (v), and ratrk(v 0 ) = ratrk(v). Jonsson and Mustaţă prove the next lemma for the more general setting of a regular morphism, but the only case we ever apply it to here is that of completion of F -finite (hence excellent) regular local rings, and so content ourselves to prove it in this case. Lemma 7.13. Let x ∈ X and let φ : X 0 = Spec(R0 ) → X be the completion morphism at x. Set q0 = qR0 , a0? = a? R0 , and extend D = CX · b• to D 0 = CX 0 · b0• on X 0 , where b0• = b• R0 . Suppose λ = lctqB (D, a? ) < ∞. (a) For any v 0 ∈ Val(X 0 ) and t ≥ 0, we have A(v 0 |R ; D · at? ) = A(v 0 ; D 0 · a0t ? ). q0 q 0 0 (b) lctB (D , a? ) ≥ lctB (D, a? ) withpequality in the case m ∈ V(jλ : q). √ (c) If m ∈ V(jλ : q) then jλ R0 = JB (X 0 ; D 0 · a0λ ? ). Proof. Let v = v 0 |R . By definition, vF (b• ) = vF (b0• ) and v(a? ) = v 0 (a0? ). Moreover, F -finiteness and flatness prove that HomR0 (F∗e R0 , R0 ) ∼ = HomR (F∗e R, R) ⊗R R0 . A t direct computation then shows that A(v; D · a? ) = A(v 0 ; D 0 · a0t ? ). Moving on to (b), the inequality is clear from (a). We wish to show equality under the assumption m ∈ V(jλ : q). We can identify lctqB (D, a? ) as the supremum 0 over t such that 1 ∈ (jt : q), and likewise check 1 ∈ (j0t : q0 ) for lctqB (D 0 , a0? ). Moreover, we can check this condition locally by checking at primes containing 0 (jλ : q). Of course, 1 ∈ (j0t : q0 ) is equivalent to v 0 (q0 ) + A(v 0 ; D 0 · a0t ? ) > 0 for all v , t and we have already shown that the expression on the left is v(q) + A(v; D · a? ). Building on ideas from the previous paragraph, suppose m ∈ V(jλ : q). Equality of radicals follows from the statement that v 0 (j0λ ) > 0 if and only if v(jλ ) = λ  v 0 (jλ R0 ) > 0. These are both equivalent to A(v 0 ; D 0 · a0λ ? ) = A(v; D · a? ) < 0. Remark 7.14. Jonsson and Mustaţă show that in fact j0t = jt R0 for all t ≥ 0, but their proof uses that one can base change log resolutions (used to compute jt ) along regular morphisms. Lacking this technique for computing jt , we do not know if this holds in our setting. Lemma 7.15 (cf. [JM12], Lemma 5.3). Let H be an SNC divisor on a regular F finite scheme X and let v ∈ Val(X) with retraction v = r(X,H) (v). Then A(v; CX ) ≤ A(v; CX ) with equality if and only if v = v. Proof. Denoting p = cX (v) ⊆ cX (v) = m and localizing, we may assume X = Spec(R, m), and set d = dim(X). Let r1 , . . . , rn ∈ p give a rsop for Rp and extend this to a full rsop r1 , . . . , rd for R. A by-now-familiar computation gives A(v; CX ) = v(r1 · · · rd ) = n X j=1 v(rj ) ≤ d X v(rj ) ≤ A(v; CX ). j=1 Strict inequality is achieved as follows. If p ( m then rn+1 6∈ p and v(rn+1 ) > 0, hence the first inequality above is strict. Suppose then that p = m and let π : Y → X be the blow-up of m with exceptional divisor E. We know cY (v) ∈ E and that π ∗ H = π∗−1 (H) + dE is supported on an SNC divisor H 0 . Setting v 0 = r(Y,H 0 ) (v) 28 ERIC CANTON gives a quasi-monomial v 0 with r(X,H) (v 0 ) = r(X,H) (v) = v, v 0 (KY /X ) = v(KY /X ), and cY (v 0 ) 6= cY (v). Applying Proposition 3.15, we may assume X = Y , and now we are back in the previous case.  Theorem 7.16 (cf. [JM12, Theorem 7.8]). Let v ∈ Val(X)∗ with A(v; D) < ∞. The following assertions are equivalent: (a) There exists a? on X such that v computes lctqB (D, a? ) < ∞. (b) For every w ∈ Val(X)∗ such that w(a) ≥ v(a) for all ideals a on X, we have A(w; D) + w(q) ≥ A(v; D) + v(q). (c) The valuation v computes lctqB (D, a? (v)) < ∞. Proof. Our proof is very similar to the one found in [JM12]. Notice, however, that we do not have part (ii) of their theorem, since the multiplier ideals jt are not known to be subadditive. Certainly (c) implies (a). We prove (a) ⇒ (b) ⇒ (c). For the first implication, suppose v computes lctqB (D, a? ) < ∞, implying v(a? ) > 0. If w(a) ≥ v(a) for all ideals a on X, then Lemma 7.1 shows w(a? ) ≥ v(a? ). Since v minimizes lctqB (−; D, a? ), we know A(v; D) + v(q) A(w; D) + w(q) ≥ w(a? ) v(a? ) implying that A(w; D) + w(q) w(a? ) ≥ ≥1 A(v; D) + v(q) v(a? ) proving (b). Supposing (b) holds, we prove (c). We see from the definition that v(a? (v)) = 1, and so assertion (c) is equivalent to proving lctqB (w; D, a? (v)) ≥ A(v; D) + v(q). If w(a? (v)) = 0 then lctqB (w; D, a? (v)) = +∞ and this is trivial. We therefore assume w(a? (v)) > 0, in which case the desired inequality is A(w; D) + w(q) ≥ A(v; D) + v(q). w(a? (v)) (∗) The left hand side is 0-homogeneous in w, and so we may assume w(a? (v)) = 1. Since a? (v) is the sequence of valuation ideals for v, if w(a? (v)) = 1 then w(a) ≥ v(a) for all ideals a. But then (∗) holds by assumption (b).  Still following the approach of Jonsson and Mustaţă, we now prove that we may modify a1 and q so that they are both locally primary to a chosen minimal prime of (jλ : q). For s ∈ N1 and an ideal m on X, we define cj = (7.16.1) j X ai ms(i−j) . i=0 The graded structure of a? implies that c? is graded. We see also that aj + msj ⊆ cj for all j ≥ 1, implying that v(c? ) ≤ min{v(a? ), sv(m)} for all s and v ∈ Val(X). In fact, this is an equality: if sv(m) ≤ v(a? ) then −v(ai ) ≤ −si v(m) for all i ≥ 1. Therefore, s v(m) = s(j − i) v(m) + v(ai ) sj v(m) − v(ai ) + v(ai ) ≤ . j j BERKOVICH LOG DISCREPANCIES IN POSITIVE CHARACTERISTIC 29 We then see that v(cj ) = min 0≤i≤j j  v(ai ) + s(j − i)v(m) j  = sv(m) giving v(c? ) = sv(m). Otherwise, s v(m) > v(a? ), so there exists j0 such that sj v(m) > v(aj ) for all j ≥ j0 . This implies that for j ≥ j0 and n ≥ j v(an ) v(aj ) + v(an−j ) v(aj ) + s(n − j)v(m) ≤ < < s v(m). n n n For any j < j0 we have (v(aj ) + s(n − j)v(m))/n → s v(m) as n → ∞. Therefore, v(c? ) = v(a? ) when v(a? ) < sv(m). Lemma 7.17 (cf. [JM12]). Assume lctqB (D, a? ) = λ < ∞ and let m be the generic point of an irreducible component of V(jλ : q). Defining c? as in (7.16.1) with s  0 gives lctqB (D, a? ) = lctqB (D, c? ). If v ∈ Val(X)∗ computes lctqB (D, c? ), then v computes lctqB (D, a? ). p p Proof. Note that (jλ : q) ⊆ m. First consider the special case m = (jλ : q) and n q let n ∈ N1 such that mn q ⊆ jλ . Define λ0 = lctm B (D, a? ) > λ and let s  0 so that n/s < (λ0 − λ). For 0 < ε  1 we still have n/s < (λ0 (1 − ε) − λ). We denote by W the set of v ∈ Val(X)∗ with lctqB (v; D, a? ) < ∞. Since mn ⊆ (jλ : q) and v(jλ : q) > 0, v(m) > 0. We also know that v(a? ) > 0 by (7.4). Therefore, A(v; D) + v(q) v∈W min{v(a? ), sv(m)} A(v; D) + v(q) ≤ inf , v∈Wε min{v(a? ), sv(m)} n o λ where Wε = v ∈ W : lctqB (v; D, a? ) ≤ 1−ε = Vλ/(1−ε) . Note that when v ∈ Wε we have A(v; D) + v(q) λ0 − lctqB (v; D, a? ) = λ0 − v(a? ) (1 − ε)λ0 − λ ≥ 1−ε > (1 − ε)λ0 − λ > n/s. lctqB (D, c? ) = inf Additionally, the definitions imply that λ0 − A(v; D) + v(q) sv(m) ≤ v(a? ) v(a? ) for all v ∈ Wε ⊆ W . We can thus estimate lctqB (D, c? )   A(v; D) + v(q) v(a? ) ≤ inf max 1, v∈Wε v(a? ) sv(m) (  −1 ) A(v; D) + v(q) n A(v; D) + v(q) 0 ≤ inf max 1, λ − v∈Wε v(a? ) s v(a? ) = inf v∈Wε Thus, lctqB (D, c? ) A(v; D) + v(q) = lctqB (D, a? ). v(a? ) ≤ lctqB (D, a? ). The other inequality follows from monotonicity. 30 ERIC CANTON Now treating the general case of m a minimal prime of (jλ : q), we may complete the log canonical thresholds. By Theorem 7.16(c), p 0 X at mpwithout changing (jλ : q) = (jλ : q)R0 , so we reduce to the previous case. The proof also demonstrates that if v computes lctqB (D, c? ) then lctqB (D, a? ) = lctqB (D, c? ) A(v; D) + v(q) v(c? ) A(v; D) + v(q) ≥ v(a? ) ≥ lctqB (D, a? ) = so the inequalities are equalities, proving that v also computes lctqB (D, a? ).  We are ready to prove the following existence result using essentially the same method as Jonsson and Mustaţă. Theorem 7.18 (cf. [JM12, Theorem 7.3]). Let λ = lctqB (D, a? ) < ∞. For any generic point m of an irreducible component of V(jλ : q) there exists a valuation with center m computing lctqB (D, a? ). p Proof. Applying Lemma 7.13, we may assume (R, m) is local and m = (jλ : q). Enlarging a? using the previous proposition, we also assume that ms ⊆ a1 for some s  0. Since λ < ∞, we can fix M ∈ R with λ < M < ∞, and lctqB (D, a? ) is unchanged by considering only those v ∈ Val(X)∗ such that v(a? ) > 0 and lctqB (v; D, a? ) = A(v; D) + v(q) ≤ M. v(a? ) Note that here we are using that finiteness of lctqB (v; D, a? ) implies cX (v) = m and v(a? ) > 0, so 0 < v(a? ) ≤ sv(m). Then A(v; D) ≤ A(v; D) + v(q) ≤ M v(a? ) ≤ M sv(m). Re-scaling v if necessary, we may assume v(m) = 1, which now gives A(v; D) ≤ N := M s. Thus, v ∈ VN as defined in (7.9). We see that lctqB (D, a? ) = inf lctqB (w; D, a? ), w∈VN and compactness yields v ∈ VN achieving this minimum.  We do not get very much information about the valuation computing lctqB (D, a? ) above. In analogy with the discrete valuation case (where lctqB (v; D, a? ) = +∞ for non-divisorial discrete valuations), one might expect these valuations to be locally quasi-monomial. Jonsson and Mustaţă conjecture exactly this, albeit with quasimonomial valuations, since their schemes are excellent over Q. Conjecture 7.19 (cf. [JM12, Conjecture 7.4]). Suppose lctqB (D, a? ) = λ < ∞. ◦ Weak version: for any generic point m of an irreducible component of V(jλ : q) there exists a locally quasi-monomial valuation v ∈ Val(X)∗ computing lctqB (D, a? ) with cX (v) = m. ◦ Strong version: any non-trivial valuation computing lctqB (D, a? ) must be locally quasi-monomial. Jonsson and Mustaţă reduce this conjecture to the (potentially) simpler case of affine space. BERKOVICH LOG DISCREPANCIES IN POSITIVE CHARACTERISTIC 31 Conjecture 7.20 (cf. Conjecture 7.5 in [JM12]). Suppose X = Ank with n ≥ 1 and k algebraically closed of characteristic p > 0. Consider a graded sequence of ideals a? on X vanishing only at a closed point x ∈ X and lctqB (D, a? ) < ∞. Then: ◦ Weak version: there is a locally quasi-monomial valuation v computing lctqB (D, a? ) with cX (v) = x. ◦ Strong version: any valuation with transcendence degree 0 over k computing lctqB (D, a? ) must be locally quasi-monomial. As expected from [JM12], Conjecture 7.20 may be reduced to Conjecture 7.19. To make reductions as they do, we need their second “enlarging lemma.” Lemma 7.21 (cf. [JM12]). Suppose that λ = lctqB (D, a? ) < ∞ and let m ∈ X with ms ⊆ a1 . If N > λs and r = q + mN then lctrB (D, a? ) = λ. Furthermore, v ∈ Val(X)∗ computes lctqB (D, a? ) if and only if v computes lctrB (D, a? ). Proof. As noted previously, q 6⊆ jλ but q ⊆ jt for all t < λ. To prove lctrB (D, a? ) = λ, it therefore suffices to show that mN ⊆ jλ . This, of course, follows from our choice of N > λs: we want to check that (∗) N v(m) + A(v; D, aλ? ) > 0 for every valuation v ∈ Val(X)∗ . If v(m) = 0, then 0 ≤ v(a? ) ≤ s v(m) = 0 and A(v; D · aλ? ) = A(v; D) > 0 by strong F -regularity. We therefore assume v(m) > 0. Rescaling v does not change the truth of (∗), and so we assume v(m) = 1. Our assumed inclusion ms ⊆ a1 gives λ v(a? ) ≤ sλ < N . We know A(v; D, aλ? ) = A(v; D) − λ v(a? ) ≥ 0, and we conclude that (∗) holds. We now prove that v computes lctqB (D, a? ) if and only if it computes lctrB (D, a? ). The inclusion q ⊆ r implies that v(r) ≤ v(q), so if v ∈ Val(X)∗ computes λ = lctqB (D, a? ) = lctrB (D, a? ) then λ ≤ lctrB (v; D, a? ) = A(v; D) + v(r) A(v; D) + v(q) ≤ =λ v(a? ) v(a? ) and v also computes lctrB (D, a? ). To finish the proof, it suffices to prove that v(q) = v(r) whenever lctrB (v; D, a? ) = λ. Recalling that v(a? ) ≤ s v(m), we have v(m) ≥ v(a? ) A(v; D) + v(r) v(r) = > . s λs N This implies that N v(m) > v(r) = min{v(q), v(mN )} and completes the proof.  Lemma 7.22. Let κ ⊆ K be an algebraic extension of F -finite fields and let AnK → Anκ be the associated morphism. Extend D, a? , and q on Anκ to D 0 , a0? , q0 on AnK as before. For every valuation v 0 ∈ Val(AnK ) centered at 0 with restriction v to Anκ , 0 lctqB (v; D, a? ) = lctqB (v 0 ; D 0 , a0? ). Proof. The proof is very similar to 7.13. Specifically, we know A(v; D) = A(v 0 ; D) and v(a? ) = v 0 (a0? ), so A(v; D · at? ) = A(v 0 , D 0 · a0t ? ) for all t ≥ 0. As before, v(q) = v 0 (q0 ), so the log canonical thresholds are equal.  Theorem 7.23 (cf. Theorem 7.5 in [JM12]). If the weak (resp. strong) version of Conjecture 7.20 holds for every n ≤ N then the weak (resp. strong) version of Conjecture 7.19 holds for all X with dim(X) ≤ N . 32 ERIC CANTON Proof. We begin with the weak versions. Suppose λ = lctqB (D, a? ) < ∞ and let m be a minimal prime of (jλ : q). If v ∈ Val(X)∗ computes lctqB (D, a? ) and is centered at m, the continuous extension to the m-adic completion R0 of OX,x = R has the same rational rank and transcendence degree by Lemma 7.11, and so v is locally quasi-monomial if and only if this extension is, too. Applying Lemmas 7.17, 7.21, and 7.13, we may assume R = κ[[x1 , . . . , xn ]], m = rad(R), and that ms ⊂ a1 ∩ q. We now wish to apply Lemma 7.13 “in reverse” to reduce to the case of An . Write S = κ[y1 , . . . , yn ] and identify the n = (y1 , . . . , yn )-adic completion of S with R. Fixing a generating set for q, we approximate each generator g of q by g̃ ∈ S with g − g̃ ∈ mN , where N  0 so that v(g) = v(g̃) for every valuation v centered at m. Performing similar approximations for every a ∈ a? , we obtain new ideals q̃0 = q̃R and ã0? extended from S and with v(q̃) = v(q), v(ã? ) = v(a? ), and nN ⊆ ã1 ∩ q̃. We have an isomorphism HomS (F∗e S, S) ⊗S R ∼ = HomR (F∗e R, R) for all e ≥ 0 thanks to F -finiteness and flatness of completion. Thus, in every degree De ⊆ HomR (F∗e R, R) may be identified as Ee ⊗S R for some Ee ⊆ HomS (F∗e S, S). Now we apply Lemma 7.13 to ⊕e Ee = E , q̃, and ã? on S and conclude that lctqB (D, a? ) = lctq̃B (E , ã? ) and that every valuation computing lctqB (D, a? ) is the continuous extension of one on S centered at the closed point 0 ∈ Anκ . We are assuming that Conjecture 7.20 holds on Anκ , thus have a locally quasi-monomial valuation centered at 0 computing lctq̃B (E , ã? ), yielding such a valuation on Spec(R). Let us now proceed to the implication between strong versions. Our strategy will be similar, the crux being twice applying Lemma 7.13 to reduce to the case of affine space. Suppose v ∈ Val(X)∗ computes lctqB (D, a? ) = λ < ∞. As we have seen, m = cX (v) ∈ V(jλ : q). We wish to show that v is quasi-monomial. The dimension formula (Theorem 15.6 in [Mat89]) implies that tr. degX (v) is the maximum of dim(OX,cX (v) ) − dim(OY,cY (v) ) over all proper birational Y → X with Y regular. Thus, by passing to some Y → X (and using Proposition 3.15), we may assume tr. degX (v) = 0. We apply Lemma 7.13 with m = cX (v) and reduce to the case assume X = Spec(κ[[x1 , . . . , xd ]]) with κ an F -finite field, v is a valuation centered at the closed point of X, computing lctqB (D, a? ), and such that κ(v) is algebraic over κ. Applying Theorem 7.16, we assume that a? = a? (v), implying ms ⊆ a1 for some s  0. Now applying Lemma 7.21 we assume that mN ⊆ q for some N > λs. Applying (7.13) again in reverse, followed by (7.22) to assume κ = κ, we conclude v = v 0 |Y must be locally quasi-monomial, so v 0 is, too.  7.5. The Monomial Case. We now prove a special case of Conjecture 7.19 under the assumption each as is generated by monomials. Proposition 7.24 (cf. [JM12], Proposition 8.1). Let a? be a graded sequence of monomial ideals on X = Ank = Spec(k[x1 , . . . , xn ]). For any nonzero ideal q on X, there exists a monomial valuation computing λ = lctqB (CX , a? ) < ∞, and any valuation computing lctqB (CX , a? ) is monomial. Proof. Let H = div(x1 · · · xn ) and v ∈ Val(X)∗ . The retraction v := r(X,H) (v) agrees with v on monomials, so v(a? ) = v(a? ) and v(q) ≤ v(q). Lemma 7.15 now shows lctqB (v; CX , a? ) = A(v; CX ) + v(q) A(v; CX ) + v(q) ≤ = lctqB (v; CX , a? ) v(a? ) v(a? ) REFERENCES 33 for every q, with a strict inequality when v 6= v. Thus we see (using Theorem 7.18) there must be a monomial valuation computing lctqB (CX , a? ), and that any computing valuation is monomial.  Acknowledgements: This paper is part of the author’s Ph.D. thesis. I thank Tommaso de Fernex, Mircea Mustaţă, Karl Schwede, and Kevin Tucker for numerous helpful discussions. This project grew out of discussions with Rankeya Datta, Felipe Pérez, and Karl at the 2015 AMS MRC in Commutative Algebra. I am indebted to Paolo Cascini, Mircea, and Karl for sharing their result on log discrepancies of divisorial valuations with me, upon which my definition of log discrepancy is modeled. I am especially grateful to my advisor, Wenliang Zhang, for organizing and supporting (DMS #1606414) my visit to the University of Utah during the Spring 2016 semester, during which I established §1 − 3 and §5, and for his careful reading of drafts of this document. Finally, I want to thank the University of Utah mathematics department for being such wonderful hosts during my stay. References Ian M. Aberbach and Florian Enescu. “The structure of F -pure rings”. In: Math. Z. 250.4 (2005), pp. 791–806. issn: 0025-5874. [Amb99] Florin Ambro. “On minimal log discrepancies”. In: Mathematical Research Letters 6.5 (July 1999), pp. 573–580. [Bli13] Manuel Blickle. “Test ideals via algebras of p−e -linear maps”. In: J. Algebraic Geom. 22.1 (2013), pp. 49–83. issn: 1056-3911. url: https: //doi.org/10.1090/S1056-3911-2012-00576-1. [Bou+15] S. Boucksom et al. “Valuation spaces and multiplier ideals on singular varieties”. In: London Math. Soc. Lecture Note Ser. 417 (2015), pp. 29– 51. [BS13] Manuel Blickle and Karl Schwede. “p−1 -linear maps in algebra and geometry”. In: Commutative algebra. Springer, New York, 2013, pp. 123– 205. url: https://doi.org/10.1007/978-1-4614-5292-8_5. [BST12] Manuel Blickle, Karl Schwede, and Kevin Tucker. “F -signature of pairs and the asymptotic behavior of Frobenius splittings”. In: Adv. Math. 231.6 (2012), pp. 3232–3258. issn: 0001-8708. doi: 10.1016/j.aim. 2012.09.007. url: http://dx.doi.org/10.1016/j.aim.2012.09. 007. [CMS15] Paolo Cascini, Mircea Mustaţă, and Karl Schwede. Private correspondence. 2015. [Con08] Brian Conrad. “Several approaches to non-archimedean geometry”. In: AMS University Lecture Series 45 (2008). [Dat17] R. Datta. “Uniform approximation of Abhyankar valuation ideals in function field of prime characteristic”. In: ArXiv e-prints (May 2017). arXiv: 1705.00447 [math.AG]. [DFN15] Antoine Ducros, Charles Favre, and Johannes Nicaise. Berkovich Spaces and Applications. Vol. 2119. Lecture Notes in Mathematics. Springer, 2015. isbn: 9783319110288. doi: 10.1007/978-3-319-11029-5. [DS16] Rankeya Datta and Karen E. Smith. “Frobenius and valuation rings”. In: Algebra and Number Theory 10.5 (2016), pp. 1057–1090. doi: 10. 2140/ant.2016.10.1057. [AE05] 34 [DS17] [Ein+06] [ELS01] [Fed83] [Fol13] [HH89] [HR76] [HW02] [JM12] [K192] [KK05] [KM98] [Kol13] REFERENCES Rankeya Datta and Karen E. Smith. “Correction to the article “Frobenius and valuation rings” [ MR3531362]”. In: Algebra Number Theory 11.4 (2017), pp. 1003–1007. issn: 1937-0652. url: https://doi.org/ 10.2140/ant.2017.11.1003. Lawrence Ein et al. “Asymptotic invariants of base loci”. In: Ann. Inst. Fourier (Grenoble) 56.6 (2006), pp. 1701–1734. issn: 0373-0956. url: http://aif.cedram.org/item?id=AIF_2006__56_6_1701_0. Lawrence Ein, Robert Lazarsfeld, and Karen E. Smith. “Uniform bounds and symbolic powers on smooth varieties”. In: Invent. Math. 144.2 (2001), pp. 241–252. issn: 0020-9910. Richard Fedder. “F -purity and rational singularity”. In: Trans. Amer. Math. Soc. 278.2 (1983), pp. 461–480. issn: 0002-9947. G.B. Folland. Real Analysis: Modern Techniques and Their Applications. Pure and Applied Mathematics: A Wiley Series of Texts, Monographs and Tracts. Wiley, 2013. isbn: 9781118626399. url: https:// books.google.com/books?id=wI4fAwAAQBAJ. Melvin Hochster and Craig Huneke. “Tight closure and strong F -regularity”. In: Mém. Soc. Math. France (N.S.) 38 (1989). Colloque en l’honneur de Pierre Samuel (Orsay, 1987), pp. 119–133. issn: 0037-9484. Melvin Hochster and Joel L. Roberts. “The purity of the Frobenius and local cohomology”. In: Advances in Math. 21.2 (1976), pp. 117–172. issn: 0001-8708. Nobuo Hara and Kei-Ichi Watanabe. “F-regular and F-pure rings vs. log terminal and log canonical singularities”. In: J. Algebraic Geom. 11.2 (2002), pp. 363–392. issn: 1056-3911. Mattias Jonsson and Mircea Mustaţă. “Valuations and asymptotic invariants for sequences of ideals”. In: Ann. Inst. Fourier (Grenoble) 62.6 (2012), 2145–2209 (2013). issn: 0373-0956. doi: 10.5802/aif.2746. url: http://dx.doi.org/10.5802/aif.2746. János Kollár and 14 coauthors. Flips and abundance for algebraic threefolds. Papers from the Second Summer Seminar on Algebraic Geometry held at the University of Utah, Salt Lake City, Utah, August 1991, Astérisque No. 211 (1992). Paris: Société Mathématique de France, 1992, pp. 1–258. Hagen Knaf and Franz-Viktor Kuhlmann. “Abhyankar places admit local uniformization in any characteristic”. eng. In: Annales scientifiques de l’École Normale Supérieure 38.6 (2005), pp. 833–846. url: http : //eudml.org/doc/82676. János Kollár and Shigefumi Mori. Birational geometry of algebraic varieties. Vol. 134. Cambridge Tracts in Mathematics. With the collaboration of C. H. Clemens and A. Corti, Translated from the 1998 Japanese original. Cambridge: Cambridge University Press, 1998, pp. viii+254. isbn: 0-521-63277-3. János Kollár. Singularities of the minimal model program. Vol. 200. Cambridge Tracts in Mathematics. With a collaboration of Sándor Kovács. Cambridge: Cambridge University Press, 2013, pp. x+370. isbn: 978-1-107-03534-8. REFERENCES [Kol97] [Laz04] [Mat89] [MR85] [RR85] [Sch08] [Sch09] [Sch10] [ST14] 35 János Kollár. “Singularities of pairs”. In: Algebraic geometry—Santa Cruz 1995. Vol. 62. Proc. Sympos. Pure Math. Providence, RI: Amer. Math. Soc., 1997, pp. 221–287. Robert Lazarsfeld. Positivity in algebraic geometry. II. Vol. 49. Ergebnisse der Mathematik und ihrer Grenzgebiete. 3. Folge. A Series of Modern Surveys in Mathematics [Results in Mathematics and Related Areas. 3rd Series. A Series of Modern Surveys in Mathematics]. Positivity for vector bundles, and multiplier ideals. Berlin: Springer-Verlag, 2004, pp. xviii+385. isbn: 3-540-22534-X. Hideyuki Matsumura. Commutative ring theory. Second Ed. Vol. 8. Cambridge Studies in Advanced Mathematics. Translated from the Japanese by M. Reid. Cambridge: Cambridge University Press, 1989, pp. xiv+320. isbn: 0-521-36764-6. V. B. Mehta and A. Ramanathan. “Frobenius splitting and cohomology vanishing for Schubert varieties”. In: Ann. of Math. (2) 122.1 (1985), pp. 27–40. issn: 0003-486X. S. Ramanan and A. Ramanathan. “Projective normality of flag varieties and Schubert varieties”. In: Invent. Math. 79.2 (1985), pp. 217–224. issn: 0020-9910. Karl Schwede. “Generalized test ideals, sharp F -purity, and sharp test elements”. In: Math. Res. Lett. 15.6 (2008), pp. 1251–1261. issn: 10732780. Karl Schwede. “F -adjunction”. In: Algebra Number Theory 3.8 (2009), pp. 907–950. issn: 1937-0652. doi: 10.2140/ant.2009.3.907. url: http://dx.doi.org/10.2140/ant.2009.3.907. Karl Schwede. “Centers of F -purity”. In: Math. Z. 265.3 (2010), pp. 687– 714. issn: 0025-5874. doi: 10.1007/s00209-009-0536-5. url: http: //dx.doi.org/10.1007/s00209-009-0536-5. Karl Schwede and Kevin Tucker. “On the behavior of test ideals under finite morphisms”. In: J. Algebraic Geom. 23.3 (2014), pp. 399–443. issn: 1056-3911. url: https://doi.org/10.1090/S1056-3911-201300610-4.
0math.AC
Information and estimation in Fokker-Planck channels Andre Wibisono∗ , Varun Jog∗, and Po-Ling Loh∗† arXiv:1702.03656v1 [cs.IT] 13 Feb 2017 Departments of Electrical & Computer Engineering∗ and Statistics† University of Wisconsin - Madison Madison, WI 53706 Email: [email protected], [email protected], [email protected] Abstract—We study the relationship between information- and estimation-theoretic quantities in time-evolving systems. We focus on the Fokker-Planck channel defined by a general stochastic differential equation, and show that the time derivatives of entropy, KL divergence, and mutual information are characterized by estimation-theoretic quantities involving an appropriate generalization of the Fisher information. Our results vastly extend De Bruijn’s identity and the classical I-MMSE relation. I. I NTRODUCTION Information theory and statistical estimation are closely intertwined. Various identities and inequalities arise from fundamental concepts such as mutual information, Fisher information, and estimation error, and close parallels between the fields provide an avenue for devising and deriving new results. As a canonical example, the information-estimation result known as the moment-entropy inequality [1] states that among all continuous random variables with a fixed variance, Gaussian random variables maximize entropy. Furthermore, Stam’s inequality [2] states that for a fixed Fisher information, Gaussian random variables minimize entropy. The celebrated Cramér-Rao bound from statistics [3], which establishes a lower bound on the variance of an estimator in terms of the Fisher information, follows from the aforementioned facts. In the past decade, significant effort has been devoted to uncovering new relationships between information-theoretic and estimation-theoretic quantities, beginning with the I-MMSE identity of Guo et al. [4] for additive Gaussian noise channels. The identity, provided in Theorem 1 below, states that the derivative of the mutual information between the channel input and output with respect to the signal to noise ratio (snr) is proportional to the minimum mean square error (mmse) in estimating the input from the output. As derived in Stam [2], the result is equivalent to De Bruijn’s identity (cf. equation (2)). The restatement of De Bruijn’s identity in terms of the mmse spawned a host of additional information-estimation results, including an extension to non-Gaussian additive noise [5], a generalization to the mismatched estimation setting [6], and several pointwise information-estimation relations [7]. Different I-MMSE type relations were also obtained for the Poisson channel [8], [9] and Lévy channel [10]. In information theory, a “channel” is a conditional distribution relating input symbols to output symbols. Whereas this coding-theoretic model is very useful for communication channels, however, it possesses certain drawbacks. Many realworld examples such as weather systems and financial markets are best explained as systems evolving in time according to random and deterministic influences. Although it is possible to view an evolving system as a communication channel, where the current state is the channel input and the state at a future time is the channel output, such an interpretation lacks insight about the path of the system. Nonetheless, informationtheoretic ideas are still useful in characterizing the behavior of time-evolving systems. For instance, one might characterize how much information about the future is contained in the present state using quantities such as entropy, KL divergence, and mutual information. This has been discussed extensively in the climate science literature [11], [12], [13], [14]. One of the simplest and most useful ways of modeling evolving systems is via continuous-time Markov chains with a continuous state space, which may be analyzed using stochastic differential equations (SDEs). In particular, the probability distribution of such systems evolves according to a partial differential equation known as the Fokker-Planck equation. We focus on an information-theoretic analysis of time-evolving systems described by SDEs, and study the rate of change of various fundamental quantities as a function of time. We show that these rates are conveniently expressed in terms of a generalized Fisher information, so our results may be interpreted as generalizations of De Bruijn’s identity for the SDE or Fokker-Planck setting. Notably, we obtain a clean identity expressing the time derivative of mutual information in terms of the mutual Fisher information, allowing us to derive new IMMSE relations. Our results are readily specialized to specific stochastic processes, including Brownian motion, OrnsteinUhlenbeck processes, and geometric Brownian motion. The remainder of the paper is organized as follows: In Section II, we review existing results and present the family of SDEs to be analyzed. In Section III, we develop our main results concerning the evolution of entropy, KL divergence, and mutual information in terms of estimation-theoretic quantities. We conclude in Section IV with a discussion of open questions. Proofs are contained in the Appendix. II. BACKGROUND AND PROBLEM SETUP We begin by presenting formal statements of De Bruijn’s identity and the I-MMSE relation, followed by a detailed characterization of the SDE framework discussed in our paper. A. DeBruijn’s identity and I-MMSE Consider the additive Gaussian noise channel √ Xt = X0 + tZ (1) where Z ∼ N (0, 1) is independent of X0 , and t > 0 is a time parameter—in this case equal to the variance of the noise— that controls how much randomness is added to the system. As t increases, we expect the output Xt to be more random. De Bruijn’s identity [2] confirms this intuition and asserts that 1 d H(Xt ) = J(Xt ), dt 2 (2) R where H(Xt ) = − R pt (x) log pt (x)dx is the Shannon entropy with pt denoting the density of Xt , and " 2 # Z ′ 2 ∂ pt (x) J(Xt ) = E log pt (Xt ) = dx > 0 (3) ∂x R pt (x) is the (nonparametric) Fisher information. Another common parameterization of the channel (1) is √ Ysnr = snrX + Z where snr > 0 is the signal to noise ratio and Z ∼ N (0, 1) is independent of X. Guo et al. [4] established the following I-MMSE relation, which states that the mutual information I(snr) = I(X; Ysnr ) increases at a rate given by the mmse, and showed their result is equivalent to De Bruijn’s identity (2). A convenient way to study Xt is via its density pt . When Xt follows the SDE (5), the density function p(x, t) = pt (x) satisfies a partial differential equation called the Fokker-Planck equation. This result is classical and technically requires that a(x, t) and σ(x, t) satisfy appropriate regularity and growth conditions (e.g., smoothness and Lipschitz properties [15]). Lemma 1. [Proof in Appendix A-A] The density p(x, t) of the process described by equation (5) satisfies ∂p(x, t) ∂ 1 ∂2 (b(x, t)p(x, t)), (6) = − (a(x, t)p(x, t)) + ∂t ∂x 2 ∂x2 where b(x, t) = σ(x, t)2 . Note that Lemma 1 implies the channel (5) is linear in the space of input distributions, which means a mixture of inputs produces a mixture of outputs. Also note that when b(x, t) is independent of x, our model falls under the PDE framework of Toranzo et al. [16]; however, our SDE framework (5) is somewhat more general. Consider the following examples: 1) Brownian motion: As discussed above, the choice a ≡ 0 d and √ σ ≡ 1 produces the solution Xt = X0 + Wt = X0 + tZ ∼ N (X0 , t), which is precisely the Gaussian channel (1). The Fokker-Planck equation is the classical heat equation ∂p(x, t) 1 ∂ 2 p(x, t) . = ∂t 2 ∂x2 Any starting point X0 = x0 gives rise to the explicit solution   (x − x0 )2 1 exp − . (7) p(x, t) = √ 2t 2πt 2) Ornstein-Uhlenbeck process: The SDE is Theorem 1 (Guo et al. [4]). We have dXt = −αXt dt + dWt , d 1 I(snr) = mmse(X | Ysnr ), dsnr 2 2 where mmse(X | Ysnr ) = E[(X − E[X | Ysnr ]) ] denotes the minimum mean square error for estimating X from Ysnr . In terms√ of the time parameterization (1), by setting snr = and Xt = tY1/t we see that Theorem 1 is equivalent to 1 d I(X0 ; Xt ) = − 2 mmse(X0 | Xt ). dt 2t B. SDEs and Fokker-Planck equation 1 t (4) with α > 0. This corresponds to a(x, t) = −αx and σ(x, t) = b(x, t) ≡ 1. The Ornstein-Uhlenbeck process is mean-reverting and arises in stochastic modeling of interest rates and particle velocities. The explicit q solution is Xt =  R t αs d −αt 1 −αt X0 + 0 e dWs = e X0 + 2α e (1 − e−2αt )Z, so 1 ) as t → ∞. The Fokker-Planck equation is Xt → N (0, 2α Consider a general channel that outputs a real-valued stochastic process (Xt )t≥0 following the SDE ∂ 1 ∂ 2 p(x, t) ∂p(x, t) , (8) = α (xp(x, t)) + ∂t ∂x 2 ∂x2 which may also be solved explicitly [17]. Note that if α → 0, we recover Brownian motion (7). 3) Geometric Brownian motion: The SDE is dXt = a(Xt , t)dt + σ(Xt , t)dWt , dXt = µXt dt + σXt dWt , (5) where (Wt )t≥0 is standard Brownian motion, and a(x, t) and σ(x, t) > 0 are arbitrary real-valued smooth functions. The choice a ≡ 0 and σ ≡ 1 generates the Gaussian channel (1), but the SDE framework (5) is considerably more general. The drift a(x, t)dt is the deterministic part of the dynamics, and the diffusion σ(x, t)dWt introduces randomness by incrementally adding Gaussian noise: For small δ > 0, we have √ Xt+δ ≈ Xt + a(Xt , t)δ + σ(Xt , t) δZ where Z ∼ N (0, 1) is independent of Xt . where µ ∈ R and σ > 0. This corresponds to a(x, t) = µx, σ(x, t) = σx, and b(x, t) = σ 2 x2 . Geometric Brownian motion is used to model asset prices in financial mathematics, notably in Black-Scholes option pricing [18]. The explicit σ2 solution is Xt = X0 exp((µ  − 2 )t + σWt ), so log Xt ∼  2 N log X0 + (µ − σ2 )t, σ 2 t . The Fokker-Planck equation is ∂ σ2 ∂ 2 2 ∂p(x, t) (x p(x, t)), = −µ (xp(x, t)) + ∂t ∂x 2 ∂x2 which also has an explicit solution [17]. (9) III. M AIN B. From information to estimation RESULTS We now generalize the information-estimation relations for the Gaussian channel (1) to the SDE channel (5). We express the time derivatives of fundamental informationtheoretic quantities—entropy, relative entropy, and mutual information—in terms of a generalized Fisher information, producing analogs of De Bruijn’s identity (2). Although entropy is not always increasing, relative entropy and mutual information decrease at a rate given by the relative and mutual Fisher information, respectively. We further interpret the Fisher information via a generalized Bayesian Cramer-Rao lower bound and express the mutual Fisher information as the mmse of estimating a function of the input from the output, thus producing generalizations of the I-MMSE relation (4). A. Generalized Fisher information Let b : R → (0, ∞) be a positive function. We define the Fisher information with respect to b to be  2  Z  ∂ p′ (x)2 log p(X) = b(x) dx, (10) Jb (X) = E b(X) ∂x p(x) R where p denotes the distribution of the random variable X. When b ≡ 1, we obtain the usual Fisher information (3). Our generalized Fisher information differs from other notions in literature in that we are still motivated by Shannon entropy. In contrast, Toranzo et al. [16] consider φ-Fisher information to study φ-entropy, while Lutwak et al. [19] and Bercher [20] consider q-Fisher information to study q-entropy, which includes Rényi and Tsallis entropies. For distributions p and q, we define the relative Fisher information with respect to b: Jb (p k q) = Z p(x)b(x) R  ∂ p(x) log ∂x q(x) 2 dx, (11) Alternatively, Jb (p k q) may be viewed as the Bregman divergence of Jb . Recall that the KL divergence, or relative entropy, may be written as the Bregman divergence of Shannon entropy. Lemma 2. [Proof in Appendix A-B] We define the statistical Fisher information with respect to b as the weighted average of the pointwise Fisher information: Z pY (y) b(y) Φ(X | Y = y) dx. (14) Φb (X | Y ) = R The following key result provides a bridge between information and estimation: Theorem 2. [Proof in Appendix B-A] The mutual Fisher information is equal to the statistical Fisher information: Jb (X; Y ) = Φb (X | Y ). We now derive two theorems illustrating the intimate connections between the statistical Fisher information and quantities in estimation theory. 1) Estimation-theoretic lower bound: The pointwise Fisher information (13) has a natural estimation interpretation via the Cramer-Rao lower bound; similarly, the statistical Fisher information (14) provides a lower bound on the estimation error when we have a prior on the parameters. The following result provides a weighted version of van Trees’ inequality [21]: Theorem 3. [Proof in Appendix B-B] Consider a parameterized family of distributions {pY |X ( · | x)} with prior pX (x). For any estimator T (y) of x,   1 1 1 2 E (T (Y ) − X) ≥ = . b(X) Φb (Y |X) + Jb (X) Jb (X|Y ) Thus, the conditional Fisher information Jb (X | Y ) is inversely proportional to the hardness of estimating X from Y . 2) mmse relation: We define the mmse of Y given X with respect to b as mmseb (Y | X) = min E[b(X)(T (X) − Y )2 ], T Jb (p k q) = Jb (p) − Jb (q) − h∇Jb (q), p − qi. In particular, Jb (p k q) ≥ 0 shows that Jb (p) is convex in p. Analogous to the the mutual information, which measures the reduction in conditional entropy, we define the mutual Fisher information of random variables X and Y with respect to b: Jb (X; Y ) = Jb (Y | X) − Jb (Y ), In fact, the mutual Fisher information (12) is equal to a natural generalization of the statistical Fisher information, a central estimation-theoretic quantity. Recall that the pointwise statistical Fisher information Φ(y) = Φ(X | Y = y) of a parameterized family of distributions {pX|Y ( · | y)} is Z ∂ 2 Φ(X|Y = y) = pX|Y (x|y) log pX|Y (x|y) dx. (13) ∂y R (12) R where Jb (Y | X) = R pX (x)Jb (Y | X = x) dy is the conditional Fisher information. Note that Jb (X; Y ) is the difference between E[Jb (pY |X (· | X))] and Jb (E[pY |X (· | X)]) = Jb (Y ). Since Jb is convex, this implies Jb (X; Y ) ≥ 0. where the minimization is over all estimators T (X). Note that the minimizer corresponds to the conditional expectation T (X) = E[Y |X], regardless of b. For a parameterized family of distributions {pY |X ( · | x)}, consider the pointwise score function ∂ log pY |X (y | x). ϕ(x, y) = ∂y Given a prior pX , by Bayes rule we can define the other conditional distribution pX|Y (x|y) ∝ pX (x)pY |X (y|x). Observe that for every fixed y, if X ∼ pX|Y (· |y), then ϕ(X, y) is an unbiased estimator of the nonparametric score function: E[ϕ(X, y) | Y = y] = ∂ log pY (y). ∂y This fact leads to the following result: Theorem 4. [Proof in Appendix B-C] Jb (X; Y ) = mmseb (ϕ(X, Y ) | Y ). C. De Bruijn’s identity We now describe our generalizations of De Bruijn’s identity. In the statements below, we write bt (x) = b(x, t) = σ(x, t)2 . 1) Time derivative of entropy: Our first result relates the rate of change of Shannon entropy to the Fisher information: Theorem 5. [Proof in Appendix C-A] Let Xt be the output of the SDE (5). Then   d 1 1 ∂2 ∂ b(X , t) . H(Xt ) = Jbt (Xt ) + E a(Xt , t) − t dt 2 ∂x 2 ∂x2 Note that in the case of heat equation, when a ≡ 0 and b ≡ 1, this result recovers the classical De Bruijn’s identity (2). However, in the general case, the entropy does not necessarily always increase. This may seem odd, but as the results below show, we obtain monotonicity by considering relative entropy. derivative of KL divergence: Let K(p k q) = R 2) Time p(x) p(x) log q(x) dx denote the KL divergence. The following R result establishes that the relative entropy between any two solutions is always decreasing, with a rate given by the relative Fisher information: Theorem 6. [Proof in Appendix C-B] Let Xt , Yt denote the output random variables of the channel (5) with distributions pt , qt . Then 1 d K(pt k qt ) = − Jbt (pt k qt ). dt 2 Thus, the KL divergence is a contracting map along any two trajectories pt and qt , implying the existence of at most one fixed point of the channel; i.e., a stationary probability distribution p∞ satisfying equation (6). However, such a distribution p∞ may not always exist, as in the case of the heat equation. 3) Time derivative of mutual information: Recall that the mutual information satisfies I(X; Y ) = H(Y ) − H(Y | X), R where H(Y | X) = R pX (x)H(Y | X = x) dx is the conditional Shannon entropy. Consider the time derivative of I(X0 ; Xt ), where Xt is the output of the channel (5) with input X0 . Theorem 5 expresses the time derivative of H(Xt ) in terms of the Fisher information Jbt (Xt ); since the channel (5) is linear, we also obtain a formula for the time derivative of the conditional entropy H(Xt |X0 ) in terms of Jbt (Xt |X0 ). Recalling definition (12), this yields the following result: Theorem 7. [Proof in Appendix C-C] The output Xt of the SDE channel (5) with input X0 satisfies d 1 I(X0 ; Xt ) = − Jbt (X0 ; Xt ). dt 2 D. Special cases We specialize our results to the examples in Section II-B. For more details, see Appendix D. 1) Brownian motion: Since b ≡ 1, the function Jb is the usual nonparametric Fisher information J, and Theorem 5 yields De Bruijn’s identity (2). We calculate the conditional √ d Fisher information using the coupling Xt = X0 + tZ: Z √ 1 pX0 (x0 ) J(x0 + tZ) dx0 = . J(Xt | X0 ) = t R The mutual Fisher information is Φ(X0 |Xt ) = 1t −J(Xt ) ≥ 0, which implies J(Xt ) ≤ 1t . Theorem 7 says that   1 d 1 J(Xt ) − . I(X0 ; Xt ) = dt 2 t Using the formula (7), we may compute the score function: ϕ(x0 , xt ) = ∂ 1 log pXt |X0 (xt |x0 ) = − (xt − x0 ). ∂xt t By Theorem 4, we then obtain 1 1 mmse((Xt − X0 )| Xt ) = 2 mmse(X0 | Xt ), t2 t which, with Theorem 7, recovers the I-MMSE identity (4). 2) Ornstein-Uhlenbeck process: Again, we have Jb = J. Applying Theorem 5 yields Φ(X0 | Xt ) = 1 d H(Xt ) = J(Xt ) − α. dt 2 Note that if α ≤ 0, entropy always increases—but if α > 0, which is the regime of interest, q entropy need not be monotonic. d −αt 1 (e2αt − 1)Z), we may com(X0 + 2α Using Xt = e pute the conditional Fisher information J(Xt | X0 ) = 1−e2α −2αt and the mutual Fisher information 2α Φ(X0 | Xt ) = − J(Xt ). 1 − e−2αt Since Φ(X0 | Xt ) ≥ 0, this yields the bound J(Xt ) ≤ 2α 1−e−2αt , which monotonically decreases to 2α as t → ∞. Using the explicit solution to equation (8), we obtain 2α(xt − e−αt x0 ) . 1 − e−2αt By Theorems 4 and 7, we then deduce the I-MMSE relation ϕ(x0 , xt ) = − d 2α2 e−2αt mmse(X0 | Xt ). I(X0 ; Xt ) = − dt (1 − e−2αt )2 3) Geometric Brownian motion: Since b(x, t) = σ 2 x2 , we have Jb 6= J. Applying Theorem 5 yields d 1 1 H(Xt ) = Jb (Xt ) + µ − σ 2 . dt 2 2 Thus, the entropy may not increase monotonically. Using the explicit solution to equation (9), we may compute ! 2 1 log xt − log x0 − (µ − σ2 )t +1 . ϕ(x0 , xt ) = − xt σ2 t Then by Theorem 4, we derive the I-MMSE relation 1 d I(X0 ; Xt ) = − 2 2 mmse(log X0 | Xt ). dt 2σ t E. Multivariate extension Our results extend without difficulty to the multivariate setting where Xt is a stochastic process in Rd evolving according to the SDE (5), where a(x, t) ∈ Rd is a drift vector, σ(x, t) ∈ Rd×d is a covariance matrix, and Wt is standard Brownian motion in Rd . The weight matrix is given by b(x, t) = σ(x, t)σ(x, t)⊤ , which is assumed to be uniformly positive definite. We define the generalized Fisher information (10) with respect to a positive definite matrix b(x): i Z k∇p(x)k2 h b(x) dx, Jb (X) = E k∇ log p(X)k2b(X) = p(x) d R where kvk2b(x) = v ⊤ b(x)v = Tr(b(x)vv ⊤ ) is the Mahalanobis inner product of v ∈ Rd . The relative (11) and mutual Fisher information (12) are defined similarly, and the statistical Fisher information (14) is defined as Z Φb (X | Y ) = pY (y) Tr(b(y)Φ(X | Y = y)) dy, Rd matrix Rwhere Φ(X | Y ∂= y) is the usual ∂Fisher information ⊤ p (x|y)( log p (x|y))( log p (x|y)) dx. d X|Y X|Y X|Y ∂y ∂y R With these definitions, our results hold unchanged (see Appendix E for more details). IV. D ISCUSSION AND FUTURE WORK We have established information-estimation identities for time-evolving systems. Our results extend the classical De Bruijn’s identity, which concerns the rate of entropy growth in a Brownian motion process, to the time derivatives of entropy, KL divergence, and mutual information for processes described by general SDEs. The predictability of such systems relies on the information contained in the current state regarding future states. At a high level, the current state contains progressively less information about future states of the system; we derive the specific rates of change in information in terms of quantities arising from estimation. Theorem 7 relates the derivative of I(X0 ; Xt ) to the statistical Fisher information, which by Theorem 3 is inversely proportional to the difficulty of estimating X0 from Xt . This difficulty should increase with time, suggesting that I(X0 ; Xt ) may decrease in a convex manner. Costa [22] showed that the entropy of Brownian motion is a convex function, and Chen et al. [23] showed that the first four derivatives of entropy alternate in sign. We conjecture a similar property for higherorder derivatives of mutual information in general SDEs. We suspect that the relationship between Fisher information and estimation may be generalized to Bregman divergences. 2 Our results are based on the function fx (y) = 12 b(x)y p , corresponding to Gaussian randomness generated via b(x)dWt . It may be interesting to investigate stochastic processes corresponding to general convex functions. Finally, one could explore the connection to optimal transport, which interprets the Fokker-Planck equation (6) as the gradient flow of relative entropy in the space of probability densities with respect to the Wasserstein metric. Villani [24] then views Theorem 6 as an analog of De Bruijn’s identity. Note that such a viewpoint focuses on a PDE rather than SDE formulation. R EFERENCES [1] T. M. Cover and J. A. Thomas, Elements of information theory. John Wiley & Sons, 2012. [2] A. Stam, “Some inequalities satisfied by the quantities of information of Fisher and Shannon,” Information and Control, vol. 2, no. 2, pp. 101– 112, 1959. [3] E. L. Lehmann and G. Casella, Theory of point estimation. Springer Science & Business Media, 2006. [4] D. Guo, S. Shamai, and S. Verdú, “Mutual information and minimum mean-square error in Gaussian channels,” IEEE Transactions on Information Theory, vol. 51, no. 4, pp. 1261–1282, 2005. [5] D. P. Palomar and S. Verdú, “Representation of mutual information via input estimates,” IEEE Transactions on Information Theory, vol. 53, no. 2, pp. 453–470, 2007. [6] S. Verdú, “Mismatched estimation and relative entropy,” IEEE Transactions on Information Theory, vol. 56, no. 8, pp. 3712–3720, 2010. [7] K. Venkat and T. Weissman, “Pointwise relations between information and estimation in Gaussian noise,” IEEE Transactions on Information Theory, vol. 58, no. 10, pp. 6264–6281, 2012. [8] R. Atar and T. Weissman, “Mutual information, relative entropy, and estimation in the poisson channel,” IEEE Transactions on Information theory, vol. 58, no. 3, pp. 1302–1318, 2012. [9] J. Jiao, K. Venkat, and T. Weissman, “Pointwise relations between information and estimation in the poisson channel,” in 2013 IEEE International Symposium on Information Theory, pp. 449–453, IEEE, 2013. [10] J. Jiao, K. Venkat, and T. Weissman, “Relations between information and estimation in scalar Lévy channels,” in 2014 IEEE International Symposium on Information Theory, pp. 2212–2216, IEEE, 2014. [11] L.-Y. Leung and G. R. North, “Information theory and climate prediction,” Journal of Climate, vol. 3, no. 1, pp. 5–14, 1990. [12] T. Schneider and S. M. Griffies, “A conceptual framework for predictability studies,” Journal of Climate, vol. 12, no. 10, pp. 3133–3155, 1999. [13] R. Kleeman, “Measuring dynamical prediction utility using relative entropy,” Journal of the Atmospheric Sciences, vol. 59, no. 13, pp. 2057– 2072, 2002. [14] T. DelSole, “Predictability and information theory. part I: Measures of predictability,” Journal of the Atmospheric Sciences, vol. 61, no. 20, pp. 2425–2440, 2004. [15] M. C. Mackey, Time’s Arrow: The Origins of Thermodynamics Behavior. Springer-Verlag, 1992. [16] I. V. Toranzo, S. Zozor, and J.-M. Brossier, “Generalization of the de Bruijn’s identity to general φ-entropies and φ-Fisher informations,” arXiv preprint arXiv:1611.09400, 2016. [17] S. E. Shreve, Stochastic calculus for finance II: Continuous-time models, vol. 11. Springer Science & Business Media, 2004. [18] F. Black and M. Scholes, “The pricing of options and corporate liabilities,” The Journal of Political Economy, vol. 81, no. 3, pp. 637– 654, 1973. [19] E. Lutwak, D. Yang, and G. Zhang, “Representation of mutual information via input estimates,” IEEE Transactions on Information Theory, vol. 53, no. 2, pp. 453–470, 2007. [20] J.-F. Bercher, “Some properties of generalized fisher information in the context of nonextensive thermostatistics,” Physica A: Statistical Mechanics and its Applications, vol. 392, no. 15, pp. 3140 – 3154, 2013. [21] R. D. Gill and B. Y. Levit, “Applications of the van Trees inequality: A Bayesian Cramér-Rao bound,” Bernoulli, pp. 59–79, 1995. [22] M. Costa, “A new entropy power inequality,” IEEE Transactions on Information Theory, vol. 31, no. 6, pp. 751–760, 1985. [23] F. Cheng and Y. Geng, “Higher order derivatives in Costa’s entropy power inequality,” IEEE Transactions on Information Theory, vol. 61, no. 11, pp. 5892–5905, 2015. [24] C. Villani, Topics in optimal transportation. No. 58, American Mathematical Soc., 2003. A PPENDIX A P ROOFS OF LEMMAS In this Appendix, we provide proofs of the technical lemmas stated in our paper. Throughout, we assume that all densities and functions are smooth and rapidly decreasing, so we may differentiate under the integral sign and apply integration by parts with all boundary terms zero. These are standard assumptions in parabolic partial differential equations, and may be ensured by constraining the functions a and σ in the channel definition (5) to be smooth and Lipschitz (see Mackey [15] and the references cited therein for technical details). These assumptions hold for all our examples. A. Proof of Lemma 1 The Fokker-Planck equation is a standard result; we follow the outline of Mackey [15, §11]. Let h : R → R be a smooth, compactly supported function, and consider the expectation Z p(x, t)h(x)dx. E(t) = E[h(Xt )] = R d We compute the time derivative Ė(t) = dt E(t) in two ways: First, by differentiating under the integral sign, Z Z ∂p(x, t) d h(x)dx. (15) p(x, t)h(x)dx = Ė(t) = dt R ∂t R Second, we compute Ė(t) as the limit of the difference 1 δ (E(t+ δ)− E(δ)) as δ → 0. From the channel definition (5), for small δ, we have √ Xt+δ = Xt + a(Xt , t)δ + σ(Xt , t) δZ, where Z ∼ N (0, 1) is independent of Xt . By the second-order Taylor expansion of h, and ignoring terms of order smaller than δ, we then have √ h(Xt+δ ) = h(Xt ) + δh′ (Xt )σ(Xt , t)Z   1 + δ h′ (Xt )a(Xt , t) + h′′ (Xt )σ(Xt , t)2 Z 2 . 2 We take the expectation of both sides. Since Z and Xt are independent, E[h′ (Xt )σ(Xt , t)Z] = E[h′ (Xt )σ(Xt , t)] E[Z] = 0, so the middle term vanishes. Using E[Z 2 ] = 1, we obtain E[h(Xt+δ )] = E[h(Xt )] h i 1 + δE h′ (Xt )a(Xt , t) + h′′ (Xt )b(Xt , t) , 2 which shows that i h 1 Ė(t) = E h′ (Xt )a(Xt , t) + h′′ (Xt )b(Xt , t) . 2 Using integration by parts twice, this implies that   Z 1 ′′ ′ Ė(t) = p(x, t) h (x)a(x, t) + h (x)b(x, t) dx 2 R Z  ∂  1 ∂2 h(x) − (b(x, t)p(x, t)) dx, (a(x, t)p(x, t)) + = 2 ∂x 2 ∂x R (16) where all boundary terms vanish, since h has compact support. Comparing equations (15) and (16), and using the fact that h is arbitrary, we conclude that ∂ 1 ∂2 ∂p(x, t) (b(x, t)p(x, t)), = − (a(x, t)p(x, t)) + ∂t ∂x 2 ∂x2 which is the Fokker-Planck equation (6). Observe that the Fokker-Planck equation (6) conserves mass. If p(x, t) satisfies (6), then Z Z d ∂p(x, t) dx p(x, t)dx = dt R ∂t R Z Z 1 ∂ ∂2 (b(x, t)p(x, t))dx =− (a(x, t)p(x, t))dx + 2 R ∂x2 R ∂x =0+0=0 where each integral above is zero by integration by parts. Thus, if we start with p(x, 0) which is a probability density, then the solution p(x, t) stays a probability density at each time t ≥ 0. B. Proof of Lemma 2 We first compute the gradient ∇Jb (p) with respect to its argument p, which is a probability density function p : R → R representing the distribution of a random variable. Recall that ∇Jb (p) satisfies 1 h∇Jb (p), vi = lim (Jb (p + δv) − Jb (p)), (17) δ→0 δ R for all v : R → R with R v(x)dx = R 0 (so q + δv is still a probability density), where hf, gi = R f (x)g(x)dx. For ease of notation, we suppress dependence on x in what follows, and use ′ to denote the derivative. We also assume that p is smooth and rapidly decreasing, so all boundary terms are zero in the application of integration by parts. We first have the following lemma: ′2 ′ ′ Lemma 3. ∇Jb (p) = b pp2 − 2 (bpp ) . R Proof. Let h : R → R with R p(x)h(x)dx = 0, and let δ > 0 be small. Let v = ph, so log(p + δv) = log p + log(1 + δh) = log p + δh + o(δ). Squaring the derivative yields (log(p + δv))′2 = (log p)′2 + 2δh′ (log p)′ + o(δ). We now multiply the above equation by b(p+δv) = bp+δbph and integrate over x, to obtain Z Jb (p + δv) = Jb (p)+δ (2bph′ (log p)′ + bph(log p)′2 )+o(δ) Z = Jb (p) + δ h(−2(bp(log p)′ )′ + bp(log p)′2 ) + o(δ), where we have used integration by parts in the second equality. Since v = ph and h is arbitrary, equation (17) implies that −2(bp(log p)′ )′ + bp(log p)′2 p  ′ 2 ′ ′ p −2(bp ) +b , = p p ∇Jb (p) = as desired. B. Proof of Theorem 3 Lemma 2 follows from Lemma 3 by a direct computation. The Bregman divergence of Jb from q to p is We follow the outline of Gill and Levit [21, §2]. For every y, we have Z x=+∞ ∂ pXY (x, y) dx = pXY (x, y) = 0. ∂x x=−∞ DJb (p, q) = Jb (p) − Jb (q) − h∇Jb (q), p − qi   ′2 Z Z Z p′2 (bq ′ )′ q ′2 q = b − b − (p − q) b 2 − 2 p q q q Z Z Z Z ′2 ′2 p ′ ′ q p − bp 2 + 2 (bq ) − 2 (bq ′ )′ . = b p q q The last term above is zero (assuming q is also smooth and rapidly decreasing) because it is the integral of Ra boundary term. By integration by parts, the third term is 2 pq (bq ′ )′ = R ′ ′ −2 bq ′ ( pq − pq q2 ). Therefore, we have Z Z Z ′ p′2 q ′2 ′q DJb (p, q) = b − 2 bp + bp 2 p q q Z = bp(log p − log q)′2 = Jb (p k q), as desired. A PPENDIX B P ROOFS OF INFORMATION - ESTIMATION THEOREMS In this Appendix, we prove the theorems appearing in Section III-B, linking information to estimation. Moreover, by integration by parts, Z Z ∂ pXY (x, y) dx = − pXY (x, y)dx = −pY (y). x ∂x Therefore, Z Z (T (y) − x) ∂ pXY (x, y) dx dy = 1, ∂x which we may also write as i h ∂ log pXY (X, Y ) = 1, E (T (Y ) − X) ∂x where (X, Y ) ∼ pXY . By the Cauchy-Schwarz inequality, we then have " #2 ∂ (T (Y ) − X) p p b(X) 1=E log pXY (X, Y ) ∂x b(X)     ∂ 2  (T (Y ) − X)2 E b(X) log pXY (X, Y ) . (19) ≤E b(X) ∂x A. Proof of Theorem 2 By Bayes’ rule, we have the identity ∂ ∂ ∂ log pX|Y (x|y) = log pY |X (y|x)− log pY (y). (18) ∂y ∂y ∂y Using the fact that Observe that Z Z ∂ ∂ ∂ ∂ ∂ log pXY (x, y) = log pX (x) + log pY |X (y|x), log pX|Y (x|y)dx = pX|Y (x|y)dx = 0. pX|Y (x|y) ∂x ∂x ∂x ∂y ∂y Therefore, equation (18) implies we also have Z  ∂ ∂ 2  ∂ pX|Y (x|y) log pY |X (y|x) dx = log pY (y). log pXY (X, Y ) E b(X) ∂y ∂y ∂x  2   ∂ In particular, we have the following mmse-like relation: Z log pX (X) = E b(X) ∂ 2 ∂x Φ(X | Y = y) = pX|Y (x|y) log pX|Y (x|y) dx  2   ∂ ∂y Z 2 2 ∂ ∂ + E b(X) log pY |X (Y |X) ∂x log pY |X (y|x) dx − log pY (y) . = pX|Y (x|y)  ∂  ∂  ∂y ∂y + 2E b(X) log p (X) log p (Y | X) X Y |X Multiplying by b(y) and integrating with respect to pY (y), we ∂x ∂x obtain = Jb (X) + Φb (Y | X) (20) Z Φ(X | Y ) = b(y) pY (y) Φ(X | Y = y) dy Z Z ∂ 2 = b(y) pXY (x, y) log pY |X (y|x) dx dy ∂y Z ∂ 2 − b(y) pY (y) log pY (y) dy ∂y Z = pX (x) Jb (Y | X = x) dx − Jb (Y ) = Jb (X; Y ), as desired. where the last expectation above is zero because it is equal to Z Z ∂ ∂ b(x) pX (x) pY |X (y|x) dy dx ∂x Z Z∂x ∂ ∂ = b(x) pX (x) pY |X (y|x) dy dx = 0, ∂x ∂x R R ∂ ∂ ∂ pY |X (y|x)dy = ∂x 1 = 0. pY |X (y|x)dy = ∂x since ∂x Combining inequality (19) with equation (20) yields the desired result. C. Proof of Theorem 4 Since the minimizer in the mmse definition is the conditional expectation, we may write mmseb (ϕ(X, Y ) | Y ) = E[b(Y )(ϕ(X, Y ) − E[ϕ(X, Y )|Y ])2 ] = E[b(Y )ϕ(X, Y )2 ] − E[b(Y )(E[ϕ(X, Y ) | Y ])2 ]. (21) The first term in equation (21) is equal to Z Z 2 ∂ log pY |X (y|x) dy dx pX (x) b(y)pY |X (y|x) ∂y Z = pX (x)Jb (Y | X = x) dx = Jb (Y | X). ∂ log pY (Y ), the On the other hand, since E[ϕ(X, Y ) | Y ] = ∂y second term in equation (21) is equal to Z 2 ∂ log pY (y) dy = Jb (Y ). b(y)pY (y) ∂y Therefore, equation (21) implies that mmseb (ϕ(X, Y ) | Y ) = Jb (Y | X) − Jb (Y ) = Jb (X; Y ), as desired. A PPENDIX C G ENERALIZATIONS OF D E B RUIJN ’ S IDENTITY In this Appendix, we prove the theorems in Section III-C. A. Proof of Theorem 5 We assume that p = p(x, t) is smooth and rapidly decreasing, so the boundary terms become zero when we apply integration by parts, and we may differentiate under the integral sign. We first write Z Z ∂p ∂ d H(Xt ) = − log p dx − p log p dx. dt ∂t ∂t R R ∂ The second integral above is equal to ∂p p dx = ∂t dx = ∂t ∂ 1 = 0. We then substitute the Fokker-Planck equation (6) ∂t to obtain Z Z 2 ∂(ap) ∂ (bp) 1 d log p dx. (22) H(Xt ) = log p dx − dt ∂x 2 ∂x2 By two applications of integration by parts, the first integral in equation (22) is equal to Z Z Z ∂ log p ∂p ∂(ap) log p dx = − ap dx = − a dx ∂x ∂x ∂x   Z ∂a ∂ = p dx = E a(Xt , t) . (23) ∂x ∂x For the second integral in equation (22), we will use the identity ∂ 2 log p 1 ∂ 2 p  ∂ log p 2 . = − 2 ∂x p ∂x2 ∂x By integration by parts, we then have Z 2 Z ∂ (bp) ∂ 2 log p log p dx = bp dx ∂x2 ∂x2 Z Z  ∂ log p 2 ∂ 2p dx = b 2 dx − bp ∂x ∂x Z 2 Z   ∂ b ∂ log p 2 = dx p dx − bp 2 ∂x ∂x  2  ∂ =E (24) b(Xt , t) − Jbt (Xt ). ∂x2 Combining equations (22), (23), and (24) yields the desired conclusion. B. Proof of Theorem 6 For ease of notation, we write p ≡ pt and q ≡ qt . By differentiating under the integral sign and using the chain rule, we have Z d d p K(pt k qt ) = p log dx dt dt q Z Z Z p ∂ log p ∂ log q ∂p log dx + p dx − p dx = ∂t q ∂t ∂t Z Z ∂p p ∂q p = log dx + 0 − dx, (25) ∂t q q ∂t R ∂ log p where the middle integral above is zero because p ∂t dx = R ∂p R ∂ ∂ p dx = ∂t 1 = 0. We apply the Fokker-Planck ∂t dx = ∂t equation (6) and use integration by parts to write the first integral in equation (25) as  Z  Z ∂(ap) 1 ∂ 2 (bp) p p ∂p − log dx log dx = + ∂t q ∂x 2 ∂x2 q  Z 2 ∂ p p 1 ∂ = ap dx. (26) log + bp 2 log ∂x q 2 ∂x q Note that ∂ p q ∂ p log = ∂x q p ∂x q and p q ∂2 p ∂2 log = − ∂x2 q p ∂x2 q  p ∂ log ∂x q 2 . Plugging these relations into equation (26) and using integration by partsRand the Fokker-Planck equation (6) for q(x, t), p we find that ∂p ∂t log q dx is equal to 2 !  Z ∂ p 1 ∂2 p 1 p ∂ aq dx + bq 2 − bp log ∂x q 2 ∂x q 2 ∂x q  Z  1 ∂(aq) 1 ∂ 2 (bq) p + dx − Jbt (pt k qt ) − = ∂x 2 ∂x2 q 2 Z ∂q p 1 = dx − Jbt (pt k qt ). ∂t q 2 Substituting this into equation (25), we conclude that 1 d K(pt k qt ) = − Jbt (pt k qt ), dt 2 as desired. C. Proof of Theorem 7 Theorem 5 holds for any initial distribution. In particular, if X0 is a point mass at x0 ∈ R, we have 1 d H(Xt | X0 = x0 ) = Jbt (Xt | X0 = x0 ) dt 2   1 ∂2 ∂ b(X , t) X = x +E a(Xt , t) − t 0 0 . (27) ∂x 2 ∂x2 For any initial distribution X0 , we may average equation (27) over X0 to obtain 1 d H(Xt | X0 ) = Jbt (Xt | X0 ) dt 2   ∂ 1 ∂2 +E b(X , t) . a(Xt , t) − t ∂x 2 ∂x2 Combining this with Theorem 5, we conclude that d d I(X0 ; Xt ) = (H(Xt ) − H(Xt | X0 )) dt dt 1 = (Jbt (Xt ) − Jbt (Xt | X0 )) 2 1 = − Jbt (X0 ; Xt ), 2 as desired. A PPENDIX D D ETAILS FOR S ECTION III-D For the Ornstein-Uhlenbeck process, the explicit solution to the Fokker-Planck equation (8) is given by   r α(x − e−αt x0 )2 α p(x, t) = . exp − π(1 − e−2αt ) 1 − e−2αt For the geometric Brownian motion process, the explicit solution to the Fokker-Planck equation (8) is given by ! 2 (log x − log x0 − (µ − σ2 )t)2 1 1 p(x, t) = √ . exp − 2σ 2 t 2πσ 2 t x The mmse expressions in for the examples in Section III-D are then obtained through direct computations. A PPENDIX E M ULTIVARIATE SETTING In the multivariate setting, our channel definition still takes the form of equation (5), where a(x, t) ∈ Rd is a drift vector, σ(x, t) ∈ Rd×d is a covariance matrix, and the weight matrix b(x, t) = σ(x, t)σ(x, t)⊤ is assumed to be uniformly positive definite. The Fokker-Planck equation (6) now takes the form ∂p(x, t) 1 = −∇ · (a(x, t)p(x, t)) + ∇ · (∇ · (b(x, t)p(x, t))), ∂t 2 where ∇ is the gradient and ∇· is the divergence operator. More explicitly, we have d X ∂p(x, t) ∂ (ai (x, t)p(x, t)) =− ∂t ∂x i i=1 d + d 1 X X ∂2 (bij (x, t)p(x, t)). 2 i=1 j=1 ∂xi ∂xj The derivation for the Fokker-Planck equation in the multivariate setting is analogous to the derivation in the univariate setting (cf. Mackey [15]). As explained in Section III-E, the generalized Fisher information is defined using the Mahalanobis inner product with respect to the weight matrix b, and the statistical Fisher information is defined by averaging the pointwise Fisher information with respect to the weight matrix b. The weighted van Trees’ inequality in Theorem 3 becomes h i 1 1 E kT (Y ) − Xk2b(X)−1 ≥ = , Φb (Y |X) + Jb (X) Jb (X|Y ) where kvk2b(x)−1 = v ⊤ b(x)−1 v = Tr(b(x)−1 vv ⊤ ) is the Mahalanobis inner product with respect to the inverse weight matrix b−1 . The proof proceeds in the same way as in the univariate case (see also Gill and Levit [21, §4]). The expression for the time derivative of entropy in Theorem 5 now becomes   d 1 1 H(Xt ) = Jbt (Xt )+E ∇· a(Xt , t) − ∇· (∇· b(Xt , t)) , dt 2 2 or more explicitly,   d X d ∂ai (Xt , t) 1 E H(Xt ) = Jbt (Xt ) + dt 2 ∂xi i=1  2  d d ∂ bij (Xt , t) 1 XX E . − 2 i=1 j=1 ∂xi ∂xj The statements of the other theorems remain unchanged and the proofs remain valid.
10math.ST
arXiv:1801.02644v2 [math.AC] 31 Jan 2018 ON MONOMIAL IDEALS AND THEIR SOCLES GEIR AGNARSSON AND NEIL EPSTEIN Abstract. For a finite subset M ⊂ [x1 , . . . , xd ] of monomials, we describe how to constructively obtain a monomial ideal I ⊆ R = K[x1 , . . . , xd ] such that the set of monomials in Soc(I) \ I is precisely M , or such that M ⊆ R/I is a K-basis for the the socle of R/I. For a given M we obtain a natural class of monomials I with this property. This is done by using solely the lattice structure of the monoid [x1 , . . . , xd ]. We then present some duality results by using anti-isomorphisms between upsets and downsets of (Zd , ). Finally, we define and analyze zero-dimensional monomial ideals of R of type k, where type 1 are exactly the Artinian Gorenstein ideals, and describe the structure of such ideals that correspond to order-generic antichains in Zd . 1. Introduction Aside from the algebraic benefits of the socle of a module over a commutative ring, when studying local rings, Cohen-Macaulay rings or Gorenstein rings [BH97, Eis95, Vil01] the socle of an ideal, in particular that of a monomial ideal of the polynomial ring over a field, has a rich lattice structure that many times can be studied solely by using combinatorial arguments. Consider the following: any range of mountains on a given piece of land where each mountain has the same cone-type shape is, of course, determined by the loci of the mountain tops. But is it determined by the mere valleys these mountains form? The answer depends on what additional conditions we know the mountain range has. This is one of the motivating questions in this article when we view a monomial ideal as a mountain range and the valleys it forms as the elements in the socle of the ideal that are not in the ideal. For a field K, monomial ideals of the polynomial ring R = K[x1 , . . . , xd ] play a pivotal role in the investigation of Gröbner bases of general ideals of R [BW93, AL94]. The underlying reason as to why monomial ideals are so convenient, yet so important, in investigating reduction systems for general ideals of R stems in part from the fact that for every monomial ideal I = (m1 , . . . , mk ), Date: February 1, 2018. 2010 Mathematics Subject Classification. 13B25, 13A02, 06A07. Key words and phrases. poset, upset, downset, polynomial ring, monomial ideal, socle, duality, Artinian ideal, Gorenstein ideal, type k monomial ideal. 1 where no mi divides another mj , has a Gröbner basis M = {m1 , . . . , mk }; exactly the minimum set of generators for I. For A ⊆ {1, . . . , k} let mA denote the least common multiple of the mi : i ∈ A. With this convention one can define the Scarf complex ∆(I) of the monomial ideal I as the simplicial complex consisting of all the subsets A ⊆ {1, . . . , k} with unique least common multiple mA , that is ∆(I) = {A ⊆ {1, . . . , k} : mA 6= mB for all B 6= A}. The Scarf complex discussed in [BPS98] and [MS05] was first introduced in [Sca86]. It is easy to see that the facets Fd−1 (∆(I)) of the Scarf complex ∆(I) are in bijective correspondence with the maximal monomials of R \ I (w.r.t. the divisibility partial order), which is exactly the set of monomials of the socle Soc(I) that are not in I (see definition in the following section.) The cardinality of this very set of monomials has many interesting combinatorial interpretations, two of which we will briefly describe here below. We say that an ideal I of R is co-generated by a set F of K-linear functionals R → K if I is the largest ideal of R contained in all the kernels of the functionals in F. A celebrated result by Macaulay from 1916 [Mac94] states that every ideal of R is finitely co-generated, so R is coNoetherian in this sense. More specifically, it turns out that any monomial ideal I of R has at least |Fd−1 (∆(I))| co-generators and can always be co-generated by |Fd−1 (∆(I))| + 1 functionals (see [Agn00]). Further, for a given ideal I (not necessarily monomial) of R and a fixed term order, then I has a Gröbner basis where the head or leading terms of the basis elements form a corresponding monomial ideal L(I) of R, and I can then be co-generated by one functional if |Fn−1 (∆(L(I)))| < d and by |Fn−1 (∆(L(I)))| + 1 functionals otherwise [Agn00]. The cardinality |Fd−1 (∆(I))| is also linked to the number of edges in a simple graph on k vertices in the following way. For given d, k ∈ N let cd (k) denote the maximum number of facets |Fd−1 (∆(I))| among all monomial ideals I of R that are minimally generated by k monomials. In general, the Scarf complex ∆(I) is always a sub-complex of the boundary complex of a simplicial polytope P (I) on k vertices where one facet is missing. When I is Artinian (or zero-dimensional) and generic (i.e. the powers of all xi in the generators for I are distinct) then ∆(I) actually equals this boundary complex P (I) with one facet missing [MS05]. Using the Dehn-Sommerville equations for the simplicial polytope P (I) one can show that determining cd (k) for d ≤ 5 is equivalent to determining the maximum number of edges of the 1-skeleton of P (I). This turns out to be the same problem of determining the maximum number of a simple graph on k vertices of order dimension at most d [Agn97]. 2 We therefore see that the number of monomials in Soc(I)\I, the socle of the monomial ideal I that are not in I, has some interesting combinatorial interpretations in addition to the known algebraic ones, in particular, the maximum number that the set Soc(I) \ I can have. Trivially we have c2 (k) = k − 1 for any k ∈ N and less trivially we know that c3 (k) = 2k − 5 for k ≥ 3 [Agn97, MS05]. For each d ≥ 4 the exact value of cd (k) is still unknown, although the asymptotic behavior does satisfy cd (k) = Θ(k⌊d/2⌋ ) as k tends to infinity and d is fixed [Agn97]. In any case, we see from this that a monomial ideal minimally generated by k monomials, can “generate” monomials in its socle of cardinality considerably larger order than that of k. In order for that to occur though, the k monomials that generate the given ideal must be special and relate to each other in a singular way. By the same token, the resulting monomials in Soc(I) \ I also relate in a special way if they are generated by “few” generating monomials of I. Looking away from these extreme cases for a moment, some natural questions about monomial ideals and their socles, in particular about those monomials in the socle and not in the ideal, arise. (i) Assume that for a given (apriori unknown) monomial ideal I the set Soc(I) \ I is given, is it always possible to retrieve the ideal I from it, if not, what additional structure is needed? In which cases is it unique? (ii) Given any set of monomials that form an antichain w.r.t. divisibility order, can one always find a monomial ideal I such that this set of monomials has the form Soc(I) \ I? Is the ideal I unique? If not, can they be characterized in some way? The purpose of this article is to address these questions, discuss uniqueness and non-uniqueness, present up-down duality results, discuss generalizations to general ideals of R and address what is similar with the monomial ideal case and what is not. This article was in part inspired by the M.S. thesis of Anna-Rose Wolff [Wol16]. She analyzed the survival complex Σ(R/I) of R/I where I is a monomial ideal that contains powers of all the variables of R. The survival complex is a simplicial complex whose vertices are the monomials of R that are not in I, where a simplex consists of a set of monomials whose product is not in I. She showed [Wol16, Prop. 2.2.1] that the truly isolated points of that complex correspond to the monomial basis of the socle of I, a set which in this document we call ∂oc(I) (see Definition 2.1.) As such, it was natural for her to address the question we address here, completely solving the two-variable case [Wol16, Algorithm 3.3.1 and Proposition 3.3.3] and making headway on the three-variable case [Wol16, Algorithm 3.4.1]. The rest of this article is organized as follows: 3 In Section 2 we define some basic concepts about partially ordered sets that we will be using and referring to throughout the article. In Section 3 we show that if for a monomial ideal I the set Soc(I) \ I is given, then we can retrieve a monomial ideal I back from a derived version of the set Soc(I) \ I. In Section 4 we present and use an intuitively obvious duality between monomial ideals of R on the one hand and “down-sets” of monomials on the other hand, that contain all elements dividing a given element of the down-set (see definitions in Section 4). In Section 5 we elaborate more explicitly the discussion presented in Section 3 and show that if Soc(I) \ I is given, then there is a unique zero-dimensional ideal I yielding the given set of monomials. As a corollary we obtain a well-known description of Artinian monomial ideals of R that are Gorenstein. We then use what we have established to describe Artinian monomial ideals that are type 2 Gorenstein (where type 1 Gorenstein is the usual Gorenstein notion (see definitions in Section 5)). In Section 6 we discuss further Artinian type k Gorenstein monomial ideals and describe their order-generic case. In Section 7 we discuss the socle of ideals of R = K[x1 , . . . , xd ] in more general settings when K is an algebraically closed field. Finally, in Section 8 we summarize our main results and pose some questions. 2. Partially ordered sets, basic definitions and notations The set of integers will be denoted by Z, the set of natural numbers by N and the set of nonnegative numbers N ∪ {0} by N0 . For each n ∈ N we let [n] := {1, . . . , n}. Throughout, R = K[x1 , . . . , xd ] will denote the polynomial ring over a field K. By the socle of an ideal I ⊆ R w.r.t. the maximal ideal m = (x1 , . . . , xd ) of R, we will mean the ideal Soc(I) = Socm (I) := (I : m) = {f ∈ R : xi f ∈ I for each i}. Note that for a monomial ideal I ⊆ R, the set Soc(I) \ I contains monomials a such that (i) a 6∈ I and (ii) xi a ∈ I for every i ∈ [d]. Definition 2.1. For a monomial ideal I and the maximal ideal m = (x1 , . . . , xd ) of R, let ∂oc(I) denote the set of the monimials in Soc(I) \ I. 4 Remarks. (i) By the above Definition 2.1, we have Soc(I) = I ⊕ SpanK (∂oc(I)) as a K-vector spaces. (ii) The image Soc(I) = (0 : m/I) = Soc(R/I) in R/I has a basis as a vector space over K consisting of the images of the monomials in ∂oc(I) (see [Vil01, AF74].) Hence, ∂oc(I) consists exactly of the maximal monomials in R \ I w.r.t. the divisibility partial order and |∂oc(I)| = dimK (Soc(R/I)). Assume for a moment we have a general ideal I and a general maximal ideal m of R. If m does not contain I, then m + I = R and hence for f ∈ (I : m) we have f ∈ f I + f m ⊆ I. Therefore (I : m) = I and so Socm (I) is trivial. Therefore, for an ideal I and a maximal ideal m of R, the socle Socm (I) is only of interest when I ⊆ m. Hence, unless otherwise stated, we will always assume I ⊆ m. Most of what we establish from now on about monomial ideals of R = K[x1 , . . . , xd ] will only use the the monoid [x1 , . . . , xd ] as a partially ordered set (poset) with the partial order given by divisibility. We present some basic definitions and notations for general posets that we will use throughout the article. For a poset (P, ≤) recall that C ⊆ P is a chain if C forms a linearly or totally ordered set within (P, ≤). A subset N ⊆ P is an antichain or a clutter if no two elements in N are comparable in (P, ≤). For a poset (P, ≤) call a subset U ⊆ P an upset, or an up-filter, of P if x ≥ u ∈ U ⇒ x ∈ U . Call a subset D ⊆ P a downset, or a down-filter, of P if if x ≤ d ∈ D ⇒ x ∈ D. For an upset U of a poset P let Sd (U ) := max(P \ U ) be the maximal elements of P \ U . For a downset D of a poset P let Su (D) := min(P \ D) be the minimal elements of P \ D. For a subset A ⊆ P , let U (A) := {x ∈ P : x ≥ a for some a ∈ A} be the upset generated by A, and D(A) := {x ∈ P : x ≤ a for some a ∈ A} the downset generated by A. If A = {a1 , . . . , an } is finite, then we write U (a1 , . . . , an ) (resp. D(a1 , . . . , an )) for U (A) (resp. D(A).) Recall that Zd has a natural partial order  where for ã = (a1 , . . . , ad ) and b̃ = (b1 , . . . , bd ) we have ã  b̃ ⇔ ai ≤ bi for each i ∈ [d]. This is a generalization of the partial order given in [GP06, Ex. 19, p. 71], and we will henceforth be using “≤” for this partial order “”. The usual componentwise addition +, which makes (Zd , +) an abelian group, respects the mention partial order ≤. 5 For any fixed point c̃ ∈ Zd , the map τc̃ : Zd → Zd given by τc̃ (x̃) = c̃ + x̃ is an order preserving translation, and hence an order automorphism, of the poset (Zd , ≤). The following is easy to obtain. Observation 2.2. For any A ⊆ Zd and c̃ ∈ Zd we have τc̃ (U (A)) = U (τc̃ (A)), τc̃ (D(A)) = D(τc̃ (A)). Further, for any upset U ⊆ Zd and downset D ⊆ Zd we have τc̃ (Sd (U )) = Sd (τc̃ (U )), τc̃ (Su (D)) = Su (τc̃ (D)). Writing out what the above observation states in terms of c̃ we get U (A + c̃) = U (A) + c̃, D(A + c̃) = D(A) + c̃, Sd (U + c̃) = Sd (U ) + c̃, Su (D + c̃) = Su (D) + c̃. An upset U ⊆ Zd is cofinite if here is a c̃ ∈ Zd such that (i) U ⊆ U (c̃) and (ii) U (c̃) \ U is finite. Likewise a downset D ⊆ Zd is cofinite if there is a c̃ ∈ Zd such that (i) D ⊆ D(c̃) and (ii) D(c̃) \ D is finite. The map given by p̃ = (p1 , . . . , pd ) 7→ xp11 · · · xpdd = x̃p̃ is an isomorphism between the additive monoid Nd0 and the multiplicative monoid [x1 , . . . , xd ]. Moreover, the map is also an order isomor- phism from the poset (Nd0 , ≤), where ≤ is the partial order of Zd from above, to [x1 , . . . , xd ] as a poset given by divisibility. Hence as the map is an order preserving monoid isomorphism, we will for the most part in the next two sections deal with the additive monoid Nd0 and the abelian group Zd instead of the multiplicative monoid [x1 , . . . , xd ] within the ring R. Via this isomorphism we have a bijective correspondence between monomial ideals of R and upsets of the poset Nd0 . 3. Retrieving an upset from maximal elements not in the upset We will in this section and the following section describe everything in terms of Nd0 or Zd instead of the ring R = K[x1 , . . . , xd ] as we justified in the last paragraph in the previous section. Let G = {p̃1 , . . . , p̃k } ⊆ Nd be an antichain. For the moment we assume that G is positive, i.e. all the coordinates of each p̃i are strictly positive. (This is by no means a restrictive assumption as will become clear as we go along.) If p̃i = (pi1 , . . . , pid ) for each i, then for each j ∈ [d] let (1) mj = min{pij : 1 ≤ i ≤ d} − 1, Mj = max{pij : 1 ≤ i ≤ d} + 1 6 and B ∗ (G) = {(M1 , m2 , m3 . . . , md ), (m1 , M2 , m3 , . . . , md ), (m1 , m2 , M3 , . . . , md ), (2) . . . , (m1 , m2 , m3 , . . . , Md )}. Let G∗ = G∪B ∗ (G). That r̃ ∈ Sd (U (G)), means precisely that r̃ 6∈ U (G) and r̃+ ẽj ∈ U (G) for each j, where ẽj is the usual basis vector for Rd with 1 in the j-coordinate and 0 everywhere else. Since r̃ 6∈ U (G) and r̃ + ẽj ∈ U (G) for each given j, then for some p̃i ∈ G we have rj = pij −1 < Mj . Since this holds for each j, then r̃ cannot be greater than any element of B ∗ (G) and so r̃ 6∈ U (B ∗ (G)) and hence r̃ 6∈ U (G∗ ). Since G ⊆ G∗ and so U (G) ⊆ U (G∗ ), we have r̃ + ẽj ∈ U (G∗ ) for each j, and so r̃ ∈ Sd (U (G∗ )). Also we have U (G) ⊆ U (G∗ ) ⊆ U (m̃), where m̃ = (m1 , . . . , md ) from (1), and U (m̃) \ U (G∗ ) ⊆ U (m̃) \ U (B ∗ (G)), which is finite. We summarize in the following. Proposition 3.1. For any antichain G = {p̃1 , . . . , p̃k } ⊆ Nd we have Sd (U (G)) ⊆ Sd (U (G∗ )) ⊆ U (m̃) \ U (G∗ ), which is a finite set, and hence U (G∗ ) is cofinite. Note that the Sd (U (G∗ )) corresponds to the socle of the monomial ideal whose generators correspond to G∗ . The main result in this section is the following. Theorem 3.2. For a given antichain G = {p̃1 , . . . , p̃k } ⊆ Nd we have G = Su (D(Sd (U (G∗ )))). Before proving Theorem 3.2 we need the following. Lemma 3.3. Let (P, ≤) be a poset. For an upset U ⊆ P and a downset D ⊆ P we have D(Sd (U )) ∩ U = U (Su (D)) ∩ D = ∅. Proof. If x̃ ∈ D(Su (U )), then x̃ ≤ ỹ ∈ Sd (U ). If now x̃ ∈ U as well, then by definition of an upset we must have ỹ ∈ U , which is a contradiction since U ∩ Sd (U ) = ∅. In the same way we obtain U (Su (D)) ∩ D = ∅. ⊔ ⊓ 7 Conventions. (i) For a set A ⊆ Zd and i ∈ [d] let Axi =ai := {x̃ ∈ A : xi = ai }. (ii) For a finite set G ⊆ Zd let U (G) = U (m̃) \ U (G∗ ), where m̃ is as in (1), which then is a finite set. (iii) For I = {i1 , . . . , ih } ⊆ [d] let πI = πi1 ,...,ih : Rd → Rh denote the natural projection onto coordinates i1 , . . . , ih . In particular πi (x̃) = xi and πı̂ (x̃) = (x1 , . . . , xi−1 , xi+1 , . . . , xd ). Proof of Theorem 3.2. Let p̃ = (p1 , . . . , pd ) ∈ G. Since U (G∗ ) is cofinite, then for each i ∈ [d] the set U (G)xi =pi −1 is also a finite poset. Also, it is nonempty since p̃ − ẽi = (p1 , . . . , pi−1 , pi − 1, pi+1 , . . . , pd ) ∈ U (G)xi =pi −1 as G∗ is an antichain. Hence, there is a maximal element q̃ ∈ U (G)xi =pi −1 with p̃ − ẽi ≤ q̃. Since q̃ + ẽi ≥ p̃, then q̃ + ẽi ∈ U (p̃) ⊆ U (G) ⊆ U (G∗ ). Also, since q̃ is maximal in U (G)xi =pi −1 , we have q̃ + ẽℓ ∈ U (G∗ )xi =pi −1 ⊆ U (G∗ ) for all ℓ 6= i, and so q̃ ∈ Sd (U (G∗ )). So, for each i ∈ [d] we have p̃ − ẽi ∈ D(Sd (U (G∗ ))). Since p̃ ∈ G ⊆ U (G∗ ), then by Lemma 3.3 we have p̃ 6∈ D(Sd (U (G∗ ))), and therefore p̃ ∈ Su (D(Sd (U (G∗ )))). This proves that G ⊆ Su (D(Sd (U (G∗ )))). For the other direction, we first verify that Su (D(Sd (U (G∗ )))) ⊆ U (m̃ + 1̃), (3) where 1̃ = (1, . . . , 1) ∈ Zd . First note that by Proposition 3.1 we have Sd (U (G∗ )) ⊆ U (m̃)\U (G∗ ) ⊆ U (m̃). If r̃ ∈ Su (D(Sd (U (G∗ )))), then r̃ − ẽi ∈ D(Sd (U (G∗ ))) for each i, and so r̃ − ẽi ≤ q̃ for some q̃ ∈ Sd (U (G∗ )) ⊆ U (m̃) for each i. Consider a fixed i. Since r̃ 6≤ q̃ and r̃ − ẽi ≤ q̃, we must have ri − 1 = qi . Since q̃ ∈ Sd (U (G∗ )) ⊆ U (m̃), we have qi ≥ mi and therefore ri = qi + 1 ≥ mi + 1. Since this holds for each i, we have thus (3). For r̃ ∈ Su (D(Sd (U (G∗ )))) we have for each i that r̃ − ẽi ∈ D(Sd (U (G∗ ))), and hence, by Lemma 3.3, r̃ − ẽi 6∈ U (G∗ ) for each i. If now r̃ ∈ U (G∗ ), then r̃ is a minimal element of U (G∗ ) and hence r̃ ∈ G∗ . Hence r̃ ∈ G∗ ∩ Su (D(Sd (U (G∗ )))) ⊆ G∗ ∩ U (m̃ + 1̃) = G. Therefore it suffices to show that Su (D(Sd (U (G∗ )))) ⊆ U (G∗ ). Assume r̃ ∈ Su (D(Sd (U (G∗ ))))\U (G∗ ). We then have r̃ ∈ U (m̃+ 1̃)\U (G∗ ) ⊆ U (m̃)\U (G∗ ). By Proposition 3.1 U (G∗ ) is cofinite, and so there is a maximal element q̃ ∈ U (m̃) \ U (G∗ ) with r̃ ≤ q̃. In this case we have, by the definition of Sd , that r̃ ≤ q̃ ∈ Sd (U (G∗ )) and hence r̃ ∈ D(Sd (U (G∗ ))) 8 contradicting that r̃ ∈ Su (D(Sd (U (G∗ )))). This proves that Su (D(Sd (U (G∗ )))) ⊆ U (G∗ ), and hence, by previous paragraph, Su (D(Sd (U (G∗ )))) ⊆ G. ⊔ ⊓ Remark. The values m1 , . . . , md and M1 , . . . , Md from (1), used to define G∗ , do not play a major role, except for merely being small and respectively large enough. In fact, if ã ≤ m̃ and b̃ ≥ M̃ and (4) B ∗ (ã, b̃) = {(b1 , a2 , a3 . . . , ad ), (a1 , b2 , a3 , . . . , ad ), (a1 , a2 , b3 , . . . , ad ), . . . , (a1 , a2 , a3 , . . . , bd )}, then we can define G∗ (ã, b̃) = G ∪ B ∗ (ã, b̃), and we then, as in Proposition 3.1, obtain that Sd (U (G)) ⊆ Sd (U (G∗ (ã, b̃))) ⊆ U (ã) \ U (G∗ (ã, b̃)), which is a finite set, and hence U (G∗ (ã, b̃)) is cofinite, and the proof of Theorem 3.2 works verbatim for the following slight generalization. Theorem 3.4. For a given antichain G = {p̃1 , . . . , p̃k } ⊆ Nd and for ã ≤ m̃ and b̃ ≥ M̃ where m̃ and M̃ are as in (1), we have G = Su (D(Sd (U (G∗ (ã, b̃))))). This will be used in the next Section 4. Note that Theorem 3.2 states that one can retrieve the antichain, or the generating points, G from Sd (U (G∗ )) alone. However, this does not mean that Sd (U (G∗ )) can be arbitrary; the set is derived from the (apriori unknown) set G. In the next section we use poset duality of Zd to obtain some related results from Theorem 3.2 where we start with an arbitrary antichain Q and show how it corresponds to the socle of a certain monomial ideal. 4. Up-down duality As in the derivation of Observation 2.2, for any fixed point c̃ ∈ Zd , the map ρc̃ : Zd → Zd given by ρc̃ (x̃) = c̃ − x̃ is a reverse-order preserving rotation, and hence an anti-automorphism of the poset (Zd , ≤). In particular, for N ⊆ Zd we have that N is an antichain iff ρc̃ (N ) is an antichain. Clearly ρc̃ is its own inverse, and so we have the following. Observation 4.1. For any c̃ ∈ Zd we have ρ2c̃ = IZd , the identify map of Zd . For any A ⊆ Zd and c̃ ∈ Zd we have ρc̃ (U (A)) = D(ρc̃ (A)), ρc̃ (D(A)) = U (ρc̃ (A)). 9 Further, for any upset U ⊆ Zd and downset D ⊆ Zd then ρc̃ (U ) is a downset, ρc̃ (D) is an upset and ρc̃ (Sd (U )) = Su (ρc̃ (U )), ρc̃ (Su (D)) = Sd (ρc̃ (D)). Let G = {p̃1 , . . . , p̃k } ⊆ Nd be an antichain, and G∗ = G ∪ B ∗ (G), where B ∗ (G) is as in (2). If ρ = ρm̃+M̃ where m̃ and M̃ are as in (1), then for any coordinate i we have min(πi (ρ(G))) = mi + Mi − (Mi − 1) = mi + 1, max(πi (ρ(G))) = mi + Mi − (mi + 1) = Mi − 1, and so G, ρ(G) ⊆ U (m̃ + 1̃) ∩ D(M̃ − 1̃). Suppose that Q ⊆ Nd is such that min(πi (Q)) = mi + 1 and max(πi (Q)) = Mi − 1 for each i. Since ρ is its own inverse, there is a unique G ⊆ U (m̃ + 1̃) ∩ D(M̃ − 1̃) with Q = ρ(G) (namely G = ρ(Q),) such that min(πi (G)) = mi + 1 and max(πi (G)) = Mi − 1 for each i, as well. Hence we have ρ(G∗ ) = ρ(G ∪ B ∗ (G)) = ρ(G) ∪ ρ(B ∗ (G)) = Q ∪ {(m1 , M2 , M3 . . . , Md ), (M1 , m2 , M3 , . . . , Md ), (M1 , M2 , m3 , . . . , Md ), . . . , (M1 , M2 , M3 , . . . , md )}. Hence, if we define B∗ (Q) = {(m1 , M2 , M3 . . . , Md ), (M1 , m2 , M3 , . . . , Md ), (M1 , M2 , m3 , . . . , Md ), (5) . . . , (M1 , M2 , M3 , . . . , md )}, where for each i min(πi (Q)) = mi + 1 and max(πi (Q)) = Mi − 1, and let Q∗ = Q ∪ B∗ (Q), then ρ(G∗ ) = Q∗ and so by Theorem 3.2 and Observation 4.1 we get (6) Q = ρ(G) = ρ(Su (D(Sd (U (G∗ ))))) = Sd (U (Su (D(ρ(G∗ ))))) = Sd (U (Su (D(Q∗ )))). Since Q ⊆ U (m̃ + 1̃) ∩ D(M̃ − 1̃) ⊆ Nd is a finite set, we have by (6) the following dual theorem of Theorem 3.2. Theorem 4.2. For an antichain Q = {p̃1 , . . . , p̃k } ⊆ Nd we have Q = Sd (U (Su (D(Q∗ )))), where Q∗ = Q ∪ B∗ (Q) and B∗ (Q) is as in (5). 10 By the above Theorem 4.2 we see that given any antichain Q ⊆ Nd , then the corresponding monomials are exactly the monomials in ∂oc(I(Q)), where I(Q) is the monomial ideal generated by the monomials that correspond to Su (D(Q∗ )) ⊆ Nd0 . This does give a positive answer to one of our motivating questions in Section 1. Note, however, that this monomial ideal is not unique, as stated in the dual theorem of Theorem 4.3 here below. Let Q = {p̃1 , . . . , p̃k } ⊆ Nd be an antichain and ã ≤ m̃ and b̃ ≥ M̃ where m̃ and M̃ are as in (5). Further, let ρ = ρã+b̃ as defined in the beginning of this section. If now G = ρ(Q), then we have, as above, that ρ(G) = ρ2 (Q) = Q and for G∗ (ã, b̃) as in the Remark right before Theorem 3.4, that ρ(G∗ (ã, b̃)) = ρ(G ∪ B ∗ (ã, b̃)) = ρ(G) ∪ ρ(B ∗ (ã, b̃)) = Q ∪ {(a1 , b2 , b3 . . . , bd ), (b1 , a2 , b3 , . . . , bd ), (b1 , b2 , a3 , . . . , bd ), . . . , (b1 , b2 , b3 , . . . , ad )}. So, again, we can define B∗ (ã, b̃) = {(a1 , b2 , b3 . . . , bd ), (b1 , a2 , b3 , . . . , bd ), (b1 , b2 , a3 , . . . , bd ), . . . , (b1 , b2 , b3 , . . . , ad )}. (7) If now Q∗ (ã, b̃) := Q ∪ B∗ (ã, b̃), then ρ(G∗ (ã, b̃)) = Q∗ (ã, b̃), and so by Theorem 3.4 and Observation 4.1 we get Q = ρ(G) = ρ(Su (D(Sd (U (G∗ (ã, b̃)))))) = Sd (U (Su (D(ρ(G∗ (ã, b̃)))))) = Sd (U (Su (D(Q∗ (ã, b̃))))). Since this holds for any ã ≤ m̃ and b̃ ≥ M̃ , we have a following dual theorem of Theorem 3.4. Theorem 4.3. For an antichain Q = {p̃1 , . . . , p̃k } ⊆ Nd and for ã ≤ m̃ and b̃ ≥ M̃ where m̃ and M̃ are as in (5), we have Q = Sd (U (Su (D(Q∗ (ã, b̃))))). where Q∗ (ã, b̃) = Q ∪ B∗ (ã, b̃) and B∗ (ã, b̃) is as in (7). Remarks. (i) Note that Theorem 4.3 is valid for any ã, b̃ ∈ Zd that satisfy ã ≤ m̃ and b̃ ≥ M̃ . This will be used in the next section. (ii) Note that if Q∗ (ã, b̃) is given (without the prior knowledge of B∗ (ã, b̃)), then we can retrieve B∗ (ã, b̃) as in in (7) from Q∗ (ã, b̃), and hence the set Q, if ã ≤ m̃ and b̃ ≥ M̃ . 11 (iii) Last but not least, note that by Observations 2.2 and 4.1, all Theorems 3.2, 3.4, 4.2 and 4.3 hold for any antichain Q ⊆ Zd , and not merely those of Nd . Example. Consider the case d = 3 and the set Q = {(2, 2, 3), (3, 3, 2)} ⊆ N3 . We use the above Theorem 4.2 to obtain an upset U (Sd (D(Q∗ ))), whose minimal points Su (D(Q∗ )) ⊆ N30 correspond to the generators of a monomial ideal I where Soc(I) is spanned by the image of M = {x2 y 2 z 3 , x3 y 3 z 2 } in R/I, i.e. the monomials corresponding to the set Q, as follows. By (5) we have here that B∗ (Q) = {(4, 4, 1), (4, 1, 4), (1, 4, 4)} and hence Q∗ = Q ∪ B∗ (Q) = {(2, 2, 3), (3, 3, 2), (4, 4, 1), (4, 1, 4), (1, 4, 4)}, and so Su (D(Q∗ )) = {(2, 2, 4), (2, 3, 3), (2, 4, 2), (3, 2, 3), (4, 2, 2)}. By Theorem 4.2 we now have Sd (U (Su (D(Q∗ )))) = Sd (U (Su (D((2, 2, 3), (3, 3, 2), (4, 4, 1), (4, 1, 4), (1, 4, 4))))) = Sd (U ((2, 2, 4), (2, 3, 3), (2, 4, 2), (3, 2, 3), (4, 2, 2))) = {(2, 2, 3), (3, 3, 2)} = Q. Therefore, the monomial ideal I1 = (x2 y 2 z 4 , x2 y 3 z 3 , x2 y 4 z 2 , x3 y 2 z 3 , x4 y 2 z 2 ) ⊆ K[x, y, z] has Soc(I1 ) spanned by the image of M = {x2 y 2 z 3 , x3 y 3 z 2 } in R/I1 as a k-vector space. Since ã = (0, 0, 1) ≤ (1, 1, 1) = m̃ and b̃ = (5, 6, 7) ≥ (4, 4, 4) = M̃ in Z3 , we have for Q∗ (ã, b̃) = Q∗ ((0, 0, 1), (5, 6, 7)) = {(2, 2, 3), (3, 3, 2), (5, 6, 1), (5, 0, 7), (0, 6, 7)}, by Theorem 4.3 that Sd (U (Su (D(Q∗ ((0, 0, 1), (5, 6, 7)))))) = Sd (U (Su (D((2, 2, 3), (3, 3, 2), (5, 6, 1), (5, 0, 7), (0, 6, 7))))) = Sd (U ((1, 1, 4), (1, 3, 3), (1, 4, 2), (3, 1, 3), (4, 1, 2))) = {(2, 2, 3), (3, 3, 2)} = Q. as well. Hence, the monomial ideal I2 = (xyz 4 , x1 y 3 z 3 , xy 4 z 2 , x3 yz 3 , x4 yz 2 ) ⊆ K[x, y, z] also has Soc(I2 ) spanned by the image of M = {x2 y 2 z 3 , x3 y 3 z 2 } in R/I2 as a k-vector space. 12 Remarks. (i) As with many formulae, when it comes utilizing them to compute specific values, the compact forms and shortness is not always a guarantee for a fast evaluation. Conversely, a seemingly ugly expression can many times be much better to use to obtain specific values in a fast and an efficient manner. The computation of Su (D(Q∗ )), from an antichain Q consisting of k points from Nd as in Theorem 4.2, can for each fixed k be done in polynomial time in k alone. In fact, it can be done in O(kd )-time, although the exact or a tight upper bound of its complexity is hard to come by. (ii) We have so far assumed G, Q ⊆ Nd , only to guarantee that G∗ , Q∗ ⊆ Nd0 . However, general G, Q ⊆ Nd0 will imply G∗ , Q∗ ⊆ {−1, 0, 1, 2, . . .}d ⊆ Zd which does not correspond to a set −1 of monomials from [x1 , . . . , xd ] but rather monomials from [x1 , x−1 1 , . . . , xd , xd ]. 5. Zero-dimensional monomial ideals For a field K, the ring R = K[x1 , . . . , xd ], the maximal ideal m of R and a monomial ideal I of R, the motivation for this section is the following question. Question 5.1. Under what circumstances can we retrieve a unique monomial ideal I from the monomials of Soc(I) = Socm (I) that are not in I? We saw in the last example in the previous Section 4 that both the following ideals of R = K[x, y, z] I1 = (x2 y 2 z 4 , x2 y 3 z 3 , x2 y 4 z 2 , x3 y 2 z 3 , x4 y 2 z 2 ) and I2 = (xyz 4 , x1 y 3 z 3 , xy 4 z 2 , x3 yz 3 , x4 yz 2 ) have Soc(I1 ) and resp. Soc(I2 ) spanned by the image of M = {x2 y 2 z 3 , x3 y 3 z 2 } in R/I1 and resp. R/I2 as a k-vector space. So Question 5.1 has in general a negative answer. In fact, for any monomial ideal I it is easy to construct a rich family of monomial ideals such that ∂oc(I ′ ) = ∂oc(I) for any ideal I ′ in that family. If, however, we assume dim(I) = 0 then, we will see shortly, Question 5.1 has a positive answer. Zero-dimensional monomial ideals of R = K[x1 , . . . , xd ] constitute an interesting yet fairly general class of monomial ideals for numerous reasons: the quotient ring R/I is a local ring with a unique prime and maximal ideal, R/I is finite dimensional over k, and their variety consist of a single point 0̃, to name a few. 13 For a zero-dimensional ideal I 6= m of R we note that the image of Socm (I) in R/I corresponds to an antichain Q of Nd0 . As mentioned in the remark after Theorem 4.3, we then have for our Q ⊆ Nd0 that Q = Sd (U (Su (D(Q∗ (ã, b̃))))) for any suitable ã, b̃ ∈ Zd . In particular, since we have −1̃ = (−1, . . . , −1) ≤ m̃ from Theorem 4.3, then for any b̃ ≥ M̃ we have Q = Sd (U (Su (D(Q∗ (−1̃, b̃))))). We now briefly argue that the upset U (Su (D(Q∗ (−1̃, b̃)))) corresponds to a monomial ideal I of R of dimension zero: first we note that by definition (7) we have D(Q∗ (−1̃, b̃)) ⊇ D(B∗ (−1̃, b̃)) = D((−1, b2 , b3 . . . , bd ), (b1 , −1, b3 , . . . , bd ), . . . , (b1 , b2 , b3 , . . . , −1) and hence Su (D(Q∗ (−1̃, b̃))) ⊆ U (0̃) = Nd0 , and so the generators for the upset U (Su (D(Q∗ (−1̃, b̃)))) correspond to monomials of R = K[x1 , . . . , xd ]. Secondly, since b̃ ≥ M̃ as in Theorem 4.3, then for each i ∈ [d] we have bi ẽi = (0, . . . , 0, bi , 0, . . . , 0) 6∈ D(Q∗ (−1̃, b̃)) and −ẽi = (0, . . . , 0, −1, 0, . . . , 0) ∈ D(Q∗ (−1̃, b̃)), and so there is a smallest ci ∈ N0 , ci ≤ bi with ci ẽi 6∈ D(Q∗ (−1̃, b̃)). Since ci ẽi − ẽj ∈ D(Q∗ (−1̃, b̃)) for each j 6= i and ci ẽi − ẽi = (ci − 1)ẽi ∈ D(Q∗ (−1̃, b̃)), we have that ci ẽi ∈ Su (D(Q∗ (−1̃, b̃))) for each i, which means that xci i is an element of the monomial ideal of I that corresponds to U (Su (D(Q∗ (−1̃, b̃)))), showing that I is indeed of dimension zero. To see that the zero-dimensional ideal I is unique, it suffices to show that the upset from above U = U (Su (D(Q∗ (−1̃, b̃)))) is the unique upset with Q = Sd (U ). Assume I1 and I2 are two zerodimensional monomial ideals with the same socle w.r.t. the maximal ideal m of R. As each Ii is zero-dimensional, it corresponds to an upset U (G∗i (0̃, b̃i )) where G∗i (0̃, b̃i ) = Gi ∪ B ∗ (0̃, b̃i ) is an antichain of Nd0 as in (4). By our assumption we have Sd (U (G∗1 (0̃, b̃1 ))) = Q = Sd (U (G∗2 (0̃, b̃2 ))) and hence by Theorem 3.4 we then get G1 = Su (D(Sd (U (G∗1 (0̃, b̃1 ))))) = Su (D(Q)) = Su (D(Sd (U (G∗1 (0̃, b̃1 ))))) = G2 . Also, directly from Sd (U (G∗1 (0̃, b̃1 ))) = Q = Sd (U (G∗2 (0̃, b̃2 ))), we obtain for each i ∈ [d] that b1i = πi (b̃1 ) = max({πi (q̃) : q̃ ∈ Q}) = πi (b̃2 ) = b12 , and hence b̃1 = b̃2 . Therefore G∗1 (0̃, b̃1 ) = G1 ∪ B ∗ (0̃, b̃1 ) = G2 ∪ B ∗ (0̃, b̃2 ) = G∗2 (0̃, b̃2 ), and so U (G∗1 (0̃, b̃1 ) = U (G∗2 (0̃, b̃2 ). This means that the corresponding zero-dimensional monomial ideals are equal I1 = I2 . This yields a positive answer to Question 5.1 for zero-dimensional monomial 14 ideals, as stated in the following proposition, in which the set S of monomials corresponds to our antichain Q ⊆ Nd0 from above. Proposition 5.2. For any non-empty set S of non-comparable monomials of R = K[x1 , . . . , xd ] there is a unique zero-dimensional ideal I of R with ∂oc(I) = S. For the remainder of this section we discuss in further detail the cases when the set S of monomials in Proposition 5.2, that corresponds to an antichain Q ⊆ Nd0 , has cardinality 1 and 2, that is |S| = |Q| ∈ {1, 2}. The case when Q is a singleton. An interesting case of Proposition 5.2 this is when |Q| = 1, so the antichain Q of Nd0 consists of just one point, say Q = {p̃}. As before, the unique zerodimensional monomial ideal corresponds to the upset U = U (Su (D(Q∗ (−1̃, b̃)))) where Q = Sd (U ). If now p̃ = (p1 , . . . , pd ) ∈ Nd0 , we note that the downset D(Q∗ (−1̃, b̃)) is generated by an antichain consisting of d + 1 elements Q∗ (−1̃, b̃) = {p̃, (−1, b2 , b3 . . . , bd ), (b1 , −1, b3 , . . . , bd ), . . . , (b1 , b2 , b3 , . . . , −1)}. Since each element r̃ ∈ Su (D(Q∗ (−1̃, b̃))) is, by definition of Su (D), uniquely determined by d distinct elements of Q∗ (−1̃, b̃) (by the conditions (i) r̃ 6∈ Q∗ (−1̃, b̃) and (ii) r̃ − ẽi ∈ Q∗ (−1̃, b̃) for  = d + 1 elements each i ∈ [d]), we have that Su (D(Q∗ (−1̃, b̃))) is a subset of the possible d+1 d {0̃, (p1 + 1)ẽ1 , . . . , (pd + 1)ẽd }, and hence, as it is an antichain, we obtain Su (D(Q∗ (−1̃, b̃))) = {(p1 + 1)ẽ1 , . . . , (pd + 1)ẽd }}, which means that the upset U = U (Su (D(Q∗ (−1̃, b̃)))) corresponds to a monomial ideal I of the form I = (xp11 +1 , . . . , xdpd +1 ). That |S| = 1 means that ∂oc(I) = S contains the unique generator of the ideal Socm (I) of R/I. This means that R/I is a zero dimensional local Gorenstein ring [Eis95, Prop. 21.5]. Clearly, if our monomial ideal I is generated by pure powers of the variables x1 , . . . , xd , then R/I is a zero dimensional local Gorenstein ring with a unique monomial in ∂oc(I). Hence, we obtain as a corollary the following description of Artinian Gorenstein rings that are defined by monomials [Bei93], see also [Wol16]. Corollary 5.3. Let R = K[x1 , . . . , xd ] and I be a monomial ideal of R. Then R/I is a zero dimensional local Gorenstein ring if, and only if, I = (xp11 +1 , . . . , xpdd +1 ) for some p̃ ∈ Nd0 , in which case ∂oc(I) = {x̃p̃ = xp11 · · · xpdd }. 15 For a general Q ⊆ Zd we have, as mentioned here above, that every element of Su (D(Q)) is uniquely determined by d distinct elements of Q. More specifically we have the following. Claim 5.4. For an antichain G ⊆ Zd and r̃ ∈ Sd (U (G)) there are distinct p̃1 , . . . , p̃d ∈ G such that (i) r̃ ∈ Sd (U (p̃1 , . . . , p̃d )) and (ii) r̃ = (p11 + 1, . . . , pdd + 1). Dually, for an antichain Q ⊆ Zd and r̃ ∈ Su (D(Q)) there are distinct p̃1 , . . . , p̃d ∈ Q such that (i) r̃ ∈ Sd (U (p̃1 , . . . , p̃d )) and (ii) r̃ = (p11 − 1, . . . , pdd − 1). We can in similar fashion, as for Corollary 5.3, consider the case when |S| = k, that is the corresponding antichain Q of Zd0 contains k points Q = {p̃1 , . . . , p̃k }, where each p̃i = (pi1 , . . . , pid ). In this case we have Q∗ (−1̃, b̃) = Q ∪ B∗ (−1̃, b̃) where B∗ (−1̃, b̃) is as in (7), and hence bi ≥ max(pi1 + 1, . . . , pid + 1) for each index i, and so the downset D(Q∗ (−1̃, b̃)) is generated by an antichain of d + k elements. For convenience we let b̃(i) := (b1 , . . . , bi−1 , −1, bi+1 , . . . , bd ), for each i ∈ [d], so B∗ (−1̃, b̃) = {b̃(1), . . . , b̃(d)}. The following lemma provides a useful tool. d), . . . , b̃(i d), . . . , b̃(d)) Lemma 5.5. For I = {i1 , . . . ik } ⊆ [d] and D = D(p̃1 , . . . , p̃k , b̃(1), . . . , b̃(i 1 k we have Su (D) =  nP k  ℓ=1 riℓ ẽiℓ  ∅ o 6 ∅ if Su (D(πI (p̃1 ), . . . , πI (p̃k ))) = {(ri1 , . . . , rik )} = otherwise. Proof. For r̃ ∈ Su (D) we have by definition that r̃ 6∈ D and r̃ − ẽℓ ∈ D for each ℓ. Since D ⊆ D(b̃) we have then rk ≤ bk for each k 6= ℓ. As this holds for each ℓ we have r̃ ≤ b̃. Further, for r̃ ∈ Su (D), there is, analogous to Claim 5.4, a permutation σ ∈ Sd such that r̃ − ẽσ(ℓ) ≤ b̃(ℓ) for each index ℓ 6∈ I and r̃ − ẽσ(iℓ ) ≤ p̃ℓ for 1 ≤ ℓ ≤ k. Since r̃ 6∈ D we hence have for each ℓ 6∈ I that (8) rσ(ℓ)   b σ(ℓ) + 1 =  0 if σ(ℓ) 6= ℓ if σ(ℓ) = ℓ and rσ(ℓ) = pℓσ(ℓ) + 1 for each ℓ ∈ I. Since r̃ ≤ b̃ we must by (8) have that rσ(ℓ) = 0 for each ℓ 6∈ I and therefore σ(ℓ) = ℓ for each ℓ 6∈ I. Hence we have rℓ = 0 for each ℓ 6∈ I. Consequently σ ∈ S(I) is a permutation only on I and leaves every other element of [d] \ I fixed. In particular we have that r̃ = k X riℓ ẽiℓ = X i∈I ℓ=1 16 ri ẽi . Since r̃ 6∈ D we have r̃ 6∈ D(p̃i1 , . . . , p̃ik ) and since r̃ − ẽσ(iℓ) ≤ p̃ℓ for each ℓ ∈ [k], or r̃ − ẽℓ ≤ p̃γ(ℓ) for each ℓ ∈ I, where γ : I → [k] is the map iℓ 7→ ℓ, we have (ri1 , . . . , rik ) = πI (r̃) ∈ Su (D(πI (p̃1 ), . . . , πI (p̃k ))), which by Claim 5.4 is uniquely determined. ⊔ ⊓ From the above proof we note that if Su (D) 6= ∅ and r̃ ∈ Su (D), then rσ(iℓ ) = Pℓσ(iℓ ) + 1 for 1 ≤ ℓ ≤ k and so rσ(iℓ ) = Pγ(iℓ )σ(iℓ ) + 1 for 1 ≤ ℓ ≤ k, or rℓ = pβ(ℓ)ℓ + 1 for each ℓ ∈ I, where β = γ ◦ σ −1 , and so r̃ = (pβ(ii )i1 + 1)ẽi1 + · · · + (pβ(ik )ik + 1)ẽik for the bijection β : I → [k]. From this we get the following. d), . . . , b̃[ Observation 5.6. Let I = {i1 , . . . ik } ⊆ [d] and D = D(p̃1 , . . . , p̃k , b̃(1), . . . , b̃(i (ik ), . . . , b̃(d)). 1 If Su (D) 6= ∅ and r̃ ∈ Su (D) is its unique element, then there is a permutation α ∈ Sk such that πI (r̃) = (pα(1)i1 + 1, . . . , pα(k)ik + 1) ∈ Su (D(πI (p̃1 ), . . . , πI (p̃k ))). The case when k = |Q| = 2. The second special case of k = 2, so Q = {p̃, q̃}, is, as we will see here below, simple enough so that we can state some conclusion in a direct and uncluttered manner. The following follows directly from the above Lemma 5.5 and Observation 5.6. d d Corollary 5.7. For two distinct indices i, j ∈ [d] and D = D(p̃, q̃, b̃(1), . . . , b̃(i), . . . , b̃(j), . . . , b̃(d)) we have    {(pi + 1)ẽi + (qj + 1)ẽj }   Su (D) = {(qi + 1)ẽi + (pj + 1)ẽj }     ∅ if pi < qi and qj < pj if qi < pi and pj < qj otherwise. For the antichain Q = {p̃, q̃} of Nd0 we have a pseudo-partition [d] = A ∪ B ∪ C (some parts could be empty) where pi < qi for all i ∈ A, pi = qi for all i ∈ B, and pi > qi for all i ∈ C. We have here that Q∗ (−1̃, b̃) = Q ∪ B∗ (−1̃, b̃) = {p̃, q̃, b̃(1), . . . , b̃(d)}. Since Su (D) forms an antichain, for any downset D ⊆ Zd , and each element of Su (Q∗ (−1̃, b̃) Is  uniquely determined by a d-subset of Q∗ (−1̃, b̃), then Su (Q∗ (−1̃, b̃) is among the at most d+2 = d  S d+2 elements of Q′ Su (D(Q′ )), where the union is taken over all Q′ ⊆ Q∗ (−1̃, b̃) with cardinality 2 d. Since [d] = A ∪ B ∪ C is a pseudo-partition, then by letting |A| = a, |B| = b and |C| = c we have |A| + |B ∪ C| = a + b + c = d, and therefore, by Corollary 5.7, we then have the following. 17 Proposition 5.8. For an antichain Q = {p̃, q̃} of of Zd0 and the corresponding pseudo-partition [d] = A ∪ B ∪ C we have Su (D(Q∗ (−1̃, b̃))) = {(pi + 1)ẽi + (qj + 1)ẽj : (i, j) ∈ A × C} ∪ {(pi + 1)ẽi : i ∈ B ∪ C} ∪ {(qi + 1)ẽi : i ∈ A}, and hence |Su (D(Q∗ (−1̃, b̃)))| = ac + d. Note that {(pi + 1)ẽi : i ∈ B ∪ C} ∪ {(qi + 1)ẽi : i ∈ A} = {(pi + 1)ẽi : i ∈ B ∪ C} ∪ {(qi + 1)ẽi : i ∈ A ∪ B} = {(pi + 1)ẽi : i ∈ C} ∪ {(qi + 1)ẽi : i ∈ A ∪ B}. In the above display, the first and the last unions are pseudo-partitions and not symmetric, whereas the middle union is symmetric but not disjoint. Similar to Corollary 5.3 describing Artinian Gorenstein rings defined by monomial from [Bei93], we can interpret the above Proposition 5.8 for Artinian rings defined by monomials that are almost Gorenstein as defined in [HV06] as those monomial ideals I of R = K[x1 , . . . , xd ] with ∂oc(I) = S from Proposition 5.2 being a set of “small” cardinality. More specifically, if I is a zero dimensional monomial ideal of R with |S| = k ≥ 1, then I is said to be of type k, and so type 1 zero dimensional ideals are exactly the Artinian Gorenstein monomial ideals [HV06]. The above Proposition 5.8 gives a complete description of the type 2 zero dimensional monomial ideals of R. Corollary 5.9. Let R = K[x1 , . . . , xd ] and I be a monomial ideal of R. Then R/I is a zero dimensional local type 2 ring if, and only if, for two incomparable p̃, q̃ ∈ Zd0 with corresponding pseudo-partition [d] = A ∪ B ∪ C we have q +1 I = (xipi +1 xj j , xphh +1 , xqkk +1 : (i, j) ∈ A × C, h ∈ B ∪ C, k ∈ A), in which case ∂oc(I) = S = {x̃p̃ , x̃q̃ }. Remarks. (i) Note that Corollary 5.9 characterizes completely those monomial ideals I of R = K[x1 , . . . , xd ] that make R/I a local Artinian ring of type 2, in a purely combinatorial way, using only the poset structure of Zd , 18 (ii) Comparing with [HV06, Example 4.3] we see that the analysis of type 2 monomial ideal done there is slightly different from ours from Corollary 5.9, in that there in [HV06] the authors describe when exactly the condition J1 : J2 + J2 : J1 ⊇ m = (x1 , . . . , xd ) from [HV06, Theorem 4.2] holds, where I = J1 ∩ J2 is the irredundant intersection of two irreducible ideals J1 and J2 , each of which must be monomial ideals generated by powers of the variables x1 , . . . , xd . 6. Almost Gorenstein monomial ideals with k ≥ 3 The general case for k = |Q| ≥ 3. We have so far analysed fully the structure of the antichain Su (Q∗ (−1̃, b̃)) of Zd0 in the cases when k = |Q| ∈ {1, 2}, the antichain corresponding to the gener- ators of a zero-dimensional monomial ideal with ∂oc(I) corresponding to Q. These two cases are unique in that the form of the antichain Q is quite simple: an antichain Q = {p̃, q̃} in Zd with the corresponding pseudo-partition [d] = A ∪ B ∪ C as indicated in Proposition 5.8 must have both parts A and C non-empty and so ac ≥ 1. This means that the parts (here A and C) corresponding to the two possible strict orderings of the coordinates, namely pi < qi or pi > qi , are each nonempty. Needless to say, for an antichain Q ⊆ Zd where k = |Q| ≥ 3, this need not be case. The possibilities are simply to great. There are plenty antichains (in fact, vastly most of them, as we shall see momentarily) where not all strict orderings of the coordinates are present. Analogous to the pseudo-partition [d] = A ∪ B ∪ C from Proposition 5.8 we have for general k ∈ N a pseudo-partition (9) [d] = [ Aω , ω∈W (k) where W (k) is the collection of weak orderings of the set [k]: the collection of distinct orderings of the elements where equality is allowed. In particular we clearly have for each k ≥ 2 that |W (k)| > k!, the number of strict orderings of [k], and so the union in (9) is large. More specifically, for k = 1, 2 and 3 there are 1, 3 and 13 weak orderings in W (k) respectively, and, in general, a(k) = |W (k)| is the k-th ordered Bell number or Fubini number given explicitly by a(k) = k   X k i=1 19 i i!, where k i = S(k, i) is the Stirling number of the second kind [Sti] and where the exponential generating function for the corresponding sequence (a(k))k≥0 = (1, 1, 3, 13, 75, 541, . . .) is given by ∞ X a(k) k=0 Asymptotically a(k) ≈ n! 2(log 2)n+1 k! xk = 1 . 2 − ex = 12 (1.4427 · · · )n+1 n!, where log is the natural logarithm and so log 2 < 1, and so we see that the number k! of strict orderings of [k] constitutes only a small fraction of the a(k) weak orderings of [k]. The ordered Bell numbers have been studied extensively [OBn, A00]. Definition 6.1. An antichain Q = {p̃1 , . . . , p̃k } ⊆ Zd is called order-generic if in the corresponding pseudo-partition (9) for each ω ∈ W (k) of strict orderings of [k] we have Aω 6= ∅. Note that in order for an antichain Q ⊆ Zd to be order-generic we must have d ≥ k!. We will see that the structure of the antichain Su (Q∗ (−1̃, b̃)) of Zd0 when Q is order-generic is nice enough for some specific enumerations. The following slight reformulation follows directly from Lemma 5.5 and Observation 5.6. Corollary 6.2. For I = {i1 , . . . ik } ⊆ [d] containing distinct elements and we have d d D = D(p̃1 , . . . , p̃k , b̃(1), . . . , b̃(i1 ), . . . , b̃(ik ), . . . , b̃(d)) Su (D) = {(pα(1)i1 + 1)ẽi1 + · · · + (pα(k)ik + 1)ẽik }, if there is a unique permutation α ∈ Sk with pα(h)ih < pα(1)ih , . . . , p\ α(h)ih , . . . , pα(k)ih for each h ∈ [k] and Su (D) = ∅ otherwise. For k ∈ N we have that Su (Q∗ (−1̃, b̃), the set of Nd0 corresponding to the generators of our desired   = d+k possible monomial ideal, is the antichain formed by the maximal elements of all the d+k d k singletons Su (D), where D ⊆ Q∗ (−1̃, b̃) contains exactly d elements, and hence there are k types of points in Su (Q∗ (−1̃, b̃): for each ℓ ∈ [k] the ones that are formed by a d-set D that contains exactly ℓ points from Q = {p̃1 , . . . , p̃k }. Since our antichain is order-generic each mentioned type occurs in Su (Q∗ (−1̃, b̃). To effectively list of these points we make the following convention. For each a ∈ [k] and a subset C ⊆ [k] we let (10) Ba (C) := {i ∈ [d] : pai < pbi for all b ∈ C \ {a}} . 20 For C ⊆ C ′ ⊆ [k] we clearly have Ba (C ′ ) ⊆ Ba (C). With this convention the sets of the mentioned type ℓ ∈ [k], that contain those points formed by d-set D containing ℓ points from Q, are those labeled by a C ⊆ [k] with |C| = ℓ, and are of the form ( ) X Y [ Y ′ (11) PC = (ptit + 1)ẽit : (it )t∈C ∈ Bt (C) \ Bt (C ) . t∈C t∈C C ′ ⊃C t∈C In particular, for ℓ = k we have P[k] = {(p1i1 + 1)ẽi1 + · · · + (pkik + 1)ẽik : (i1 , . . . , ik ) ∈ B1 ([k]) × · · · × Bk ([k])}. (12) and for ℓ = k − 1 we obtain the sets labeled by [â] := {1, . . . , â, . . . , k} for each a ∈ [k] as follows (13) P[â] = {(p1i1 + 1)ẽi1 + · · · + (pkik + 1)ẽik : (i1 , . . . , iba , . . . , ik ) \ ∈ B1 ([â]) × · · · × B\ a ([â]) × · · · × Bk ([â]) \ B1 ([k]) × · · · × Ba ([k]) × · · · × Bk ([k])}}. Note that when ℓ = 1, so our d-set contains a single element p̃a from Q, then we have by this construction that P{a} = {(pai + 1)ẽi : pai ≥ pbi for all b 6= a}. Remarks. (i) Note that the sets PC are constructed directly in terms of the sets Ba (C) from (10), each which is union of sets Aω from (9). (ii) The fact that Q is order-generic ensures that the sets Ba (C) are all non-empty, which in return will imply that each PC from (11) does not contain comparable elements, and is therefore an antichain, as we will see below. We clearly have Su (D(Q∗ (−1̃, b̃))) ⊆ S ∅6=C⊆[k] PC , but we have not verified that this union of these sets PC is actually an antichain. By the following two lemmas we will see that this is indeed the case. Lemma 6.3. Let Q = {p̃1 , . . . , p̃k } be an order-generic antichain in Zd . If r̃ = (pa1 i1 + 1)ẽi1 + · · · + (paℓ iℓ + 1)ẽiℓ ∈ P{a1 ,...,aℓ } and s̃ = (pb1 i1 + 1)ẽi1 + · · · + (pbℓ iℓ + 1)ẽiℓ ∈ P{b1 ,...,bℓ } , then r̃ and s̃ are comparable in Zd if and only if r̃ = s̃. Proof. Suppose r̃ < s̃ so r̃ 6= s̃. In this case there is a coordinate, say i1 for simplicity, with pa1 i1 < pb1 i1 . 21 Suppose that b1 = ah ∈ {a1 , . . . , aℓ }. We first note that h 6= 1, since if h = 1, then pb1 i1 = pah i1 = pa1 i1 . We then have pah ih = pb1 ih > pbh ih since s̃ ∈ P{b1 ,...,bℓ } , and so looking at coordinates i1 and ih we see that r̃ and s̃ are in this case incomparable, which is a contradiction. Therefore we have that b1 6∈ {a1 , . . . , aℓ }. By definitions of Ba (C) in (10) we then have ij ∈ Baj ({b1 , a1 , . . . , aℓ }) for 1 ≤ j ≤ ℓ and therefore (i1 , . . . , iℓ ) ∈ Ba1 (C ′ ) × · · · × Baℓ (C ′ ) for C ′ = {b1 , a1 , . . . , aℓ } ⊃ {a1 , . . . , aℓ } contradicting ⊔ ⊓ r̃ =∈ P{a1 ,...,aℓ } . Hence, r̃ = s̃ must hold. This completes the proof. Remark. We can say a bit more than in the above proof: since Q is order-generic there is an iℓ+1 ∈ Bb1 ({b1 , a1 , . . . , aℓ }) and so r̃ ′ := r̃ + (pb1 iℓ+1 + 1)ẽℓ+1 ∈ PC ′ = P{b1 ,a1 ,...,aℓ } , or is dominated by an element in PC ′′ where {b1 , a1 , . . . , aℓ } ⊆ C ′′ . The claims of Lemma 6.3 actually hold in a slightly more general setting: suppose Q = {p̃1 , . . . , p̃k } is an order-generic antichain in Zd . Suppose also that C ⊆ C ′ ⊆ [k], r̃ ∈ PC , s̃′ ∈ PC ′ and r̃ ≤ s̃′ in Zd . In this case we can write C = {a1 , . . . , aℓ } and C ′ = {b1 , . . . , bh } where ℓ ≤ h. If r̃ = (pa1 i1 + 1)ẽi1 + · · · + (paℓ iℓ + 1)ẽiℓ ∈ PC and s̃′ = (pb1 i1 + 1)ẽi1 + · · · + (pbh ih + 1)ẽih ∈ PC ′ , then, since r̃ ≤ s̃′ there is a projective image s̃ of s̃′ , which we can assume has the form s̃ = (pb1 i1 + 1)ẽi1 + · · · + (pbℓ iℓ + 1)ẽiℓ , such that r̃ ≤ s̃. As in the proof of the previous Lemma 6.3, if r̃ 6= s̃ then there is a coordinate, say i1 for simplicity, with pa1 i1 < pb1 i1 . Also, since r̃ < s̃ we cannot have b1 ∈ {a1 , . . . , aℓ } and so C ′ = {b1 , a1 , . . . , aℓ } ⊂ {a1 , . . . , aℓ }. Since ij ∈ Baj (C ′ ) for 1 ≤ j ≤ ℓ we also get in this case a contradiction to the fact that r̃ ∈ PC . We summarize in the following Lemma. Lemma 6.4. Let Q = {p̃1 , . . . , p̃k } be an order-generic antichain in Zd and suppose C ⊆ C ′ ⊆ [k], r̃ ∈ PC and s̃′ ∈ PC ′ . If r̃ ≤ s̃′ , then r̃ = s̃ where s̃ is a projective image of s̃′ , and this can only occur when C ′ = C and s̃′ = s̃ = r̃. By Lemmas 6.3 and 6.4 we have in particular that the union We therefore have the following. S ∅6=C⊆[k] PC is an antichain in Zd . Proposition 6.5. For an order-generic antichain Q = {p̃1 , . . . , p̃k } in Zd we have [ (14) Su (D(Q∗ (−1̃, b̃))) = PC , ∅6=C⊆[k] 22 where the sets PC are as in (11). Remarks. (i) Note that (14) does not hold when Q is not order-generic, since the union on the right is not in general an antichain. (ii) Although the union on the right in (14) is not, in general, disjoint, it does yield an inclusion/exclusion-like formula for explicit enumeration for an order-generic Q. This will be demonstrated here below for the case k = 3. The case when k = 3. Here we assume that our order-generic antichain Q = {p̃1 , p̃2 , p̃3 } ⊆ Zd0 contains three points. This case, as we will see, is considerably more complicated than the case k = 2. For distinct i1 , i2 , i2 ∈ [d] and d d d D = D(p̃1 , p̃2 , p̃3 , b̃(1), . . . , b̃(i1 ), . . . , b̃(i2 ), . . . , b̃(i3 ), . . . , b̃(d)) we have by Corollary 6.2 that Su (D) = {(pα(1)i1 + 1)ẽi1 + (pα(2)i2 + 1)ẽi2 + (pα(3)i3 + 1)ẽi3 }, if there is a unique permutation α ∈ S3 with pα(1)i1 < pα(2)i1 , pα(3)i1 ; pα(2)i2 < pα(1)i2 , pα(3)i2 ; and pα(3)i3 < pα(1)i3 , pα(2)i3 and Su (D) = ∅ otherwise. For {u, v, w} = {1, 2, 3} we will write the parts of [d] as defined in (9) in the following way: Au,v,w = {i ∈ [d] : pui < pvi < pwi }, Auv,w = {i ∈ [d] : pui = pvi < pwi }, Au,vw = {i ∈ [d] : pui < pvi = pwi }, and A123 = {i ∈ [d] : p1i = p2i = p3i }. In this way our pseudo-partition of [d] from in (9) becomes: [d] = A123 ∪ A12,3 ∪ A13,2 ∪ A23,1 ∪ A1,23 ∪ A2,13 ∪ A3,12 (15) ∪ A1,2,3 ∪ A1,3,2 ∪ A2,1,3 ∪ A2,3,1 ∪ A3,1,2 ∪ A3,2,1 . As Su (Q∗ (−1̃, b̃) is the antichain formed by the maximal elements of all the d+3 d = d+3 3 possible singletons Su (D), where D ⊆ Q∗ (−1̃, b̃) contains exactly d elements, then there are three types of points in Su (Q∗ (−1̃, b̃): those ones obtained from a d-set D that contains all the three points of 23 Q = {p̃1 , p̃2 , p̃3 }, those obtained from a D that contain exactly two points of Q, and finally those obtained from a D that contain exactly one of p̃1 , p̃2 or p̃3 . In order to facilitate our notation and presentation we define the following subsets of [d], where {u, v, w} = {1, 2, 3}: Bhu,vi := Auw,v ∪ Aw,u,v , B hui := Av,w,u ∪ Aw,v,u ∪ Avw,u , B hu∗i := Aw,uv ∪ Av,uw , that is Bhu,vi contains all the coordinates i ∈ [d] where pui < pvi and pui is not the sole minimum, B hui contains all the coordinates i ∈ [d] where pui is the sole maximum among pui , pvi and pwi and B hu∗i contains those coordinates i where pui and exactly one of the other two, pvi or pwi , are the maximum ones. By (12) the set of points in Su (Q∗ (−1̃, b̃) that are formed by the sets Su (D) where D ⊆ Q∗ (−1̃, b̃) contain all the three points of Q = {p̃1 , p̃2 , p̃3 }, is then given by (16) P[3] = {(p1i1 + 1)ẽi1 + (p2i2 + 1)ẽi2 + (p3i3 + 1)ẽi3 : (i1 , i2 , i3 ) ∈ B1 ([3]) × B2 ([3]) × B3 ([3])}. When {u, v, w} = {1, 2, 3} then we have Bu ({u, v}) × Bv ({u, v}) \ Bu ([3]) × Bv ([3]) = Bhu,vi × Bhv,ui ∪ Bhu,vi × Bv ([3]) ∪ Bu ([3]) × Bhu,vi and hence the set Pŵ = Puv of points in Su (Q∗ (−1̃, b̃) formed by the sets Su (D) where D contains exactly two points p̃u and p̃v are by (13) given by (17) P{u,v} = {(pui + 1)ẽi + (pvj + 1)ẽj : (i, j) ∈ Bhu,vi × Bhv,ui ∪ Bhu,vi × Bv ([3]) ∪ Bu ([3]) × Bhu,vi }. Lastly, the set of points in Su (Q∗ (−1̃, b̃) formed by the sets Su (D) where D contains exactly one point p̃i ∈ Q is given by P{u} = {(pui + 1)ẽi : i ∈ B hui ∪ B hu∗i ∪ A123 }. (18) Note that for {u, v, w} = {1, 2, 3} we have ∩  Bhu,vi × Bhv,ui ∪ Bhu,vi × Bv ([3]) ∪ Bu ([3]) × Bhu,vi  Bhu,wi × Bhw,ui ∪ Bhu,wi × Bv ([3] ∪ Bu ([3]) × Bhu,wi ) = Bhui × Avw,u and hence by Lemma 6.3 we have the following. 24 Claim 6.6. Two points r̃ ∈ P{u,v} and s̃ ∈ P{u,w} are comparable in Zd0 if and only they are equal in which case r̃ = s̃ = (pui + 1)ẽi + (pvj + 1)ẽj , where (i, j) ∈ Bhui × Avw,u . This claim together with (17) makes it possible to enumerate the maximal elements in the union P{u,v} ∪ P{u,w} in a direct manner. By symmetry and the above Claim 6.6 we have that if two points in P{u,v} and P{v,w} respectively are comparable, then the must be equal, say to (pui + 1)ẽi + (pvj + 1)ẽj where (i, j) ∈ Auw,v × Bhvi . Since (Bhui × Avw,u ) ∩ (Auw,v × Bhvi ) = ∅ we have, in particular, that no three points in P{u,v} , P{u,w} and P{v,w} respectively, are pairwise comparable in Zd0 . Lastly, consider the sets P{1} , P{2} and P{3} from (18). Since for any distinct u, v ∈ {1, 2, 3} we have (B hui ∪ B hu∗i ∪ A123 ) ∩ (B hvi ∪ B hv∗i ∪ A123 ) = Aw,uv ∪ A123 , then clearly two comparable elements in P{u} and P{v} respectively must be equal. Also note that P{1} ∩ P{2} ∩ P{3} = {(pui + 1)ẽi : i ∈ A123 }. Convention. For an upper case letter X ∈ {A, B} we denote the cardinality of X∗ , X ∗ by the corresponding lower case boldface letter x∗ and x∗ respectively, so |A12,3 | = a12,3 , |B h2∗i | = bh2∗i etc. With this convention we can now list and also enumerate the elements in Su (Q∗ (−1̃, b̃) by the inclusion/exclusion principle in the following. Proposition 6.7. For an order-generic antichain Q = {p̃1 , p̃2 , p̃3 } of Zd0 and the corresponding pseudo-partition of [d] as in (15), we have Su (D(Q∗ (−1̃, b̃))) = P{1,2,3} ∪ P{1,2} ∪ P{1,3} ∪ P{2,3} ∪ P{1} ∪ P{2} ∪ P{3} , where P{1,2,3} , P{u,v} and each P{u} are as in (16), (17) and (18) respectively. Further, the cardinality is given by |Su (D(Q∗ (−1̃, b̃)))| = b1 ([3])b2 ([3])b3 ([3]) + bh1,2i bh2,1i + bh1,2i bh2i + bh1i bh2,1i + bh1,3i bh3,1i + bh1,3i bh3i + bh1i bh3,1i + bh2,3i bh3,2i + bh2,3i bh3i + bh2i bh3,2i − (bh1i a23,1 + bh2i a13,2 + bh3i a12,3 ) + bh1i + bh2i + bh3i + a3,12 + a2,13 + a1,23 + a123 . Remark. Unlike the presentation in Proposition 5.8 and Corollary 5.9 the presentation for the antichain Su (D(Q∗ (−1̃, b̃))) as a union in Proposition 6.7 is symmetric, however it is not a disjoint union, as that would be quite convoluted and confusing. 25 Corollary 6.8. For an order-generic antichain Q = {p̃1 , p̃2 , p̃3 } of Zd0 , the unique local zero di- mensional type 3 monomial ideal I of R = K[x1 , . . . , xd ] with ∂oc(I) = {x̃p̃1 , x̃p̃2 , x̃p̃3 } is given by I = (x̃r̃ : r̃ ∈ Su (D(Q∗ (−1̃, b̃)))} where Su (D(Q∗ (−1̃, b̃))) is as in Proposition 6.7. Remarks. (i) Corollary 6.8 characterizes completely those monomial ideals I of R = K[x1 , . . . , xd ] that make R/I a local Artinian ring of type 3, where ∂oc(I) corresponds to an order-generic antichain in Zd in a purely combinatorial way, using only the poset structure of Zd . (ii) Note that since Su (D(Q∗ (−1̃, b̃))) is an antichain, then I as presented in Corollary 6.8 is exactly its minimal generation, that is, {x̃r̃ : r̃ ∈ Su (D(Q∗ (−1̃, b̃)))} is the unique Gröbner basis for I. 7. Socles of general ideals We have so far only been interested in the combinatorial properties of monomial ideals of R = K[x1 , . . . , xd ] that can described solely in terms of the monoid [x1 , . . . , xd ] viewed as a poset, where the partial order is given by divisibility. As a consequence, the role of the field K has so far not played a major role in our investigations on monomial ideals. We have at times further assumed our monomial ideal I ⊆ R to be positive, that is I ⊆ (x1 · · · xd ), or each (generating) monomial x̃p̃ of I having p̃ ∈ Nd . Also, we so far only considered the the socle Soc(I) = Socm (I) of R w.r.t. the specific maximal ideal m = (x1 , . . . , xd ) ⊆ R. Just to quickly iterate that we are not gaining anything by allowing K-linear combination when considering monomial ideals, we note that that for a monomial ideal I = (x̃p̃1 , . . . , x̃p̃k ) ⊆ R the set of its generators M = {x̃p̃1 , . . . , x̃p̃k } is always a Gröbner basis for I w.r.t. any term order on [x1 , . . . , xd ]. As a result, a fully reduced polynomial f ∈ R \ {0} is exactly a linear combination of fully reduced monomials w.r.t. I, that is, those monomials that do not reduce to zero in R/I. In particular we have the following. Observation 7.1. If I ⊆ R = K[x1 , . . . , xd ] is a monomial ideal, then the socle of R/I w.r.t. the maximal ideal m = (x1 , . . . , xd ) is exactly the set of all K-linear combinations of the monomials of the socle, Soc(I) = SpanK ({x̃r̃ : x̃r̃ ∈ Soc(I)}). 26 In this section we show that even in these mentioned seemingly restrictive case, we have managed to capture many of the interesting combinatorial properties of the socle of a general ideal w.r.t. a maximal ideal. √ First we recall some notations and facts from commutative ring theory. For an ideal I ⊆ R let I = {f ∈ R : f n ∈ I for some n ∈ N} denote the radical of I. For a field K and R = K[x1 , . . . , xd ] then V (I) = {ã ∈ K d : f (ã) = 0 for all f ∈ I} is the affine variety defined by I. For a subset U ⊆ K d we let I(U ) = {f ∈ R : f (ã) = 0 for all ã ∈ U } denote the ideal of all polynomials in R that vanish on U . For any field K and a point ã ∈ K d then clearly (x1 −a1 , . . . , xd −ad ) ⊆ R is a maximal ideal. For the converse, we recall an important corollary of Hilbert’s Nullstellensatz [AM69, p. 85] and [Alu09, p. 410] as the following [Alu09, Cor. 2.10, p. 406]. Theorem 7.2. If K is an algebraically closed field, then an ideal of K[x1 , . . . , xd ] is maximal if and only if it has the form mã = (x1 − a1 , . . . , xd − ad ) for some ã ∈ K d . Recall the following theorem from [AM69, Prop. 1.11] on prime avoidance: Theorem 7.3. Let p1 , . . . , pk be prime ideals in a commutative ring. If I ⊆ then I ⊆ pi for some i. Sk i=1 pi is an ideal, Since R = K[x1 , . . . , xd ] is Noetherian, every ideal I ⊆ R has a primary decomposition I = Tk √ qi be the associated q p i=1 i which we can assume to be minimal (or reduced). For each i let i = prime ideal. The set {p1 , . . . , pk } of associated primes of the ideal I is uniquely determined by I and is always a finite set. Suppose m ⊆ R is a maximal ideal containing the ideal I is such that Socm (I) is nontrivial, so Socm (I) = (I : m) 6= I. Since I 6= (I : m) = \ (I : f ), f ∈m then for each f ∈ m we have (I : f ) 6= I as well, and so by [AM69, Prop. 4.7] we then have m ⊆ {f ∈ R : (I : f ) 6= I} = k [ pi . i=1 By Theorem 7.3 above we therefore have that m ⊆ pi for some i, and since m is maximal we have m = pi . We summarize in the following. Proposition 7.4. If R is a Noetherian ring, I ⊆ R an ideal and m ⊆ R a maximal ideal containing I such that Socm (I) = (I : m) 6= I, then m is one of the finitely many associated prime ideals of I. 27 If now I ⊆ R = K[x1 , . . . , xd ] is a monomial ideal then every associated prime of I is a face ideal, or a Stanley-Reisner ideal [MS05, p. 19], that is an ideal of the form (xi1 , . . . , xih ) (See [Vil01, Prop. 5.1.3].) Hence, if m ⊆ R is a maximal ideal such that Socm (I) 6= I, then by Proposition 7.4 m must be a face ideal and so we have the following. Proposition 7.5. If K is a field, I ⊆ R = K[x1 , . . . , xd ] a monomial ideal and m ⊆ R a maximal ideal containing I such that Socm (I) = (I : m) 6= I, then m = (x1 , . . . , xd ). If now K is algebraically closed, then by Theorem 7.2 we have a bijective correspondence between points ã ∈ K d and maximal ideals mã = (x1 − a1 , . . . , xd − ad ) of R = K[x1 , . . . , xd ]. Observation 7.6. Let R = K[x1 , . . . , xd ] where K is algebraically closed and I ⊆ R a proper ideal. A maximal ideal m of R contains I if and only if m = mã for some ã ∈ V (I). For an ideal I ⊆ R = K[x1 , . . . , xd ] where K is algebraically closed and mã a maximal ideal containing I let Socã (I) := Socmã (I) = (I : mã ) denote the socle of I w.r.t. the maximal ideal mã . By Proposition 7.4 the following. Corollary 7.7. If K is an algebraically closed field and I ⊆ R = K[x1 , . . . , xd ] is an ideal of R, then for all but finitely many points ã ∈ V (I) the socle Socã (I) = I is trivial. Also, directly by Proposition 7.5 do we have the following corollary. Corollary 7.8. If K is an algebraically closed field, I ⊆ R = K[x1 , . . . , xd ] is a monomial ideal of R and Socã (I) 6= I, then ã = 0̃. As the combinatorial properties we want to investigate can be phrased in terms of the monoid [x1 , . . . , xd ] of indeterminates as a poset, we obtain virtually the same combinatorial properties of our monomial ideal I ⊆ R = K[x1 , . . . , xd ] regardless of what the field K is. Hence, we might as well look at the extended ideal I = IK[x1 , . . . , xd ] where K is the algebraic closure of K. This is so, since for any vector space (in particular ideals) W over K, then B is a basis for W as a vector space over K if, and only if, B is a basis for W ⊗K K as a vector space over K. In particular R := K[x1 , . . . , xd ] = K ⊗K K[x1 , . . . , xd ], and in general for any ideal I ⊆ R the corresponding ideal I of R has the form I = I ⊗K K. Hence, as we have been almost exclusively focusing on the bases of the socle of a monomial ideal consisting of monomials alone, we will not lose any of the combinatorial poset structure of the bases by tensoring with K, that is, assuming K is algebraically 28 closed. In that case, as stated earlier, Theorem 7.2 yields a bijective correspondence between points of K d and maximal ideals of R. At this point two natural questions arise: (1) What ideals I ⊆ R have their socles Socã (I) trivial for all ã ∈ V (I)? (2) Knowing just the socle Socã (I) of an a priori unknown ideal I of R, can we retrieve the ideal I? In general, the second question has a negative answer. However, in numerous specific cases the answer is positive, for example if we know I has dimension zero, or if we know the socle to be trivial. We consider the first question for I = (f ) a principal ideal of R = K[x1 , . . . , xd ]. Since R is a UFD we can write f = r1b1 · · · rhbh where each ri is irreducible in R. In this case we have the following minimal primary decomposition of I as I= h \ (ribi ), i=1 and the unique set of associated primes {p1 , . . . , ph } where pi = q (ribi ) = (ri ) for each i. For d ≥ 2 then clearly none of these principal prime ideals pi are maximal ideals of R, and hence, by Proposition 7.4, Socã (I) must be trivial. Observation 7.9. If I ⊆ R = K[x1 , . . . , xd ] is a principal ideal where K is algebraically closed and d ≥ 2, then Socã (I) = I is trivial for all ã ∈ V (I). When I is generated by two or more elements from R, things are, needless to say, more involved, and it seems we must apply the Euclidean algorithm to obtain Gröbner bases for the ideal, in order to conclude something fruitful – we leave that as a question in the next section. 8. Summary and further questions We briefly discuss some of the main results in this article and post some some relevant and motivating questions. Presenting everything in terms of Zd or Nd0 provided with the componentwise partial order, we showed in Theorem 3.2 and its slight generalization Theorem 3.4 that a given antichain G of Zd (corresponding to a monomial ideal of the polynomial ring in d variables) can always be retrieved from the set Sd (U (G∗ )) alone, or more generally from Sd (U (G∗ (ã.b̃))) as stated in Theorem 3.4. 29 As a consequence, the monomial ideal I can always be retrieved from a specific derived version of ∂oc(I) and also from a more general derived version of it socle as stated in Theorem 3.4. The main results in Section 4 are Theorem 4.2 and Theorem 4.3 which are duals of the previously mentioned Theorems 3.2 and 3.4. This shows that any antichain Q in Nd is indeed the socle for a monomial ideal whose minimal generators correspond to U (Su (D(Q∗ ))) or more generally to U (Su (D(Q∗ (ã, b̃)))) in Theorem 3.4. As a consequence, for any set of incomparable monomials in the monoid [x1 , . . . , xd ] w.r.t. divisibility, there are monomials ideals I with the given set of monomials as ∂oc(I). In Section 5 we focused on Artinian monomial ideals and obtained some structure theorems for zero dimensional local type k rings R/I where I is a monomial ideal and k = 1, 2. In Section 6 we obtained some results for zero dimensional local type k rings R/I when k ≥ 3 and where we assumeed ∂oc(I), or rather the power points of the corresponding monomials, to be order-generic. This yielded a specific enumeration of the minimal generators of I in Proposition 6.7. In the last Section 7 we stated some observations about socles of general ideals of Noetherian rings and argued that a lot of the interesting combinatorics really is captured by monomial ideals. There are still many questions worth considering related to what has been covered. Question 8.1. Let K be algebraically closed, and I ⊆ R = K[x1 , . . . , xd ] an ideal such that that Socã (I) = I is trivial for all ã ∈ V (I). Can we conclude something about the Gröbner basis for I w.r.t. some term order? Question 8.2. Can we generalize the results to general ideals, using Gröbner bases in terms of some term orders? If not, perhaps one can obtain similar results for toric ideals, since there all relations can be obtained and described within the monoid [x1 , . . . , xd ] ⊆ R. Question 8.3. When translating the results in previous sections into results for polynomial rings R = K[x1 , . . . , xd ], or general Noetherian rings for that matter, and their ideals, can anything be phrased simpler by using the ring structure instead or in addition to the partial order on the monomials induced by divisibility? References [A00] https://oeis.org/A000670. [AF74] Frank W. Anderson and Kent R. Fuller, Rings and categories of modules, Graduate Texts in Mathematics, vol. 13, Springer-Verlag, New York-Heidelberg, 1974. 30 [Agn97] Geir Agnarsson, The number of outside corners of monomial ideals, J. Pure Appl. Algebra 117/118 (1997), 3–21. [Agn00] , Co-generators for algebras over fields and commutative applications, Comm. Algebra 28 (2000), no. 9, 4071–4087. [AL94] William W. Adams and Philippe Loustaunau, An introduction to Gröbner bases, Graduate Studies in Mathematics, vol. 3, Amer. Math. Soc., Providence, RI, 1994. [Alu09] Paolo Aluffi, Algebra: chapter 0, Graduate Studies in Mathematics, vol. 104, Amer. Math. Soc., Providence, RI, 2009. [AM69] Michael Francis Atiyah and Ian G. Macdonald, Introduction to commutative algebra, Addison-Wesley, Reading, Mass.-London-Don Mills, Ont., 1969. [Bei93] Mark B. Beintema, A note on Artinian Gorenstein algebras defined by monomials, Rocky Mountain J. Math. 23 (1993), no. 1, 1–3. [BH97] Winfried Bruns and Jürgen Herzog, Cohen-Macaulay rings, revised ed., Cambridge Studies in Advanced Mathematics, no. 39, Cambridge Univ. Press, Cambridge, 1997. [BPS98] Dave Bayer, Irena Peeva, and Bernd Sturmfels, Monomial resolutions, Math. Res. Lett. 5 (1998), no. 1-2, 31–46. [BW93] Thomas Becker and Volker Weispfenning, Gröbner bases, Graduate Texts in Mathematics, vol. 141, SpringerVerlag, New York, 1993, A computational approach to commutative algebra. In cooperation with Heinz Kredel. [Eis95] David Eisenbud, Commutative algebra with a view toward algebraic geometry, Graduate Texts in Mathematics, vol. 150, Springer-Verlag, New York, 1995. [GP06] Edgar G. Goodaire and Michael M. Parmenter, Discrete mathematics with graph theory, 3rd ed., Pearson Prentice Hall, 2006. [HV06] Craig Huneke and Adela Vraciu, Rings that are almost Gorenstein, Pacific J. Math. 225 (2006), no. 1, 85–102. [Mac94] Francis Sowerby Macaulay, The algebraic theory of modular systems, Cambridge Mathematical Library, Cambridge Univ. Press, Cambridge, 1994, Revised reprint of the 1916 original. With an introduction by Paul Roberts. [MS05] Ezra Miller and Bernd Sturmfels, Combinatorial commutative algebra, Graudate Texts in Mathematics, vol. 227, Springer-Verlag, New York, 2005. [OBn] https://en.wikipedia.org/wiki/Ordered_Bell_number. [Sca86] Herbert E. Scarf, Neighborhood systems for production sets with indivisibilities, Econometrica 54 (1986), no. 3, 507–534. [Sti] https://en.wikipedia.org/wiki/Stirling_numbers_of_the_second_kind. [Vil01] Rafael H. Villarreal, Monomial algebras, Monographs and Textbooks in Pure and Applied Mathematics, vol. 238, Marcel Dekker, Inc., New York, 2001. [Wol16] Anna-Rose G. Wolff, The survival complex, arXiv:1602.08998 [math.AC], 2016. 31 Department of Mathematical Sciences, George Mason University, Fairfax, VA 22030 E-mail address: [email protected] Department of Mathematical Sciences, George Mason University, Fairfax, VA 22030 E-mail address: [email protected] 32
0math.AC
Minor-free graphs have light spanners arXiv:1711.00821v1 [cs.DS] 2 Nov 2017 Glencora Borradaile Oregon State University [email protected] Hung Le Oregon State University [email protected] Christian Wulff-Nilsen University of Copenhagen [email protected] Abstract We show that every H-minor-free graph has a light (1+)-spanner, resolving an open problem of Grigni and Sissokho [13] and proving a conjecture of Grigni and Hung [12]. Our lightness bound is   σH 1 log O 3  p where σH = |V (H)| log |V (H)| is the sparsity coefficient of H-minor-free graphs. That is, it has a practical dependency on the size of the minor H. Our result also implies that the polynomial time approximation scheme (PTAS) for the Travelling Salesperson Problem (TSP) in H-minor-free graphs by Demaine, Hajiaghayi and Kawarabayashi [7] is an efficient PTAS 1 1 whose running time is 2OH ( 4 log  ) nO(1) where OH ignores dependencies on the size of H. Our techniques significantly deviate from existing lines of research on spanners for H-minor-free graphs, but build upon the work of Chechik and Wulff-Nilsen for spanners of general graphs [6]. 1 Introduction Peleg and Schäffer [18] introduced t-spanners of graphs as a way to sparsify graphs while approximately preserving pairwise distances between vertices. A t-spanner of a graph G is a subgraph S of G such that dS (x, y) ≤ t · dG (x, y) for all vertices x, y 1 . Two parameters of t-spanners that are of interest are their sparsity and lightness. The sparsity of S is the ratio of the number of edges to the number of vertices of S. The lightness of S is the ratio of the total weight of the edges of S to the weight of an MST of G; generally, we assume that MST(G) ⊆ S (and so MST(S) = MST(G)). Here, we are concerned with the lightness of (1 + )-spanners, where  < 1, and so we refer to (1 + )-spanners simply as spanners. We say that a spanner is light if the lightness does not depend on the number of vertices in the graph. Grigni and Sissokho [13] showed that H-minor-free graphs have spanners of lightness  O 1 σH log n . (1) p where σH = |V (H)| log |V (H)| is the sparsity coefficient of H-minor-free graphs; namely that p an H-minor-free graph of n vertices has O(|V (H)| log |V (H)|n) edges2 [17]. Later Grigni and 1 2 We use standard graph terminology, which can be found in Appendix A. This bound is tight [21]. 1 Hung [12], in showing that graphs of bounded pathwidth have light spanners, conjectured that H-minor-free graphs also have light spanners; that is, that the dependence on n can be removed from the lightness above. In this paper, we resolve this conjecture positively, proving: Theorem 1. Every H-minor-free graph G has a (1 + )-spanner of lightness   σH 1 O log . 3  (2) Our algorithm consists of a reduction phase and a greedy phase. In the reduction phase, we adopt a technique of Chechik and Wulff-Nilsen [6]: edges of the graph are subdivided and their weights are rounded and scaled to guarantee that every MST-edge has unit weight and we include all very low weight edges in the spanner (Appendix C). In the greedy phase, we use the standard greedy algorithm for constructing a spanner to select edges from edges of the graph not included in the reduction phase (Appendix B). As a result of the reduction phase, our spanner is not the ubiquitous greedy spanner. However, since Filtser and Solomon have shown that greedy spanners are (nearly) optimal in their lightness [10], our result implies that the greedy spanner for H-minor-free graphs is also light. 1.1 Implication: Approximating TSP Light spanners have been used to give PTASes, and in some cases efficient PTASes, for the traveling salesperson problem (TSP) on various classes of graphs. A PTAS, or polynomial-time approximation scheme, is an algorithm which, for a fixed error parameter , finds a solution whose value is within 1 ±  of optimal in polynomial time. A PTAS is efficient if its running time is f ()nO(1) where f () is a function of . Rao and Smith [19] used light spanners of Euclidean graphs to give an EPTAS for Euclidean TSP. Arora, Grigni, Karger, Klein and Woloszyn [2] used light spanners of planar graphs, given by Althöfer, Das, Dobkin, Joseph and Soares [1], to design a PTAS for TSP 1 1 in planar graphs with running time nO( 2 ) . Klein [15] improved upon this running time to 2O( 2 ) n by modifying the PTAS framework, using the same light spanner. Borradaile, Demaine and Tazari generalized Klein’s EPTAS to bounded genus graphs [4]. In fact, it was in pursuit of a PTAS for TSP in H-minor-free graphs that Grigni and Sissokho discovered the logarithmic bound on lightness (Equation (1)); however, the logarithmic bound implies only a quasi-polynomial time approximation scheme (QPTAS) for TSP [13]. Demaine, Hajiaghayi and Kawarabayashi [7] used Grigni and Sissokho’s spanner to give a PTAS for TSP 1 in H-minor-free graphs with running time nO(poly(  )) ; that is, not an efficient PTAS. However, Demaine, Hajiaghayi and Kawarabayashi’s PTAS is efficient if the spanner used is light. Thus, the main result of this paper implies an efficient PTAS for TSP in H-minor-free graphs. 1.2 Techniques In proving the lightness of spanners in planar graphs [1] and bounded genus graphs [11], the embedding of the graph was heavily used. Thus, it is natural to expect that showing minorfree graphs have light spanners would rely on the decomposition theorem of minor-free graphs by Robertson and Seymour [20], which shows that graphs excluding a fixed minor can be decomposed into the clique-sum of graphs nearly embedded on surfaces of fixed genus. Borradaile and Le [5] use this decomposition theorem to show that if graphs of bounded treewidth have light spanners, 2 then H-minor-free graphs also have light spanners. As graphs of bounded treewidth are generally regarded as easy instances of H-minor-free graphs, it may be possible to give a simpler proof of lightness of spanners for H-minor-free graphs using this implication. However, relying on the Robertson and Seymour decomposition theorem generally results in constants which are galactic in the size of the the minor [16, 14]. In this work, we take a different approach which avoids this problem. Our method is inspired from the recent work of Chechik and Wulff-Nilsen [6] on spanners for general graphs which uses an iterative super-clustering technique [3, 8]. Using the same technique in combination with amortized analysis, we show that H-minor-free graphs not only have light spanners, but also that the dependency of the lightness on  and |V (H)| is practical (Equation (2)). At a high level, our proof shares several ideas with the work of Chechik and Wulff-Nilsen [6] who prove that (general) graphs have (2k − 1) · (1 + )-spanners with lightness O (n1/k ), removing a factor of k/ log k from the previous best-known bound and matching Erdős’s girth conjecture [9] up to a 1 +  factor. Our work differs from Chechik and Wulff-Nilsen in two major aspects. First, Chechik and Wulff-Nilsen reduce their problem down to a single hard case where the edges of the graph have weight at most g k for some constant g. In our problem, we must partition the edges according to their weight along a logarithmic scale and deal with each class of edges separately. Second, we must employ the fact that H-minor-free graphs (and their minors) are sparse in order to get a lightness bound that does not depend on n. 1.3 Future directions Since we avoid relying on Robertson and Seymour’s decomposition theorem and derive bounds using only the sparsity of graphs excluding a fixed minor, it is possible this technique could be extended to related spanner-like constructions that are used in the design of PTASes for connectivity problems. Except for TSP, many connectivity problems [4] have PTASes for bounded genus graphs but are not known to have PTASes for H-minor-free graphs – for example, subset TSP and Steiner tree. The PTASes for these problems rely on having a light subgraph that approximates the optimal solution within 1 +  (and hence is spanner-like). The construction of these subgraphs, though, rely heavily on the embedding of the graph on a surface and since the Robertson and Seymour decomposition gives only a weak notion of embedding for H-minor-free graphs, pushing these PTASes beyond surface embedded-graphs does not seem likely. The work of this paper may be regarded as a first step toward designing spanner-like graphs for problems such as subset TSP and Steiner tree that do not rely on the embedding. 2 Bounding the lightness of a (1 + )-spanner As we already indicated, we start with a reduction that allows us to assume that the edges of the MST of the graph each have unit weight. (For details, see Appendix C.) For simplicity of presentation, we will also assume that the spanner is a greedy (1 + s · ))-spanner for a sufficiently large constant s; this does not change the asymptotics of our lightness bound. Herein, we let S be the edges of a greedy (1 + s · )-spanner of graph G with an MST having edges all of unit weight. We simply refer to S as the spanner. The greedy spanner considers the edges in non-decreasing order of weights and adds an edge xy if (1 + s · )w(xy) is at most the x-to-y distance in the current spanner (see Appendix B for a review). 3 We partition the edges of S according to their weight as it will be simpler to bound the weight of subsets of S. Let J0 be the edges of S of weight in the range [1, 1 ); note that MST ⊆ J0 and, since G has O(σH n) edges and w(MST) = n − 1, σ  H w(J0 ) = O(σH n/) = O w(MST) (3)  j j+1 Let Πij be the edges of S of weight in the range [ 2i , 2 i ) for every i ∈ Z+ and j ∈ {0, 1, . . . , dlog 1 e}. Let Jj = ∪i Πij . We will prove that Lemma 2. There exists a set of spanner edges B such that w(B) = O( 12 w(MST)) and for every j ∈ {0, . . . , dlog 1 e}, σ  H w(MST). w (MST ∪(Jj \ B)) = O 3 Combined with Equation (3), Lemma 2 gives us dlog 1 e w(S) = w(B) + X  w(Jj \ B) = O j=0 σH 1 log 3    w(MST) which, combined with the reduction to unit-weight MST-edges, proves Theorem 1 (noting that the stretch condition of S is satisfied since S is a greedy spanner of G). In the remainder, we prove Lemma 2 for a fixed j ≥ 0. Let Ei = Πij for this fixed j and some j+1 i ∈ Z+ . Let `i = 2 i ; then, the weight of the edges in Ei are in the range [`i /2, `i ). Let E0 = MST. We refer to the indices 0, 1, 2, . . . of the edge partition as levels. 2.1 Proof overview To prove Lemma 2,we use an amortized analysis, initially assigning each edge of E0 = MST a credit of c = O σH3 . For each level, we partition the vertices of the spanner into clusters where each cluster is defined by a subgraph of the graph formed by the edges in levels 0 through i. (Note that not every edge of level 0 through i may belong to a cluster; some edges may go between clusters.) Level i − 1 clusters are a refinements of level i clusters. We prove (by induction over the levels), that the clusters for each level satisfy the following diameter-credit invariants: DC1 A cluster in level i of diameter k has at least c · max{k, `2i } credits. DC2 A cluster in level i has diameter at most g`i for some constant g > 2 (specified later). We achieve the diameter-credit invariants for the base case (level 0) as follows. Although a simpler proof could be given, the following method we use will be revisited in later, more complex, constructions. Recall that E0 = MST and that, in a greedy spanner, the shortest path between endpoints of any edge is the edge itself. If the diameter of E0 is < `0 /2 = O(1), edges in the spanner have length at most `0 /2. Thus, it is trivial to bound the weight of all the spanner edges across all levels using the sparsity of H-minor-free graphs. Assuming a higher diameter, let T be a maximal collection of vertex-disjoint subtrees of E0 , each having diameter d`0 /2e (chosen, for example, greedily). Delete T from E0 . What is left is a set of trees T 0 , each of diameter < `0 /2. 4 For each tree T ∈ T , let CT be the union of T with any neighboring trees in T 0 (connected to T by a single edge of E0 ). By construction, CT has diameter at most 3`0 /2 + 1 ≤ 2`0 (giving DC2). CT is assigned the credits of all the edges in the cluster each of which have credit c (giving DC1). We build the clusters for level i from the clusters of level i − 1 in a series of four phases (Section 3). We call the clusters of level i − 1 -clusters, since the diameter of clusters in level i − 1 are an -fraction of the diameters of clusters in level i. A cluster in level i is induced by a group of -clusters. We try to group the -clusters so that the diameter of the group is smaller than the sum of the diameters of the -clusters in the group (Phases 1 to 3). This diameter reduction will give us an excess of credit beyond what is needed to maintain DC1 which allows us to pay for the edges of Ei . We will use the sparsity of H-minor free graphs to argue that each -cluster needs to pay for, on average, a constant number of edges of Ei . In Phase 4, we further grow existing clusters via MST edges and unpaid edges of Ei . Showing that the clusters for level i satisfy invariant DC2 will be seen directly from the construction. However, satisfying invariant DC1 is trickier. Consider a path D witnessing the diameter of a level-i cluster B. Let D be the graph obtained from D by contracting -clusters; we call D the cluster-diameter path. The edges of D are a subset of MST ∪Ei . If D does not contain an edge of Ei , the credits from the -clusters and MST edges of D are sufficient for satisfying invariant DC1 for B. However, since edges of Ei are not initialized with any credit, when D contains an edge of Ei , we must use credits of the -clusters of B outside D to satisfy DC1 as well as pay for Ei . Finally, we need to pay for edges of Ei that go between clusters. We do so in two ways. First, some edges of Ei will be paid for by this level by using credit leftover after satisfying DC1. Second, the remaining edges will be paid for at the end of the entire process (over all levels); we show that there are few such edges over all levels (the edges B of Lemma 2). In our proof below, the fixed constant g required in DC2 is roughly 100 and  is sufficiently smaller than g1 . For simplicity of presentation, we make no attempt to optimize g. We note that a (1 + )-spanner is also a (1 + 2)-spanner for any constant  and the asymptotic dependency of the lightness on  remains unchanged. That is, requiring that  is sufficiently small is not a limitation on the range of the parameter . 3 Achieving diameter-credit invariants In this section, we construct clusters for level i that satisfy DC2 using the induction hypothesis that -clusters (clusters of level i − 1) satisfy the diameter-credit invariants (DC1 and DC2). Since `i−1 = `i , we let ` = `i , and drop the subscript in the remainder. For DC2, we need to group -clusters into clusters of diameter Θ(`). Let C be the collection of -clusters and C be the set of clusters that we construct for level i. Initially, C = ∅. We define a cluster graph K(C , Ei ) whose vertices are the -clusters and edges are the edges of Ei . K(C , Ei ) can be obtained from the subgraph of G formed by the edges of the -clusters and Ei by contracting each -cluster to a single vertex. Recall each -cluster is a subgraph of the graph formed by the edges in levels 0 through i − 1. Observation 3. K(C , Ei ) is a simple graph. Proof. Since g` ≤ 2` when  is sufficiently smaller than g1 , there are no self-loops in K(C , Ei ). Suppose that there are parallel edges x1 y1 and x2 y2 where x1 , x2 ∈ X ∈ C and y1 , y2 ∈ Y ∈ C . 5 Let w(x2 y2 ) ≤ w(x1 y1 ), w.l.o.g.. Then, the path P consisting of the shortest x1 -to-x2 path in X, edge x2 y2 and the shortest y1 -to-y2 path in Y has length at most w(x2 y2 ) + 2g` by DC2. Since w(x2 y2 ) ≤ w(x1 y1 ) and w(x1 y1 ) ≥ `/2, P has length at most (1 + 4g)w(x1 y1 ). Therefore, if our spanner is a greedy (1 + 4g)-spanner, x1 y1 would not be added to the spanner. We call an -cluster X high-degree if its degree in the cluster graph is at least 20  , and low-degree otherwise. For each -cluster X, we use C(X) to denote the cluster in C that contains X. To both maintaining diameter-credit invariants and buying edges of Ei , we use credits of -clusters in C(X) and MST edges connecting -clusters in C(X). We save credits of a subset S(X) of -clusters of C(X) and MST-edges connecting -clusters in S(X) for maintaining invariant DC1. We then reserve credits of another subset R(X) of -clusters to pay for edges of of Ei incident to -clusters in S(X) ∪ R(X). We let other -clusters in C(X) \ (S(X) ∪ R(X)) release their credits to pay for their incident edges of Ei ; we call such -clusters releasing -clusters. We designate an -cluster in C(X) to be its center and let the center collect the credits of -clusters in R(X). The credits collected by the center are used to pay for edges of Ei incident to non-releasing -clusters. 3.1 Phase 1: High-degree -clusters In this phase, we group high-degree -clusters. The goal is to ensure that any edge of Ei not incident to a low-degree -cluster has both endpoints in the new clusters formed (possibly in distinct clusters). Then we can use sparsity of the subgraph of K(C , Ei ) induced by the -clusters that were clustered to argue that the clusters can pay for all such edges; this is possible since this subgraph is a minor of G. The remaining edges that have not been paid for are all incident to low-degree -clusters which we deal with in later phases. With all -clusters initially unmarked, we apply Step 1 until it no longer applies and then apply Step 2 to all remaining high-degree -clusters at once and breaking ties arbitrarily: Step 1 If there is a high-degree -cluster X such that all of its neighbor -clusters in K are unmarked, we group X, edges in Ei incident to X and its neighboring -cluster into a new cluster C(X). We then mark all -clusters in C(X). We call X the center -cluster of C(X). Step 2 After Step 1, any unmarked high-degree -cluster, say Y , must have at least one marked neighboring -cluster, say Z. We add Y and the edge of Ei between Y and Z to C(Z) and mark Y . In the following, the upper bound is used to guarantee DC2 and the lower bound will be used to guarantee DC1. Claim 4. The diameter of each cluster added in Phase 1 is at least ` and at most (4 + 5g)`. Proof. Since the clusters formed are trees each containing at least two edges of Ei and since each edge of Ei has weight at least `/2, the resulting clusters have diameter at least `. b in Consider an -cluster X that is the center of a cluster C in Step 1 that is augmented to C b b Step 2 (where, possibly C = C). The upper bound on the diameter of C comes from observing b are connected via at most 5 -clusters and via at most 4 edges of Ei that any two vertices in C (each -cluster that is clustered in Step 2 is the neighbor of a marked -cluster from Step 1). Since b is -clusters have diameter at most g` and edges of Ei have weight at most `, the diameter of C at most (4 + 5g)`. 6 C(X) N(X) X S(X) R(X) Releasing Step 1 Step 2 Phase 4a Phase 1 Phase 1 ediam < 4ℓ Phase 4b Phase 4b Step 1 Step 2 Figure 1: A cluster C(X) formed in Phase 1 is enclosed in the dotted blue curve. The set S(X) consists of five gray -clusters inside the dotted blue closed curve and S(X) consists of green-shaded -clusters. Remaining hollow -clusters are releasing. Cluster C(X) will be augmented further in Phase 4 and augmenting -clusters are outside the dotted blue curve. Solid blue edges are in Ei and thin black edges are in MST. The diameter path D is highlighted by the dashed red curve and -clusters in D are gray-shaded. Let C(X) be a cluster in Phase 1 with the center X. Let N (X) be the set of X’s neighbors in the cluster graph K(C , Ei ). By construction, C(X) is a tree of -clusters. Thus, at most five -clusters in C(X) would be in the cluster-diameter path D while at most three of them are in N (X) ∪ {X}. We use the credit of X and of two -clusters in N (X) for maintaining DC1. Let this set of three -clusters be S(X). Since X is high-degree and  < 1, N (X) \ S(X) has at least 20 18 18  − 2 ≥  -clusters. Let R(X) be any subset of  -clusters in N (X) \ S(X). The center X collects the credits of -clusters in R(X). We let other -clusters in C \ (R(X) ∪ S(X)) release their own credits; we call such -clusters releasing -clusters. By diameter-credit invariants for level i − 1, each -cluster has at least c` 2 credits. Thus, we have: Observation 5. The center X of C(X) collects at least 9c` credits. Let A1 be the set of edges of Ei that have both endpoints in marked -clusters.  Claim 6. If c = Ω σH , we can buy edges of A1 using c` credits deposited in the centers and credit of releasing -clusters. Proof. Since the subgraph of K induced by marked -clusters and edges of A1 is H-minor-free, each marked -cluster, on average, is incident to at most O(σH ) edges of A1 . Thus, each -cluster must be responsible for buying Ω(σH ) edges of A1 . Consider a cluster C(X). The total credits of each releasing -clusters is at least c` 2 , which is Ω(σH )` when c = Ω( σH ). For non-releasing -clusters, we use c` credits from their center X to pay for incident edges of A1 . Recall that non-releasing -clusters are in R(X) ∪ S(X) and: |R(X) ∪ S(X)| ≤ 5 + 7 18  (4) X Phase 2 Phase 4a Phase 4b ediam~ℓ ediam < 4ℓ Step 1 Figure 2: A cluster C(X) formed in Phase 2 is enclosed in the dotted blue curve. C(X) will be augmented further in Phase 4 and augmenting -clusters are outside the dotted blue curve. Edges connecting -clusters are MST edges. Thus, non-releasing -cluster are responsible for paying at most O( σH ) edges of A1 and c` credits suffice if c = Ω( σH ). By Claim 6, each center -cluster has at least 8c` credits remaining after paying for A1 . We note that clusters in Phase 1 could be augmented further in Phase 4. We will use these remaining credits at the centers to pay for edges of Ei in Phase 4. 3.2 Phase 2: Low-degree, branching -clusters Let F be a maximal forest whose nodes are the -clusters that remain unmarked after Phase 1 and whose edges are MST edges between pairs of such -clusters. Let diam(P) be the diameter of a path P in F, which is the diameter of the subgraph of G formed by edges inside -clusters and MST edges connecting -clusters of P. We define the effective diameter ediam(P) to be the sum of the diameters of the -clusters in P. Since the edges of F have unit weight (since they are MST edges), the true diameter of a path in F is bounded by the effective diameter of P plus the number of MST edges in the path. Since each -cluster has diameter at least 1 (by construction of the base case), we have: Observation 7. diam(P) ≤ 2ediam(P). We define the effective diameter of a tree (in F) to be the maximum effective diameter over all paths of the tree. Let T be a tree in F that is not a path and such that ediam(T ) ≥ 2`. Let X be a branching vertex of T , i.e., a vertex of T of degree is at least 3, and let C(X) be a minimal subtree of T that contains X and X’s neighbors and such that ediam(C(X)) ≥ 2`. We add C(X) to C and delete C(X) from T ; this process is repeated until no such tree exists in F. We refer to X as the center -cluster of C(X). Claim 8. The diameter of each cluster added in Phase 2 is at most (4 + 2g)`. Proof. Since C(X) is minimal, its effective diameter is at most 2` + g`. The claim follows from Observation 7. 8 Let X be a set of -clusters. We define a subset of X as follows: ( X if |X | ≤ 2g/ bX c2g/ = any subset of 2g/ of X otherwise By definition, we have: 2g (5)  Let S(X) = bC(X) ∩ Dc2g/ where D is the diameter path of C(X). We save credits of -clusters in S(X) for maintaining DC1 and we use credits of -clusters in C \S(X) to buy edges of Ei incident to -clusters in C(X). Since X is branching, at least one neighbor -cluster of X, say Y , is not in S(X). Let R(X) = {Y }. The center collects credits of clusters in R(X); other -clusters in C(X) \ {S(X) ∪ R(X)} release their credits. Let A2 be the set of unpaid edges of Ei incident to -clusters grouped in Phase 2. |bX c2g/ | ≤ Claim 9. If c = Ω( g3 ), we can buy edges of A2 using the credit from releasing -clusters. c` 6 credits from the center -clusters and half Proof. Consider a cluster C(X) formed in Phase 2. Recall -clusters in Phase 2 are low-degree. Thus, each -cluster in C(X) is incident to at most 20  edges of A2 . We need to argue that each 20` ` -cluster has at least  = Ω(  ) credits to pay for edges of A2 . By invariant DC1 for level i − 1, 1 1 half credits of releasing -clusters are at least c` 4 , which is Ω(  )` when c = Ω( 2 ). Since |R(X)| = 1, the center X collects at least c` 2 credits by invariant DC1 for level i − 1. Recall non-releasing -clusters are all in S(X). Thus, by Equation 5, the total number of edges of A2 incident to -clusters in S(X) ∪ R(X) is at most:   g 2g 20 +1 =O 2    g` Since c = Ω( g3 ), c` 6 credits of the center X is at least Ω( 2 ) which suffices to buy all edges of A2 incident to -clusters in S(X) ∪ R(X). We use remaining half the credit of releasing -clusters to achieve invariant DC1. More details will be given later when we show diameter-credit invariants of C(X). 3.3 Phase 3: Grouping -clusters in high-diameter paths In this phase, we consider components of F that are paths with high effective diameter. To that end, we partition the components of F into HD-components (equiv. HD-paths), those with (high) effective diameter at least 4` (which are all paths) and LD-components, those with (low) effective diameter less that 4` (which may be paths or trees). Phase 3a: Edges of Ei within an HD-path Consider an HD-path P that has an edge e ∈ Ei with endpoints in -clusters X and Y of P such that the two disjoint affices ending at X and Y both have effective diameter at least 2`. We choose e such that there is no other edge with the same property on the X-to-Y subpath of P (By Observation 3, there is no edge of Ei parallel to e). Let PX,Y be the X-to-Y subpath of P. By the 9 X Y PX PX,Y X PX PY Y QX (a) QY PY (b) Figure 3: (a) A cluster of C in Case 1 of Phase 3a and (b) a cluster of C in Case 2 of Phase 3a. Thin edges are edges of MST, solid blue edges are edges of Ei and vertices are -clusters. Edges and vertices inside the dashed red curves are grouped into a new cluster. stretch guarantee of the spanner, diam(PX,Y ) ≥ (1 + s)w(e). Let PX and PY be minimal subpaths of the disjoint affices of P that end at X and Y , respectively, such that the effective diameters of PX and PY are at least 2`. PX and PY exist by the way we choose e. Case 1: ediam(PX,Y ) ≤ 2` We construct a new cluster consisting of (the -clusters and MST edges of) PX,Y , PX , PY and edge e (see Figure 3(a)). We refer to, w.l.o.g, X as the center -cluster of the new cluster. Claim 10. The diameter of each cluster added in Case 1 of Phase 3a is at least (12 + 4g)`. ` 2 and at most Proof. Since the new cluster contains edge e of Ei and, in spanner S, the shortest path between endpoints of any edge is the edge itself, we get the lower bound of the claim. The effective diameters of PX and PY are each at most (2 + g)` since they are minimal. By Observation 7, we get that the diameter is at most: 2(ediam(PX ) + ediam(PY ) + ediam(PX,Y )) ≤ 4(2 + g)` + 4` = (12 + 4g)` Claim 11. Let x, y be any two vertices of G in a cluster C(X) added in Case 1 of Phase 3a. Let Px,y be the shortest x-to-y path in C(X) as a subgraph of G. Let Px,y be obtained from Px,y by contracting -clusters into a single vertex. Then, Px,y is a simple path. Proof. By construction, the only cycle of -clusters in C(X) is PX,Y ∪ {e} (see Figure 3(a)). Therefore, if Px,y is not simple, e ∈ Px,y and Px,y must enter and leave PX,Y at some -cluster Z. In this case, D could be short-cut through Z, reducing the weight of the path by at least w(e) ≥ `/2 and increasing its weight by at most diam(Z) ≤ g`. This contradicts the shortness of Px,y for  sufficiently smaller than g1 (g < 12 ). Since PX,Y ∪ {e} is the only cycle of -clusters, by Claim 11, -clusters in D ∩ C(X) form a simple subpath of D where D is the diameter path of C(X). We have: Observation 12. PX,Y 6⊆ D. Proof. For otherwise, D could be shortcut through e at a cost of ≤ diam(X) + diam(Y ) + w(e) − (diam(PX,Y ) − diam(X) − diam(Y )) {z } | | {z } cost of shortcut ≤ +w(e) + 4g` − (1 + s)w(e) ≤ 4g` − s`/2 lower bound on diameter (by the stretch condition for e) (since w(e) ≥ `/2) 10 This change in cost is negative for s ≥ 8g + 1. Let S(X) = bD ∩ C(X)c2g/ and R(X) = bC(X) \ Dc2g/ . The center X collects the credits of -clusters in R(X) and MST edges outside D connecting -clusters of C(X). We let other -clusters in C(X) \ (R(X) ∪ S(X)) release their credits. Claim 13. If D does not contain e, then X has at least cw(e) + c` 2 credits. c` 2 credits. Otherwise, X has at least Proof. If C(X) \ D contains at least 2g  -clusters, then |R(X)| = level i − 1, the total credit of -clusters in R(X) is at least: 2g c` c` · = gc` ≥ c` +  2 2 ≥ cw(e) + 2g  . Thus, by invariant DC1 for (for g ≥ 2 and  < 1) c` 2 (since w(e) ≤ `) Thus, we can assume that C(X) \ D contains less than 2g  -clusters. In this case, R(X) = C(X) \ D. Since PX,Y 6⊆ D by Observation 12, D does not contain, w.l.o.g., PX . Thus, R(X) contains at least one -cluster and the claim holds for the case that e 6∈ D. Suppose that D contains e and an internal -clusters of PX,Y , then w.l.o.g., D does not contain PX \ X. PX \ X has credit 2c` − gc`. Since ` ≥ w(e) and ` − g` ≥ ` 2 when  is sufficiently small 2 ( ≤ 1+2g ), the claim holds. If D contains e but no internal -clusters of PX,Y , then diam(PX,Y \ {X, Y }) ≥ diam(PX,Y ) − diam(X) − diam(Y ) ≥ (1 + s)w(e) − diam(X) − diam(Y ) (by the stretch condition) (6) ≥ we + s`/2 − 2g` (by bounds on w(e) and DC2) ≥ we + `/2 (for s ≥ 8g + 1, as previously required) The credit of the MST edges and -clusters of PX,Y \ {X, Y } is at least: c · (MST(PX,Y \ {X, Y }) + ediam(PX,Y \ {X, Y })) ≥ c · diam(PX,Y \ {X, Y }) ≥ c(we + `/2) Let A3 be the set of unpaid edges of Ei incident to -clusters of clusters in Case 1 of Phase 3a. Claim 14. If c = Ω( g3 ), we can buy edges of A3 using releasing -clusters. c` 6 credits from each center and credits of Proof. Consider a cluster C(X) in Phase 3. Similar to Claim 9, releasing -clusters can pay for their incident edges in A3 when c = Ω( 12 ). By construction, non-releasing clusters of C(X) are in 2g S(X) ∪ R(X). Since |R(X)| ≤ 2g  and |S(X)| ≤  by Equation (5) and since clusters now we are considering have low degree, there are at most g 4g 20 · =O 2    g edges of A3 incident to non-releasing -clusters. Thus, if c = Ω( g3 ), c` 6 ≥ Ω( 2 )`. That implies credits of X suffice to pay for all edges of A3 incident to non-releasing -clusters. 11 c` 4 Case 2: ediam(PX,Y ) > 2` Refer to Figure 3(b). Let QX and QY be minimal affices of PX,Y such that each has effective diameter at least `. We construct a new cluster consisting of (the -clusters and MST edges of) PX , PY , QX and QY and edge e. We refer to X as the center of the new cluster. We apply Case 1 to all edges of Ei satisfying the condition of Case 1 until no such edges exist. We then apply Case 2 to all remaining edges of Ei satisfying the conditions of Case 2. After each new cluster is created (by Case 1 or 2), we delete the -clusters in the new cluster from P, reassign the resulting components of P to the sets of HD- and LD-components. At the end, any edge of Ei with both endpoints in the same HD-path have both endpoints in two disjoint affixes of effective diameter less than 2`. We bound the diameter and credit of the centers of clusters in Case 2 of Phase 3a in Phase 3b. Phase 3b: Edges of Ei between HD-paths Let e be an edge of Ei that connects -cluster X of HD-path P to -cluster Y of different HD-path Q such that none affix of effective diameter less than 2` of P contains X and none affix of effective diameter less than 2` of Q contains Y . Such edge e is said to have both endpoints far from endpoint -clusters of P and Q. Let PX and QX be minimal edge-disjoint subpaths of P that end at X and each having effective diameter at least 2`. (PX and QX exist by the way we choose edge e.) Similarly, define PY and QY . We construct a new cluster consisting of (the -clusters and MST edges of) PX , PY , QX , QY and edge e (see Figure 4). We refer to X as the center of the new cluster. We then delete the -clusters in the new cluster from P and Q, reassign the resulting components of P and Q to the sets of HD- and LD-components. We continue to create such new clusters until there are no edges of Ei connecting HD-paths with far endpoints. We now bound the diameter and credits of the center of a cluster, say C(X), that is formed in Case 2 of Phase 3a or in Phase 3b. By construction in both cases, C(X) consists of two paths PX ∪ QX and PY ∩ QY connected by an edge e. Claim 15. The diameter of each cluster in Case 2 of Phase 3a and Phase 3b is at least most (9 + 4g)`. ` 2 and at Proof. The lower bound follows from the same argument as in the proof of Claim 10. Since the effective diameters of QX and QY are smaller than the effective diameters of PX and PY , the diameter of the new cluster is bounded by the sum of the diameters of PX and PY and w(e). The upper bound follows from the upper bounds on these diameters as given in the proof of Claim 10. We show how to pay for unpaid edges of Ei incident to -clusters in Case 2 of Phase 3a and Phase 3b. W.l.o.g, we refer to X as the center -cluster of C(X). Let S(X) = bD ∩ C(X)c2g/ and R(X) = bC(X) \ Dc2g/ where D is the cluster-diameter path of C(X). We save credits of -clusters in S(X) for maintaining invariant DC1. The center X collects credits of -clusters in R(X). We let other -clusters in C(X) \ (S(X) ∪ R(X)) to release their credits. Claim 16. The center of a cluster in Case 2 of Phase 3a or in Phase 3b has at least 2c(1 − g)` credits. 2g Proof. If |C(X) \ D| ≥ 2g  , R(X) has  -clusters which have at least gc` total credits by invariant DC1 for level i − 1. Since gc` > 2c(1 − g)` when g > 2, the claim holds. Thus, we assume that 12 X QX PX Y PY QY Figure 4: A cluster of C in Phase 4a. Thin edges are edges of MST, solid blue edges are edges of Ei and vertices are -clusters. Edges and vertices inside the dashed red curves are grouped into a new cluster. |C(X) \ D| < 2g  which implies R(X) = C(X) \ D. By construction, S(X) contains -clusters of at most two of four paths PX , PY , QX , QY . Since each path has effective diameter at least `, the -clusters of each path in R(X) have total diameter at least ` − g`. By invariant DC1 for level i − 1, each path in R(X) has at least c(1 − g)` credits that implies the claim. Let A4 be the set of unpaid edges of Ei incident to -clusters of clusters in Case 2 of Phase 3a and clusters in Phase 3b. Claim 17. If c = Ω( g2 ), we can buy edges of A4 using c(1 − 3g)` credits of the centers of clusters in Case 2 of Phase 3a and Phase 3b and credits of releasing -clusters. Proof. Similar to the proof of Claim 9, releasing -clusters of C(X) can buy their incident edges in A4 when c = Ω( 12 ). By construction, non-releasing -clusters are in S(X) ∪ R(X). Since |R(X)| ≤ 2g  g and |S(X)| ≤ 2g , there are at most O( ) edges of A incident to non-releasing -clusters. When  4  2 g g c` c` 1 is sufficiently small ( < 6g ), c(1−3g)` > 2 . Thus, if c = Ω( 2 ), 2 = Ω( 2 )` and hence, c(1−3g)` credits suffice to pay for all edges of A4 incident to non-releasing -clusters of C(X). 3.4 Phase 4: Remaining HD-paths and LD-components We assume that C 6= ∅ after Phase 3. The case when C = ∅ will be handled at the end of this section. Phase 4a: LD-components Consider a LD-component T , that has effective diameter less than 4`. By construction, T must have an MST edge to a cluster, say C(X), in C formed in a previous phase. We include T and an MST edge connecting T and C(X) to C(X). Let A5 be the set of unpaid edges of Ei that incident to -clusters merged into new clusters in this phase. We use credit of the center X and -clusters in this phase to pay for A5 . More details will be given in Phase 4b. Phase 4b: Remaining HD-paths Let P be a HD-path. By construction, there is at least one MST edge connecting P to an existing cluster in C. Let e be one of them. Greedily break P into subpaths such that each subpath has effective diameter at least 2` and at most 4`. We call a subpath of P a long subpath if it contains 13 at least 2g  + 1 -clusters and short subpath otherwise. We process subpaths of P in two steps. In Step 1, we process affixes of P, long subpaths of P and the subpath of P containing an endpoint -cluster of e. In Step 2, we process remaining subpaths of P. Step 1 If a subpath P 0 of P contain an -cluster that is incident to e, we merge P 0 to the cluster in C that contains another endpoint -cluster of e. We call P 0 the augmenting subpath of P. We form a new cluster from each long subpath of P and each affix of P. It could be that one of two affixes of P is augmenting. We repeatedly apply Step 1 for all HD-paths. The remaining cluster paths which are short subpaths of HD-paths would be handled in Step 2. We then pay for every unpaid edges of Ei incident to -clusters in this step. We call a cluster a long cluster if it is a long subpath of P and a short cluster if it is a short subpath of P. Let A6 be the set of unpaid edges of Ei incident to -clusters of long clusters. We show below that each long cluster can both maintain diameter-credit invariant and pay for its incident edges in A6 using credits of its -clusters. Let A7 be the set of unpaid edges of Ei incident to remaining -clusters involved in this step; those belong to augmenting subpaths and short affices of HD-paths. We can pay for edges of A7 incident to -clusters in augmenting subpaths using the similar argument in previous phases. However, we must be careful when paying for other edges of A7 that are incident to -clusters in short affices of P. Since short affices of P spend all credits of their children -clusters to maintain invariant DC1, we need to use credits of -clusters in P 0 to pay for edges of A7 incident to short affices of P. Step 2 Let P 0 be a short subpath of P. If edges of Ei incident to -clusters of P 0 are all paid, we let P 0 become a new cluster. Suppose that -clusters in P 0 are incident to at least one unpaid edge of Ei , say e. We have: Observation 18. Edge e must be incident to an -cluster merged in Phase 1. Proof. Recall that edges of Ei incident to -clusters of clusters initially formed in previous phases except Phase 1 are in A2 ∪ . . . ∪ A7 ; thus, they are all paid. By construction, edges of Ei between two -clusters in the same cluster initially formed in Phase 1 are in A1 ∪A5 ∪A7 which are also paid. Since P 0 is not an affix of P, there is no unpaid edge between two -clusters of P 0 since otherwise P 0 would become a new cluster in Phase 3a; that implies the observation. We merge -clusters, MST edges of P 0 and e to the cluster in C that contains another endpoint of e. This completes the clustering process. Let A8 be the set of remaining unpaid edges of Ei incident to -clusters involved in Step 2. We now analyze clusters of C which are formed or modified in Phase 4. Claim 19. Let B be a short cluster. Then, diam(B) ≤ 8` and credits of -clusters and MST edges connecting -clusters in B suffice to maintain invariant DC1 for B. Proof. Since ediam(B) ≤ 4`, by Observation 7, diam(B) ≤ 8`. The total credit of -clusters and MST edges in B is at least: c(| MST(B)| + ediam(B)) ≥ c · diam(B)) Since ediam(B)) ≥ 2`, B has at least 2c` credits. Thus, B has at least c · max(diam(B), `/2) credits. 14 We show how to pay for edges of Ei in A6 and maintain diameter-credit invariants of long clusters. We use cr(X ) to denote the total credit of -clusters of a set of -clusters X . Claim 20. Let B be a long cluster. If c = Ω( g3 ) and g ≥ 8, we can maintain diameter-credit invariants of B and pay for edges in A6 incident to -clusters in B using credits of -clusters in B. Proof. By construction, B has effective diameter at most 4`. By Observation 7, B has diameter at most 8`. Thus, B satisfies invariant DC2 if g ≥ 8. Since B is a long cluster, it has at least 2g  +1 -clusters in B and X be an -cluster in B \ S. Let R = {X}. We -clusters. Let S be a set of 2g  save credits of S for maintaining invariant DC1 of B and use credits of R to pay for edges of A6 incident to -clusters in S ∪ R. Since |S ∪ R| = 2g  + 1 and -clusters in S ∪ R are low-degree, there g are at most O( 2 ) edges of A6 incident to -clusters in S ∪ R. By invariant DC1 for level i − 1, R g g has at least c` 2 credits which is sufficient to pay for O( 2 ) edges of A6 when c = Ω( 3 ). We let other -clusters in B \ (S ∪ R) pay for their incident edges of A6 using their credits. This is sufficient c` when c = Ω( 12 ) since each -cluster is incident to at most 20  edges and has at least 2 credits. We use credits of S to maintain invariant DC1. Since |S| = 2g  and each -clusters has at least c` credits, cr(S) ≥ g`. Since diam(B) ≤ g` by DC2, cr(S) ≥ cdiam(B). Thus, cr(S) ≥ 2 cmax(diam(B), ˙ `/2); invariant DC1 is satisfied. Let C(X) be a cluster in C before Phase 4. Let C 0 (X), C 00 (X) and C 000 (X) be the corresponding clusters that are augmented from C(X) in Phase 4a, Step 1 of Phase 4b and Step 2 of Phase 4b, respectively. It could be that any two of three clusters are the same. By construction in Phase 4a, LD-components are attached to C(X) via MST edges. Recall each LD-component has effective diameter at most 4` and hence, diameter at most 8` by Observation 7. Thus, diam(C 0 (X)) − diam(C(X)) ≤ 16` + 2. By construction in Step 1 of Phase 4b, subpaths of effective diameter at most 4b` are attached to C 0 (X) via MST edges. Thus, diam(C 00 (X)) − diam(C 0 (X)) ≤ 16` + 2. We have: Claim 21. diam(C 00 (X)) − diam(C(X)) ≤ 32` + 4. By construction in Step 2 of Phase 4b, subpaths of HD-paths are attached to C 00 (X) via edges of Ei . Since attached subpaths have effective diameter at most 4`, by Observation 7, we have: Claim 22. diam(C 000 (X)) − diam(C 00 (X)) ≤ 18` We are now ready to show invariant DC2 for C 000 (X). Claim 23. diam(C 000 (X)) ≤ g` when g ≥ 70. Proof. From Claim 4, Claim 8, Claim 10 and Claim 15, C(X) has diameter at most: max((4 + 5g)`, (4 + 2g)`, (12 + 4g)`, (9 + 4g)`) = (12 + 4g)` which is at most 16` when  is sufficiently small ( < 1/g). By Claim 21 and Claim 22, C 000 (X) has diameter at most: 16` + 32` + 4 + 18` = 66` + 4 ≤ 70` since ` ≥ 1. 15 Recall we show how to pay for edges in A1 , A2 , A3 , A4 , A6 before. It remains to show how to pay for edges in A5 ∪ A7 ∪ A8 . We first consider edges in A5 ∪ A7 . Recall S(X) = b(D ∩ C(X))c2g/ where D is the cluster-diameter path. We call -clusters in C 00 (X)\C(X) augmenting -clusters. Let S 00 (X) = b(D ∩ (C 00 (X) \ C(X))c2g/ be the set of augmenting -clusters that are in the diameter path D. We save credits of -clusters in S 00 (X) for maintaining DC1 and let other augmenting -clusters release their credits. Claim 24. If c = Ω( g2 ), we can buy edges in A5 ∪ A7 using credits of releasing augmenting -clusters. c` 3 credits of the cluster centers and 00 Proof. We use c` 6 credits of X to pay for edges of A5 ∪ A7 incident to -clusters in S (X). Recall 20 each -cluster is incident to at most  edges of Ei since it is low-degree. Thus, -clusters in S 00 (X) g are incident to most O( g2 ) edges of A5 ∪ A7 . Hence, c` 6 credits suffice when c = Ω( 2 ). We let releasing augmenting -clusters of LD-components to pay for their incident edges of A5 . This is sufficient when c = Ω( 12 ). Thus, all edges of A5 are paid. We now turn to edges of A7 . Let P1 , P2 , P3 be three segments of a HD-path P in Step 1 where P1 , P2 are affixes of P and P3 is the augmenting subpath of P. It could be that P1 = P3 or P2 = P3 . Since edges of Ei incident to long clusters are paid in Claim 20, -clusters of Pi , 1 ≤ i ≤ 2, are incident to unpaid edges of Ei only when Pi is a short cluster and thus, incident to at most O( g2 ) edges of A7 . Note that in Claim 19, we use all credits of -clusters and MST edges of Pi to maintain diameter-credit invariants and we need to pay for edges of A7 incident to Pi . We consider two cases: 1. If P3 ∩ S 00 (X) = ∅, then -clusters in P3 are releasing. Recall P3 has effective diameter at least 2`. We let each -cluster in P3 pay for its incident edges of A7 using half of its credits, which is at least c` 4 by invariant DC1 for level i − 1. This amount of credits is enough when 1 c = Ω( 2 ). The total remaining credit from -clusters of P3 is at least c`, that is sufficient to pay for O( g2 ) edges of A7 incident to -clusters of P1 ∪ P2 when c = Ω( g2 ). 2. If P3 ∩S 00 (X) 6= ∅, we use c`/6 credits of the center X of C 00 (X) to pay for edges of A7 incident to -clusters in X = (P1 ∩ S 00 (X)) ∪ P2 ∪ P3 . Recall S 00 (X) has at most 2g  -clusters, X has 120g 6g at most  -clusters. Thus, -clusters in X are incident to at most 2 edges in A7 . Since there are at most two augmenting subpaths that contain -clusters of the cluster diameter path D, X only need to pay for at most 240g = O( g2 ) edges. Thus, c` 6 credits are sufficient if 2 g 00 c = Ω( 2 ). Other -clusters of P3 \ S (X) are releasing and we can use their released credits to pay for their incident edges of A7 . We now show how to pay for edges of A8 which consists of edges of Ei incident to -clusters in Step 2 of Phase 4b. By Observation 18, C(X) is formed in Phase 1. Let S 000 (X) be augmenting -clusters in D of C 000 (X) that are not in S(X) ∪ S 00 (X). We save credit of S 000 (X) for maintaining DC1 and let other augmenting -clusters release their credits. Claim 25. If c = Ω( g2 ), we can pay for edges of A8 incident to -clusters in C 000 (X) using credits of releasing -clusters and c` credits of the center X. Proof. Since augmenting -clusters are low-degree, each augmenting -cluster is incident to at most 20 1 c`  edges of A8 . When c = Ω( 2 ), 2 credits of each releasing -cluster suffice to buy their incident edges of A8 . 16 By construction, the augmenting subpath P 0 in Step 1 of Phase 4b is a short path. Since the cluster-diameter path D contains -clusters of at most two short subpaths of HD-paths, |S 000 (X)| ≤ g 4g  . Thus, there are at most O( 2 ) edges of A8 incident to non-releasing -clusters. Hence, c` credits of X suffice to pay for such edges when c = Ω( g2 ). It remains to maintain invariant DC1 for clusters in C. We have: Claim 26. If any of the sets S(X), S 00 (X) and S 000 (X) has at least satisfies invariant DC1. Proof. Suppose, w.l.o.g, say S(X) has at least credits of -clusters in S(X) is at least: 2g  2g  -clusters, then C 000 (X) -clusters. Then, by DC1 for level i − 1, the total 2g c` · = gc`  2 which is at least c · max(diam(C 000 (X)), `/2) since diam(C 000 (X)) ≤ g` by Claim 23 and g > 1. Claim 27. If c = Ω( g3 ), we can maintain invariant DC1 of C 000 (X) using credits of -clusters and MST edges in D and the credits of the cluster center X. Proof. By Claim 26, credits of all -clusters and MST edges of D are saved for maintaining DC1. We prove the claim by case analysis. Case 1: C(X) is formed in Phase 1. Recall D contains at most six edges of Ei where four edges of Ei are in C(X) and two more edges of Ei are by the augmentation in Step 2 of Phase 4b. We use 6c` credits from X and credits of -clusters and MST edges in D. The total credit is: 6c` + c(| MST(D)| + ediam(D)) ≥ c · diam(D) = c · diam(C 000 (X))) Since C 000 (X) contains an edge in Ei , diam(C 000 (X)) ≥ `/2. Thus, c · diam(C 000 (X))) ≥ c`/2. To complete the proof, we need to argue that X has non-negative credits after paying for edges of Ei and maintaining invariant DC1 of C 000 (X). Recall X initially has 9c` credits by Observation 5 and loses: • c` credits in Claim 6. • c` 3 credits in Claim 24. • c` credits to pay for the edges of A8 incident to non-releasing augmenting -clusters in Step 2 of Phase 4b. • 6c` credits for maintaining DC1 of C 000 (X). Thus, X still has: 9c` − 8c` − c`  = c(1 − )` 3 3 which is non-negative since  < 1. Case 2: C(X) is formed in Phase 2. Recall the center X collects at least ` 2 from a neighbor Y of X (R(X) = {Y }). We observe that credits in X is taken totally by at most ` 2 in Claim 9 17 and Claim 24. Thus, the center still has non-negative credits after buying incident edges Ei when c = Ω( g3 ). Since credits of -clusters and MST edges in D are reserved and D does not contain any edge of Ei , the total reserved credit is: c(| MST(D)| + ediam(D)) ≥ c · diam(D) = c · diam(C 00 (X))) (7) It remains to argue that C 00 (X) has at least c` 2 credits. Note that we do not have lower bound on the diameter of C 00 (X) as in other cases. Let X be the set of releasing -clusters of C(X) and cr(X ) be the total credits of -clusters in X . Since ediam(C(X)) ≥ 2`, we have: cr(X ) + cr(S(X)) ≥ 2c` (8) Recall half credit of X is taken in Claim 9. We use the remaining half to guarantee that the credit of C 00 (X) is at least c`/2. Case 3: C(X) is formed in Case 1 of Phase 3a. Recall (in Claim 13) the center X collects at least ` 2 credits if D does not contain e (we are using notation in Case 1 Phase 3a) and at least cw(e) + ` 2 credits if D contains e. We observe that credits in X is taken totally by at most ` 2 in Claim 14 and Claim 21. By construction, D contains at most one edge of Ei which is e (in this case X has at least c · w(e) + ` 2 credits). Thus, the remaining credits of X and credits from reserved -clusters and MST edges in D are sufficient for maintaining invariant DC1. Since diam(C 00 (X)) ≥ `/2 by Claim 10, c · diam(C 00 (X)) ≥ c`/2. Case 4: C(X) is formed in Case 2 of Phase 3a or in Phase 3b. Recall in Claim 16, we argue that the center of cluster X collects at least 2c(1 − g)` credits. By construction, D can contain at most one edge of Ei , which connects two cluster paths in Case 2 of Phase 3a or Phase 3b. We observe that credits in X is taken totally by at most c(1 − 3g − /3)` in Claim 17 and Claim 24. Thus, X has at least: c(2 − 2g)` − c(1 − 3g − /3)` > c` remaining credits. That implies the remaining credits of X and credits from reserved -clusters and MST edges in D are sufficient for maintaining invariant DC1. Since diam(C 00 (X)) ≥ `/2 by Claim 15, c · diam(C 00 (X)) ≥ c`/2. Proof of Lemma 2. Recall in the beginning of Phase 4, we assume that C 6= ∅ after Phase 3 and in this case, we already paid for every edges of Ei with: c = max( Θ(g) Θ(σH ) σH , ) = O( 3 ) 3    and  sufficiently small. We only need to consider the case when C = ∅ after Phase 3. We have: Observation 28. The case when C = ∅ after Phase 3 only happens when: (i) there is a single cluster-path P that contains all -clusters, (ii) every edge of Ei is incident to an -cluster in an affix of P of effective diameter at most 2` and (iii) -clusters of P are low-degree in K(C , Ei ). 18 We greedily break P into subpath of -clusters of effective diameter at least 2` and at most 4` as in Phase 4b and form a new cluster from each subpath. Recall a long cluster is formed from 0 0 a subpath containing at least 2g  + 1 -clusters. Let P be a subpath of P. If P is long, we can 0 both buy edges of Ei incident to -clusters of P and maintain two diameter-credit invariants as in Claim 20. If P 0 is short, we use credits of  and MST edges of P 0 to maintain DC1. Recall P 0 has effective diameter at least `, thus, has at least c` credits by DC1 for level i − 1. That implies c · diam(P 0 ) ≥ c max( 2` , diam(P 0 )). We put remaining unpaid edges of Ei to the holding bag B. Recall unpaid edges of Ei must be incident to -clusters of short clusters, which are affixes of P. By Observation 28, B holds at most O( g2 ) = O( 12 ) edges of Ei . Thus, the total weight of edges of B in all levels is at most:  X   X 1 1 O 2 i , where `max = maxe∈S {w(e)} `i ≤ O 2 `max   i i   X 1 ≤ O 2 w(MST) i (9)  i     1 1 1 ≤ O 2 w(MST) = O 2 w(MST)  1−  Acknowledgments: References [1] I. Althöfer, G. Das, D. Dobkin, D. Joseph, and J. Soares. On sparse spanners of weighted graphs. Discrete Computational Geometry, 9(1):81–100, 1993. [2] S. Arora, M. Grigni, D. R. Karger, P. N. Klein, and A. Woloszyn. A polynomial-time approximation scheme for weighted planar graph TSP. In Proceedings of the 9th Annual ACM-SIAM Symposium on Discrete Algorithms, SODA ’98, pages 33–41, 1998. [3] B. Awerbuch, M. Luby, A. V. Goldberg, and S. A. Plotkin. Network decomposition and locality in distributed computation. In Proceedings of the 30th Annual Symposium on Foundations of Computer Science, FOCS ’89, pages 364–369, 1989. [4] G. Borradaile, E. D. Demaine, and S. Tazari. Polynomial-time approximation schemes for subset-connectivity problems in bounded-genus graphs. Algorithmica, 68(2):287–311, 2014. [5] G. Borradaile and H. Le. Light spanners for bounded treewidth graphs imply light spanners for h-minor-free graphs. CoRR, abs/1703.10633, 2017. [6] S. Chechik and C. Wulff-Nilsen. Near-optimal light spanners. In Proceedings of the 27th Annual ACM-SIAM Symposium on Discrete Algorithms, SODA’16, pages 883–892, 2016. [7] E. D. Demaine, M. Hajiaghayi, and K. Kawarabayashi. Contraction decomposition in H-minorfree graphs and algorithmic applications. In Proceedings of the 43rd Annual ACM Symposium on Theory of Computing, STOC ’ 11, pages 441–450, 2011. 19 [8] M. Elkin and D. Peleg. (1 + , β)-spanner constructions for general graphs. SIAM Journal on Computing, 33(3):608–631, 2004. [9] P. Erdős. Extremal problems in graph theory. Theory of Graphs and Its Applications (Proc. Sympos. Smolenice), pages 29–36, 1964. [10] A. Filtser and S. Solomon. The greedy spanner is existentially optimal. In Proceedings of the 2016 ACM Symposium on Principles of Distributed Computing, PODC ’16, pages 9–17, 2016. [11] M. Grigni. Approximate TSP in graphs with forbidden minors. In Proceedings of the 27th International Colloquium on Automata, Languages and Programming, ICALP ’00, pages 869– 877, 2000. [12] M. Grigni and H. Hung. Light spanners in bounded pathwidth graphs. In Proceedings of the 37th International Conference on Mathematical Foundations of Computer Science, MFCS’12, pages 467–477, 2012. [13] M. Grigni and P. Sissokho. Light spanners and approximate TSP in weighted graphs with forbidden minors. In Proceedings of the 13th Annual ACM-SIAM Symposium on Discrete Algorithms, SODA ’02, pages 852–857, 2002. [14] D. S. Johnson. The NP-completeness column: An ongoing guide (column 19). Journal of Algorithms, 8(3):438–448, 1987. [15] P. N. Klein. A linear-time approximation scheme for planar weighted TSP. In Proceedings of the 46th Annual IEEE Symposium on Foundations of Computer Science, FOCS ’05, pages 647–657, 2005. [16] R. J. Lipton and K. W. Regan. People, Problems, and Proofs: Essays from Gödel’s Lost Letter: 2010, chapter David Johnson: Galactic Algorithms, pages 109–112. Springer Berlin Heidelberg, 2013. [17] W. Mader. Homomorphiesätze für graphen. Mathematische Annalen, 178(2):154–168, 1968. [18] D. Peleg and A. A. Schäffer. Graph spanners. Journal of Graph Theory, 13(1):99–116, 1989. [19] S. B. Rao and W. D. Smith. Approximating geometrical graphs via “spanners” and “banyans”. In Proceedings of the 30th Annual ACM Symposium on Theory of Computing, STOC ’98, pages 540–550, 1998. [20] N. Robertson and P. D. Seymour. Graph minors. XVI. Excluding a non-planar graph. Journal of Combinatoral Theory Series B, 89(1):43–76, 2003. [21] A. Thomason. The extremal function for complete minors. Journal of Combinatorial Theory Series B, 82(2):318–338, 2001. 20 A Notation and definitions Let G(V (G), E(G)) be a connected and undirected graph with a positive edge weight function w : E(G) → <+ \ {0}. We denote |V (G)| and |E(G)| by n and m, respectively. Let MST(G) be a minimum spanning tree of G; when the graph is clear from the context, we simply write MST. A walk of length p is a sequence of alternating vertices and edges {v0 , e0 , v1 , e1 , . . . , ep−1 , vp } such that ei = vi vi+1 for every i such that 1 ≤ 0 ≤ p − 1. A path is a simple walk where every vertex appears exactly once in the walk. For two vertices x, y of G, we use dG (x, y) to denote the shortest distance between x and y. P Let S be a subgraph of G. We define w(S) = e∈E(S) w(e). Let X ⊆ V (G) be a set of vertices. We use G[X] to denote the subgraph of G induced by X. Let Y ⊆ E(G) be a subset of edges of G. We denote the graph with vertex set V (G) and edge set Y by G[Y ]. We call a graph K a minor of G if K can be obtained from G from a sequences of edge contraction, edge deletion and vertex deletion operations. A graph G is H-minor-free if it excludes a fixed graph H as a minor. If G excludes a fixed graph H as a minor, it also excludes the complete h-vertex graph Kh as a minor where h = |V (H)|. Observation 29. If a graph G excludes Kh as a minor for h ≥ 3, then any graph obtained from G by subdividing an edge of G also excludes Kh as a minor. Proof. We can assume that G is connected. If h = 3, G is acyclic and the observation follows easily. Let K be the graph obtained from G by subdividing an arbitrary edge, say e, of G. Let v be the subdividing vertex. Suppose that K contains Kh as a minor. Then there are h vertex-disjoint trees {T1 , T2 , . . . , Th } that are subgraphs of K such that each Ti corresponds to a vertex of the minor Kh and there is an edge connecting every two trees. We say {T1 , . . . , Th } witnesses the minor Kh in K. If v 6∈ V (T1 ∪ . . . ∪ Th ), then {T1 , . . . , Th } witnesses Kh in G, contradicts that G excludes Kh as a minor. Thus, we can assume, w.l.o.g, v ∈ T1 . Since h ≥ 4 and v has degree 2, T1 \ {v} 6= ∅. By contracting v to any of its neighbors in T1 , we get a set of h trees witnessing the minor Kh in G, contradicting that G is Kh minor-free. B Greedy spanners A subgraph S of G is a (1 + )-spanner of G if V (S) = V (G) and dS (x, y) ≤ (1 + )dG (x, y) for all x, y ∈ V (G). The following greedy algorithm by Althöfer et al. [1] finds a (1 + )-spanner of G: GreedySpanner(G(V, E), ) S ← (V, ∅). Sort edges of E in non-decreasing order of weights. For each edge xy ∈ E in sorted order if (1 + )w(xy) < dS (x, y) E(S) ← E(S) ∪ {e} return S Observe that as algorithm GreedySpanner is a relaxation of Kruskal’s algorithm, MST(G) = MST(S). Since we only consider (1 + )-spanners in this work, we simply call an (1 + )-spanners w(S) . We call S light if its a spanner. We define the lightness of a spanner S to be the ratio w(MST(G)) lightness is independent of the number of vertices or edges of G. 21 C Reduction to unit-weight MST edges We adapt the reduction technique of Chechik and Wulff-Nilsen [6] to analyze the increase in lightness due to this simplification for H-minor-free graphs. Let G be the input graph and let w : E(G) → <+ be the edge weight function for G. Let w̄ = w(MST) be the average weight of the MST edges. We n−1 do the following: 1. Round up the weight of each edge of E(G) to an integral multiple of w̄. 2. Subdivide each MST edge so that each resulting edge has weight exactly w̄. Let G0 be the resulting graph. 3. Scale down the weight of every edge by w̄. Let w0 be the resulting edge weights of G0 . G0 is minor-free by Observation 29. 4. Find a (1 + )-spanner S 0 of G0 . 5. Let S be a graph on V (G) with edge set equal to the union of E(S 0 ) ∩ E(G), the edges of MST(G), and every edge e in G of weight w(e) ≤ w̄ . Lemma 30. If S 0 is a (1 + )-spanner of G0 with lightness f (), then S is a (1 + O())-spanner of G with lightness 2f () + O(σH /). Proof. We adapt the proof of Chechik and Wulff-Nilsen [6]. We first bound w(S). For an edge e in E(S 0 ) ∩ E(G), w(e) ≤ w̄ · w0 (e) since weights are rounded up before scaling down. Since G is H-minor-free, G has O(σH n) edges and so has O(σH n) edges of weight at most w̄ . Thus, the weight of the edges returned in Step 5 is: w(S) ≤ w̄ · w0 (S 0 ) + w(MST(G)) + w̄ · O(σH n)  Since S 0 has lightness f () and since w(MST(G)) = (n − 1)w̄, we get w(S) ≤ w̄ · f ()w0 (MST(G0 )) + O(σH /) · w(MST(G)) The MST of G0 is comprised of the subdivided edges (Step 2) of the MST of G. Since the weight of each edge of MST(G) is rounded up to an integral multiple of w̄, at most (n − 1)w̄ = w(MST(G)) is added to the weight of the MST of G. Therefore w0 (MST(G0 )) ≤ 2w(MST(G))/w̄, giving w(S) ≤ 2f () · w(MST(G)) + O(σH /) · w(MST(G)) This proves the bound on the lightness of S. We next show that S is a (1 + O())-spanner of G. It is sufficient to show that for any edge e∈ / E(S) there is a path in S of weight at most (1 + O())w(e). Since S contains all edges of weight at most w̄ , we may assume that w(e) > w̄ . Let Se0 be a path in S 0 between e’s endpoints of length at most (1 + )w0 (e). Let Se be the path in S that naturally corresponds to the path Se0 . As above, we have w(Se ) ≤ w̄ · w0 (Se0 ). Therefore w(Se ) ≤ (1 + )w̄ · w0 (e). Since edge weights are rounded up by at most w̄, w̄ · w0 (e) ≤ w(e) + w̄ which in turn is ≤ w(e) + w(e) since w(e) > w̄ . We get w(Se ) ≤ (1 + )2 w(e) = (1 + O())w(e). By Lemma 30, we may assume that all edges of MST(G) have weight 1. We find the (1 + )spanner S of G by using the greedy algorithm. Thus, the stretch condition of S is satisfied. 22
8cs.DS
arXiv:1404.1022v1 [math.SG] 3 Apr 2014 ON COMPOSITIONS WITH x2 /(1 − x) HANS-CHRISTIAN HERBIG, DANIEL HERDEN, AND CHRISTOPHER SEATON Abstract. In the past, empirical evidence has been presented that Hilbert series of symplectic quotients of unitary representations obey a certain universal system of infinitely many constraints. Formal series with this property have been called symplectic. Here we show that a formal power series is symplectic if and only if it is a formal composite with the formal power series x2 /(1 − x). Hence the set of symplectic power series forms a subalgebra of the algebra of formal power series. The subalgebra property is translated into an identity for the coefficients of the even Euler polynomials, which can be interpreted as a cubic identity for the Bernoulli numbers. Furthermore we show that a rational power series is symplectic if and only if it is invariant under the idempotent Möbius transformation x 7→ x/(x − 1). It follows that the Hilbert series of a graded Cohen-Macaulay algebra A is symplectic if and only if A is Gorenstein with its a-invariant and its Krull dimension adding up to zero. It is shown that this is the case for algebras of regular functions on symplectic quotients of unitary representations of tori. Contents 1. Introduction Acknowledgements 2. Proof of Proposition 1.4 3. Proof of Theorem 1.6 4. Proof of Theorem 1.3 5. Applications to even Euler polynomials and Bernoulli Numbers 6. Sample Calculations 6.1. Quotients by finite unitary group representations 6.2. Symplectic quotients by S1 References 1 4 4 6 7 9 11 12 13 14 1. Introduction Let G → U(V ) be a unitary representation of a compact Lie group G on a hermitian vector space (V, h , i). Here, V is viewed as a symplectic manifold or real variety. The R-algebra of smooth functions on V is denoted C ∞ (V ), and its subalgebra of real regular functions is denoted R[V ]. Note that R[V ] is actually a Poisson subalgebra of C ∞ (V ). The symplectic form on V is given by the imaginary 2010 Mathematics Subject Classification. Primary 05A15; Secondary 11B68, 13A50, 53D20. The first and second author were supported by the grant GA CR P201/12/G028. The third author was supported by a Rhodes College Faculty Development Grant as well as the E.C. Ellett Professorship in Mathematics. 1 2 HANS-CHRISTIAN HERBIG, DANIEL HERDEN, AND CHRISTOPHER SEATON part of the scalar product h , i, and the G-action on V is Hamiltonian with moment map √ −1 ∗ hv, ξ.vi. J : V → g , Jξ (v) := (J(v), ξ) := 2 Here, ξ.v := d/dtt=0 (exp(−tξ).v) denotes the infinitesimal action of ξ ∈ g on v ∈ V and ( , ) stands for the dual pairing between the dual space g∗ and the Lie algebra g of G. Let us denote by Z := J −1 (0) the zero fibre of the moment map. If G is finite, then J = 0 by convention and Z = V . Since J is G-equivariant, we can consider the space M0 := Z/G of G-orbits in Z, the so-called symplectic quotient. It is a stratified symplectic space and can be viewed in a natural way as a semialgebraic set (for more information the reader may consult [10]). In order to define the smooth structure on M0 , one introduces the vanishing ideal IZ of Z inside C ∞ (V ). Then the algebra of smooth functions on M0 is given by C ∞ (M0 ) := C ∞ (V )G /(IZ ∩C ∞ (V )G ). Note that C ∞ (M0 ) carries a canonical Poisson bracket. The N-graded R-algebra of regular functions R[M0 ] := R[V ]G /(IZ ∩R[V ]G ) is a Poisson subalgebra of C ∞ (M0 ). In this paper, we are concerned with the Hilbert series of the N-graded algebra R[M0 ]. This is the generating function counting the dimensions dimR (R[M0 ]i ) of the spaces of regular functions of degree i ∈ N: X HilbR[M0 ] (t) := dimR (R[M0 ]i ) ti ∈ N[[t]] ⊂ C[[t]]. i≥0 The Poisson brackets will play no role in the considerations to follow. The main motivation for our investigation is Conjecture 1.2 below, that has been formulated in [8]. We recall the following definition from [8]. P Definition 1.1. For a formal power series ϕ(x) = i≥0 γi xi ∈ C[[x]] and m ≥ 1 we introduce the linear constraint   m−1 X m−1 γm+k = 0. (Sm ) (−1)k k k=0 We say that ϕ(x) is symplectic if condition (Sm ) holds for each m ≥ 1. A meromorphic function ψ(t) in the variable t is said to be symplectic at a ∈ C of pole order d ∈ Z if the formal power series xd ψ(a − x) ∈ C[[x]] is symplectic. Here we assume that the order of the pole of ψ(t) at t = a is ≤ d. P The reader is invited to check that in a symplectic power series ϕ(x) = i≥0 γi xi ∈ C[[x]] the odd coefficients γ1 , γ3 , γ5 , . . . are uniquely determined by the even ones γ0 , γ2 , γ4 , . . . . Moreover, for each choice of the even coefficients γ0 , γ2 , γ4 , . . . there P is a uniquely determined symplectic power series ϕ(x) = i≥0 γi xi . The curious sign convention (we expand in powers of (a − x) instead of (x − a)) appears to be more natural, because in this way our typical examples render nonnegative coefficients. When we say a meromorphic function is symplectic at x = a of order d = 0, we mean that it is analytic at x = a and symplectic as a series expanded in (a − x). Note that we only use this sign convention for a formal power series in the context of Lemma 3.1. Conjecture 1.2 ([8]). Let G → U (V ) be a unitary representation of a compact Lie group G and let R[M0 ] be the graded R-algebra of regular functions on the ON COMPOSITIONS WITH x2 /(1 − x) 3 corresponding symplectic quotient M0 . Then HilbR[M0 ] (t) is symplectic at t = 1 of order d = dimR (M0 ). There is an analogue of this conjecture for cotangent lifted representations of reductive complex Lie groups. Certainly, over the complex numbers, there exist also symplectic quotients that arise from non-cotangent lifted representations whose Hilbert series are symplectic. For instance, the invariant ring of any unimodular representation of a finite group has a symplectic Hilbert series; for more details, see Section 6. To name a specific example, for n ≥ 2 the action of the binary dihedral group Dn ⊂ SL2 (C) on C2 cannot be cotangent lifted as there are no quadratic invariants. Our aim is to give a simple proof of the following statement. Theorem 1.3. Conjecture 1.2 holds if G is a torus. The crucial insight that helps us to achieve our goal is the following reformulation of what it means for a generating function to be symplectic. Proposition 1.4. A formal power series ϕ(x) is symplectic if and only if it is a formal composite with x2 /(1 − x), i.e., if there exists a formal power series ρ(y) ∈ C[[y]] such that ϕ(x) = ρ(x2 /(1 − x)). As a corollary, we obtain the following. Corollary 1.5. The space of symplectic power series forms a subalgebra of C[[x]]. A meromorphic function ψ(t) is symplectic of order d at a ∈ C if and only if there exists a formal power series ρ(y) ∈ C[[y]] such that the Laurent expansion of ψ(t) at t = a is   (a − t)2 1 . ρ (a − t)d 1−a+t If ψ1 (t) is symplectic at a ∈ C of order d1 and ψ2 (t) is symplectic at a ∈ C of order d2 , then the product ψ1 (t)ψ2 (t) is symplectic at a ∈ C of order d1 + d2 . It is tempting to think of x2 /(1 − x) as some sort of fundamental (rational or formal) invariant of a group action. In fact, the requisite transformation is provided by the order two Möbius transformation x 7→ x/(x − 1). Theorem 1.6. A formal power series ϕ(x) is symplectic if and only if it is invariant under the substitution x 7→ x/(x − 1). If ϕ(x) is rational, then the following statements are equivalent: (1) ϕ(x) is symplectic, (2) there exists a rational function ρ(y) such that ϕ(x) = ρ(x2 /(1 − x)), (3) ϕ(x) = ϕ(x/(x − 1)). Corollary 1.7. A rational function ψ(t) is symplectic of order d at t = a if and only if  2  a − 2a + (1 − a)t ψ (1.1) = (a − 1 − t)d ψ(t). a−1−t This type of functional equation one encounters in the theory of Gorenstein algebras (cf. [2, Section 4.4]). Namely, by a theorem of Richard P. Stanley [12], an N-graded Cohen-Macaulay P algebra R = ⊕i≥0 Ri is Gorenstein if and only if its Hilbert series HilbR (t) = i≥0 dim(Ri ) ti fulfills (1.2) HilbR (t−1 ) = (−1)d t−a(R) HilbR (t), 4 HANS-CHRISTIAN HERBIG, DANIEL HERDEN, AND CHRISTOPHER SEATON where d = dim(R) and a(R) is the so-called a-invariant. By comparison with (1.1) for a = 1 we finally obtain the following result. Corollary 1.8. The Hilbert series HilbR (t) of a graded Cohen-Macaulay algebra R is symplectic of order d = dim R if and only if R is Gorenstein with a-invariant a(R) = −d. Remark 1.9. In particular, this implies that if the graded ring R = ⊕i≥0 Ri is Gorenstein of Krull dimension d and in the Laurent expansion X γi HilbR (t) = (1.3) , (1 − t)d−i i≥0 the coefficient γ1 = 0, then HilbR (t) is symplectic of order d. Here we make use of the fact [15, Equation (3.32)] that −2γ1 /γ0 = a(R) + d. Let us give an outline of the paper. In Section 2 we prove Proposition 1.4 and, as a side remark, discuss relations to the sequence of Genocchi numbers. In Section 3 we use Proposition 1.4 to show Theorem 1.6. The latter is used in Section 4 to give a proof of our main result, Theorem 1.3, that is based on Molien’s formula and the fact that a moment map of a faithful torus representation forms a regular sequence in the ring of invariants [7, 5]. In Section 5 we deduce from Corollary 1.5 an identity for the coefficients of the even Euler polynomials. In Section 6 we illustrate our results by discussing specific examples. Acknowledgements. We would like to thank Srikanth Iyengar for suggesting that condition (Sm ) might be fulfilled termwise in the Molien formula for a finite unitary group. The third author would like to thank Eric Gottlieb for helpful conversations. 2. Proof of Proposition 1.4 As, for each i ≥ 1, the alternating sum over the ith row of the Pascal triangle is zero, the power series x2 /(1 − x) is symplectic. Based on this observation we are able to find more examples. Lemma 2.1. For each n ≥ 0 the formal power series (x2 /(1 − x))n is symplectic. Proof. First let us observe that for a formal power series ϕ(x) we have   d2m−1 m−1 (1 − x) ϕ(x) = 0. (Sm ) ⇐⇒ d2m−1 x x=0 n Let us introduce the shorthand notation fn,m (x) := (1 − x)m−1 x2 /(1 − x) . The rational function fn,m (x) is regular at x = 0 and vanishes there to the order 2n. So if m ≤ n, then (2m−1) fn,m (0) = 0. On the other hand, if m > n, then fn,m (x) is a polynomial of degree n + m − 1 < 2m − 1 and hence the (2m − 1)-fold derivative of fn,m vanishes identically.  It will be convenient to introduce some terminology. Definition 2.2. By a symplectic basis we mean a sequence (ϕn (x))n∈N of symplectic power series ϕn (x) ∈ C[[x]] such that each ϕn (x) ∈ m2n and its class in m2n /m2n+1 is nonzero. Here m denotes the maximal ideal x C[[x]] of the complete local ring C[[x]]. ON COMPOSITIONS WITH x2 /(1 − x) 5 Lemma 2.3. Let (ϕn (x))n∈N be a symplectic basis. Then for each symplectic power series ϕ(x) there exists a unique sequence (an )n∈N of numbers such that for each k≥0 (2.1) ϕ(x) − It follows that ϕ(x) = of C[[x]]. P i≥0 k X i=0 ai ϕi (x) ∈ m2k+2 . ai ϕi (x), where the sum converges in the m-adic topology Proof. We start with a preparatory observation. Suppose that k ≥ 0 and f (x) = P i 2k+1 , i.e., α0 = α1 = · · · = α2k = 0. Then (Sk+1 ) i≥0 αi x is symplectic and in m implies that α2k+1 = 0 as well, that is f (x) ∈ m2k+2 . Assume now for induction that ϕ(x) − k−1 X i=0 ai ϕi (x) ∈ m2k . Pk It follows that there is a unique number ak such that ϕ(x)− i=0 ai ϕi (x) ∈ m2k+1 . Since the latter series is symplectic, the above argument tells us that it is in fact in m2k+2 .  As a consequence, with the choice of the symplectic basis  2 n  x (2.2) 1−x n∈N we can P write each symplectic series ϕ(x) as a formal composite ρ(x2 /(1 − x)), where ρ(y) = i≥0 ai y i ∈ C[[y]]. This proves Proposition 1.4. Remark 2.4. There are of course plenty of other symplectic bases. In fact, any symplectic power series ϕ1 (x) that is in m2 and whose class in m2 /m3 does not vanish generates a symplectic basis ((ϕ1 (x))n )n∈N . A choice different from x2 /(1 − x) is provided by the sequence of Genocchi numbers. The sequence of Genocchi numbers (Gn )n∈N (cf. entry A036968 in the online encyclopedia [11]) is defined by the exponential generating function 2z ez + 1 = X n≥0 Gn zn n! z2 z4 3z 6 17z 8 155z 10 2073z 12 + − + − + − . . . ∈ C[[z]]. 2! 4! 6! 8! 10! 12! P Setting Gen(x) := i≥0 Gn+1 xn , it follows from [6] (see also Section 5) that = z− (2.3) ϕ1 (x) := x2 Gen(−x) is symplectic, and hence generates a symplectic basis as described above. As Gn = O(n!/π n ), Gen(x) as well as ϕ1 (x) cannot be rational. Also note that the only even monomial occurring in the expansion of ϕ1 (x) := x2 Gen(−x) is x2 . 6 HANS-CHRISTIAN HERBIG, DANIEL HERDEN, AND CHRISTOPHER SEATON 3. Proof of Theorem 1.6 First let us prove that a formal power series ϕ(x) = and only if (3.1) P i≥0 γi xi is symplectic if ϕ(x) = ϕ(x/(x − 1)). The implication =⇒ is a consequence of Proposition 1.4. Conversely, let us assume that ϕ(x) fulfills Equation (3.1). Using the identity n X    n + i − 1 n+i x = x , (−1)n x−1 n−1 i≥0 for n ≥ 1, we see that Equation (3.1) is tantamount to   m X n m−1 (3.2) γn (−1) γm = n−1 i=1 for all m ≥ 1. Without loss of generality we can assume that γ2n = 0 for all n ≥ 0. This can be achieved by subtracting a suitable symplectic power series. With this assumption it follows recursively from (3.2) that γn = 0 for all n ≥ 0. Since ϕ(x) = 0 is symplectic, this shows implication ⇐=. This establishes the first claim of Theorem 1.6. The rest of the statement will follow from the following. Lemma 3.1. Let ϕ(x) = P (x)/Q(x) be a rational symplectic function. Then there exists a rational function ρ(y) such that ϕ(x) = ρ(x2 /(1 − x)). Proof. Assume that ϕ is nonzero, and then we may express ϕ(x) = Cxk (x − 1)ℓ (x − 2)m (3.3) × r Y i=1 (x − λi )ni where C ∈ C , each λi ∈ C r {0, 1, 2}, r is a nonnegative integer, and k, ℓ, m, and ni for i = 1, . . . , r are integers. Let q = deg(Q(x)) − deg(P (x)), and then we have (3.4) q = −k − ℓ − m − r X ni . i=1 By a simple computation,    ni r Y x λi (3.5) ϕ (1 − λi )ni x − . = C(−1)m xk (x − 1)q (x − 2)m x−1 λi − 1 i=1 We have that ϕ(x) is symplectic by hypothesis so that by the substitution theorem [1, Theorem 9.25], Equation (3.1) holds for ϕ(x). Hence, a comparison of Equations (3.3) and (3.5) yields (3.6) m (−1) r Y i=1 (3.7) (3.8) r  Y x− i=1 (1 − λi )ni = 1, λi λi − 1 q = ℓ, and ni Y r (x − λi )ni . = i=1 ON COMPOSITIONS WITH x2 /(1 − x) 7 Qr From Equation (3.8), we have that for each factor x − λi in i=1 (x − λi )ni , a factor x − λi /(λi − 1) must also appear. Hence we may rewrite  n′j r′ r Y Y µj n′j ni x− (x − µj ) (x − λi ) = (3.9) µj − 1 j=1 i=1 for a nonnegative integer r′ , nonnegative integers n′j and µj ∈ C r {0, 1, 2} for j = 1, . . . , r′ . Combining Equations (3.6) and (3.9) and observing that for each j, (1 − µj )(1 − µj /(µj − 1)) = 1, we obtain  n′j r′ Y µj n′j m 1− (1 − µj ) 1 = (−1) = (−1)m µ − 1 j j=1 so that m = 2m′ for some m′ ∈ Z. Similarly, Equations (3.4) and (3.7) can now be used to express r′ X 2n′j k = −2ℓ − 2m′ − j=1 ′ ′ so that k = 2k for some k ∈ Z, and then we have ′ ′ ′ ℓ = −k − m − r X n′j . j=1 Substituting (3.9) into (3.3) and applying the above observations yields  n′j r′ P ′ Y ′ µj −k′ −m′ − rj=1 n′j 2k′ 2m′ (x − µj )nj x − ϕ(x) = Cx (x − 1) (x − 2) µj − 1 j=1 !n′j k′  m′ Y  r′ µ2j x2 x2 x2 − − −4 − , =C − 1−x 1−x 1 − x µj − 1 j=1 a rational function of x2 /(1 − x), completing the proof.  4. Proof of Theorem 1.3 In this section, we let G = Tℓ = (S1 )ℓ , let V be a unitary representation of G with dimC V = n, and let M0 denote the corresponding symplectic quotient. We choose a (complex) basis for V with respect to which the G-action is diagonal, and then the action of G is described by a weight matrix A ∈ Zℓ×n . Specifically, we let z := (z1 , . . . , zℓ ) ∈ G with each zi ∈ S1 and introduce the notation z aj := a a a z1 1,j z2 2,j · · · zℓ ℓ,j for each j = 1, . . . , n. Then the action of z on V as a unitary transformation is given with respect to this basis by z 7→ diag(z a1 , . . . , z an ). Concatenating our basis for V with its complex conjugate to produce a real basis for V , the action of z on V as real linear transformations is given by z 7→ diag(z a1 , . . . , z an , z −a1 , . . . , z −an ). Let J : V → g∗ denote the homogeneous quadratic moment map, let Z := J (0), and let M0 := Z/G denote the symplectic quotient; see Section 1. As G is abelian, the components of J are elements of R[V ]G . We may assume without loss −1 8 HANS-CHRISTIAN HERBIG, DANIEL HERDEN, AND CHRISTOPHER SEATON of generality that 0 is in the convex hull of the columns of A in Rℓ and the rank of A is ℓ; see [7, Section 2] or [5, Section 3]. Using Molien’s formula, see [3, Section 4.6.1], the Hilbert series of the invariant ring R[V ]G is given by Z dz dz · · · dzℓ 1 Qn Qn 1 2 . HilbR[V ]G (t) = ℓ (2πi) ( j=1 zj ) j=1 (1 − tz aj )(1 − tz −aj ) z∈Tℓ Then by [8, Proposition 2.1], the Hilbert series of the real regular functions on the symplectic quotient M0 is given by Z 1 (1 − t2 )ℓ dz1 dz2 · · · dzℓ Qn Qn . HilbR[M0 ] (t) = ℓ (2πi) ( j=1 zj ) j=1 (1 − tz aj )(1 − tz −aj ) z∈Tℓ Define the function (1 − t2 )ℓ Qn h(z, t) = Qn , ( j=1 zj ) j=1 (1 − tz aj )(1 − tz −aj ) and then we have (1 − t−2 )ℓ Qn h(z, t−1 ) = Qn ( j=1 zj ) j=1 (1 − t−1 z aj )(1 − t−1 z −aj ) t2(n−ℓ) (t2 − 1)ℓ Qn = Qn ( j=1 zj ) j=1 (1 − tz aj )(1 − tz −aj ) = (−1)ℓ t2(n−ℓ) h(z, t). Fix t ∈ C with |t| < 1, and then HilbR[M0 ] (t−1 ) = 1 (2πi)ℓ Z h(z, t−1 )dz1 dz2 · · · dzℓ Z (−1)ℓ h(z, t)dz1 dz2 · · · dzℓ . z∈Tℓ 2(n−ℓ) = t (2πi)ℓ z∈Tℓ Choose an i and fix arbitrary values zk ∈ S1 for k 6= i. Dividing the numerator and a denominator by zi i,j for each ai,j < 0 to express h(z, t) in terms of positive powers of zi , and using the fact that each row of A contains at least one nonzero entry, it is easy to see that Reszi =∞ h(z, t) = − Reszi =0 1 h(z1 , . . . , 1/zi , . . . , zn , t) = 0. zi2 A computation demonstrates that the transformation t 7→ t−1 induces a bijection between the poles in zi inside the unit disk with those outside the unit disk. Then considering each S1 -factor of Tℓ as a negatively-oriented curve about the point at infinity, introducing a factor of (−1)ℓ , we have HilbR[M0 ] (t−1 ) = t2(n−ℓ) HilbR[M0 ] (t). Then Theorem 1.3 follows from Corollary 1.7 and the fact that R[M0 ] has dimension d = 2(n − ℓ). ON COMPOSITIONS WITH x2 /(1 − x) 9 5. Applications to even Euler polynomials and Bernoulli Numbers Our aim is to derive from the fact that the space of symplectic power series forms a subalgebra (cf. Corollary 1.5) a certain combinatorial identity, Equation (5.3), that might be of independent interest. We recall that the Euler polynomials En (x), n = 0, 1, 2, . . . , are defined by the expansion X 2ext tn (5.1) = En (x) . t e +1 n! n≥0 We introduce numbers n i via x(x2n − E2n (x)) =: X n i i x2i , observing that the even Euler polynomials, apart from their leading monomials,  n contain only monomials that are odd powers of x. Note that are integers and i n i = 0 for i ≤ 0 or i > n. The coefficients of the even indexed Euler polynomials are listed in the  online encyclopedia [11] as entry A060083. The first six lines in the triangle of ni are: 1 3 155 −2073 −17 3410 −1 28 −255 2 −5 126 −1683 3 −14 396 4 −30 5 −55 6 , where the line and diagonal indexing starts with n = 1 (read from top to bottom) and  i = 1 (read from left to right). We warn the reader that the recursions for the n i have no resemblance to those for the binomial coefficients. P i Theorem 5.1. Let ϕ(x) = i≥0 γi x be a formal power series. Then ϕ(x) is symplectic if and only if for each n ≥ 0, X n γ2i . (5.2) γ2n+1 = i i In particular, for each choice of γ0 , γ2 , γ4 , γ6 , . . . there is a uniquely defined symplectic power series ϕ(x) determined by the above rule. Corollary 5.2. For all integers n, k, ℓ we have         X X   n r−1 i−r n−k n−ℓ n (5.3) + . = + i k ℓ ℓ k k+ℓ r i We would like to mention that the Euler coefficients are related to the Genocchi numbers Gn , respectively the Bernoulli numbers Bn , using the formula       G2(n−i+1) n 4n−i+1 − 1 2n 2n =− = B2(n−i+1) . i 2(n − i + 1) 2i − 1 n−i+1 2i − 1 This means that Equation (5.3) can be interpreted as a cubic relation for the Bernoulli numbers. 10 HANS-CHRISTIAN HERBIG, DANIEL HERDEN, AND CHRISTOPHER SEATON P P Proof of Corollary 5.2. Let i≥0 γi xi and j≥0 δj xj be symplectic power series. P From Corollary 1.5 we know that their Cauchy product m≥0 ϑm xm is symplectic P with, for each m ∈ N, ϑm = i+j=m γi δj . The left hand side of Equation (5.3) arises from expressing X ϑ2n+1 = γr δ s r+s=2n+1 in terms of even γ’s and δ’s using Equation (5.2). Similarly, the right hand side of Equation (5.3) arises from expressing n n   X X  n X n γr δ s ϑ2i = ϑ2n+1 = i i i=1 r+s=2i i=1 in terms of even γ’s and δ’s. In the argument, we also use the fact that the even γ’s and δ’s can be chosen freely.  Proof of Theorem 5.1. The argument is inspired by [6, Section 7]. There the situation is studied when two sequences (cn )n∈N and (dn )n∈N are related by n   X n (5.4) ci dn = i i=0 for all n. Then [6, Theorem 7.4] states that for all nonnegative integers m and n,   n m   X X m n+j n (5.5) dm+j . (−1) cn+i = j i j=0 i=0 By inspection of the generating function (5.1), we derive the recursion n   X n Ei (x) = 2xn . En (x) + i i=0 The idea is to put ci := Ei (x) and dn := 2xn − En (x) and observe that condition (5.4) holds. As the special case n = m ≥ 0 of (5.5), we find   n n   X X  n n+i n (−1) (5.6) 2xn+i − En+i (x) . En+i (x) = i i i=0 i=0 This can be rewritten as   n X  n xn+i − En+i (x) = i i=0 n+i even   n X n n+i x , i i=0 n+i odd which is equivalent to   X  n+i    n n X X n n n+i 2 (−1)i (5.7) x = 0. (−1)i x2j−1 + i i j j i=0 i=0 n+i even n+i odd Let now (γnP )n∈N be a number sequence such that (5.2) holds. It will be enough to show that i≥0 γi xi is symplectic. We interpret x as an umbral variable (cf. for example [6]) and define the functional Γ : C[x] → C by Γ(xn ) = γn+1 for n ON COMPOSITIONS WITH x2 /(1 − x) 11 odd. For even n, we put Γ(xn ) = 0 (this choice will not affect the considerations to follow). Applying Γ to Equation (5.7), we end up with     X  n+i  n n X X n n 2 γ2j + γn+i+1 = 0, (−1)i (−1)i j i i i=0 j i=0 n+i even | {z } n+i odd =γn+i+1 showing that  γn+i+1 = 0, i.e., condition (Sn+1 ) of Definition 1.1.  Pn i n i=0 (−1) i To complete this section, we use the above observations to indicate an alternate symplectic basis than those considered in Section 2. Lemma 5.3. For all integers k ≥ 0, the formal power series ∞   ∞ X X 1 i 2i+1 (2k−1) (−1)i−1 Ei−1 (0) xi = −x2k − (5.8) ψk (x) := x (2k − 1)! i=0 k i=k is symplectic. Proof. Using Equation (5.6), we write   n   n n   X  1X 1X n n n+i n (−1) 2xn+i − En+i (x) En+i (x) + En+i (x) = i 2 i 2 i i=0 i=0 i=0   n   n X  1X n n n+i = (−x)n+i En+i (x) + 1 − (−1) i 2 i=0 i i=0     n n X X  n n n+i x , En+i (x) − xn+i + = i i | {z } i=0 i=0 n+i odd n+i even =: (∗)  where (∗) contains only even powers of x. Thus in i ni En+i (x), all coefficients of odd degree vanish, meaning that for all k ≥ 1, n   X 1 n (2k−1) En+i (0) = 0. (2k − 1)! i=0 i P It follows that ∞ P i=0 (2k−1) (−1)i−1 En−1 (0) xi fulfills (Sn+1 ).  As a consequence of Lemma 5.3, we have that (ψn (x))n∈N forms a symplectic basis in the sense of Definition 2.2. Note that ψ1 is essentially the generating function of the Genocchi sequence (2.3), namely we have ψ1 (x) = −ϕ1 (x). The idea of the above proof can be used to argue that for each λ ∈ C the power series X (−1)i−1 (Ei−1 (λ) − Ei−1 (−λ)) xi ∈ C[[x]] i≥0 is symplectic. 6. Sample Calculations In this section, we survey a few special cases of Conjecture 1.2 and Theorem 1.3 that can be verified by direct computations. We first consider the case of a unitary representation of a finite group. In this case, as a consequence of Corollary 1.7, Conjecture 1.2 is a special case of Watanabe’s Theorem [16, 17], see in particular [13, Theorem 7.1]. 12 HANS-CHRISTIAN HERBIG, DANIEL HERDEN, AND CHRISTOPHER SEATON 6.1. Quotients by finite unitary group representations. Let G be a finite group and G → U(V ) a unitary representation. For g ∈ G, we let gV : V → V denote the corresponding linear transformation. Let W := V × V , and then G acts on W via gW : (u, v) 7→ (gV u, (gV−1 )t v). We identify R[V ] with the subring C[W ]− of C[W ] given by those elements fixed by complex conjugation, and then by Molien’s formula [9], see also [3, 14], the Hilbert series of real regular invariants is given by (6.1) HilbR[V ]G |R (t) = 1 X 1 −1 . |G| det(id −gW t) W g∈G Fix g ∈ G and choose a basis for V with respect to which gV is diagonal, say gV = diag(λ1 , . . . , λn ) where |λi | = 1 for each i. Choosing the conjugate basis for V and concatenating to form a basis for W , we have gW = diag(λ1 , . . . , λn , λ1 , . . . , λn ). It then follows that (6.2) 1 −1 det(idW −gW t) = n Y 1 . (1 − λ t)(1 − λ−1 i i t) i=1 In this case, each term of the sum in Equation (6.1) is symplectic of order 2n at t = 1. Specifically, for λ ∈ C, define fλ (t) := 1 . (1 − λt)(1 − λ−1 t) Then by the above observations, we have that each term in Molien’s formula is given by a product of fλi (t). We claim the following. Lemma 6.1. For nonzero λ ∈ C, the function fλ (t) is symplectic at t = 1 of order 2. Proof. If λ = 1, then f1 (t) = (1 − t)−2 and the result is trivial, so assume not. Define λy , ρλ (y) = 1 + 2λ + λ2 + λy and then by a simple computation,   1 (1 − t)2 = fλ (t). ρλ (1 − t)2 t The result then follows from Corollary 1.5.  We remark that Lemma 6.1 can also be seen using the expansion fλ (t) = ∞ X −λ(λk+1 − (−1)k+1 ) (1 − t)k (λ2 − 1)(λ − 1)k+1 k=−2 and verifying (Sm ) directly, or by checking that fλ (t) satisfies (1.1) for a = 1 and d = 2. By Lemma 6.1 and Corollary 1.5, it follows that the expression in Equation (6.2) is symplectic of order 2n at t = 1. ON COMPOSITIONS WITH x2 /(1 − x) 13 6.2. Symplectic quotients by S1 . We observe that Corollary 1.5 (in the case a = 1) is a sufficient tool to verify Conjecture 1.2 for symplectic S1 -quotients caseby-case. When the action is generic, i.e. no two weights have the same absolute value, an algorithm for computing the Hilbert series is described in [8, Section 4] and has been implemented on Mathematica [18]. To check that a concrete Hilbert series is symplectic of order d = dim(M0 ), we use the substitution t 7→  p 1 y + 2 ± y(y + 4) 2 as a heuristic to find a rational function ρ(y) as in Corollary 1.5. As an example, if M0 is a reduced space associated to the weight vector (±1, ±2, ±3) where not all weights have the same sign, then HilbR[M0 ] (t) = t10 + t8 + 3t7 + 4t6 + 4t5 + 4t4 + 3t3 + t2 + 1 . (1 − t2 )(1 − t3 )(1 − t4 )(1 − t5 ) One easily checks that ρ(y) = y 5 + 10y 4 + 36y 3 + 59y 2 + 50y + 22 (y + 2)(y + 3)(y + 4)(y 2 + 5y + 5) satisfies the condition of Corollary 1.5. Similarly, let S1 act on Cn with weight vector (±1, . . . , ±1) and let M0 denote the symplectic quotient, which we note has dimension 2n − 2. We assume that n ≥ 2 and not all weights have the same sign, for otherwise M0 is a point and the result is trivial. By [8, Section 5.3], the Hilbert series R[M0 ] is given by n−1 X n − 12 1 HilbR[M0 ] (t) = (1 − t ) 2 F1 (n, n, 1, t ) = t2k (1 − t2 )2n−2 k 2 2 k=0 where 2 F1 denotes the hypergeometric function; see [4]. Theorem 1.3 can be verified directly using Corollary 1.5 for this case as follows. Define n−1 X n − 12k 1 ρ(y) = y n−k−1 . (y + 4)n−1 k k k=0 Let (a)b denote the Pochhammer symbol, i.e. (a)b := a(a + 1) · · · (a + b − 1) for b > 0 and (a)0 = 1, and note that (1/2)k = (2k)!/(4k k!). Applying the definition of 2 F1 , we compute  k  n−1 X n − 12k   1 1 (1 − t)2 t = ρ (1 − t)2n−2 t (1 + t)2n−2 (1 − t)2 k k k=0 n−1 X (1 − n)k (1/2)k  −4t k 1 = (1 + t)2n−2 (1)k k! (1 − t)2 k=0 1 2 = 2 F1 (1 − n, 1/2, 1, −4t/(1 − t) ). (1 + t)2n−2 14 HANS-CHRISTIAN HERBIG, DANIEL HERDEN, AND CHRISTOPHER SEATON We then apply [4, page 113, Equation (36)] and continue = n−1 X (1 − n)k (1 − n)k 1 1 2 F (1 − n, 1 − n, 1, t ) = t2k 2 1 2 2n−2 2 2n−2 (1 − t ) (1 − t ) (1)k k! k=0 n−1 X n − 12 1 = t2k (1 − t2 )2n−2 k k=0 = HilbR[M0 ] (t). References 1. Tom M. Apostol, Mathematical analysis, second ed., Addison-Wesley Publishing Co., Reading, Mass.-London-Don Mills, Ont., 1974. 2. Winfried Bruns and Jürgen Herzog, Cohen-Macaulay rings, Cambridge Studies in Advanced Mathematics, vol. 39, Cambridge University Press, Cambridge, 1993. 3. Harm Derksen and Gregor Kemper, Computational invariant theory, Invariant Theory and Algebraic Transformation Groups, I, Springer-Verlag, Berlin, 2002, Encyclopaedia of Mathematical Sciences, 130. 4. Arthur Erdélyi, Wilhelm Magnus, Fritz Oberhettinger, and Francesco G. Tricomi, Higher transcendental functions. Vols. I, II, McGraw-Hill Book Company, Inc., New York-TorontoLondon, 1953, Based, in part, on notes left by Harry Bateman. 5. Carla Farsi, Hans-Christian Herbig, and Christopher Seaton, On orbifold criteria for symplectic toric quotients, SIGMA Symmetry Integrability Geom. Methods Appl. 9 (2013), Paper 032, 18. 6. Ira M. Gessel, Applications of the classical umbral calculus, Algebra Universalis 49 (2003), no. 4, 397–434, Dedicated to the memory of Gian-Carlo Rota. 7. Hans-Christian Herbig, Srikanth B. Iyengar, and Markus J. Pflaum, On the existence of star products on quotient spaces of linear Hamiltonian torus actions, Lett. Math. Phys. 89 (2009), no. 2, 101–113. 8. Hans-Christian Herbig and Christopher Seaton, The Hilbert series of a linear symplectic circle quotient, to appear in Experimental Mathematics (2013), arXiv:1302.2662 [math.SG]. 9. Th. Molien, Über die Invarianten der linearen Substitutionsgruppen, Sitzungsber. der Königl. Preuss. Akad. d. Wiss. zweiter Halbband (1897), 1152–1156. 10. Reyer Sjamaar and Eugene Lerman, Stratified symplectic spaces and reduction, Ann. of Math. (2) 134 (1991), no. 2, 375–422. 11. N. J. A. Sloane, Online Encyclopaedia of Integer Sequences, https://oeis.org (cited February 2014). 12. Richard P. Stanley, Hilbert functions of graded algebras, Advances in Math. 28 (1978), no. 1, 57–83. , Invariants of finite groups and their applications to combinatorics, Bull. Amer. Math. 13. Soc. (N.S.) 1 (1979), no. 3, 475–511. 14. Bernd Sturmfels, Algorithms in invariant theory, Texts and Monographs in Symbolic Computation, Springer-Verlag, Vienna, 1993. 15. È. B. Vinberg and V. L. Popov, Invariant theory, Algebraic geometry. IV, Encyclopaedia of Mathematical Sciences, vol. 55, Springer-Verlag, Berlin, 1994, Linear algebraic groups. Invariant theory, A translation of ıt Algebraic geometry. 4 (Russian), Akad. Nauk SSSR Vsesoyuz. Inst. Nauchn. i Tekhn. Inform., Moscow, 1989 [ MR1100483 (91k:14001)], Translation edited by A. N. Parshin and I. R. Shafarevich, pp. vi+284. 16. Keiichi Watanabe, Certain invariant subrings are Gorenstein. I, Osaka J. Math. 11 (1974), 1–8. , Certain invariant subrings are Gorenstein. II, Osaka J. Math. 11 (1974), 379–388. 17. 18. Wolfram Research, Mathematica edition: Version 7.0, (2008), http://www.wolfram.com/mathematica/. ON COMPOSITIONS WITH x2 /(1 − x) 15 Charles University in Prague, Faculty of Mathematics and Physics, Sokolovská 83, 186 75 Praha 8, Czech Republic E-mail address: [email protected] University of Duisburg-Essen, Department of Mathematics, Campus Essen, 45117 Essen, Germany E-mail address: [email protected] Department of Mathematics and Computer Science, Rhodes College, 2000 N. Parkway, Memphis, TN 38112 E-mail address: [email protected]
0math.AC
Electronic Letters on Computer Vision and Image Analysis 16(2):17-20, 2017 Learning audio and image representations with bio-inspired trainable feature extractors Nicola Strisciuglio∗ ∗ Johann Bernoulli Institute for Mathematics and Computer Science, University of Groningen, Netherlands arXiv:1801.00688v1 [cs.CV] 2 Jan 2018 This work was carried out at the University of Groningen (Netherlands) and at the University of Salerno (Italy) Received 24th Jul 2017; accepted 24th Nov 2017 Abstract Recent advancements in pattern recognition and signal processing concern the automatic learning of data representations from labeled training samples. Typical approaches are based on deep learning and convolutional neural networks, which require large amount of labeled training samples. In this work, we propose novel feature extractors that can be used to learn the representation of single prototype samples in an automatic configuration process. We employ the proposed feature extractors in applications of audio and image processing, and show their effectiveness on benchmark data sets. 1 Introduction Since when very young, we can quickly learn new concepts, and distinguish between different kinds of object or sound. If we see a single object or hear a particular sound, we are then able to recognize such sample or even different versions of it in other scenarios. For example, if one sees an iron chair and associates the object to the general concept of “chairs”, he will be able to detect and recognize also wooden or wicker chairs. Similarly, when we hear the sound of a particular event, such as a scream, we are then able to recognize other kinds of scream that occur in different environments. We continuously learn representations of the real world, which we then use in order to understand new and changing environments. In the field of pattern recognition, traditional methods are typically based on representations of the real world that require a careful design of a suitable feature set (i.e. a data representation), which involves considerable domain knowledge and effort by experts. Recently, approaches for automated learning of representations from training data were introduced. Representation learning aims at avoiding engineering of hand-crafted features and providing automatically learned features suitable for the recognition tasks. Nowadays, widely popular approaches for representation learning are based on deep learning techniques and convolutional neural networks (CNN). These techniques are very powerful, but are computationally expensive and require large amount of labeled training data to learn effective models for the applications at hand. In this paper we report the main achievements included in the doctoral thesis titled ‘Bio-inspired algorithms for pattern recognition in audio and image processing’, in which we proposed novel approaches for representation learning for audio and image signals [5]. Correspondence to: Nicola Strisciuglio <[email protected]> Recommended for acceptance by Anjan Dutta and Carles Sánchez http://dx.doi.org/10.5565/rev/elcvia.1128 ELCVIA ISSN:1577-5097 Published by Computer Vision Center / Universitat Autònoma de Barcelona, Barcelona, Spain 18 Electronic Letters on Computer Vision and Image Analysis 16(2):17-20, 2017 feature learning input data pre-processing feature extraction feature selection model training classification/rejection decision Figure 1: Overview of a pattern recognition system. The input data are pre-processed and then features are computed to extract important properties from such data. The features to be computed can be determined by an engineering process or can be learned from the data (representation learning). Feature selection procedures can be employed to determine a sub set of discriminant features that are then used to train a classifier, which determines a model of the training data. Such model is then used in the operating phase of the system, while a classifier takes decisions on the input data. 2 Motivation and contribution Motivated by the fact that we can learn effective representations of a new category of objects or sounds from a single example and successively generalize to a wide range of real-world samples, we studied the possibility of learning data representations from small amounts of training samples. We investigated the design of feature extractors that can be automatically trained by showing single prototype samples, and employed them into pattern recognition systems to solve practical problems. We proposed representation learning techniques for audio and image processing based on novel trainable feature extractors. The design and implementation of the proposed feature extractors are inspired by some functions of the human auditory and visual systems. The structure of the proposed feature extractors is learned from training samples in an automatic configuration step, rather than fixed a-priori in the implementation [5]. We employed the newly designed methodologies into systems for audio event detection and classification in noisy environments and for delineation of blood vessels in retinal fundus images. The contributions of this work can be listed as: a) novel bio-inspired trainable feature extractors for representation learning of audio and image signals, respectively called COPE and B-COSFIRE; b) a system for audio event detection based on COPE feature extractors; c) the release of two data sets of audio events of interest mixed to various background sounds and with different signal to noise ratios (SNR); d) a method for delineation of elongated and curvilinear patterns in images based on B-COSFIRE filters; e) feature selection mechanisms based on information theory and machine learning approaches. 3 Methods We introduced a novel approach for representation learning, based on trainable feature extractors. We extended the traditional scheme of pattern recognition systems with feature learning algorithms (dashed box at the top of Figure 1), which construct a suitable representation of training data by automatic configuring a set of feature extractors. Electronic Letters on Computer Vision and Image Analysis 16(2):17-20, 2017 19 We proposed trainable COPE (Combination of Peaks of Energy) feature extractors for sound analysis, that can be trained to detect any sound pattern of interest. In an automatic configuration process performed on a single prototype sound pattern, the structure of a COPE feature extractor is learned by modeling the constellation of peak points in a time-frequency representation of the input sound [10]. In the application phase, a COPE feature has high value when computed on the same sound used for configuration, but also to similar or corrupted versions of it due to noise or distortion. This accounts for generalization capabilities and robustness of detection of the patterns of interest. The response of a COPE feature extractor is computed as the combination of the weighted score of its constituent constellation of energy peaks. For further detail we refer the reader to [10]. For the design of COPE feature extractors, we were inspired by some functions of the cochlea membrane and the inner hair cells in the auditory system, which convert the sound pressure waves into neural stimuli on the auditory nerve. We employed COPE feature extractors together with a multi-class Support Vector Machine (SVM) classifier to perform audio event detection and classification, also in cases where sounds have null or negative SNR. We proposed B-COSFIRE (that stands for Bar-selective Combination of Shifted Filter Responses) filters for detection of elongated and curvilinear patterns in images and apply them to the delineation of blood vessels in retinal images [1, 8]. The B-COSFIRE filters are trainable, that is their structure is automatically configured from prototype elongated patterns. The design of the B-COSFIRE filters is inspired by the functions of some neurons, called simple cells, in area V1 of the visual system, which fire when presented with line or contour stimuli. A B-COSFIRE filter achieves orientation selectivity by computing the weighted geometric mean of the output of a pool of Difference-of-Gaussians (DoG) filters, whose supports are aligned in a collinear manner. Rotation invariance is efficiently obtained by appropriate shiftings of the DoG filter responses. For further detail we refer the reader to [1]. After configuring a large bank of B-COSFIRE filters selective for vessels (i.e. lines) and vessel-endings (i.e. line-endings) of various thickness (i.e. scale), we proposed to use several approaches based on information theory and machine learning to select an optimal subset of B-COSFIRE filters for the vessel delineation task [7, 9]. We indicate this procedure with the dashed box named ‘feature learning’ in Figure 1. We consider the selected filters as feature extractors to construct a pixel-wise feature vector which we used in combination with a SVM classifier to classify the pixels in the testing image as vessel and non-vessel pixels. 4 Experiments and Results We released two data sets for benchmark of audio event detection and classification methods, namely the MIVIA audio events [3] and the MIVIA road events [2] data sets. We reported baseline results (recognition rate of 86.7% and 82% on the two data sets) by using a real-time method for event detection that is based on an adaptation of the bag of features classification scheme to noisy audio streams [3, 2]. The results that we achieved by using COPE feature extractors show a considerable improvement with respect to the ones of the bag of features approach. We obtained a recognition rate of 95.38% on the MIVIA audio event and of 94% (with standard deviation on cross-validation experiments equal to 4.32) on the MIVIA road event data sets. We performed t-Student tests and observed a statistically significant improvement of the recognition rate with respect to baseline performance on both data sets. We evaluated the performance of the proposed B-COSFIRE filters on four data sets of retinal fundus images for benchmarking of blood vessel segmentation algorithms, namely the DRIVE, STARE, CHASE DB1 and HRF data sets. The results that we achieved (DRIVE: Se = 0.7655, Sp = 0.9704; STARE: Se = 0.7716, Sp = 0.9701; CHASE DB1: Se = 0.7585, Sp = 0.9587; HRF: Se = 0.7511, Sp = 0.9745) are higher than the ones reported by many state-of-the-art methods based on filtering approaches. The filter selection procedure based on supervised learning that we proposed in [9] contributes to a statistically significant increase of performance results, which are higher than or comparable to the ones of other methods based on machine learning techniques. We extended the application range of the B-COSFIRE filters to aerial images for the delineation of roads and rivers, natural and textured images [4], and to pavement and road surface images for the detection of cracks and 20 Electronic Letters on Computer Vision and Image Analysis 16(2):17-20, 2017 damages [6]. The results that we achieved are better than or comparable to the ones achieved by existing methods, which are usually designed to solve specific problems. The proposed B-COSFIRE filters demonstrated to be effective in various applications and with different types of images (retinal fundus photography, aerial photography, laser scans) for delineation of elongated and curvilinear patterns. We studied the computational requirements of the proposed algorithms in order to evaluate their applicability in real-world applications and the fulfillment of real-time constraints given by the considered problems. The MATLAB implementation of the proposed algorithms are publicly released for research purposes* . 5 Conclusions In this work, we proposed novel trainable feature extractors and employed them in applications of sound and image processing. The trainable character of the proposed feature extractors is in that their structure is learned directly from training data in an automatic configuration process, rather the fied in the implementation. This provides flexibility and adaptability of the proposed methods to different applications. The experimental results that we achieved, compared to the ones of other existing approaches, demonstrated the effectiveness of the proposed methods in various applications. This work contributes to the development of techniques for representation learning in audio and image processing, suitable for domains where there is no availability of large amount of labeled training data. References [1] Azzopardi, G., Strisciuglio, N., Vento, M., Petkov, N.: Trainable COSFIRE filters for vessel delineation with application to retinal images. Medical Image Analysis 19(1), 46 – 57 (2015) [2] Foggia, P., Petkov, N., Saggese, A., Strisciuglio, N., Vento, M.: Audio surveillance of roads: A system for detecting anomalous sounds. IEEE Trans. Intell. Transp. Syst. 17(1), 279–288 (2016) [3] Foggia, P., Petkov, N., Saggese, A., Strisciuglio, N., Vento, M.: Reliable detection of audio events in highly noisy environments. Pattern Recogn. Lett. 65, 22 – 28 (2015) [4] Strisciuglio, N., Petkov, N.: Delineation of line patterns in images using b-cosfire filters. In: 2017 International Conference and Workshop on Bioinspired Intelligence (IWOBI). pp. 1–6 (July 2017) [5] Strisciuglio, N.: Bio-inspired algorithms for pattern recognition in audio and image processing. University of Groningen (2016), http://www.cs.rug.nl/~nick/strisciuglio phd.pdf [6] Strisciuglio, N., Azzopardi, G., Petkov, N.: Detection of curved lines with b-cosfire filters: A case study on crack delineation. In: CAIP 2017, pp. 108–120 (2017) [7] Strisciuglio, N., Azzopardi, G., Vento, M., Petkov, N.: Multiscale blood vessel delineation using BCOSFIRE filters. In: CAIP, LNCS, vol. 9257, pp. 300–312 (2015) [8] Strisciuglio, N., Azzopardi, G., Vento, M., Petkov, N.: Unsupervised delineation of the vessel tree in retinal fundus images. In: VIPIMAGE, pp. 149–155 (2015) [9] Strisciuglio, N., Azzopardi, G., Vento, M., Petkov, N.: Supervised vessel delineation in retinal fundus images with the automatic selection of B-COSFIRE filters. Mach. Vis. Appl. pp. 1–13 (2016) [10] Strisciuglio, N., Vento, M., Petkov, N.: Bio-inspired filters for audio analysis. In: BrainComp 2015, Revised Selected Papers. pp. 101–115 (2016) * The code is available from the GitLab repositories at http://gitlab.com/nicstrisc
1cs.CV
Verified Parallel String Matching in Haskell Niki Vazou1,2 and Jeff Polakow2 arXiv:1610.07118v1 [cs.PL] 23 Oct 2016 1 UC San Diego 2 Awake Networks Abstract. In this paper, we prove correctness of parallelizing a string matcher using Haskell as a theorem prover. We use refinement types to specify correctness properties, Haskell terms to express proofs and Liquid Haskell to check correctness of proofs. First, we specify and prove that a class of monoid morphisms can be parallelized via parallel monoid concatenation. Then, we encode string matching as a morphism to get a provably correct parallel transformation. Our 1839LoC prototype proof shows that Liquid Haskell can be used as a fully expressive theorem prover on realistic Haskell implementations. 1 Introduction In this paper, we prove correctness of parallelization of a naı̈ve string matcher using Haskell as a theorem prover. We use refinement types to specify correctness properties, Haskell terms to express proofs and Liquid Haskell to check correctness of proofs. Optimization of sequential functions via parallelization is a well studied technique [14,4]. Paper and pencil proofs of program have been developed to support the correctness of the transformation [6]. However, these paper and pencil proofs show correctness of the parallelization algorithm and do not reason about the actual implementation that may end up being buggy. Dependent Type Systems (like Coq [3] and Adga [19] ) enable program equivalence proofs for the actual implementation of the functions to be parallelized. For example, SyDPaCC [18] is a Coq extension that given a naı̈ve Coq implementation of a function, returns an Ocaml parallelized version with a proof of program equivalence. The limitation of this approach is that the initial function should be implemented in the specific dependent type framework and thus cannot use features and libraries from one’s favorite programming language. Refinement Types [8,12,24] on the other hand, enable verification of existing general purpose languages (including ML [34,2,22], C [7,23], Haskell [31], Racket [15] and Scala [26]). Traditionally, refinement types are limited to “shallow” specifications, that is, they are used to specify and verify properties that only talk about behaviors of program functions but not functions themselves. This restriction critically limits the expressiveness of the specifications but allows for automatic SMT [1] based verification. Yet, program equivalence proofs were out of the expressive power of refinement types. Recently, we extended refinement types with Refinement Reflection [32], a technique that reflects each function’s implementation into the function’s type and is implemented in Liquid Haskell [31]. We claimed that Refinement Reflection can turn any programming language into a proof assistant. In this paper we check our claim and use Liquid Haskell to prove program equivalence. Specifically, we define in Haskell a sequential string matching function, toSM, and its parallelization, toSMPar, using existing Haskell libraries; then, we prove in Haskell that these two functions are equivalent, and we check our proofs using Liquid Haskell. Theorems as Refinement Types Refinement Types refine types with properties drawn from decidable logics. For example, the type {v:Int | 0 < v} describes all integer values v that are greater than 0. We refine the unit type to express theorems, define unit value terms to express proofs, and use Liquid Haskell to check that the proofs prove the theorems. For example, Liquid Haskell accepts the type assignment () :: {v:()| 1+1=2}, as the underlying SMT can always prove the equality 1+1=2. We write {1+1=2} to simplify the type {v:()| 1+1=2} from the irrelevant binder v:(). Program Properties as Types The theorems we express can refer to program functions. As an example, the type of assoc expresses that ♦ is associative. assoc :: x : m → y : m → z : m → { x ♦ ( y ♦ z ) = ( x ♦ y ) ♦ z } In § 2 we explain how to write Haskell proof terms to prove theorems like assoc by proving that list append (++) is associative. Moreover, we prove that the empty list [] is the identity element of list append, and conclude that the list (with [] and (++), i.e., the triple ([a], [], (++))) is provably a monoid. Corectness of Parallelization In § 3, we define the type Morphism n m f that specifies that f is a morphism between two monoids (n, η, ) and (m, , ♦), i.e., f :: n → m where f η =  and f (x y) = f x ♦ f y. A morphism f on a “chunkable” input type can be parallelized by: 1. chunking up the input in j chunks (chunk j), 2. applying the morphism in parallel to all chunks (pmap f), and 3. recombining the mapped chunks via ♦, also in parallel (pmconcat i). We specify correctness of the above transformation as a refinement type. parallelismEquivalence :: f :( n → m ) → Morphism n m f → x : n → i : Pos → j : Pos → { f x = pmconcat i ( pmap f ( chunk j x ) ) } § 3 describes the parallelization transformation in details, while Correctness of Parallelization Theorem 4 proves correctness by providing a term that satisfies the above type. Case Study: Parallelization of String Matching We use the above theorem to parallelize string matching. We define a string matching function toSM :: RString → toSM target from a refined string to a string matcher. A refined string (§ 4.1) is a wrapper around the efficient string manipulation library ByteString that moreover assumes various string properties, including the monoid laws. A string matcher SM target (§ 4.2) is a data type that contains a refined string and a list of all the indices where the type level symbol target appears in the input. We prove that SM target is a monoid and toSM is a morphism, thus by the aforementioned Correctness of Parallelization Theorem 4 we can correctly parallelize string matching. To sum up, we present the first realistic proof that uses Haskell as a theorem prover: correctness of parallelization on string matching. Our contributions are summarized as follows – We explain how theorems and proofs are encoded and checked in Liquid Haskell by formalizing monoids and proving that lists are monoids (§ 2). – We formalize morphisms between monoids and specify and prove correctness of parallelization of morphisms (§ 3). – We show how libraries can be imported as trusted components by wrapping ByteStrings as refined strings which satisfy the monoid laws (§ 4.1). – As an application, we prove that a string matcher is a morphism between the monoids of refined strings and string matchers, thus we get provably correct parallelization of string matching (§ 4). – Based on our 1839LoC proof we evaluate the approach of using Haskell as a theorem prover (§ 5). 2 Proofs as Haskell Functions Refinement Reflection [32] is a technique that lets you write Haskell functions that prove theorems about other Haskell functions and have your proofs machinechecked by Liquid Haskell [31]. As an introduction to Refinement Reflection, in this section, we prove that lists are monoids by – specifying monoid laws as refinement types, – proving the laws by writing the implementation of the law specifications, and – verifying the proofs using Liquid Haskell. 2.1 Reflection of data types into logic. To start with, we define a List data structure and teach Liquid Haskell basic properties about List, namely, how to check that proofs on lists are total and how to encode functions on List into the logic. The data list definition L is the standard recursive definition. data L [ length ] a = N | C a ( L a ) With the length annotation in the definition Liquid Haskell will use the length function to check termination of functions recursive on Lists. We define length as the standard Haskell function that returns natural numbers. We lift length into logic as a measure [31], that is, a unary function whose (1) domain is the data type, and (2) body is a single case-expression over the datatype. type Nat = { v : Int | 0 ≤ v } measure length length :: L a → Nat length N = 0 length ( C x xs ) = 1 + length xs Finally, we teach Liquid Haskell how to encode functions on Lists into logic. The flag "--exact-data-cons" automatically derives measures which (1) test if a value has a given data constructor, and (2) extract the corresponding field’s value. For example, Liquid Haskell will automatically derive the following List manipulation measures from the List definition. isN :: L a → Bool isC :: L a → Bool -- Haskell 0 s null -- Haskell 0 s not . null selC1 :: L a → a selC2 :: L a → L a -- Haskell 0 s head -- Haskell 0 s tail Next, we describe how Liquid Haskell uses the above measures to automatically reflect Haskell functions on Lists into logic. 2.2 Reflection of Haskell functions into logic. Next, we define and reflect into logic the two monoid operators on Lists. Namely, the identity element  (which is the empty list) and an associative operator (♦) (which is list append). reflect   :: L a  = N reflect (♦) (♦) :: L a → L a → L a N ♦ ys = ys ( C x xs ) ♦ ys = C x ( xs ♦ ys ) The reflect annotations lift the Haskell functions into logic in three steps. First, check that the Haskell functions indeed terminate by checking that the length of the input list is decreasing, as specified in the data list definition. Second, in the logic, they define the respective uninterpreted functions  and (♦). Finally, the Haskell functions and the logical uninterpreted functions are related by strengthening the result type of the Haskell function with the definition of the function’s implementation. For example, with the above reflect annotations, Liquid Haskell will automatically derive the following strengthened types for the relevant functions.  :: { v : L a | v =  ∧ v = N } (♦) :: xs : L a → ys : L a → { v : L a | v = xs ♦ ys ∧ v = if isN xs then ys else C ( selC1 xs ) ( selC2 xs ♦ ys ) } 2.3 Specification and Verification of Monoid Laws Now we are ready to specify the monoid laws as refinement types and provide their respective proofs as terms of those type. Liquid Haskell will verify that our proofs are valid. Note that this is exactly what one would do in any standard logical framework, like LF [13]. The type Proof is defined as an alias of the unit type (()) in the library ProofCombinators that comes with Liquid Haskell. Figure 1 summarizes the definitions we use from ProofCombinators. We express theorems as refinement types by refining the Proof type with appropriate refinements. For example, the following theorem states the  is always equal to itself. trivial :: {  =  } Where { = } is a simplification for the Proof type {v:Proof |  = }, since the binder v is irrelevant, and trivial is defined in ProofCombinators to be unit. Liquid Haskell will typecheck the above code using an SMT solver to check congruence on . Definition 1 (Monoid). The triple (m, , ♦) is a monoid (with identity element  and associative operator ♦), if the following functions are defined. idLeftm :: x : m → {  ♦ x = x } idRightm :: x : m → { x ♦  = x } assocm :: x : m → y : m → z : m → { x ♦ ( y ♦ z ) = ( x ♦ y ) ♦ z } Using the above definition, we prove that our list type L is a monoid by defining Haskell proof terms that satisfy the above monoid laws. Left Identity is expressed as a refinement type signature that takes as input a list x:L a and returns a Proof type refined with the property  ♦ x = x idLeft :: x : L a → {  ♦ x = x } idLeft x = empty ♦ x ==. N ♦ x ==. x *** QED type Proof = () data QED = QED trivial :: Proof trivial = () (==.) :: x : a → y :{ a | x = y } → { v : a | v = x } x ==. _ = x (***) :: a → QED → Proof _ *** _ = () (∴) :: ( Proof → a ) → Proof → a f ∴ y = f y Fig. 1. Operators and Types defined in ProofCombinators We prove left identity using combinators from ProofCombinators as defined in Figure 1. We start from the left hand side empty ♦ x, which is equal to N ♦ x by calling empty thus unfolding the equality empty = N into the logic. Next, the call N ♦ x unfolds into the logic the definition of (♦) on N and x, which is equal to x, concluding our proof. Finally, we use the operators p *** QED which basically casts p into a proof term. In short, the proof of left identity, proceeds by unfolding the definitions of  and (♦) on the empty list. Right identity is proved by structural induction. We encode inductive proofs by case splitting on the base and inductive case, and enforcing the inductive hypothesis via a recursive call. idRight :: x : L a → { x ♦  = x } idRight N = N ♦ empty ==. N *** QED idRight ( C x xs ) = ( C x xs ) ♦ empty ==. C x ( xs ♦ empty ) ==. C x xs ∴ idRight xs *** QED The recursive call idRight xs is provided as a third optional argument in the (==.) operator to justify the equality xs ♦ empty = xs, while the operator (∴) is merely a function application with the appropriate precedence. Note that LiquiHaskell, via termination and totality checking, is verifying that all the proof terms are well formed because (1) the inductive hypothesis is only applying to smaller terms, and (2) all cases are covered. Associativity is proved in a very similar manner, using structural induction. assoc assoc = ==. ==. *** :: x : L a → y : L a → z : L a → { x ♦ (y ♦ z) = (x ♦ y) ♦ z} N y z N ♦ (y ♦ z) y ♦ z (N ♦ y) ♦ z QED assoc ( C x xs ) y z = ( C x xs ) ♦ ( y ♦ z ) ==. C x ( xs ♦ ( y ♦ z ) ) ==. C x (( xs ♦ y ) ♦ z ) ∴ associativity xs y z ==. ( C x ( xs ♦ y ) ) ♦ z ==. (( C x xs ) ♦ y ) ♦ z *** QED As with the left identity, the proof proceeds by (1) function unfolding (or rewriting in paper and pencil proof terms), (2) case splitting (or case analysis), and (3) recursion (or induction). Since our list implementation satisfies the three monoid laws we can conclude that L a is a monoid. Theorem 1. (L a, , ♦) is a monoid. Proof. L a is a monoid, as the implementation of idLeft, idRight, and assoc satisfy the specifications of idLeftm , idRightm , and assocm , with m = L a. t u 3 Verified Parallelization of Monoid Morphisms A monoid morphism is a function between two monoids which preserves the monoidal structure; i.e., a function on the underlying sets which preserves identity and associativity. We formally specify this definition using a refinement type Morphism. Definition 2 (Monoid Morphism). A function f :: n → m is a morphism between the monoids (m, , ♦) and (n, η, ) if Morphism n m f has an inhabitant. type Morphism n m F = x:n → y:n → {F η =  ∧ F (x y) = F x ♦ F y} A monoid morphism can be parallelized when its domain can be cut into chunks and put back together again, a property we refer to as chunkable and expand upon in § 3.1. A chunkable monoid morphism is then parallelized by: 1. chunking up the input, 2. applying the morphism in parallel to all chunks, and 3. recombining the chunks, also in parallel, back to a single value. In the rest of this section we implement and verify to be correct the above transformation. 3.1 Chunkable Monoids Definition 3 (Chunkable Monoids). A monoid (m, , ♦) is chunkable if the following four functions are defined on m. lengthm :: m → Nat dropm :: i : Nat → x : MGEq m i → MEq m ( lengthm x - i ) takem :: i : Nat → x : MGEq m i → MEq m i takeDropProp m :: i : Nat → x : m → { x = takem i x ♦ dropm i x } Where the type aliases MLeq m I (and MEq m I) constrain the monoid m to have lengthm greater than (resp. equal) to I. type MGEq m I = { x : m | I ≤ lengthm x } type MEq m I = { x : m | I = lengthm x } Note that the “important” methods of chunkable monoids are the take and drop, while the length method is required to give pre- and post-condition on the other operations. Finally, takeDropProp provides a proof that for each i and monoid x, appending take i x to drop i x will reconstruct x. Using takem and dropm we define for each chunkable monoid (m, , ♦) a function chunkm i x that splits x in chunks of size i. chunkm :: i : Pos → x : m → { v : L m | chunkResm i x v } chunkm i x | lengthm x ≤ i = C x N | otherwise = takem i x 8 C 8 chunkm i ( dropm i x ) chunkResm i x v | lengthm x ≤ i = lengthm v == 1 | i == 1 = lengthm v == lengthm xs | otherwise = lengthm v < lengthm xs The function chunkm provably terminates as dropm i x will return a monoid smaller than x, by the Definition of dropm . The definitions of both takem and dropm are also used from Liquid Haskell to verify the lengthm constraints in the result of chunkm . 3.2 Parallel Map We define a parallelized map function pmap using Haskell’s library parallel. Concretely, we use the function Control.Parallel.Strategies.withStrategy that computes its argument in parallel given a parallel strategy. pmap :: ( a → b ) → L a → L b pmap f xs = withStrategy parStrategy ( map f xs ) The strategy parStrategy does not affect verification. In our codebase we choose the traversable strategy. parStrategy :: Strategy ( L a ) parStrategy = parTraversable rseq Parallelism in the Logic. The function withStrategy is an imported Haskell library function, whose implementation is not available during verification. To use it in our verified code, we make the assumption that it always returns its second argument. assume withStrategy :: Strategy a → x : a → { v : a | v = x } Moreover, we need to reflect the function pmap and represent its implementation in the logic. Thus, we also need to represent the function withStrategy in the logic. LiquidHaskell represents withStrategy in the logic as a logical function that merely returns its second argument, withStrategy _ x = x, and does not reason about parallelism. 3.3 Monoidal Concatenation The function chunkm lets us turn a monoidal value into several pieces. In the other direction, for any monoid m, there is a standard way of turning L m back into a single m 1 mconcat :: L m → m mconcat N =  mconcat ( C x xs ) = x ♦ mconcat xs For any chunkable monoid n, monoid morphism f :: n → m, and natural number i > 0 we can write a chunked version of f as mconcat . pmap f . chunk n i :: n → m . Before parallelizing mconcat, we will prove that the previous function is equivalent to f. Theorem 2 (Morphism Distribution). Let (m, , ♦) be a monoid and (n, η, ) be a chunkable monoid. Then, for every morphism f :: n → m, every positive number i and input x, f x = mconcat (pmap f (chunkn i x)) holds. 1 mconcat is usually defined as foldr mappend mempty morphismDistribution :: f :( n → m ) → Morphism n m f → x : n → i : Pos → { f x = mconcat ( pmap f ( chunk n i x ) ) } Proof. We prove the theorem by providing an implementation of morphismDistribution that satisfies its type. The proof proceeds by induction on the length of the input. m o r p h i s m D i s t r i b u t i o n f thm x i | length n x ≤ i = mconcat ( pmap f ( chunk n i x ) ) ==. mconcat ( map f ( chunk n i x ) ) ==. mconcat ( map f ( C x N ) ) ==. mconcat ( f x 8 C 8 map f N ) ==. f is ♦ mconcat N ==. f is ♦  ==. f is ∴ idRightm ( f is ) *** QED m o r p h i s m D i s t r i b u t i o n f thm x i = mconcat ( pmap f ( chunk n i x ) ) ==. mconcat ( map f ( chunk n i x ) ) ==. mconcat ( map f ( C takeX ) ( chunk n i dropX ) ) ) ==. mconcat ( f takeX 8 C 8 map f ( chunk n n dropX ) ) ==. f takeX ♦ f dropX ∴ m o r p h i s m D i s t r i b u t i o n f thm dropX i ==. f ( takeX dropX ) ∴ thm takeX dropX ==. f x ∴ takeDropProp n i x *** QED where dropX = drop n i x takeX = take n i x In the base case we use rewriting and right identity on the monoid f x. In the inductive case, we use the inductive hypothesis on the input dropX = dropn i x, that is provably smaller than x as 1 < i. Then, the fact that f is a monoid morphism, as encoded by our assumption argument thm takeX dropX we get basic distribution of f, that is f takeX ♦ f dropX = f (takeX dropX). Finally, we merge takeX dropX to x using the property takeDropPropn of the chunkable monoid n. t u 3.4 Parallel Monoidal Concatenation We now parallelize the monoid concatenation by defining a pmconat i x function that chunks the input list of monoids and concatenates each chunk in parallel. We use the chunk function of § 3.1 instantiated to L m to define a parallelized version of monoid concatenation pmconcat. pmconcat :: Int → L m → m pmconcat i x | i ≤ 1 || length x ≤ i = mconcat x pmconcat i x = pmconcat i ( pmap mconcat ( chunk i x ) ) The function pmconcat i x calls mconcat x in the base case, otherwise it (1) chunks the list x in lists of size i, (2) runs in parallel mconcat to each chunk, (3) recursively runs itself with the resulting list. Termination of pmconcat holds, as the length of chunk i x is smaller than the length of x, when 1 < i. Next, we prove equivalence of parallelized monoid concatenation. Theorem 3 (Correctness of Parallelization). Let (m, , ♦) be a monoid. Then, the parallel and sequential concatenations are equivalent. p m co n c at E q ui v a le n c e :: i : Int → x : L m → { pmconcat i x = mconcat x } Proof. We prove the theorem by providing a Haskell implementation of pmconcatEquivalence that satisfies its type. The details of the proof can be found in [33], here we provide the sketch of the proof. First, we prove that mconcat distributes over list splitting mconcatSplit :: i : Nat → xs :{ L m | i ≤ length xs } → { mconcat xs = mconcat ( take i xs ) ♦ mconcat ( drop i xs ) } The proofs proceeds by structural induction, using monoid left identity in the base case and monoid associativity associavity and unfolding of take and drop methods in the inductive step. We generalize the above lemma to prove that mconcat distributes over list chunking. mconcatChunk :: i : Pos → xs : L m → { mconcat xs = mconcat ( map mconcat ( chunk i xs ) ) } The proofs proceeds by structural induction, using monoid left identity in the base case and lemma mconcatSplit in the inductive step. Lemma mconcatChunk is sufficient to prove pmconcatEquivalence by structural induction, using monoid left identity in the base case. t u 3.5 Parallel Monoid Morphism We can now replace the mconcat in our chunked monoid morphism in § 3.3 with pmconcat from § 3.4 to provide an implementation that uses parallelism to both map the monoid morphism and concatenate the results. Theorem 4 (Correctness of Parallelization). Let (m, , ♦) be a monoid and (n, η, ) be a chunkable monoid. Then, for every morphism f :: n → m, every positive numbers i and j, and input x, f x = pmconcat i (pmap f (chunkn j x)) holds. parallelismEquivalence :: f :( n → m ) → Morphism n m f → x : n → i : Pos → j : Pos → { f x = pmconcat i ( pmap f ( chunk n j x ) ) } Proof. We prove the theorem by providing an implementation of parallelismEquivalence that satisfies its type. p a r a l l e l i s m E q u i v a l e n c e f thm x i j = pmconcat i ( pmap f ( chunk n j x ) ) ==. mconcat ( pmap f ( chunk n j x ) ) ∴ p m co n c at E q ui v a le n c e i ( pmap f ( chunk n j x ) ) ==. f x ∴ m o r p h i s m D i s t r i b u t i o n f thm x j *** QED The proof follows merely by application of the two previous Theorems 2 and 3. t u 4 Case Study: Correctness of Parallel String Matching § 3 showed that any monoid morphism whose domain is chunkable can be parallelized. We now make use of that result to parallelize string matching. We start by observing that strings are a chunkable monoid. We then turn string matching for a given target into a monoid morphism from a string to a suitable monoid, SM target, defined in § 4.2. Finally, in § 4.4, we parallelize string matching by a simple use of the parallel morphism function of § 3.5. 4.1 Refined Strings are Chunkable Monoids We define a new type RString, which is a chunkable monoid, to be the domain of our string matching function. Our type simply wraps Haskell’s existing ByteString. data RString = RS BS . ByteString Similarly, we wrap the existing ByteString functions we will need to show RString is a chunkable monoid. η = RS ( BS . empty ) ( RS x ) ( RS y ) = S ( x 8 BS . append 8 y ) lenStr ( RS x ) = BS . length x takeStr i ( RS x ) = RS ( BS . take i x ) dropStr i ( RS x ) = RS ( BS . take i x ) Although it is possible to explicitly prove that ByteString implements a chunkable monoid [30], it is time consuming and orthogonal to our purpose. Instead, we just assume the chunkable monoid properties of RString– thus demonstrating that refinement reflection is capable of doing gradual verification. For instance, we define a logical uninterpreted function and relate it to the Haskell function via an assumed (unchecked) type. assume ( ) :: x : RString → y : RString → { v : RString | v = x Then, we use the uninterpreted function like associativity. y} in the logic to assume monoid laws, assume assocStr :: x : RString → y : RString → z : RString → { x (y z) = (x y) z } assocStr _ _ = trivial Haskell applications of are interpreted in the logic via the logical that satisfies associativity via theorem assocStr. Similarly for the chunkable methods, we define the uninterpreted functions takeStr, dropStr and lenStr in the logic, and use them to strengthen the result types of the respective functions. With the above function definitions (in both Haskell and logic) and assumed type specifications, Liquid Haskell will check (or rather assume) that the specifications of chunkable monoid, as defined in the Definitions 1 and 3, are satisfied. We conclude with the assumption (rather that theorem) that RString is a chunkable monoid. Assumption 5 (RString is a Chunkable Monoid) (RString, η, ) combined with the methods lenStr, takeStr, dropStr and takeDropPropStr is a chunkable monoid. 4.2 String Matching Monoid String matching is determining all the indices in a source string where a given target string begins; for example, for source string ababab and target aba the results of string matching would be [0, 2]. We now define a suitable monoid, SM target, for the codomain of a string matching function, where target is the string being looked for. Additionally, we will define a function toSM :: RString → SM target which does the string matching and is indeed a monoid morphism from RString to SM target for a given target. String Matching Monoid We define the data type SM target to contain a refined string field input and a list of all the indices in input where the target appears. data SM ( target :: Symbol ) where SM :: input : RString Fig. 2. Mappend indices of String Matcher → indices :[ GoodIndex input target ] → SM target We use the string type literal 2 to parameterize the monoid over the target being matched. This encoding allows the type checker to statically ensure that only searches for the same target can be merged together. The input field is a refined string, and the indices field is a list of good indices. For simplicity we present lists as Haskell’s built-in lists, but our implementation uses the reflected list type, L, defined in § 2. A GoodIndex input target is a refined type alias for a natural number i for which target appears at position i of input. As an example, the good indices of "abcab" on "ababcabcab" are [2,5]. type GoodIndex Input Target = { i : Nat | isGoodIndex Input ( fromString Target ) i } isGoodIndex :: RString → isGoodIndex input target = ( subString i ( lenStr ∧ ( i + lenStr target ≤ RString → Int → Bool i target ) input == target ) lenStr input ) subString :: Int → Int → RString → RString subString o l = takeStr l . dropStr o Monoid Methods for String Matching Next, we define the mappend and identity elements for string matching. The identity element  of SM t, for each target t, is defined to contain the identity RString (η) and the identity List ([]).  :: ∀ ( t :: Symbol ) . SM t  = SM η [] The Haskell definition of ♦, the monoid operation for SM t, is as follows. (♦) :: ∀ ( t :: Symbol ) . KnownSymbol t ⇒ SM t → SM t → SM t ( SM x xis ) ♦ ( SM y yis ) 2 Symbol is a kind and target is effectively a singleton type. = SM ( x where tg = xis 0 = xyis = yis 0 = y ) ( xis 0 ++ xyis ++ yis 0 ) fromString ( symbolVal ( Proxy :: Proxy t ) ) map ( castGo odInd exLeft tg x y ) xis makeNewIndices x y tg map ( shiftStringRight tg x y ) yis Note again that capturing target as a type parameter is critical, otherwise there is no way for the Haskell’s type system to specify that both arguments of (♦) are string matchers on the same target. The action of (♦) on the two input fields is straightforward; however, the action on the two indices is complicated by the need to shift indices and the possibility of new matches arising from the concatenation of the two input fields. Figure 2 illustrates the three pieces of the new indices field which we now explain in more detail. 1. Casting Good Indices If xis is a list of good indices for the string x and the target tg, then xis is also a list of good indices for the string x y and the target tg, for each y. To prove this property we need to invoke the property subStrAppendRight on Refined Strings that establishes substring preservation on string right appending. assume :: → → su bStrAp pendRi ght sl : RString → sr : RString → j : Int i :{ Int | i + j ≤ lenStr sl } { subString sl i j = subString ( sl sr ) i j } The specification of subStrAppendRight ensures that for each string sl and sr and each integer i and j whose sum is within sl, the substring from i with length j is identical in sl and in (sl sr). The function castGoodIndexLeft applies the above property to an index i to cast it from a good index on sl to a good index on (sl sr) cast GoodIn dexLef t :: tg : RString → sl : RString → sr : RString → i : GoodIndex sl tg → { v : GoodIndex ( sl sr ) target | v = i } cast GoodIn dexLef t tg sl sr i = cast ( subStr Append Right sl sr ( lenStr tg ) i ) i Where cast p x returns x, after enforcing the properties of p in the logic cast :: b → x : a → { v : a | v = x } cast _ x = x Moreover, in the logic, each expression cast p x is reflected as x, thus allowing random (i.e., non-reflected) Haskell expressions to appear in p. 2. Creation of new indices The concatenation of two input strings sl and sr may create new good indices. For instance, concatenation of "ababcab" with "cab" leads to a new occurence of "abcab" at index 5 which does not occur in either of the two input strings. These new good indices can appear only at the last lenStr tg positions of the left input sl. makeNewIndices sl sr tg detects all such good new indices. makeNewIndices :: sl : RString → sr : RString → tg : RString → [ GoodIndex { sl sr } tg ] makeNewIndices sl sr tg | lenStr tg < 2 = [] | otherwise = makeIndices ( sl sr ) tg lo hi where lo = maxInt ( lenStr sl - ( lenStr tg - 1) ) 0 hi = lenStr sl - 1 If the length of the tg is less than 2, then no new good indices are created. Otherwise, the call on makeIndices returns all the good indices of the input sl sr for target tg in the range from maxInt (lenStr sl-(lenStr tg-1)) 0 to lenStr sl-1. Generally, makeIndices s tg lo hi returns the good indices of the input string s for target tg in the range from lo to hi. makeIndices :: s : RString → tg : RString → lo : Nat → hi : Int → [ GoodIndex s tg ] makeIndices s tg lo hi | hi < lo = [] | isGoodIndex s tg lo = lo : rest | otherwise = rest where rest = makeIndices s tg ( lo + 1) hi It is important to note that makeNewIndices does not scan all the input, instead only searching at most lenStr tg positions for new good indices. Thus, the time complexity to create the new indices is linear on the size of the target but independent of the size of the input. 3. Shift Good Indices If yis is a list of good indices on the string y with target tg, then we need to shift each element of yis right lenStr x units to get a list of good indices for the string x y. To prove this property we need to invoke the property subStrAppendLeft on Refined Strings that establishes substring shifting on string left appending. assume subStrAppendLeft :: sl : RString → sr : RString → j : Int → i : Int → { subStr sr i j = subStr ( sl sr ) ( lenStr sl + i ) j } The specification of subStrAppendLeft ensures that for each string sl and sr and each integers i and j, the substring from i with length j on sr is equal to the substring from lenStr sl + i with length j on (sl sr). The function shiftStringRight both shifts the input index i by lenStr sl and applies the subStrAppendLeft property to it, casting i from a good index on sr to a good index on (sl sr) Thus, shiftStringRight both appropriately shifts the index and casts the shifted index using the above theorem: shiftStringRight :: tg : RString → sl : RString → sr : RString → i : GoodIndex sr tg → { v :( GoodIndex ( sl sr ) tg ) | v = i + lenStr sl } shiftStringRight tg sl sr i = subStrAppendLeft sl sr ( lenStr tg ) i 8 cast 8 i + lenStr sl String Matching is a Monoid Next we prove that the monoid methods  and (♦) satisfy the monoid laws. Theorem 6 (SM is a Monoid). (SM t, , ♦) is a monoid. Proof. According to the Monoid Definition 1, we prove that string matching is a monoid, by providing safe implementations for the monoid law functions. First, we prove left identity. idLeft :: x : SM t → {  ♦ x = xs } idLeft ( SM i is ) = (  :: SM t ) ♦ ( SM i is ) ==. ( SM η []) ♦ ( SM i is ) ==. SM ( η i ) ( is1 ++ isNew ++ is2 ) ∴ idLeftStr i ==. SM i ([] ++ [] ++ is ) ∴ ( mapShiftZero tg i is ∧ newIsNullRight i tg ) ==. SM i is ∴ idLeftList is *** QED where tg = fromString ( symbolVal ( Proxy :: Proxy t ) ) is1 = map ( ca st Go od In dex Ri gh t tg i η ) [] isNew = makeNewIndices η i tg is2 = ( map ( shiftStringRight tg η i ) is ) The proof proceeds by rewriting, using left identity of the monoid strings and lists, and two more lemmata. – Identity of shifting by an empty string. mapShiftZero :: tg : RString → i : RString → is :[ GoodIndex i target ] → { map ( shiftStringRight tg η i ) is = is } The lemma is proven by induction on is and the assumption that empty strings have length 0. – No new indices are created. newIsNullLeft :: s : RString → t : RString → { makeNewIndices η s t = [] } The proof relies on the fact that makeIndices is called on the empty range from 0 to -1 and returns []. Next, we prove right identity. idRight :: x : SM t → { x ♦  = x } idRight ( SM i is ) = ( SM i is ) ♦ (  :: SM t ) ==. ( SM i is ) ♦ ( SM η []) ==. SM ( i η ) ( is1 ++ isNew ++ is2 ) ∴ idRightStr i ==. SM i ( is ++ N ++ N ) ∴ ( mapCastId tg i η is ∧ newIsNullLeft i tg ) ==. SM i is ∴ idRightList is *** QED where tg = fromString ( symbolVal ( Proxy :: Proxy t ) ) is1 = map ( ca st Go od Ind ex Ri gh t tg i η ) is isNew = makeNewIndices i stringEmp tg is2 = map ( shiftStringRight tg i η ) [] The proof proceeds by rewriting, using right identity on strings and lists and two more lemmata. – Identity of casting is proven mapCastId :: tg : RString → x : RString → y : RString → is :[ GoodIndex x tg ] → → { map ( ca st Go od In de xR ig ht tg x y ) is = is } We prove identity of casts by induction on is and identity of casting on a single index. – No new indices are created. newIsNullLeft :: s : RString → t : RString → { makeNewIndices s η t = [] } The proof proceeds by case splitting on the relative length of s and t. At each case we prove by induction that all the potential new indices would be out of bounds and thus no new good indices would be created. - Finally we prove associativity. For space, we only provide a proof sketch. The whole proof is available online [33]. Our goal is to show equality of the left and right associative string matchers. assoc :: x : SM t → y : SM t → z : SM t → { x ♦ (y ♦ z) = (x ♦ y) ♦ z} To prove equality of the two string matchers we show that the input and indices fields are respectively equal. Equality of the input fields follows by associativity of RStrings. Equality of the index list proceeds in three steps. 1. Using list associativity and distribution of index shifting, we group the indices in the five lists shown in Figure 3: the indices of the input x, the new indices from mappending x to y, the indices of the input y, the new indices from mappending x to y, and the indices of the input z. 2. The representation of each group depends on the order of appending. For example, if zis1 (resp. zis2) is the group zis when right (resp. left) mappend happened first, then we have zis1 = map ( shiftStringRight tg xi ( yi zi ) ) ( map ( shiftStringRight tg yi zi ) zis ) zis2 = map ( shiftStringRight tg ( xi yi ) zi ) zis That is, in right first, the indices of z are first shifted by the length of yi and then by the length of xi, while in the left first case, the indices of z are shifted by the length of xi yi. In this second step of the proof we prove, using lemmata, the equivalence of the different group representations. The most interesting lemma we use is called assocNewIndices and proves equivalence of all the three middle groups together by case analysis on the relative lengths of the target tg and the middle string yi. 3. After proving equivalence of representations, we again use list associativity and distribution of casts to wrap the index groups back in string matchers. Fig. 3. Associativity of String Matching We now sketch the three proof steps, while the whole proof is available online [33]. assoc x@ ( SM xi xis ) y@ ( SM yi yis ) z@ ( SM zi zis ) -- Step 1: unwrapping the indices = x ♦ (y ♦ z) ==. ( SM xi xis ) ♦ (( SM yi yis ) ♦ ( SM zi zis ) ) ... -- via list associativity and distribution of shifts ==. SM i ( xis1 ++ (( xyis1 ++ yis1 ++ yzis1 ) ++ zis1 ) ) -- Step 2: Equivalence of representations ==. SM i ( xis2 ++ (( xyis1 ++ yis1 ++ yzis1 ) ++ zis1 ) ) ∴ castConcat tg xi yi zi xis ==. SM i ( xis2 ++ (( xyis1 ++ yis1 ++ yzis1 ) ++ zis2 ) ) ∴ mapLenFusion tg xi yi zi zis ==. SM i ( xis2 ++ (( xyis2 ++ yis2 ++ yzis2 ) ++ zis2 ) ) ∴ assocNewIndices y tg xi yi zi yis -- Step 3: Wrapping the indices ... -- via list associativity and distribution of casts ==. ( SM xi xis ♦ SM yi yis ) ♦ SM zi zis = (x ♦ y) ♦ z *** QED where i = xi ( yi zi ) yzis1 = map ( shiftStringRight tg xi ( yi yzis2 = makeNewIndices ( xi yi ) zi tg yzis = makeNewIndices yi zi tg ... zi ) ) yzis t u 4.3 String Matching Monoid Morphism Next, we define the function toSM :: RString → SM target which does the actual string matching computation for a set target 3 toSM :: ∀ ( target :: Symbol ) . ( KnownSymbol target ) ⇒ RString → SM target toSM input = SM input ( makeSMIndices input tg ) where tg = fromString ( symbolVal ( Proxy :: Proxy target ) ) makeSMIndices :: x : RString → tg : RString → [ GoodIndex x tg ] makeSMIndices x tg = makeIndices x tg 0 ( lenStr tg - 1) 3 toSM assumes the target is clear from the calling context; it is also possible to write a wrapper function taking an explicit target which gets existentially reflected into the type. The input field of the result is the input string; the indices field is computed by calling makeIndices within the range of the input, that is from 0 to lenStr input - 1. We now prove that toSM is a monoid morphism. Theorem 7 (toSM is a Morphism). toSM :: RString → SM t is a morphism between the monoids (RString, η, ) and (SM t, , ♦). Proof. Based on definition 2, proving toSM is a morphism requires constructing a valid inhabitant of the type Morphism RString ( SM t ) toSM = x : RString → y : RString → { toSM η =  ∧ toSM ( x y ) = toSM x ♦ toSM y } We define the function distributestoSM :: Morphism RString (SM t) toSM to be the required valid inhabitant. The core of the proof starts from exploring the string matcher toSM x ♦ toSM y. This string matcher contains three sets of indices as illustrated in Figure 2: (1) xis from the input x, (2) xyis from appending the two strings, and (3) yis from the input y. We prove that appending these three groups of indices together gives exactly the good indices of x y, which are also the value of the indices field in the result of toSM (x y). distributestoSM x y = ( toSM x :: SM target ) ♦ ( toSM y :: SM target ) ==. ( SM x is1 ) ♦ ( SM y is2 ) ==. SM i ( xis ++ xyis ++ yis ) ==. SM i ( makeIndices i tg 0 hi1 ++ yis ) ∴ ( mapCastId tg x y is1 ∧ mergeNewIndices tg x y ) ==. SM i ( makeIndices i tg 0 hi1 ++ makeIndices i tg ( hi1 +1) hi ) ∴ shi ftIndi cesRig ht 0 hi2 x y tg ==. SM i is ∴ mergeIndices i tg 0 hi1 hi ==. toSM ( x y) *** QED where xis = map ( ca st Go od In dex Ri gh t tg x y ) is1 xyis = makeNewIndices x y tg yis = map ( shiftStringRight tg x y ) is2 tg = fromString ( symbolVal ( Proxy :: Proxy target ) ) is1 = makeSMIndices x tg is2 = makeSMIndices y tg is = makeSMIndices i tg i = x y hi1 = lenStr x - 1 hi2 hi = lenStr y - 1 = lenStr i - 1 The most interesting lemma we use is mergeIndices x tg lo mid hi that states that for the input x and the target tg if we append the indices in the range from to to mid with the indices in the range from mid+1 to hi, we get exactly the indices in the range from lo to hi. This property is formalized in the type of the lemma. mergeIndices :: x : RString → tg : RString → lo : Nat → mid :{ Int | lo ≤ mid } → hi :{ Int | mid ≤ hi } → { makeIndices x tg lo hi = makeIndices x tg lo mid ++ makeIndices x tg ( mid +1) hi } The proof proceeds by induction on mid and using three more lemmata: – mergeNewIndices states that appending the indices xis and xyis is equivalent to the good indices of x y from 0 to lenStr x - 1. The proof case splits on the relative sizes of tg and x and is using mergeIndices on mid = lenStr x1 - lenStr tg in the case where tg is smaller than x. – mapCastId states that casting a list of indices returns the same list. – shiftIndicesRight states that shifting right i units the indices from lo to hi is equivalent to computing the indices from i + lo to i + hi on the string x y, with lenStr x = i. t u 4.4 Parallel String Matching We conclude this section with the definition of a parallelized version of string matching. We put all the theorems together to prove that the sequential and parallel versions always give the same result. We define toSMPar as a parallel version of toSM using machinery of section 3. toSMPar :: ∀ ( target :: Symbol ) . ( KnownSymbol target ) ⇒ Int → Int → RString → SM target toSMPar i j = pmconcat i . pmap toSM . chunkStr j First, chunkStr splits the input into j chunks. Then, pmap applies toSM at each chunk in parallel. Finally, pmconat concatenates the mapped chunks in parallel using ♦, the monoidal operation for SM target. Correctness. We prove correctness of toSMPar directly from Theorem 4. Theorem 8 (Correctness of Parallel String Matching). For each parameter i and j, and input x, toSMPar i j x is always equal to toSM x. correctness :: i : Int → j : Int → x : RString → { toSM x = toSMPar i j x } Proof. The proof follows by direct application of Theorem 4 on the chunkable monoid (RString, η, ) (by Assumption 5) and the monoid (SM t, , ♦) (by Theorem 6). correctness i j x = toSMPar i j x ==. pmconcat i ( pmap toSM ( chunkStr j x ) ) ==. toSM is ∴ p a r a l l e l i s m E q u i v a l e n c e toSM distributestoSM x i j *** QED Note that application of the theorem parallelismEquivalence requires a proof that its first argument toSM is a morphism. By Theorem 2, the required proof is provided as the function distributestoSM. t u 5 Evaluation: Strengths & Limitations Verification of Parallel String Matching is the first realistic proof that uses (Liquid) Haskell to prove properties about program functions. In this section we use the String Matching proof to quantitatively and qualitatively evaluate theorem proving in Haskell. Quantitative Evaluation. The Correctness of Parallel String Matching proof can be found online [33]. Verification time, that is the time Liquid Haskell needs to check the proof, is 75 sec on a dual-core Intel Core i5-4278U processor. The proof consists of 1839 lines of code. Out of those – – – – 226 are Haskell “runtime” code, 112 are liquid comments on the “runtime” Haskell code, 1307 are Haskell proof terms, that is functions with Proof result type, and 194 are liquid comments to specify theorems. Counting both liquid comments and Haskell proof terms as verification code, we conclude that the proof requires 7x the lines of “runtime” code. This ratio is high and takes us to 2006 Coq, when Leroy [17] verified the initial CompCert C compiler with the ratio of verification to compiler lines being 6x. Strengths. Though currently verbose, deep verification using Liquid Haskell has many benefits. First and foremost, the target code is written in the general purpose Haskell and thus can use advanced Haskell features, including type literals, deriving instances, inline annotations and optimized library functions like ByteString. Even diverging functions can coexist with the target code, as long as they are not reflected into logic [31]. Moreover, SMTs are used to automate the proofs over key theories like linear arithmetic and equality. As an example, associativity of (+) is assumed throughout the proofs while shifting indices. Our proof could be further automated by mapping refined strings to SMT strings and using the automated SMT string theory. We did not follow this approach because we want to show that our techinique can be used to prove any (and not only domain specific) program properties. Finally, we get further automation via Liquid Type Inference [22]. Properties about program functions, expressed as type specifications with unit result, often depend on program invariants, expressed as vanilla refinement types, and vice versa. For example, we need the invariant that all indices of a string matcher are good indices to prove associativity of (♦). Even though Liquid Haskell cannot currently synthesize proof terms, it performs really well at inferring and propagating program invariants (like good indices) via the abstract interpretation framework of Liquid Types. Limitations. There are severe limitations that should be addressed to make theorem proving in Haskell a pleasant and usable technique. As mentioned earlier the proofs are verbose. There are a few cases where the proofs require domain specific knowledge. For example, to prove associativity of string matching x ♦ (y ♦ z) = (x ♦ y) ♦ z we need a theorem that performs case analysis on the relative length of the input field of y and the target string. Unlike this case split though, most proofs do not require domain specific knowledge and merely proceed by term rewriting and structural inductuction that should be automated via Coq-like [3] tactics or/and Dafny-like [16] heuristics. For example, synquid [21] could be used to automatically synthesize proof terms. Currently, we suffer from two engineering limitations. First, all reflected function should exist in the same module, as reflection needs access to the function implementation that is unknown for imported functions. This is the reason why we need to use a user defined, instead of Haskell’s built-in, list. In our implementation we used CPP as a current workaround of the one module restriction. Second, class methods cannot be currently reflected. Our current workaround is to define Haskell functions instead of class instances. For example (append, nil) and (concatStr, emptyStr) define the monoid methods of List and Refined String respectively. Overall, we believe that the strengths outweigh the limitations which will be addressed in the near future, rendering Haskell a powerful theorem prover. 6 Related Work SMT-Based Verification SMT solvers have been extensively used to automate reasoning on verification languages like Dafny [16], Fstar [28] and Why3 [10]. These languages are designed for verification, thus have limited support for commonly used language features like parallelism and optimized libraries that we use in our verified implementation. Refinement Types [8,12,24] on the other hand, target existing general purpose languages, such as ML [34,2,22], C [7,23], Haskell [31], Racket [15] and Scala [26]. However, before Refinement Reflection [32] was introduced, they only allowed “shallow” program specifications, that is, properties that only talk about behaviors of program functions but not functions themselves. Dependent Types Unlike Refinement Types, dependent type systems, like Coq [3], Adga [19] and Isabelle/HOL [20] allow for “deep” specifications which talk about program functions, such as the program equivalence reasoning we presented. Compared to (Liquid) Haskell, these systems allow for tactics and heuristics that automate proof term generation but lack SMT automations and general-purpose language features, like non-termination, exceptions and IO. Zombie [5,27] and Fstar [28] allow dependent types to coexist with divergent and effectful programs, but still lack the optimized libraries, like ByteSting, which come with a general purpose language with long history, like Haskell. Parallel Code Verification Dependent type theorem provers have been used before to verify parallel code. BSP-Why [11] is an extension to Why2 that is using both Coq and SMTs to discharge user specified verification conditions. Daum [9] used Isabelle to formalize the semantics of a type-safe subset of C, by extending Schirmer’s [25] formalization of sequential imperative languages. Finally, Swierstra [29] formalized mutable arrays in Agda and used them to reason about distributed maps and sums. One work closely related to ours is SyDPaCC [18], a Coq library that automatically parallelizes list homomorphisms by extracting parallel Ocaml versions of user provided Coq functions. Unlike SyDPaCC, we are not automatically generating the parallel function version, because of engineering limitations (§ 5). Once these are addressed, code extraction can be naturally implemented by turning Theorem 4 into a Haskell type class with a default parallelization method. SyDPaCC used maximum prefix sum as a case study, whose morphism verification is much simpler than our string matching case study. Finally, our implementation consists of 2K lines of Liquid Haskell, which we consider verbose and aim to use tactics to simplify. On the contrary, the SyDPaCC implementation requires three different languages: 2K lines of Coq with tactics, 600 lines of Ocaml and 120 lines of C, and is considered “very concise”. 7 Conclusion We made the first non-trivial use of (Liquid) Haskell as a proof assistant. We proved the parallelization of chunkable monoid morphisms to be correct and applied our parallelization technique to string matching, resulting in a formally verified parallel string matcher. Our proof uses refinement types to specify equivalence theorems, Haskell terms to express proofs, and Liquid Haskell to check that the terms prove the theorems. Based on our 1839LoC sophisticated proof we conclude that Haskell can be successfully used as a theorem prover to prove arbitrary theorems about real Haskell code using SMT solvers to automate proofs over key theories like linear arithmetic and equality. However, Coq-like tactics or Dafny-like heurestics are required to ease the user from manual proof term generation. References 1. C. Barrett, A. Stump, and C. Tinelli. The SMT-LIB Standard: Version 2.0. 2010. 2. J. Bengtson, K. Bhargavan, C. Fournet, A.D. Gordon, and S. Maffeis. Refinement types for secure implementations. In CSF, 2008. 3. Y. Bertot and P. Castéran. Coq’Art: The Calculus of Inductive Constructions. Springer Verlag, 2004. 4. Guy E. Blelloch. Synthesis of Parallel Algorithms. Morgan Kaufmann Pub, 1993. 5. C. Casinghino, V. Sjöberg, and S. Weirich. Combining proofs and programs in a dependently typed language. In POPL, 2014. 6. Murray Cole. Parallel programming, list homomorphisms and the maximum segment sum problem. 1993. 7. Jeremy Condit, Matthew Harren, Zachary R. Anderson, David Gay, and George C. Necula. Dependent types for low-level programming. In ESOP, 2007. 8. R. L. Constable and S. F. Smith. Partial objects in constructive type theory. In LICS, 1987. 9. M Daum. Reasoning on Data-Parallel Programs in Isabelle/Hol. In C/C++ Verification Workshop, 2007. 10. Jean-Christophe Filliâtre and Andrei Paskevich. Why3 – Where Programs Meet Provers. In ESOP, 2013. 11. J Fortin and F. Gava. BSP-Why: A tool for deductive verification of BSP algorithms with subgroup synchronisation. In Int J Parallel Prog, 2015. 12. T. Freeman and F. Pfenning. Refinement types for ML. In PLDI, 1991. 13. Robert Harper, Furio Honsell, and Gordon Plotkin. A framework for defining logics. J. ACM, 1993. 14. Joseph JáJá. Introduction to Parallel Algorithms. 1992. 15. Andrew M. Kent, David Kempe, and Sam Tobin-Hochstadt. Occurrence typing modulo theories. In PLDI, 2016. 16. K. Rustan M. Leino. Dafny: An automatic program verifier for functional correctness. LPAR, 2010. 17. Xavier Leroy. Formal certification of a compiler back-end, or: programming a compiler with a proof assistant. In POPL 06, 2006. 18. Frédéric Loulergue, Wadoud Bousdira, and Julien Tesson. Calculating Parallel Programs in Coq using List Homomorphisms. In International Journal of Parallel Programming, 2016. 19. U. Norell. Towards a practical programming language based on dependent type theory. PhD thesis, Chalmers, 2007. 20. L. C. Paulson. Isabelle A Generic Theorem prover. Lecture Notes in Computer Science, 1994. 21. Nadia Polikarpova, Ivan Kuraj, and Armando Solar-Lezama. Program synthesis from polymorphic refinement types. In PLDI, 2016. 22. P. Rondon, M. Kawaguchi, and R. Jhala. Liquid types. In PLDI, 2008. 23. P. Rondon, M. Kawaguchi, and R. Jhala. Low-level liquid types. In POPL, 2010. 24. J. Rushby, S. Owre, and N. Shankar. Subtypes for specifications: Predicate subtyping in pvs. IEEE TSE, 1998. 25. N Schirmer. Verification of Sequential Imperative Programs in Isabelle/HOL. PhD thesis, TU Munich, 2006. 26. Georg Stefan Schmid and Viktor Kuncak. SMT-based Checking of PredicateQualified Types for Scala. In Scala, 2016. 27. Vilhelm Sjöberg and Stephanie Weirich. Programming up to congruence. POPL, 2015. 28. Nikhil Swamy, Cătălin Hriţcu, Chantal Keller, Aseem Rastogi, Antoine DelignatLavaud, Simon Forest, Karthikeyan Bhargavan, Cédric Fournet, Pierre-Yves Strub, Markulf Kohlweiss, Jean-Karim Zinzindohoue, and Santiago Zanella-Béguelin. Dependent types and multi-monadic effects in F*. In POPL, 2016. 29. Wouter Swierstra. More dependent types for distributed arrays. 2010. 30. N. Vazou, E. L. Seidel, and R. Jhala. Liquidhaskell: Experience with refinement types in the real world. In Haskell Symposium, 2014. 31. N. Vazou, E. L. Seidel, R. Jhala, D. Vytiniotis, and S. Peyton-Jones. Refinement Types for Haskell. In ICFP, 2014. 32. Niki Vazou and Ranjit Jhala. Refinement Reflection. arXiv:1610.04641, 2016. 33. Niki Vazou and Jeff Polakow. Code for verified string indexing. 2016. https: //github.com/nikivazou/verified_string_matching. 34. H. Xi and F. Pfenning. Eliminating array bound checking through dependent types. In PLDI, 1998.
6cs.PL
Workshop track - ICLR 2018 S TABLE D ISTRIBUTION A LIGNMENT U SING THE D UAL OF THE A DVERSARIAL D ISTANCE Ben Usman Boston University [email protected] Kate Saenko Boston University [email protected] Brian Kulis Boston University [email protected] arXiv:1707.04046v4 [cs.LG] 30 Jan 2018 A BSTRACT Methods that align distributions by minimizing an adversarial distance between them have recently achieved impressive results. However, these approaches are difficult to optimize with gradient descent and they often do not converge well without careful hyperparameter tuning and proper initialization. We investigate whether turning the adversarial min-max problem into an optimization problem by replacing the maximization part with its dual improves the quality of the resulting alignment and explore its connections to Maximum Mean Discrepancy. Our empirical results suggest that using the dual formulation for the restricted family of linear discriminators results in a more stable convergence to a desirable solution when compared with the performance of a primal min-max GAN-like objective and an MMD objective under the same restrictions. We test our hypothesis on the problem of aligning two synthetic point clouds on a plane and on a real-image domain adaptation problem on digits. In both cases, the dual formulation yields an iterative procedure that gives more stable and monotonic improvement over time. 1 I NTRODUCTION Adversarial methods have recently become a popular choice for learning distributions of highdimensional data. The key idea is to learn a parametric representation of a distribution by aligning it with the empirical distribution of interest according to a distance given by a discriminative model. At the same time, the discriminative model is trained to differentiate between true and artificially obtained samples. Generative Adversarial Networks (GANs) that use neural networks to both discriminate samples and parameterize a learned distribution, have achieved particularly impressive results in many applications such as generative modeling of images (Goodfellow et al., 2014; Denton et al., 2015; Radford et al., 2015), image super-resolution (Ledig et al., 2016), and image-to-image translation (Isola et al., 2016). Adversarial matching of empirical distributions has also shown promise for aligning train and test data distributions n scenarios involving domain shift (Ganin & Lempitsky, 2015; Tzeng et al., 2015; 2017). However, GANs and related models have proved to be extremely difficult to optimize. It has been widely reported that training GANs is a tricky process that often diverges and requires very careful parameter initialization and tuning. Arjovsky and Bottou (Arjovsky & Bottou, 2017) have recently identified several theoretical problems with loss functions used by GANs, and have analyzed how they contribute to instability and saturation during training. In this paper, we focus on one of the major barriers to stable optimization of adversarial methods, namely their min-max nature. Adversarial methods seek to match the generated and real distributions by minimizing some notion of statistical distance between the two, which is often defined as a maximal difference between values of certain test (witness) functions that could differentiate these distributions. More specifically in the case of GANs, the distance is usually considered to be equal to the likelihood of the best neural network classifier that discriminates between the distributions, assigning "real or generated?" labels to the input points. This way, in order to align these distributions one has to minimize this maximum likelihood w.r.t. the parameters of the learned or aligned distribution. Unfortunately, solving min-max problems using gradient descent is inherently very difficult. Below we use a simple example to demonstrate that different flavors of gradient descent are very unstable when it comes to solving problems of this kind. 1 Workshop track - ICLR 2018 To address this issue, we explore the possibility of replacing the maximization part of the adversarial alignment problem with a dual minimization problem for linear and kernelized linear discriminators. The resulting dual problem turns out to be much easier to solve via gradient descent. Moreover, we make connections between our formulation and existing objectives such as the Maximum Mean Discrepancy (MMD) (Gretton, 2012). We show that it is strongly related to the iteratively reweighted empirical estimator of MMD. We first evaluate how well our dual method can handle a point alignment problem on a lowdimensional synthetic dataset. Then, we compare its performance with the analogous primal method on a real-image domain adaptation problem using the Street View House Numbers (SVHN) and MNIST domain adaptation dataset pair. Here the goal is to align the feature distributions produced by the network on the two datasets so that a classifier trained to label digits on SVHN does not loose accuracy on MNIST due to the domain shift. In both cases, we show that our proposed dual formulation of the adversarial distance often shows improvement over time, whereas using the primal formulation results in drifting objective values and often does not converge to a solution. Our contributions can be summarized as follows: • we explore the dual formulation of the adversarial alignment objective for linear and kernelized linear discriminators and how they relate to the Maximum Mean Discrepancy; • we demonstrate experimentally on both synthetic and real datasets that the resulting objective leads to more stable convergence and better alignment quality; • we apply this idea to a domain adaptation scenario and show that the stability of reaching high target classification accuracy is also positively impacted by the dual formulation. 2 R ELATED W ORK There has been a long line of work on unsupervised generative machine learning, a review of which is beyond the scope of this work. Recently, adversarial methods for learning generative neural networks have achieved popularity due to their ability to effectively model high dimensional data, e.g., generating very realistic looking images. These include the original Generative Adversarial Networks (GANs) (Goodfellow et al., 2014) and follow up work proposing improved formulations such as Wasserstein GANs (Arjovsky et al., 2017) and Conditional GANs (Mirza & Osindero, 2014). Related ideas have been proposed for unsupervised domain adaptation. Neural domain adaptation methods seek to improve the performance of a classifier network on a target distribution that is different from the original training distribution by introducing an additional objective that minimizes the difference between representations learned for source and target data. Some models align feature representations across domains by minimizing the distance between first or second order feature space statistics (Tzeng et al., 2014; Long & Wang, 2015; Sun & Saenko, 2016). When adversarial objectives are used for domain adaptation, a domain classifier is trained to distinguish between the generated source and target representations, both using the standard minimax objective (Ganin & Lempitsky, 2015), as well as alternative losses (Tzeng et al., 2015; 2017). Instead of aligning distributions in feature space, several models perform generative alignment in pixel-space, e.g., using Coupled GANs (Liu & Tuzel, 2016) or conditional GANs (Bousmalis et al., 2017). These models adapt by “hallucinating” what the raw training images might look like in the target test domain. A related line of work uses adversarial training to translate images in one domain to the “style” of a different domain to create artistic effects (Mathieu et al., 2016). Several recent works perform the alignment in an unsupervised way without aligned image pairs (Zhu et al., 2017; Onsiderations et al., 2017). Other objectives for distribution matching that have been proposed in the literature, including Maximum Mean Discrepancy (Gretton, 2012), f-discrepancy (Nowozin et al., 2016) and others, have also been used for generative modeling (Dziugaite et al., 2015; Li et al., 2015). A single step of our iterative reweighting procedure is similar to instance reweighting methods that were theoretically and empirically shown to improve accuracy in the presence of domain shift. For example, Huang et al. (2007) used sample reweighting that minimized empirical MMD between populations to plug it as instance-weights in weighted classification loss, whereas Gong et al. (2013) did that to choose points for a series of independent auxiliary tasks, so no iterative reweighting was performed in both cases. In general, most statistical distances used for distribution alignment fall into one of two categories: they are either f-divergences (e.g. GAN objective, KL-divergence), or integral probability metrics (IPMs) that are differences in expected values of a test function at samples from different distributions maximized over some function family (e.g. Maximum Mean Discrepancy, Wasserstein distance). In 2 Workshop track - ICLR 2018 this work we specifically consider the logistic adversarial objective (f-divergence), show that it is useful to optimize its dual, and present a relation between this adversarial dual objective and MMD, another statistical distance with a test function from reproducing kernel Hilbert space (RKHS). 3 A M OTIVATING E XAMPLE We start with a well-known (Goodfellow, 2016) motivating example of a simple min-max problem to show that, even in this basic case, gradient descent might fail dramatically. Let us consider the simplest min-max problem with a unique solution: finding a saddle point of a hyperbolic surface. Given the function f (x, y) = xy, our problem is to solve minx maxy f (x, y), which has a unique solution at (0, 0). Suppose that we want to apply gradient descent to solve this problem. The intuitive analog of the gradient vector that we might consider using in the update rule is defined by the vector field g(x, y) = (x, −y). However, at any given point the vector g(x, y) will be tangent to a closed circular trajectory, thus following this trajectory would never lead to the true solution (0, 0). Figure 1: Gradient descent fails to solve the saddle point problem minx maxy xy. One can observe the trajectory produced by the update Red line presents a trajectory of the grarule xt+1 = xt + αg(x, y) applied to the problem above dient descent if vector field g(x, y) is in Fig. 1. Neither block coordinate descent nor various used at each iteration. Blue lines are exlearning rate schedules can significantly improve the peramples of vectors from this vector field. formance of the gradient descent on this problem. We want to mention that while there is a huge body of work on using alternative descent schemes for convex-concave saddle point optimization, including, but not limited to different variants of mirror descent, such as Nesterov’s dual averaging (Nesterov, 2009) and mirror prox (Nemirovski, 2004), authors are not aware of any successful attempts to use it in the context of adversarial distribution alignment. Some techniques developed for solving continuous games such as fictitious play were successfully adopted by Salimans et al. (2016). 4 A PPROACH We first propose a new formulation of the adversarial objective for distribution alignment problems. Then we apply this approach to the domain adaptation scenario in Section 5. Suppose that we are given a finite set of points A sampled from the distribution p, and a finite set of points B sampled from the distribution q, and our goal is to match q with p by aligning B with A. More specifically, we aim to learn a matching function Mθ (B) that maps B to be as close as possible to A by minimizing some empirical estimate of a statistical distance d(·, ·) between them where θ are parameters of the matching function: θ∗ = argminθ d(A, Mθ (B)). Let us denote Bθ0 = Mθ (B) or just B 0 in contexts where dependence on θ is not important. The regular adversarial approach obtains the distance function by finding the best classifier Dw (x) with parameters w that discriminates points x ∈ A from points x ∈ B 0 and considers the distance between A and B 0 to be equal to the likelihood of this classifier. A higher likelihood of separating A from B 0 means that A is far from B 0 . This can be any form of hypothesis in general, and is often chosen to be a linear classifier (Tzeng et al., 2014) or a multi-layer neural network (Goodfellow et al., 2014). In this work, we use the class of linear classifiers, specifically, logistic regression in its primal and dual formulations. The solution can also be kernelized to obtain nonlinear discriminators. We will define the distance between distributions to be equal to the maximum likelihood of the logistic classifier parametrized by w: d(A, B 0 ) = max w X log(σ(wT xi )) + X xj ∈B 0 xi ∈A 3 log(1 − σ(wT xj )) − λ T w w 2 Workshop track - ICLR 2018 We can equivalently re-write this expression as: Cθ = {(xi , yi ) : xi ∈ A ∪ Bθ0 , yi = 1 if xi ∈ A else –1} X λ min d(A, Bθ0 ) = min max log(σ(yi (wT xi + b))) − wT w θ θ w,b 2 (1) xi ,yi ∈Cθ The duality derivation (Jaakkola & Haussler, 1999; Minka, 2003) follows from the fact that the log-sigmoid has a sharp upper-bound log(σ(u)) ≤ αT u + H(α) , αi ∈ [0, 1] H(α) = αT log α + (1 − α)T log(1 − α) thus we can upper-bound the distance as d(A, Bθ0 ) = min max 0≤α≤1 w,b X αi yi (wT xi + b) + H(α) − xi ,yi ∈Cθ λ T w w 2 where the dual variable αi corresponds to the weight of the point. Higher weight means that the point is contributing more to the decision hyperplane. Optimal value of alpha attains this upper bound. P The w that maximizes the inner expression can be computed in a closed form, w∗ = λ1 ( j xj yj αj ). P Optimally of bias requires i αi yi = 0. By substituting w∗ we obtain a minimization problem: d(A, Bθ0 ) = min 0≤αi ≤1 = min 0≤αi ≤1/λ 1 X 1 T αi αj (yi xi )T (yj xj ) + H(α) = min α Qα + H(α) = 0≤αi ≤1 2λ 2λ ij 1 T 1 T T α QAA αA + αB QBB αB − αA QAB αB + H(αA ) + H(αB ) 2 A 2 s.t. ||αA ||1 = ||αB ||1 (2) (3) The Eq. (3) is obtained by splitting the summation into blocks that include samples only from A, only from B, and from both A and B. For example, matrix QAB consists of pairwise similarities between points from A and B, and is equal to the dot product between corresponding data points in the linear case. The factor of two in front of the cross term comes from the fact that off-diagonal blocks in the quadratic form are equal. The constraint on alpha sums comes from splitting optimality conditions on the bias into two term. We will denote the resulting objective as dD (α, A, B). The above expression gives us a tight upper bound on the likelihood of the discriminator. Thus, by minimizing this upper bound, we can minimize the likelihood itself, as in the original loss, and therefore minimize the distance between the distributions: θ∗ , α∗ = argmin dD (α, A, Mθ (B)) (4) θ,α∈A Note that the overall problem has changed from an unconstrained saddle point problem to a smooth constrained minimization problem, which ultimately converges when gradient descent has a properly chosen learning rate, whereas the descent iterations for the saddle point problem are not guaranteed to converge at all. The resulting smooth optimization problem consists of minimization over α to improve classification scores and over θ to move points towards the decision boundary. Next section provides more intuition behind the resulting iterative procedure. 4.1 R ELATIONSHIP TO MMD In this section, we show that our dual formulation of the adversarial objective has an interesting relationship to another popular alignment objective. The integral probability metric between distributions p and q with a given function family H is defined as d(p, q) = sup Ex∼p f (x) − Ex∼q f (x) . f ∈H 4 Workshop track - ICLR 2018 It was shown to have a closed form solution and a corresponding closed form empirical estimator if H is a unit ball in reproducing kernel Hilbert space with the reproducing kernel k(x, y) and is commonly referred to as Maximum Mean Discrepancy (Gretton, 2012): 1 1 d(p, q) = Ep×p k(x, x0 ) + Eq×q k(y, y 0 ) − Ep×q k(x, y) 2 2 X 1 X 1 1 X 0 k(x, x ) + k(y, y 0 ) − k(x, y). d(A, B) = 2|A| 2|B| |A||B| i,j∈A i,j∈B A×B From the definition, it is essentially the distance between means of vectors from p and q embedded into the corresponding RKHS. The resulting empirical estimator combines average inner and outer similarities between samples from the two distributions and goes to zero as the number of samples increases if p = q. Note that if sample weights in Eq. (3) are constant and equal across all samples, so αi = c, then the dual distance introduced above becomes exactly an empirical estimate of the MMD plus the constant from the entropic regularizer. Thus, the adversarial logistic distance introduced in Eq. (3) can be viewed as an iteratively reweighted empirical estimator of the MMD distance. Intuitively, what this means is that the optimization procedure consists of two alternating minimization steps: (1) find the best sample weights assignment by changing α so that the regularized weighted MMD is minimized, and then (2) use a fixed α to minimize the resulting weighted MMD distance by changing the matching function Mθ . This makes the resulting procedure similar to the Iteratively Reweighted Least Squares Algorithm (Green, 1984) for logistic regression. An interesting observation here is that it turns out that high weights in this iterative procedure are given to the most mutually close subsets of A and B 0 , where closeness is measured in terms of Maximum Mean Discrepancy. These happen to be exactly support vectors of the corresponding optimal domain classifier. Therefore, the procedure described above essentially brings sets of the support vectors of the optimal domain classifier from different domains closer together. We note that the computational complexity of a single gradient step of the proposed method grows quadratically with the size of the dataset because of the kernelization step. However, our batched GPU implementation of the method performed on par with MMD and outperformed primal methods, probably because inference in modern neural networks requires so many dot products that a batch size × batch size multiplication is negligibly cheap compared to the rest of the network with modern highly parallel computing architectures. 5 A PPLICATION TO D ISTRIBUTION A LIGNMENT IN D OMAIN A DAPTATION We now show how the above formulation can be applied to distribution alignment for the specific problem of unsupervised domain adaptation. In this scenario, we train our classifier in a supervised fashion on some domain A and have to update it to perform well on a different domain B without using any labeled samples from the latter. Common examples include adapting to a camera with different image quality or to different weather conditions. More rigorously, we assume that there exist two distinct distributions on X × Y: a source distribution PS (X, Y ) and a target distribution PT (X, Y ). We assume that we observe a finite number of labeled samples from the source distribution DS ⊂ [X × Y]n ∼ PS (X, Y ) and a finite number of unlabeled samples from the target distribution DT ⊂ [X ]m ∼ PT (X). Our goal then is to find a labeling function f : X → Y from a hypothesis space F that minimizes target risk RT , even though we only have labels for samples from source. RT (f ) = E(x,y)∼PT L(f (x), y) ≤ RS (f ) + d(PT , PS ) + C(V, n) Ben-David et al. (2007) showed that, under mild restrictions on probability distributions, the target risk is upper-bounded by the sum of three terms: (1) the source risk, (2) the complexity term involving the dataset size and the VC-dimensionality of F, and (3) the discrepancy between source and target distributions. Thus, in order to make the target risk closer to the source risk, we need to minimize the discrepancy between distributions. They define discrepancy as a supremum of differences in measures across all events in a given σ-algebra: d(p, q) = supA∈Σ |p(A) − q(A)|. Estimation of the indicated expression is hard in practice, therefore it is usually replaced with more computationally feasible statistical distances. The total variation between two distributions and the Kolmogorov-Smirnov test 5 Workshop track - ICLR 2018 Discriminator Accuracy ||Σ̂A (t) − Σ̂B ||2 Iteration Iteration Iteration Dual Kernel Dual Primal Objective Figure 2: Convergence analysis for the synthetic point alignment problem. Top row: The procedure of adversarial alignment in the primal discriminator weight space for points from A and B lying in a two-dimensional plane does not converge to a single solution and oscillates over time. Middle row: In contrast, the proposed dual minimization adversarial objective steadily converges to an optimum. Bottom row: We observe similar behavior for the kernelized version. Even though the accuracy of the learned discriminators (column two) drifts over time in all cases, the distance between the covariance matrices (column three) and means (not shown in the figure) decreased in all cases; however, in both cases marked as "dual" iterative procedure converged to a single stable solution that indeed corresponds to the desired point cloud alignment. See Figure 3 for an illustration. Note that absolute values of objectives are not comparable, and therefore not shown on plots above. are closely related to the discrepancy definition above and are also often considered to be too strong to be useful, especially in higher dimensions. Our approach can be applied directly to this scenario if the discrepancy is replaced with an adversarial objective that uses a logistic regression domain classifier. In Section 6, we consider an instance of this problem where the main task is classification and the hypothesis space corresponds to multi-layer neural networks. We compare the standard min-max formulation of the adversarial objective in Eq. (1) with our min-min formulation in Eq. (3), and report the accuracy of the resulting classifier on the target domain. 6 E XPERIMENTS Synthetic Distribution Matching We first test the performance of our proposed approach on a synthetic point cloud matching problem. The data consists of two clouds of points on a two-dimensional plane and the goal is to match points from one cloud with points from the other. There are no restrictions on the transformation of the target point cloud, so Mθ includes all possible transformations, and is therefore parameterized by the point coordinates themselves, so the coordinates themselves were updated on each gradient step. We minimized the logistic adversarial distance in primal space by solving the corresponding min-max problem in Eq (1) and compared this to maximizing the proposed negative adversarial distance given by the dual of the logistic classifier in Eq (3) and the corresponding kernelized logistic classifier with a Gaussian kernel. As expected, the optimization of distances given by the dual versions of domain classifiers (linear and kernelized) worked considerably better than the same distance given by a linear classifier in the primal form. More specifically, the results in the primal case were very sensitive to the choice of learning rate. In general, the resulting decent iterations for the saddle point problem did not converge to a single solution, whereas both dual versions successfully converged to solutions that matched the two clouds of points both visually and in terms of means and covariances, as presented in Fig. 2. 6 Dual Kernel Dual Primal Workshop track - ICLR 2018 t0 ... tT Figure 3: (Best viewed in color) When trained on a point cloud matching task, the primal approach leads to an unstable solution that makes the decision boundary spin around data points when they are almost aligned, whereas both the linear and kernel dual approaches lead to stable solutions that gradually assign 0.5 probability of belonging to either A or B to all points, which is exactly the desired behaviour. Yellow and blue points are the original point clouds, red points correspond to positions of yellow points after transformation Mθ . We suggest one more intuitive explanation of why the dual procedure might work better, in addition to the fact that optimization problems are just inherently easier than saddle point problems. The descision boundary of the classifier in the dual space is defined implicitly through a weighted average of observed data points, so when these data points move, the decision boundary moves with them. If points move too rapidly and the discriminator explicitly parametrizes the decision boundary, weights of the discriminator may change drastically to keep up with moved points, leading to the overall instability of the training procedure. In support of this hypothesis, we observed interesting patterns in the behavior of the linear primal discriminator: when point clouds become sufficiently aligned, the decision boundary starts "spinning" around these clouds, slightly pushing them in corresponding directions. In contrast, both dual classifiers end up gradually converging to solutions that assigned each point with 0.5 probability of corresponding to either of two domains. Real-Image Unsupervised Domain Adaptation We also evaluated the performance of the proposed dual objective on a visual domain adaptation task. We performed a series of experiments on an SVHN-MNIST digit classification dataset pair in an unsupervised domain adaptation setup: the task is to use a classifier trained on SVHN and unlabeled samples from MNIST to improve test accuracy on the latter. Following Tzeng et al. (2017) we used standard LeNet as a base model and outputs of the last layer before the softmax as feature representations. We trained the source network to perform well on source dataset and the discriminator to distinguish features computed by the source and target networks. After training the source network on the source domain, we initialized the target network with source weights and optimized it to make the distributions of source and target feature representations less distinguishable from the discriminator perspective. More technical details are given in the Supplementary Section 10.2. We tested several primal objectives based on Adversarial Discriminative Domain Adaptation (ADDA) (Tzeng et al., 2017), Improved Wasserstein GAN-based objective with a unit-norm gradient regularizer (Salimans et al., 2016), and MMD (Long & Wang, 2015), and compared them to our Dual objective. To eliminate the influence of a particular discriminator and examine the stability of the objective structure, we restricted the discriminator hypothesis space H to linear classifiers, because primal objectives (ADDA, Improved WGAN) cannot be kernelized and MMD does not support multilayer discriminators. This restriction limits the power of the resulting discriminator, thus leading to scores lower than reported state of the art (usually with carefully chosen hyperparameters), but we are more interested in trends in the behaviour of these objectives rather than in absolute reached values. 7 Workshop track - ICLR 2018 For each model, we varied learning rates and regularization parameters and ran each experiment for 50 epochs to examine the behavior of these models in the long run. More details on choice of hyperparameters is given in Section 10.1). In unsupervised domain adaptation, we do not have access to target labels and thus cannot perform validation of stopping criteria. In fact, if labeled target data were available then it could be used for fine-tuning the source model, rather than just doing unsupervised learning. Therefore we evaluate the behavior of the models over multiple training epochs to see which would be more stable in the face of uncertain stopping criteria in practical domain adaptation scenarios. Figure 4 shows the digit classification accuracies obtained by the four models on the target MNIST dataset. The top row presents the distribution of accuracies at different epochs and the bottom row shows the evolution of individual runs. From these results we see that on average descent iterations with our Dual objective converged to satisfactory solutions under a considerably higher number of learning rate and hyperparameter combinations compared to other methods. Our model often stayed at peak performance, whereas all other methods most often slowly deviated from it. The amount of instability demonstrates how important it is to choose exactly the right hyperparameters and stopping criteria for these models. In contrast, our Dual objective (third column) clearly performs well under the majority of the learning rates. WGAN often performs better than MMD and ADDA, but experiences significant oscillations. We tried using different validation heuristics, such as considering only runs that resulted in a significant drop in distance, but this did not significantly change these trends (Section 10.3). We conclude that our Dual method leads to more stable optimization without the need for choosing an optimal stopping criterion and learning rates by cross-validation on test data. 7 D ISCUSSION AND F UTURE W ORK While exact dual exists only in the logistic discriminator case, when one can use the duality and solve the inner problem in closed form, we want to stress that our paper presents a more general framework for alignment that can be extended to other classes of functions. More specifically, one can rewrite the quadratic form in kernel logistic regression (3) as a Frobenius inner product of a kernel matrix Q with a symmetric rank 1 alignment matrix S (outer product of alpha with itself). d(A, B) = min 0≤αi ≤1 1 hααT , QiF + H(α) = min hSα , QiF + H(Sα ) Sα 2λ The kernel matrix specifies distances between points and S chooses pairs that minimize the total distance. This way the problem reduces to “maximizing the maximum agreement between the alignment and similarity matrices” that in turn might be seen as replacing “adversity” in the original problem with “cooperation” in the dual maximization problem. In our paper, S is a rank 1 matrix, but we could choose different alignment matrix parameterizations and a corresponding regularizer that would correspond to having a neural network discriminator in the adversarial problem or a Wasserstein distance in Earth Mover’s Distance form. The resulting problem is not dual to minimization of any existing adversarial distances, but exploits same underlying principle of “iteratively-reweighted alignment matrix fitting” discussed in this paper. We assert that in order to understand the basic properties of the resulting formulation, an in-depth discussion of the well-studied logistic case is no less important than the discussion involving complicated deep models, which deserves a paper of its own. This paper proposes a more stable “cooperative” problem reformulation rather than a new adversarial objective as many recent papers do. 8 C ONCLUSION We presented an adversarial objective that does not lead to a min-max problem. We proposed using the dual of the discriminator objective to improve the stability of distribution alignment, showed its connection to MMD, and presented quantitative results for alignment of toy datasets and unsupervised domain adaptation results on real-image classification datasets. Our results suggest that the proposed dual optimization objective is indeed better suited for learning with gradient descent than the saddle point objective that naturally arises from the original primal formulation of adversarial alignment. Further attempts to use duality to reformulate other notions of statistical distances in adversarial settings as computationally feasible minimization problems may be promising. 8 Workshop track - ICLR 2018 ADDA WGAN 6 0.0 0.2 0.4 Dual MMD 10 0.6 0.8 1.0 0.0 0.2 0.4 40 0.6 0.8 1.0 0.0 0.2 0.4 0.6 0.8 1.0 Target accuracies Target accuracies 0.7 0.6 0.5 0.4 0 20 40 0 20 40 0 20 40 0 20 40 Epochs Figure 4: (Best viewed in color) Top row: Distribution of target test accuracies at different epochs with different objectives during SVHN-MNIST domain adaptation. The red dashed line represents source accuracy, therefore, a larger accuracy distribution mass to the right of (above) the red line is better. These results suggest that our Dual objective leads to very minimal divergence from the optimal solution under the majority of learning rates and hyperparameter combinations. The other methods have lower solution stability, in descending order: Improved WGAN, MMD, ADDA. Bottom row: Evolution of target test accuracy over epochs. Our Dual objective (third column) clearly performs well under the majority of the learning rates. WGAN often performs better than MMD and ADDA, but experiences significant oscillations. Different validation heuristics, such as considering only runs that resulted in a significant drop in distance, did not significantly change these trends (Section 10.3). The proportion of runs that outperformed the source baseline after 40 epochs were: 52.3% for Dual, 21.5% for WGAN, 17.1% for MMD and 6.9% for ADDA. 9 ACKNOWLEDGMENTS This work was supported by NSF Award #1723379 and NSF CAREER Award #1559558. R EFERENCES Martin Arjovsky and Léon Bottou. Towards principled methods for training generative adversarial networks. 2017. Martin Arjovsky, Soumith Chintala, and Léon Bottou. Wasserstein GAN. CoRR, 2017. S. Ben-David, J. Blitzer, K. Crammer, and F. Pereira. Analysis of representations for domain adaptation. NIPS, 2007. Konstantinos Bousmalis, Nathan Silberman, David Dohan, Dumitru Erhan, and Dilip Krishnan. Unsupervised pixel-level domain adaptation with generative adversarial networks. 2017. Emily L Denton, Soumith Chintala, Rob Fergus, et al. Deep generative image models using a laplacian pyramid of adversarial networks. In NIPS, 2015. Gintare Karolina Dziugaite, Daniel M Roy, and Zoubin Ghahramani. Training generative neural networks via Maximum Mean Discrepancy optimization. Uai, 2015. Yaroslav Ganin and Victor Lempitsky. Unsupervised domain adaptation by backpropagation. In ICML, 2015. 9 Workshop track - ICLR 2018 Boqing Gong, Kristen Grauman, and Fei Sha. Connecting the dots with landmarks: Discriminatively learning domain-invariant features for unsupervised domain adaptation. In ICML, 2013. Ian Goodfellow. Nips 2016 tutorial: Generative adversarial networks. arXiv preprint arXiv:1701.00160, 2016. Ian Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron Courville, and Yoshua Bengio. Generative adversarial nets. In NIPS. 2014. Peter J Green. Iteratively reweighted least squares for maximum likelihood estimation, and some robust and resistant alternatives. Journal of the Royal Statistical Society. Series B (Methodological), pp. 149–192, 1984. Arthur Gretton. A Kernel Two-Sample Test. Journal of Machine Learning Research, 13:723–773, 2012. Jiayuan Huang, Arthur Gretton, Karsten M Borgwardt, Bernhard Schölkopf, and Alex J Smola. Correcting sample selection bias by unlabeled data. In Advances in neural information processing systems, pp. 601–608, 2007. Phillip Isola, Jun Zhu, Tinghui Zhou, and Alexei Efros. Image-to-image translation with conditional adversarial networks. 2016. Tommi S Jaakkola and David Haussler. Probabilistic kernel regression models. In AISTATS, 1999. Christian Ledig, Lucas Theis, Ferenc Huszar, and Jose Caballero. Photo-realistic single image super-resolution using a generative adversarial network. 2016. Yujia Li, Kevin Swersky, and Rich Zemel. Generative Moment Matching Networks. ICML, 2015. Ming-Yu Liu and Oncel Tuzel. Coupled Generative Adversarial Networks. NIPS, 2016. Mingsheng Long and Jianmin Wang. Learning transferable features with deep adaptation nets. In ICML, 2015. Michael Mathieu, Junbo Zhao, Pablo Sprechmann, Aditya Ramesh, and Yann Lecun. Disentangling factors of variation in deep representations using adversarial training. (NIPS), 2016. Thomas P Minka. A comparison of numerical optimizers for logistic regression. 2003. Mehdi Mirza and Simon Osindero. Conditional generative adversarial nets. CoRR, abs/1411.1784, 2014. Arkadi Nemirovski. Prox-method with rate of convergence o (1/t) for variational inequalities with lipschitz continuous monotone operators and smooth convex-concave saddle point problems. SIAM, 2004. Yurii Nesterov. Primal-dual subgradient methods for convex problems. Mathematical programming, 2009. Sebastian Nowozin, Botond Cseke, and Ryota Tomioka. f-GAN: Training Generative Neural Samplers using Variational Divergence Minimization. arXiv, pp. 17, 2016. C Onsiderations, D Iagnostic, C Hallenges, P Ostbiopsy, and C Linical M Anagement. Unsupervised CrossDomain Image Generation. pp. 1–14, 2017. Alec Radford, Luke Metz, and Soumith Chintala. Unsupervised representation learning with deep convolutional generative adversarial networks. arXiv preprint arXiv:1511.06434, 2015. Tim Salimans, Ian J. Goodfellow, Wojciech Zaremba, Vicki Cheung, Alec Radford, and Xi Chen. Improved techniques for training gans. CoRR, abs/1606.03498, 2016. Baochen Sun and Kate Saenko. Deep CORAL: Correlation alignment for deep domain adaptation. ECCV, 2016. Eric Tzeng, Judy Hoffman, Ning Zhang, Kate Saenko, and Trevor Darrell. Deep domain confusion: Maximizing for domain invariance. CoRR, abs/1412.3474, 2014. Eric Tzeng, Judy Hoffman, Trevor Darrell, and Kate Saenko. Simultaneous deep transfer across domains and tasks. In ICCV, 2015. Eric Tzeng, Judy Hoffman, Kate Saenko, and Trevor Darrell. Adversarial discriminative domain adaptation. In CVPR, 2017. Jun Zhu, Taesung Park, Phillip Isola, and Alexei A. Efros. Unpaired image-to-image translation using cycleconsistent adversarial networks. arXiv, 2017. 10 Workshop track - ICLR 2018 10 10.1 S UPPLEMENTARY H YPERPARAMETER SPACE The space of hyperparameters (mostly, learning rates for different parts of the network) we explored in those runs was built as follows: 1) on SVHN-MNIST we found reasonably working vectors of hyper-parameters for each method essentially by cross-validation on test 2) then we combined all these vectors into a set H and then inflated H by adding many combinations of parts from these vectors and other similar and in-between vectors; for example, if for two models two optimal sets of parameters included (1e-6, 1e-3) for the first model and (1-4, 1e-1) for the second one, we would inflate H by adding all nine combinations of ([1e-6, 1e-5 1e-4], [1e-3, 1e-2, 1e-1]) and varying model-specific parameters such as regularization parameters 3) then we conducted experiments with combinations of pairs [vector from H, model] 10.2 I MPLEMENTATION DETAILS During domain adaptation experiments, discriminators of all models that have a trainable discriminator (ADDA, WGAN, Dual) were trained for five epochs prior to the beginning of actual adaptation, which improved performance for all models. Kernel density estimates on Figure 4 were obtained with a fixed 0.03 bandwidth and a linear boundary correction method. All algorithms took greyscale images P resizedPto 28 × 28 as input. Restrictions on α were imposed by adding an error term +λ1 | αA − αB | and positivity by −λ2 | min(0, α)|. Hyperparameters for the Dual method can be set so that restrictions above hold by the end of adaptation. To implement the dual algorithm in mini-batch fashion we extracted slices of α∗ that correspond to points processed in this batch on each iteration. Search space was built as explained above, learning rates and weight decay for updating target network and discriminator were as follows: • for target network update we used Adam with lr in [1e-6, 1e-5, 1e-4] and beta in [0.5, 0.9] • for discriminator updates we used SGD with lr in [1e-6, 1e-5, 1e-7] or Adam with learning rates in [2e-4, 1e-6, 1e-5] and beta in [0.5, 0.9] • discriminator weight decay parameter was chosen from [2.5e-05, 0] resulting into 90 possible combinations + model specific parameters. 10.3 VALIDATION HEURISTICS Considering runs such that the following holds for different values of λ did not change results significantly. d(P, Q(0) ) − d(P, Q(T ) ) > λ. maxt d(P, Q(t) ) − mint d(P, Q(t) ) 11 Workshop track - ICLR 2018 ADDA WGAN 6 0.0 0.2 0.4 Dual MMD 10 0.6 0.8 1.0 0.0 0.2 0.4 12 40 0.6 0.8 1.0 0.0 0.2 0.4 0.6 0.8 1.0
1cs.CV
arXiv:1802.00682v1 [cs.AI] 2 Feb 2018 How do Humans Understand Explanations from Machine Learning Systems? An Evaluation of the Human-Interpretability of Explanation Menaka Narayanan*1 , Emily Chen*1 , Jeffrey He*1 , Been Kim2 , Sam Gershman1 and Finale Doshi-Velez1 1 Harvard University 2 Google Brain February 5, 2018 Abstract Recent years have seen a boom in interest in machine learning systems that can provide a human-understandable rationale for their predictions or decisions. However, exactly what kinds of explanation are truly human-interpretable remains poorly understood. This work advances our understanding of what makes explanations interpretable in the specific context of verification. Suppose we have a machine learning system that predicts X, and we provide rationale for this prediction X. Given an input, an explanation, and an output, is the output consistent with the input and the supposed rationale? Via a series of user-studies, we identify what kinds of increases in complexity have the greatest effect on the time it takes for humans to verify the rationale, and which seem relatively insensitive. 1 Introduction Interpretable machine learning systems provide not only decisions or predictions but also explanation for their outputs. Explanations can help increase trust and safety by identifying when the recommendation is reasonable when it is not. While interpretability has a long history in AI [Michie, 1988], the relatively recent widespread adoption of machine learning systems in real, complex environments has lead to an increased attention to interpretable machine learning systems, with applications including understanding notifications on mobile devices [Mehrotra et al., 2017, Wang et al., 2016], calculating stroke risk [Letham et al., 2015], and designing materials [Raccuglia et al., 2016]. Techniques for ascertaining the provenance of a prediction are also popular within the 1 machine learning community as ways for us to simply understand our increasingly complex models [Lei et al., 2016, Selvaraju et al., 2016, Adler et al., 2016]. The increased interest in interpretability has resulted in many forms of explanation being proposed, ranging from classical approaches such as decision trees [Breiman et al., 1984] to input gradients or other forms of (possibly smoothed) sensitivity analysis [Selvaraju et al., 2016, Ribeiro et al., 2016, Lei et al., 2016], generalized additive models [Caruana et al., 2015], procedures [Singh et al., 2016], falling rule lists [Wang and Rudin, 2015], exemplars [Kim et al., 2014, Frey and Dueck, 2007] and decision sets [Lakkaraju et al., 2016]—to name a few. In all of these cases, there is a face-validity to the proposed form of explanation: if the explanation was not human-interpretable, clearly it would not have passed peer review. That said, these works provide little guidance about when different kinds of explanation might be appropriate, and within a class of explanations—such as decision-trees or decision-sets—what are the limitations of human reasoning. For example, it is hard to imagine that a human would find a 5000-node decision tree as interpretable as 5-node decision tree, for any reasonable notion of interpretable. The reason the explanation is desired is also often left implicit. In Doshi-Velez and Kim [2017], we point to a growing need for the interpretable machine learning community to engage with the human factors and cognitive science of interpretability: we can spend enormous efforts optimizing all kinds of models and regularizers, but that effort is only worthwhile if those models and regularizers actually solve the original human-centered task of providing explanation. Carefully controlled human-subject experiments provide an evidence-based approach to identify what kinds of regularizers we should be using. In this work, we make modest but concrete strides toward this large goal of quantifying what makes explanation human-interpretable. We shall assume that there exists some explanation system that generates the explanation—for example, there exist a variety of approaches that use perturbations around a point of interest to produce a local decision boundary [Ribeiro et al., 2016, Singh et al., 2016]. Our question is: What kinds of explanation can humans most easily utilize? Below, we describe the kind of task we shall explore, as well as the form of the explanation. Choice of Task The question of what kinds of explanation a human can utilize implies the presence of a downstream task. The task may be intrinsic—relying on just the explanation alone— or extrinsic—relying on the explanation and other facts about the environment.1 Intrinsic tasks include problems such as verification—given an input, output, and explanation, can the human user verify that the output is consistent with the input and provided explanation?—and counterfactual reasoning—given an input, output, and explanation, can the human subject identify what input changes would result in a different output? In contrast, extrinsic tasks include goals such as safety— given the input, output, explanation, and observations of the world, does the explanation help the human user identify when the agent is going to make a mistake?—and trust—given the input, output, explanation, and observations of the world, does the explanation increase the human user’s confidence in the agent? Evaluation on extrinsic tasks, while ultimately what we care about, require careful experimental design that ensures all subjects have similar knowledge and assumptions about 1 As noted in Herman [2017], explanation can also be used to persuade rather than inform; we exclude that use-case here. 2 the environment. One must also tease apart conflations between human perception of knowledge with actual knowledge: for example, it may be possible to manipulate trust arbitrarily separately from prediction accuracy. Thus, evaluating extrinsic tasks is more challenging than intrinsic ones. In this work, we will focus on the simplest intrinsic setting: verification. Given a specific input, explanation, and output, can we quickly determine whether the output is consistent with the input and explanation? Such a setting may arise in consumer recommendation scenarios—for example, a salesperson may wish to ensure that a specific product recommendation is consistent with a consumer’s preferences. Starting simple also provides an opportunity to explore aspects relevant to the experimental design. Choice of Explanation Form As mentioned above, there have been many forms of explanation proposed, ranging from decision trees to gradients of neural networks. In this work, we consider explanations that are in the form of decision sets. Decision sets are a particular form of procedure consisting of a collection of cases, each mapping some function of the inputs to a collection of outputs. An example of a decision set is given below Figure 1: Example of a decision set explanation. where each line contains a clause in disjunctive normal form (an or-of-ands) of the inputs, which, if true, provides a way to verify the output (also in disjunctive normal form). As argued in Lakkaraju et al. [2016], decision sets are relatively easy for humans to parse given a specific instance, because they can scan for the rule that applies and choose the accompanying output. Decision sets (also known as rule sets) also enjoy a long history of optimization techniques, ranging from Frank and Witten [1998], Cohen [1995], Clark and Boswell [1991] to Lakkaraju et al. [2016]. However, we can also already see that there are many factors that could potentially make the decision set more or less challenging to follow: in addition to the number of lines, there are ways in which terms interact in the disjunctions and conjunctions, and, more subtly, aspects such as how often terms appear and whether terms represent intermediate concepts. Which of these factors are most relevant when it comes to a human’s ability to process and utilize an explanation, and to what extent? The answer to this question has important implications for the design of explanation systems in interpretable machine learning, especially if we find that our explanation-processing ability is relatively robust to variation in some factors but not others. Contributions The core contribution of this work is to provide an empirical grounding for what kinds of explanations humans can utilize. We find that while almost all increases in the complexity of an explanation result in longer response times, some types of complexity—such as the number of lines, or the number of new concepts introduced—have a much bigger effect than others—such as variable repetition. We also find some unintuitive patterns, such as how participants seem to prefer 3 an explanation that requires a single, more complex line to one that spans multiple simpler lines (each defining a new concept for the next line). While more work is clearly needed in this area, we take initial steps in identifying what kinds of factors are most important to optimize for when providing explanation to humans. 2 Related Work Interpretable machine learning methods aim to optimize models for both succinct explanation and predictive performance. Common types of explanation include regressions with simple, humansimulatable functions [Caruana et al., 2015, Kim et al., 2015a, Rüping, 2006, Bucilu et al., 2006, Ustun and Rudin, 2016, Doshi-Velez et al., 2015, Kim et al., 2015b, Krakovna and Doshi-Velez, 2016, Hughes et al., 2016, Jung et al., 2017], various kinds of logic-based methods [Wang and Rudin, 2015, Lakkaraju et al., 2016, Singh et al., 2016, Liu and Tsang, 2016, Safavian and Landgrebe, 1991, Wang et al., 2017], techniques for extracting local explanations from black-box models [Ribeiro et al., 2016, Lei et al., 2016, Adler et al., 2016, Selvaraju et al., 2016, Smilkov et al., 2017, Shrikumar et al., 2016, Kindermans et al., 2017, Ross et al., 2017], and visualization [Wattenberg et al., 2016]. There exist a range of technical approaches to derive each form of explanation, whether it be learning sparse models [Mehmood et al., 2012, Chandrashekar and Sahin, 2014], monotone functions [Canini et al., 2016], or efficient logic-based models [Rivest, 1987]. Related to our work, there also exists a history of identify human-relevant concepts from data, including disentangled representations [Chen et al., 2016] and predicate invention in inductive logic programming [Muggleton et al., 2015]. While the algorithms are sophisticated, the measures of interpretability are often not—it is common for researchers to simply appeal to the face-validity of the results that they find (i.e., “this result makes sense to the human reader”) [Caruana et al., 2015, Lei et al., 2016, Ribeiro et al., 2016]. In parallel, the literature on explanation in psychology also offers several general insights into the design of interpretable AI systems. For example, humans prefer explanations that are both simple and highly probable [Lombrozo, 2007]. Human explanations typically appeal to causal structure [Lombrozo, 2006] and counterfactuals [Keil, 2006]. Miller [1956] famously argued that humans can hold about seven items simultaneously in working memory, suggesting that human-interpretable explanations should obey some kind of capacity limit (importantly, these items can correspond to complex cognitive chunks—for example, ‘CIAFBINSA’ is easier to remember when it is chunked as ‘CIA’, ‘FBI’, ‘NSA.’). Orthogonally, Kahneman [2011] notes that humans have different modes of thinking, and larger explanations might push humans into a more careful, rational thinking mode. Machine learning researchers can convert these concepts into notions such as sparsity or simulatability, but the work to determine answers to questions such as “how sparse?” or “how long?” requires empirical evaluation. Existing studies evaluting the human-interpretability of explanation often fall into the A-B test framework, in which a proposed model is being compared to some competitor, generally on an intrinsic task. For example, Kim et al. [2014] showed that human subjects’ performance on a classification task was better when using examples as representation than when using non-examplebased representation. Lakkaraju et al. [2016] performed a user study in which they found subjects are faster and more accurate at describing local decision boundaries based on decision sets rather 4 than rule lists. Subramanian et al. [1992] found that users prefer decision trees to tables in games, whereas Huysmans et al. [2011] found users prefer, and are more accurate, with decision tables rather than other classifiers in a credit scoring domain. Hayete and Bienkowska [2004] found a preference for non-oblique splits in decision trees (see Freitas [2014] for more detailed survey). These works provide quantitative evaluations of the human-interpretability of explanation, but rarely identify what properties are most essential for what contexts—which is critical for generalization. Specific application areas have also evaluated the desired properties of an explanation within the context of the application. For example, Tintarev and Masthoff [2015] provides a survey in the context of recommendation systems, noting differences between the kind of explanations that manipulate trust [Cosley et al., 2003] and the kind that increase the odds of a good decision [Bilgic and Mooney, 2005]. In many cases, these studies are looking at whether the explanation has an effect, sometimes also considering a few different kinds of explanation (actions of similar customers, etc.). Horsky et al. [2012] describe how presenting the right clinical data alongside a decision support recommendation can help with adoption and trust. Bussone et al. [2015] found that overly detailed explanations from clinical decision support systems enhance trust but also create over-reliance; short or absent explanations prevent over-reliance but decrease trust. These studies span a variety of extrinsic tasks, and again given the specificity of each explanation type, identifying generalizable properties is challenging. Closer to the objectives of the proposed work, Kulesza et al. [2013] performed a qualitative study in which they varied the soundness (nothing but the truth) and the completeness (the whole truth) of an explanation in a recommendation system setting. They found completeness was important for participants to build accurate mental models of the system. Allahyari and Lavesson [2011], Elomaa [2017] also find that larger models can sometimes be more interpretable. Schmid et al. [2016] find that human-recognizable intermediate predicates in inductive knowledge programs can sometimes improve simulation time. Poursabzi-Sangdeh et al. [2017] manipulate the size and transparency of an explanation and find that longer explanations and black-box models are harder to simulate accurately (even given many instances) on a real-world application predicting housing prices. Our work fits into this category of empirical study of explanation evaluation; we perform controlled studies on a pair of synthetic application to assess the effect of a large set of explanation parameters. 3 Methods Our main research question is to determine what properties of decision sets are most relevant for human users to be able to utilize the explanations for verification. In order to carefully control various properties of the explanation and the context, in the following we shall present human subjects with explanations that could have been machine-generated, but were in fact generated by us. Before describing our experiment, we emphasize that while our explanations are not actually machine-generated, our findings provide suggestions to designers of interpretable machine learning systems about what parameters affect the usability of an explanation, and which should be optimized when producing explanations. 5 3.1 Factors Varied Even within decision sets, there are a large number of ways in which the explanations could be varied. Following initial pilot studies (see Appendix), we chose to focus on the three main kinds of variation (described below). We also tested on two different domains—a faux recipe recommendation domain and a faux clinical decision support domain—to see if the context would result in different explanation processing while other factors were held constant. Explanation Variation We explored the following sources of explanation variation: • V1: Explanation Size. We varied the size of the explanation across two dimensions: the total number of lines in the decision set, and the maximum number of terms within the output clause. The first corresponds to increasing the vertical size of the explanation—the number of cases—while the second corresponds to increasing the horizontal size of the explanation—the complexity of each case. We focused on output clauses because they were harder to parse: input clauses could be quickly scanned for setting-related terms, but output clauses had to be read through and processed completely to verify an explanation. We hypothesized that increasing the size of the explanation across either dimension would increase the time required to perform the verification task. • V2: Creating New Types of Cognitive Chunks. In Figure 2, the first line of the decision set introduces a new cognitive chunk: if the alien is ‘checking the news’ or ‘coughing,’ that corresponds to a new concept ‘windy.’2 On one hand, creating new cognitive chunks can make an explanation more succinct. On the other hand, the human must now process an additional idea. We varied two aspects related to new cognitive chunks. First, we simply adjusted the number of new cognitive chunks present in the explanation. All of the cognitive chunks were necessary for verification, to ensure that the participant had to traverse all of concepts instead of skimming for the relevant one. Second, we tested whether it was more helpful to introduce a new cognitive chunk or leave it implicit: for example, instead of introducing a concept ‘windy’ for ‘checking the news or coughing,’ (explicit) we could simply include ‘checking the news or coughing’ wherever windy appeared (implicit). We hypothesized that adding cognitive chunks would increase the time required to process an explanation, because the user would have to consider more lines in the decision list to come to a conclusion. However, we hypothesized that it would still be more time-efficient to introduce the new chunk rather than having long clauses that implicitly contained the meaning of the chunk. • V3: Repeated Terms in an Explanation. Another factor that might affect humans’ ability to process an explanation is how often terms are used. For example, if input conditions in the decision list have little overlap, then it may be faster to find the appropriate one because there are fewer relevant cases to consider. We hypothesized that if an input condition appeared in several lines of the explanation, this would increase the time it took to search for the correct 2 One can imagine this being akin to giving names to nodes in a complex model, such as a neural network. 6 rule in the explanation. (Repeated terms was also a factor used by Lakkaraju et al. [2016] to measure interpretability.) Domain Variation Below we describe the two contexts, or domains, that we used in our experiments: recipe recommendations (familiar) and clinical decision support (unfamiliar). The domains were designed to feel very different but such that the verification tasks could be made to exactly parallel each other, allowing us to investigate the effect of the domain context in situations when the form of the explanation was exactly the same. We hypothesized that these trends would be consistent in both the recipe and clinical domains. Alien Recipes. In the first domain, study participants were told that the machine learning system had studied a group of aliens and determined each of their individual food preferences in various settings (e.g., snowing, weekend). Each task involved presenting participants with the setting (the input), the systems’s description of the current alien’s preferences (the explanation), and a set of recommended ingredients (the output). The user was then asked whether the ingredients recommendation was a good one. This scenario represents a setting in which customers may wish to know why a certain product or products were recommended to them. Aliens were introduced in order to avoid the subject’s prior knowledge or preferences about settings and food affecting their responses; each task involved a different alien so that each explanation could be unique. All non-literals (e.g. what ingredients were spices) were defined in a dictionary so that all participants would have the same cognitive chunks. Alien Medicine In the second domain, study participants were told that the machine learning system had studied a group of aliens and determined personalized treatment strategies for various symptoms (e.g. sore throat). Each task involved presenting participants with the symptoms (the input), the system’s description of the alien’s personalized treatment strategy (the explanation), and a set of recommended drugs (the output). The user was then asked whether the drugs recommended were appropriate. This scenario closely matches a clinical decision support setting in which a system might suggest a treatment given a patient’s symptoms, and the clinician may wish to know why the system chose a particular treatment. As before, aliens were chosen to avoid the subject’s prior medical knowledge from affecting their responses; each task involved personalized medicine so that each explanation could be unique. We chose drug names that corresponded with the first letter of the illness (e.g. antibiotic medications were Aerove, Adenon and Athoxin) so as to replicate the level of ease and familiarity of food names. Again, all drug names and categories were provided in a dictionary so that participants would have the same cognitive chunks. In our experiments, we maintained an exact correspondence between inputs (setting vs. symptoms), outputs (foods vs. drugs), categories (food categories vs. drug categories), and the forms of the explanation. These parallels allowed us to test whether changing the domain from a relatively familiar, low-risk product recommendation setting to a relatively unfamiliar, higher-risk decision-making setting affected how subjects utilized the explanations for verification. 7 3.2 Experimental Design and Interface The three kinds of variation and two domains resulted in six total experiments. In the recipe domain, we held the list of ingredients, food categories, and possible input conditions constant. Similarly, in the clinical domain, we held the list of symptoms, medicine categories, and possible input conditions constant. The levels were as follows: • Length of the explanation (V1). We manipulated the length of the explanation (varying between 2, 6, and 10 lines) and the length of the output clause (varying between 2 and 5 terms). Each combination was tested twice within a experiment, for a total of 12 questions. • Introducing new concepts (V2): We manipulated the number of cognitive chunks introduced (varying from 1 to 5), and whether they were embedded into the explanation or abstracted out into new cognitive chunks. Each combination was tested once within a experiment, for a total of 10 questions. • Repeated terms (V3): We manipulated the number of times the input conditions appeared in the explanation (varying from 1 to 5) and held the number of lines and length of clauses constant. Each combination was tested twice within a experiment, for a total of 10 questions. The outputs were consistent with the explanation and the input 50% of the time, so subjects could not simply learn that the outputs were always (in)consistent. Participants were recruited via Amazon Mechanical Turk. Before starting the experiment, they were given a tutorial on the verification task and the interface. Then they were given a set of three practice questions. Following the practice questions, they started the core questions for each experiment. They were told that their primary goal was accuracy, and their secondary goal was speed. While the questions were the same for all participants, the order of the questions was randomized for every participant. Each participant only participated in one of the experiments. For example, one participant might have completed a 12-question experiment on the effect of varying explanation length in the recipe domain, while another would have completed 10-question experiment on the effect of repeated terms in the clinical domain. Experiments were kept short to avoid subjects getting tired. Metrics We recorded three metrics: response time, accuracy, and subjective satisfaction. Response time was measured as the number of seconds from when the task was displayed until the subject hit the submit button on the interface. Accuracy was measured if the subject correctly identified whether the output was consistent with the input and the explanation (a radio button). After each submitting their answer for each question, the participant was also asked to subjectively rate the quality of the explanation on a scale from one to ten. 8 (a) Recipe Domain (b) Clinical Domain Figure 2: Screenshots of our interface for a task. In the Recipe Domain, the supposed machine learning system has recommended the ingredients in the lower left box, based on its observations of the alien (center box). The top box shows the system’s explanation. In this case, the recommended ingredients are consistent with the explanation and the inputs: The input conditions are weekend and windy (implied by coughing), and the recommendation of fruit and grains follows from the last line of the explanation. In the Clinical Domain, the supposed machine learning system has recommended the medication in the lower box, based on its observations of the alien’s symptoms 9 (center box). The top box shows the system’s reasoning. The interface has exactly the same form as the recipe domain. Table 1: Participant Demographics. There were no patients over 69 years old. 4.2% of participants reported “other” for their education level. The rates of participants from Australia, Europe, Latin America, and South America were all less than 0.5%. (All participants were included in the analyses, but we do not list specific proportions for them for brevity.) Feature Age Education Gender Region Category : Proportion 18-34 : 59.0% 35-50 : 35.1% High School : 28.5% Bachelor’s : 52.4% Male : 58.8% Female : 41.2% US/Canada : 87.1% Asia : 11.4% 51-69 : 5.9% Beyond Bachelor’s: 14.9% Experimental Interface Figure 2 shows our interfaces for the Recipe and Clinical domains. The observations section (middle) refers to the inputs into the algorithm. The recommendation section refers to the output of the algorithm. The preferences section (top) contains the explanation—the reasoning that the supposed machine learning system used to suggest the output (i.e., recommendation) given the input, presented as a procedure in the form of a decision set. Finally, the ingredients section in the Recipe domain (and the disease medications section in the Clinical domain) contained a dictionary of cognitive chunks relevant to the experiment (for example, the fact that bagels, rice, and pasta are all grains). Including this list explicitly allowed us to control for the fact that some human subjects may be more familiar with various concepts than others. The choice of location for these elements was chosen based on pilot studies—while an ordering of input, explanation, output might make more sense for an AI expert, we found that presenting the information in the format of Figure 2 seemed to be easier for subjects to follow in our preliminary explorations. We also found that presenting the decision set as a decision set seemed easier to follow than converting it into paragraphs. Finally, we colored the input conditions in blue and outputs in orange within the explanation. We found that this highlighting system made it easier for participants to parse the explanations for input conditions. 4 Results We recruited 100 subjects for each our six experiments, for a total of 600 subjects all together. Table 1 summarizes the demographics of our subjects across the experiments. Most participants were from the US or Canada (with the remainder being almost exclusively from Asia) and were less than 50 years old. A majority had a Bachelor’s degree. There were somewhat more male participants than female. We note that US and Canadian participants with moderate to high education dominate this survey, and results may be different for people from different cultures and backgrounds. All participants completed the full task (each survey was only 10-12 questions). In the analysis below, however, we exclude participants who did not get all three initial practice questions or all two of the additional practice questions correct. While this may have the effect of artificially increasing the accuracy rates overall—we are only including participants who could already perform the task to a reasonable extent—this criterion helped filter the substantial proportion of participants who 10 Table 2: Number of participants who met our inclusion criteria for each experiment. Explanation Size New Cognitive Chunks Variable Repetition Recipe Domain N=88 N=77 N=70 Clinical Domain N=73 N=73 N=71 (a) Recipe V1 Accuracy (b) Recipe V2 Accuracy (c) Recipe V3 Accuracy (d) Clinical V1 Accuracy (e) Clinical V2 Accuracy (f) Clinical V3 Accuracy Figure 3: Accuracy across the six experiments. Vertical lines indicate standard errors. were simply breezing through the experiment to get their payment. We also excluded one participant in the clinical version of the cognitive chunks experiment who did get sufficient practice questions correct but then took more than ten minutes to answer a single question. Table 2 describes the total number of participants that remained in each experiment out of the original 100 participants. Figures 3 and 4 present the accuracy and response time across all six experiments, respectively. Response time is shown for subjects who correctly answered the questions. Figure 5 shows the trends in the participants’ subjective evaluation—whether they thought the explanation was easy to follow or not. We evaluated the statistical significance of the trends in these figures using a linear regression for the continuous outputs (response time, subjective score) and a logistic regression for binary outputs (accuracy). For each outcome, one regression was performed for each of the experiments V1, V2, and V3. If an experiment had more than one independent variable—e.g. number of lines and terms in output—we performed one regression with both variables. Regressions were performed with the statsmodels library [Seabold and Perktold, 2010] and included an intercept term. Table 3 summarizes these results. 11 Table 3: Significance tests for each factor. Linear and logistic regression weights were computed for continuous and binary outputs respectively (the subjective evaluations were treated as continuous). A single regression was computed for each of V1, V2, and V3. Highlighted p-values are significant at α = 0.05 with a Bonferroni multiple comparisons correction across all tests of all experiments. Accuracy Recipe Factor weight p-value Explanation Length (V1) -0.0116 0.00367 Number of Output Terms (V1) -0.0161 0.0629 Number of Cognitive Chunks (V2) 0.0221 0.0377 Implicit Cognitive Chunks (V2) 0.0147 0.625 Number of Variable Repetitions (V3) -0.017 0.104 Response Time Recipe Factor weight p-value Explanation Length (V1) 3.77 2.24E-34 Number of Output Terms (V1) 1.34 0.0399 Number of Cognitive Chunks (V2) 8.44 7.01E-18 Implicit Cognitive Chunks (V2) -15.3 2.74E-08 Number of Variable Repetitions (V3) 2.4 0.000659 Subjective Evaluation Recipe Factor weight p-value Explanation Length (V1) -0.165 5.86E-16 Number of Output Terms (V1) -0.187 2.12E-05 Number of Cognitive Chunks (V2) -0.208 1.93E-05 Implicit Cognitive Chunks (V2) 0.297 0.0303 Number of Variable Repetitions (V3) -0.179 5.71E-05 12 Clinical weight p-value -0.0171 0.000127 0.00685 0.48 0.0427 0.00044 0.0251 0.464 -0.0225 0.0506 Clinical weight p-value 3.3 5.73E-22 1.68 0.0198 4.6 1.71E-05 -11.8 0.000149 2.13 0.0208 Clinical weight p-value -0.186 1.28E-19 -0.0335 0.444 -0.0208 0.703 0.365 0.018 -0.149 0.000771 (a) Recipe V1 Time (b) Recipe V2 Time (c) Recipe V3 Time (d) Clinical V1 Time (e) Clinical V2 Time (f) Clinical V3 Time Figure 4: Response times across the six experiments. Responses were normalized by subtracting out subject mean to create centered values, and only response times for those subjects who got the question right are included. Vertical lines indicate standard errors. In general, greater complexity results in higher response times and lower satisfaction. Increasing the number of lines, the number of terms within a line, adding new concepts, and repeating variables all increase the complexity of an explanation in various ways. In figure 4, we see that all of these changes increase response time. The effect of adding lines to scan results in the biggest increases in response time, while the effect of increasing the number of variable repetitions is more subtle. Making new concepts explicit also consistently results in increased response time. This effect may have partly been because adding a new concept explicitly adds a line, while adding it implicitly increases the number of terms in a line—and from V1, we see that the effect of the number of lines is larger than the effect of the number of terms. However, overall this effect seems larger than just adding lines (note the scales of the plots). Subjective scores appear to correlate inversely with complexity and response time. Perhaps most unexpected was that participants both took longer and seemed less happy when new cognitive chunks were made explicit rather than implicitly embedded in a line—we might have expected that even if the explanation took longer to process, it would have been in some senses easier to follow through. It would be interesting to unpack this effect in future experiments, especially if participant frustration came from there now being multiple relevant lines, rather than just one. Future experiments could also highlight terms from the input in the explanation, to make it easier for participants to find the lines of potential relevance. 13 (a) Recipe V1 Evaluation (b) Recipe V2 Evaluation (c) Recipe V3 Evaluation (d) Clinical V1 Evaluation (e) Clinical V2 Evaluation (f) Clinical V3 Evaluation Figure 5: Subjective evaluation of explanations in three experiments. Participants were asked to rate each explanation from 1 to 10. Responses were normalized by subtracting out subject mean to create centered values. Different explanation variations had little effect on accuracy. While there were strong, consistent effects from explanation variation on response time and satisfaction, these variations seemed to have much less effect on accuracy. There existed general decreasing trends in accuracy with respect to explanation length and the number of variable repetitions, and potentially some increasing trends with the number of new concepts introduced. However, few were statistically significant. This serves us as an interesting controlled comparison. In other words, we can now observe effects of different factors, holding the accuracy constant. The lack of effect may be because subjects were told to perform the task as quickly as they could without making mistakes, and our filtering also removed subjects prone to making many errors in the practice questions. Thus, the effect of a task being harder would be to increase response time, rather than decrease accuracy. The differences in direction of the trends—some increases in complexity perhaps increasing accuracy, others decreasing it—are consistent with findings that sometimes more complex tasks force humans into slower but more careful thinking, while in other cases increased complexity can lead to higher errors [Kahneman, 2011]. Is it the case that the factors that resulted in the largest increases in response time (new concepts) also force the most concentration? While these experiments cannot differentiate these effects, future work to understand these phenomena may help us identify what kinds of increased complexities in explanation are innocuous or even useful and which push the limits of our processing abilities. 14 Trends are consistent across recipe and clinical domains In all experiments, the general trends in the metrics are consistent across both the recipe and clinical domains. Sometimes an effect is much weaker or unclear, but never is an effect clearly reversed. We believe this bodes well for there being a set of general principles for guiding explanation design, just as there exist design principles for interfaces and human-computer interaction. However, one small pattern can be noted in Figure 5, which shows lower satisfaction for the clinical domain than the recipe domain. This could be due to the fact that people felt more agitated about performing poorly in the medical domain than the clinical domain. 5 Discussion and Conclusion Identifying how different factors affect a human’s ability to utilize explanation is an essential piece for creating interpretable machine learning systems—we need to know what to optimize. What factors have the largest effect, and what kind of effect? What factors have relatively little effect? Such knowledge can help us expand to faithfulness of the explanation to what it is describing with minimal sacrifices in human ability to process the explanation. In this work, we investigated how the ability of humans to perform a simple task—verifying whether an output is consistent with an explanation and input—varies as a function of explanation size, new types of cognitive chunks and repeated terms in the explanation. We tested across two domains, carefully controlling for everything but the domain. We summarized some intuitive and some counter intuitive discoveries—as any increase in explanation complexity increases response time and decreases subjective satisfaction with the explanation—some patterns were not so obvious. We had not expected that embedding a new concept would have been faster to process and more appealing than creating a new definition. We also found that new concepts and the number of lines increase response time more than variable repetition or longer lines. It would be interesting to verify the magnitude of these sensitivities on other tasks, such as forward simulation or counterfactual reasoning, to start building a more complete picture of what we should be optimizing our explanations for. More broadly, there are many interesting directions regarding what kinds of explanation are best in what contexts. Are there universals that make for interpretable procedures, whether they be cast as decision sets, decision trees, or more general pseudocode; whether the task is verification, forward simulation, or counterfactual reasoning? Do these universals also carry over to regression settings? Or does each scenario have its own set of requirements? When the dimensionality of an input gets very large, do trade-offs for defining intermediate new concepts change? A better understanding of these questions is critical to design systems that can provide rationale to human users. Acknowledgements The authors acknowledge PAIR at Google and the Harvard Berkman Klein Center for their support. 15 References Philip Adler, Casey Falk, Sorelle A Friedler, Gabriel Rybeck, Carlos Scheidegger, Brandon Smith, and Suresh Venkatasubramanian. Auditing black-box models for indirect influence. In Data Mining (ICDM), 2016 IEEE 16th International Conference on, pages 1–10. IEEE, 2016. Hiva Allahyari and Niklas Lavesson. User-oriented assessment of classification model understandability. In 11th scandinavian conference on Artificial intelligence. IOS Press, 2011. Mustafa Bilgic and Raymond J Mooney. Explaining recommendations: Satisfaction vs. promotion. In Beyond Personalization Workshop, IUI, volume 5, page 153, 2005. Leo Breiman, Jerome Friedman, Charles J Stone, and Richard A Olshen. Classification and regression trees. CRC press, 1984. Cristian Bucilu, Rich Caruana, and Alexandru Niculescu-Mizil. Model compression. In Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining, pages 535–541. ACM, 2006. Adrian Bussone, Simone Stumpf, and Dympna O’Sullivan. The role of explanations on trust and reliance in clinical decision support systems. In Healthcare Informatics (ICHI), 2015 International Conference on, pages 160–169. IEEE, 2015. Kevin Canini, Andy Cotter, MR Gupta, M Milani Fard, and Jan Pfeifer. Fast and flexible monotonic functions with ensembles of lattices. Advances in Neural Information Processing Systems (NIPS), 2016. Rich Caruana, Yin Lou, Johannes Gehrke, Paul Koch, Marc Sturm, and Noemie Elhadad. Intelligible models for healthcare: Predicting pneumonia risk and hospital 30-day readmission. In Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pages 1721–1730. ACM, 2015. Girish Chandrashekar and Ferat Sahin. A survey on feature selection methods. Computers & Electrical Engineering, 40(1):16–28, 2014. Xi Chen, Yan Duan, Rein Houthooft, John Schulman, Ilya Sutskever, and Pieter Abbeel. Infogan: Interpretable representation learning by information maximizing generative adversarial nets, 2016. Peter Clark and Robin Boswell. Rule induction with cn2: Some recent improvements. In European Working Session on Learning, pages 151–163. Springer, 1991. William W Cohen. Fast effective rule induction. In Proceedings of the twelfth international conference on machine learning, pages 115–123, 1995. 16 Dan Cosley, Shyong K Lam, Istvan Albert, Joseph A Konstan, and John Riedl. Is seeing believing?: how recommender system interfaces affect users’ opinions. In Proceedings of the SIGCHI conference on Human factors in computing systems, pages 585–592. ACM, 2003. Finale Doshi-Velez and Been Kim. A roadmap for a rigorous science of interpretability. arXiv preprint arXiv:1702.08608, 2017. Finale Doshi-Velez, Byron Wallace, and Ryan Adams. Graph-sparse lda: a topic model with structured sparsity. Association for the Advancement of Artificial Intelligence, 2015. Tapio Elomaa. In defense of c4. 5: Notes on learning one-level decision trees. ML-94, 254:62, 2017. Eibe Frank and Ian H Witten. Generating accurate rule sets without global optimization. 1998. Alex A Freitas. Comprehensible classification models: a position paper. ACM SIGKDD explorations newsletter, 15(1):1–10, 2014. Brendan J Frey and Delbert Dueck. Clustering by passing messages between data points. science, 315(5814):972–976, 2007. Boris Hayete and Jadwiga R Bienkowska. Gotrees: Predicting go associations from proteins. Biocomputing 2005, page 127, 2004. Bernease Herman. The promise and peril of human evaluation for model interpretability. arXiv preprint arXiv:1711.07414, 2017. Jan Horsky, Gordon D Schiff, Douglas Johnston, Lauren Mercincavage, Douglas Bell, and Blackford Middleton. Interface design principles for usable decision support: a targeted review of best practices for clinical prescribing interventions. Journal of biomedical informatics, 45(6):1202– 1216, 2012. Michael C Hughes, Huseyin Melih Elibol, Thomas McCoy, Roy Perlis, and Finale Doshi-Velez. Supervised topic models for clinical interpretability. arXiv preprint arXiv:1612.01678, 2016. J. Huysmans, K. Dejaeger, C. Mues, J. Vanthienen, and B. Baesens. An empirical evaluation of the comprehensibility of decision table, tree and rule based predictive models. DSS, 2011. Jongbin Jung, Connor Concannon, Ravi Shroff, Sharad Goel, and Daniel G Goldstein. Simple rules for complex decisions. 2017. Daniel Kahneman. Thinking, fast and slow. Macmillan, 2011. Frank Keil. Explanation and understanding. Annu. Rev. Psychol., 2006. B. Kim, C. Rudin, and J.A. Shah. The Bayesian Case Model: A generative approach for case-based reasoning and prototype classification. In NIPS, 2014. 17 Been Kim, Elena Glassman, Brittney Johnson, and Julie Shah. iBCM: Interactive bayesian case model empowering humans via intuitive interaction. 2015a. Been Kim, Julie Shah, and Finale Doshi-Velez. Mind the gap: A generative approach to interpretable feature selection and extraction. In Advances in Neural Information Processing Systems, 2015b. Pieter-Jan Kindermans, Kristof T Schütt, Maximilian Alber, Klaus-Robert Müller, and Sven Dähne. Patternnet and patternlrp–improving the interpretability of neural networks. arXiv preprint arXiv:1705.05598, 2017. Viktoriya Krakovna and Finale Doshi-Velez. Increasing the interpretability of recurrent neural networks using hidden markov models. arXiv preprint arXiv:1606.05320, 2016. Todd Kulesza, Simone Stumpf, Margaret Burnett, Sherry Yang, Irwin Kwan, and Weng-Keen Wong. Too much, too little, or just right? ways explanations impact end users’ mental models. In Visual Languages and Human-Centric Computing (VL/HCC), 2013 IEEE Symposium on, pages 3–10. IEEE, 2013. Himabindu Lakkaraju, Stephen H Bach, and Jure Leskovec. Interpretable decision sets: A joint framework for description and prediction. In Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pages 1675–1684. ACM, 2016. Tao Lei, Regina Barzilay, and Tommi Jaakkola. Rationalizing neural predictions. arXiv preprint arXiv:1606.04155, 2016. Benjamin Letham, Cynthia Rudin, Tyler H McCormick, David Madigan, et al. Interpretable classifiers using rules and bayesian analysis: Building a better stroke prediction model. The Annals of Applied Statistics, 9(3):1350–1371, 2015. Weiwei Liu and Ivor W Tsang. Sparse perceptron decision tree for millions of dimensions. In AAAI, pages 1881–1887, 2016. Tania Lombrozo. The structure and function of explanations. Trends in cognitive sciences, 10(10): 464–470, 2006. Tania Lombrozo. Simplicity and probability in causal explanation. Cognitive psychology, 55(3): 232–257, 2007. Tahir Mehmood, Kristian Hovde Liland, Lars Snipen, and Solve Sæbø. A review of variable selection methods in partial least squares regression. Chemometrics and Intelligent Laboratory Systems, 118:62–69, 2012. Abhinav Mehrotra, Robert Hendley, and Mirco Musolesi. Interpretable machine learning for mobile notification management: An overview of prefminer. GetMobile: Mobile Computing and Communications, 21(2):35–38, 2017. 18 Donald Michie. Machine learning in the next five years. In Proceedings of the 3rd European Conference on European Working Session on Learning, pages 107–122. Pitman Publishing, 1988. George A Miller. The magical number seven, plus or minus two: some limits on our capacity for processing information. Psychological review, 63(2):81, 1956. Stephen H Muggleton, Dianhuan Lin, and Alireza Tamaddoni-Nezhad. Meta-interpretive learning of higher-order dyadic datalog: Predicate invention revisited. Machine Learning, 100(1):49–73, 2015. Forough Poursabzi-Sangdeh, Daniel G. Goldstein, Jake M. Hofman, Jennifer Wortman Vaughan, and Hanna Wallach. Manipulating and measuring model interpretability. In NIPS Workshop on Transparent and Interpretable Machine Learning in Safety Critical Environments, 2017. Paul Raccuglia, Katherine C Elbert, Philip DF Adler, Casey Falk, Malia B Wenny, Aurelio Mollo, Matthias Zeller, Sorelle A Friedler, Joshua Schrier, and Alexander J Norquist. Machine-learningassisted materials discovery using failed experiments. Nature, 533(7601):73–76, 2016. Marco Tulio Ribeiro, Sameer Singh, and Carlos Guestrin. Why should i trust you?: Explaining the predictions of any classifier. In Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pages 1135–1144. ACM, 2016. Ronald L Rivest. Learning decision lists. Machine learning, 2(3):229–246, 1987. Andrew Ross, Michael C Hughes, and Finale Doshi-Velez. Right for the right reasons: Training differentiable models by constraining their explanations. In International Joint Conference on Artificial Intelligence, 2017. Stefan Rüping. Thesis: Learning interpretable models. PhD thesis, Universitat Dortmund, 2006. S Rasoul Safavian and David Landgrebe. A survey of decision tree classifier methodology. IEEE transactions on systems, man, and cybernetics, 21(3):660–674, 1991. Ute Schmid, Christina Zeller, Tarek Besold, Alireza Tamaddoni-Nezhad, and Stephen Muggleton. How does predicate invention affect human comprehensibility? In International Conference on Inductive Logic Programming, pages 52–67. Springer, 2016. Skipper Seabold and Josef Perktold. Statsmodels: Econometric and statistical modeling with python. In Proceedings of the 9th Python in Science Conference, volume 57, page 61, 2010. Ramprasaath R Selvaraju, Abhishek Das, Ramakrishna Vedantam, Michael Cogswell, Devi Parikh, and Dhruv Batra. Grad-cam: Why did you say that? visual explanations from deep networks via gradient-based localization. arXiv preprint arXiv:1610.02391, 2016. Avanti Shrikumar, Peyton Greenside, Anna Shcherbina, and Anshul Kundaje. Not just a black box: Interpretable deep learning by propagating activation differences. ICML, 2016. 19 Sameer Singh, Marco Tulio Ribeiro, and Carlos Guestrin. Programs as black-box explanations. arXiv preprint arXiv:1611.07579, 2016. Daniel Smilkov, Nikhil Thorat, Been Kim, Fernanda Viégas, and Martin Wattenberg. Smoothgrad: removing noise by adding noise. arXiv preprint arXiv:1706.03825, 2017. Girish H Subramanian, John Nosek, Sankaran P Raghunathan, and Santosh S Kanitkar. A comparison of the decision table and tree. Communications of the ACM, 35(1):89–94, 1992. Nava Tintarev and Judith Masthoff. Explaining recommendations: Design and evaluation. In Recommender Systems Handbook, pages 353–382. Springer, 2015. Berk Ustun and Cynthia Rudin. Supersparse linear integer models for optimized medical scoring systems. Machine Learning, 102(3):349–391, 2016. Fulton Wang and Cynthia Rudin. Falling rule lists. In Artificial Intelligence and Statistics, pages 1013–1022, 2015. Tong Wang, Cynthia Rudin, Finale Doshi, Yimin Liu, Erica Klampfl, and Perry MacNeille. Bayesian ors of ands for interpretable classification with application to context aware recommender systems. In ICDM, 2016. Tong Wang, Cynthia Rudin, Finale Doshi-Velez, Yimin Liu, Erica Klampfl, and Perry MacNeille. Bayesian rule sets for interpretable classification. In International Conference on Data Mining, 2017. Martin Wattenberg, Fernanda Viégas, and Moritz Hardt. Attacking discrimination with smarter machine learning. Google Research, 17, 2016. Description of Pilot Studies We conducted several pilot studies in the design of these experiments. Our pilot studies showed that asking subjects to respond quickly or within a time limit resulted in much lower accuracies; subjects would prefer to answer as time was running out rather than risk not answering the question. That said, there are clearly avenues of adjusting the way in which subjects are coached to place them in fast or careful thinking modes, to better identify which explanations are best in each case. The experiment interface design also played an important role. We experimented with different placements of various blocks, the coloring of the text, whether the explanation was presented as rules or as narrative paragraphs, and also, within rules, whether the input was placed before or after the conclusion (that is, ‘if A: B” vs. “B if A”). All these affected response time and accuracy, and we picked the configuration that had the highest accuracy and user satisfaction. Finally, in these initial trials, we also varied more factors: number of lines, input conjunctions, input disjunctions, output conjunctions, output disjunctions and global variables. Upon running 20 preliminary regressions, we found that there was no significant difference in effect between disjunctions and conjunctions, though the number of lines, global variables, and general length of output clause—regardless of whether that length came from conjunctions or disjunctions—did have an effect on the response time. Thus, we chose to run our experiments based on these factors. 21
2cs.AI
Neural Question Answering at BioASQ 5B Georg Wiese1,2 , Dirk Weissenborn2 and Mariana Neves1 1 Hasso Plattner Institute, August Bebel Strasse 88, Potsdam 14482 Germany 2 Language Technology Lab, DFKI, Alt-Moabit 91c, Berlin, Germany [email protected], [email protected], [email protected] arXiv:1706.08568v1 [cs.CL] 26 Jun 2017 Abstract This paper describes our submission to the 2017 BioASQ challenge. We participated in Task B, Phase B which is concerned with biomedical question answering (QA). We focus on factoid and list question, using an extractive QA model, that is, we restrict our system to output substrings of the provided text snippets. At the core of our system, we use FastQA, a state-ofthe-art neural QA system. We extended it with biomedical word embeddings and changed its answer layer to be able to answer list questions in addition to factoid questions. We pre-trained the model on a large-scale open-domain QA dataset, SQuAD, and then fine-tuned the parameters on the BioASQ training set. With our approach, we achieve state-of-the-art results on factoid questions and competitive results on list questions. 1 Introduction BioASQ is a semantic indexing, question answering (QA) and information extraction challenge (Tsatsaronis et al., 2015). We participated in Task B of the challenge which is concerned with biomedical QA. More specifically, our system participated in Task B, Phase B: Given a question and gold-standard snippets (i.e., pieces of text that contain the answer(s) to the question), the system is asked to return a list of answer candidates. The fifth BioASQ challenge is taking place at the time of writing. Five batches of 100 questions each were released every two weeks. Participating systems have 24 hours to submit their results. At the time of writing, all batches had been released. The questions are categorized into different question types: factoid, list, summary and yes/no. Our work concentrates on answering factoid and list questions. For factoid questions, the system’s responses are interpreted as a ranked list of answer candidates. They are evaluated using meanreciprocal rank (MRR). For list questions, the system’s responses are interpreted as a set of answers to the list question. Precision and recall are computed by comparing the given answers to the goldstandard answers. F1 score, i.e., the harmonic mean of precision and recall, is used as the official evaluation measure 1 . Most existing biomedical QA systems employ a traditional QA pipeline, similar in structure to the baseline system by Weissenborn et al. (2013). They consist of several discrete steps, e.g., namedentity recognition, question classification, and candidate answer scoring. These systems require a large amount of resources and feature engineering that is specific to the biomedical domain. For example, OAQA (Zi et al., 2016), which has been very successful in last year’s challenge, uses a biomedical parser, entity tagger and a thesaurus to retrieve synonyms. Our system, on the other hand, is based on a neural network QA architecture that is trained endto-end on the target task. We build upon FastQA (Weissenborn et al., 2017), an extractive factoid QA system which achieves state-of-the-art results on QA benchmarks that provide large amounts of training data. For example, SQuAD (Rajpurkar et al., 2016) provides a dataset of ≈ 100, 000 questions on Wikipedia articles. Our approach is to train FastQA (with some extensions) on the SQuAD dataset and then fine-tune the model parameters on the BioASQ training set. Note that by using an extractive QA network as our central component, we restrict our system’s 1 The details of the evaluation can be found at http://participants-area.bioasq.org/ Tasks/b/eval_meas/ Start Probabilities pstart sigmoid softmax EndScores Scoresee(s)(s) End End Scores yend Start Scores ystart Extractive QA System Biomedical Embeddings ... ... GloVe Embeddings Character Embeddings Question Type Features Context Embeddings Question Embeddings Figure 1: Neural architecture of our system. Question and context (i.e., the snippets) are mapped directly to start and end probabilities for each context token. We use FastQA (Weissenborn et al., 2017) with modified input vectors and an output layer that supports list answers in addition to factoid answers. responses to substrings in the provided snippets. This also implies that the network will not be able to answer yes/no questions. We do, however, generalize the FastQA output layer in order to be able to answer list questions in addition to factoid questions. 2 2014) which have been trained on a large collection of web documents. End Probabilitiesp(e|s) p(e|s) End End Probabilities Probabilities pend • Character embedding: This embedding is computed by a 1-dimensional convolutional neural network from the characters of the words, as introduced by Seo et al. (2016). • Biomedical Word2Vec embeddings: We use the biomedical word embeddings provided by Pavlopoulos et al. (2014). These are 200-dimensional Word2Vec embeddings (Mikolov et al., 2013) which were trained on ≈ 10 million PubMed abstracts. To the embedding vectors, we concatenate a one-hot encoding of the question type (list or factoid). Note that these features are identical for all tokens. Following our embedding layer, we invoke FastQA in order to compute start and end scores for all context tokens. Because end scores are conditioned on the chosen start, there are O(n2 ) end scores where n is the number of context tokens. We denote the start index by i ∈ [1, n], the end i index by j ∈ [i, n], the start scores by ystart , and i,j end scores by yend . In our output layer, the start, end, and span probabilities are computed as: Model Our system is a neural network which takes as input a question and a context (i.e., the snippets) and outputs start and end pointers to tokens in the context. At its core, we use FastQA (Weissenborn et al., 2017), a state-of-the-art neural QA system. In the following, we describe our changes to the architecture and how the network is trained. 2.1 Network architecture In the input layer, the context and question tokens are mapped to high-dimensional word vectors. Our word vectors consists of three components, which are concatenated to form a single vector: • GloVe embedding: We use 300-dimensional GloVe embeddings 2 (Pennington et al., 2 We use the 840B embeddings available here: https: //nlp.stanford.edu/projects/glove/ i pistart = σ(ystart ) (1) i,· pi,· end = sof tmax(yend ) (2) i,j i pi,j span = pstart · pend (3) where σ denotes the sigmoid function. By computing the start probability via the sigmoid rather than softmax function (as used in FastQA), we enable the model to output multiple spans as likely answer spans. This generalizes the factoid QA network to list questions. 2.2 Training & decoding Loss We define our loss as the cross-entropy of the correct start and end indices. In the case of multiple occurrences of the same answer, we only minimize the span of the lowest loss. Factoid MRR Ensemble Batch Single 1 2 3 4 5 Average 52.0% (2/10) 38.3% (3/15) 43.1% (1/16) 30.0% (3/20) 39.2% (3/17) 40.5% Single 57.1% (1/10) 42.6% (2/15) 42.1% (2/16) 36.1% (1/20) 35.1% (4/17) 42.6% List F1 Ensemble 33.6% (1/11) 29.0% (8/15) 41.5% (2/17) 24.2% (5/20) 36.1% (4/20) 32.9% 33.5%(2/11) 26.2%(9/15) 49.5%(1/17) 29.3%(4/20) 39.1%(2/20) 35.1% Table 1: Preliminary results for factoid and list questions for all five batches and for our single and ensemble systems. We report MRR and F1 scores for factoid and list questions, respectively. In parentheses, we report the rank of the respective systems relative to all other systems in the challenge. The last row averages the performance numbers of the respective system and question type across the five batches. Optimization We train the network in two steps: First, the network is trained on SQuAD, following the procedure by Weissenborn et al. (2017) (pretraining phase). Second, we fine-tune the network parameters on BioASQ (fine-tuning phase). For both phases, we use the Adam optimizer (Kingma and Ba, 2014) with an exponentially decaying learning rate. We start with learning rates of 10−3 and 10−4 for the pre-training and fine-tuning phases, respectively. Ensemble In order to further tweak the performance of our systems, we built a model ensemble. For this, we trained five single models using 5-fold cross-validation on the entire training set. These models are combined by averaging their start and end scores before computing the span probabilities (Equations 1-3). As a result, we submit two systems to the challenge: The best single model (according to its development set) and the model ensemble. BioASQ dataset preparation During finetuning, we extract answer spans from the BioASQ training data by looking for occurrences of the gold standard answer in the provided snippets. Note that this approach is not perfect as it can produce false positives (e.g., the answer is mentioned in a sentence which does not answer the question) and false negatives (e.g., a sentence answers the question, but the exact string used is not in the synonym list). Because BioASQ usually contains multiple snippets for a given question, we process all snippets independently and then aggregate the answer spans, sorting globally according to their probability pi,j span . Implementation We implemented our system using TensorFlow (Abadi et al., 2016). It was trained on an NVidia GForce Titan X GPU. Decoding During the inference phase, we retrieve the top 20 answers span via beam search with beam size 20. From this sorted list of answer strings, we remove all duplicate strings. For factoid questions, we output the top five answer strings as our ranked list of answer candidates. For list questions, we use a probability cutoff threshold t, such that {(i, j)|pi,j span ≥ t} is the set of answers. We set t to be the threshold for which the list F1 score on the development set is optimized. 3 Results & discussion We report the results for all five test batches of BioASQ 5 (Task 5b, Phase B) in Table 1. Note that the performance numbers are not final, as the provided synonyms in the gold-standard answers will be updated as a manual step, in order to reflect valid responses by the participating systems. This has not been done by the time of writing3 . Note also that – in contrast to previous BioASQ challenges – systems are no longer allowed to provide an own list of synonyms in this year’s challenge. In general, the single and ensemble system are performing very similar relative to the rest of field: Their ranks are almost always right next to each other. Between the two, the ensemble model performed slightly better on average. On factoid questions, our system has been very successful, winning three out of five batches. On 3 The final results will be published at http: //participants-area.bioasq.org/results/ 5b/phaseB/ list questions, however, the relative performance varies significantly. We expect our system to perform better on factoid questions than list questions, because our pre-training dataset (SQuAD) does not contain any list questions. Starting with batch 3, we also submitted responses to yes/no questions by always answering yes. Because of a very skewed class distribution in the BioASQ dataset, this is a strong baseline. Because this is done merely to have baseline performance for this question type and because of the naivety of the method, we do not list or discuss the results here. Minjoon Seo, Aniruddha Kembhavi, Ali Farhadi, and Hannaneh Hajishirzi. 2016. Bidirectional attention flow for machine comprehension. arXiv preprint arXiv:1611.01603 . 4 Dirk Weissenborn, Georg Wiese, and Laura Seiffe. 2017. Making neural qa as simple as possible but not simpler. arXiv preprint arXiv:1703.04816 . Conclusion In this paper, we summarized the system design of our BioASQ 5B submission for factoid and list questions. We use a neural architecture which is trained end-to-end on the QA task. This approach has not been applied to BioASQ questions in previous challenges. Our results show that our approach achieves state-of-the art results on factoid questions and competitive results on list questions. References Martı́n Abadi, Ashish Agarwal, Paul Barham, Eugene Brevdo, Zhifeng Chen, Craig Citro, Greg S Corrado, Andy Davis, Jeffrey Dean, Matthieu Devin, et al. 2016. Tensorflow: Large-scale machine learning on heterogeneous distributed systems. arXiv preprint arXiv:1603.04467 . Diederik Kingma and Jimmy Ba. 2014. Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980 . Tomas Mikolov, Ilya Sutskever, Kai Chen, Greg S Corrado, and Jeff Dean. 2013. Distributed representations of words and phrases and their compositionality. In Advances in neural information processing systems. pages 3111–3119. Ioannis Pavlopoulos, Aris Kosmopoulos, and Ion Androutsopoulos. 2014. Continuous space word vectors obtained by applying word2vec to abstracts of biomedical articles http://bioasq.lip6.fr/info/BioASQword2vec/. Jeffrey Pennington, Richard Socher, and Christopher D. Manning. 2014. Glove: Global vectors for word representation. In Empirical Methods in Natural Language Processing (EMNLP). pages 1532– 1543. http://www.aclweb.org/anthology/D14-1162. Pranav Rajpurkar, Jian Zhang, Konstantin Lopyrev, and Percy Liang. 2016. Squad: 100,000+ questions for machine comprehension of text. arXiv preprint arXiv:1606.05250 . George Tsatsaronis, Georgios Balikas, Prodromos Malakasiotis, Ioannis Partalas, Matthias Zschunke, Michael R Alvers, Dirk Weissenborn, Anastasia Krithara, Sergios Petridis, Dimitris Polychronopoulos, et al. 2015. An overview of the bioasq largescale biomedical semantic indexing and question answering competition. BMC bioinformatics 16(1):1. Dirk Weissenborn, George Tsatsaronis, and Michael Schroeder. 2013. Answering factoid questions in the biomedical domain. BioASQ@ CLEF 1094. Yang Zi, Zhou Yue, and Eric Nyberg. 2016. Learning to answer biomedical questions: Oaqa at bioasq 4b. ACL 2016 page 23.
9cs.NE
Technische Universität Berlin arXiv:1611.02072v1 [cs.SY] 7 Nov 2016 Institut für Mathematik Data-driven Structured Realization Philipp Schulze Christopher Beattie Benjamin Unger Serkan Gugercin Preprint 23-2016 Preprint-Reihe des Instituts für Mathematik Technische Universität Berlin http://www.math.tu-berlin.de/preprints Preprint 23-2016 November 2016 Data-driven Structured Realization P. Schulze∗1 , B. Unger†1 , C. Beattie‡2 , and S. Gugercin§2 1 2 Institut für Mathematik, TU Berlin, Germany, {pschulze,unger}@math.tu-berlin.de. Department of Mathematics, Virginia Tech, Blacksburg, VA, {beattie,gugercin}@vt.edu. November 8, 2016 Abstract We present a framework for constructing structured P realizations of linear dye K hk (s)A ek )−1 B e where namical systems having transfer functions of the form C( k=1 h1 , h2 , ..., hK are prescribed functions that specify the surmised structure of the model. Our construction is data-driven in the sense that an interpolant is derived entirely from measurements of a transfer function. Our approach extends the Loewner realization framework to more general system structure that includes second-order (and higher) systems as well as systems with internal delays. Numerical examples demonstrate the advantages of this approach. Keywords: structured realization, data-driven model reduction, interpolation, delay system, second-order system AMS(MOS) subject classification: 93B15, 30E05, 93C05 1 Introduction The simulation of complex physical, chemical, or biological processes is a standard task in science, engineering, and industry. The dynamics of such processes are commonly modeled as dynamical systems, which then can be analyzed (often through simulation) for optimization and control. The demand for higher fidelity models produces as a common consequence ever more complex and larger dynamical systems, whose simulation may require computational resources that become unmanageably large. This computational cost is often directly related to the state space dimension of the underlying dynamical system, thus creating a need for low-dimensional approximations of large-scale models. Model order reduction (MOR) techniques using rational interpolation methods, such as the iterative rational Krylov algorithm (IRKA) [20], or Gramian-based methods, such as balanced truncation [30, 31], have become popular tools to create such reduced-order models (ROMs); for an overview of these approaches, see the survey papers [2, 5, 6] and the monograph [1]. There are many features that distinguish model reduction methods from ∗ The author was supported by the DFG Collaborative Research Center 1029 Substantial efficiency increase in gas turbines through direct use of coupled unsteady combustion and flow dynamics, project A02. † The author was supported by the DFG Collaborative Research Center 910 Control of self-organizing nonlinear systems: Theoretical methods and concepts of application, project A2. ‡ The work of this author was supported in part by the Einstein Foundation Berlin. § The work of this author was supported in part by the Alexander von Humboldt Foundation. 1 one another; we focus on the dichotomy between projection-based methods and data-driven methods. Projection-based methods presuppose access to an explicit state space realization of the original dynamical system and then identify low-dimensional, high-value subspaces of the state space, using projections to constrain dynamics to these subspaces. Data-driven model reduction methods as exemplified by vector fitting [15, 21] or the Loewner realization framework of [27] are nonintrusive in the sense that the access to internal dynamics that an explicit state space realization provides is not necessary. Such methods are able to produce system realizations (generally low-dimensional) directly from measurements of the transfer function. The greater flexibility that data-driven methods provide is balanced against the general inability of data-driven methods to preserve structural features that may be present in the original model, a capability that often is available to projection-based methods. In some practical settings, the original (or approximate) model may be available only implicitly either through response observation or simulation, leading one to data-driven approaches as the only feasible strategy for MOR. Despite the inaccessibility of a description of detailed internal dynamics, there may yet be significant ancillary information or at least a good basic understanding of how the system should behave, allowing one to surmise general structural features of the underlying dynamical system. For example, vibration effects are naturally associated with subsystems that have second-order structure; internal transport or signal propagation will naturally be associated with state delays. Example 1.1. Consider acoustic transmission in a fluid-filled duct of length L that has an acoustic driver positioned at one end. Suppose we are interested in the acoustic pressure y(t) = p(ξ0 , t) at a fixed point ξ0 ∈ (0, L) in the duct, which we view as the output of an abstract system that is driven by the input fluid velocity u(t), determined by an acoustic driver positioned at ξ = 0. We assume that the output pressure depends linearly on the input velocity in a way that is invariant to translation in time, and so the output could be anticipated to involve some superposition of internal states that are lagged in time according to propagation delays related to the distance traveled by the signal. Assuming a uniform sound speed c throughout the duct, we allow for a direct propagation delay τ1 = ξ0 /c between the input and output location and a second propagation delay τ2 = (2L − ξ0 )/c, associated with a reflected signal. A semi-empirical model for the state evolution of a system that has these basic features could have the form A1 x(t) + A2 x(t − τ1 ) + A3 x(t − τ2 ) = bu(t), with an output port map given by y(t) = cT x(t). The matrices A1 , A2 , and A3 , the port maps associated with the vectors, b and c, as well as their dimensions are unknown. We arrive at a (semi-empirical) transfer function for this system having the hypothesized structure −1 H(s) = cT A1 + A2 e−τ1 s + A3 e−τ2 s b. Based on observed or computed system response data, we wish to identify A1 , A2 , A3 , b and c. We present here a general data-driven model reduction framework that is capable of preserving system structure present in an original model when it is known, and possibly inducing hypothesized structure in other cases. We lay out our basic problem framework in the following Section 2 and then show how to exploit this in developing structured realizations in Section 3. Computational examples are offered in Section 4. 2 2 Problem Setting Although the term system structure can have wide ranging meanings, for our purposes we will understand the term to refer to equivalence classes of systems having realizations associated with a linearly independent function family {h1 , h2 , . . . , hK } that appear as H(s) = C K X !−1 hk (s)Ak B, (2.1) k=1 where C ∈ Rp×N , Ak ∈ RN ×N for k = 1, . . . , K, B ∈ RN ×m . We assume in all that follows that the functions involved, hk : C → C, are meromorphic. For any given PK function family, we will refer to associated matrix-valued functions having the form k=1 hk (s)Ak as an affine structure. By standard abuse of notation, we use H(s) to denote either the system itself or the transfer function of the system evaluated at the point s ∈ C. The two systems e e H(s) and H(s) are called structurally equivalent if H(s), H(s) ∈ Cp×m for s ∈ C and if they each have the form H(s) = C K X !−1 hk (s)Ak B and e e H(s) =C k=1 K X !−1 ek h̃k (s)A e B, k=1 with span{h1 , h2 , . . . , hK } ≡ span{h̃1 , h̃2 , . . . , h̃K }. In particular, we allow different state e ∈ Rp×n , A ek ∈ Rn×n , and B e ∈ Rn×m the integers N and n space dimensions, i. e., for C need not be the same. Given an original (full order) system associated with H(s), we aim e to construct a structurally equivalent system H(s), with state space dimension n  N , and we wish to accomplish this allowing only evaluations of H(s). The general structure of (2.1) encompasses a variety of system formulations. Indeed, we may observe immediately that linear time invariant dynamical systems often are presented as standard first-order realizations A1 ẋ(t) + A2 x(t) = Bu(t), y(t) = Cx(t), (2.2) where A1 , A2 ∈ RN ×N , B ∈ RN ×m , and C ∈ Rp×N . The state is denoted by x(t) ∈ RN , while u(t) ∈ Rm and y(t) ∈ Rp are, respectively, the inputs and outputs of the system. If the input u : [0, T ] → Rm is exponentially bounded, i. e., ku(t)k ∈ O(eγt ) for some γ ∈ R, then x : [0, T ] → Rn and y : [0, T ] → Rp are also exponentially bounded. The Laplace transform may be applied to (2.2) and rearranged to ŷ(s) = H(s)û(s) with H(s) = C(sA1 − A2 )−1 B, which has the form of (2.1) with h1 (s) = s and h2 (s) ≡ −1. In many practical applications, the underlying dynamical system comes in a form quite different from (2.2) that will reflect the nature of the system, and we may wish to preserve this structure in the realization. For example, a general RLC network may be modeled as integro differential-algebraic equation [18], given by Z t A1 ẋ(t) + A2 x(t) + A3 x(τ )dτ = Bu(t), y(t) = B T x(t). (2.3) 0 The transfer function associated with (2.3) is given by H(s) = B T  1 sA1 + A2 + A3 s 3 −1 B Table 2.1: Different system structures (all with output mapping y(t) = Cx(t)) state space description second-order state delay neutral delay viscoelastic A1 ẍ(t) + A2 ẋ(t) + A3 x(t) = Bu(t) A1 ẋ(t) + A2 x(t) + A3 x(t − τ ) = Bu(t) A1 ẋ(t) + A2 x + A3 ẋ(t − τ ) = Bu(t) Rt A1 ẍ(t) + 0 h(t−τ )A2 ẋ(τ )dτ + A3 x(t) = Bu(t) transfer function −1 B C s2 A1 + sA2 + A3 −1 −τ s B C sA1 + A2 + e A3  −1 B C sA1 + A2 + se−τ s A3  −1 B C s2 A1 + sĥ(s)A2 + A3 and we expect better approximation properties of the ROM by preserving this form. Further examples for system structures are listed in Table 2.1. Preserving structure often allows one to derive reduced models with smaller state space dimension n, while maintaining comparable or at times even better accuracy than what unstructured reduced models produce, see Section 5 in [7]. Additionally, since the internal structure of models often reflects core phenomenological properties, structured models may behave in ways that remain qualitatively consistent with the phenomena that are being modeled – possibly more so than unstructured models having higher objective fidelity. Structure-preserving model reduction has for the most part developed in a projection-based context that presupposes access to internal dynamics. Projection-based techniques are often able to retain special structural features in the reduced models that may reflect underlying physical properties of the systems under study [7, 11, 12, 18, 25, 28, 33]. Datadriven techniques for system identification and model reduction do not generally have this capacity, however, the recent contributions of [17, 32] provide a notable exception for time-delay systems. In the present work, we build on the results of [32] and extend its domain of applicability to a wide range of structured dynamical systems. These ideas originate in the Loewner realization framework of [27]. The Loewner realization framework is an effective and broadly applicable approach for constructing rational approximants directly from interpolation data; it has been extended to parametric systems [3, 23] and to realization independent methods for optimal H2 approximation [8]. However, the Loewner framework is only capable of producing rational approximants and, so in particular, it cannot capture the transcendental character of transfer functions for dynamical systems containing distributed parameter subsystems that model convection or transport (cf. [14]). We begin by describing in detail the type of system response data that we will assume henceforth to be available. Suppose we have 2n points in the complex plane, which may be interpreted as complex driving frequencies, {µ1 , . . . , µn } and {σ1 , . . . , σn }. We assume for the time being that these two sets, {µi }ni=1 and {σi }ni=1 , are each made up of n distinct points, although we allow the two point sets to have nontrivial intersection (so that it could happen that µi = σj for some index pairs (i, j)). In addition to these complex frequencies, we have the so-called left tangential direction vectors {`1 , . . . , `n } and the right tangential direction vectors {r 1 , . . . , r n } where `i ∈ Rp and r i ∈ Rm for i = 1, . . . , n. In the single-input/single-output (SISO) case, these tangential directions are assigned the value one, i. e., `i = r i = 1. Unlike projection-based model reduction, which requires access to the state space quantities, data-driven interpolatory model reduction only assumes access to the action of the transfer function evaluated at the driving frequencies along the 4 tangential directions, i. e., `Ti H(µi ) = f Ti and H(σi )r i = g i for i = 1, . . . , n. (2.4) If the direction vectors `i and `j are linearly independent, one can allow µi to coincide with µj , and similarly for σi ’s. However, for simplicity the only coincidence of interpolation points that we admit will be between left and right interpolation points, i. e., µi = σj . If this is the case for an index pair (i, j), then bitangential derivative data is assumed to be available. Since we assume that each of the two sets {µi }ni=1 and {σi }ni=1 consists of n distinct points, if µi = σj for an index pair (i, j), without loss of generality, we assume i = j. Then, the corresponding bitangential derivative data is defined as `Ti H 0 (µi )r i = θi . Following [2, 27], we summarize the interpolation data as left interpolation data: {(µi , `i , f i ) | µi ∈ C, `i ∈ Cp , f i ∈ Cm , i = 1, . . . , n}, right interpolation data: {(σi , r i , g i ) | σi ∈ C, r i ∈ Cm , g i ∈ Cp , i = 1, . . . , n}, (2.5) bitangential derivative data: {(i, θi ) | i ∈ {1, . . . , n} for which µi = σi , θi ∈ C}, with the understanding that the last category may be empty if {µi }ni=1 ∩ {σi }ni=1 = ∅. Note that in the case µi = σi , the compatibility of the conditions (2.4) requires that f Ti r i = `Ti g i . For ease of presentation, we introduce the matrices M := diag(µ1 , . . . , µn ) ∈ Cn×n ,   L := `1 . . . `n ∈ Cp×n ,   F := f 1 . . . f n ∈ Cm×n , S := diag(σ1 , . . . , σn ) ∈ Cn×n ,   R := r 1 . . . r n ∈ Cm×n ,   G := g 1 . . . g n ∈ Cp×n . e A ek , and B e (for k = 1, . . . , K) using the measureOur goal is to construct matrices C, e e PK hk (s)A ek )−1 B e satisfies the ments (2.5), such that the transfer function H(s) = C( k=1 interpolation conditions e i ) = `Ti H(µi ) = f Ti `Ti H(µ e i )r i = H(σi )r i = g i and H(σ for i = 1, . . . , n. (2.6a) If µi = σi for any index i, then additionally, e 0 (µi )r i = `T H 0 (µi )r i = θi `Ti H i (2.6b) is to be satisfied. 3 3.1 Structured Interpolatory Realizations Standard Loewner Realization A key tool for our results is the Loewner realization framework introduced in [27]. This framework uses the Loewner matrix L ∈ Cn×n and the shifted Loewner matrix Lσ ∈ Cn×n , whose entries [L]i,j and [Lσ ]i,j for i, j = 1, . . . , n are defined as [L]i,j = f Ti r j − `Ti g j µi − σj [L]i,i = θi µi f Ti r j − σj `Ti g j , µi − σj and [Lσ ]i,j = and [Lσ ]i,i = f Ti r i + µi θi , 5 if µi 6= σj , (3.1) if µi = σi . (3.2) For SISO systems, L and Lσ are the divided differences matrices corresponding to the transfer functions H(s) and sH(s), respectively. Theorem 3.1 (Loewner realization [27]). Let det(s̃L−Lσ ) 6= 0 for all s̃ ∈ {µi }ni=1 ∪{σi }ni=1 . Then the system e˙ (t) = −Lσ x e (t) + F T u(t), − Lx e (t) = G x e (t) y (3.3) is a minimal realization of an interpolant of the data, i. e., its transfer function e H(s) = G(Lσ − sL)−1 F T satisfies the interpolation conditions (2.6). The condition det(s̃L − Lσ ) 6= 0 in Theorem 3.1 can be relaxed by means of the short singular value decomposition (SVD) [1, Remark 3.2.1]. If an s̃ ∈ {µi }ni=1 ∪ {σi }ni=1 violates the regularity condition, then the short SVD of s̃L − Lσ can be used to truncate the redundant parts [27]. 3.2 Interpolation Conditions Suppose we are given interpolation data as in (2.5) and for the moment assume that we e e K(s) e −1 B. e If we can impose conditions on already have a realization of the form H(s) =C e e e e e e e satisfies the interpolation C, B and the matrix function K such that H(s) = C K(s)−1 B conditions (2.6), then we can revert the process and use the conditions to construct the realization. The following observation, which corresponds to an equivalent parametrization of the interpolation conditions (2.6), suggests how one might proceed. This parametrization will form the basis for constructing the structured interpolatory realizations. e Theorem 3.2. Let K(s) be a continuously differentiable n × n matrix-valued function of the complex argument s, which is nonsingular at s = µi and s = σj for i, j = 1, . . . , n. The e e K(s) e −1 B e satisfies the interpolation conditions (2.6a) if and only if realization H(s) =C e G G = CP and e F T = PFT B, (3.4) where PG , PF ∈ Cn×n are two matrices, whose columns piG := PG ei and piF := PF ei , respectively, solve the linear systems e i )piG = Br e i K(σ and e i )T piF = C e T `i , K(µ (3.5) where ei is the ith column of the n × n identity matrix. If additionally, µi = σi , then e satisfies the bitangential interpolation condition (2.6b) as well provided e e K(s) e −1 B H(s) =C that T 0 e (µi )piG = −θi . piF K (3.6) e e K(s) e −1 B e is well-defined at s = µi and s = σi . Proof. The transfer function H(s) = C e i. Assume (3.4) and (3.5). Multiplying the first equation in (3.4) by ei yields g i = Cp G e i ) is invertible, one immediately Then, using the first equation in (3.5) and the fact that K(σ e i )r i , i. e., the right tangential interpolation holds. Similarly, using the obtains g i = H(σ e i ); second expression in (3.4) and the definition of piF in (3.5), we arrive at f Ti = `Ti H(µ 6 thus (2.6a) holds. The other direction follows directly. Moreover, if µi = σi , then (3.6) yields e K(µ e i )−1 K e 0 (µi )K(σ e i )−1 Br e i = − pi e 0 (µi )r i = −`Ti C `Ti H F T e 0 (µi )pi = θi . K G Evidently, in order to satisfy the collected tangent interpolation conditions (2.6a), we can e now equivalently require the realization H(s) to satisfy the conditions of Theorem 3.2. In e particular we need K(s) to be nonsingular at the driving frequencies s = µi and s = σj . P e e For K(s) = K k=1 hk (s)Ak , the other conditions (3.4) and (3.5) can be rewritten as e F T = PFT B, (3.7) ek = LT C, e hk (M)PFT A (3.8) e G, G = CP K X K X ek PG hk (S) = BR, e A k=1 k=1 where we set hk (M) := diag(hk (µ1 ), . . . , hk (µn )) and hk (S) := diag(hk (σ1 ), . . . , hk (σn )). To fulfill additionally the bitangential interpolation conditions (2.6b) for the case µi = σi , the third condition of Theorem 3.2 needs to be satisfied. If the matrices PF and PG are nonsingular, then  −1 e e K(s) e −1 B e = G PFT K(s)P e H(s) =C FT , G and hence the realization is unique up to the state space transformation described by PF e and C e are given directly by the data without further and PG . In this case, the matrices B computations and the matrices PF and PG capture the non-uniqueness of the realization. In Section 3.4 we will use these matrices to tailor the realization to interpolate additional data. In any case, we view equations (3.7) and (3.8) not as a coupled system but as a e and C e from (3.7). Then, staggered process. First, fix matrices PF , PG and determine B in the second step, use this information to solve (3.8). With this viewpoint, i. e., not counting PF and PG as unknowns, we have Kn2 unknowns from the coefficient matrices ek and (m + p)n unknowns from the input and output matrices B e and C, e giving a total of A 2 Kn + (m + p)n unknowns. For these unknowns, (3.7) and (3.8) constitute 2n2 + (m + p)n equations, leaving (K − 2)n2 degrees of freedom. In particular, we can expect a unique solution for K = 2. Remark 3.3. We have (K − 2)n2 degrees of freedom to solve the structured realization problem, and therefore the K = 1 case does not have enough degrees of freedom to guarantee a solution in general. Note that the standard rational approximation has K = 2. To e = b ∈ Rn further examine the K = 1 case, assume for simplicity that H(s) is SISO, i. e., B T n e = c ∈ R . Then, for K = 1, the reduced model has the form H(s) e e−1 b. and C = h11(s) cT A Therefore, the interpolation conditions become e−1 b = H(σi )h1 (σi ) cT A e−1 b = H(µi )h1 (µi ), and cT A for i = 1, . . . , n. (3.9) e−1 b is constant, for the interpolation problem in (3.9) to have a solution, we Since cT A need H(σi )h1 (σi ) = H(µi )h1 (µi ) = c where c is a constant for i = 1, . . . , n. This clearly will not be the case in general and we cannot expect to have a solution. Interestingly, if e = In , b = e1 and c = c · e1 . this condition holds, a solution can be found easily by setting A Based on these considerations, we will focus on K ≥ 2 in the rest of the paper. ♦ 7 Remark 3.4. The nonsingularity of the matrices PF and PG is connected to the minimality of the realization. To see this, assume that we have a SISO standard state space system, e B e e = b ∈ Rn , and C e T = c ∈ Rn . Note that in this case K e and its i. e., K(s) = sIn − A, pointwise inverse form a set of commutative matrices. Hence we have h i e 1 )−1 b · · · K(σ e n )−1 b rank (PG ) = rank K(σ h Q  i n e 1 )−1 b K(σ e 1 )−1 K(σ e 2 )−1 b · · · e i )−1 b = rank K(σ K(σ i=1 h i e ··· A en−1 b = rank b Ab such that PG is nonsingular if and only if the realization is controllable. Similarly, PF is nonsingular if and only if the realization is observable. ♦ Note that the Loewner pencil with h1 (s) ≡ 1 and h2 (s) = −s satisfies the conditions of e Theorem 3.2 with K(s) = Lσ − sL, i. e., the Loewner framework works with matrices PF and PG being the identity. Indeed, for µi 6= σj , the (i, j) component of the Loewner pencil is     s − σj µi − s T T e ei K(s)ej = [Lσ ]i,j − s [L]i,j = fi rj + `Ti g j , µi − σ j µi − σj e i ) = `T G = `T C e and K(σ e j )ej = F T r j = Br e j . Similarly, so we have immediately, eTi K(µ i i for the case µi = σi , we obtain e i ) = `Ti C, e eTi K(µ e i, e i )ei = Br K(σ and e 0 (µi )ei = −Li,i = −θi . eTi K The remainder of this section is structured as follows. In Section 3.3 we consider the special case K = 2 and show its close relation to the Loewner framework. If K ≥ 3 we need a strategy to fix the remaining degrees of freedom. To this end we propose two approaches which both provide interpolation of further data while maintaining the dimension of the matrices in the realization. The first approach uses additional interpolation points for this (Section 3.4.1), while the second one interpolates additional derivative evaluations of the transfer functions (Section 3.4.2). 3.3 Structured Loewner Realizations: The case K = 2 Setting PF = PG = In gives 2n2 +(m+p)n equations in (3.7) and (3.8) for the Kn2 +(m+p)n unknowns such that we can expect (under some regularity) a unique solution for the case e = FT , C e = G, and the matrix equations in (3.8) reduce to K = 2. In this case B e2 = LT G e1 + h2 (M)A h1 (M)A and e1 h1 (S) + A e2 h2 (S) = F T R. A To decouple these equations, we multiply the first equation from the right by h2 (S) and the second equation from the left by h2 (M). Subtracting the resulting systems yields the Sylvester-like equation e1 h1 (S) − h1 (M)A e1 h2 (S) = h2 (M)F T R − LT Gh2 (S). h2 (M)A (3.10) e1 and obtain Similarly, we can eliminate A e2 h2 (S) − h2 (M)A e2 h1 (S) = h1 (M)F T R − LT Gh1 (S). h1 (M)A 8 (3.11) Remark 3.5. If the desired model is a generalized state space system as in (2.2), i. e., h1 (s) = s and h2 (s) ≡ −1, then (3.10) and (3.11) are given by the Sylvester equations e1 S − MA e1 = F T R − LT G e2 S − MA e2 = MF T R − LT GS, A and A (3.12) respectively. Up to a sign factor, these are exactly the Sylvester equations that define the Loewner matrix and the shifted Loewner matrix [27]. In particular, if σi 6= µj for e1 = −L and A e2 = −Lσ are the unique solutions of (3.10) and (3.11) i, j = 1, . . . , n, then A and the Loewner framework is a special case of the general framework presented in this paper. Similarly, the proportional ansatz for the realization of delay systems introduced in [32] is covered by our framework. ♦ e1 and A e2 , for which µi 6= σj , may be obtained by multiplying (3.10) Those elements of A T and (3.11) from left by ei and from right by ej yielding h i h i h1 (µi )f Ti r j − `Ti g j h1 (σj ) h2 (µi )f Ti r j − `Ti g j h2 (σj ) e2 e1 = A = , A (3.13) h2 (µi )h1 (σj ) − h1 (µi )h2 (σj ) h1 (µi )h2 (σj ) − h2 (µi )h1 (σj ) i,j i,j under the generic assumption that h1 (µi )h2 (σj ) 6= h2 (µi )h1 (σj ). This is satisfied for all possible choices of interpolation points (with µi 6= σj ) if the functions h1 and h2 satisfy the Haar condition [13], see also Section 3.4.1. The components for which µi = σi can be obtained by translating the conditions in Theorem 3.2 to the K = 2 case. This yields e1 ]i,i + h2 (µi )[A e2 ]i,i = `Ti g i , h1 (µi )[A e1 ]i,i + h0 (µi )[A e2 ]i,i = −θi h01 (µi )[A 2 and consequently h i h2 (µi )θi + h02 (µi )`Ti g i e1 A = 0 , h2 (µi )h1 (µi ) − h01 (µi )h2 (µi ) i,i h i e2 A i,i = (3.14) h1 (µi )θi + h01 (µi )`Ti g i , (3.15) h01 (µi )h2 (µi ) − h02 (µi )h1 (µi ) for the components with µi = σi under the generic assumption h02 (µi )h1 (µi ) 6= h01 (µi )h2 (µi ). Consequently, we have proven the subsequent result. e1 and A e2 be as in (3.13) and (3.15) where the denominators are Corollary 3.6. Let A assumed nonzero. If   e1 + h2 (s̃)A e2 6= 0 det h1 (s̃)A for all s̃ ∈ {µi }ni=1 ∪ {σi }ni=1 ,  −1 e e1 + h2 (s)A e2 then the transfer function H(s) = G h1 (s)A F T satisfies the interpolation conditions (2.6). e1 and A e2 have a structure similar to the Loewner matrix and the shifted The matrices A Loewner matrix. This gives rise to the idea that the result of Corollary 3.6 can be obtained from the standard Loewner framework using transformed data. Corollary 3.7. Suppose that h2 (S) and h2 (M) are nonsingular and that the denominators in (3.13) and (3.15) are not zero. Construct the Loewner matrix L and the shifted Loewner matrix Lσ for the transformed data    `i h1 (µi ) left interpolation data: , , f , i = 1, . . . , n , h2 (µi ) h2 (µi ) i    h1 (σi ) ri right interpolation data: , , g , i = 1, . . . , n , (3.16) h2 (σi ) h2 (σi ) i    h2 (µi ) θi + h02 (µi ) `Ti g i bitangential derivative data: i, 0 for µi = σi . h1 (µi ) h2 (µi ) − h02 (µi ) h1 (µi ) 9 If det(h2 (s̃)Lσ − h1 (s̃)L) 6= 0 for all s̃ ∈ {µi }ni=1 ∪ {σi }ni=1 , then the transfer function e H(s) = G(h2 (s)Lσ − h1 (s)L)−1 F T interpolates the data. Proof. Simple calculations yield that, when constructing the Loewner pencil with the transformed interpolation data (3.16), the Loewner matrix and the shifted Loewner matrix e2 given in (3.13) and (3.15). Corollary 3.6 completes the proof. e1 and A coincide with −A Corollary 3.7 allows one to transfer many results of the standard Loewner framework to the general framework considered in this subsection. In particular, this allows us to keep the system matrices real if the interpolation data is closed under complex conjugation. The details are formulated in Lemma 3.8. Lemma 3.8. Let the interpolation data be closed under complex conjugation, i. e., there exist unitary matrices TF , TG ∈ Cn×n with TF∗ MTF ∈ Rn×n , TF∗ LT ∈ Rn , TF∗ F T ∈ Rn , TG∗ STG ∈ Rn×n , RTG ∈ Rn , GTG ∈ Rn . Moreover, assume that the θi ’s (for the case µi = λi ) are closed under complex conjugaT ∗ T e e e1 TG , T ∗ A e tion. Then, the realization (TF∗ A F 2 TG , TF F , GTG ) with (A1 , A2 , F , G) from Corollary 3.6 consists of real-valued matrices and interpolates the data. Proof. First note that if the interpolation data is closed under complex conjugation, so is the transformed data in Corollary 3.7. Based on this observation, the proof for the case that µi 6= λj for all i, j = 1, . . . , n simply follows the lines of [4, section 2.4.4.]. This can also be comprehended after multiplying the Sylvester-like equations (3.10) and (3.11) from left by TF∗ and from right by TG . Similar reasoning proves the claim for the µi = λi case. Example 3.9. A special case of Lemma 3.8 applies when the interpolation data is sorted such that the real values have the highest indices, i. e., M = diag(µ1 , µ1 , . . . , µ2`−1 , µ2`−1 , µ2`+1 , . . . , µn ),   L = `1 `1 . . . `2`−1 `2`−1 `2`+1 . . . `n ,   F = f 1 f 1 . . . f 2`−1 f 2`−1 f 2`+1 . . . f n , S = diag(σ1 , σ1 , . . . , σ2r−1 , σ2r−1 , σ2r+1 , . . . , σn ),   R = r 1 r 1 . . . r 2r−1 r 2r−1 r 2r+1 . . . r n ,   G = g 1 g 1 . . . g 2r−1 g 2r−1 g 2r+1 . . . g n . In this case possible choices for TF and TG are given by block diagonal matrices       1 1 −ı 1 1 −ı T• = blkdiag √ , ..., √ , 1, . . . , 1 , 2 1 ı 2 1 ı where • ∈ {F, G}. One can also obtain the real realization directly from Theorem 3.2 by choosing PFT = TF∗ and PG = TG (see discussion after Theorem 3.2). 10 Remark 3.10. The result from Corollary 3.7 can (formally) be obtained by rewriting the transfer function, as similar to what is done in [17], namely −1  h1 (s) e −1 e e 1 . e e e e e e B A1 + A2 H(s) = C(h1 (s)A1 + h2 (s)A2 ) B = C h2 (s) h2 (s) ♦ 3.4 Structured Realization for the Case K ≥ 3 When K ≥ 3, the conditions in Theorem 3.2 do not provide enough conditions for the available degrees of freedom (even if PF and PG are fixed). Hence, we have some freedom ek with k = 1, . . . , n. We can exploit these degrees of freedom, in choosing the matrices A for instance, by fitting the transfer function to additional data. For simplicity we assume {µi }ni=1 ∩ {σi }ni=1 = ∅ for the remainder of this section. 3.4.1 Interpolation at Additional Points In this subsection we focus on fitting the transfer function to additional data or, equivalently, match the given data with a smaller state space dimension. To this end, let us assume that we have (QF − 1)n additional left interpolation points and (QG − 1)n additional right interpolation points at hand, which we group in sets of n. More precisely, the left interpolation data is grouped into the matrices   Mq := diag(µq;1 , µq;2 , . . . , µq;n ) ∈ Cn×n , Lq := `q;1 `q;2 · · · `q;n ∈ Cp×n ,   Fq := f q;1 f q;2 · · · f q;n ∈ Cm×n , (3.17a) where q = 1, . . . , QF . Here, we set µ1;i := µi , f 1;i := f i , and `1;i := `i , such that we have M1 = M, L1 = L, and F1 = F. Similarly, we introduce, for q = 1, . . . , QG , the matrices   Sq := diag(σq;1 , σq;2 , . . . , σq;n ) ∈ Cn×n , Rq := r q;1 r q;2 · · · r q;n ∈ Cm×n ,   Gq := g q;1 g q;2 · · · g q;n ∈ Cp×n . (3.17b) To use the full capacity of available degrees of freedom, we assume K = QF + QG , with QF , QG ≥ 1. The next result gives us the necessary and sufficient conditions that the e matrices in the realization H(s) must satisfy to interpolate all prescribed information. P e e K(s) e −1 B e with K(s) e e e Theorem 3.11. Let H(s) =C = K k=1 hk (s)Ak and suppose that K(s) QG QF is nonsingular for all s̃ ∈ {µq;i }q=1 ∪ {σq;i }q=1 for all i = 1, . . . , n. e q;i ) = f T are satisfied for i = 1, . . . , n and 1. The left interpolation conditions `Tq;i H(µ q;i q = 1, . . . , QF if and only if there exist matrices PF ,q with q = 1, . . . , QF that satisfy FqT = e PFT ,q B K X and ek = LT C. e hk (Mq )PFT ,q A q (3.18) k=1 e q;i )r q;i = g q;i are satisfied for i = 1, . . . , n and 2. The right interpolation conditions H(σ q = 1, . . . , QG if and only if there exist matrices PG,q with q = 1, . . . , QG that satisfy e G,q Gq = CP K X and k=1 11 ek PG,q hk (Sq ) = BR e q. A (3.19) Proof. The result follows directly from Theorem 3.2. For the sake of completeness we e= give the proof of the first statement again. The second identity in (3.18) implies `Tq;i C P e e eTi PFT ,q K k=1 hk (µq;i )Ak . Thus, by the first identity and the definition of H we conclude e q;i ) = eT P T B e = fT `Tq;i H(µ i F ,q q;i for i = 1, . . . , n and q = 1, . . . , QF . Evidently, in order to satisfy the interpolation conditions (2.6a) it will be sufficient to require that (3.18) and (3.19) hold simultaneously. This gives us the following strategy ek , B, e and C. e Suppose we can find matrices PF ,q to determine the realization matrices A and PG,q that satisfy the first identity in (3.18) and (3.19), respectively, i. e., that allow us e and C. e Then we can compute the matrices A ek as follows. Vectorization of the to fix B second identity in (3.18) yields K X    ek ) = C e T ⊗ In vec(LTq ), In ⊗ hk (Mq )PFT ,q vec(A k=1 where ⊗ denotes the Kronecker product and vec(X) denotes the vector of stacked columns of the matrix X. Similarly, we obtain from (3.19) the equation K X    T ek ) = In ⊗ B e vec(Rq ). hk (Sq )PG,q ⊗ In vec(A k=1 2 2 All equations together yield the linear algebraic system Aα = β with A ∈ CKn ×Kn , 2 α, β ∈ CKn given by   In ⊗ h1 (M1 ) PFT ,1 ··· In ⊗ hK (M1 ) PFT ,1   .. ..   . .   T  In ⊗ h1 (MQ ) P T · · · I ⊗ h (M ) P n K Q  F F F ,QF F ,QF  ,  A :=   T T  h1 (S1 ) PG,1 ⊗ In ··· hK (S1 ) PG,1 ⊗ In    .. ..     . T .T h1 SQG PG,QG ⊗ In · · · hK SQG PG,QG ⊗ In      e T ⊗ In vec LT (3.20) C 1     ..    .     e   T T vec(A1 ) e ⊗ In vec L  C QF      . .. α :=  and β :=   . ,   e vec (R1 )  I ⊗ B   e n vec(AK )     ..   .      e vec RQ In ⊗ B G Note that the solution of the linear equation system Aα = β depends on PF ,q and PG,q and there is some freedom in choosing these matrices. A simple possibility is given by         G e := Ip 0 (3.21) e := Im , PFT ,q := FqT ∗ , PG,q := q , B and C ∗ 0 12 which satisfies the first identity in (3.18) and (3.19) for any choice of ∗. However, the trivial choice of setting these blocks to zero makes the system matrix A singular. Instead, we propose to fill the ∗ part of the matrices PF ,q and PG,q such that they are nonsingular assuming that Fq and Gq have full row rank. A more specific choice of ∗ may even lead to real-valued realizations as stated in the following lemma. Lemma 3.12. Let each of the interpolation data sets be closed under complex conjugation, i. e., there exist unitary matrices TF ,q , TG,q ∈ Cn×n with TF∗ ,q Mq TF ,q ∈ Rn×n , TF∗ ,q LTq ∈ Rn , TF∗ ,q FqT ∈ Rn , for q = 1, . . . , QF , ∗ TG,q Sq TG,q ∈ Rn×n , Rq TG,q ∈ Rn , Gq TG,q ∈ Rn , for q = 1, . . . , QG . Moreover, let the matrices PF ,q and PG,q be as in (3.21) with free entries ∗ chosen such e1 , ..., A eK , B, e and C e that TF∗ ,q PFT ,q ∈ Rn and PG,q TG,q ∈ Rn hold. Then, the matrices A from Theorem 3.11 are real matrices (if existent). e and C e are real matrices. In addition, the second Proof. From (3.21) it is clear that B equalities in (3.18) and (3.19) are equivalent to K X ek = TF∗ ,q LTq C e TF∗ ,q hk (Mq )TF ,q TF∗ ,q PFT ,q A k=1 and K X ek PG,q TG,q T ∗ hk (Sq )TG,q = BR e q TG,q . A G,q k=1 ek are the solutions of these linear matrix equations and since their coefficient Since the A ek ’s are also real-valued. matrices as well as the right hand sides are real-valued, the A To complete the discussion, we analyze the regularity of A in the SISO case, that is p = m = 1. Here, we set   1    e :=  ..  e PF ,q := diag(Fq ), PG,q := diag(Gq ), B .  , and C := 1 . . . 1 . (3.22) 1 With these settings, of the second in (3.18) and PKthe (i, j) components PK matrix equations e e (3.19) read as f q;i k=1 hk (µq;i )[Ak ]i,j = 1 and g q;j k=1 hk (σq;j )[Ak ]i,j = 1, respectively. Putting this into matrix notation yields the linear system    f 1;i h1 (µ1;i ) . . . hK (µ1;i )     [A .. .. .. e1 ]i,j  1    . . .    e2 ]i,j  1   h1 (µQ ;i ) . . . hK (µQ ;i )  [A f QF ;i    F F      = . , .     . g 1;j    h1 (σ1;j ) . . . hK (σ1;j )   .   ..     e .. .. .. 1    [AK ]i,j . . . g QG ;j h1 (σQG ;j ) . . . hK (σQG ;j ) (3.23) where the system matrix is the product of a diagonal matrix and a generalized Vandermonde matrix. This generalized Vandermonde matrix is also called a Haar matrix and is nonsingular if the driving frequencies µq;i and σq;j are distinct and the functions hk satisfy the Haar condition [13]. In particular, the Haar condition is satisfied for monomials, and 13 thus relevant for second-order systems (cf. Table 2.1). The diagonal matrix is nonsingular if the driving frequencies µq;i and σq;j are distinct from the roots of the original transfer function. In this case, the system above has a unique solution for each (i, j) combination and hence, via transformations, we can infer that A is nonsingular. We illustrate the construction of the realization with additional data with the following toy example. Example 3.13. Given scalars a1 , a2 , a3 , b, c ∈ R with bc 6= 0, consider the system a1 ẋ(t) = a2 x(t) + a3 x(t − 1) + bu(t), y(t) = cx(t) with transfer function H(s) = cb . sa1 −a2 −e−s a3 Setting QF = 1 and QG = 2, we pick distinct e = 1 and C e = 1 with interpolation points µ1;1 = µ, σ1;1 = σ, and σ2;1 = λ. We choose B PF ,1 = H(µ), PG,1 = H(σ), and PG,2 = H(λ). Then the system in (3.23) reads as    e    A1 H(µ) µ −1 − exp(−µ) 1 e        H(σ) σ −1 − exp(−σ) A2  = 1 . (3.24) e H(λ) λ −1 − exp(−λ) 1 A3 The inverse of the Haar matrix is given by  µ σ  e (e − eλ ) −eσ (eµ − eλ ) eλ (eµ − eσ ) 1  eµ (σeσ − λeλ ) −eσ (µeµ − λeλ ) eλ (µeµ − σeσ )  µeµ (eσ −eλ )+σeσ (eλ −eµ )+λeλ (eµ −eσ ) −eµ eσ eλ (σ − λ) eµ eσ eλ (µ − λ) −eµ eσ eλ (µ − σ) h i e1 A e2 A e3 = such that the solution of (3.24) is given by A we recover the original transfer function. 1 cb   a1 a2 a3 . In particular, Clearly, the realization is real-valued if all quantities in (3.23) are real. If we pick the driving frequencies on the imaginary axis, then in general the Haar matrix will be complexvalued. The following lemma shows how to obtain real-valued realizations based on complex interpolation data with P matrices as in (3.22). Lemma 3.14. Let the interpolation data be closed under complex conjugation and sorted as in Example 3.9 such that the unitary matrices TF , TG ∈ Cn×n from Example 3.9 satisfy TF∗ Mq TF ∈ Rn×n , TG∗ Sq TG ∈R n×n , TF∗ LTq ∈ Rn , n Rq TG ∈ R , TF∗ FqT ∈ Rn , n Gq TG ∈ R , for q = 1, . . . , QF , for q = 1, . . . , QG . Moreover, let the matrices PF ,q and PG,q be as in (3.22). Then, the realization e1 TG , . . . , TF∗ A eK TG , TF∗ B, e CT e G ), (TF∗ A e1 , . . . , A eK , B, e C) e from Theorem 3.11, consists of real-valued matrices and interpowith (A lates the data. Proof. First note that the state space transformation by the unitary matrices TF∗ and TG does not change the transfer function and thus the interpolation given by Theorem 3.11 is also valid here. It remains to show that the realization consists of real-valued matrices. e and C e are given in (3.22), it is straightforward to see that T ∗ B e and CT e G are Since B F 14 ek TG by observing real-valued. As in the proof of Lemma 3.12, we deduce the realness of TF∗ A that the second equalities in (3.18) and (3.19) are equivalent to K X ek TG = TF∗ LTq CT e G TF∗ hk (Mq )TF TF∗ PFT ,q TF TF∗ A k=1 and K X ek TG T ∗ PG,q TG T ∗ hk (Sq )TG = T ∗ BR e q TG . TF∗ A G G F k=1 Straightforward computations yield that TF∗ PFT ,q TF and TG∗ PG,q TG are real-valued. From ek or equivalently their transformed these linear matrix equations we can determine the A ek TG . In the latter case, we observe that the coefficient matrices as well as analogues TF∗ A ek TG are also real-valued. the right hand sides are real-valued and thus the TF∗ A e A crucial point in Theorem 3.11 is the nonsingularity of the affine structure K(s) = PK e k=1 hk (s)Ak at the driving frequencies µq;i and σq;i . However, if we add more and more e data we expect that at some point the information become redundant, and hence K(s) might become singular. To remove the redundant part, we suppose that   e1 ! A K h i X  .  ek = rank A e1 · · · A eK = rank  rank hk (s)A (3.25)  ..  =: r k=1 eK A   holds for all s ∈ {µq;i } ∪ {σq;i }. In this case there exist unitary matrices V = V1 V2 and   W = W1 W2 ∈ Cn×n with V1 , W1 ∈ Cn×r and V2 , W2 ∈ Cn×(n−r) such that ek V2 = 0 A and e∗ W2 = 0, A k for all k = 1, . . . , K. (3.26) e e PK hk (s)A ek )−1 B e satisfy the equations Theorem 3.15. Let the realization H(s) = C( k=1 ek ’s satisfy the rank in Theorem 3.11 with matrices PF ,q and PG,q . Suppose that the A n×r assumption (3.25) and let V1 , W1 ∈ C complete V2 and W2 in (3.26) to unitary matrices. For k = 1, . . . , K set ek;r := W ∗ A e A 1 k V1 , er := W ∗ B, e B 1 er := CV e 1. C and If span{`q;1 , . . . , `q;n } = Cp for all q = 1, . . . , QF and span{r q;1 , . . . , r q;n } = Cm for e r (s) = C er (PK hk (s) A ek;r )−1 B er interpolates the all q = 1, . . . , QG , then the realization H k=1 data. P e Proof. First, bear in mind that by the assumption, the affine structure K k=1 hk (s)Ak;r ek V1 V ∗ = A ek is nonsingular at the driving frequencies µq;i and σq;i , and observe that A 1 ek = A ek hold for k = 1, . . . , K by construction of V1 and W1 . Thus, for and W1 W1∗ A q = 1, . . . , QF ! K K X X T T ∗ ek;r = ek V1 hk (Mq )P W1 A hk (Mq )P W1 W A F ,q F ,q k=1 = k=1 K X k=1 15 1 ! ek hk (Mq )PFT ,q A er , V1 = LTq C where the second identity follows from (3.18). Similarly, we obtain for q = 1, . . . , QG K X ek;r V1∗ PG,q hk (Sq ) = W1∗ A k=1 K X ek V1 V1∗ PG,q hk (Sq ) = W1∗ A k=1 K X er Rq . ek PG,q hk (Sq ) = B A k=1 Furthermore, notice e LTq C = K X ek hk (Mq )PFT ,q A = k=1 K X ek V1 V1∗ = LTq CV e 1 V1∗ . hk (Mq )PFT ,q A k=1 e = CV e 1V ∗. Since the columns of Lq span the whole space Cp , the above identity implies C 1 ∗ e = W1 W B. e Finally, we have With the same reasoning we obtain B 1 e r (µq;i ) `Tq;i H = K X er eTi LTq C !−1 ek;r hk (µq;i )A er B k=1 = eTi K X ! ek;r hk (Mq )PFT ,q W1 A k=1 = eTi PFT ,q W1 = K X !−1 ek;r hk (µq;i )A er B k=1 K X ! ek;r hk (µq;i )A k=1 T T e= ei PF ,q W1 W1∗ B K X !−1 ek;r hk (µq;i )A er B k=1 f Tq;i for q = 1, . . . , QF and i = 1, . . . , n. The right interpolation conditions follow analogously. Example 3.16. If we pick further distinct interpolation points in Example 3.13, realization is given by the matrices      a1 . . . a 1 a2 . . . a2 a3 . . . 1 1 1      . . . . . e1 = e2 = e3 = ..  , A ..  , and A A . . . cb . cb . cb . a1 . . . a 1 a2 . . . a2 a3 . . .  Clearly, the rank assumption (3.25) is satisfied with r = 1. Setting W1 = 1 0 and V1 = W1T yields the true transfer function. 3.4.2 then the  a3 ..  . . a3  . . . 0] Matching Derivative Data Hermite interpolation provides a well known and robust approach for polynomial approximation that involves the matching of derivative data. When we seek reduced models that are structurally equivalent to standard first order realizations (that is, when we have in (2.1) K = 2, h1 (s) = s, and h2 (s) ≡ −1) then first order necessary conditions for optimality of the reduced order approximant with respect to the H2 norm are known and they require e that the reduced transfer function H(s) must be a Hermite interpolant of the original H(s) [20]. Even though these necessary conditions do not extend immediately to more general structured systems as appear in (2.1), it is known for some special cases such as second order systems with modal damping and port-Hamiltonian systems [9], and for systems with simple delay structures [16, 17], that Hermite interpolation (in a different form then for the rational case) still plays a fundamental role in the necessary optimality 16 conditions. Therefore, if derivative information for the transfer function H(s) is accessible e then this motivates finding a structurally equivalent realization H(s) that matches both the evaluation data and the derivative data. Assume that we have `Ti H 0 (µi ) = (f 0i )T H 0 (σi )r i = g 0i and for i = 1, . . . , n (3.27) d available, where H 0 denotes the derivative of H, i. e., H 0 := ds H, and (f 0i )T and g 0i are the tangential interpolation values of H 0 . These are collected in the matrices     F 0 = f 01 . . . f 0n and G 0 = g 01 . . . g 0n . e interpolates the In this section, we derive conditions such that the transfer function H n n data (2.5) with {µi }i=1 ∩ {σi }i=1 = ∅ and satisfies in addition the Hermite interpolation condition (3.27). e e PK hk (s)A ek )−1 B e and suppose that PK hk (s̃)A ek is Theorem 3.17. Let H(s) = C( k=1 k=1 n n nonsingular for all s̃ ∈ {µi }i=1 ∪ {σi }i=1 . e i ) = f Ti and the left Hermite interpolation 1. The left interpolation conditions `Ti H(µ  e 0 (µi ) = f 0 T are satisfied for i = 1, . . . , n if and only if there exist conditions `Ti H i matrices PF and PF 0 that satisfy K X e F T = PFT B, ek = LT C, e hk (M)PFT A (3.28) k=1 F  0 T T e = (PF 0 ) B, K X T ek = − hk (M) (PF 0 ) A k=1 K X ek . h0k (M)PFT A (3.29) k=1 e i )r i = g i and the right Hermite interpolation 2. The right interpolation conditions H(σ 0 0 e conditions H (σi )r i = g i for i = 1, . . . , n are satisfied if and only if there exist matrices PG and PG 0 that satisfy e G, G = CP K X ek PG hk (S) = BR, e A (3.30) k=1 0 e G0 , G = CP K X ek PG 0 hk (S) = − A k=1 K X ek PG h0 (S). A k (3.31) k=1 Proof. We only prove the first statement; the second statement is proved analogously. Observe that (3.28) are the left interpolation conditions from Theorem 3.2, `Ti H(µi ) = f Ti for i = 1, . . . , n. It remains to show that the interpolation conditions are P left Hermite e ek . The second identity in (3.28) equivalent to (3.29). As before, let K(s) = K h (s) A k k=1 holds if and only if e = eT LT C e = eT P T K(µ e i) `Ti C i i F for i = 1, . . . , n. Similarly from the second identity in (3.29) we obtain e 0 (µi ) = −eTi −eTi PFT K K X ek = eTi h0k (M)PFT A k=1 K X k=1 17 ek = eT (PF 0 )T K(µ e i ). hk (M) (PF 0 )T A i Thus, for i = 1, . . . , n we have e 0 (µi ) = −`T C e K(µ e i )−1 K e 0 (µi )K(µ e i )−1 B e = −eT P T K e 0 (µi )K(µ e i )−1 B e `Ti H i i F  e = f0 T , = eTi (PF 0 )T B i where the last identity is nothing else than the first equality in (3.29). As before, it is sufficient and necessary to satisfy (3.28)-(3.31) simultaneously to satisfy the interpolation conditions (2.6a) and the Hermite interpolation conditions (3.27). After fixing the matrices PF , PF 0 , PG , and PG 0 , Theorem 3.17 gives 4n2 equations for Kn2 unknown variables. In particular for K = 4, we can expect under some regularity conditions that ek . Hereby, the P matrices can be chosen there is a unique solution for the matrices A similarly as in the previous section, for example as    0 h i  T  G G T T T 0 ∗ , PF := F PF 0 := (F ) PG := , PG 0 := , (3.32) ∗ , ∗ ∗     e = Im 0 T and C e = Ip 0 . For K = 3, we can either satisfy the left or yielding B the right Hermite interpolation conditions. For the sake of completeness, we derive the equivalent of the system (3.20) for Hermite interpolation for K = 4. Vectorization of the second equations in (3.28)-(3.31), respectively, yields the system Aα = β with matrix 2 2 2 A ∈ C4n ,4n and vectors α, β ∈ C4n given by   T T  In ⊗ h1 (M)PF  ...  In ⊗ h4 (M)PF    T . . . In ⊗ h4 (M) (PF 0 )T + h04 (M)PFT  In ⊗ h1 (M) (PF 0 ) + h01 (M)PFT , A :=    h1 (S)PGT ⊗ In  ...  h4 (S)PGT ⊗ In     ... h4 (S) (PG 0 )T + h04 (S)PGT ⊗ In h1 (S) (PG 0 )T + h01 (S)PGT ⊗ In      T ⊗I T e e C vec L n vec(A1 )     e   vec( A ) 0  2   .  α :=  and β :=  ,  e e vec(A3 ) I ⊗ B vec (R)   n e4 ) vec(A 0 (3.33) Remark 3.18. Real-valued realizations that accomplish Hermite interpolation may be obtained in the same manner as in the case of additional interpolation points (cf. Lemmas 3.12 and 3.14). The only additional requirement is that F and F 0 as well as G and G 0 need to have the same number of complex conjugate pairs such that TF∗ F T ∈ Rn , TF∗ F 0 T ∈ Rn , GTG ∈ Rn , and G 0 TG ∈ Rn . ♦ e e K(s) e −1 B e Suppose we have solved the linear system (3.33) to obtain the realization H(s) =C P K e e with K(s) = k=1 hk (s)Ak . By construction, the matrices satisfy the equations in Thee orem 3.17. However, K(s) might be singular at the driving frequencies µi and σi . If the rank condition (3.25) is satisfied, then we can truncate the redundant data as in ek;r , B er , and C er yielding the reduced realization Theorem 3.15, i. e., we construct matrices A P e r (s) = C er ( K hk (s)A ek;r )−1 B er . This model still satisfies the left and right interpolation H k=1 18 conditions by Theorem 3.15 and it suffices to check if the Hermite interpolation conditions are matched as well. By the same reasoning as in the proof of Theorem 3.15 we can establish the identity K X T ek;r = − hk (M) (PF 0 ) W1 A k=1 K X ek;r h0k (M)PFT W1 A k=1 and compute e r0 (µi ) `Ti H = K X er −eTi LT C !−1 K X ek;r hk (µi )A k=1 = −eTi PFT W1 K X k=1 K X ! ek;r h0k (µi )A k=1 = eTi K X = (PF 0 ) K X !−1 ek;r hk (µi )A er B k=1 !−1 ek;r hk (µi )A er B k=1 ! T ek;r hk (M) (PF 0 ) W1 A k=1 eTi ! ek;r h0k (µi )A K X !−1 ek;r hk (µi )A er B k=1 T e W1 W1∗ B = eTi T e = f 0i (PF 0 ) B T and hence the left Hermite interpolation condition is still satisfied. The proof for the right Hermite interpolation condition proceeds analogously. We summarize the previous discussion in the following theorem. e e PK hk (s)A ek )−1 B e satisfy the equations in Theorem 3.19. Let the realization H(s) = C( k=1 ek ’s satisfy the rank Theorem 3.17 with matrices PF , PF 0 , PG , and PG 0 . Suppose that the A n×r assumption (3.25) and let W1 , V1 ∈ C be as in Theorem 3.15. If span{` n} = PK 1 , . e. . , `−1 p m e e er C and span{r 1 , . . . , r n } = C , then the realization Hr (s) = Cr ( k=1 hk Ak;r ) B interpolates the data and derivative data with ek;r := W1∗ A ek V1 , A er := W1∗ B, e B and er := CV e 1. C Remark 3.20. Evidently, as the number of functions K determining the structure increases, the number of available degrees of freedom to force interpolation increases as well, and in particular, when K > 4 there will be sufficient degrees of freedom available to allow matching of higher order derivatives as well. The calculations involved are both annoyingly technical and unenlightening, so we choose not to pursue this thread here. In any case for the applications we have in mind, K ≤ 4, and Hermite interpolation is seen to provide a satisfactory level of fidelity in the reduced models. ♦ 3.5 An Algorithm for Structured Realization In this section, we synthesize the results of the previous subsections into an algorithmic format, starting with interpolation data (2.5) and an affine structure given via continuously e1 , . . . , A eK , differentiable functions hk for k = 1, . . . , K. The P goal is to construct matrices A K −1 e e e e e e B and C such that the realization H(s) = C( k=1 hk (s)Ak ) B associated with the affine structure interpolates the data. We construct realizations as described in previous designated subsections, taking advantage of the simplifications available when K = 2. Before doing so, a pre-processing step is included if the data is closed under complex conjugation, which facilitates construction of a real-valued realization where appropriate. 19 Although in principle the transformation to a real-valued realization could be performed after assembling the matrices, it is advisable to enforce this in advance, since rounding errors tend to break the underlying conjugate symmetry and will cause drift away from a realvalued realization. A post-processing step may also be necessary to truncate redundancies discovered in the interpolation data. Details are summarized in Algorithm 1. Algorithm 1 Structured Realization Input: Interpolation data (2.5), affine structure h1 (s), . . . , hK (s) with PK K ∈ N.e −1 e e e e e e e Output: Matrices A1 , . . . , AK , B, and C such that H(s) = C( k=1 h(s)Ak ) B interpolates the data if Data is closed under complex conjugation then . Keep realization real Transform data as in Lemma 3.8, Lemma 3.12, Lemma 3.14, or Remark 3.18 3: end if 1: 2: 4: 5: 6: 7: 8: 9: 10: 11: 12: 13: 14: 15: 16: 17: 18: 19: 20: 21: 22: 3.6 if K = 2 then Transform data as in (3.16) Construct Loewner matrices according to (3.1) and (3.2) from the transformed data e1 = −L, A e2 = Lσ , B e = F T and C e=G Set A else if derivative data (3.27) is available then e C e and P matrices, for example as in (3.32) Construct B, e1 , . . . , A eK Assemble system (3.33) and solve for A else Partition the data as in (3.17) and adjust n accordingly e C e and P matrices, for example as in (3.21) Construct B, e1 , . . . , A eK Assemble system (3.20) and solve for A end if end if Compute r as in (3.25) if r < n then Compute V1 and W1 as in Theorem 3.15 ∗e ek := W ∗ A e e e e Set A 1 k V1 , B := W1 B, and C := CV1 end if . Truncation of redundant data Connection to Structure-preserving Interpolatory Projections Although our focus here is on data-driven interpolation, we revisit briefly the structurepreserving interpolatory projection framework introduced in [7] and establish a connection with realizations arising from Corollary 3.6. Theorem 3.21 (Structure-preserving interpolatory projection [7]). Consider the generalized realization H(s) = C(s)K(s)−1 B(s) where both C(s) ∈ Cp×N and B(s) ∈ CN ×m are analytic in the right half plane and K(s) ∈ CN ×N is analytic and full rank throughout the right half plane. Suppose that the left interpolation points {µ1 , . . . , µn } together with the left tangential directions {`1 , . . . , `n } and the right interpolation points {σ1 , . . . , σn } together with the right tangential directions {r 1 , . . . , r n } are given. Define V ∈ CN ×n and 20 W ∈ CN ×n as W = [K(µ1 )−T C(µ1 )T `1 , · · · , K(µn )−T C(µn )T `n ]. (3.34a) V = [K(σ1 )−1 B(σ1 )r 1 , · · · , K(σn )−1 B(σn )r n ] (3.34b) e e = W T B(s), and C(s) e = C(s)V. K(s) = W T K(s)V, B(s) (3.35) and Define e e K(s) e −1 B(s) e Then the reduced transfer function H(s) = C(s) satisfies the interpolation conditions (2.6). P If we use K (s) = K k=1 hk (s) Ak , B (s) = B, and C (s) = C for the affine structure we employ here, in Theorem 3.21, then (3.35) leads to a reduced model with ek = W T Ak V, for k = 1, . . . , K, B e = W T B, and C e = CV. A The question we want to answer next is how (and if) this projection-based reduced model is connected to the data-driven one we develop here. The next result provides the link. Proposition 3.22. The projection matrices W and V introduced in (3.34), based on the P matrix functions K (s) = K h (s) Ak , B (s) = B, and C (s) = C, satisfy the matrix k=1 k equations K K X X T T hk (M)W Ak = L C and Ak V hk (S) = BR, (3.36) k=1 k=1 as well as K X h0k (µi )[W T Ak V ]i,i = −θi (3.37) k=1 for those i with µi = σi . Proof. Let wi = W ei and v i = V ei denote the columns of the projection matrices W and V . For i = 1, . . . , n we have eTi K X hk (M)W T Ak = wTi k=1 K X hk (µi )Ak = `Ti C, k=1 which proves the first identity. The second identity is proven similarly whereas the third identity follows from the definitions of W and V and from ! K K X X 0 T T 0 hk (µi )[W Ak V ]i,i = wi hk (µi )Ak v i = −`Ti H 0 (µi )r i = −θi . k=1 k=1 Proposition 3.22 gives a better understanding of the realization of Corollary 3.6 connecting it to the projection-based MOR framework. To make this connection more precise, we will investigate the K = 2 and K ≥ 3 cases separately below. 21 3.6.1 The K = 2 case Using the identities W T B = F T and CV = G, we can rewrite (3.10), using K = 2, as e1 h1 (S) − h1 (M)A e1 h2 (S) = h2 (M)W T BR − LT CV h2 (S). h2 (M)A Substituting the expressions for BR and LT C from (3.36) into the right-hand side implies e1 h1 (S) − h1 (M)A e1 h2 (S) = h2 (M)W T A1 V h1 (S) − h1 (M)W T A1 V h2 (S), h2 (M)A e1 = W T A1 V as long as the interpolation sets {µi }n and which establishes the relation A i=1 e2 = W T A2 V is obtained by using (3.11) instead of {σi }ni=1 are disjoint. The identity A (3.10). Thus for K = 2, our structured realization approach gives exactly the reduced model one would obtain via projection if the original system matrices were to be available. This equivalence of the projected matrices and the matrices obtained by the realizations is also true if there are overlappings between the left and right interpolation point sets. This may be comprehended by the observation that the projected matrices also satisfy (3.14) which is clear due to Proposition 3.22. 3.6.2 The K ≥ 3 case Consider the second-order model H(s) = C(s2 A1 + sA2 + A3 )−1 B. For simplicity, assume that H(s) is SISO. Given the 2n interpolation points {µ1 , . . . , µn } and {σ1 , . . . , σn }, one e e 2A e1 + sA e2 + A e3 )−1 B e using can obtain a projection-based reduced model H(s) = C(s Theorem 3.21. This reduced model will interpolate H(s) at 2n interpolation points. e However, H(s) has 3n degrees of freedom1 and should be able to satisfy 3n interpolation conditions. The projection framework cannot achieve this goal. However, our structured realization framework with either additional data as in Section 3.4.1 or Hermite interpolation as in Section 3.4.2 will construct a reduced model that can match this maximum number of interpolation conditions. In other words, for K ≥ 3, the structured realization cannot be obtained via projection and indeed satisfies more interpolation conditions than the projection framework. Next we give a numerical example illustrating this discussion on a delay example. Example 3.23. We consider the system with affine structure h1 (s) = s, h2 (s) ≡ −1, and h3 (s) = − exp(−s) and matrices         1 0 1 0 1 1 A1 = , A2 = A3 = , b= , and c= 1 1 0 2 0 1 with transfer function H(s) = cT (sA1 − A2 − e−s A3 )−1 b. We set QF = 1 and QG = 2 and pick the driving frequencies µ1;1 = 0, σ1;1 = 1, and σ2;1 = −1. We want to make use e = 1, C e = 1, PF ,1 = f 1;1 , PG,1 = g 1;1 , and PG,2 = g 2;1 . of the system (3.23), i. e., we set B Altogether, the solution of the system (3.23) is given by     (1− 1e )2 (e−1)(e+2)(e+3) 1 e e − + + A1 e 2−e −5−2e   1 e  1− 1e (e+2)(e+3)  . 1 = A  2 1  −e − e − e−2 −  −5−2e 2−e− e 1 e 1− e (e+2)(e+3) A3 2 + e−2 + −5−2e e2 = e3 ; and hence the realization cannot be obtained via projection. Clearly, A 6 A e e1 + C e2 )(s2 A e1 + sA e2 + A e3 )−1 B, e i. e., not only the state x(t) but A second-order model with H(s) = (sC also the velocity ẋ(t) is measured, has 4n degrees of freedom. But here we do not consider this case. 1 22 4 Examples To illustrate the consequences of the preceding theoretical discussion, we compare various structured realizations against the standard Loewner realization framework, using in each case response data that is presented as in (2.5). In all the following examples, H(s), e L (s), H e A (s), and H e H (s) will denote, respectively: the transfer function of the original H model, the rational approximation via the standard Loewner realization, the structured realization interpolating at additional points (section 3.4.1), and the structured realization satisfying Hermite interpolation conditions(section 3.4.2). In the following plots, we represent interpolation data with circles. Additional driving frequencies used for the structured realization interpolating additional points are presented as diamonds. The results presented in the previous sections are valid for the general MIMO case, however, for simplicity, we restrict ourselves to SISO examples. Accordingly, the P matrices needed e A and H e H have been chosen as in (3.22) and as the for the realizations corresponding to H analogue for the Hermite case which is PF := diag(F), PG := diag(G), PF 0 := diag(F 0 ), and PG 0 := diag(G 0 ). Example 4.1. We test our approaches with the delay model from [7] given by the N × N matrices     1 1 1 1 A1 = νIN + T, A2 = + 1 (T − νIN ), A3 = − 1 (T − νIN ), τ ζ τ ζ where T is an N × N matrix with ones on the sub- and superdiagonal, at the (1, 1), and at the (N, N ) position and zeros everywhere else. The hk ’s are given by h1 (s) = s, h2 (s) ≡ −1, and h3 (s) = −e−τ s . We choose N = 500, τ = 1, ζ = 0.01, and ν = 5. The input matrix B ∈ RN has ones in the first two components and zeros everywhere else and we choose C = B T . We pick n = 4 logarithmically equidistant points on the imaginary axis between 1ı and 100ı (indicated as circles in Figure 4.1a) together with their complex conjugates. For the additional point framework (section 3.4.1) we set QF = 1 and QG = 2, such that we have two additional interpolation points (diamonds in Figure 4.1a) plus their complex conjugates. The Bode plots of the transfer functions and of the errors are illustrated for the different approaches in Figure 4.1a and Figure 4.1b, respectively. Both of our approaches capture the dynamics of the full model (the graphs are almost on top of that of the original model) and clearly outperform the Loewner realization. This is supported by the H∞ errors for the different realizations presented in Table 4.1 - given also for other choices of n. Table 4.1: Example 4.1 - H∞ errors of the different realizations n Loewner Additional points Hermite 4 6 8 10 2.342312e-01 2.449003e-01 3.397454e-01 5.561860e-01 4.496194e-02 5.100268e-02 4.673353e-02 4.454640e-02 4.011660e-02 4.116856e-02 4.307346e-02 3.694951e-02 Clearly, the choice of the complex driving frequencies µi and σj is important and should be investigated further, but this is not within the scope of this paper. 23 100 Original Loewner Additional points Hermite |H(ıω)| 10−1 10−2 10−3 10−4 100 101 102 103 freq (rad/sec) eL, H e A , and H eH . (a) Bode plot of H, H |H(ıω)| 10−2 10−5 10−8 Loewner Additional points Hermite 10−11 10−14 100 101 102 103 freq (rad/sec) eL, H e A , and H eH . (b) Bode plot of the absolute errors of H Figure 4.1: Example 4.1 - Transfer functions of the different realizations with n = 4 Example 4.2 (Example 1.1 continued). We generate data for this model using a model for acoustic transmission in a duct presented by Curtain and Morris in [14]. Based on a PDE model, Curtain and Morris derive an analytic transfer function for this problem: H(s) = ρ0 sinh((L − ξ0 )s/c)/ cosh(Ls/c), where ρ0 is the air density. For our case, we assign parameter values: L = 1, ξ0 = 1/2, c = 1, and ρ0 = 1 and generate data by sampling the Curtain-Morris transfer function on the imaginary axis between 0.1ı and 10ı (see Figure 4.2a). To keep the realization real we add the complex conjugate driving frequencies. We seek structurally equivalent realizations to the hypothesized structure from Example 1.1 that will interpolate this data. The frequency response of the original transfer function H(s) together with the different structurally equivalent realizations is presented in Figure 4.2a. The relative error plot Figure 4.2b shows that structured realizations in this case outperform the Loewner realization by several orders of magnitude. It is noteworthy that the exact transfer function can be written in accordance with the hypothesized 24 103 Original Loewner Additional points Hermite 102 |H(ıω)| 101 100 10−1 10−2 10−3 −1 10 100 101 102 freq (rad/sec) (a) Bode plot of the acoustic transmission model and the structured realizations 103 Loewner Additional points Hermite |H(ıω)| 10−1 10−5 10−9 10−13 −1 10 100 101 102 freq (rad/sec) (b) Relative error plot for the different realizations Figure 4.2: Example 4.2 - Bode and relative error plot for n = 16 structure using matrices cT = [ 0 0 0 ρ0 ],    1 0 0 0 0 0 1 0 0 0   A1 =  0 0 1 0 , A2 =  0 0 1 0 1 −1 bT = [ 1 0 0 0 ] and   0 0 0 0 0 0 −1 0  , A3 =  0 0 0 0 0 0 0 −1 0 0 0 0  0 0 0 0 . 0 −1 0 0 Example 4.3. A heated rod with distributed control and homogeneous Dirichlet boundary conditions, which is cooled by delayed feedback, can be modeled (cf. [10, 29]) as ∂v(ξ, t) ∂ 2 v(ξ, t) = + a1 (ξ)v(ξ, t) + a2 (ξ)v(ξ, t − 1) + u(t) ∂t ∂ξ 2 v(0, t) = v(π, t) = 0 25 in (0, π) × (0, T ], in [0, T ] (4.1) For the coefficient functions we choose a1 (ξ) = −2 sin(ξ) and a2 (ξ) = 2 sin(ξ). Discretization of (4.1) via centered finite differences with step size h := Nπ+1 yields the system ẋ(t) = (LN + A1,N )x(t) + A2,N x(t − 1) + Bu(t), y(t) = Cx(t), where LN ∈ RN ×N is the discrete Laplacian and A1,N , A2,N ∈ RN ×N are discrete approximations of the functions a1 and a2 , respectively. The input matrix B ∈ RN is a vector of 1 ones. As output we use the average temperature of the rod, i. e, C = kBk B T . For our tests 101 Original Loewner Additional points Hermite |H(ıω)| 100 10−1 10−2 10−3 10−1 100 101 freq (rad/sec) 102 103 eL, H e A , and H eH . (a) Bode plot of H, H 10−1 |H(ıω)| 10−3 10−5 10−7 Loewner Additional points Hermite 10−9 10−1 100 101 freq (rad/sec) 102 103 eL, H e A , and H eH . (b) Bode plot of the absolute errors of H Figure 4.3: Example 4.3 - Transfer functions of the different realizations with n = 4 we use N = 100 and n = 4 interpolation points on the imaginary axis between 10−1 ı and 103 ı together with their complex conjugates. For the realization obtained by interpolating additional data we use the same settings as in Example 4.1. Similarly as in Example 4.1, our approaches are the only ones that capture the qualitative behavior of the original system (cf. Figure 4.3). This is true for all tested numbers of interpolation data n and is 26 Table 4.2: Example 4.3 - H∞ errors for the different realizations n Loewner Additional points Hermite 4 6 8 10 5.863023e-01 7.118732e-01 2.735014e-01 2.110771e-01 1.596379e-01 4.716281e-01 3.020142e-02 1.796065e-01 1.751535e-01 7.580182e-02 3.725486e-02 4.085510e-02 further illustrated by the H∞ errors listed in Table 4.2. For this example the difference is not as striking as in the two preceding examples, which are much harder to approximate with a rational transfer function of low degree. Example 4.4. The full model comes from a finite element discretization of a cantilevered Euler-Bernoulli beam [22, §1.16], resulting in a second order system having the form A1 ẍ(t) + A2 ẋ(t) + A3 x(t) = Bu(t), y(t) = Cx(t). This is a SISO system (m = 1 and p = 1) with N = 400 internal degrees of freedom. The input u(t) represents a point force applied to the state x1 (B = e1 ), while the output is the displacement history at xN (C = eTN ). The damping matrix A2 models light proportional damping: A2 = α1 A1 + α2 A2 with α1 = α2 = 0.05. The realizations are obtained for n = 30 complex driving frequencies on the imaginary axis between 10−5 ı and 102 ı together with their complex conjugates (see upper part of Figure 4.4). Since the transfer function of the original model is a rational transfer function unlike in the previous example, we expect the Loewner realization to perform close to our proposed approach here, which is indeed the case as illustrated in Figure 4.4. The figure shows that both the Loewner realization and the structured realization with additional interpolation points capture the transfer function of the original model quite accurately. driving frequencies additional interpolation points |H(iω)| 100 10−1 10−2 10−5 Original Loewner Additional points 10−4 10−3 10−2 10−1 freq (rad/sec) 100 101 e L and H e A with n = 30 Figure 4.4: Example 4.4 - Bode plot of H 27 102 10−1 10−2 |H(ıω)| 10−3 10−4 10−5 10−6 Loewner Additional points 10−7 10−8 −5 10 10−4 10−3 10−2 10−1 freq (rad/sec) 100 101 102 e L (s) and H e A (s) (a) Bode plot of the absolute error of H 101 |H(ıω)| 10−1 Loewner stable Loewner unstable Additional points stable Additional points unstable 10−3 10−5 10−7 10−5 10−4 10−3 10−2 10−1 freq (rad/sec) 100 101 102 e L (s) and H e A (s) (b) Bode plot of the stable and unstable part of H Figure 4.5: Example 4.4 - Transfer functions of the realizations with n = 30. However, the error plot in Figure 4.5a clearly shows the superior behavior of our approach, e A (s) is one order of magnitude especially for higher frequencies; the maximum error due to H e smaller than the error due to HL (s). We conclude with a remark on the stability of the reduced models. As one expects, stability of the reduced model in the Loewner framework depends on the quality of the interpolation (sampling) points. The Loewner framework does not guarantee a stable reduced model in general. For a better selection of points (in some cases, optimal) one can, for example, combine the Loewner framework with interpolatory H2 optimal methods as done in [8]. For cases where the Loewner model is unstable, [19] offers various effective post-processing techniques allowing to extract a stable model while not losing much accuracy. One solution is simply to discard the unstable part of the resulting model. Indeed, this choice can be shown to be the best solution in minimizing an H2 -related distance; see, for example, [19, 24, 26] for details. For this beam example, both the Loewner and our approach yield unstable reduced models. Following [19], we 28 then checked how much the stable and unstable parts of the reduced models contribute to the approximation. For both models, the unstable part has only a minor, negligible contribution as illustrated in Figure 4.5b, where the frequency response plots for the stable and unstable part of the Loewner realization and the structured realization obtained with additional data are displayed. For this example, simply truncating the anti-stable part of the reduced models and taking only the stable part as the approximation causes e A (s), while the L∞ norm of the antistable part is almost no loss in accuracy. Indeed, for H −6 8.8882 × 10 , the H∞ norm of the stable part is 1.8799. It appears that this unstable part is due to near non-minimality of the reduced models. We computed poles and zeros e A (s), and observed that the unstable poles are very nearly matched by corresponding of H zeros as listed in Table 4.3 below: Table 4.3: Example 4.4 - Near pole-zero cancellation Poles Zeros 10−1 2.87548 × 10−1 1.94274 × 10−1 ± ı2.83070 × 10−1 5.39018 × 10−2 ± ı3.51431 × 10−1 2.87550 × 1.94273 × 10−1 ± ı2.83074 × 10−1 5.39041 × 10−2 ± ı3.51432 × 10−1 Unlike the case for the Loewner framework, we cannot simply take the stable-part of e A (s) as the approximant, since this truncation is performed after conversion to first-order H form and destroys the structure we are seeking to retain. For many examples, including the previous ones considered here, no equivalent, generic, finite-dimensional, first-order structure exists. Therefore, one might consider modifying Algorithm 1 so that these near pole-zero cancellations can be detected during the construction and removed without destroying structure. This is not the focus of this paper and is deferred to a later work. 5 Conclusion We have introduced a new framework for structured realizations that are derived from input/output data obtained by measurements of an (unknown) transfer function. The e PK hk (s)A ek )−1 B, e which allows for a variety of different models obtained have the form C( k=1 structures such as internal delays or second order systems. If the chosen structure is a generalized state space representation then our framework coincides with the Loewner realization [27]. In this sense, our work can be seen as an extension of the Loewner framework to more general system structures. Indeed, for K = 2 we showed that structured realizations can be obtained directly via the Loewner framework with transformed data. Based on necessary and sufficient conditions for interpolation, we have offered two strategies for the more general case K > 2, the first allowing for interpolation at additional interpolation points and the second allowing for additional interpolation of derivative information of the transfer function. The remarkable effectiveness of such structured realizations is demonstrated through several examples. 29 References [1] A. C. Antoulas. Approximation of Large-Scale Dynamical Systems. SIAM, Philadelphia, PA, USA, 2005. [2] A. C. Antoulas, C. A. Beattie, and S. Gugercin. Interpolatory model reduction of large-scale dynamical systems. In J. Mohammadpour and K. M. Grigoriadis, editors, Efficient Modeling and Control of Large-Scale Systems, pages 3–58. Springer, New York, NY, USA, 2010. [3] A. C. Antoulas, A. C. Ionita, and S. Lefteriu. On two-variable rational interpolation. Linear Algebra Appl., 436:2889–2915, 2012. [4] A. C. Antoulas, S. Lefteriu, and A. C. Ionita. A tutorial introduction to the Loewner framework for model reduction. In P. Benner, A. Cohen, M. Ohlberger, and K. Willcox, editors, Model Reduction and Approximation for Complex Systems. Birkhäuser, Basel, Switzerland, to appear. [5] A. C. Antoulas, D. C. Sorensen, and S. Gugercin. A survey of model reduction methods for large-scale systems. Contemp. Math., 280:193–219, 2001. [6] U. Baur, P. Benner, and L. Feng. Model order reduction for linear and nonlinear systems: A system-theoretic perspective. Arch. Comput. Methods Eng., 21(4):331–358, 2014. [7] C. Beattie and S. Gugercin. Interpolatory projection methods for structure-preserving model reduction. Systems Control Lett., 58(3):225–232, 2009. [8] C. Beattie and S. Gugercin. Realization-independent H2 -approximation. In Proc. 51st IEEE Conf. Decision Control (CDC), pages 4953–4958, Maui, HI, USA, 2012. [9] C. A. Beattie and B. Benner. H2 -optimality conditions for structured dynamical systems. Preprint MPIMD/14-18, Max Planck Institute Magdeburg, Germany, 2014. Available from http://www.mpi-magdeburg.mpg.de/preprints/. [10] D. Breda, S. Maset, and R. Vermiglio. Numerical approximation of characteristic values of partial retarded functional differential equations. Numer. Math., 113(2):181–242, 2009. [11] Y. Chahlaoui, K. A. Gallivan, A. Vandendorpe, and P. Van Dooren. Model reduction of second-order systems. In P. Benner, V. Mehrmann, and D. C. Sorensen, editors, Dimension Reduction of Large-Scale Systems, pages 149–172. Springer, Berlin/Heidelberg, Germany, 2005. [12] S. Chaturantabut, C. Beattie, and S. Gugercin. Structure-preserving model reduction for nonlinear port-Hamiltonian systems. To appear in SIAM J. Sci. Comput., 2016. Available as arXiv:1601.00527. [13] E. W. Cheney. Introduction to Approximation Theory. Chelsea, New York, NY, USA, second edition, 1982. [14] R. Curtain and K. Morris. Transfer functions of distributed parameter systems: A tutorial. Automatica, 45(5):1101–1116, 2009. [15] Z. Drmač, S. Gugercin, and C. A. Beattie. Quadrature-based vector fitting for discretized H2 approximation. SIAM J. Sci. Comput., 37(2):A625–A652, 2015. 30 [16] I. Pontes Duff, S. Gugercin, C. Beattie, C. Poussot-Vassal, and C. Seren. H2 -optimality conditions for reduced time-delay systems of dimension one. IFAC-PapersOnLine, 49(10):7–12, 2016. Proc. 13th IFAC Workshop Time Delay Systems (TDS) 2016, Istanbul, Turkey, 22-24 June 2016. [17] I. Pontes Duff, C. Poussot-Vassal, and C. Seren. Realization independent single time-delay dynamical model interpolation and H2 -optimal approximation. In Proc. 54th IEEE Conf. Decision Control (CDC), pages 4662–4667, Osaka, Japan, 2015. [18] R. W. Freund. Structure-preserving model order reduction of RCL circuit equations. In W. H. A. Schilders, H. A. van der Vorst, and J. Rommes, editors, Model Order Reduction: Theory, Research Aspects and Applications, pages 49–73. Springer, Berlin/Heidelberg, Germany, 2008. [19] I. V. Gosea and A. C. Antoulas. Stability preserving post-processing methods applied in the Loewner framework. In Proc. 20th IEEE Workshop Signal Power Integrity (SPI), pages 1–4, Turin, Italy, 2016. [20] S. Gugercin, A. C. Antoulas, and C. Beattie. H2 model reduction for large-scale linear dynamical systems. SIAM J. Matrix Anal. Appl., 30(2):609–638, 2008. [21] B. Gustavsen and A. Semlyen. Rational approximation of frequency domain responses by vector fitting. IEEE Trans. on Power Del., 14(3):1052–1061, 1999. [22] Thomas JR Hughes. The Finite Element Method: Linear Static and Dynamic Finite Element Analysis. Courier Corporation, 2012. [23] A. C. Ionita and A. C. Antoulas. Data-driven parametrized model reduction in the Loewner framework. SIAM J. Sci. Comput., 36(3):A984–A1007, 2014. [24] M. Köhler. On the closest stable descriptor system in the respective spaces RH 2 and RH ∞ . Linear Algebra Appl., 443:34–49, 2014. [25] S. Lall, P. Krysl, and J. E. Marsden. Structure-preserving model reduction for mechanical systems. Phys. D, 184(1-4):304–318, 2003. [26] C. Magruder, C. A. Beattie, and S. Gugercin. Rational Krylov methods for optimal H2 model reduction. In Proc. 49th IEEE Conf. Decision Control (CDC), pages 6797–6802, Atlanta, GA, USA, 2010. [27] A. J. Mayo and A. C. Antoulas. A framework for the solution of the generalized realization problem. Linear Algebra Appl., 425(2-3):634–662, 2007. [28] D. G. Meyer and S. Srinivasan. Balancing and model reduction for second-order form linear systems. IEEE Trans. Automat. Control, 41(11):1632–1644, 1996. [29] W. Michiels, E. Jarlebring, and K. Meerbergen. Krylov-based model order reduction of time-delay systems. SIAM J. Matrix Anal. Appl., 32(4):1399–1421, 2011. [30] B. Moore. Principal component analysis in linear systems: Controllability, observability, and model reduction. IEEE Trans. Automat. Control, 26(1):17–32, 1981. [31] C. Mullis and R. Roberts. Synthesis of minimum roundoff noise fixed point digital filters. IEEE Trans. Circuits Syst., 23(9):551–562, 1976. [32] P. Schulze and B. Unger. Data-driven interpolation of dynamical systems with delay. Systems Control Lett., 97:125–131, 2016. 31 [33] T.-J. Su and R. R. Craig Jr. Model reduction and control of flexible structures using Krylov vectors. J. Guid. Control Dynam., 14(2):260–267, 1991. 32
3cs.SY
Semi-Supervised linear regression arXiv:1612.02391v1 [math.ST] 7 Dec 2016 David Azriel1 , Lawrence D. Brown2 , Michael Sklar3 , Richard Berk2 , Andreas Buja2 and Linda Zhao2˚ Technion – Israel institute of Technology1 , Wharton – University of Pennsylvania2 and Stanford University3 Abstract We study a regression problem where for some part of the data we observe both the label variable (Y ) and the predictors (X), while for other part of the data only the predictors are given. Such a problem arises, for example, when observations of the label variable are costly and may require a skilled human agent. If the conditional expectation ErY |Xs is exactly linear in X then typically the additional observations of the X’s do not contain useful information, but otherwise the unlabeled data can be informative. In this case, our aim is at constructing the best linear predictor. We suggest improved alternative estimates to the naive standard procedures that depend only on the labeled data. Our estimation method can be easily implemented and has simply described asymptotic properties. The new estimates asymptotically dominate the usual standard procedures under certain non-linearity condition of ErY |Xs; otherwise, they are asymptotically equivalent. The performance of the new estimator for small sample size is investigated in an extensive simulation study. A real data example of inferring homeless population is used to illustrate the new methodology. 1 Introduction The term “semi-supervised learning” was coined in the machine learning literature to describe a situation in which some of the data is labeled while the rest of the data is unlabeled (Merz et al., 1992). Such situations occur when the label variable is difficult to observe and may require a complicated or expensive procedure. A typical example is web document classification, where the classification is done by a human agent while there are many more unlabeled on-line documents. Specifically, a sample of n observations from the joint distribution of pX, Y q is given, where Y is a one-dimensional label variable and X is a p-dimensional vector of covariates or predictors. Also, an additional sample of size m is observed where only X is given. The purpose is to study procedures that make use of the additional unlabeled data to better capture the shape of the underlying joint distribution of the labeled data. ˚ Corresponding author: David Azriel, [email protected]. The work of Lawrence D. Brown and Linda Zhao was supported in part by NSF grant DMS-1512084 1 A large body of literature focuses on the case that Y takes a small number of values and the problem reduces to a classification task; see e.g., Zhu (2005) and references therein. Wang et al. (2009) divide the different methods into two approaches: distributional and margin-based. The distributional approach relies on an assumption relating the conditional expectation ErY |Xs to the marginal distribution of X and the margin-based approach uses the extra information on X for estimating the Bayes decision boundary; see Liang et al. (2008) for a Bayesian perspective within this basic approach. Other works consider continuous Y ’s and use the unlabeled data to learn the structure of the X’s in order to better estimate a non-parametric regression (Zhou, 2005; Lafferty and Wasserman, 2008; Johnson and Zhang, 2008). These works could be very helpful in situations where non-parametric regression is useful and unlabeled data are available. Here we follow a third methodology. This methodology makes use of possible unmodeled non-linearities in EpY |Xq and adapts information from the unlabeled data to partially adjust for these. In a recent manuscript, Chakrabortty and Cai (2016) follow the same methodological plan but the technical details within their approach are then quite different from ours. Their estimates offer some advantages and some disadvantages in relation to ours, which we intend to explore in a future study. We aim at estimating the vector β composed of the parameters of the best linear predictor of Y , but we do not necessarily assume that ErY |Xs is exactly linear in X. The estimates of β can then be used to provide predictions. The standard approach in the statistical literature may be best summarized by the following quote from Little (1992): The related problem of missing values in the outcome Y was prominent in the early history of missing-data methods, but is less interesting in the following sense: If the X’s are complete and the missing values of Y are missing at random, then the incomplete cases contribute no information to the regression of Y on X1 , . . . , Xp . But see Cochran (1977, Chapter 7) for a different view more closely in tune with our development. Buja et al. (2016) show that β does not depend on the distribution of X if and only if ErY |Xs is linear in X. When the conditional expectation is linear, there is typically at most a limited amount of additional information in the unlabeled data. Brown (1990) shows that even in this case there may be some useful information, but it will not provide an asymptotic advantage in the manner we suggest in the current treatment when the conditional expectation is not linear. The assumption that ErY |Xs is linear is unrealistic in many situations, and we show that in the absence of such an assumption the unlabeled sample can be used to provide useful information for the estimation of β. We consider two scenarios. In the first one the distribution of X is known exactly. This is equivalent to having infinitely many unlabeled observations (m “ 8). In the second, more frequently encountered, 2 scenario m ă 8 but it is still significant in the sense that m{n is bounded away from 0. We call these two scenarios total and partial information, respectively. In both situations we provide an asymptotically better estimate of β than the standard least squares estimator, and hence also a better linear predictor. Our new procedure is closely related to the semi-supervised estimations of means, which is the topic of a recent manuscript (Zhang et al., 2016). To understand our basic methodology, consider the simple linear regression model, Y “ α ` βX ` δ, (1) where α, β are least squares coefficients and δ is a remainder term; these will be defined in more detail shortly. When EpXq and EpX 2 q are known, we construct an estimator of β that asymptotically dominates the least squares estimator. This is done by replacing model (1) with a different model where β is the intercept and also the expectation of the newly defined label variable. For this latter model, Zhang et al. (2016) show that the intercept estimator dominates the simple empirical estimate in a semi-supervised setting. We use their ideas to show that the intercept estimator in this new model is better than the least squares estimator from the original model as explained below. To present the intercept model and the methodology, begin by stating the general form of the best linear approximation. The approximation is used in two different models, and therefore we introduce now the notation U and W instead of X and Y . Suppose that W P R and U P Rd are random variables with joint distribution G and finite second moments. The best linear predictor is T θ “ pθ1 , . . . , θd q “ arg minθ̃PRd EpW ´ d ÿ j“1 (´1 EpUW q. Uj θ̃j q2 “ EpUUT q Notice that this is a population version of the least squares where řd j“1 Uj θ̃j (2) minimizes the L2 distance in the population from W to any linear function of U. It follows that W “ where the remainder term r “ W ´ řd j“1 θj Uj d ÿ j“1 θj Uj ` r, (3) is orthogonal to U, i.e., EprUq “ 0. Given a sample of n observations from G, the standard least squares estimate, θ̂ LSE , satisfies asymptotically (White, 1980) ? ´ (´1 ` 2 ˘ (´1 ¯ D . npθ̂ LSE ´ θq ÝÑ N 0, EpUUT q E r UUT EpUUT q (4) (´1 Unlike the standard fixed X assumption, the asymptotic variance has a “sandwich” form, EpUUT q ` ˘ forming the “bread” and E r 2 UUT the “meat”. See Buja et al. (2016) for further discussion of this form of the sandwich. 3 We now return to model (1) and assume that EpXq and EpX 2 q are known. We can therefore assume w.l.o.g that X is standardized (i.e., EpXq “ 0 and EpX 2 q “ 1). In this case we can write model (1) with α “ EpY q, β “ EpXY q and δ “ Y ´ pα ` βXq; here we consider model (3) with W “ Y , U1 “ 1, U2 “ X and the remainder term is r “ δ. The standard LSE is a consistent estimate for β and satisfies, according to (4), ? ( D npβ̂LSE ´ βq ÝÑ N 0, EpδXq2 . Our aim it to better estimate β “ EpXY q. To this end, we multiply (1) by X setting XY to be the labeled variable W . Furthermore, we also center the varibale U setting EpXY q “ β to be the intercept. Specifically, XY “ αX ` βX 2 ` Xδ “ β ` aX ` bpX 2 ´ 1q ` δ̃. (5) Now we consider model (3) with W “ XY , U1 “ 1, U2 “ X, U3 “ X 2 ´ 1 and r “ δ̃; here a, b are θ2 , θ3 defined by (2). In setting β “ EpXY q to be the intercept coefficient we used that EX “ EpX 2 q ´ 1 “ 0, i.e., that we know the first and second moment of X. We define our new estimator, β̂T I (TI for total information), to be the intercept estimator of (5). This estimate has a simple closed formula, which is given below in (14). The sandwich theorem (4) implies that ? D npβ̂T I ´ βq ÝÑ N p0, E δ̃2 q. Since δX ´ δ̃ “ Xpa ´ αq ` pX 2 ´ 1qpb ´ βq is a linear function of X, X 2 , then it is orthogonal to the remainder term of (5), which is δ̃, (i.e., EpδX ´ δ̃qδ̃ “ 0) and therefore, EpδXq2 “ Etδ̃ ` pδX ´ δ̃qu2 “ E δ̃2 ` EpδX ´ δ̃q2 . (6) This implies that the asymptotic variance of β̂T I is smaller than that of β̂LSE with equality iff δX ” δ̃. The latter occurs iff α “ a and b “ β or equivalently that δ is uncorrelated with both X 2 and X 3 . This occurs when the non-linear part of ErY |Xs (if exists) is uncorrelated with X 2 and X 3 . In this case, Models (1) and (5) are essentially the same model and nothing is gained in the new methodology. On the other hand, when δ is correlated with either X 2 or X 3 , then Models (1) and (5) are different and β̂T I has smaller asymptotic variance than β̂LSE . We further show that a similar decomposition to (6) holds for the partial information case and we generalize the results to the p-dimensional case. The rest of the paper is organized as follows. Section 2 provides the basic setting the and loss functions that we use. The main results are given in Section 3. Section 4 describes an extensive simulation study and Section 5 discusses estimation of the asymptotic covariance matrix of the estimates. An implementation of the new methodology to infer homeless population in Los Angeles is discussed in Section 6. Section 7 concludes with final remarks. The proofs are given in Section 8. 4 2 Preliminaries Consider a sample of n i.i.d observations pXp1q , Y p1q q, . . . , pXpnq , Y pnq q from a joint distribution G, where X P Rp , Y P R, and an additional set of m independent observations pXpn`1q . . . , Xpn`mq q from the marginal distribution of X. We use super-index to denote the number of the observation, and sub-index to denote coordinates of X. The notation X, Y without super-index denotes a random vector whose distribution is G. ~ “ p1, X1 , . . . , Xp qT to be a vector X with an additional constant 1 to accommodate an We write X ´ ¯ ~X ~ T is invertible. intercept term. Assume that the second moments of G exists and that the matrix E X Then, we can define ! ´ ¯)´1 ´ ¯ T ~ ~ ~ pα, βq “ arg minα̃PR,β̃PRp EpY ´ α̃ ´ β̃ Xq “ E XX E XY . T 2 (7) In the presence of non-linearity, β is still a meaningful parameter that describes the overall association between Y and X (Buja et al., 2016). We have in mind two related purposes. The first purpose is just to better estimate the parameters of interest, while the second purpose pertains to prediction. The latter is formalized now. Suppose that an independent observation pX˚ , Y ˚ q „ G is given. The optimal linear predictor is α ` β T X ˚ . We consider the excess loss of an estimator α̃, β̃ ¯2 ` ´ ˘2 T Lpα̃, β̃q “ Y ˚ ´ α̃ ´ β̃ X˚ ´ Y ˚ ´ α ´ β T X˚ . We have that (see Lemma 1) p ı2 ! ) ” ÿ β̃j tX̄j ´ EpXj qu ´ EpY q ` E pβ ´ β̃qT Mpβ ´ β̃q “ E L̃pα̃, β̃q, ELpα̃, β̃q “ E Ȳ ´ j“1 where L̃ is the expression inside the expectation and M is the covariance matrix of X. We further define the asymptotic risk as Rpα̃, β̃q “ lim lim E mintnL̃pα̃, β̃q, Bu. BÑ8 nÑ8 The loss is of order 1{n and therefore we consider expectation of nL̃. This is truncated by an arbitrarily large number B, since when the loss is large, it makes sense not to penalize any further. Also, the truncation helps to avoid issues of uniform integrability. This is done for example in Le Cam and Yang (1990), Chapter 5. The following proposition provides a simple expression for the asymptotic risk. Proposition 1. Let α̃, β̃ satisfies α̃ “ Ȳ ´ ? D p ÿ β̃j X̄j , j“1 npβ̃ ´ βq ÝÑ N p0, Σq then, p ı2 ” ÿ βj tXj ´ EpXj qu ´ EpY q ` TracepMΣq, Rpα̃, β̃q “ E Y ´ and assume that β̃ satisfies (8) j“1 5 (9) where M is the covariance matrix of X. The first term in (9) does not depend on the distribution of β̃. Hence, Proposition 1 shows that the excess risk is minimized when TracepMΣq is small. Thus, we aim at estimators β̃ with asymptotic distribution N p0, Σq such that Σ is “smaller” than the covariance matrix of LSE, in the sense that the difference is positive semidefinite. Such an estimator asymptotically better estimates β and also has smaller asymptotic excess risk. For two estimates pα̃p1q , β̃ p1q q and pα̃p2q , β̃ p2q q, Proposition 1 implies that ELpα̃p1q , β̃ p1q q ´ ELpα̃p2q , β̃ p2q ! ) q « Trace MpΣp1q ´ Σp2q q {n, and therefore the difference of the prediction errors is " " *2 *2 ´ p1q ¯T ´ p2q ¯T ! ) ˚ p1q ˚ ˚ p2q ˚ E Y ´ α̃ ´ β̃ X ´ E Y ´ α̃ ´ β̃ X « Trace MpΣp1q ´ Σp2q q {n. (10) It follows that the difference of the errors of the prediction of the mean is also " " *2 *2 ´ p1q ¯T ´ p2q ¯T ! ) ˚ ˚ p1q ˚ ˚ ˚ p2q ˚ E EpY |X q ´ α̃ ´ β̃ X ´E EpY |X q ´ α̃ ´ β̃ X « Trace MpΣp1q ´ Σp2q q {n. (11) Notice that we estimate the intercept, as in (8), using X̄j rather than the possibly known expectations EpXj q. This is in accordance with the findings of Zhang et al. (2016). 3 Main results In this section we provide the main theoretical results of the paper. Before we deal with the p-dimensional case, we first introduce the results for one-dimensional X. The reason is twofold: first, the presentation in the one-dimensional case is simpler and captures the main ideas, and second, our results for the pdimensional X are obtained by reducing the regression problem to p problems, each of which is closely related to the one dimensional X regression. 3.1 One dimensional X In this section we study the one dimensional case. Summary of the notation used here is presented in Table 1. When G has finite second moments we can write Y “ α ` βX ` δ, where α “ EpY q ´ βEpXq, β “ CovpX,Y q V arpXq (12) and δ “ Y ´ α ´ βX. Equation (12) is the best linear approximation in the population in the sense that α ` βX minimizes Epα̃ ` β̃X ´ Y q2 over all α̃, β̃ P R 6 and δ is orthogonal to 1, X, i.e., Epδq “ EpδXq “ 0. The regular LSE is řn piq ´ X̄qY piq i“1 pX . β̂LSE “ ř n piq ´ X̄q2 i“1 pX This is a consistent and asymptotically unbiased and asymptotically normal estimator for β. See Buja et al. (2016) for contemporary discussion. Table 1: Summary of the notation used in Section 3.1. Basic model Y “ α ` βX ` δ Intercept model W “ β ` aU1 ` bU2 ` δ̃ CovpX,Y q V arpXq and δ “ Y ´ α ´ βX X´EpXq tX´EpXquX ´1 V arpXq , U2 “ V arpXq α “ EpY q ´ βEpXq, β “ Y tX´EpXqu V arpXq , W “ U1 “ a, b are θ2 , θ3 defined by (2) for model (13) TI estimator PI estimator β̂T I “ W̄ ´ âŪ1 ´ b̂Ū2 ¯ ´ âǓ ¯ ´ b̂Ǔ ¯ β̂P I “ W̌ 1 2 1 n W̄ “ and δ̃ is the remainder term piq 1 řn piq i“1 W , Ū1 “ n i“1 U1 , Ū2 “ řn â, b̂ are the LSE of model (13) 1 n řn piq i“1 U2 ¯ , Ǔ¯ , Ǔ ¯ are the means over the labeled sample, W̌ 1 2 piq ´ĚpXqu piq tX piq ´ĚpXquY piq , Ǔ1 “ tX ~ ~ V arpXq V arpXq tX piq ´ĚpXquX piq ´ 1, â, b̂ are the LSE ~ V arpXq W̌ piq “ piq Ǔ2 “ of model (13) with W̌ , Ǔ1 , Ǔ2 instead of W, U1 , U2 n ν “ lim n`m n (m) the labeled (unlabeled) sample size 2 σLSE , σP2 I , σT2 I asymptotic variance of the LSE, PI, TI estimators Asymptotics Main results 2 σdiff 2 2 σLSE “ σT2 I ` σdiff 2 σP2 I “ σT2 I ` νσdiff as in Theorem 1 ı2 ” ´ δ̃ “ E δtX´EpXqu V arpXq For the total information estimator (TI) we consider the following regression model, which is obtained by multiplying (12) by X´EpXq V arpXq , W “ β ` aU1 ` bU2 ` δ̃, where W “ Y tX´EpXqu V arpXq , U1 “ X´EpXq V arpXq , U2 “ tX´EpXquX V arpXq (13) ´ 1, a, b are the coefficients θ2 , θ3 of the best linear approximation defined by (2) and δ̃ is the remainder term. Here again β ` aU1 ` bU2 is the best linear approximation of W in the population. The multiplication term makes the expectation of W to ı ” q “ CovpX,Y be E Y tX´EpXqu V arpXq V arpXq “ β. The covariates U1 , U2 are the predictors 1, X in (12) multiplied by X´EpXq V arpXq . We subtract 1 in U2 in order to set EpU2 q “ 0. Since EpU1 q “ EpU2 q “ 0, then the intercept is EpW q “ β. Thus, we define the total information estimator to be the intercept estimator of (13), i.e., β̂T I “ W̄ ´ âŪ1 ´ b̂Ū2 , 7 (14) where â, b̂ are the regular LSE of model (13), and ¯¨ denotes the mean over the supervised sample with n observations. For the partial information (PI) estimator we estimate W, U1 , U2 as follows: tX piq ´ ĚpXquY piq piq tX piq ´ ĚpXqu tX piq ´ ĚpXquX piq piq , Ǔ1 “ and Ǔ2 “ ´ 1 , i “ 1, . . . , n, V} arpXq V} arpXq V} arpXq 1 řn`m 1 řn`m piq } 2 2 2 piq 2 where ĚpXq “ n`m i“1 X , V arpXq “ ĚpX q ´ tĚpXqu , and ĚpX q “ n`m i“1 tX u . The W̌ piq “ partial information estimator is ¯ ´ âǓ ¯ ´ b̂Ǔ ¯ , β̂P I “ W̌ 1 2 where â, b̂ are the regular LSE of the regression model (13) with W̌ , Ǔ1 , Ǔ2 instead of W, U1 , U2 . (The estimates â, b̂ are different in the total and partial information cases but the same notation is presented for simplicity.) We use ¯¨ (respectively, ˇ¨) to denote empirical mean with respect to the labeled n (respectively, full n ` m) sample. The following theorem states the asymptotic distribution of β̂LSE , β̂T I and β̂P I . The first part of the theorem is known and is stated here for comparison purposes. Theorem 1. (i) Suppose that V arpXq P p0, 8q and that δtX ´ EpXqu has finite second moment, then, 2 where σLSE “E ” δ2 tX´EpXqu2 tV arpXqu2 ı . ? D 2 npβ̂LSE ´ βq ÝÑ N p0, σLSE q, (ii) Suppose further that the vector pW, U1 , U2 q has finite second moments and that the matrix EpUUT q is invertible for U “ p1, U1 , U2 qT . Then, ? 2 where σT2 I “ Epδ̃2 q and σLSE “ σT2 I D npβ̂T I ´ βq ÝÑ N p0, σT2 I q, ” ı2 2 “ E δtX´EpXqu ´ δ̃ . 2 where σdiff ` σdiff V arpXq n “ ν, then, (iii) Suppose further that lim n`m ? D npβ̂P I ´ βq ÝÑ N p0, σP2 I q, 2 . where σP2 I “ σT2 I ` νσdiff 2 2 2 ą 0 then σ 2 ă σ 2 Therefore, if σdiff TI LSE and if further ν ă 1 then σP I ă σLSE . 2 V arpXq. Corollary 1. Theorem 1 and Proposition 1 imply that Rpα̂LSE , β̂LSE q´Rpα̂P I , β̂P I q “ p1´νqσdiff 2 ą 0. The quantity The improvement of β̂T I and β̂P I over β̂LSE depends on the assumption that σdiff 2 measures the difference between the original regression model (12) and the intercept model (13). If σdiff EpδX 2 q “ EpδX 3 q “ 0 then a “ α and b “ β and the two models are essentially the same, in which 2 “ 0, otherwise σ 2 ą 0. In other words, when ErY |Xs is non-linear and the non-linear part is case σdiff diff 2 ą 0. correlated with either X 2 or X 3 then σdiff 8 3.2 Multidimensional X We now consider the general p-dimensional case as described in the beginning of Section 2. The notation of this section is summarized in Table 2. The model can be written as Y “ α ` β1 X1 ` ¨ ¨ ¨ ` βp Xp ` δ, (15) where α, β are the coefficients of the best linear predictor in the population defined by (7). The remainder ř term δ “ Y ´ pj“1 βj Xj satisfies Epδq “ EpδX1 q “ ¨ ¨ ¨ “ EpδXp q “ 0. Our aim here is at estimating β. We use the adjustment representation of Buja et al. (2016) that reduces the p-dimensional estimation procedure to p separate simple regression problems. Correspondingly, we will define our new estimates by solving p mean-estimation-problems separately, one for each coordinate j. ~ ´j “ p1, X1 , . . . , Xj´1 , Xj`1 , . . . , Xp qT and let Let X ¯2 ! ´ ´ ¯)´1 ´ ¯ T ~ ´j “ E X ~ ´j X ~T ~ ´j Xj . β ´j‚ “ arg min E Xj ´ β̃ X E X ´j (16) β̃ EpY Xj‚ q 2 q . EpXj‚ p1q pnq pXj , . . . , Xj qT ~ T β ´j‚ . Each βj can be written in the one dimensional form βj “ Now, define Xj‚ “ Xj ´ X ´j The standard LSE can be viewed in a similar manner. Let Y “ pY p1q , . . . , Y pnq qT , Xj “ )´1 ! and let X´j “ p1, X1 , . . . , Xj´1 , Xj`1 , . . . , Xp q. Define also β̂ ´j¯‚ “ XT´j X´j XT´j Xj and Xj¯‚ “ Xj ´ X´j β̂ ´j¯‚ ; then, tβ̂ LSE uj “ xY,Xj¯‚ y ||Xj¯‚ ||2 . ‚ Recall that ¯¨ denotes mean over the labeled sample; thus, ¯ denotes adjustments over the labeled sample, whereas ‚ denotes adjustments over the population. The total information estimator is the intercept estimator of the regression model in the population obtained by multiplying (15) by Xj‚ 2 q, EpXj‚ that is, Wj “ βj ` aU1 ` p ÿ j 1 “1 bj 1 Uj 1 `1 ` δ̃j , (17) where Wj “ Xj 1 Xj‚ Y Xj‚ Xj‚ Xj Xj‚ 1 , U1 “ , Uj 1 `1 “ 2 2 2 q for j ‰ j, and Uj`1 “ EpX 2 q ´ 1 EpXj‚ q EpXj‚ q EpXj‚ j‚ are Y, 1, X1 , ¨ ¨ ¨ , Xp multiplied by Xj‚ 2 q EpXj‚ (18) and a, b are θ2 , . . . , θp`1 defined by (2) for W “ Wj and U “ pU1 , . . . , Up`1 q. Since EpU1 q “ ¨ ¨ ¨ “ EpUp`1 q “ 0, then the intercept is EpWj q “ βj . In setting EpWj q “ βj and also the expectations of the U ’s to be zero, we exploited the knowledge of the moments of X, ř yielding higher efficiency as shown below. The remainder term in (17), δ̃j “ Wj ´ βj ´ aU1 ´ pj1 “1 b1j Uj 1 `1 is orthogonal to pU1 , . . . , Up`1 q. Notice that the vector pU1 , . . . , Up`1 q depends on j but this is suppressed in the notation. Specifically, we define the total information (TI) estimator to be tβ̂ T I uj “ W̄j ´ âŪ1 ´ 9 p ÿ j 1 “1 b̂j 1 Ūj 1 `1 , Table 2: Summary of the notation used in Section 3.2 when j is the chosen coordinate. Y “α` Basic model Adjusted regressor Intercept model řp j“1 βj Xj `δ ~ T β ´j‚ Xj‚ “ Xj ´ X ´j Wj “ βj ` aU1 ` β ´j‚ α, β are defined by (7) ! ´ ¯)´1 ´ ¯ ~ ´j X ~T ~ ´j Xj “ E X E X ´j ~ ´j “ p1, X1 , . . . , Xj´1 , Xj`1 , . . . , Xp qT X řp j 1 “1 bj 1 Uj 1 `1 ` δ̃j Wj “ Uj 1 `1 “ Xj 1 Xj‚ 2 q EpXj‚ Y Xj‚ 2 q , U1 EpXj‚ “ Xj‚ 2 q EpXj‚ for j 1 ‰ j, Uj`1 “ Xj Xj‚ 2 q EpXj‚ ´ 1, a, b are θ2 , ¨ ¨ ¨ , θp`1 defined by (2) for model (17), δ̃j is the remainder term TI estimator PI estimator tβ̂ T I uj “ W̄j ´ âŪ1 ´ řp j 1 “1 b̂j 1 Ūj 1 `1 ¯¨ is the mean over the labeled sample â, b̂ are the LSE of model (17) ¯ ´ âǓ ¯ ´ řp b̂ 1 Ǔ ¯1 tβ̂ P I uj “ W̌ j 1 j 1 “1 j j `1 ¯¨ is the mean over the labeled sample W̌j “ Ǔj 1 `1 “ Xj 1 Xjˇ‚ 2 q ĚpXjˇ ‚ Y Xjˇ‚ 2 q, ĚpXjˇ ‚ Ǔ1 “ Xjˇ‚ 2 q ĚpXjˇ ‚ for j 1 ‰ j, Ǔj`1 “ Xj Xjˇ‚ 2 q ĚpXjˇ ‚ ´1 â, b̂ are the LSE of model (17) with pW̌j , Ǔ1 , . . . , Ǔp`1 q replacing pWj , U1 , . . . , Up`1 q Asymptotics n ν “ lim n`m n (m) the labeled (unlabeled) sample size ΣLSE , ΣP I , ΣT I asymptotic covariance matrix of LSE, PI, TI as in Theorem 2 Main results ΣLSE “ ΣT I ` Σdiff Σdiff “ CovpδX‚ ´ δ̃q ΣP I “ ΣT I ` νΣdiff where â, b̂ are the regular LSE of (17), and ¯¨ denotes the mean over the labeled sample with n observations. To define the partial information estimator let ! ´ ¯)´1 ´ ¯ ~ ´j X ~ T´j ~ ´j Xj , β ´jˇ‚ “ Ě X Ě X (19) where Ě is the the empirical mean based on the full X sample of size n ` m. Now define Xjˇ‚ “ ! )T ~ ´j β ´jˇ‚ and Xj ´ X W̌j “ Xj 1 Xjˇ‚ Y Xjˇ‚ Xjˇ‚ Xj Xjˇ‚ , Ǔ1 “ , Ǔj 1 `1 “ for j 1 ‰ j, and Ǔj`1 “ . 2 2 2 2 q ĚpXjˇ‚ q ĚpXjˇ‚ q ĚpXjˇ‚ q ĚpXjˇ ‚ 10 Here ˇ‚ denotes adjustments over the full n ` m sample. The partial information (PI) estimator is ¯ ´ âǓ ¯ ´ tβ̂ P I uj “ W̌ j 1 p ÿ ¯1 , b̂j 1 Ǔ j `1 j 1 “1 where â, b̂j 1 are the regular LSE of model (17) with pW̌j , Ǔ1 , . . . , Ǔp`1 q replacing pWj , U1 , . . . , Up`1 q. The following theorem establishes the asymptotic distribution of the estimates and states conditions under which β̂ T I and β̂ P I , asymptotically dominate β̂ LSE . The asymptotic distribution of β̂ LSE is already known (White, 1980) and it is presented here so that the comparison to β̂ T I and β̂ P I can be made. Theorem 2. (i) Suppose that the vector X‚ “ ! Xp‚ X1‚ 2 q , . . . , EpX 2 q EpX1‚ p‚ ) is well defined (i.e., the projections in (16) exist and EpXj‚ q2 is positive and finite for j “ 1, . . . , p) and that δX‚ has finite second moments, then, ? D npβ̂ LSE ´ βq ÝÑ N p0, ΣLSE q, where ΣLSE “ CovpδX‚ q. (ii) Suppose further that for each j “ 1, . . . , p, the vector pWj , U1 , U2 , . . . , Up`1 q has finite second moments and that the matrix EpUj UTj q is invertible for Uj “ p1, U1 , U2 , . . . , Up`1 qT ; then, ? D npβ̂ T I ´ βq ÝÑ N p0, ΣT I q, where ΣT I “ Covpδ̃q for δ̃ “ pδ̃1 , . . . , δ̃p q. Furthermore, we have that ΣLSE “ ΣT I ` Σdiff where Σdiff “ CovpVq for V “ δX‚ ´ δ̃. n “ ν, then, (iii) Suppose further that lim n`m ? D npβ̂ P I ´ βq ÝÑ N p0, ΣP I q, where ΣP I “ ΣT I ` νΣdiff . Therefore, if Σdiff is not the zero matrix, then ΣLSE ´ ΣT I is positive definite, and if further ν ă 1, then ΣLSE ´ ΣP I is also positive definite. Corollary 2. Theorem 2 and Proposition 1 imply that Rpα̂LSE , β̂ LSE q ´ Rpα̂P I , β̂ P I q “ Tracetp1 ´ νqΣdiff Mu, where M “ CovpXq. In short, Theorem 2 states that if the regression models (15) and (17) are well defined and the residuals have finite second moments, then ΣLSE ´ ΣT I is positive semi-definite and it is strictly positive unless V ” 0. If further, the unlabeled sample size is not negligible, i.e. lim m{n ą 0, then ΣLSE ´ ΣP I is also positive definite. 11 As in the one-dimensional case, β̂ T I and β̂ P I improve over β̂ LSE only when Σdiff is not the zero matrix or equivalently that V is not zero. For each j, V arpVj q measures the difference between the original model (15) and the intercept model (17). When 2 2 2 EpXj‚ δq “ EpXj‚ X1 δq “ ¨ ¨ ¨ “ EpXj‚ Xp δq “ 0 (20) then δXj‚ ” δj and the two models are essentially the same, in which case Vj ” 0. Otherwise, if for some j (20) does not hold, then β̂ P I improves over β̂ LSE when ν ă 1. In the one-dimensional case, (20) is equivalent to EpX 2 δq “ EpX 3 δq “ 0, i.e., that X 2 and X 3 are uncorrelated with δ. Generally, (20) implies that certain linear combinations of EpXj Xj 1 δq and EpXj Xj 1 Xj 2 δq are 0. Thus, roughly speaking, when ErY |Xs is non-linear and the non-linear part is correlated with several second or third moments of X, then we expect improvement of β̂ P I . 3.3 New methodology (summary) We now provide a step-by-step description of the new methodology for estimation of β. For each j “ 1, . . . , p: )T ! piq piq ~ piq 1. (Adjust the regressors) Let β ´jˇ‚ as defined in (19) and define Xjˇ‚ “ Xj ´ X β ´jˇ‚ for ´j i “ 1, . . . , n. 2. (Define the intercept model) Define for i “ 1, . . . , n “ Y piq Xjˇ‚ 2 q ĚpXjˇ ‚ piq piq piq piq W̌j piq , Ǔ1 “ Xjˇ‚ 2 q ĚpXjˇ ‚ piq , Ǔj 1 `1 “ piq Xj 1 Xjˇ‚ 2 q ĚpXjˇ ‚ piq piq for j 1 ‰ j, and Ǔj`1 “ piq Xj Xjˇ‚ 2 q ĚpXjˇ ‚ ´ 1. 3. (Define the intercept estimator) The partial information (PI) estimator is p ¯ ´ âǓ ¯ ´ ÿ b̂ 1 Ǔ ¯ tβ̂ P I uj “ W̌ j 1 j j 1 `1 , j 1 “1 where â, b̂j 1 are the regular LSE of the regression model piq Wj piq “ βj ` aǓ1 ` p ÿ j 1 “1 piq piq bj 1 Ǔj 1 `1 ` δ̃j , for i “ 1, . . . , n. The methodology is built from standard least squares procedures. An R code that implements the algorithm and also computes estimates of the variance as in Section 5.1 below, is available at the homepage of the first author. 4 A simulation study We compare the performance of the Partial Information (PI) and Total Information (TI) estimators against the Least Squares Estimate (LSE) across a wide range of settings. 12 4.1 Toy example We start by studying the following toy model Y “ αX 2 ` βX ` ε “ α ` βX ` looooooomooooooon αpX 2 ´ 1q ` ε, (21) “δ where X and ε are i.i.d N(0,1). Under model (21), the linear and non-linear part are determined by β and α separately and the linear coefficient β does not affect the residual δ. In this case, it easy to calculate the asymptotic variance of the estimates explicitly 2 2 σLSE “ 10α2 ` 1, σT2 I “ 6α2 ` 1, σdiff “ 4α2 . Considering the excess risk, then by Proposition 1 the ratio of excess risks of β̂P I (β̂T I , respectively) and β̂LSE converges to 2 2α2 `1`σP I 2 2 2α `1`σLSE 2α2 `1`σ2 ( 2α2 `1`σ2T I , respectively). The limits equal 1 in the linear case (α “ 0) LSE and approach 0 when the non-linear part is dominant (α Ñ 8). Figure 1 summarizes 10,000 simulations of model (21) with β “ 1 and different values of α, n; for the PI case we used m “ 2n. For all the scenarios we found that β̂T I , β̂P I have smaller excess risk when n is large enough. As α increases, the departure from linearity is more significant and the ratio of the excess risks is smaller. For small n, LSE is superior for all scenarios as it is a simpler estimate. When the model is close to linear (α “ 1{4), the new estimates are better for n ě 200 and for the other values of α the new estimates are better for n ě 70. For small values of α the limiting excess risk is close to the actual risk even when n « 300 but this does not hold true for larger values of α. In short, we found that the new estimates are better for large n, and are much better when the non-linear part is significant. 4.2 Simulation Parameters We now compare our new estimates to LSE for a broader variety of scenarios. Estimates of the Excess Risk Ratio (ERR) for PI and TI were obtained for every combination of the following parameter choices: n (size of labeled dataset) 12, 25, 50, 100, 250, 500 m (size of unlabeled dataset) n, 2n p (number of predictors) Distribution of X 1, 4 Gaussian, Lognormal, Exponential, Cubed Gaussian Gaussian, N p0, e2}X} q ? X, eX , X 3 , X Errors ErY |Xs Fixing each of the 768 parameters settings, many sample datasets were generated, along with a large test dataset (n = 100,000). For each sample dataset, PI, TI, and LSE were fit, (calculating TI using the 13 0.9 1.0 1.1 alpha=1/8 alpha=1/4 alpha=1/2 alpha=1 0.7 0.8 Excess risk: MSE(PI)/MSE(LSE) 1.0 0.9 0.8 0.7 Excess risk: MSE(TI)/MSE(LSE) 1.1 alpha=1/8 alpha=1/4 alpha=1/2 alpha=1 0 100 200 300 400 500 0 100 n 200 300 400 500 n (a) TI (b) PI Figure 1: Estimates of the excess risk ratio for the TI and PI estimates based on 10,000 simulations of model (21) with β “ 1 and different values of α, n; for the PI case we used m “ 2n. A confidence interval based on two standard deviations is also plotted. The horizontal lines represents the limiting excess risk. PI method with m ě 500n.) Next, an estimate of expected MSE was obtained using the test dataset. Along with the best linear fit for the test dataset (given by least squares regression), these determine the Excess Risk Ratio for PI (ERRP I ) as follows: ERRP I “ M SEP I ´ M SEBLF , M SELSE ´ M SEBLF where M SEP I is the expected MSE of the PI estimator (estimated from mean performance on the test dataset), M SELSE is the expected MSE of the LSE estimator, and M SEBLF is the MSE of the best linear fit of the test dataset. An analagous calculation was performed to calculate ERRT I . Additional datasets were sampled to improve estimates of M SEP I and M SELSE , until standard errors for ERRP I and ERRT I fell below 1% (as estimated by the delta method), or a maximum of 100, 000 sample datasets was generated. 4.3 Simulation Results Table 3 provides the proportions of scenarios where the PI estimate yields a statistically significant smaller excess risk than the LSE and the proportion where the opposite holds true, for different p and n. 14 Statistical significance is measured by two standard errors. The results demonstrate that the PI estimate outperforms the LSE across a wide range of scenarios for large n, and the proportion increases with n. When n “ 500, LSE is significantly better only for about 10% of the scenarios we studied. More detailed comments follow: Table 3: Proportions of scenarios where ERRP I is significantly smaller than 1 and where it is significantly larger than 1. ❅ n ❅ p ❅❅ 12 25 50 100 250 500 1 0.297 0.344 0.469 0.594 0.656 0.609 4 0.047 0.234 0.391 0.438 0.594 0.547 1 0.344 0.234 0.172 0.125 0.125 0.109 4 0.578 0.391 0.234 0.188 0.188 0.125 ERRP I ă 1 significantly ERRP I ą 1 significantly 1. A proposed rule of thumb when p “ 1: As indicated by Table 3 across a wide range of parameter settings, PI performs almost as well as LSE when n ě 100, m ě 100 and linear ErY |Xs, and better than the LSE for nonlinear ErY |Xs (that is, ERR ă 1). Furthermore, PI’s underperformance is mild when ErY |Xs is linear. Thus, assuming that the scenarios we studied are representative sample of reality, we recommend using the PI method when the following conditions are satisfied, as a rule of thumb: (a) n ě 100 (b) m ě 100 (c) ErY |Xs could be non-linear 2. If p “ 1, n ą 100, m ą 100, and ErY |Xs is one of the non-linear functions tested, then both PI and TI appear to outperform LSE; furthermore, the margin of outperformance widens as n increases (See Figure 2 (a), and Figure 2 (b), respectively). In particular, PI does much better for ErY |Xs “ X 3 ? and eX , as compared to X. Intuitively, this results from the larger non-linear moments of X 3 and eX , causing Σdiff to be large (as defined in Theorem 2, part ii) 3. Increasing m, the size of the unlabeled dataset, improves performance of PI. Indeed, comparing PI where m “ 2n in Graph X against TI (m ě 500n) in Graph Y, one observes that greatly increasing the pool of unlabeled samples can reduce Excess Risk, in some cases on the order of 5 ´ 10 per cent (Compare Figures 2 (a) and (b)). But, a word of caution: if n is small, then LSE may still outperform both PI and TI, even when m is large and ErY |Xs is non-linear. 15 0.9 1.0 1.1 |x| ex x3 0.6 0.6 0.7 0.8 0.8 0.9 1.0 Excess risk: MSE(TI)/MSE(LSE) 1.1 |x| ex x3 0.7 Excess risk: MSE(PI)/MSE(LSE) x 1.2 1.2 x 0 100 200 300 400 500 0 n 100 200 300 400 500 n (a) PI (b) TI Figure 2: Estimates of the excess risk ratio for the TI and PI estimates, for several possible functions of ErY |Xs. In PI estimates (a), m “ 2n. In TI estimates (b), the PI method is used with m ě 500n. In all cases, X is Gaussian, errors are Gaussian, and p “ 1. Confidence intervals are ˘2 standard errors. 4. If n is small, or if ErY |Xs is linear, then LSE performs better than TI and PI. However, ERR Ñ 1 as n Ñ 8, holding other parameters fixed (See Figures 2 (a) and (b)). This result is consistent with the asymptotic agreement of PI, TI, and LSE when ErY |Xs is linear (See Theorem 2) 5. Extra heteroskedastic noise appears to decrease the relative advantage of PI. See Figure 3 (a). 6. Somewhat similarly, increasing the number of parameters to 4 (where Y is the sum of its relationships with each Xi ) also decreases the relative advantage of PI. See Figure 3 (b). 7. If X is not Gaussian, PI still does well, especially for large n. See Figure 3 (c) for an example where X is exponential. (Note that standard errors may be understated, especially in the case ErY |Xs “ exppXq, partly due to the large moments of Y .) 16 0.9 1.0 1.1 |x| ex x3 0.6 0.6 0.7 0.8 0.8 0.9 1.0 Excess risk: MSE(PI)/MSE(LSE) 1.1 |x| ex x3 0.7 Excess risk: MSE(PI)/MSE(LSE) x 1.2 1.2 x 0 100 200 300 400 500 0 n 100 200 300 400 500 n (b) p “ 4 (a) Heteroskedastic Errors 0.8 0.6 0.4 0.0 0.2 Excess risk: MSE(PI)/MSE(LSE) 1.0 1.2 x |x| ex 3 x 0 100 200 300 400 500 n (c) X Exponential Figure 3: Estimates of the excess risk ratio of PI estimates, across several possible functions of ErY |Xs, with tweaks to the previous settings of Figure 2 (a): these were m “ 2n, X Gaussian, p “ 1, and Guassian errors. The following is changed in each plot: Figure (a): Errors are heteroscedastic, distributed N p0, e2}x} q. Figure (b): p “ 4, where ErY |Xs is the sum of the given relationship in each X-variable. Figure (c): X is distributed exponentially. Confidence intervals are ˘2 standard errors. 17 5 Estimating the standard errors of the estimates In this section we study estimation of the asymptotic covariance matrix. We suggest three estimates for β P I in Section 5.1 and study their performance by simulation (Section 5.2). Section 5.3 deals with the estimation of the prediction error (excess risk). 5.1 Three estimates of ΣP I We proved that under certain conditions, ? D npβ̂ LSE ´ βq ÝÑ N p0, ΣLSE q, ? D npβ̂ P I ´ βq ÝÑ N p0, ΣP I q and, ? D npβ̂ T I ´ βq ÝÑ N p0, ΣT I q. In these expressions the (asymptotic) variability of the estimates are determined by the matrices ΣLSE , ΣP I and ΣT I . These matrices are unknown and therefore need to be estimated. In this section we consider only estimation of ΣLSE and ΣP I . Estimation of the asymptotic variance yields prediction error estimates or L2 risk in a standard fashion. In section 5.3 we discuss estimation of the excess risk. For ΣLSE we follow Buja et al. (2016) who show that the standard estimates are inconsistent when non-linearity is present and suggest two alternative estimates for the variance. The parametric sandwich estimator for the asymptotic variance of β̂ LSE is ` ˘ ` ˘ ˆ parm pβ̂ LSE q “ XT X ´1 XT D̂X XT X ´1 , AV where X is the design matrix and D̂ is a diagonal matrix with D̂i “ δ̂i2 the standard residual estimator. The second estimate is derived from a pairs bootstrap where a pair pX˚ , Y ˚ q is sampled NBS times from the empirical joint distribution of pX, Y q, yielding a sample (under the empirical measure) of size NBS of ˆ BS pβ̂ LSE q. β̂ LSE . The resulting estimate of the variance is denoted by AV For estimating the variance of ΣP I , we consider three estimates described as follows: 1. Parametric: The asymptotic variances of β̂ LSE and β̂ P I are AVpβ̂ LSE q “ Covpδ̃q ` CovpVq, AVpβ̂ P I q “ Covpδ̃q ` νCovpVq. (22) To estimate the variance of Covpδ̃q notice that for j “ 1, . . . , p and i “ 1, . . . , n, p ÿ ? piq piq piq piq δ̃ˇj “ W̌ piq ´ tβ̂ P I uj ´ âǓ1 ´ b̂j 1 Ǔj 1 `1 “ δ̃j ` op p1{ nq, j 1 “1 p ˇ and hence, Covpδ̃q ÝÑ Covpδ̃q, where Cov is the empirical covariance based on the labeled n sample. Therefore, using (22) we obtain that a consistent estimator to AVpβ̂ P I q is ˆ! ˙ ) ! ) ˇ ˇ 1 ˇ ˇ 1 ˆ ˆ AVparm ptβ̂ LSE uq ´ Covpδ̃ j , δ̃ j q , AVparm pβ̂ P I q “ Covpδ̃ j , δ̃ j q ` ν 1 1 j,j j,j 18 for j ‰ j 1 and for j “ 1, . . . , p, ! ) ˆ parm pβ̂ P I q AV j,j ˜ ¸ n n ! )2 ! ) ÿ 1 ÿ ! ˇpiq )2 1 piq ˆ parm ptβ̂ LSE uq “ ` ν max ,0 . δ̃ δ̃ˇ AV ´ n i“1 j n i“1 j j,j ! ) piq piq n 2. Bootstrap: Let pX˚ , Y˚ q the labeled observations) and the unlabeled observations). be a sample from the empirical distribution of pX, Y q (based on i“1 piq n`m be a sample from the empirical distribution of X (based on tX˚ ui“n`1 ¯ ´! ) ˚ ˚ piq n`m piq piq n is a sample under , tX˚ ui“n`1 Thus, β̂ P I “ β̂ P I pX˚ , Y˚ q i“1 the empirical measure of β̂ P I , which can yield an estimate of the variance of the estimator, denoted ˆ BS pβ̂ P I q. by AV 3. Variance bootstrap: In the proof of Theorem 2 we showed that for j “ 1, . . . , p, piq piq 1 řn n n`m ÿ piq ? ? 1 1 ÿ piq i“1 Xj‚ δ n tβ̂ LSE uj “ βj ` nq and t δ̃ ` Vj `op p1{ nq. `o p1{ β̂ u “ β ` p j j P I 2 n i“1 n ` m i“1 EpXj‚ q Hence, the definition of the vector V implies that β̂ LSE ´ β̂ P I “ n n`m ÿ ? 1 1 ÿ ´Vpiq ` Vpiq ` op p1{ nq n i“1 n ` m i“1 ˙ ˆ n n`m ÿ ? 1 n 1 ÿ piq ´1 ` V Vpiq ` op p1{ nq. “ n i“1 n`m n ` m i“n`1 Therefore, dropping the smaller order terms we obtain nCovpβ̂ LSE ˆ ˙2 nm CovpVq ` pn ` mq2 ˆ ˙ n “ CovpVq 1 ´ Ñ CovpVq p1 ´ νq “ ΣLSE ´ ΣP I . n`m n ´ β̂ P I q « CovpVq 1 ´ n`m Thus, a a consistent estimator of the difference ΣLSE ´ ΣP I “: ∆ can be obtained by bootstrapping ˚ ˚ p A consistent estimate to AV pβ̂ P I q is nCovpβ̂ P I ´ β̂ LSE q. We denote this estimator by ∆. p ˆ V BS pβ̂ P I q “ AV ˆ BS pβ̂ LSE q ´ ∆. AV This estimator has the advantage over the previous suggestions that it is always smaller than the estimated variance of the LSE (in the sense that the difference is positive definite), in a similar fashion to the asymptotic distribution. In the next section we compare the different estimates through a simulation study. 5.2 Simulations for the estimates of the variance We now investigate the estimates of the variance under the toy model (21). We study the performance of the estimates for α “ 1, 1{2, 1{4, 1{8, where small α corresponds to little non-linearity. We considered 19 n “ 250 and m “ 1500 similar to the numbers of Section 6. For each α we repeated the simulation 1000 times and also NBS “ 1000. The simulations are summarized in Table 4 and in Figure 4. We find that the bootstrap estimate (henceforth BS) is more variable than the parametric (henceforth PARM) and the variance bootstrap (henceforth VBS). PARM and VBS are comparable but for small α’s for estimating the difference, the histogram of VBS is narrower around the true value. When α “ 1{8, the estimated difference under BS (PARM) is negative 32.9% (34.7%) of the simulations, while for VBS it is never negative. However, since VBS cannot be negative, the mean of the simulations is upwards biased. In short, we find that PARM ˆ pβ̂LSE q. and VBS outperform BS and VBS has the advantage of never being smaller than AV Table 4: The mean (std) of the estimates of the asymptotic variance AV pβ̂P I q and the difference AV pβ̂LSE q ´ AV pβ̂P I q. Variance Difference α Bootstrap Parametric Variance BS true Bootstrap Parametric Variance BS true 1 7.65 (3.71) 6.86 (3.11) 6.58 (2.40) 7 2.63 (2.53) 3.51 (1.53) 3.70 (2.13) 3.43 1/2 2.65 (0.97) 2.42 (0.82) 2.36 (0.70) 2.5 0.64 (0.53) 0.88 (0.45) 0.93 (0.46) 0.86 1/4 1.43 (0.40) 1.33 (0.33) 1.31 (0.31) 1.37 0.15 (0.18) 0.24 (0.22) 0.27 (0.16) 0.21 1/8 1.11 (0.23) 1.06 (0.20) 1.03 (0.19) 1.09 0.02 (0.07) 0.06 (0.17) 0.10 (0.06) 0.05 20 Estimates of the difference 2.0 Estimates of the variance BS Param. VBS Density 2 1.0 0 0.0 1 0.5 Density 3 1.5 4 BS Param. VBS 1.0 1.5 2.0 2.5 3.0 −1.0 −0.5 variance 0.0 0.5 1.0 difference (a) α “ 1{4 Estimates of the variance Estimates of the difference 10 2.0 Density 6 1.5 0 0.0 2 0.5 4 1.0 Density BS Param. VBS 8 2.5 BS Param. VBS 0.5 1.0 1.5 2.0 2.5 −0.2 variance 0.0 0.2 0.4 difference (b) α “ 1{8 Figure 4: Histograms of the estimates (Bootstrap, Parametric, Variance BS) of the asymptotic variance AV pβ̂P I q and the difference AV pβ̂LSE q ´ AV pβ̂P I q. The true asymptotic value is illustrated by the vertical gray line. 21 5.3 Estimating the prediction error The three estimates of ΣP I can be used to estimate the prediction error in a standard fashion. Here, we describe how the variance bootstrap estimate together with the result of Proposition 1 provide an estimate of the excess risk. By Proposition 1, the excess risk of β̂ LSE can be approximated by p p ı2 ” ÿ ÿ βj tXj ´EpXj qu `TracepMΣLSE q “ V arpY q`β T Mβ´2 βj CovpY, Xj q`TracepMΣLSE q E Y ´EpY q´ j“1 j“1 and hence can be consistently estimated by T σ̂Y2 ` β̂ LSE M̂β LSE ´ 2 where σ̂Y2 “ 1 n piq řn i“1 pY piq ´ Ȳ q2 , M̂ “ p ÿ ˆ BS pΣLSE qu, tβ̂ LSE uj CovpY, Xj q ` TracetM̂AV j“1 1 n`m řn`m i“1 pXpiq ´ X̄q Xpiq ´ X̄ (T and CovpY, Xj q “ 1 n řn i“1 pY piq ´ Ȳ qpXj ´ X̄j q is the empirical covariance. Therefore, a consistent estimate to the excess risk ratio is T z PI “ ERR σ̂Y2 ` β̂ LSE M̂β LSE ´ 2 T řp j“1 tβ̂ LSE uj CovpY, Xj q ` σ̂Y2 ` β̂ LSE M̂β LSE ´ 2 řp ˆ BS pΣLSE q ´ ∆qu ˆ TracetM̂pAV j“1 tβ̂ LSE uj CovpY, Xj q ˆ BS pΣLSE qu ` TracetM̂AV , (23) ˆ is defined by the Variance bootstrap. where ∆ 6 Inferring homeless population We now consider the Los Angeles homeless data set (Kriegler and Berk, 2010). Our purpose here is not to carefully analyze this data set but rather to demonstrate our new method and to compare it to the standard LSE. For our analysis, we used the same covariates as in Kriegler and Berk (2010); see this reference for more details about the data. There are about 2000 census tracts in the Los Angeles county, and a sample was conducted in order to infer the homeless population. The sample consisted of two parts. First, tracts believed to have large numbers of homeless people were pre-selected and visited; there are about 240 such tracts. Second, a sample of about 260 tracts was chosen from the remainder by a random sampling technique and the homeless population was counted, leaving about 1500 tracts to be imputed. Leaving aside the preselected tracts this is almost exactly our semi-supervised setting among the remaining population. We have n “ 261 and m “ 1536. The major difference from the setting in our introduction here is that sampling from the remaining population is without replacement and hence is not an i.i.d random sample. Since we have not discussed this type of sampling in detail, we will ignore this issue in the subsequent discussion which is for illustrative purposes. (The difference in sampling schemes does not affect the values of the various estimates, but does impact their standard errors.) 22 We compare the LSE of the random sample and the new estimate (PI) where the supervised part is the random sample (of size 261) and the unsupervised part consists of the 1536 tracts to be imputed. The resulting estimates, as well as their standard errors (SE) are given in Table 5. The SE of the LSE was computed using pairs bootstrap (NBS “ 105 ), and the SE of PI was computed using the above variance bootstrap method (the SE of the intercept of PI was estimated by pairs bootstrap). We find that the SE’s of PI are smaller by 15%-40% than LSE in the predictors MedianInc, PercVacant, PercCommercial, PercIndustrial. These predictors also demonstrated a discrepancy between the SE from linear models to bootstrap SE as reported in Buja et al. (2016) Section 2, indicating non-linearity in these predictors (a discrepancy was observed also in the predictor PercResidential, but the improvement in this predictor is relatively small). In summary, we found that the additional information on the distribution of the predictors in the unsupervised data provides estimates that are more accurate (smaller variance). Consider the prediction problem of estimating the homeless population for the 1500 tracts. An estimate z P I “ 0.904, i.e., improvement of about 10%. An estimate of of the excess risk ratio, using (23), is ERR ˆ M̂q{n “ 15.2, while an estimate of the the differences of prediction errors as in (10) and (11) is Tracep∆ prediction error of the mean is m 1 ÿ~T ~ n`i {n “ 42.8. X Σ̂LSE X m i“1 n`i Since 15.2/42.8 =0.355 the improvement in prediction risk is about 36%. When considering the prediction of Y itself as in (11) then the improvement is much smaller, about 1.5%. The reason for this difference is that the predictors we considered are all quite weak, and hence most of prediction error comes from the variability in the distribution of Y given X rather than the variability in estimating the β’s. Table 5: The estimates β̂ LSE , β̂ P I and their standard errors. β̂LSE ˆ LSE SE β̂P I ˆ PI SE SE LSE SE P I Intercept 13.138 11.822 14.758 11.184 0.927 MedianInc ($K) -0.065 0.056 -0.080 0.044 1.284 PercVacant 1.449 0.707 1.583 0.514 1.374 PercMinority 0.060 0.105 0.063 0.099 1.058 PercResidential -0.070 0.100 -0.078 0.094 1.072 PercCommercial 0.446 0.354 0.335 0.300 1.179 PercIndustrial 0.101 0.188 0.202 0.143 1.317 23 7 Discussion In this work we showed that β can be better estimated when additional information on the predictors X is available. The key idea is to replace the regression model Y “ α ` β1 X1 ` ¨ ¨ ¨ ` βp Xp ` δ, with p regressions of the form Wj “ βj ` aU1 ` p ÿ j 1 “1 bj 1 Uj 1 `1 ` δ̃j , (24) (25) for j “ 1, . . . , p, where Wj , U1 , . . . , Up`1 is defined in (18). Regression (25) can be used only when the first and second moments of X are known. We showed that the intercept estimator of (25) is a better estimate of βj , in terms of smaller asymptotic variance, than the standrd LSE of (24). Furthermore, we showed that even if the second moments of X are not known exactly then improvement can be made over the standard LSE provided that the unlabeled sample is non-negligible with respect to the labeled sample, i.e., m{n is bounded away from 0. Here we considered the classical framework where p is fixed and n Ñ 8. Zhang et al. (2016) study the semi-supervised mean estimation problem where p, n both go to infinity but p grows relatively slowly, i.e., ? p “ Op nq. The findings of Zhang et al. (2016) indicate that our results can be extended to the latter case. However, our method obviously requires that p ăă n and for high-dimensional regression models where p ą n, a different approach is needed. High-dimensional missspecified regression models are the topic of a recent manuscript by Bühlmann and van de Geer (2015). In this work we did not study variable selection and considered the covariates as given. However, improved asymptotic performance may be achieved by including functions of the existing covariates as additional new covariates. Section 3 of Zhang et al. (2016) discusses how this can be done for the problem of semi-supervised estimation of a mean. On the other hand, when the labeled sample, n, is small, then it may be better not to include all covariates. We hope to study the problem of variable selection in this context in a future research. A possible extension of these results is to generalized linear models, where the label variable (Y ) takes a small number of values and the regression model reduces to a classification problem. Our hope is that our method can be extended to these cases and improvement can be made over naive classifiers that consider only the labeled data. In summary, in this work we considered the framework where the best linear predictor is of interest even if EpY |Xq is not linear. Under this framework, additional information on the distribution of X is useful to construct better estimates than the standard estimates. We believe that this framework is of practical importance and also can lead to interesting statistical issues, which are yet to be studied. 24 8 Proofs Lemma 1. We have that p ı2 ” ! ) ÿ β̃j tX̄j ´ EpXj qu ´ EpY q ` E pβ ´ β̃qT Mpβ ´ β̃q . ELpα̃, β̃q “ E Ȳ ´ (26) j“1 Proof. First, ¯2 ´ ` ˘2 T Rpα̃, β̃q “ E Y ˚ ´ α̃ ´ β̃ X˚ ´ E Y ˚ ´ α ´ β T X˚ ) )! ! “ E pα ´ α̃q ` pβ ´ β̃qT X˚ 2Y ˚ ´ pα ` α̂q ´ pβ ` β̃qT X˚ )2 ) ! ! ( “ E pα ´ α̃q ` pβ ´ β̃qT X˚ ` 2E pα ´ α̂q ` pβ ´ β̃qT X˚ Y ˚ ´ α ´ β T X˚ )2 ! “ E pα ´ α̃q ` pβ ´ β̃qT X˚ , where the last equality holds true since Y ˚ ´ α ´ β T X˚ is orthogonal to X ˚ , 1. We can further write )2 ! ” ı2 E pα ´ α̃q ` pβ ´ β̃qT X˚ “ E pα ´ α̃q ` pβ ´ β̃qT EpXq ` pβ ´ β̃qT tX˚ ´ EpXqu ! )2 “ E pα ´ α̃q ` pβ ´ β̃qT EpXq ` Etpβ ´ β̃qT Mpβ ´ β̃qu, (27) For the first term in (27) notice that α “ EpY q ´ řp j“1 βj EpXj q and α̃ “ Ȳ ´ řp j“1 β̃j X̄j ; therefore, p ! )2 ” ı2 ÿ T E pα ´ α̃q ` pβ ´ β̃q EpXq “ E Ȳ ´ β̃j tX̄j ´ EpXj qu ´ EpY q , j“1 and (26) is established. Proof of Proposition 1. Since for any numbers c, d, B we have that minpc ` d, Bq ď minpc, Bq ` minpd, Bq and minpc ` d, Bq ě minpc, B{2q ` minpd, B{2q, then ˜ p ı2 ” ÿ β̃j tX̄j ´ EpXj qu ´ EpY q , B Rpα̃, β̃q “ lim lim E mintnL̃pα̃, β̃q, Bu “ lim lim E min n Ȳ ´ BÑ8 nÑ8 BÑ8 nÑ8 j“1 ¸ ´ ! ) ¯ ` lim lim E min n pβ ´ β̃qT Mpβ ´ β̃q , B . (28) BÑ8 nÑ8 We start with the first summand in (28). Since Ȳ ´ p ÿ j“1 ? npβ̃ ´ βq is asymptotically normal then p p ” ı ÿ ÿ ? pβj ´ β̃j qtX̄j ´EpXj qu “ op p1{ nq. β̃j tX̄j ´EpXj qu´EpY q´ Ȳ ´ βj tX̄j ´EpXj qu´EpY q “ j“1 j“1 25 Therefore, by the continuous mapping theorem and since the random variables are bounded, then for any B, ˜ p ı2 ” ÿ β̃j tX̄j ´ EpXj qu ´ EpY q , B lim E min n Ȳ ´ nÑ8 j“1 ˜ ¸ p ı2 ” ÿ βj tX̄j ´ EpXj qu ´ EpY q , B “ lim E min n Ȳ ´ nÑ8 j“1 ¸ ` ˘ “ E min Z12 , B , (29) ” ı2 ř where Z1 is normal with mean zero and variance Y ´ pj“1 βj tXj ´ EpXj qu ´ EpY q . ? D For the second summand in (28), the asymptotic normality npβ̃ ´ βq ÝÑ N p0, Σq implies that for any B, ´ ! ) ¯ ( lim E min n pβ ´ β̃qT Mpβ ´ β̃q , B “ E min ZT2 Z2 , B , nÑ8 (30) where Z2 is a normal vector with mean zero and variance matrix M1{2 ΣM1{2 . Taking limits as B Ñ 8 in (29) and (30) completes the proof of the proposition since TracepM1{2 ΣM1{2 q “ TracepMΣq. We will not prove Theorem 1 since it is a special case of Theorem 2. Proof of Theorem 2. Part (i) We have that (Buja et al., 2016) tβ̂ LSE uj “ βj ` xδ, Xj¯‚ y tβ̂ LSE uj “ βj ` “ βj ` ||Xj¯‚ ||2 řn piq piq i“1 Xj¯ ‚δ ) ! ř piq 2 n 1 ‚ i“1 Xj¯ n 1 n xδ,Xj¯‚ y . ||Xj¯‚ ||2 “ βj ` Furthermore, 1 n řn piq piq i“1 Xj‚ δ 2 q EpXj‚ ? ` op p1{ nq, since ? ÿ ? ÿ n n ¯ )T ´ ! n n 1 p p piq piq 2 ~ piq β̂ ´ β q. δpiq pXj¯‚ ´ Xj‚ q “ δpiq X ||Xj¯‚ ||2 ÝÑ EpXj‚ ´j¯ ‚ ´j‚ ÝÑ 0, and ´j n i“1 n i“1 n The results now follows from the multivariate CLT and Slutsky’s theorem. Part (ii) For each j, tβ̂ T I uj “ W̄j ´ âŪ1 ´ p ÿ j 1 “1 b̂j 1 Ūj 1 `1 “ W̄j ´ aŪ1 ´ p ÿ j 1 “1 ? bj 1 Ūj 1 `1 ` op p1{ nq “ βj ` Again, the multivariate CLT and Slutsky’s theorem imply the result. n ? 1 ÿ piq δ̃j ` op p1{ nq. (31) n i“1 To prove the furthermore part, notice that for each j, ¯ ´ řp p 1 1 X Y ´ α ´ β ÿ j Xj‚ j 1 “1 j Xj 1 Xj‚ δXj‚ Y Xj‚ Xj‚ Vj “ ´ δ̃ “ ´ ` β ´ b ` a ` bj 1 j j j 2 2 2 2 2 q EpXj‚ q EpXj‚ q EpXj‚ q EpXj‚ q j 1 “1 EpXj‚ “ βj ´ bj ` pa ´ αq p p ÿ ÿ Xj 1 Xj‚ Xj‚ 1 1 q ´ β pb pbj 1 ´ βj 1 qUj 1 `1 (32) ` “ pa ´ αqU ` 1 j j 2 q 2 q EpXj‚ EpX 1 1 j‚ j “1 j “1 26 is a linear function of U1 , . . . , Up`1 and hence is orthogonal to δ̃j , i.e., EVj δ̃j “ 0 for all j. Therefore, ! ) ΣLSE “ CovpX‚ δq “ Cov δ̃ ` pX‚ δ ´ δ̃q “ Covpδ̃ ` Vq “ Covpδ̃q ` CovpVq “ ΣT I ` Σdiff . Part (iii) We show that tβ̂ P I uj ´ tβ̂ T I uj “ Hence, ? D n`m ÿ piq ? 1 Vj ` op p1{ nq. n ` m i“1 (33) npβ̂ P I ´ β̂ T I q ÝÑ N p0, νΣdiff q. Since V is orthogonal to δ̃, then ? npβ̂ P I ´ βq “ ? npβ̂ T I ´ βq ` ? D npβ̂ P I ´ β̂ T I q ÝÑ N p0, ΣT I ` νΣdiff q. We now prove (33) by a somewhat lengthy calculation. We have that ¯ ´ âǓ ¯ ´ tβ̂ P I uj “ W̌ j 1 p ÿ j 1 “1 p ÿ ¯ ¯ ¯ ¯ 1 ` o p1{?nq. b̂j 1 Ǔj 1 `1 “ Ŵj ´ aǓ1 ´ bj 1 Ǔ p j `1 (34) j 1 “1 Therefore, (34) and (31) yield p ¯ 1 ´ Ū 1 q ` o p1{?nq. ¯ ´ W̄ ´ apǓ ¯ ´ Ū q ´ ÿ b 1 pǓ tβ̂ P I uj ´ tβ̂ T I uj “ W̌ p j j 1 1 j j `1 j `1 j 1 “1 We have that p ÿ ¯ 1 ´ Ū 1 q ` o p1{?nq, ¯ ¯ βj 1 pǓ W̌j ´ W̄j “ αpǓ1 ´ Ū1 q ` p j `1 j `1 j 1 “1 and hence, tβ̂ P I uj ´ tβ̂ T I uj “ pα ´ aqpǓ¯1 ´ Ū1 q ` p ÿ ¯ 1 ´ Ū 1 q ` o p1{?nq. pβj 1 ´ bj 1 qpǓ p j `1 j `1 (35) j 1 “1 We now consider the summands in (35). We start with the first summand ˜ ¸ ř ~ piq pβ ´j‚ ´ β ´jˇ‚ qT n1 ni“1 X 1 1 ´j ¯ ` ´ ´ Ǔ1 ´ Ū “ 2 2 2 q 2 q 2 q EpX q EpX q ĚpXjˇ ĚpX ĚpX j‚ j‚ ‚ jˇ ‚ jˇ ‚ piq 1 řn T ~ pβ ´j‚ ´ β ´jˇ‚ q n i“1 X ? ´j ` op p1{ nq “ 2 EpXj‚ q ´ ř ¯ ř piq n 1 1 řn`m ~ piq T ~ n`m ~ piq 1 T pβ ´j‚ ´ β ´jˇ‚ q n i“1 X´j ´ n`m i“1 X´j pβ ´j‚ ´ β ´jˇ‚ q n`m i“1 X´j ? ` ` op p1{ nq “ 2 2 EpXj‚ q EpXj‚ q 1 řn`m ~ piq pβ ´j‚ ´ β ´jˇ‚ qT n`m ? i“1 X´j “ ` op p1{ nq. 2 EpXj‚ q 1 n řn piq i“1 Xjˇ ‚ 1 n řn piq i“1 Xj‚ n 1 ÿ piq X “ n i“1 j‚ Since ~ ´j q ùñ ĚpXj q “ Ěpβ T X ~ 0 “ ĚpXjˇ‚ q “ ĚpXj ´ β T´jˇ‚ X ´jˇ ‚ ´j q then, T ~ T ~ ´j q “ Ěpβ T X ~ ĚpXj‚ q “ ĚpXj ´ β T´jˇ‚ X ‚ ´ β ´j‚ q ´jˇ ‚ ´j q ´ Ěpβ ´j‚ X´j q “ pβ ´jˇ 27 n`m ÿ piq 1 ~ , X n ` m i“1 ´j and therefore, piq 1 řn`m ´ n`m ? i“1 Xj‚ ¯ Ǔ1 ´ Ū1 “ ` op p1{ nq. 2 EpXj‚ q (36) We now consider the j 1 -th term in (35) for j 1 ‰ j; then, EpXj 1 Xj‚ q “ 0. We have ¯ 1 ´ Ū 1 “ Ǔ j `1 j `1 1 n řn piq piq i“1 Xj 1 Xjˇ ‚ 2 ĚpXjˇ‚ q n 1 ÿ piq piq X 1 Xj‚ “ n i“1 j # ´ 1 n řn piq piq i“1 Xj 1 Xj‚ EpXj‚ q2 1 1 ´ 2 2 EpX ĚpXjˇ‚ q j‚ q + “ ` pβ ´j‚ ´ β ´jˇ‚ qT n1 řn piq ~ piq i“1 Xj 1 X´j 2 q ĚpXjˇ ‚ ř n`m 1 pβ ´j‚ ´ β ´jˇ‚ qT n`m EpXj‚ i“1 piq ~ piq Xj 1 X ´j q2 ? ` op p1{ nq. Since ~ ´j qXj 1 u ùñ ĚpXj Xj 1 q “ Ěpβ T X ~ 0 “ ĚpXjˇ‚ Xj 1 q “ ĚtpXj ´ β T´jˇ‚ X ´jˇ ‚ ´j Xj 1 q then, T T ~ ~ ~ ´j qXj 1 u “ Ěpβ T X ĚpXj‚ Xj 1 q “ ĚtpXj ´βT´jˇ‚ X ‚ ´ β ´j‚ q ´jˇ ‚ ´j Xj 1 q´Ěpβ ´j‚ X´j Xj 1 q “ pβ ´jˇ and therefore, 1 ¯ 1 ´ Ū 1 “ ´ n`m Ǔ j `1 j `1 řn`m i“1 piq piq Xj‚ Xj 1 EpXj‚ q2 n`m ÿ piq piq 1 ~ , X1 X ´j n ` m i“1 j ? ` op p1{ nq. (37) For the j-th term in (35), we have that EpXj Xj‚ q “ EpXj‚ q2 ; hence, ¯ Ǔ j`1 ´ Ūj`1 “ “ # 1 n řn piq piq i“1 Xj Xjˇ ‚ 2 ĚpXjˇ‚ q n 1 ÿ piq piq X 1 Xj‚ ´ EpXj‚ q2 n i“1 j +# ´ 1 n řn piq piq i“1 Xj Xj‚ EpXj‚ q2 + ř piq ~ piq 2 2 q pβ ´j‚ ´ β ´jˇ‚ qT n1 ni“1 Xj X 1 1 ‚ ´j ` EpXj‚ q ´ ĚpXjˇ ´ ` 2 2 2 EpX q ĚpXjˇ‚ q ĚpXjˇ‚ q j‚ ř piq piq ~ ` EpXj‚ q2 ´ ĚpX 2 q pβ ´j‚ ´ β ´jˇ‚ qT n1 ni“1 Xj X ? jˇ ‚ ´j ` op p1{ nq. “ 2 EpXj‚ q Since 2 T ~ 2 T ~ 2 ĚpXjˇ ‚ Xj q “ ĚtpXj ´ β ´jˇ ‚ q “ ĚpXjˇ ‚ X´j qXj u ùñ ĚpXj q “ Ěpβ ´jˇ ‚ X´j Xj q ` ĚpXjˇ ‚q then, 2 T ~ ~ ´j qXj u “ Ěpβ T´jˇ‚ X ~ ´j Xj q ` ĚpXjˇ ĚpXj‚ Xj q “ ĚtpXj ´ β T´jˇ‚ X ‚ q ´ Ěpβ ´j‚ X´j Xj q “ pβ ´jˇ‚ ´ β ´j‚ qT 28 n`m ÿ piq piq 1 2 ~ ` ĚpXjˇ X X ‚ q. ´j n ` m i“1 j Thus, for the j-th term we obtain, 1 ´ n`m ¯ Ǔ ´ Ū “ j`1 j`1 řn`m i“1 EpXj‚ piq piq Xj‚ Xj q2 ? ` 1 ` op p1{ nq. (38) Tracking back to (35) through (36),(37), and (38), we obtain tβ̂ P I uj ´ tβ̂ T I uj “ pβj ´ bj q ` pa ´ αq řn`m piq i“1 Xj‚ 2 q EpXj‚ 1 n`m ` p ÿ pbj 1 ´ βj 1 q 1 n`m j 1 “1 řn`m i“1 piq piq Xj‚ Xj 1 2 q EpXj‚ ? ` op p1{ nq. Hence, (32) implies that tβ̂ P I uj ´ tβ̂ T I uj “ n`m ÿ piq ? 1 Vj ` op p1{ nq, n ` m i“1 and (33) is established. References Brown, L.D. (1990). An Ancillarity Paradox Which Appears in Multiple Linear Regression. Annals of Statistics, 18, 471–493. Bühlmann, P., van de Geer, S. (2015). High-dimensional inference in misspecified linear models. Electronic Journal of Statistics, 9, 1449–1473. Buja, A., Berk, R., Brown, L., George, E., Pitkin, E., Traskin, M., Zhao, L., Zhang, K. (2016). Models as Approximations: How Random Predictors and Model Violations Invalidate Classical Inference in Regression. Submitted; arXiv:1404.1578. Chakrabortty A., Cai T. (2016). Efficient and Adaptive Linear Regression in Semi-Supervised settings. Submitted. Cochran W.G. (1977). Sampling Techniques (3rd ed.), New York: John Wiley. Johnson, R., Zhang, T. (2008). Graph-based semi-supervised learning and spectral kernel design. IEEE Transactions on Information Theory. 54, 275–288. Kriegler, B., Berk, R. (2010). Small area estimation of the homeless in Los Angeles: An application of cost-sensitive stochastic gradient boosting. Annals of Applied Statistics, 4, 1234–1255. Lafferty, J., Wasserman, L. (2008). Statistical analysis of semi-supervised regression. Advances in Neural Information Processing Systems, 20, 801-808. 29 Liang, F., Mukherjee, S., West, M. (2007). The use of unlabeled data in predictive modeling. Statistical Science, 22, 189-205. Le Cam, L., Yang, G.L. (1990). Asymptotics in Statistics : Some Basic Concepts. New York: Springer. Little, R.J.A. (1992). Regression With Missing X’s: A Review. Journal of the American Statistical Association, 87, 1227–1237. Merz, C.J., Clair, D.C.St., Bond, W.E (1992). Semi-supervised adaptive resonance theory (smart2). International Joint Conference on Neural Networks, 3, 851-856. Wang, J., Shen, X., Pan, W. (2009). On efficient large margin semisupervised learning: Method and theory. The Journal of Machine Learning Research, 10, 719-742. White, H. (1980). Using Least Squares to Approximate Unknown Regression Functions. International Economic Review, 21, 149–170. Zhang, A., Brown L.D., Cai, T. (2016). Semi-supervised Inference: General Theory and estimation of means. Submitted. Zhou, Z.H., Li, M. (2005). Semi-supervised regression with co-training. International Joint Conference on Artificial Intelligence, 5, 908–913. Zhu, X., (2005). Semi-Supervised Learning Literature Survey. Computer Sciences, University of Wisconsin-Madison, 1530. 30
10math.ST
1 Asymptotically optimal codebooks based on generalized Jacobi sums Ziling Heng arXiv:1705.08055v1 [cs.IT] 23 May 2017 Abstract Codebooks with small inner-product correlation are applied in many practical applications including direct spread code division multiple access communications, space-time codes and compressed sensing. It is extremely difficult to construct codebooks achieving the Welch or Levenshtein bound. In this paper, we firstly generalize Jacobi sums over finite fields and secondly obtain asymptotically optimal codebooks with respect to the Welch or Levenshtein bound. Our main results generalize those in [11] and the codebooks in this paper have more flexible parameters than those in [11]. Index Terms Code division multiple access, codebooks, signal sets, compressed sensing, Welch bound, Levenshtein bound. I. I NTRODUCTION ODEBOOKS (also called signal sets) with small inner-product correlation are usually used to distinguish among the signals of different users in code division multiple access (CDMA) systems. An (N, K) codebook C is a set {c0 , c1 , ..., cN −1 }, where each codeword cl , 0 ≤ l ≤ N − 1, is a unit norm 1 × K complex vector over an alphabet. The alphabet size is the number of elements in the alphabet. The maximum cross-correlation amplitude of an (N, K) codebook C is defined by C Imax (C) = max 0≤i<j≤N −1 | ci cH j |, where cH denotes the conjugate transpose of a complex vector c. Imax (C) is a performance measure of a codebook C in practical applications. One important problem is to minimize the codebook’s maximal cross-correlation amplitude. Minimizing Imax (C) among codewords of a codebook C can approximately optimize various performance metrics such as outage probability, average signal-to-noise ratio and symbol error probability for multiple-antenna transmit beamforming from limited-rate feedback [16], [21]. In the context of unitary space-time modulations, minimizing Imax (C) is equivalent to minimizing the block error probability [14]. Codebooks are also called frames. A codebook C with minimal Imax (C) is referred to as a Grassmannian frame. Besides, minimizing Imax (C) of finite frames brings to minimal reconstruction error in multiple description coding over erasure channels [24]. For a given K, we would like to construct an (N, K) codebook with N being as large as possible and Imax (C) being as small as possible simultaneously. However, the following Welch and Levenshtein bounds demonstrate a trade-off among the parameters N, K and Imax (C) of a codebook C. Lemma I.1 (Welch bound). [28] For any (N, K) codebook C with N ≥ K, s N −K Imax (C) ≥ . (N − 1)K In addition, the equality in (I.1) is achieved if and only if s N −K |ci cH j | = (N − 1)K email: [email protected] (I.1) 2 for all pairs (i, j) with i 6= j. If a codebook C achieves the Welch bound in (I.1), which is denoted by IW , we call it a maximumWelch-bound-equality (MWBE) codebook [30]. An MWBE codebook is also called an equiangular tight frame [26]. MWBE codebooks are employed in many applications including CDMA communications [20], space-time codes [25] and compressed sensing [26]. To our knowledge, only the following constructions of MWBE codebooks were reported in literature: (1) In [23], [30], optimal (N, N) and (N, N − 1) codebooks with N > 1 were generated from the (inverse) discrete Fourier transform matrix or ideal two-level autocorrelation sequences. (2) In [2], [24], optimal (N, K) codebooks from conference matrices were given when N = 2K = 2d+1 with d being a positive integer and N = 2K = pd + 1 with p being a prime number and d being a positive integer. (3) In [3], [4], [30], optimal (N, K) codebooks were constructed with cyclic difference sets in the Abelian group (ZN , +) or the additive group of finite fields or Abelian groups in general. (4) In [10], optimal (N, K) codebooks from (2, k, v)-Steiner systems were presented. (5) In [7], [8], [9], [22], graph theory and finite geometries were employed to study MWBE codebooks. According to [24], the Welch bound on Imax (C) of a codebook C is not tight when N > K(K + 1)/2 for real codebooks and N > K 2 for all codebooks. The following Levenshtein bound turns out to be tighter than the Welch bound when N > K 2 . Lemma I.2 (Levenshtein bound). [18] For any real-valued codebook C with N > K(K + 1)/2, s 3N − K 2 − 2K Imax (C) ≥ . (N − K)(K + 2) For any complex-valued codebook C with N > K 2 , s 2N − K 2 − K . Imax (C) ≥ (N − K)(K + 1) (I.2) (I.3) In general, it is very hard to construct codebooks achieving the Levenstein bound, which is denoted by IL (the right-hand side of (I.2) or (I.3)). There are only a few constructions of codebooks achieving the Levenshtein bound. These codebooks meeting the Levenstein bound were constructed from Kerdock codes [1], [31], perfect nonlinear functions [6], bent functions over finite fields [34], and bent functions over Galois rings [12]. Codebooks achieving the Levenshtein bound are employed in quantum physics and the design of spreading sequences for CDMA and sets of mutually unbiased bases [6], [29]. Since it is very difficult to construct optimal codebooks, there have been a number of attempts to construct codebooks asymptotically (or nearly) achieving the Welch bound or the Levenshtein bound, i.e. Imax (C) Imax (C) = 1 or lim = 1. K→∞ K→∞ IW IL lim In [23], Sarwate gave some nearly optimal codebooks from codes and signal sets. In [3], [5], [17], [33], [35], the authors constructed some nearly optimal codebooks based on almost or relative difference sets. In [32], Yu presented some nearly optimal codebooks from binary sequences. Recently, Hu and Wu proposed new constructions of nearly optimal codebooks from difference sets and the product of Abelian groups in [13]. The purpose of this paper is to generalize the main results in [11]. We firstly define a class of character sums called generalized Jacobi sums which generalize the classical Jacobi sums. Based on generalized Jacobi sums and related character sums, two classes of asymptotically optimal codebooks with very flexible parameters are constructed. Our main results contain those in [11] as special cases. 3 II. M ATHEMATICAL F OUNDATIONS In this section, we recall some necessary mathematical foundations on characters, Jacobi sums and Gauss sums over finite fields. They will play important roles in our constructions of codebooks. In this paper, we always assume that p is a prime number and q = pm with m being a positive integer. Let Fq denote the finite field with q elements. Let α be a primitive element of Fq . Let Trq/p be the trace function from Fq to Fp defined by m−1 X j Trq/p (x) = xp . j=0 A. Characters over finite fields In this section, we recall both additive and multiplicative characters over finite fields. Definition II.1. An additive character of Fq is a mapping χ from Fq to the set C∗ of nonzero complex numbers such that χ(x + y) = χ(x)χ(y) for any (x, y) ∈ Fq × Fq . Every additive character of Fq can be expressed as Trq/p (ax) χa (x) = ζp , x ∈ Fq , where ζp is a primitive p-th root of complex unity. If a = 0, we call χ0 the trivial additive character of Fq . If a = 1, we denote χ = χ1 which is called the canonical additive character of Fq . The orthogonal relation of additive characters (see [15]) is given by  X q, if a = 0, χ(ax) = 0 otherwise. x∈Fq Definition II.2. A multiplicative character of Fq is a nonzero function ψ from F∗q to the set C∗ of nonzero complex numbers such that ψ(xy) = ψ(x)ψ(y) for any x, y ∈ F∗q , where F∗q = Fq \{0}. The multiplicative characters of Fq can be expressed as follows [15]. Let ζh = e root of complex unity. For j = 0, 1, · · · , q − 2, the functions ψj defined by 2π √ h −1 denote the h-th jk ψj (αk ) = ζq−1 , for k = 0, 1, · · · , q − 2, are all the multiplicative characters of Fq . If j = 0, we have ψ0 (x) = 1 for any x ∈ F∗q . We call ψ0 the trivial multiplicative character of Fq . For two multiplicative characters ψ, ψ ′ , we define their multiplication by setting ψψ ′ (x) = ψ(x)ψ ′ (x) b∗ be the set of all multiplicative characters of Fq . Let ψ denote the conjugate character for all x ∈ F∗q . Let F q of ψ by setting ψ(x) = ψ(x), where ψ(x) denotes the complex conjugate of ψ(x). It is easy to verify that b∗ forms a group under the multiplication of characters. Furthermore, F b ∗ is isomorphic ψ −1 = ψ. Then F q q ∗ to Fq . For a multiplicative character ψ of Fq , the orthogonal relation (see [15]) of it is given by  X q − 1, if ψ = ψ0 , ψ(x) = 0 otherwise. ∗ x∈Fq 4 B. Jacobi sums We now extend the definition of a multiplicative character ψ by setting  1, if ψ = ψ0 , ψ(0) = 0, if ψ 6= ψ0 . (II.1) As a result, the property that ψ(xy) = ψ(x)ψ(y) holds for all x, y ∈ Fq . With this definition, we have then  X q, if ψ = ψ0 , ψ(x) = (II.2) 0 otherwise. x∈Fq Definition II.3. [15, p. 205] Let λ1 , . . . , λk be k multiplicative characters of Fq . The sum X J(λ1 , . . . , λk ) = λ1 (c1 ) · · · λk (ck ), c1 +···+ck =1 c1 ,··· ,ck ∈Fq is called a Jacobi sum in Fq . Jacobi sums are very useful in coding theory, sequence design and cryptography. For any a ∈ F∗q , more generally, we define the sum X Ja (λ1 , . . . , λk ) = λ1 (c1 ) · · · λk (ck ), (II.3) c1 +···+ck =a where the summation extends over all k-tuples (c1 , . . . , ck ) of elements of Fq satisfying c1 + · · · + ck = a. Hence, J1 (λ1 , . . . , λk ) = J(λ1 , . . . , λk ). It was shown in [15, p. 205] that Ja (λ1 , . . . , λk ) = (λ1 · · · λk )(a)J(λ1 , . . . , λk ). (II.4) Therefore, |Ja (λ1 , . . . , λk )| = |J(λ1 , . . . , λk )|. In [15], the values of |J(λ1 , . . . , λk )| were determined for several cases. C. Gauss sums Let ψ be a multiplicative character and χ an additive character of Fq . The Gauss sum G(ψ, χ) is defined by X ψ(x)χ(x). G(ψ, χ) = x∈F∗q The explicit value of G(ψ, χ) is very difficult to determine in general. However, its absolute value is known as follows. Lemma II.4. [15, Th. 5.11] Let ψ be a multiplicative character and χ an additive character of Fq . Then G(ψ, χ) satisfies   q − 1, if ψ = ψ0 , χ = χ0 , −1, if ψ = ψ0 , χ 6= χ0 , G(ψ, χ) =  0, if ψ 6= ψ0 , χ = χ0 . If ψ 6= ψ0 , χ 6= χ0 , then |G(ψ, χ)| = √ q. If we consider the extended definition of ψ in Equation (II.1), then extended Gauss sum can be defined as b G(ψ, χ) = X x∈Fq ψ(x)χ(x). 5 Lemma II.4 yields the following corollary. b Corollary II.5. Let ψ be a multiplicative character and χ an additive character of Fq . Then G(ψ, χ) satisfies   q, if ψ = ψ0 , χ = χ0 , b 0, if ψ = ψ0 , χ 6= χ0 , G(ψ, χ) =  0, if ψ 6= ψ , χ = χ . 0 0 If ψ 6= ψ0 , χ 6= χ0 , then b |G(ψ, χ)| = √ q. III. G ENERALIZED JACOBI SUMS AND RELATED CHARACTER SUMS In this section, we present a generalization of Jacobi sums. Let k be any positive integer. For each integer 1 ≤ i ≤ k, let mi be any positive integer, λi a multiplicative character of Fqmi , χi the canonical additive character of Fqmi , and Trqmi /q the trace function from Fqmi to Fq . Let χ denote the canonical additive character of Fq . Now we define the generalized Jacobi sums by X Jba (λ1 , . . . , λk ) = λ1 (c1 ) · · · λk (ck ), (c1 ,··· ,ck )∈Sb where Sb = {(c1 , · · · , ck ) ∈ Fqm1 × . . . × Fqmk : Trqm1 /q (c1 ) + · · · + Trqmk /q (ck ) = a} b = q m1 +···+mk −1 . If m1 = m2 = · · · = mk = 1 and a = 1, then Jba (λ1 , . . . , λk ) and a ∈ F∗q . Note that |S| is the usual Jacobi sum. b∗mi = hφi i Theorem III.1. Let λi be a multiplicative character of Fqmi for i = 1, 2, . . . , k. Assume that F q and λi = φtii , where i = 1, 2, . . . , k and 0 ≤ ti ≤ q mi − 2. (1) If all the multiplicative characters λ1 , . . . , λk are trivial, then Jba (λ1 , . . . , λk ) = q m1 +···+mk −1 . (2) If some, but not all, of λ1 , . . . , λk are trivial, then Jba (λ1 , . . . , λk ) = 0. (3) If all the multiplicative characters λ1 , . . . , λk are nontrivial and t1 + · · · + tk ≡ 0 (mod q − 1), then |Jba (λ1 , . . . , λk )| = q m1 +···+mk −2 2 . (4) If all the multiplicative characters λ1 , . . . , λk are nontrivial and t1 + · · · + tk 6≡ 0 (mod q − 1), then |Jba (λ1 , . . . , λk )| = q m1 +···+mk −1 2 . Proof. By the orthogonal relation of additive characters, we have X X  1 χ y Trqm1 /q (c1 ) + · · · + Trqmk /q (ck ) − a Jba (λ1 , . . . , λk ) = λ1 (c1 ) · · · λk (ck ) q y∈F (c1 ,...,ck )∈Fqm1 ×···×Fqmk =  1 q c X 1 ∈Fq m1 q   λ1 (c1 ) · · ·  X ck ∈Fqm1  λk (ck ) X y∈F∗q  χ y Trqm1 /q (c1 ) + · · · + Trqmk /q (ck ) − a 6   X   X 1 +  λ1 (c1 ) · · ·  λk (ck ) q c ∈F m ck ∈Fqm1 1 q 1     X X X 1 χ1 (yc1 ) · · · χk (yck )χ(ay) λ1 (c1 ) · · ·  λk (ck ) = q c ∈F m ∗ y∈Fq ck ∈Fqm1 1 q 1     X X 1 λ1 (c1 ) · · ·  λk (ck ) +  q c ∈F m ck ∈Fqm1 1 q 1     X X X 1 λk (yck )χk (yck ) λ1 (yc1 )χ1 (yc1 ) · · ·  = χ(ay)λ1 · · · λk (y)  q y∈F∗ ck ∈Fqmk c1 ∈Fqm1 q     X X 1 +  λk (ck ) λ1 (c1 ) · · ·  q c ∈F m c ∈F m 1 = k 1 X q 1 1b b k , χk ) G(λ1 , χ1 ) · · · G(λ χ(ay)λ1 · · · λk (y) q y∈F∗q     X X 1 +  λ1 (c1 ) · · ·  λk (ck ) q c ∈F m c ∈F m 1 = q q 1 q 1 k q 1 q 1 X 1 b 1 , χ1 ) · · · G(λ b k , χk ) χ(ay)λ1 · · · λk (ay) (λ1 · · · λk )(a)G(λ q y∈F∗q     X X 1 λ1 (c1 ) · · ·  +  λk (ck ) . q c ∈F m c ∈F m 1 k (III.1) b∗ = hψi. For b∗mi = hφi i and λi = φti , where i = 1, 2, . . . , k and 0 ≤ ti ≤ q mi − 2. Let F Assume that F q q i y ∈ F∗q , one can deduce that φi (y) = ψ(y) for i = 1, 2, . . . , k. Hence, (λ1 · · · λk )(y) = ψ t1 +···+tk (y) where y ∈ F∗q and 0 ≤ ti ≤ q mi − 2 for i = 1, 2, . . . , k. This implies that X X χ(ay)λ1 · · · λk (ay) = χ(y)λ1 · · · λk (y) y∈F∗q y∈F∗q = X χ(y)ψ t1 +···+tk (y) y∈F∗q = G(ψ t1 +···+tk , χ). (III.2) Combining Equations (III.1) and (III.2), we have 1 b 1 , χ1 ) · · · G(λ b k , χk )G(ψ t1 +···+tk , χ) (λ1 · · · λk )(a)G(λ Jba (λ1 , . . . , λk ) = q     X X 1 +  λk (ck ) λ1 (c1 ) · · ·  q c ∈F m c ∈F m 1 q 1 k q 1 (III.3) 7 where 0 ≤ ti ≤ q mi − 2 for i = 1, 2, . . . , k. In the following, we discuss the absolute values of Jba (λ1 , . . . , λk ), a ∈ F∗q , in several cases. (1) If all the multiplicative characters λ1 , . . . , λk are trivial, we have b = q m1 +···+mk −1 . Jba (λ1 , . . . , λk ) = |S| (2) If some, but not all, of λ1 , . . . , λk are trivial, then by Equations (II.2), (III.3) and Corollary (II.5) we have Jba (λ1 , . . . , λk ) = 0. (3) Assume that all the multiplicative characters λ1 , . . . , λk are nontrivial. By Equations (II.2) and (III.3), we have 1 b 1 , χ1 ) · · · G(λ b k , χk )G(ψt1 +···+tk , χ). Jba (λ1 , . . . , λk ) = (λ1 · · · λk )(a)G(λ q Now we discuss the absolute values of Jba (λ1 , . . . , λk ) in the following two cases. • If t1 + · · · + tk ≡ 0 (mod q − 1), then by Lemma II.4 and Corollary II.5 we have |Jba (λ1 , . . . , λk )| = q m1 +···+mk −2 2 . • If t1 + · · · + tk 6≡ 0 (mod q − 1), then by Lemma II.4 and Corollary II.5 we have The proof is completed. |Jba (λ1 , . . . , λk )| = q m1 +···+mk −1 2 . Now we define another character sum related to generalized Jacobi sums by X Jea (λ1 , . . . , λk ) = λ1 (c1 ) · · · λk (ck ), (c1 ,··· ,ck )∈Se where and a ∈ Fq . Se = {(c1 , · · · , ck ) ∈ F∗qm1 × . . . × F∗qmk : Trqm1 /q (c1 ) + · · · + Trqmk /q (ck ) = a} e for a ∈ F∗q and a = 0 are given as follows. Lemma III.2. The values of |S|  e = 1 (q m1 − 1) · · · (q mk − 1) + (−1)k+1 . (1) For a ∈ F∗q , |S| q  e = 1 (q m1 − 1) · · · (q mk − 1) + (−1)k (q − 1) . (2) For a = 0, |S| q Proof. By the orthogonal relation of additive characters, we have X X X e = 1 χ(y(Trqm1 /q (c1 ) + · · · + Trqmk /q (ck ) − a)) ··· |S| q c ∈F∗ ∗ y∈F c ∈F q 1 k q m1 q mk     m1 mk X X X (q − 1) · · · (q − 1) 1 = χk (yck ) χ1 (yc1 ) · · ·  χ(−ay)  + q q y∈F∗ ck ∈F∗mk c1 ∈F∗qm1 q q   1 m1 mk k+1 ∗ (q − 1) · · · (q − 1) + (−1) , if a ∈ Fq , q  = 1 m1 mk k (q − 1) · · · (q − 1) + (−1) (q − 1) , if a = 0. q The relationship between Jea (λ1 , . . . , λk ) and Jba (λ1 , . . . , λk ), a ∈ F∗q , is established as follows. Lemma III.3. The relationship between Jea (λ1 , . . . , λk ) and Jba (λ1 , . . . , λk ), a ∈ F∗q , is given as follows. 8 (1) If all of λ1 , . . . , λk are nontrivial, then Jea (λ1 , . . . , λk ) = Jba (λ1 , . . . , λk ). (2) If λ1 , . . . , λh are nontrivial and λh+1 , . . . , λk are trivial, 1 ≤ h ≤ k − 1, then Jea (λ1 , . . . , λk ) = (−1)k−h Jba (λ1 , . . . , λh ). Proof. The first conclusion is obvious and we only prove the second conclusion. If λ1 , . . . , λh are nontrivial and λh+1 , . . . , λk are trivial, 1 ≤ h ≤ k − 1, then X Jea (λ1 , . . . , λk ) = λ1 (c1 ) · · · λk (ck ) (c1 ,··· ,ck )∈Se X = (c1 ,··· ,ck )∈Se λ1 (c1 ) · · · λh (ch ), where Se = {(c1 , · · · , ck ) ∈ F∗qm1 × . . . × F∗qmk : Trqm1 /q (c1 ) + · · · + Trqmk /q (ck ) = a}. For a fixed h-tuple (c1 , . . . , ch ) ∈ F∗qm1 × · · · × F∗qmh , we deduce that the number of the solutions of the equation Trqmh+1 /q (ch+1 ) + · · · + Trqmk /q (ck ) = a − (Trqm1 /q (c1 ) + · · · + Trqmh /q (ch )) equals   (q mh+1 − 1) · · · (q mk − 1) + (−1)k−h+1 , if Trqm1 /q (c1 ) + · · · + Trqmh /q (ch ) 6= a,  mh+1 mk k−h (q − 1) · · · (q − 1) + (−1) (q − 1) , if Trqm1 /q (c1 ) + · · · + Trqmh /q (ch ) = a, 1 q 1 q by Lemma III.2. Hence, Jea (λ1 , . . . , λk )  1 = (q mh+1 − 1) · · · (q mk − 1) + (−1)k−h+1 q + = (c1 ,··· ,ch )∈F∗qm1 ×···×F∗qmh  1 (q mh+1 − 1) · · · (q mk − 1) + (−1)k−h+1 q Since λ1 , . . . , λh are nontrivial, we have X (c1 ,··· ,ch )∈F∗qm1 ×···×F∗qmh  λ1 (c1 ) · · · λh (ch ) =  λ1 (c1 ) · · · λh (ch ) Trqm1 /q (c1 )+···+Trqmh /q (ch )6=a  1 (q mh+1 − 1) · · · (q mk − 1) + (−1)k−h (q − 1) q +(−1)k−h Jea (λ1 , . . . , λh ). Thus X X (c1 ,··· ,ch )∈F∗qm1 ×···×F∗qmh Trqm1 /q (c1 )+···+Trqmh /q (ch )=a X (c1 ,··· ,ch )∈F∗qm1 ×···×F∗qmh X c1 ∈F∗qm1 λ1 (c1 ) · · · λh (ch )   λ1 (c1 ) · · ·  λ1 (c1 ) · · · λh (ch ) X ch ∈F∗mh q λh (ch ) = 0. Jea (λ1 , . . . , λk ) = (−1)k−h Jea (λ1 , . . . , λh ) = (−1)k−h Jba (λ1 , . . . , λh ). Theorem III.1 and Lemma III.3 yield the following theorem.  9 Theorem III.4. Let a ∈ F∗q . Let λi be a multiplicative character of Fqmi for i = 1, 2, . . . , k. Assume that b∗mi = hφi i and λi = φti , where i = 1, 2, . . . , k and 0 ≤ ti ≤ q mi − 2. F q i (1) If all the multiplicative characters λ1 , . . . , λk are trivial, then  1 Jea (λ1 , . . . , λk ) = (q m1 − 1) · · · (q mk − 1) + (−1)k+1 . q (2) If λ1 , . . . , λh are nontrivial, λh+1 , . . . , λk are trivial and t1 +· · ·+th ≡ 0 (mod q−1),1 ≤ h ≤ k −1, then m1 +···+mh −2 2 |Jea (λ1 , . . . , λk )| = q . (3) If λ1 , . . . , λh are nontrivial, λh+1 , . . . , λk are trivial and t1 +· · ·+th 6≡ 0 (mod q−1), 1 ≤ h ≤ k−1, then m1 +···+mh −1 2 . |Jea (λ1 , . . . , λk )| = q (4) If all the multiplicative characters λ1 , . . . , λk are nontrivial and t1 + · · · + tk ≡ 0 (mod q − 1), then |Jea (λ1 , . . . , λk )| = q m1 +···+mk −2 2 . (5) If all the multiplicative characters λ1 , . . . , λk are nontrivial and t1 + · · · + tk 6≡ 0 (mod q − 1), then IV. A SYMPTOTICALLY |Jea (λ1 , . . . , λk )| = q m1 +···+mk −1 2 . OPTIMAL CODEBOOKS BASED ON GENERALIZED JACOBI SUMS AND RELATED CHARACTER SUMS In this section, we present a construction of codebooks with multiplicative characters of finite fields. We follow the notations in Section III. Let Fqm1 , . . . , Fqmk , be any k finite fields, where m1 , . . . , mk are any k positive integers. For an nonempty set S ⊆ Fqm1 × · · · × Fqmk , let K := |S|. Let EK denote the set formed by the standard basis of the K-dimensional Hilbert space: (1, 0, 0, · · · , 0, 0), (0, 1, 0, · · · , 0, 0), .. . (0, 0, 0, · · · , 0, 1). b∗mi , i = 1, 2, . . . , k, we define a unit-norm codeword of length K by For any λi ∈ F q c(λ1 , . . . , λk ) = √ 1 nc̄(λ1 ,...,λk ) (λ1 (c1 ) · · · λk (ck ))(c1 ,...,ck )∈S , (IV.1) where nc̄(λ1 ,...,λk ) denotes the Euclidean norm of the vector c̄(λ1 , . . . , λk ) := (λ1 (c1 ) · · · λk (ck ))(c1 ,...,ck )∈S . Now we present a construction of codebooks as b∗mi for i = 1, 2, . . . , k} ∪ EK . C = {c(λ1 , . . . , λk ) : λi ∈ F q (IV.2) Q Then C has N = ki=1 (q mi − 1) + K codewords. If the set S is properly selected, then C may have good parameters with respect to the Welch or the Levenshtein bound. 10 A. When S = Sb b where Sb is defined in Section III for In the following, we investigate Imax (C) if we select S = S, ∗ m1 +···+mk −1 b a ∈ Fq . Then K = |S| = q . Now we consider the value of nc̄(λ1 ,...,λk ) defined in Equation (IV.1). It is easy to verify that e ≤ nc̄(λ ,...,λ ) ≤ |S|, b |S| (IV.3) 1 k  e = 1 (q m1 − 1) · · · (q mk − 1) + (−1)k+1 by Lemma III.2 and |S| b = q m1 +···+mk −1 . We remark where |S| q that nc̄(λ1 ,...,λk ) achieves the lower bound of Inequality (IV.3) if all of λ1 , · · · , λk are nontrivial, and achieves the upper bound of Inequality (IV.3) if all of λ1 , · · · , λk are trivial. Theorem IV.1. If S = Sb and q ≥ 4, the codebook C in Equation (IV.2) has parameters ! k Y (q mi − 1) + q m1 +···+mk −1 , q m1 +···+mk −1 i=1 and q Imax (C) = Qk m1 +···+mk +1 2 mi − 1) + (−1)k+1 i=1 (q . Proof. Let c′ , c′′ ∈ C be any two different codewords. Denote F = C\EK . Now we calculate the correlation of c′ and c′′ in the following cases. (1) If c′ , c′′ ∈ EK , we directly have |c′ c′′H | = 0. (2) If c′ ∈ F , c′′ ∈ EK or c′ ∈ EK , c′′ ∈ F , we have |c′ c′′H | = √ 1 nc̄(λ1 ,...,λk ) |λ1 (c1 ) · · · λk (ck )| = √ 1 nc̄(λ1 ,...,λk ) b∗mi , i = 1, 2, . . . , k. By Equation (IV.3), we have for some (c1 , . . . , ck ) ∈ Sb and λi ∈ F q r 1 q ′ ′′H p . ≤ |c c | ≤ m m 1 (q − 1) · · · (q k − 1) + (−1)k+1 q m1 +···+mk −1 Both the lower bound and the upper bound of this inequality can be achieved. (3) If c′ , c′′ ∈ F , we assume that c′ = c(λ′1 , . . . , λ′k ) and c′′ = c(λ′′1 , . . . , λ′′k ) with (λ′1 , . . . , λ′k ) 6= b∗mi for i = 1, 2, . . . , k. Denote λi = λ′ λ′′ for all i = 1, 2, . . . , k. Then (λ′′1 , . . . , λ′′k ) where λ′i , λ′′i ∈ F i i q by Equation (IV.1) we have X 1 1 c′ c′′H = √ ·√ λ1 (c1 ) · · · λk (ck ) nc̄(λ′1 ,...,λ′k ) nc̄(λ′′1 ,...,λ′′k ) (c1 ,...,ck )∈Sb = √ 1 nc̄(λ′1 ,...,λ′k ) ·√ 1 nc̄(λ′′1 ,...,λ′′k ) Jba (λ1 , . . . , λk ). Since (λ′1 , . . . , λ′k ) 6= (λ′′1 , . . . , λ′′k ), not all of λi , i = 1, 2, · · · , k are trivial characters. Hence, by Theorem III.1, we have ( ) m1 +···+mk −2 m1 +···+mk −1 2 2 q q |c′ c′′H | ∈ 0, √ ,√ . √ √ nc̄(λ′1 ,...,λ′k ) · nc̄(λ′′1 ,...,λ′′k ) nc̄(λ′1 ,...,λ′k ) · nc̄(λ′′1 ,...,λ′′k ) Due to the lower bound of Inequality (IV.3), we obtain m1 +···+mk +1 ′ ′′H |c c |≤ (q m1 2 q . m k − 1) · · · (q − 1) + (−1)k+1 (IV.4) 11 In the following, we prove that there indeed exist c′ , c′′ ∈ F such that |c′ c′′H | achieves the upper bound in Inequality (IV.4). Due to Lemma III.1 and Inequality (IV.3), it is sufficient to prove that there exist (λ′1 , . . . , λ′k ), (λ′′1 , . . . , λ′′k ) such that • all of λ′1 , . . . , λ′k are nontrivial, • all of λ′′1 , . . . , λ′′k are nontrivial, b∗mi = hφi i • all of λ1 , . . . , λk are nontrivial and t1 +· · ·+tk 6≡ 0 (mod q −1), where λi = λ′i λ′′i , F q ti and λi = φi for i = 1, 2, . . . , k and 0 ≤ ti ≤ q mi − 2. In fact, we can choose a positive integer s such that 0 < s ≤ min{q mi − 2 : i = 1, · · · , k} and 0 < s + 1 ≤ min{q mi − 2 : i = 1, · · · , k}. Firstly, we assume that k = 2t + 1 for some nonnegative integer t. Let s+1 s (λ′1 , · · · , λ′t , λ′t+1 , · · · , λ′2t , λ′2t+1 ) = (φs1 , · · · , φst , φs+1 t+1 , · · · , φ2t , φ2t+1 ) and s+1 (λ′′1 , · · · , λ′′t , λ′′t+1 , · · · , λ′′2t , λ′′2t+1 ) = (φs+1 , φst+1 , · · · , φs2t , φs+1 1 , · · · , φt 2t+1 ). Then −1 1 1 −1 (λ1 , · · · , λt , λt+1 , · · · , λ2t , λ2t+1 ) = (φ−1 1 , · · · , φt , φt+1 , · · · , φ2t , φ2t+1 ), which implies that t1 + · · · + tk ≡ −1 (mod q − 1). Secondly, we assume that k = 2t for some positive integer t. Let s s (λ′1 , · · · , λ′t−1 , λ′t , · · · , λ′2t−2 , λ′2t−1 , λ′2t ) = (φs1 , · · · , φst−1 , φs+1 , · · · , φs+1 t 2t−2 , φ2t−1 , φ2t ) and s+1 s s s+1 s+1 (λ′′1 , · · · , λ′′t−1 , λ′′t , · · · , λ′′2t−2 , λ′′2t−1 , λ′′2t ) = (φs+1 1 , · · · , φt−2 , φt−1 , · · · , φ2t−2 , φ2t−1 , φ2t ). Then −1 1 1 −1 −1 (λ1 , · · · , λt−2 , λt−1 , · · · , λ2t−2 , λ2t−1 , λ2t ) = (φ−1 1 , · · · , φt−2 , φt−1 , · · · , φ2t−2 , φ2t−1 , φ2t ), which implies that t1 + · · · + tk ≡ −2 (mod q − 1). Thus we have proved that there indeed exist c′ , c′′ ∈ F such that m1 +···+mk +1 ′ ′′H |c c |= (q m1 2 q . m − 1) · · · (q k − 1) + (−1)k+1 Summarizing the conclusions in the three cases above, we obtain Imax (C) = Qk q i=1 (q m1 +···+mk +1 2 mi − 1) + (−1)k+1 . Theorem IV.1 contains Theorem 19 in [11] as a special case. If not all of mi , i = 1, · · · , k, are equal to each other, then the parameters of C in Theorem IV.1 are different to those of the codebook in Theorem 19 of [11]. Remark IV.2. Now we show that C in Theorem IV.1 are asymptotically optimal. 12 If k = 1 and m1 = 2, then C is a (q 2 + q − 1, q) codebook with Imax (C) = √ √1 . q In this case, we (C) limq→∞ Imax IL q+2 q+1 by Lemma I.2. Then we have = 1 which implies that C is have N > K 2 and IL = asymptotically achieving the Levenshtein bound. If k = 1, m1 > 2 or k > 1, we can deduce that N < K 2 and s Qk mi − 1) i=1 (q IW = Qk ( i=1 (q mi − 1) + q m1 +···+mk −1 − 1)q m1 +···+mk −1 due to Lemma I.1. By Theorem IV.1, we can prove that limq→∞ asymptotically achieving the Welch bound. Imax (C) IW = 1 which implies that C is B. When S = Se e where Se is defined in Section III for a ∈ F∗ . In the following, we investigate Imax (C) if we select S = S, q  e = 1 (q m1 − 1) · · · (q mk − 1) + (−1)k+1 by Lemma III.2. It is clear that nc̄(λ1 ,...,λ ) = K Then K = |S| k q b∗mi , i = 1, 2, · · · , k. in Equation (IV.1) for any λi ∈ F q e the codebook C in Equation (IV.2) has parameters Theorem IV.3. If S = S, ! !! k k k Y Y Y 1 1 (q mi − 1) + (q mi − 1) + (−1)k+1 , (q mi − 1) + (−1)k+1 q q i=1 i=1 i=1 and Imax (C) = Qk q i=1 (q m1 +···+mk +1 2 mi − 1) + (−1)k+1 . Proof. Let c′ , c′′ ∈ C be any two different codewords. Denote F = C\EK . Now we calculate the correlation of c′ and c′′ in the following cases. (1) If c′ , c′′ ∈ EK , we directly have |c′ c′′H | = 0. (2) If c′ ∈ F , c′′ ∈ EK or c′ ∈ EK , c′′ ∈ F , we have 1 1 |c′ c′′H | = √ |λ1 (c1 ) · · · λk (ck )| = √ K K ∗ b mi , i = 1, 2, . . . , k. for some (c1 , . . . , ck ) ∈ Se and λi ∈ F q ′ ′′ ′ (3) If c , c ∈ F , we assume that c = c(λ′1 , . . . , λ′k ) and c′′ = c(λ′′1 , . . . , λ′′k ) with (λ′1 , . . . , λ′k ) 6= b∗mi for i = 1, 2, . . . , k. Denote λi = λ′ λ′′ for all i = 1, 2, . . . , k. Then (λ′′1 , . . . , λ′′k ) where λ′i , λ′′i ∈ F i i q by Equation (IV.1) we have X 1 c′ c′′H = λ1 (c1 ) · · · λk (ck ) K (c1 ,...,ck )∈Se 1 e Ja (λ1 , . . . , λk ). K Since (λ′1 , . . . , λ′k ) 6= (λ′′1 , . . . , λ′′k ), not all of λi , i = 1, 2, · · · , k are trivial characters. Hence, by Theorem III.4, we have ) ( m1 +···+mh −1 ) ( m1 +···+mh −2 [ q 2 2 q :1≤h≤k :1≤h≤k . |c′ c′′H | ∈ K K = Summarizing the conclusions in the three cases above, we obtain Imax (C) = Qk q m1 +···+mk +1 2 mi − 1) + (−1)k+1 i=1 (q . 13 Theorem IV.2 contains Theorem 15 in [11] as a special case. If not all of mi , i = 1, · · · , k, are equal to each other, then the parameters of C in Theorem IV.1 are different to those of the codebook in Theorem 15 of [11]. Remark IV.4. Now we show that C in Theorem IV.3 is asymptotically optimal. If k = 1 and m1 = 2, then C in Theorem IV.3 is the same as that in Theorem IV.1. Hence, by Remark IV.2, C is asymptotically optimal according to the Levenshtein bound. If k = 2 and m1 = m2 = 1, then C in Theorem IV.3 is the same as that in [11, Theorem 16]. Hence, by [11, Theorem 16], C is asymptotically optimal according to the Levenshtein bound. In other cases, by Theorem IV.3 we have N < K 2 . Combining Lemma I.1 and Theorem IV.3, we can (C) easily prove that limq→∞ Imax = 1. Then C is asymptotically optimal according to the Welch bound. IW V. C ONCLUSIONS AND REMARKS This paper gave two classes of asymptotically optimal codebooks based on generalized Jacobi sums and related character sums. The main contributions are the following: • We generalized the classical Jacobi sums over finite fields and defined so-called generalized Jacobi sums. The absolute values of the generalized Jacobi sums were investigated. Besides, some related characters sums derived from generalized Jacobi sums were also studied. • We obtained a class of asymptotically optimal codebooks in Theorem IV.1 based on generalized Jacobi sums. This result contains that in [11, Theorem 19] as a special case. • We obtained a class of asymptotically optimal codebooks in Theorem IV.3 based on character sums related to generalized Jacobi sums. This result contains that in [11, Theorem 15] as a special case. As pointed out in [16], constructing optimal codebooks with minimal Imax is very difficult in general. This problem is equivalent to line packing in Grassmannian spaces [2]. In frame theory, such a codebook with Imax minimized is referred to as a Grassmannian frame [24]. The codebooks presented in this paper should have applications in these areas. With the framework developed in [19], our codebooks can be used to obtain deterministic sensing matrices with small coherence for compressed sensing. R EFERENCES [1] A. R. Calderbank, P. J. Cameron, W. M. Kantor, and J. J. Seidel, “Z4 -kerdock codes, orthogonal spreads, and extremal Euclidean line-sets,” Proc. London Math. Soc., vol. 75, no. 3, pp. 436–480, 1997. [2] J. H. Conway, R. H. Harding, and N. J. A. Sloane, “Packing lines, planes, etc.: Packings in grassmannian spaces,” Exp. Math., vol. 5, no. 2, pp. 139–159, 1996. [3] C. Ding, “Complex codebooks from combinatorial designs,” IEEE Trans. Inf. Theory, vol. 52, no. 9, pp. 4229–4235, Sept. 2006. [4] C. Ding and T. Feng, “A generic construction of complex codebooks meeting the Welch bound,” IEEE Trans. Inf. Theory, vol. 53, no. 11, pp. 4245–4250, Nov. 2007. [5] C. Ding, T. Feng, “Codebooks from almost difference sets,” Des. codes Crypt., vol. 53, no. 11, pp. 4245–4250, Nov. 2007. [6] C. Ding, J. Yin, “Singal sets from functions with optimal nonlinearity,” IEEE Trans. Commun., vol. 55, no. 5, pp. 936–940, May 2007. [7] M. Fickus, D. G. Mixon, “Tables of the existence of equiangular tight frames,” arXiv:1504.00253v2, 2016. [8] M. Fickus, D. G. Mixon, J. Jasper, “Equiangular tight frames from hyperovals,” IEEE Trans. Inf. Theory, vol. 62, no. 9, pp. 5225–5236, 2016. [9] M. Fickus, J. Jasper, D. G. Mixon, J. Peterson, “Tremain equiangular tight frames,” arXiv:1602.03490v1, 2016. [10] M. Fickus, D. G. Mixon, and J. C. Tremain, “Steiner equiangular tight frames,” Linear Algebra Appl., vol. 436, no. 5, pp. 1014–1027, 2012. [11] Z. Heng, C. Ding, Q. Yue, “New constructions of asymptotically optimal codebooks with multiplicative characters,” IEEE Trans. Inf. Theory, doi: 10.1109/TIT.2017.2693204. [12] Z. Heng, Q. Yue, “Optimal codebooks achieving the Levenshtein bound from generalized bent functions over Z4 ”, Cryptogr. Commun., vol. 9, no. 1 , pp. 41–53, 2017. [13] H. Hu, J. Wu, “New constructions of codebooks nearly meeting the Welch bound,” IEEE Trans. Inf. Theory, vol. 60, no. 2, pp. 1348–1355, Feb. 2014. [14] B. M. Hochwald, T. L. Marzetta, T. L. Richardson, W. Sweldens, and R. Urbanke, “Systematic design of unitary space-time constellations,” IEEE Trans. Inf. Theory, vol. 46, no. 6, pp. 1962–1973, Sept. 2000. [15] R. Lidl, H. Niederreiter, Finite Fields. Cambridge Univ. Press, Cambridge, 1984. 14 [16] D. J. Love, R.W. Heath, and T. Strohmer, “Grassmannian beamforming for multiple-input multiple-output wireless systems,” IEEE Trans. Inf. Theory, vol. 49, no. 10, pp. 2735–2747, Oct. 2003. [17] C. Li, Q. Yue, Y. Huang, “Two families of nearly optimal codebooks,” Des. Codes Crypt., vol. 75, no. 1, pp. 43–57, Apr. 2015. [18] V. I. Levenshtein, “Bounds for packing of metric spaces and some of their applications,” Probl. Cybern., vol. 40, pp. 43–110, 1983. [19] S. Li, G. Ge, “Deterministic sensing matrices arising from near orthogonal systems,” IEEE Trans. Inf. Theory, vol. 60, no. 4, pp. 2291–2302, Feb. 2014. [20] J. L. Massey, T. Mittelholzer, “Welch’s bound and sequence set for code-division muitiple-access systems,” in Sequences II. New York, NY, USA: Springer-verlag, 1993, pp. 63–78. [21] K. Mukkavilli, A. Sabharwal, E. Erkip, and B. A. Aazhang, “On beamforming with finite rate feedback in multiple antenna systems,” IEEE Trans. Inf. Theory, vol. 49, no. 10, pp. 2562–2579, Oct. 2003. [22] F. Rahimi, “Covering graphs and equiangular tight frames,” Ph.D. Thesis, University of Waterloo, Ontario, 2016 (available at http://hdl.handle.net/10012/10793). [23] D. Sarwate, Meeting the Welch bound with equality, Proc. of SETA’98, Springer-Verlag, Berlin, Heidelberg, 1999, pp. 63–79. [24] T. Strohmer and R. W. Heath Jr., “Grassmannian frames with applications to coding and communication,” Appl. Comput. Harmonic Anal., vol. 14, no. 3, pp. 257–275, 2003. [25] V. Tarokh, I. M. Kim, “Existence and construction of noncoherent unitary space-time codes,” IEEE Trans. Inform. Theory, vol. 48, no. 12, pp. 3112–3117, Dec. 2002. [26] E. V. Tsiligianni, L. P. Kondi and A. K. Katsaggelos, “Construction of incoherent unit norm tight frames with application to compressed sensing,” IEEE Trans. Inf. Theory, vol. 60, no. 4, pp. 2319–2330, Apr. 2014. [27] P. Tan, Z. Zhou, D. Zhang, “A construction of codebooks nearly achieving the Levenshtein bound,” IEEE Signal Processing Letters, vol. 23, no. 10, pp. 1306–1309, Oct. 2016. [28] L. Welch, “Lower bounds on the maximum cross correlation of signal,” IEEE Trans. Inf. Theory, vol. IT-20, pp. 397–399, 1974. [29] W. Wooters and B. Fields, “Optimal state-determination by mutually unbiased measurements,” Ann. Phys., vol. 191, no. 2, pp. 363–381, 1989. [30] P. Xia, S. Zhou, and G. B. Giannakis, “Achieving the Welch bound with difference sets,” IEEE Trans. Inf. Theory, vol. 51, no. 5, pp. 1900–1907, May 2005. [31] C. Xiang, C. Ding and S. Mesnager, “Optimal codebooks from binary codes meeting the Levenshtein bound,” IEEE Trans. Inf. Theory, vol. 61, no. 12, pp. 6526–6535, Dec. 2015. [32] N. Y. Yu, “A construction of codebooks associated with binary sequences,” IEEE Trans. Inf. Theory, vol. 58, no. 8, pp. 5522–5533, Aug. 2012. [33] A. Zhang, K. Feng, “Two classes of codebooks nearly meeting the Welch bound,”. IEEE Trans. Inf. Theory, vol. 58, no. 4, pp. 2507–2511, 2009. [34] Z. Zhou, C. Ding and N. Li, “New families of codebooks achieving the Levenshtein bound,” IEEE Trans. Inf. Theory, vol. 60, no. 11, pp. 7382–7387, Nov. 2014. [35] Z. Zhou, X. Tang, “New nearly optimal codebooks from relative difference sets,” Adv. Math. Commun., vol. 5, no. 3, pp. 521–527, 2011.
7cs.IT
1 Comprehensive Modeling of Three-Phase Distribution Systems via the Bus Admittance Matrix arXiv:1705.06782v2 [math.OC] 25 Sep 2017 Mohammadhafez Bazrafshan, Student Member, IEEE, and Nikolaos Gatsis, Member, IEEE Abstract—The theme of this paper is three-phase distribution system modeling suitable for the Z-Bus load-flow. Detailed models of wye and delta constant-power, constant-current, and constantimpedance loads are presented. Models of transmission lines, step-voltage regulators, and transformers that build the bus admittance matrix (Y-Bus) are laid out. The Z-Bus load-flow is then reviewed and the singularity of the Y-Bus in case of certain transformer connections is rigorously discussed. Based on realistic assumptions and conventional modifications, the invertibility of the Y-Bus is proved. Last but not least, MATLAB scripts that model the components of the IEEE 37-bus, the IEEE 123-bus, the 8500-node feeders, and the European 906-bus lowvoltage feeder are provided. Index Terms—Three-phase distribution system modeling, ZIP loads, Z-Bus method, load-flow, bus admittance matrix I. I NTRODUCTION N accurately constructed bus admittance matrix (YBus) that captures the unbalanced characteristics of distribution networks is the basis of several applications such as 1) three-phase load-flow based on Newton-Raphson [1], the current injection method [2], or the Z-Bus method [3]; 2) three-phase optimal power flow (OPF) using interior– point methods [4], semidefinite relaxations [5], or successive convex approximations [6]; 3) voltage security assessment [7], [8] through conditions for solution existence [9]–[13]; 4) optimal system operation by selecting optimal regulator tap settings [14], [15] and optimal capacitor switch reconfiguration [16]; and 5) providing real-time voltage solutions by linearizing three-phase power flow equations [17]–[20]. To facilitate three-phase distribution system studies, such as the above examples, and to bypass single-phase simplifications, this paper brings together models—some previously available, some novel—for elements of distribution networks and constructs the Y-Bus matrix. The Y-Bus matrix incorporates models of three-phase transmission lines, transformers, and step-voltage regulators (SVRs). In addition, this paper analyzes how each model affects the invertibility of the Y-Bus matrix and rigorously proves why a previous proposal in [21] for certain transformer connections removes the singularity of the Y-Bus. The invertibility of the YBus is especially important since it allows for computation of load-flow solutions through the Z-Bus method [3] and provides conditions of solution existence [12], [13]. Three-phase power system modeling is the theme of [22], although models of voltage-dependent loads and SVRs are A The authors are with the Dept. of Electrical & Computer Engineering, Univ. of Texas at San Antonio. Emails: {mohammadhafez.bazrafshan, nikolaos.gatsis}@utsa.edu. This material is based upon work supported by the National Science Foundation under Grant No. CCF-1421583. not included. For the forward-backward sweep load-flow (FBSweep), ABCD matrices of transmission lines, distribution transformers, and SVRs are derived in [23]. Deriving the corresponding admittance matrices from the ABCD parameters is not straightforward—especially for transformers and SVRs. Three-phase nodal admittance matrices of certain transformer connections, such as the delta–delta, are singular [22], [24]. These singularities are somewhat remedied for the FBSweep in [25] by adding independent KCL and KVL equations and in [26] by showing that the zero-sequence components of voltages do not affect the backward sweep calculations; thus, they render unique non-zero sequence voltage solutions. Alternative transformer nodal admittances are suggested in [27] by assembling their symmetrical component circuits. In the Z-Bus method realm, Ohm’s law is used to obtain voltage solutions by inverting the Y-Bus at every iteration. To bypass Y-Bus singularities, [21] advocates adding small admittances from isolated circuits to the ground and [28] suggests modifying the LDL factorization to use the limit for zero by zero divisions. An alternative approach to avoid Y-Bus singularity is to use equivalent current injections [29]. Despite the extensive literature on distribution network modeling [21]–[29] and references therein, precise unified YBus modeling accounting for transmission lines with missing phases and SVRs—as present in IEEE feeders—is lacking. Moreover, there is a deficit in theoretical studies on the invertibility of the Y-Bus and how this is affected by nodal admittances of various distribution system components. This paper sets out to fill the aforementioned gaps. First, detailed models of wye and delta constant-power, constantcurrent, and constant-impedance (ZIP) loads, three-phase transformers, and transmission lines with missing phases are presented. A novel nodal admittance model for SVRs, with and without considering the leakage admittance, is also derived. Specifically, primary-to-secondary gain matrices for line-toneutral voltages are derived from first principles. These are combined with a series transmission line, which is the typical configuration in which SVRs are installed in distribution systems. It is worth noting that the SVR models developed in this work do not use sequence network matrices (as per [23]), and can also be utilized in the FB-Sweep algorithm. Second, this paper precisely explains which distribution system components cause singularities in the Y-Bus and how they can be rectified. In particular, typical SVRs do not render the Y-Bus singular, rather, the Y-Bus singularity is due to self-admittances of certain transformer connections. Based on linear algebra, this paper shows how connecting small shunt admittances, which has been previously proposed for modification of the Y-Bus [21], aids in restoring its invertibil- 2 ity. The Y-Bus invertibility is then proved for networks that include arbitrary combinations of very general and practical component models—including transmission lines with missing phases—that are found in typical distribution feeders. The invertibility of the Y-Bus is necessary for computing voltage solutions via the Z-Bus method. Third, a set of MATLAB scripts is provided online that takes as input the data files for the IEEE 37-bus, the IEEE 123-bus, the 8500-node feeders, and the European 906-bus low voltage feeder [30], and models the loads, transmission lines, SVRs, and transformers. These scripts further build the corresponding Y-Bus for each feeder and implement the Z-Bus method to compute the voltages. The power flow solutions obtained are within 0.75% of benchmark solutions. Paper organization: The notation required for three-phase distribution system modeling is introduced in Section II. Models for wye and delta ZIP loads are given in Section III. Modeling of series elements, i.e., transmission lines, various types of SVRs, and transformers is taken up in Section IV. Section V puts the aforementioned models together, constructs the Y-Bus, reviews the Z-Bus method, and explains the procedures to handle Y-Bus singularities. A rigorous proof of YBus invertibility is detailed in Section VI. Extensions guaranteeing Y-Bus invertibility under more practical considerations are pursued in Section VII. Section VIII provides numerical discussions and load-flow results on distribution test feeders. The paper concludes in Section IX. II. M ODELING N OTATIONS Power distribution networks comprise two types of elements: 1) shunt elements such as loads and shunt capacitors; and 2) series elements such as three-phase transmission lines, transformers, and SVRs. Mathematically, we model a threephase power distribution network by an undirected graph (N , E). The set N := {1, 2, . . . , N } ∪ {S} is the set of nodes and represent the shunt elements, while E := {(m, n)} ⊆ N × N is the set of edges representing the series elements. Node S is considered to be the slack bus connected to the substation. Furthermore, we define the set of neighboring nodes to node n as Nn := {m|(n, m) ∈ E}. For a series element, i.e., the edge (n, m) ∈ E, let Ωnm = Ωmn denote its set of phases. Define iφnm as the current flowing from node n to node m on phase φ ∈ Ωnm S . Define further the available phases of a node n as Ωn := m∈Nn Ωnm . Let inm ∈ C|Ωn | collect the currents on all phases flowing from node n to node m such that inm (Ωnm ) = {iφnm }φ∈Ωnm and inm ({φ}) = 0 if φ ∈ Ωn \ Ωnm , that is, notation inm (Ωnm ) picks the indices of inm that correspond to the phases in Ωnm . We partition N as N = NY ∪N∆ ∪{S} where NY and N∆ collect wye and delta nodes respectively. For wye nodes, i.e., n ∈ NY , Ωn may have one, two, or three available phases. For delta nodes, i.e., n ∈ N∆ , Ωn has at least two available phases, that is |Ωn | ≥ 2. For node n and phase φ ∈ Ωn , the complex line to neutral voltage is denoted by vnφ and the net current injection is denoted by iφn . Moreover, define vectors in = {iφn }φ∈Ωn , vn = {vnφ }φ∈Ωn in C|Ωn | respectively as the vector of TABLE I W YE AND DELTA ZIP LOAD MODELS Current portion Wye loads iφ PQn (vn ) φ ∗ −(sφ Ln /vn ) φ vn iφ In (vn ) − φ iφ |v | Ln iφ Zn (vn ) φ φ vn −yL n Delta loads − φ′ ∈Ωn \{φ} − n P φ′ ∈Ωn \{φ} − P φ′ ∈Ωn \{φ} φφ′ n φ φ′ vn −vn sL P !∗ ′ ′ v φ −v φ n n φ φ′ |vn −vn | ′ ′ iφφ Ln φ φ φφ (vn − vn ) yL n net current injection and complex line to neutral voltages at node P n. Notice that Ohm’s law at each node demands in = m∈Nn inm . Collect these quantities for all nodes in the vectors i = {in }n∈N \{S} and v = {vn }n∈N \{S} . further an index set J := {1, . . . , J} where J = PDefine N |Ω n |, and j ∈ J is a linear index corresponding to a n=1 particular pair (n, φ) with n ∈ N \{S} and φ ∈ Ωn . In this case, denote n = Node[j], and define Jn := {j|Node[j] = n} as the set of linear indices corresponding to node n. III. T HREE -P HASE ZIP L OAD M ODELS Due to existence of loads, the nodal net current injection i is a function of nodal voltages v. This dependence is denoted by in (vn ). According to the ZIP load model, in (vn ) is iPQn =  φcomposed of currents from constant-power loads φ iPQn φ∈Ωn , constant-current loads iIn = iIn φ∈Ωn , and  constant-impedance loads iZn = iφZn φ∈Ωn . For n ∈ N \{S} and φ ∈ Ωn we have that iφn (vn ) = iφPQn (vn ) + iφIn (vn ) + iφZn (vn ) (1) where functions iφPQn (vn ), iφIn (vn ), and iφZn (vn ) are given in Table I for wye and delta connections where sφLn , iφLn , φ and yL are respectively the nominal constant-power, constantn current, and constant-impedance portions of the ZIP model ′ φφ′ φφ′ , i for wye nodes n ∈ NY . Quantities sφφ Ln , and yLn are Ln respectively the nominal constant-power, constant-current, and constant-impedance portions of the ZIP model for nodes n ∈ N∆ and over phases φ, ′φ′ ∈ Ω′ n . For′ n ∈ N∆ and φ, φ′ ′ ∈ Ωn , φφ′ φ φ φφ φφ φφ′ φφ we have that sLn = sLn , iLn = iLn , and yLn = yL . Note n φ φ that a simpler constant-current model is setting iIn = iLn . The constant-power or constant-current expressions of Table I may also be used to model distributed generation units connected to node n with appropriate signs for sφLn and iφLn . Due to the linear relationship between voltage and currents of constant-impedance loads in Table I, for all nodes n ∈ NY ∪ N∆ we have iZn (vn ) = −YLn vn (2) where YLn ∈ C|Ωn |×|Ωn | is defined as follows: φ , n ∈ NY , φ ∈ Ωn YLn (φ, φ) = yL n X φφ′ yL , n ∈ N∆ , φ ∈ Ωn YLn (φ, φ) = n (3a) (3b) φ′ ∈Ωn \{φ} ′ φφ YLn (φ, φ′ ) = −yL , n ∈ N∆ , φ ∈ Ωn , φ′ ∈ Ωn \ {φ}. (3c) n 3 Remark 1: The ZIP load model only approximately represents the dependencies of nodal injection currents on voltages. For example, the shortcomings of the ZIP model in capturing the high sensitivity of reactive powers on voltages is known [31]. In such cases, more general models, such as ones where the active and reactive powers are polynomial or exponential functions of the voltages, can be used [32, Tables 1.1–1.4]. The ZIP load model presented in this section is in line with traditional distribution system analysis textbooks such as [23, Chapter 9]. However, the dependency of nodal injection currents in on voltages vn is technically imposed by various individual loads (e.g., residential electrical appliances) aggregated at node n. Even in the case of steady-state power flow studies, determining an accurate in (vn ) requires extensive surveys. In such setups, the ZIP load model can be incorporated to obtain more flexible but yet more complicated models for residential loads; see e.g., [33]. When such complicated load models are utilized, the relationships provided in Table I can be updated accordingly. These modifications will not affect the ensuing discussions on Y-Bus modeling. Each edge (n, m) represents a series element and is modeled by the following two equations: (n) (m) inm = Ynm vn − Ynm vm (4a) (m) (n) vn . imn = Ymn vm − Ymn (4b) (m) (b) Fig. 1. (a) Three-phase transmission line. (b) Step-voltage regulator in series with a transmission line. For typical multi-phase transmission lines, the series impedance matrix Znm is symmetric and its real part Re[Znm ] is positive definite. Based on this property, Lemma 1 proves −1 that Z−1 nm exists and that Re[Znm ] is also positive definite. s The shunt admittance matrix Ynm is also symmetric and s its real part Re[Ynm ] is positive semi-definite. This specific structure will be shown to play a crucial role in guaranteeing the invertibility of a network of three-phase transmission lines. This property will be revisited in Section VI. B. Step-voltage regulators IV. M ODELING OF S ERIES E LEMENTS (n) (a) (m) Matrices Ynm ∈ C|Ωn |×|Ωn | , Ynm ∈ C|Ωn |×|Ωm | , Ymn ∈ (n) C|Ωm |×|Ωm | , and Ymn ∈ C|Ωm |×|Ωn | are determined based on the model of the series element while setting to zero those rows and columns that correspond to missing phases. Matrices (n) (m) (m) (n) Ynm and Ymn (respectively, Ynm and Ymn ) are called selfadmittances (mutual admittances). A. Transmission lines In general, we have that Ωnm ⊆ Ωn for a transmission line on edge (n, m), and it is possible to have that |Ωnm | < |Ωn |. As an example, in the IEEE 13-bus distribution feeder, the three-phase node 671 is connected to the two-phase node 684 through a two-phase distribution line (config. 604). The πmodel for transmission lines depicted in Fig. 1(a) yields [23]   1 s −1 inm (Ωnm ) = Ynm + Z−1 nm vn (Ωnm ) − Znm vm (Ωnm ) (5) 2 where notations inm (Ωnm ) and vn (Ωnm ) pick the indices of inm and vn that correspond to the phases in Ωnm . For example, if vn = [vna , vnb , vnc ]T and Ωnm = {b, c}, then vn (Ωnm ) = [vnb , vnc ]T . Matrix Znm = Zmn ∈ C|Ωnm |×|Ωnm | s s is the series impedance matrix and matrix Ynm = Ymn ∈ |Ωnm |×|Ωnm | C is the shunt admittance matrix of the line. Comparing (5) with (4) yields 1 s (n) (m) + Z−1 Ynm (Ωnm , Ωnm ) = Ymn (Ωnm , Ωnm )= Ynm nm (6a) 2 (m) (n) −1 Ynm (Ωnm , Ωnm ) = Ymn (Ωnm , Ωnm ) =Znm (6b) where the notation Y(Ωnm , Ωnm ) selects rows and columns of Y corresponding to existing phases in Ωnm . The next series element to be modeled is the SVR, a device which is installed either at the substation or along the feeder to keep nodal voltages within acceptable ranges. In essence, the SVR is a connection of auto-transformers with adjustable turns ratios. The turns ratios are dependent on the position of its taps. The taps are determined through a control circuit that approximates the voltage drop from the regulator node to the node whose voltage is to be controlled. In distribution networks, three-phase SVRs are commonly installed in wye, closed-delta, or open-delta configurations [23]. The installation of an SVR is in series with a transmission line similar to Fig. 1(b). The SVR is between nodes n and n′ and the transmission line is between nodes n′ and m. Other than edges (n′ , n) and (n′ , m), no other edges are connected to node n′ . With the regulator taps already determined, an equivalent model for the SVR as a single block between nodes n and m can be derived. This equivalent model eliminates node n′ and creates a virtual edge (n, m) in place of (n, n′ ). Voltages and currents at the primary and the secondary of a SVR are generally related via vn = Av vn′ + ZR inn′ , inn′ = Ai in′ m , (7) where matrices Av , Ai , ZR ∈ CΩn ×Ωn will be referred to as voltage gain, current gain, and impedance matrix of the SVR respectively. The specific entries of the aforementioned matrices Av , Ai , and ZR are determined by the configuration type (wye, closed-delta, or open-delta) as well as the selected tap positions. A realistic assumption is that Ωn = Ωn′ = Ωnn′ , which means the primary and secondary of the SVR have the same available phases. This assumption holds for realistic feeders included in the numerical tests of Section VIII. It will be shown that, for the three common types of SVRs, matrix ZR is diagonal, matrix Av of (7) is invertible, and the following property holds: T A−1 v = Ai . (8) 4 Property (8) allows one to obtain nodal admittance models of SVRs that ultimately guarantee the invertibility of the Y-Bus in Section VI. Nodal admittance models of SVRs are derived T next. From (7), by understanding that A−1 v = Ai , we obtain: vn′ = ATi (vn − ZR Ai in′ m ) . (9) Moreover, the model of (4) for the transmission line (n′ , m) gives the following for the currents in′ m and imn′ : ′ (m) (n ) in′ m = Yn′ m vn′ − Yn′ m vm imn′ = (m) Ymn′ vm − (10a) (n′ ) Ymn′ vn′ . (10b) Using (9) in (10a) yields (n′ ) (m) in′ m = Yn′ m ATi (vn − ZR Ai in′ m ) − Yn′ m vm . (11) By reorganizing (11), we obtain (n′ ) (m) FR in′ m = Yn′ m ATi vn − Yn′ m vm (12) where (n′ ) FR = I|Ωn | + Yn′ m ATi ZR Ai (13) and I|Ωn | is the identity matrix in C|Ωn |×|Ωn | . In Lemma 4 we show that FR is invertible so that in′ m is computed as ′ (m) (n ) −1 T in′ m = F−1 R Yn′ m Ai vn − FR Yn′ m vm . (14) Using the equation for the current in (7), together with (14), we write inm := inn′ as a function of vn and vm : inm := inn′ = Ai in′ m (n′ ) (m) −1 T = Ai F−1 R Yn′ m Ai vn − Ai FR Yn′ m vm . (15) To write imn in terms of vm and vn , we first use (9) in (10b) to obtain (n′ ) (m) imn := imn′ = Ymn′ vm − Ymn′ vn′ (m) (n′ ) (m) (n′ ) = Ymn′ vm − Ymn′ ATi (vn − ZR Ai in′ m ) = Ymn′ vm − Ymn′ ATi vn (n′ ) + Ymn′ ATi ZR Ai in′ m . (16) Next, we replace in′ m in (16) by its equivalent in (14):   (m) (n′ ) (m) imn = Ymn′ − Ymn′ ATi ZR Ai F−1 R Yn′ m vm   (n′ ) (n′ ) T (17) Y − Ymn′ I|Ωn | − ATi ZR Ai F−1 ′ n m Ai vn . R Fig. 2. Model of a single-phase auto-transformer. For brevity, the series impedance is not drawn. rendering ZR = O and FR = I|Ωn | . Thus, we can obtain the following matrices for SVRs with ideal auto-transformers: (n′ ) (m) (m) (n) =Ai Yn′ m , Ynm =Ai Yn′ m ATi , Ynm (n′ ) (n) Ymn =Ymn′ ATi . (m) (m) Ymn =Ymn′ , (19a) (19b) Notice in (18) and (19) that the matrix sizes conform due to the initial assumption that Ωn = Ωn′ . To derive the gain matrices Av and Ai as well as the impedance matrix ZR for the three SVR configurations (wye, closed-delta, and open-delta), it is essential to grasp the basic model of single-phase auto-transformers. A diagram of a single-phase auto-transformer is given in Fig. 2.1 Given the taps, the effective regulator ratio aR is determined as follows: aR = 1 ∓ 0.00625tap. (20) Having determined aR , the voltages and currents on the two sides of the auto-transformer relate as follows: vS − vN = aR (vL − vN ) + zR iS 1 iS = − iL aR (21a) (21b) where zR is the series impedance of the auto-transformer. The voltage and current relationships in (21) are leveraged to derive the gain matrices Av and Ai for three types of SVR connections. Table II summarizes the resulting formulas. Notice Av is invertible and that A−1 = ATi holds for all v SVRs; a crucial property for guaranteeing Y-Bus invertibility. 1) Wye-connected SVRs: The diagram of a wye-connected SVR is given in Fig. 3(a). Using (21a) for the three autotransformers in Fig. 3(a) yields the following equations: vna = aRa vna′ + zRa iann′ (22a) vnb vnc (22b) (22c) = = aRb vnb ′ aRc vnc ′ + + zRb ibnn′ zRc icnn′ (18d) where aRa , aRb , and aRc are the effective regulator ratios determined by the corresponding taps at phases a, b, and c following (20). Similarly, zRa , zRb , and zRc are per phase series impedances of each SVR. From (22), one obtains the SVR voltage gain Av and impedance matrix ZR :     0 0 a Ra 0 0 z Ra a Rb 0  , ZR =  0 z Rb 0  . (23) Av =  0 0 0 a Rc 0 0 z Rc where in (18d) we have used the identity = I|Ωn | − ′ −1 (n ) T Ai ZR Ai FR Yn′ m provided from Lemma 4. In most cases, it turns out that the per unit series impedance of SVRs significantly depends on the tap position and is zero, 1 Depending on the connection of the shunt winding of auto-transformers, SVRs can either be of type A or type B. Since type B SVRs are more common in distribution networks [23], the regulator models developed correspond only to this type of SVRs. The same procedure can be followed through to obtain models for type A SVRs. This has been done for the 8500-node feeder of Section VIII. Equations (15) and (17) conform to the model of (4) and yield the following matrices for the SVRs: (n′ ) −1 (n) Ynm = Ai FR Yn′ m ATi (m) Ynm (m) Ymn (n) Ymn = = = (18a) (m) Ai F−1 R Yn′ m (m) (n′ ) (m) Ymn′ − Ymn′ ATi ZR Ai F−1 R Yn′ m (n′ ) T Ymn′ F−T R Ai F−T R (18b) (18c) 5 TABLE II V OLTAGE GAIN , CURRENT GAIN , AND IMPEDANCE MATRICES FOR THE THREE COMMON CONFIGURATIONS OF STEP - VOLTAGE REGULATORS SVR connection Voltage gain Av Current gain Ai Impedance matrix ZR wye-connected  0 aRa    0  0  0 aRb 0 1  a Ra b 0 0 z Rb 0  0 1 aR   0   aRc 0   0   0  zR  a   0  0 closed-delta    0    1 a Rc 0    0   z Rc     0 aRbc  0 1 − aRca  0 a  Rab  1 − aRab aRbc  0 1 − aRbc  0 zR  ab   0 zRbc  0 0 (a) Fig. 3. 0   1 − aRbc   aRca −1 1 − aRca    0  aRca  0   0   zRca  aR  ab   0  0  1 0 0 ab 1 aR 1 1− ab 0  zR  ab   0  0 0 0 0 0    0   aRcb 1 − aRcb 1 aR   1 −   0 1 − aRab (b)     aR  cb  1 1 aR 0 cb    0   zRcb (c) Three types of step-voltage regulators; (a) wye-connected (b) closed-delta(c) open-delta. For brevity, the series impedances are not drawn. From (21b), we obtain iann′ 1 − aRab aRab open-delta  =− 1 a Ra ian′ n , ibnn′ 1 c 1 b in′ n , icnn′ = − i ′ . (24) =− a Rb a Rc n n Using (24) and recognizing that in′ n = −in′ m holds in (7), we compute Ai  1  0 0 aR a  1 0  Ai =  0 (25) . aR b 1 0 0 aR c 2) Closed-delta connected SVRs: The diagram of closeddelta connected SVR is drawn in Fig. 3(b). Leveraging (21) for the three auto-transformers between phases ab, bc and ca at node n′ , the voltage equations are vna vnb vnc − vnb ′ ⇒ vna − vnc ′ ⇒ vnb − vna′ ⇒ vnc = = = = = = aRab (vna′ − vnb ′ ) + zRab iann′ aRab vna′ + (1 − aRab )vnb ′ + zRab iann′ aRbc (vnb ′ − vnc ′ ) + zRbc ibnn′ aRbc vnb ′ + (1 − aRbc )vnc ′ + zRbc ibnn′ aRca (vnc ′ − vna′ ) + zRca icnn′ aRca vnc ′ + (1 − aRca )vna′ + zRca icnn′ (26a) (26b) (26c) where aRab ,aRbc , and aRca are the effective regulator ratios and zRab , zRbc , and zRca are series impedances on phases ab, bc, and ca at node n′ respectively. From (26), we find   aRab 1 − aRab 0 0 aRbc 1 − aRbc  Av =  (27a) 0 aRca 1 − aRca  zRab ZR =  0 0  0 0 . 0 zRbc 0 (27b) zRca Writing KCL for node n′ at phases a, b, c and considering the current equation in (21b) for auto-transformers yields: ian′ n = −aRab iann′ − (1 − aRca )icnn′ (28a) ibn′ n icn′ n (28b) (28c) = = −aRbc ibnn′ −aRca icnn′ − (1 − aRab )iann′ − (1 − aRbc )ibnn′ . From (28) and using in′ n = −in′ m in (7), we find  aRab Ai = 1 − aRab 0 0 aRbc 1 − aRbc −1 1 − aRca  . 0 aRca (29) 3) Open-delta connected SVRs: The circuit diagram of the open-delta SVR is given in Fig. 3(c). In Fig. 3(c), using the voltage equations in (21) and noticing that vnb = vnb ′ (phase b of node n is connected to phase b of node n′ ) yields vna − vnb ′ = aRab (vna′ − vnb ′ ) + zRab iann′ ⇒ vna = aRab vna′ + (1 − aRab )vnb ′ + zRab iann′ (30a) vnc − vnb ′ = aRcb (vnc ′ − vnb ′ ) + zRcb icnn′ ⇒ vnc = aRcb vnc ′ + (1 − aRcb )vnb ′ + zRcb icnn′ (30b) where aRab and aRcb are the effective regulator ratios and zRab and zRcb are the series impedances on phases ab and cb of node 6 n. Using (30) and the equality vnb = vnb ′ , the gain matrix Av , and the impedance matrix ZR are obtained as follows   aRab 1 − aRab 0 1 0  Av =  0 (31a) 0 1 − aRcb aRcb   zRab 0 0 0 0 . ZR =  0 (31b) 0 0 zRcb For the two SVRs in Fig. 3(c), from (21b) we obtain iann′ = − 1 aRab ian′ n , icnn′ = − 1 aRcb icn′ n . (32) Applying KCL at node K of Fig. 3(c) and subsequently introducing (32) yields ibnn′ as follows: ibnn′ = −iann′ − icnn′ − ian′ n − ibn′ n − icn′ n     1 1 − 1 ian′ n − ibn′ n − − 1 icn′ n . (33) = aRab aRcb Combining in′ n = −in′ m with (32) and (33) yields Ai :   1 0 0 aRab  1 1  (34) Ai = 1 − aRab 1 1 − aRcb  . 1 0 0 aR cb C. Three-phase transformers In distribution systems, a three-phase transformer can be appropriately represented by two blocks, namely, a series block representing the per unit leakage admittance, and a shunt block modeling transformer core losses. Transformer core losses can technically be treated as voltage-dependent loads similar to the ones in Table I, with functions of v given in [29]; notice though that this information may not be readily available for many distribution feeders. The most common distribution transformers include delta–wye grounded, wye–delta, wye–wye, open-wye–open-delta, delta–delta, and open-delta– open-delta for which the ABCD parameters are listed in [23]. The corresponding nodal admittances of these connections are given in [29] and [34] and are listed in Table III where TABLE III A DMITTANCE MATRICES OF THE MOST COMMON TRANSFORMER CONNECTIONS IN DISTRIBUTION SYSTEMS . Transformer connection 1 Y3 = √ 3  y Y5 = t 0 0 yt 0    0 1 2yt −yt −yt 0  , Y2 = −yt 2yt −yt  3 −y −y 2yt yt t t    −yt yt 0 y −yt t 1  0 −yt yt  , Y4 = −yt 2yt 3 yt 0 −yt 0 −yt    1 −yt 0 yt 0 , Y6 = √ . yt −yt yt 3 0 (35a) (m) (m) (n) Node m Ynm Ynm Ymn Ymn Wye-G Wye-G Y1 Y1 Y1 Y1 Wye-G Wye Y2 Y2 Y2 Y2 Wye-G Delta Y1 −Y3 Y2 −Y3T Wye Wye Y2 Y2 Y2 Y2 Wye Delta Y2 −Y3 Y2 −Y3T Y2 Delta Delta Y2 Y2 Y2 Open-Delta Open-Delta Y4 Y4 Y4 Y4 Open-Wye Open-Delta Y5 −Y6 Y4 −Y6T V. Y-B US C ONSTRUCTION Z-B US M ETHOD AND THE The application of KCL at each node n ∈ N leads to X inm , n ∈ N . (36) in (vn ) = m∈Nn Leveraging the series element model in (4), we arrive at the multidimensional Ohm’s law     v i , (37) = Ynet vS iS where vS is the voltage at the slack bus and likewise iS is the current injection at the slack bus. Typically, vS is equal to the symmetrical voltage {1, 1 −120◦, 1 120◦ }. The matrix Ynet can be constructed by block matrices leveraging the series model of transmission lines, SVRs, and transformers given in (4) as follows: X (n) Ynet (Jn , Jn ) = Ynm , n∈N (38a) m∈Nn (m) Ynet (Jn , Jm ) = −Ynm , Partitioning Ynet yields    Y i = YSN iS where Y is given by X (n) Y(Jn , Jn ) = Ynm , Y(Jn , Jm ) =  yt Y1 =  0 0 Matrices (n) Node n m∈Nn (m) , −Ynm Y(Jn , Jm ) = O, m ∈ Nn . YNS YSS  v vS  n ∈ N \ {S} (38b) (39) (40a) n ∈ N \ {S}, m ∈ Nn \ {S} (40b) n ∈ N \ {S}, m ∈ / Nn ∪ {S}. (40c) The matrix Y defined in (40) is called the bus admittance  matrix of the network, and is also referred to as the Y-Bus. 0 −yt  (35b) Matrix Y is used for power flow analysis as we explain next. yt From (39), it follows that i(v) = Yv + YNS vS , where the (35c) and yt is the per unit leakage admittance. In the next section, the bus admittance matrix Y-Bus is formulated. It turns out that rank-deficiency of matrices other than Y1 in (35) are the only source of Y-Bus singularity. A method is presented to remedy this issue. dependence of i on v is made explicit. Due to the ZIP load model we can decompose i into three parts as follows: iPQ (v) + iI (v) + iZ (v) = Yv + YNS vS . (41) From (2), the constant-impedance currents is iZ (v) = −YL v, where YL ∈ C J×J is a block diagonal matrix with entries YL (Jn , Jn ) = YLn , n ∈ N \ {S}. (42) 7 Using iZ (v) = −YL v in (41) and rearranging yields iPQ (v) + iI (v) = (Y + YL )v + YNS vS . TABLE IV A DMITTANCE MATRICES OF SERIES ELEMENTS † (43) Edges If Y + YL is invertible, (43) yields a fixed-point equation for voltages, rendering the standard Z-Bus method as follows v[t + 1] = Z [iPQ (v[t]) + iI (v[t])] + w, (45a) (45b) where ǫ′ = ǫ′r − jǫ′i with ǫ′r > 0 is a small shunt admittance (compared to |yt |). If matrices Y2 and Y4 appear in the mutual admittances, then the modification is as follows: Y2′′ = Y2 + ǫ′′ I, (46a) Y4′′ (46b) ′′ = Y4 + ǫ I, where ǫ′′ = ǫ′′r − jǫ′′i with 0 ≤ ǫ′′r < ǫ′r . Doing so yields Ŷ, a slightly modified version of Y. 2 In the next section, we prove the invertibility of the matrices Ŷ and Ŷ + YL . The voltages can then be computed by using Z = (Ŷ + YL )−1 in (44). A similar approach of modifying the transformer nodal admittances to handle the delta-side invertibility problem is employed in OpenDSS, where by default, a high reactance is connected from the delta terminal to the ground [36]–[38]. VI. I NVERTIBILITY E1 E2 (44) where Z = (Y + YL )−1 , w = −ZYNS vS , and t is the iteration index. The Z-Bus method constitutes initializing v[0] typically to a flat voltage profile (i.e., vn [0] := vS ) and running iteration (44). The solution in terms of voltages yields all power flows in the network. The name of the method is derived from the inversion of Y + YL which yields Z. In practice, Y + YL is not inverted, but its LU decomposition is computed which is unique if Y + YL is invertible. It is well-known that Y is not always invertible due to transformer connections other than wye-g–wye-g. For all other transformer connections, matrices Y2 , Y3 , Y4 , and Y6 in Table III are rank-deficient, which may lead to a non-invertible Y, depending on the position of the transformer in the feeder with respect to other elements. The non-invertibility of Y can carry over to Y + YL as well. This is indeed the case for all the test feeders we investigate in Section VIII. In order to numerically remedy the non-invertibility of Y for transformers other than wye-g–wye-g, [21] suggests adding a small shunt admittance from the isolated transformer sides to the ground. Mathematically, this can be achieved by replacing Y2 and Y4 appearing in the self-admittances of Table III by Y2′ = Y2 + ǫ′ I, Y4′ = Y4 + ǫ′ I, ETL OF THE BUS ADMITTANCE MATRIX Y This section proves the invertibility of Y, where to avoid exhaustive notation, the proof is based first on the following assumptions. The notation S ≻ O (S  O) means matrix S is symmetric and positive (semi-)definite. 2 This modification is only intended to improve the numerical properties of the matrix Y in order to obtain steady-state power flow solutions. This is not to be confused with standard earthing practices through connection of a grounding transformer such as wye-g–delta or zig-zag [35]. EYg∆ EY∆ EO∆ ER EOY∆ † (n) Ynm s 1 Ynm 2 −1 +Znm Y1 Y2 + ǫ′ I Y1 Y2 + ǫ′ I Y4 + ǫ′ I Ai 21 Yns ′ m  T +Z−1 n′ m Ai Y5 (m) Ynm Z−1 nm Y1 Y2 + ǫ′′ I −Y3 −Y3 Y4 + ǫ′′ I Ai Z−1 n′ m −Y6 (m) Ymn s 1 Ynm 2 −1 +Znm Y1 Y2 + ǫ′ I Y2 + ǫ′ I Y2 + ǫ′ I Y4 + ǫ′ I 1 Yns ′ m 2 +Z−1 n′ m Y4 + ǫ′ I (n) Ymn Z−1 nm Y1 Y2 + ǫ′′ I −Y3T −Y3T Y4 + ǫ′′ I Z−1 AT n′ m i −Y6T In case of missing phases, admittance matrices select Ωnm , cf. (6). A1) The series elements belong to the following seven categories (nodal admittances are summarized in Table IV): (a) The set ETL of transmission lines with nodal admittances given by (6). Two realistic properties verified in practical distribution feeders are assumed: s (i) Matrices Znm and Ynm are symmetric. −1 s (ii) It holds that Re[Znm ] ≻ O and Re[Ynm ]  O. (b) The set E1 of wye-g–wye-g transformers with nodal admittances given in Table III. (c) The set E2 of wye-g–wye, wye–wye, and delta–delta transformers, where in self-admittances the matrix Y2′ in (45a) replaces Y2 while in mutual admittances, the matrix Y2′′ in (46a) replaces Y2 . (d) The set EYg∆ of wye-g–delta transformers where Y2′ in (45a) is used in place of Y2 . (e) The set EY∆ of wye–delta transformers where Y2′ in (45a) is used in place of Y2 . (f) The set EO∆ of open-delta–open-delta transformers where in self-admittances, the matrix Y4′ in (45b) replaces Y4 while in mutual admittances, the matrix Y4′′ in (46b) replaces Y4 . (g) The set ER of ideal SVRs with nodal admittances given in (19) and gain matrices Av and Ai in Table II. Notice T that A−1 v = Ai holds, and A1(a) is assumed for line ′ (n , m). Notice that E = ETL ∪ E1 ∪ E2 ∪ EYg∆ ∪ EY∆ ∪ EO∆ ∪ ER . A2) The graph (N , E) is connected. A3) For all transformers it holds that Re[yt ] > 0, i.e., the transformers are non-ideal. A4) Nodes and edges have three available phases, that is Ωn = Ωnm = Ωm = {a, b, c} for all n ∈ N and (n, m) ∈ E. The extension to the case that includes transmission lines with missing phases and open-wye– open-delta transformers is provided afterwards. A few comments are in order here regarding Assumption s A1(a). The symmetricity of Znm and Ynm holds from electromagnetic considerations, that is, the coupling between phases a and b is the same as the coupling between b and a. Interestingly, we verified that matrix Re[Znm ] is typically diagonally 8 dominant with positive diagonal entries for all distribution feeders. Hence, it holds that Re[Znm ] ≻ O, and due to Lemma −1 1 in Appendix A, Z−1 nm exists, and Re[Znm ] ≻ O. Assumption A1(a)(ii) is though weaker than diagonal dominance. It is worth emphasizing that A1(a) allows for untransposed lines. The invertibility proof relies on Lemma 1 in Appendix A. To use this lemma, it is first proved that Y is symmetric (Theorem 1) and that Re[Y] ≻ O (Theorem 2). Theorem 1: Under A1, Y defined in (40) is symmetric. (n) (n) Proof: It suffices to prove that Ynm = (Ynm )T and (m) (n) T Ynm = (Ymn ) for all n ∈ N \ {S} and m ∈ Nn \ {S} [cf. (40)] where the admittance matrices are given in Table IV. The relationships hold for (n, m) ∈ ETL due to A1(a)(i); for (n, m) ∈ E1 ∪ E2 ∪ EYg∆ ∪ EY∆ ∪ EO∆ due to (35); and for T (n, m) ∈ ER due to A1(a)(i) and using A−1 v = Ai . Let ES collect the edges connected to the slack bus. Such an edge could be a transmission line, a voltage regulator, or a three-phase transformer according to Table IV. Theorem 2: Under A1–A4, it holds that Re[Y] ≻ O. Proof: The goal is to prove that xT Re[Y]x > 0 for any nonzero real vector x ∈ RJ . Since x is real, notice that xT Re[Y]x = Re[xT Yx]. By the definition of Y in (40), and defining xn as a vector that selects indices of x corresponding to Jn , xT Re[Y]x is written as follows:  X xTn X xTn Re[YnS ]xn + X X xTn Re[YnS ]xn + T x Re[Y]x = Re  n∈N \{S} = (n)  X (n) Ynm xn m∈Nn − X  (m) Ynm xm  m∈Nn \{S} h i (n) (m) Re xTn Ynm xn − xTn Ynm xm n∈N \{S} m∈Nn \{S} n∈NS =  (n) n∈NS X h (n) (m) Re xTn Ynm xn − xTn Ynm xm (n,m)∈E\ES i (m) (n) + xTm Ymn xm − xTm Ymn xn . (47) In (47), replace the second summation using Lemmas 2 and 3 in Appendix A as follows. For ETL \ ES , apply Lemma 2 −1 with u = xn , v = xm , and W = Re[Znm ]. For E1 \ ES , apply Lemma 2 with u = xn , v = xm , W = Re[Y1 ]. For E2 \ ES , apply Lemma 2 with u = xn , v = xm , and W = Re[Y2 ] + ǫ′′r I. For EYg∆ \ ES apply Lemma 3 with u = xn , v = xm , and W = Re[Y1 ], X = −Re[Y3 ], Z = Re[Y2 ]. For EY∆ \ ES , apply Lemma 3 with u = xn , v = xm , and W = Z = Re[Y2 ], X = −Re[Y3 ]. For E4 \ ES , apply Lemma 2 with u = xn , v = xm , and W = Re[Y4 ] + ǫ′′r I. For ER \ ES , apply Lemma 2 with u = ATi xn , v = xm , and W = Re[Z−1 n′ m ]. After the previous replacements, we obtain xT Re[Y]x = X (n) xTn Re[YnS ]xn n∈NS + X (xn − xm )T Re[Z−1 nm ](xn − xm ) (n,m)∈ETL \ES 1 1 s s ]xTn + xTm Re[Ynm ]xTm + xTn Re[Ynm 2 2 X + (xn − xm )T Re[Y1 ](xn − xm ) (n,m)∈E1 \ES + X (xn − xm )T (Re[Y2 ] + ǫ′′r I)(xn − xm ) (n,m)∈E2 \ES + (ǫ′r − ǫ′′r )(xTn xn + xTm xm )   X   xn + + ǫ′r xTm xm xTn xTm GYg∆nm x m (n,m)∈EYg∆ \ES   X  xn + xTn xTm GY∆nm x m (n,m)∈EY∆ \ES + ǫ′ xT xn + ǫ′r xTm xm Xr n + (xn − xm )T (Re[Y4 ] + ǫ′′r I)(xn − xm ) (n,m)∈E4 \ES + (ǫ′r − ǫ′′r )(xTn xn + xTm xm ) Xn T T (Ai xn − xm )T Re[Z−1 + n′ m ](Ai xn − xm ) (n,m)∈ER \ES + o 1 T 1 xn Ai Re[Yns ′ m ]ATi xn + xTm Re[Yns ′ m ]xm (48) 2 2 h i Re[Y ] Re[Y ] where we set GYg∆nm = Re[YT1 ] Re[Y23 ] , and GY∆nm = 3 h i Re[Y2 ] Re[Y3 ] , GY∆nm  O since . It holds that G T Yg∆ nm Re[Y3 ] Re[Y2 ] their nonzero eigenvalues are respectively {Re[yt ], 2Re[yt ]}, and {2Re[yt ]}; and Re[yt ] > 0 for all transformers. Furthermore, Re[Z−1 nm ] ≻ O for transmission lines, and it holds that Re[Y1 ] ≻ O, Re[Y2 ]  O, Re[Y4 ]  O, and ǫ′r > ǫ′′r . (n) Moreover, YnS is the self-admittance of any of the edges in (n) Table IV, and therefore, Re[YnS ] ≻ O holds. The expression in (48) is thus nonnegative for any real vector x. This proves that Re[Y]  O. At this point, to prove positive definiteness, we show that whenever xT Re[Y]x = 0 holds, then x = 0. In particular, if xT Re[Y]x = 0, then every quadratic form in (48) must be zero and we have the following implications: (n) (R1) Re[YnS ] ≻ O ⇒ xn = 0, n ∈ NS . −1 (R2) Re[Znm ] ≻ O ⇒ xn = xm , (n, m) ∈ ETL \ ES . (R3) Re[Y1 ] ≻ O ⇒ xn = xm , (n, m) ∈ E1 \ ES . (R4) ǫ′r − ǫ′′r > 0 ⇒ xn = xm = 0, (n, m) ∈ E2 \ ES . (R5) ǫ′r > 0 ⇒ xm = 0; and Re[Y1 ] ≻ O ⇒ xn = 0, (n, m) ∈ EYg∆ \ ES . (R6) ǫ′r > 0 ⇒ xn = xm = 0, (n, m) ∈ EY∆ \ ES . (R7) ǫ′r − ǫ′′r > 0 ⇒ xn = xm = 0, (n, m) ∈ E4 \ ES . T (R8) Re[Z−1 n′ m ] ≻ O ⇒ xm = Ai xn , (n, m) ∈ EYVR \ ES . T Since the graph is connected, x Re[Y]x = 0 implies that xn = 0 for all n. We conclude that Re[Y] ≻ O. Remark 2: The concluding part of the proof in Theorem 2 was inspired by a similar argument in [11] that proved the invertibility of the single-phase Y-Bus. Theorem 3: Under A1–A4, matrix Y is invertible. Proof: Combine Theorems 1 and 2 with Lemma 1. This section proved the invertibility of the Y-Bus under Assumptions A1–A4. It is worth emphasizing that the proof is modular, that is, the invertibility of the Y-Bus is shown to be dependent only on the properties of block admittances of the edges. In other words, regardless of the number and order of elements, and of the topology (radial or meshed), the Y-Bus is invertible, as long as the series elements adhere to Assumptions A1–A4. The next section relaxes some of these assumptions. VII. E XTENSIONS In this section, extensions to Theorem 3 that guarantee invertibility of the Y-Bus under more practical considerations 9 are provided. Specifically, Section VII-A covers typical distribution feeders that consist of one-, two-, and three-phase laterals and open-wye–open-delta transformers. The Z-Bus method of (44) relies on the invertibility of Y + YL , which is asserted in Section VII-B. Section VII-C provides a proof of the Y-Bus invertibility using only the imaginary parts of ǫ′ and ǫ′′ ; thereby allowing the inclusion of transformers with zero ohmic losses. This is indeed useful for simplistic models where transformers are only represented by their series reactances. Finally, Section VII-D considers the Y-Bus invertibility under alternative practical transformer connections. A. Invertibility under transmission lines with missing phases and open-wye–open-delta transformers The ensuing Theorem 4 handles circuits that include transmission lines with missing phases and open-wye–open-delta transformers. To this end, Assumptions A1 and A4 are modified as follows: A1′ ) The series elements in Assumption (A1) could also include the set EOY∆ as the set of open-wye–open-delta transformers where Y4′ in (45b) is used in place of Y4 . A4′ ) For any node n ∈ N and phase φ ∈ Ωn , a path exists from S to n where edges have φ in their phase set. Typical distribution systems comprise a main three-phase feeder with one-, two-, or three-phase laterals, and therefore, A4′ is satisfied in practice. Theorem 4: The conclusion of Theorem 2 holds under A1′ , A2, A3, and A4′ . Proof: The only modification will occur in the term (48) where for transmission lines (n, m) ∈ ETL and SVRs (n, m) ∈ ER , we substitute xn and xm respectively with xn (Ωnm ) and xm (Ωnm ). For open-wye–open-delta transformers(n, m) ∈ EOY∆ we substitute xn with xn (Ωnm ). Moreover, we include the following term for open-wye–opendelta transformers(n, m) ∈ EOY∆ in (48) X  xn (Ωnm )T (n,m)∈EOY∆ \ES    x (Ω ) xTm GOY∆nm n nm , xm B. Invertibility of Y + YL Prior to presenting that Y + YL is invertible, the ensuing Theorem 5 is first presented that brings out some useful properties of YL . Theorem 5: Matrix YL defined in (42) is symmetric, and it holds that Re[YL ]  O. Proof: Since YL is block diagonal [cf. (42)], it suffices to prove that YLn in (3) is symmetric and that Re[YLn ]  O for n ∈ N \ {S}. For wye loads, YLn is diagonal due to (3a); φ and since Re[yL ] ≥ 0, it holds that Re[YLn ]  O. For delta n loads, symmetricity of YLn follows from (3c); also Re[YLn ] is symmetric diagonally dominant with nonnegative diagonal entries, and thus Re[YLn ]  O. Theorem 6: The matrix Y + YL with Y defined in (40) and YL defined in (42) is invertible under A1′ , A3, A2, A4′ . Proof: Let Y + YL = G + jB. Theorems 5, 1, and 2 or 4 prove that G = Re[Y + YL ] = Re[Y] + Re[YL ] ≻ O and B = Im[Y + YL ] = Im[YT + YLT ] = BT . By Lemma 1, matrix Y + YL is invertible. The previous analysis reveals that transformers with Y2 or Y4 as their self-admittance compromise the invertibility of Y + YL . The modification of Y2 or similarly Y4 in (45) and (46) guarantees invertibility in Theorem 3. It is alternatively possible to achieve invertibility of Y + YL when YL automatically adds a constant-impedance load with positive definite real part to a side of the transformer whose self-admittance is Y2 or Y4 . This observation is summarized in the following corollary. Corollary 1: Matrix Y + YL is invertible if matrices Y2 and Y4 are not modified, but any transformer side n whose self-admittance is modeled by Y2 or Y4 contains a constantimpedance load YLn with Re[YLn ] ≻ O. (49) C. Invertibility using the imaginary parts of ǫ′ and ǫ′′ h i Re[Y5 ] Re[Y6 ] where GOY∆nm = . Notice that Re[Y6T ] Re[Y4 ]+ǫ′r I Re[Y5 ] = Re[yt ]I2 . Moreover, the non-zero eigen-values of Re[Y4 ] are { 31 Re[yt ], Re[yt ]} and thus Re[Y4 ]  O. Thus, the Schur complement of GOY∆ is given by Re[Y4 ] + ǫ′r I − Re[Y6T ]Re[Y5 ]−1 Re[Y6 ]. the slack bus S to node m where all edges must have φ in their phase set. This path is denoted by P = {S, j, . . . , m} where j ∈ NS . Based on (R1), xj ({φ}) = 0. Based on (R2′ ), (R8′ ), (R9′ ), (R3)–(R7), we conclude that xm ({φ}) = 0. (50) Furthermore, the following identity holds: Re[Y6T ]Re[Y6 ] = Re[yt ]Re[Y4 ]. Therefore, if ǫ′r > 0, the matrix Re[Y4 ]+ǫ′r I as well as the Schur complement of GOY∆ calculated in (50) are positive definite. This implies that GOY∆ is positive definite if ǫ′r > 0. Thus, we conclude that (R2′ ) For (n, m) ∈ ETL \ ES , xn (Ωnm ) = xm (Ωnm ) (R8′ ) For (n, m) ∈ ER \ ES , xm (Ωnm ) = ATi xn (Ωnm ). (R9′ ) For (n, m) ∈ EOY∆ \ES , since GOY∆ ≻ O ⇒ xm = 0 and xn (Ωnm ) = 0. Consider an edge (n, m) ∈ (ETL ∪ ER ∪ EOY∆ ) \ ES with m∈ / NS and φ ∈ Ωm . Due to A4′ , there exists a path from In simplistic models of distribution networks, transformer connections are represented by their series reactances, that is, the transformer models assume zero ohmic losses. In this section, we present an alternative to Theorem 3 that provides a gateway to guarantee invertibility of the Y-Bus under such transformer models. Concretely, recall that Theorem 3 relies on Lemma 1. By applying Lemma 1 to matrix jY, a dual result can be proved: Y−1 exists when Re[Y] = Re[Y]T and Im[Y] ≺ O hold. The previous result can be used to provide an alternative to Theorem 3. To this end, the following modifications to Assumptions A1′ and A3 are considered: A1′′ ) Instead of A1(a)(ii), it holds that Im[Z−1 nm ] ≺ O and that shunt admittances of the lines are negligible, that is, s kYnm k = 0. In A1(c)–A1(f) and A1′ , the modification of Y2 or Y4 on self-admittances should be such that ǫ′i > 0 (added admittance is reactive). In A1(c) and A1(f), the modification of Y2 or Y4 on mutual admittances should be such that 0 ≤ ǫ′′i < ǫ′i . 10 A3′′ ) Instead of A3, assume that Im[yt ] < 0, that is, transformers have non-zero leakage inductance. The ensuing Theorem 7 guarantees invertibility of the Y-Bus in distribution circuits where transformers are represented only by their series reactances. Theorem 7: Under A1′′ , A2, A3′′ , A4′ , Y is invertible. Proof: The proof is similar to that of Theorem 3, but use the imaginary operator Im instead of Re, and replace positive definite arguments with negative definite arguments. D. Alternative transformer models Nodal admittances provided in Table III hold true for a bank of three single-phase transformers. If no information other than the series admittances for the transformer is available, then the matrices in Table III provide a reasonable model in unbalanced distribution system studies. This is indeed the case for the feeders we tested. However, transformers with common-core or shell-type structures are also used in distribution systems. For such transformer connections, by conducting extensive short-circuit measurements, we can first obtain primitive admittance parameters and then convert them to nodal admittances of the form (4) by using connection matrices [22]. The proof of Section VI provides a template that shows how each of the block admittances of (4) affects the Y-Bus invertibility and can be modified accordingly to the individual transformer model. As an example, consider the model of a three-legged coretype transformer connected in wye-g–delta given in [22, eq. (40)]. The only difference between that model and the wyeg–delta of Table III is that the corresponding Y1 for the coretype transformer is not diagonal. However, it is mentioned in [22] that the off-diagonal elements are considerably smaller in magnitude. Thus, if Re[Y1 ] is diagonally dominant, and hence positive definite, the wye-g side of the transformer does not compromise the Y-Bus invertibility. Of course, matrix Y2 on the delta side, still needs to be modified as per (45a). VIII. N UMERICAL RESULTS In this section, we put together the previously developed models to build the Y-Bus matrix and run the Z-Bus power flow for the following distribution feeders: (a) the IEEE 37-bus feeder, (b) the IEEE 123-bus feeder, (c) the 8500-node feeder, (d) the European 906-bus low voltage feeder (ELV 906-bus feeder). The developed MATLAB scripts to conduct the numerical tests are available at the following page: https://github.com/hafezbazrafshan/ three-phase-modeling For each feeder, the MATLAB script setupYBus imports the feeder excel files, and builds the required matrices Ynet , Y, and YNS . The script setupLoads builds the required load parameters for the network according to Table I. The MATLAB script performZBus performs the iterations of the Z-Bus method given in (44). The required data for the feeders are obtained from [30]. In order to assess the accuracy of our proposed modeling approach, computed load-flow voltage solutions are compared 0.7 0.025 0.6 0.02 0.5 0.4 0.015 0.3 0.01 0.2 0.005 0.1 0 0 (a) (b) Fig. 4. Maximum difference in computed voltage magnitudes obtained from load-flow runs on (a) the IEEE 37-bus feeder and (b) the IEEE 123-bus feeder. The computed voltage solutions in successive load-flow runs converge when the value of ǫ/|yt | reaches below 10−5 and 10−3 for the IEEE 37-bus feeder and the IEEE 123-bus feeder respectively. with benchmark solutions. Specifically, for the IEEE 123-bus and the 8500-node test feeders, the benchmark is obtained from the feeder documents in [30]. The benchmark for the ELV 906-bus feeder is not provided in [30], therefore we use OpenDSS, the EPRI distribution system simulator [36], [37]. For the IEEE 37-bus feeder, the benchmark is also obtained from OpenDSS. This is because OpenDSS assumes a relatively high-impedance for the opendelta SVR and thereby allows us to verify the non-ideal SVR models of (18) in Section IV-B. The original data from [30] do not provide the series impedance for any of the SVRs in any of the feeders. Unlike the OpenDSS model of the IEEE 37-bus feeder, OpenDSS models of IEEE 123-bus and the 8500-node feeders assume very small series impedances for SVRs. For the IEEE 123-bus and the 8500-node feeders, it will be demonstrated that using the ideal SVR models in (19) does not affect the accuracy of power flow solutions. In the modeling of the delta–delta transformers in IEEE 37-bus and IEEE 123-bus feeders, we use nodal admittances from Table IV. By setting ǫ′ = 2ǫ′′ = ǫ, we perform a series of Z-Bus power flow runs with values of ǫ ranging from 10−2 |yt | to 10−10 |yt |. The maximum difference in voltage magnitudes for successive values of ǫ is depicted in Fig. 4(a) for the IEEE 37-bus feeder and in Fig. 4(b) for the IEEE 123-bus feeder. It turns out that when ǫ becomes smaller than a threshold, the computed voltages from successive power flow runs converge. This threshold as a fraction of ǫ/|yt | is respectively 10−5 and 10−3 for the IEEE 37-bus and the IEEE 123-bus feeders. The IEEE 37-bus contains two delta– delta transformers whereas IEEE 123-bus includes only one, therefore the required threshold for ǫ is smaller in the IEEE 37-bus than that of IEEE 123-bus. In the modeling of the delta–wye transformers in 8500node and the ELV 906-bus feeders, we use nodal admittances of Table IV with ǫ′ = ǫ. Once again, a series of load-flow computations are performed with values of ǫ ranging from 10−2 |yt | to 10−10 |yt |. The maximum difference in voltage magnitudes for various values of ǫ are depicted in Fig. 5(a) for the 8500-node feeder and in Fig. 5(b) for the ELV 906bus feeder. Once the value of ǫ/|yt | reaches below 10−3 , the voltage solutions converge. In all four feeders, if we do not 11 1.1 1.05 1 0.95 0.9 0.06 0.1 0.05 0.08 0.04 0.06 1 3 5 7 9 11 13 15 17 19 21 23 25 27 29 31 33 35 37 39 1 3 5 7 9 11 13 15 17 19 21 23 25 27 29 31 33 35 37 39 1 3 5 7 9 11 13 15 17 19 21 23 25 27 29 31 33 35 37 39 0.03 0.04 0.02 0.02 0.01 0 0 1.1 1.05 1 0.95 0.9 (a) (b) Fig. 5. Maximum difference in computed voltage magnitudes obtained from load-flow runs on (a) the 8500-node feeder and (b) the ELV 906-bus feeder. The computed voltage solutions in successive load-flow runs converge when the value of ǫ/|yt | reaches below 10−3 for both feeders. TABLE V M AXIMUM pu DIFFERENCE IN COMPUTED VOLTAGE MAGNITUDES VS . BENCHMARK Feeder IEEE 37-bus IEEE 123-bus 8500-node ELV 906-bus phase a 0.0067 0.0061 0.0010 0.0048 phase b 0.0019 0.0034 0.0013 0.0055 phase c 0.0053 0.0039 0.0034 0.0021 modify Y2 , the resultant Y-Bus is singular. Table V summarizes the comparison of our results with benchmark solutions using the fixed value of ǫ = 10−6 |yt |. The reported values are below 0.75% of the benchmark solutions. Description of each test feeder is provided next, along with calculated voltage plots corresponding to Table V. In the voltage plots, bus labels of each feeder have been modified to represent successive numbers starting from 1. A. IEEE 37-bus feeder The IEEE 37-bus feeder features the following rather distinctive characteristics: (a) a delta–delta substation transformer, rated 2500 kVA, 230 kV/4.8 kV line to line, with zt = (2 + j8)%, on edge (1, 2); (b) a delta–delta transformer, rated 500 kVA, 4.8 kV/0.48 kV line to line, with zt = 0.09 + j1.81%, on edge (24, 38); (c) an open-delta SVR on edge (2, 3), with a relatively high impedance of zt = j1%; and (d) a variety of delta-connected constant-power, constant-current, and constant-impedance loads. The impedance of the SVR was obtained from the OpenDSS implementation provided in the file OpenDSS/Distrib/ IEEETestCases/37Bus/ieee37.dss. Voltage magnitudes corresponding to the value of ǫ = 10−6 |yt | are plotted in Fig. 6 for both ideal and non-ideal regulator models where bus 39 represents the n′ of the SVR. The solution provided by OpenDSS is also provided for verification. Phase plots have been omitted here due to space limitations but are available on our github page. The maximum voltage magnitude difference between the computed solutions and those of OpenDSS are tabulated in Table VI. It is inferred from Table VI that when the series impedance of the SVR is relatively high, the nonideal SVR models in (18) provide more accurate results. 1.1 1.05 1 0.95 0.9 Fig. 6. The IEEE 37-bus feeder voltage profile obtained from the Z-Bus method using ideal SVRs (black squares) and non-ideal SVRs (blue circles) in comparison to the voltage profile provided by OpenDSS (red cross). Bus labels have been modified to represent successive numbers starting from 1. TABLE VI I DEAL SVR S VS N ON - IDEAL SVR S : M AX . pu DIFFERENCE IN COMPUTED VOLTAGE MAGNITUDES VS . O PEN DSS SVR model Ideal [eq. (19)] Non-ideal [eq. (18)] phase a 0.0136 0.0067 phase b 0.0046 0.0019 phase c 0.0072 0.0053 B. IEEE 123-bus test feeder The IEEE 123-bus test feeder features (a) three-, two-, and single-phase laterals; (b) four wye-connected SVRs, namely, ID1 on edge (1, 2) three-phase gang-operated, ID2 on phase a of edge (12, 13), ID3 on phases a, c of edge (28, 29), ID4 on three-phases of edge (75, 76); (c) a delta-delta transformer, rated 150 kVA and 4.16 kV/0.48 kV line to line, on edge (68, 69). The voltage profile is provided in Fig. 7, where the buses 127, 128, 129, 130 are the n′ of SVRs with IDs 1, 2, 3, 4 respectively (the last four markers on the plot). The corresponding phase plots are available on our github page. C. 8500-node test feeder The 8500-node test feeder includes approximately 2500 medium voltage buses3 [39]. The network features (a) three-, two-, and single-phase laterals; (b) a delta–wye substation transformer on edge (1, 2), rated 27.5 MVA, 115 kV/12.47 kV line to line, with zt = 1.344 + j15.51%; and (c) four wye-connected, individually operated, three-phase SVRs, namely, ID1 on edge (2, 3), ID2 on edge (201, 202), ID3 on edge (146, 147), ID4 on edge (1777, 1778). The voltage profile is provided in Fig. 8, where the buses 2502, 2503, 2504, 2505 are the n′ of SVRs with IDs 1, 2, 3, 4 respectively (the last four markers on the plot). For this feeder, the SVR models of (19) should correspond to type A SVRs. In this case, the ∓ sign in (20) is changed to ±, and instead of Ai , its inverse A−1 is used. i 3 The feeder documentation distinguishes between the term “bus” and “node.” A bus can have multiple nodes (phases). The feeder includes 2500 primary buses, each of which may be three-, two-, or one-phase. 12 Proof: The invertibility proof is based on contradiction. Assume x = xR + jxI ∈ Cn is a nonzero vector in the nullspace of Y. Then, we have that 1.1 1 0.9 1 10 20 30 40 50 60 70 80 90 100 110 120 130 Yx = (G + jB)(xR + jxI ) = GxR − BxI + j(GxI + BxR ) = 0 1.1 1 (51) Thus, we conclude that 0.9 1 10 20 30 40 50 60 70 80 90 100 110 120 130 1.1 1 0.9 1 10 20 30 40 50 60 70 80 90 100 110 120 130 GxR − BxI = 0, GxI + BxR = 0. Multiplying the second equality in (52) by xTI yields xTI GxI + xTI BxR = 0. In the latter equality, the first term is nonnegative due to the assumption that G ≻ O . Therefore we must have that xTI BxR ≤ 0. Since B = BT we find that xTI BxR = xTR BT xI = xTR BxI ≤ 0. Fig. 7. The IEEE 123-bus feeder voltage profile obtained from the Z-Bus method (blue circles) in comparison to the voltage profile provided by the benchmark (red cross). Bus labels have been modified to represent successive numbers starting from 1. D. The European 906-bus low voltage feeder The ELV feeder features (a) three-phase laterals (there are no missing phases), and (b) a delta–wye substation transformer, rated 800 kVA, 11 kV/416 V line to line, with zt = (0.4 + j4)%, on edge (1, 2). The obtained voltage profile is provided in Fig. 9. The phase plots are omitted due to space limitation, but are available on our github page. IX. C ONCLUDING REMARKS This paper focused on nodal admittance modeling of threephase distribution networks. Models for transmission lines and most relevant transformer connections are reviewed, while novel models for step-voltage regulators are derived, explicitly accounting for their tap positions and their series admittance. Putting the models for the series elements together yields the network bus admittance matrix Y-Bus, whose invertibility is crucial in deriving power flow solutions via the Z-Bus method. The paper carefully laid out the conditions on each series element that guarantee the invertibility of the Y-Bus and proves why previous proposals on modifications of certain transformer connections restore its invertibility. The conditions are tailored to practical distribution networks, which can be radial or meshed, feature any number of transformers and SVRs, and include missing phases. Comprehensive numerical tests are presented for the IEEE 37-bus, the IEEE 123-bus, the 8500-node medium-voltage feeders, and the European 906bus low-voltage feeder. The codes that build the Y-Bus and compute the power flow solutions are provided online. A PPENDIX A U SEFUL LINEAR ALGEBRA RESULTS Lemma 1: Consider matrix Y = G + jB ∈ Cn×n with G ≻ O and B = BT . Then Y−1 exists and Re[Y−1 ] ≻ O. (52) (53) Multiplying the first equality in (52) by xTR gives xTR GxR − = 0. In the latter equality, the first term is non-negative due to the assumption that G ≻ O, and the second term is non-negative due to (53). Therefore, both terms must be zero. Hence xR = 0. Replacing xR = 0 in the second equality of (52) yields xI = 0 as well. Hence, x = 0 which is a contradiction, since the vector x was assumed to be nonzero. To prove the second portion, let Y−1 = R + jX. Then, it holds that (R + jX)(G + jB) = I. Hence, xTR BxI RG − XB = I (54a) XG + RB = O. (54b) Using (54b), we obtain X = −RBG−1 . The latter expression can be inserted into (54a) to obtain: RG + RBG−1 B = I ⇒ R = (G + BG−1 B)−1 .(54c) Notice that G + BG−1 B is positive definite since G ≻ O. Hence, it holds that R ≻ O. Lemma 2: For vectors u and v and matrix W we have that uT Wu − uT Wv + vT Wv − vT Wu = (u − v)T W(u − v). (55) Proof: The left-hand side of (55) can be factored T u (Wu − Wv) − vT (Wu − Wv) = (u − v)T W(u − v). Lemma 3: For vectors u, v and matrices W, X, Z we have uT Wu − uT Xv + vT Zv − vT XT  u=   T  W −X u T u v −XT Z v (56) Proof: The right-hand side of (56) is written as follows   T  Wu − Xv u = uT Wu − uT Xv − vT XT u + vT Zv. T v −X u + Zv Lemma 4: Suppose Assumption A1(a) of Section VI holds for the line (n′ , m) of the SVR. For the values of Ai and ZR (n′ ) in Table II, the matrix FR = I|Ωn | + Yn′ m ATi ZR Ai [cf. (13)] is invertible. Moreover, the following holds for FR : (n′ ) −1 T F−T R = I|Ωn | − Ai ZR Ai FR Yn′ m . (57) 13 1.1 1 0.9 1 100 200 300 400 500 600 700 800 900 1000 1100 1200 1300 1400 1500 1600 1700 1800 1900 2000 2100 2200 2300 2400 2500 1 100 200 300 400 500 600 700 800 900 1000 1100 1200 1300 1400 1500 1600 1700 1800 1900 2000 2100 2200 2300 2400 2500 1 100 200 300 400 500 600 700 800 900 1000 1100 1200 1300 1400 1500 1600 1700 1800 1900 2000 2100 2200 2300 2400 2500 1.1 1 0.9 1.1 1 0.9 (a) 0 -20 -40 -60 1 100 200 300 400 500 600 700 800 900 1000 1100 1200 1300 1400 1500 1600 1700 1800 1900 2000 2100 2200 2300 2400 2500 1 100 200 300 400 500 600 700 800 900 1000 1100 1200 1300 1400 1500 1600 1700 1800 1900 2000 2100 2200 2300 2400 2500 1 100 200 300 400 500 600 700 800 900 1000 1100 1200 1300 1400 1500 1600 1700 1800 1900 2000 2100 2200 2300 2400 2500 -120 -140 -160 -180 120 100 80 60 (b) Fig. 8. The 8500-node feeder voltage profile obtained from the Z-Bus method using ideal regulators (blue circles) in comparison to the voltage profile provided by the benchmark (red cross): (a) voltage magnitudes (b) voltage phases. 1.05 0.95 0.85 1 30 60 90 120 150 180 210 240 270 300 330 360 390 420 450 480 510 540 570 600 630 660 690 720 750 780 810 840 870 900 1 30 60 90 120 150 180 210 240 270 300 330 360 390 420 450 480 510 540 570 600 630 660 690 720 750 780 810 840 870 900 1 30 60 90 120 150 180 210 240 270 300 330 360 390 420 450 480 510 540 570 600 630 660 690 720 750 780 810 840 870 900 1.05 0.95 0.85 1.05 0.95 0.85 Fig. 9. The ELV 906-bus feeder voltage profile obtained from the Z-Bus method (blue circles) in comparison to the voltage profile provided by the benchmark (red cross). The intensity of the plot is due to the fact that this feeder contains three-phase laterals only. Proof: Combining (6), Assumption A1(a) of Section VI, (n) and Lemma 1, it follows that Ynm is symmetric and invertible, (n) −1 and Re[(Ynm ) ] ≻ O. Therefore, we can write It follows from (58) that i−1 h (n′ ) −1 (n′ ) T . ) + A Z A = (Y F−1 Y ′ ′ R i i nm nm R (59) (n′ ) FR = (n′ ) Yn′ m i h (n′ ) (Yn′ m )−1 + ATi ZR Ai . (58) Due to the symmetricity of (Yn′ m )−1 and ATi ZR Ai , it (n′ ) follows from (59) that F−1 R Yn′ m is symmetric: (n′ ) (n ) Hence, FR is invertible if and only if (Yn′ m )−1 + ATi ZR Ai is invertible. For all SVRs, ZR is diagonal and Re[ZR ]  O holds due to ohmic or zero impedances. Furthermore, the gain matrix Ai is real-valued and ATi ZR Ai is symmetric. (n) Also recall that Re[(Ynm )−1 ] ≻ O. Therefore, it holds that (n′ ) −1 Re[(Yn′ m ) +ATi ZR Ai ] ≻ O. It follows from Lemma 1 that (n′ ) −1 exists. (Yn′ m )−1 + ATi ZR Ai is invertible. This proves FR (n′ ) −T F−1 R Yn′ m = (Yn′ m )FR . ′ (60) Multiplying (13) from the left by F−1 R yields: (n′ ) −1 T I|Ωn | = F−1 R + FR Yn′ m Ai ZR Ai ⇒ F−1 R = I|Ωn | − (61) (n′ ) T Yn′ m F−T R Ai ZR Ai , (62) ′ (n ) −1 where in the last equality we replaced FR Yn′ m with its equivalent from (60). Transposing (62) yields (57). 14 R EFERENCES [1] K. A. Birt, J. J. Graffy, J. D. McDonald, and A. H. El-Abiad, “Three phase load flow program,” IEEE Trans. Power App. Syst., vol. 95, no. 1, pp. 59–65, Jan. 1976. [2] P. A. N. Garcia, J. L. R. Pereira, S. Carneiro, V. M. da Costa, and N. Martins, “Three-phase power flow calculations using the current injection method,” IEEE Trans. Power Syst., vol. 15, no. 2, pp. 508– 514, May 2000. [3] T. H. Chen, M. S. Chen, K. Hwang, P. Kotas, and E. A. Chebli, “Distribution system power flow analysis - a rigid approach,” IEEE Trans. Power Del., vol. 6, no. 3, pp. 1146–1152, July 1991. [4] L. R. Araujo, D. R. R. Penido, S. Carneiro, and J. L. R. Pereira, “A threephase optimal power-flow algorithm to mitigate voltage unbalance,” IEEE Trans. Power Del., vol. 28, no. 4, pp. 2394–2402, Oct. 2013. [5] E. Dall’Anese, H. Zhu, and G. B. Giannakis, “Distributed optimal power flow for smart microgrids,” IEEE Trans. Smart Grid, vol. 4, no. 3, pp. 1464–1475, Sept. 2013. [6] A. S. Zamzam, N. D. Sidiropoulos, and E. Dall’Anese, “Beyond relaxation and Newton-Raphson: Solving AC OPF for multi-phase systems with renewables,” IEEE Trans. Smart Grid, vol. PP, no. 99, 2016. [7] F. Wu and S. Kumagai, “Steady-state security regions of power systems,” IEEE Trans. Circuits Syst., vol. 29, no. 11, pp. 703–711, Nov. 1982. [8] T. J. Overbye, “A power flow measure for unsolvable cases,” IEEE Trans. Power Syst., vol. 9, no. 3, pp. 1359–1365, Aug. 1994. [9] S. Bolognani and S. Zampieri, “On the existence and linear approximation of the power flow solution in power distribution networks,” IEEE Trans. Power Syst., vol. 31, no. 1, pp. 163–172, Jan. 2016. [10] S. Yu, H. D. Nguyen, and K. S. Turitsyn, “Simple certificate of solvability of power flow equations for distribution systems,” in Proc. IEEE PES General Meeting, July 2015, pp. 1–5. [11] C. Wang, A. Bernstein, J. Y. L. Boudec, and M. Paolone, “Explicit conditions on existence and uniqueness of load-flow solutions in distribution networks,” IEEE Trans. Smart Grid, vol. PP, no. 99, 2016. [Online]. Available: http://arxiv.org/abs/1602.08372 [12] ——, “Existence and uniqueness of load-flow solutions in three-phase distribution networks,” IEEE Trans. Power Syst., vol. PP, no. 99, 2016. [13] M. Bazrafshan and N. Gatsis, “Convergence of the Z-Bus method for three-phase distribution load-flow with ZIP loads,” IEEE Trans. Power Syst., May 2016, to be published. [Online]. Available: https://arxiv.org/ abs/1605.08511 [14] B. A. Robbins, H. Zhu, and A. D. Dominguez-Garcia, “Optimal tap setting of voltage regulation transformers in unbalanced distribution systems,” IEEE Trans. Power Syst., vol. 31, no. 1, pp. 256–267, Jan. 2016. [15] A. R. Baran Jr. and T. S. P. Fernandes, “A three-phase optimal power flow applied to the planning of unbalanced distribution networks,” Int. J. of Electrical Power & Energy Systems, vol. 74, pp. 301–309, 2016. [16] D. Jiang and R. Baldick, “Optimal electric distribution system switch reconfiguration and capacitor control,” IEEE Trans Power Syst., vol. 11, no. 2, pp. 890–897, May 1996. [17] S. Bolognani and F. Dörfler, “Fast power system analysis via implicit linearization of the power flow manifold,” in 53rd Annu. Allerton Conf. Communication, Control, and Computing, Sept. 2015, pp. 402–409. [18] V. Kekatos, L. Zhang, G. B. Giannakis, and R. Baldick, “Voltage regulation algorithms for multiphase power distribution grids,” IEEE Trans. Power Syst., vol. 31, no. 5, pp. 3913–3923, Sept 2016. [19] H. Ahmadi, J. R. Mart, and A. von Meier, “A linear power flow formulation for three-phase distribution systems,” IEEE Trans. Power Syst., vol. 31, no. 6, pp. 5012–5021, Nov 2016. [20] A. Garces, “A linear three-phase load flow for power distribution systems,” IEEE Trans. Power Syst., vol. 31, pp. 827–828, Jan. 2016. [21] M. J. Gorman and J. J. Grainger, “Transformer modelling for distribution system studies part II: Addition of models to YBUS and ZBUS,” IEEE Trans. Power Del., vol. 7, no. 2, pp. 575–580, Apr. 1992. [22] M.-S. Chen and W. E. Dillon, “Power system modeling,” Proc. of the IEEE, vol. 62, no. 7, pp. 901–915, July 1974. [23] W. H. Kersting, Distribution System Modeling and Analysis, 3rd ed. CRC Press, 2002. [24] S. S. Moorthy and D. Hoadley, “A new phase-coordinate transformer model for Ybus analysis,” IEEE Trans. Power Syst., vol. 17, no. 4, pp. 951–956, Nov. 2002. [25] W. H. Kersting, W. H. Philips, and W. Carr, “A new approach to modeling three-phase transformer connections,” IEEE Trans. Ind. Appl., vol. 35, no. 1, pp. 169–175, Jan. 1999. [26] P. Xiao, D. C. Yu, and W. Yan, “A unified three-phase transformer model for distribution load flow calculations,” IEEE Trans. Power Syst., vol. 21, no. 1, pp. 153–159, Feb. 2006. [27] I. Dz̆afić, R. A. Jabr, and H.-T. Neisius, “Transformer modeling for threephase distribution network analysis,” IEEE Trans. Power Syst., vol. 30, no. 5, pp. 2604–2611, Sept. 2015. [28] D. M. Anderson and B. F. Wollenberg, “Solving for three phase conductively isolated busbar voltages using phase component analysis,” IEEE Trans. Power Syst., vol. 10, no. 1, pp. 98–108, Feb. 1995. [29] T. H. Chen, M. S. Chen, T. Inoue, P. Kotas, and E. A. Chebli, “Threephase cogenerator and transformer models for distribution system analysis,” IEEE Trans. Power Del., vol. 6, no. 4, pp. 1671–1681, Oct. 1991. [30] IEEE PES Distribution System Analysis Subcommittee’s Distribution Test Feeder Working Group, “Distribution test feeders.” [Online]. Available: http://ewh.ieee.org/soc/pes/dsacom/testfeeders/index.html [31] “Standard load models for power flow and dynamic performance simulation,” IEEE Trans. Power Syst., vol. 10, no. 3, pp. 1302–1313, 1995. [32] “Bibliography on load models for power flow and dynamic performance simulation,” IEEE Trans. Power Syst., vol. 10, no. 1, pp. 523–538, 1995. [33] K. McKenna and A. Keane, “Open and closed-loop residential load models for assessment of conservation voltage reduction,” IEEE Trans. Power Syst., pp. 1–1, 2016. [34] T. H. Chen and J. D. Chang, “Open wye-open delta and open deltaopen delta transformer models for rigorous distribution system analysis,” Proc. Inst. Elect. Eng. C - Generation Transmission Distribution, vol. 139, no. 3, pp. 227–234, May 1992. [35] A. A. Sallam and O. P. Malik, Electric distribution systems. John Wiley & Sons, 2011, vol. 68. [36] R. C. Dugan, OpenDSS Manual, EPRI, March 2016. [37] EPRI, “The Open Distribution System SimulatorTM , OpenDSS Version 7.6.5.” [Online]. Available: https://sourceforge.net/projects/electricdss/ [38] OpenDSS Wiki, “Technote transformers,” OpenDSS/Doc/TechNotes. [39] R. C. Dugan and R. F. Arritt, “The IEEE 8500-node test feeder,” https://ewh.ieee.org/soc/pes/dsacom/testfeeders/, EPRI, April 2010.
3cs.SY
arXiv:1311.6093v6 [cs.DS] 3 Aug 2016 A New Algorithm for Updating and Querying Sub-arrays of Multidimensional Arrays Pushkar Mishra Computer Laboratory, University of Cambridge [email protected] Abstract Given a d-dimensional array A, an update operation adds a given constant C to each element within a continuous sub-array of A. A query operation computes the sum of all the elements within a continuous sub-array of A. The one-dimensional update and query handling problem has been studied intensively and is usually solved using segment trees with lazy propagation technique. In this paper, we present a new algorithm incorporating Binary Indexed Trees and Inclusion-Exclusion Principle to accomplish the same task. We extend the algorithm to update and query sub-matrices of matrices (two-dimensional array). Finally, we propose a general form of the algorithm for d-dimensions which achieves O(4d ∗ logd n) time complexity for both updates and queries. This is an improvement over the previously known algorithms which utilize hierarchical data structures like quadtrees and octrees and have a worst-case time complexity of Ω(nd−1 ) per update/query. Keywords: Algorithm; Data Structure; Multidimensional Array; Binary Indexed Tree; Range-update; Range-query. 1 Introduction The problem of updating and querying sub-arrays of multidimensional arrays is of consequence to several fields including data management, image processing and geographical information systems. The one-dimensional version of this problem has conventionally been solved using segment trees with lazy propagation technique. We show in this paper that a d-dimensional segment tree (d > 1) supports lazy propagation only along one out of the d dimensions. Consequently, the worst-case time complexity for updates and queries becomes O(nd−1 log n) instead of O(logd n). Space-partitioning hierarchical data-structures like the quadtree — and its generalization to higher dimensions, e.g., octree — perform better than multidimensional segment trees.[5] These structures work by recursively dividing the given d-dimensional space (d > 1) into smaller axis-parallel hyper-rectangles. Such trees have a worst-case time complexity of Ω(nd−1 ) for updates and queries. The algorithm that we propose is based on Binary Indexed Trees[1] (BITs) and inclusion-exclusion principle. It has the same space complexity as the aforementioned algorithms; but the worst-case time complexity for updates and queries is O(4d ∗ logd n). For the purpose of this paper, we define three sets of operations. 1. Point-update range-query Point-update range-query refers to the set of operations wherein updates are performed only on unitsized sub-arrays (i.e., individual elements) while queries are performed on sub-arrays of arbitrary sizes. 2. Range-update point-query Range-update point-query refers to the set of operations wherein updates are performed on subarrays of arbitrary sizes while queries are performed only on unit-sized sub-arrays. 1 3. Range-update range-query Range-update range-query refers to the set of operations wherein both updates and queries are performed on sub-arrays of arbitrary sizes. Note that the first two sets of operations are subsets of this set. Problem Definition. Given is a d-dimensional array A of size N = n1 × n2 × · · · × nd , where nk (1 ≤ k ≤ d) is the length of the k th dimension. For the sake of simplicity, we assume that n1 , n2 , . . . , nd = n. The goal of the problem is to handle on-line range-update range-query operations on A. By on-line we imply that a particular operation must be performed before the next one can be handled, and there is no prior knowledge of the order of operations. Using the known algorithms for the first two sets of operations, we devise an efficient algorithm for the aforementioned problem. Note that throughout this paper, we assume a unit-cost word Random Access Machine (RAM) model with word size Θ(log n). On such a model, standard arithmetic and boolean bitwise operations on word-sized operands can be performed in Θ(1) time. Paper organization. In section 2, we discuss the motivation behind this work. In Section 3, we summarize our contributions. In section 4, we define the terms and notations used in this paper. We give the formal problem statement in section 5. In section 6, we discuss the existing algorithms for handling range-update range-query operations on multidimensional arrays. In section 7, we provide a concise description of Binary Indexed Trees and associated algorithms. We describe the new algorithm and its time and memory complexities in section 8. In section 9, we provide the data obtained from experimental comparison between execution times of the old and new algorithms. Lastly, we offer brief conclusions in section 10. 2 Background and motivation Representation of a d-dimensional space or object as a d-dimensional array has numerous applications in several fields of Computer Science. For example, images can be represented as 2D arrays where individual cells can represent pixels. Geographical regions can also be represented as 2D arrays with individual cells denoting unit area. Space-partitioning, hierarchical data structures like the quadtree (and its generalization to higher dimensions, e.g., octree) are used perform a variety of operations on such representation of space and objects[9]. Motivation for this paper stems from the need to process range-update range-query operations with better time complexity. Geographical Information Systems(GIS) are an example where faster processing can be of significance. In their paper[2], Samet et al. describe the development of a GIS which uses quadtree as the underlying data structure. Consider the case when different regions of a country have received different amounts of rainfall, and total rainfall needs to be calculated for the season. Consider another case when different regions in a country have received different amounts of water in supply for a month, and the net water supplied is to be calculated for the country. These are cases of Range-update and Range-query in a GIS respectively. Directly visiting each unit cell of a particular region to add or query certain a parameter can prove to be time taking, specially if the unit cells represent very small areas, i.e., the GIS is detailed. Therefore, Samet uses a quadtree for processing updates and queries. We show in this paper that these types of operations can be performed with better time complexity using Binary Indexed Trees. The need for processing updates and queries is not limited to one or two dimensions. Thus, it is important to have an algorithm which can be extended to any number of dimensions, without much effort. 3 Our Contributions The main contributions of this paper are as follows. 2 1. Discussion and analysis of known algorithms. 2. A new algorithm for processing on-line range-update range-query operations on multidimensional arrays. 3. Generalization of the algorithm to arbitrary number of dimensions. 4. Experimental comparison between execution times of the old and new algorithms for two and three dimensional arrays. 4 Preliminaries Let us first provide some general definitions for clarity. By log n, we mean log2 n. An array refers to a 1D array unless stated otherwise. Both sub-array and ‘range’ refer to a contiguous portion of an array. A sub-array of a d-dimensional array A is depicted as A[a1 , b1 , c1 , d1 , ... : a2 , b2 , c2 , d2 , ...], where a1 , a2 are coordinates along the 1st dimension, b1 , b2 are coordinates along the 2nd dimension, and so on. It consists of all the elements arr[a][b][c][d][...] such that a1 ≤ a ≤ a2 , b1 ≤ b ≤ b2 , c1 ≤ c ≤ c2 , d1 ≤ d ≤ d2 , and so on. A general sub-array is denoted by [a1 , b1 , c1 , d1 , ... : a2 , b2 , c2 , d2 , ...]. Throughout this paper, we use rsum(a1 , b1 , ... : a2 , b2 , ...) to refer to the cumulative sum of all the elements of the sub-array [a1 , b1 , ... : a2 , b2 , ...]. We denote a point in d-dimensional space by (x1 , x2 , x3 , . . . , xd ). A point in 1D space is denoted without parentheses. bitAnd(a, b) refers to the bitwise and of integers a and b. For example, bitwise(2, 3) will return 2 since 2 and 3 are represented as 10 and 11 in binary. We recommend that the reader be familiar with Binary Indexed Trees and basic operations on them[1] in order to understand the algorithms and concepts being put forward. 5 Problem statement In this section, we put forward the formal problem statement. Given is a 1D array A of length n with all the elements initially set to 0. Two types of operations need to be performed on this array: 1. Given x1 and x2 , add a constant c to all the elements of the sub-array A[x1 : x2 ]. 2. Given x1 and x2 , output the sum of all the elements of the sub-array A[x1 : x2 ]. We refer to this as the ‘1D version’ of the problem. The problem can be extended to any number of dimensions. Consider the 2D version. Given is a matrix M with side-length n with all the elements initially set to 0. Again, two types of operations need to be performed on this matrix: 1. Given (x1 , y1 ) and (x2 , y2 ), add a constant c to all the elements of the sub-matrix M [x1 , y1 : x2 , y2 ]. 2. Given (x1 , y1 ) and (x2 , y2 ), output the sum of all the elements of the sub-matrix M [x1 , y1 : x2 , y2 ]. In this paper, we describe our algorithm for 1D and 2D versions of the problem, and then generalize the idea to d-dimensions. 3 6 Previous work In this section of the paper, we discuss the previously known algorithms and data structures for handling on-line range-update range-query operations. We analyze their time and space complexities. 6.1 For 1D version 1D version of the problem has conventionally been solved using segment trees. De Berg et al., in their book [4, p. 226], prove that any interval [i : j] can be constructed by using a maximum of O(log N ) nodes of the segment tree. The lazy propagation technique ensures that no more than O(log n) nodes are to be visited to perform the required update or query. In this technique, the node in the segment tree, which contains the range to be updated, is marked (or ‘flagged’), and the update is propagated down to its children only when a query is to be performed on that node, or on its children. Since, a maximum of O(log n) nodes must be visited for performing update or query, the running time of this algorithm is O(log n) per update/query operation. The space required to execute it is O(n).[4, p. 226-227] 6.2 For Higher Dimensions The segment tree can be generalized to any number of dimensions in the form of multilevel segment trees. For example, for a d-dimensional array with side-length n, we first build one-dimensional segment trees along the dth dimension (also referred to as ‘last dimension’). We then build segment trees along (d − 1)th dimension, and so on. In multidimensional versions, the segment tree stores a collection of axis-parallel hyper-rectangles. Point-update range-query or range-update point-query operations can be implemented in O(logd n) complexity. However, we show that a multidimensional segment tree does not produce an optimal solution in the case of range-update range-query operations. Proposition 1. A d-dimensional segment tree does not support Lazy Propagation technique on more than one of the dimensions. Proof. We consider a 2D segment tree, built on a matrix mat. As described earlier, in building the 2D segment tree, we first build segment trees along each row, and then along columns. Each of the node in this 2D segment tree stores sum of elements of a sub-matrix of mat. From the manner in which it is build, every individual element (x, y) of mat is contained in O(log2 n) nodes of the 2D segment tree. Of these O(log2 n), we take two nodes l and r. We choose l and r such that the sub-matrix contained by l does not completely lie inside the sub-matrix contained by r and vice versa. We now perform a lazy-update on node l. Since l and r have at least one common element, the value contained at r is also affected by the update. But, when value at r is queried, it would not return the updated value. This is because, in a segment tree, a query always moves towards the root. The path from node r to the root of the segment tree would not contain l, since the sub-matrix associated with l does not fully contain the sub-matrix associated with r. Consequently, the update ‘flag’ at l is never encountered during query on r. Therefore, Lazy Propagation technique does not produce the correct result. As a result of Proposition 1, the running time for each operation (update or query) on a d-dimensional segment tree becomes O(nd−1 log n). This is because, for each of the d − 1 dimensions that does not support lazy propagation, we need to recursively visit individual indexes in the range to be updated or queried. As proved by Berg et. al, a segment tree possesses 2n nodes [4, p. 226-227]. Consequently, memory requirement of a d-dimensional segment tree is given by O((2n)d ). As stated in the first section, quadtrees and their generalization to higher dimensions perform better than multidimensional segment trees. Below, we analyze their time and space complexity. A quadtree[6] recursively divides the given 2D space into four quadrants. Quadtrees can be used to perform range-update range-query operations on matrices in the same manner as segment trees can be 4 used for 1D arrays. For simplicity, let us assume that the side-length of the matrix to be updated/queried is a power of two. Each node of the quadtree built for handling operations on this matrix stores data for a square sub-matrix.[7] Accordingly, the root node stores the data for the whole matrix and the leaves store the individual elements. Once the quadtree has been built, range-update range-query operations can be performed by incorporating lazy propagation. Proposition 2. For an n × n matrix, the worst case time complexity for query/update using a quadtree is Ω(n). Proof. We prove this by example. Consider a matrix M with side-length n (n = 2k ). Quadtree recursively divides M into square sub-matrices. Now, consider querying/updating a row in this matrix. No part of this row forms a square region except for the individual elements. This implies that no internal node in the quadtree stores data specifically for this row, or a part of it. Therefore, to update/query, we need to visit all the leaves associated with the elements of the row to be updated/queried. There are n such leaves. Since we traverse each edge between the node and the leaves only once, the height of the tree is traversed only once. Thus, the time complexity of such an update/query becomes O(n). As there exists at least one operation with worst case time complexity O(n), the worst case running time of a quadtree is Ω(n). In his paper[9, p. 240], Samet states that the worst-case memory requirement for building a quadtree occurs when the region concerned corresponds to checker-board pattern. We encounter this case when building quadtree over a 2D array. According to Samet, the number of nodes in such cases is a function of r, where r is height (also known as resolution) of the quadtree. Since, each node in a quadtree has r four children, therefore, the total number of nodes in a tree with height r is 4 3−1 .[8] Hence, the memory r requirement is O(4 ). For an n × n matrix, the height of the quadtree is log2 n + 1 (height of a quadtree is same as the depth of recursion[8, p. 2–3]). Therefore, the memory requirement is O(4log2 n+1 ). On simplifying this expression, we get (2n)2 . The 3D version of the quadtree — known as ‘octree’ — recursively divides a 3D space into octants. By similar analysis as for quadtree, we can say that an octree has worst case running time of Ω(n2 ). The analysis of memory requirement can be done on the same lines as for quadtree, and is given by O(8log2 n+1 ). This simplifies to O((2n)3 ). In conclusion, for a quadtree generalized to d-dimensions, the worst-case time and space complexities are Ω(nd−1 ) and O((2n)d ) respectively. 7 7.1 Binary Indexed Trees and associated algorithms Description of the data structure Binary Indexed Tree (BIT) or Fenwick Tree[1] is a data structure commonly used for calculating prefix sums efficiently. A BIT works by storing partial cumulative sums. For example, index 8 of BIT contains the cumulative sum of elements from 1 to 8, i.e., rsum(1 : 8). Similarly, index 6 stores rsum(5 : 6), and so on. For answering queries, BIT combines these stored partial sums. A segment tree can also be used to perform the functions of a BIT, but BITs are easier to code and have a lower constant of complexity. Hence, we base our algorithm on them. A BIT can handle range-update point-query operations or rangeupdate point-query operations, but not both simultaneously. Range-update range-query includes both the sets of operations. By this, we mean that range-update range-query is a general case of both range-update point-query and point-update range-query. 7.2 Point-update range-query on BIT This is the standard set of operations that a BIT can handle. As explained in the paper by Fenwick[1], a BIT is capable of updating the value at a particular point, and querying the cumulative sum up till 5 a particular point. Throughout this paper, we use updatep(bit, x, c) to denote a point-update operation on a 1D BIT bit which adds c to element at position x. Similarly, we use queryr(bit, x) to denote the operation which returns rsum(1 : x), i.e., the cumulative sum of elements up till position x. Any arbitrary range [x : y] can be queried by querying [1 : x − 1] and [1 : y]. We give pseudo-codes for both the functions. The algorithms were devised by Fenwick[1]. Point-update on 1D BIT 1: 2: 3: 4: 5: 6: 7: function updatep(bit, x, c) i←x while i ≤ n do bit[i] ← bit[i] + c i ← i + bitAnd(i, −i) end while end function Range-query on 1D BIT 1: 2: 3: 4: 5: 6: 7: 8: 9: function queryr(bit, x) sum ← 0 i←x while i > 0 do sum ← sum + bit[i] i ← i − bitAnd(i, −i) end while return sum end function A 2D BIT uses a 2D array to store values. Just as each index in a 1D BIT stores the cumulative sum of a particular sub-array, similarly, each index in a 2D BIT stores the cumulative sum of a particular submatrix. For example, the index (8, 8) stores the cumulative sum of all elements in the range [1, 1 : 8, 8], i.e., rsum(1, 1 : 8, 8). Similarly, index (6, 4) stores rsum(5, 1 : 6, 4), and so on. It can be observed that a 2D BIT can be treated as a BIT of 1D BITs. Throughout this paper, we use updatep(bit, (x, y), c) to denote a point-update operation on 2D BIT named bit, which adds constant c to the element at position (x, y). Similarly, we use queryr(bit, (x, y)) to denote the operation which returns rsum(1, 1 : x, y). Further using the inclusion-exclusion principle, any sub-matrix can be queried. For clarity, we present pseudocodes for updatep(bit, (x, y), c) and queryr(bit, (x, y)) operations on a 2D BIT of side-length n: Point-update on 2D BIT 1: 2: 3: 4: 5: 6: 7: 8: 9: 10: 11: function updatep(bit, (x, y), c) i←x while i ≤ n do j←y while j ≤ n do bit[i][j] ← bit[i][j] + c j ← j + bitAnd(j, −j) end while i ← i + bitAnd(i, −i) end while end function 6 Range-query on 2D BIT 1: 2: 3: 4: 5: 6: 7: 8: 9: 10: 11: 12: 13: function queryr(bit, (x, y)) sum ← 0 i←x while i > 0 do j←y while j > 0 do sum ← sum + bit[i][j] j ← j − bitAnd(j, −j) end while i ← i − bitAnd(i, −i) end while return sum end function The algorithms can be generalized to BITs of any number of dimensions on the same lines. The time complexity of the functions for a d-dimensional BIT is O(logd n). 7.3 Range-update point-query on BIT We take an array arr. Each of its values is initially set to 0. We wish to add a constant c to all the elements in the sub-array arr[i : j]. We want to do this multiple times for arbitrary i, j and c. After some of the update operations, we want to know the value of an arbitrary element arr[k]. This is the simplest case of range-update point-query. Using the algorithms and functions of point-update range-query, a BIT can be made to handle such operations. Throughout this paper, we use updater(bit, x1 , x2 , c) to denote an update operation on a 1D BIT bit, which adds constant c to each element in the sub-array [x1 : x2 ]. We use queryp(bit, x) to denote the operation that returns the value of the element at position x. We first give the pseudocode for the functions, and then explain their working. Range-update on 1D BIT 1: 2: 3: 4: function updater(bit, x1 , x2 , c) updatep(x, c) updatep(y + 1, −c) end function Point-query on 1D BIT 1: 2: 3: 4: 5: 6: 7: 8: 9: function queryp(bit, x)) val ← 0 i←x while i > 0 do val ← sum + bit[i] i ← i − bitAnd(i, −i) end while return val end function By using two point-update operations, we can perform a range-update. The algorithm for query operation remains the same as in the first set of operations. As can be noticed, the update algorithm works on the inclusion-exclusion principle. Whenever we have to update a range [x1 : x2 ] with a constant c, the value at position x of the bit is increased by c. Due to this increase, rsum(1 : x), where x1 ≤ x, increases by 7 c. The value of rsum(1 : x), where x > x2 , does not increase since all the elements after x2 are updated with −c. Thus, an updater operation only increases the values of the elements in the specified range. The query algorithm remains the same. However, since an update operation only increases the value of the elements in a specific range, and initially bit is set to 0, thus, queryp returns the sum of updates that affected position x, i.e., the updated value of element at x. We extend this algorithm to two dimensions. Henceforth, we use updater(bit, (x1 , y1 ), (x2 , y2 ), c) to denote an update operation on a 2D BIT bit, which adds constant c to each element in the sub-array [x1 , y1 : x2 , y2 ]. We use queryp(bit, (x, y)) to denote the operation that returns the value of the element at position x, y. Below, we give the pseudocode for the functions. 1: 2: 3: 4: 5: 6: Range-update on 2D BIT function updater(bit, (x1 , y1 ), (x2 , y2 ), c) updatep(bit, (x1 , y1 ), c) updatep(bit, (x2 + 1, y1 ), −c) updatep(bit, (x1 , y2 + 1), −c) updatep(bit, (x2 + 1, y2 + 1), c) end function Point-query on 2D BIT 1: 2: 3: 4: 5: 6: 7: 8: 9: 10: 11: 12: 13: function queryp(bit, (x, y)) val ← 0 i←x while i > 0 do j←y while j > 0 do val ← sum + bit[i][j] j ← j − bitAnd(j, −j) end while i ← i − bitAnd(i, −i) end while return val end function The algorithms can be generalized to BITs of any number of dimensions on the same lines. The time complexity of the functions for a d-dimensional BIT is O(logd n). 8 Proposed algorithm By using the functions of range-update point-query described in section 7.3, we can make a BIT handle range-update range-query operations. In this section, we put forward the algorithm for 1D version and 2D version, and then present a generalization for arbitrary number of dimensions. 8.1 For 1D arrays An important observation to be made here, is that if rsum(1 : x − 1) and rsum(1 : y) can be computed efficiently, then rsum(x : y) can be calculated in constant time. This is because, rsum(x : y) = rsum(1 : y) − rsum(1 : x − 1) (1) We define an operation query(i) which returns the value rsum(1 : i), and an operation update(x, y, c) which updates the sub-array [x : y] with constant c. 8 8.1.1 Range-update Let there be an array arr, indexed from 1 to n, with all elements initially set to 0. At this point, query(i) returns 0 for any index i. An update operation update(3, 5, 4) is performed. Now, query(x) is called for an arbitrary index x. There are three possible cases: i. i < 3 ii. 3 ≤ i ≤ 5 iii. i > 5 For the first case, the value returned by the function query(i) is 0. For the second case, the value returned should be 4 if i = 3, 8 if i = 4 and 12 if i = 5. For the third case, query(i) should return 12 for all i. From the example above, the following inferences can be made: When an operation update(x1 , x2 , c) is performed, there is no change in the value of rsum(1 : x) if x < x1 . For indexes x, where x1 ≤ x ≤ x2 , the value of rsum(1 : x) changes by (c ∗ x − c ∗ (x1 − 1)). For x > x2 , rsum(1 : x) changes by c ∗ (x2 − x1 + 1). Thus, after a range-update operation update(x1 , x2 , c), the change in the value of rsum(1 : x) varies with index x linearly. For indexes which are less that x, there is no change. For an index x, which is between x1 and x2 , the change is given by the function (c ∗ x − c ∗ (x1 − 1)). For all indexes x > x2 , the change is given by the function (0 ∗ x + c ∗ (x2 − x1 + 1)). As linear functions can be added, if the sum of all the functions (referred to as ‘net function’) for an index x is known, the total change to the initial value of rsum(1 : x) can be calculated by putting x into the net function. To define a linear function at an index, we need to know the coefficient of the variable x (henceforth referred to as ‘co-efficient’), and the value of the term independent of x (henceforth referred to as ‘independent term’). The variable term and the independent terms in addition form the required linear function. If the sum of co-efficients and the sum of independent terms at an index are known, then the net function is also known. Hence, we keep two BITs. One BIT stores the co-efficients and the other stores the independent term. We name these BITs bitc and biti respectively. Whenever a function ax + b (where x is the index) is to be added to a range [x1 : x2 ], we update the range [x1 : x2 ] of bitc with a, and the range [x1 : x2 ] of biti with b. When we need to calculate rsum(1 : x), for some x, we can perform point-query operation at position x in both the BITs to get the co-efficient and independent term of the net function. Thus, by performing range-update point-query on two BITs, we can keep track of the net function for each index. For an operation update(x1 , x2 , c), the functions which need to be added, along with the ranges, are as follows. 1. Function cx − c(x1 − 1) to all indexes x such that x1 ≤ x ≤ x2 . 2. Function c(x2 − x1 + 1) to all indexes x such that x2 < x ≤ n. Below, we present the pseudocode of the update function. Note that we have used the updater function from section 7.3 to perform the required range-updates on the two BITs. 1: 2: 3: 4: 5: Range-update on 1D BIT function update(x1 , x2 , c) updater(bitc, x1 , x2 , c) updater(biti, x1 , x2 , −c(x1 − 1)) updater(biti, x2 + 1, n, c(x2 − x1 + 1)) end function The complexity of the range-update operation is O(log n). 9 8.1.2 Range-query Whenever the value of rsum(1 : x), for an arbitrary index x, is needed, we call queryp(bitc, x) on bitc to get the coefficient, and on queryp(biti, x) to get independent term of the net function. Multiplying the value obtained from bitc with x, and adding the value obtained from biti gives the net change in the value of rsum(1 : x). Since, we assumed all values to be 0 initially, hence, we get the actual value rsum(1 : x). Below, we present the pseudocode of the query function. Note that we have used the queryp function from section 7.3 to get the values of co-efficients and independent terms at the required positions in the BITs. Range-query on 1D BIT 1: 2: 3: 4: 5: function query(x) a ← queryp(bitc, x) b ← queryp(biti, x) return a ∗ x + b end function The complexity of the range-query operation is 2 ∗ O(log n), since 2 BITs are involved. 8.2 Extension to 2D arrays We extend the algorithm devised above to matrices (2D arrays). An important observation based on inclusion-exclusion principle is that if rsum(1, 1 : x, y) can be computed efficiently for arbitrary x and y, then rsum(x1 , y1 : x2 , y2 ), for arbitrary x1 , y1 , x2 , y2 , can be computed efficiently too. This is because, rsum(x1 , y1 : x2 , y2 ) = rsum(1, 1 : x2 , y2 ) − rsum(1, 1 : x2 , y1 − 1) − rsum(1, 1 : x1 − 1, y2 ) + rsum(1, 1 : x1 − 1, y1 − 1) (2) We assume an operation query((x, y)) which returns the value of rsum(1, 1 : x, y), and an operation update((x1 , y1 ), (x2 , y2 ), c) which adds c to each element of the sub-matrix [x1 , y1 : x2 , y2 ]. Further, any range can be queried by using the inclusion-exclusion principle. 8.2.1 Range-update We begin by analyzing the change in values of rsum(1, 1 : x, y), for arbitrary (x, y), after an update((x1 , y1 ), (x2 , y2 ), c) is performed. 1. For all (x, y) where x1 ≤ x ≤ x2 and y1 ≤ y ≤ y2, change in rsum(1, 1 : x, y) is given by cxy − c(y1 − 1)x − c(x1 − 1)y + c. 2. For all (x, y) where x2 < x ≤ n and y1 ≤ y ≤ y2, change in rsum(1, 1 : x, y) is given by c(x2 − x1 + 1)y − c(y1 − 1)(x2 − x1 + 1). 3. For all (x, y) where x1 ≤ x ≤ x2 and y2 < y ≤ n, change in rsum(1, 1 : x, y) is given by c(y2 − y1 + 1)x − c(x1 − 1)(y2 − y1 + 1). 4. For all (x, y) where x2 < x ≤ n and y2 < y ≤ n, change in rsum(1, 1 : x, y) is given by c(x2 − x1 + 1)(y2 − y1 + 1). We have to maintain functions with 4 terms, i.e., xy, y, x and an independent term. Thus, we maintain 4 2D BITs, namely bitxy, bitx, bity and biti. We use the function updater, devised in section 7.3 for performing the required range-update operations in order to maintain the functions. Below we give the pseudocode for the update function for 2D case. 10 1: 2: 3: 4: 5: 6: 7: 8: 9: 10: 11: Range-update on 2D BIT function update((x1 , y1 ), (x2 , y2 ), c) updater(bitxy, (x1 , y1 ), (x2 , y2 ), c) updater(bitx, (x1 , y1 ), (x2 , y2 ), −c(y1 − 1)) updater(bitx, (x1 , y2 + 1), (x2 , n), c(y2 − y1 + 1)) updater(bity, (x1 , y1 ), (x2 , y2 ), −c(x1 − 1)) updater(bity, (x2 + 1, y1 ), (n, y2 ), c(x2 − x1 + 1)) updater(biti, (x1 , y1 ), (x2 , y2 ), c) updater(biti, (x2 + 1, y1 ), (n, y2 ), −c(y1 − 1)(x2 − x1 + 1)) updater(biti, (x1 , y2 + 1), (x2 , n), −c(x1 − 1)(y2 − y1 + 1)) updater(biti, (x2 + 1, y2 + 1), (n, n), c(x2 − x1 + 1)(y2 − y1 + 1)) end function Since, there are 4 2D BITs and operation on each 2D BIT takes O(log2 n), the net complexity per update is given by 4 ∗ O(log2 n). 8.2.2 Range-query In order to query the net change in the value fo rsum(1, 1 : x, y), we need to know the net function at (x, y). We use the queryp function devised in section 7.3 to perform the point queries at (x, y). We present the pseudocode for the query operation below. Range-query on 2D BIT 1: 2: 3: 4: 5: 6: 7: function query((x, y)) a ← queryp(bitxy, (x, y)) b ← queryp(bitx, (x, y)) c ← queryp(bity, (x, y)) d ← queryp(biti, (x, y)) return a ∗ x ∗ y + b ∗ x + c ∗ y + d end function Since, there are 4 2D BITs, the net complexity per query is given by 4 ∗ O(log2 n). 8.3 Generalization to higher dimensions It is evident from the algorithm’s extension to matrices that it can be generalized to any number of dimensions. The algorithm for the d-dimensional version can be constructed from the one for (d − 1) dimensions. Proposition 3. For handling range-update range-query operations on a d-dimensional array, 2d d-dimensional BITs are required. Proof. We prove this by mathematical induction. We have shown that 2 BITs are required for handling range-update range-query operations on a 1D array. We assume that 2k BITs are required to handle operations on a k-dimensional array, for some whole number k > 1. We now take a (k + 1)-dimensional array arr. The array arr can be understood as a 1D array, each of whose elements is a k-dimensional array. As per our assumption, for updating an element of arr, we further need 2k k-dimensional BITs per element (since each element is a k-dimensional array). Having a k dimensional BIT for each element is same as having one (k + 1)-dimensional BIT. This implies that we need 2k (k + 1)-dimensional BITs to perform update an element of arr. As shown previously, we need two BITs to perform range-update range-query operations on a 1D array. As a result, in total, we need 2k+1 (k + 1)-dimensional BITs for arr. By principle of mathematical induction, since the assertion is true for 1, and also true for some whole number k + 1 whenever its true for k, therefore, its true for the entire set of whole numbers. Therefore, 11 we need 2d d-dimensional BITs to perform range-update range-query on a d-dimensional array. Alternatively, the conclusion can also be reached by realizing that a multi-linear function with d variables has 2d coefficients. Therefore, 2d d-dimensional BITs are required. An update or query on a d-dimensional BIT, with n elements along each dimension, requires O(logd n) time. By Proposition 3, it is known that 2d such BITs are required to handle operations. Therefore, the overall time complexity for each update/query operation is O(4d ∗ logd n). 9 Experimental comparison of running times In this section, we provide an experimental comparison between the execution times of the old and new algorithms. In the table below, we give the total time taken (in milliseconds) by the two algorithms to perform 100, 000 update/query operations on 2D and 3D arrays of different side-lengths (n). n 10 50 100 150 200 500 1000 4000 Old Algorithm 2D (Quadtree) 3D (Octree) 81 522 680 53051 888 219512 1387 488673 3184 910796 4420 8996 39126 New Algorithm 2D 3D 93 693 238 1923 309 3186 400 3992 431 6357 393 525 1644 Table 1: Comparison of running times For the purpose of this experiment, we used tree-based implementation of quadtree and octree. The parameters for updates and query operations — the sub-arrays to be updated/queried and the constants for the update operations — were produced using the rand() function in the stdlib.h header file of C Library. The parameters that we used were taken uniformly at random in the space of all parameters. The implementations were done on a machine with Ubuntu 13.10 64-bit as the operating system, 8 GB RAM and Intel Core i3 3.1 GHz Sandy Bridge processor. Below, we plot the graph for number of instructions (T ) vs. number of dimensions (d) for arrays of side-lengths (n) equal to 100, 1000 and 10000. 15 ×10 4 Number of instructions (T) 10 T = 100d−1 T = 4d · logd2 100 5 0 0 0.5 1 1.5 2 Dimensions (d) (a) n = 100 12 2.5 3 3.5 4 10000 9000 8000 Number of instructions (T) 7000 6000 T = 1000d−1 T = 4d · logd2 1000 5000 4000 3000 2000 1000 0 0 0.5 1 1.5 2 2.5 3 2 2.5 3 Dimensions (d) (a) n = 1000 10000 9000 8000 Number of instructions (T) 7000 6000 T = 10000d−1 T = 4d · logd2 10000 5000 4000 3000 2000 1000 0 0 0.5 1 1.5 Dimensions (d) (a) n = 10000 Figure 1: Number of instructions (T ) vs. Number of dimensions (d) From the graphs and the table of experimental running times, the following inferences can be made. • The graph for the old algorithm rises more steeply as compared to the graph for the new algorithm. • The new algorithm outperforms the old algorithm in the number of instructions per second and, consequently, in time of execution. • Efficiency of the new algorithm gets more pronounced as n increases. 10 Conclusion and future scope The algorithm that this paper proposes significantly reduces the time required for handling on-line rangeupdate range-query operations on sub-arrays of multidimensional arrays. However, the memory needed to execute the algorithm — as in the case with previously known algorithms — increases exponentially with the number of dimensions. We still believe that our algorithm is of practical significance since the number of dimensions rarely exceeds three in real world applications. 13 References [1] Peter M. Fenwick. A New Data Structure for Cumulative Frequency Tables. In Software: Practice and Experience, Volume 24, pages 327–336, 1994. [2] Hanan Samet et al. A Geographic Information System Using Quadtree. In Pattern Recognition, Volume 17, pages 647–656, 1984. [3] A. Klinger. Patterns and search statistics, Optimizing Methods in Statistics, J. S. Rustagi, ed., pp. 303-337. Academic Press, New York (1971). [4] Mark de Berg, Marc van Kreveld, Mark Overmars, Otfried Schwarzkopf. Computational Geometry: algorithms and applications (2nd ed.). Springer-Verlag Berlin Heidelberg New York, ISBN 3-54065620-0, 2000. [5] Hanan Samet. An Overview of Quadtrees, Octrees, and Related Hierarchical Data Structure. In Theoretical Foundations of Computer Graphics and CAD, Volume F40, 1988. [6] R.A. Finkel, J.L. Bentley. Quadtrees: a data structure for retrieval on composite keys. In Acta Informatica, Volume 4, pages 1–9, 1974. [7] Pinaki Mazumder. Planar Decomposition for Quadtree Data Structure. In Computer Vision, Graphics, and Image Processing, Volume 38, pages 258–274, 1987. [8] Sriram V. Pemmaraju, Clifford A. Shaffer. Department of Computer Science Virginia Polytechnic Institute and State University, USA. Analysis of the Worst-Case Space Complexity of a PR Quadtree, 1992 [9] Hanan Samet. Using Quadtrees to Represent Spatial Data. In Computer Architectures for Spatially Distributed Data, Volume F18, pages 229–247, 1985. 14
8cs.DS
NOTES ON COMPUTATIONAL-TO-STATISTICAL GAPS: PREDICTIONS USING STATISTICAL PHYSICS arXiv:1803.11132v1 [stat.ML] 29 Mar 2018 AFONSO S. BANDEIRA, AMELIA PERRY, AND ALEXANDER S. WEIN In memory of Amelia Perry, and her love for learning and teaching. Abstract. In these notes we describe heuristics to predict computational-tostatistical gaps in certain statistical problems. These are regimes in which the underlying statistical problem is information-theoretically possible although no efficient algorithm exists, rendering the problem essentially unsolvable for large instances. The methods we describe here are based on mature, albeit non-rigorous, tools from statistical physics. These notes are based on a lecture series given by the authors at the Courant Institute of Mathematical Sciences in New York City, on May 16th , 2017. 1. Introduction Statistics has long studied how to recover information from data. Theoretical statistics is concerned with, in part, understanding under which circumstances such recovery is possible. Oftentimes recovery procedures amount to computational tasks to be performed on the data that may be computationally expensive, and so prohibitive for large datasets. While computer science, and in particular complexity theory, has focused on studying hardness of computational problems on worst-case instances, time and time again it is observed that computational tasks on data can often be solved far faster than the worst case complexity would suggest. This is not shocking; it is simply a manifestation of the fact that instances arising from real-world data are not adversarial. This illustrates, however, an important gap in fundamental knowledge: the understanding of “computational hardness of statistical estimation problems”. For concreteness we will focus on the case where we want to learn a set of parameters from samples of a distribution, or estimate a signal from noisy measurements (often two interpretations of the same problem). In the problems we will consider, there is a natural notion of signal-to-noise ratio (SNR) which can be related to the variance of the distribution of samples, the strength of the noise, the number of samples or measurements obtained, the size of a hidden planted structure buried in noise, etc. Two “phase transitions” are often studied. Theoretical statistics and information theory often study the critical SNR below which it is statistically impossible to estimate the parameters (or recover the signal, or find the hidden ASB was partially supported by NSF DMS-1712730 and NSF DMS-1719545. AP was supported in part by NSF CAREER Award CCF-1453261 and a grant from the MIT NEC Corporation. ASW received Government support under and awarded by DoD, Air Force Office of Scientific Research, National Defense Science and Engineering Graduate (NDSEG) Fellowship, 32 CFR 168a. 1 2 AFONSO S. BANDEIRA, AMELIA PERRY, AND ALEXANDER S. WEIN structure), and we call this threshold SNRStat . On the other hand, many algorithm development fields propose and analyze efficient algorithms to understand for which SNR levels different algorithms work. Despite significant effort to develop ever better algorithms, there are various problems for which no efficient algorithm is known to achieve recovery close to the statistical threshold SNRStat . Thus we are interested in the critical threshold SNRComp ≥ SNRStat below which it is fundamentally impossible for an efficient (polynomial time) algorithm to recover the information of interest. There are many problems believed to exhibit computational-to-statistical gaps. Examples include community detection [HLL83, DKMZ11, AS15, BMNN16], planted clique [AKS98, DM15, BHK+ 16], sparse principal component analysis [BR12, BR13, LKZ15b], structured spiked matrix models [LKZ15a, PWBM16b, KXZ16, BDM+ 16, LM16], spiked tensor models [RM14, HSS15, PWB16, LML+ 17, KBG17], and synchronization problems over groups [Sin11, PWBM16b, PWBM16a]. In these notes we will be concerned with predicting the locations of the thresholds SNRStat and SNRComp for Bayesian inference problems. In particular, we will focus on a couple of heuristics borrowed from statistical physics and illustrate them on two example problems: the Rademacher spiked Wigner problem (Example 2.1) and the related problem of community detection in the stochastic block model (Example 2.2). While we focus on these problems, we will try to cover the techniques in a way that conveys how they are broadly applicable. At first glance, it may seem surprising that statistical physics has anything to do with Bayesian inference problems. The connection lies in the Gibbs (or Boltzmann) distribution that is widely used in statistical physics to model disordered systems such as magnets. It turns out that in many Bayesian inference problems, the posterior distribution of the unknown signal given the data also follows a Gibbs distribution, and thus many techniques from statistical physics can be applied. More specifically, many inference problems follow similar equations to spin glasses, which are physical systems in which the interaction strength between each pair of particles is random. The techniques that we borrow from statistical physics are largely non-rigorous but yield extremely precise predictions of both the statistical and computational limits. Furthermore, the predictions made by these heuristics have now been rigorously verified for many problems, and thus we have good reason to trust them on new problems. See the survey [ZK16] for more on the deep interplay between statistical physics and inference. Many techniques have been developed in order to understand computational-tostatistical gaps. We now give a brief overview of some of these methods, both the ones we will cover in these notes and some that we will not. NOTES ON COMPUTATIONAL-TO-STATISTICAL GAPS 3 Reductions. A natural approach to arguing that a task is computationally hard is via reductions, by showing that a problem is computationally hard conditioned on another problem being hard. This technique is extremely effective when studying the worst-case hardness of computational problems (a famous example being the list of 21 NP-hard combinatorial problems of Karp [Kar72]). There are also some remarkable successes in using this idea in the context of average-case problems (i.e. statistical inference on random models), starting with the work of Berthet and Rigollet on sparse PCA [BR12, BR13] and including also some conditional lower bounds for community detection with sublinear sized communities [MW13, HWX14]. These works show conditional hardness by reduction to the planted clique problem, which is widely believed to be hard in certain regimes. Unfortunately this method of reductions has so far been limited to problems that are fairly similar to planted clique. Sum-of-squares hierarchy. Sum-of-squares [Las01, Par00, Nes00, Sho87, BS14] is a hierarchy of algorithms to approximate solutions of combinatorial problems, or more generally, polynomial optimization problems. For each positive integer d, the algorithm at level d of the hierarchy is a semidefinite program that relaxes the notion of a distribution over the solution space by only keeping track of moments of order ≤ d. As you go up the hierarchy (increasing d), the algorithms get more powerful but also run slower: the runtime is nO(d) . The level-2 relaxation coincides with the algorithms in the seminal work of Goemans and Williamson [GW95] and Lovasz [Lov79]. The celebrated unique games conjecture of Khot implies that the level-2 algorithm gives optimal worst-case approximation ratio for a wide class of problems [Kho02, Rag08, Kho10]. Sum-of-squares algorithms have also seen many success stories for average-case inference problems such as planted sparse vector [BKS13, HSSS16], dictionary learning [BKS15], tensor PCA [HSS15], tensor decomposition [BKS15, GM15, HSSS16, MSS16], and tensor completion [BM16, PS17]. One way to argue that an inference problem is hard is by showing that the sum-of-squares hierarchy fails to solve it at a particular level d (or ideally, at every constant value of d). Such lower bounds have been shown for many problems such as planted clique [BHK+ 16] and tensor PCA [HSS15]. There is also recent work that gives evidence for computational hardness by relating the power of sum-of-squares to the low-degree moments of the posterior distribution [HS17]. Belief propagation, approximate message passing, and the cavity method. Another important heuristic to predict computational thresholds is based on ideas from statistical physics and is often referred to as the cavity method [MPV86]. It is based on analyzing an iterative algorithm called belief propagation (BP) [Pea86], or its close relative approximate message passing (AMP) [DMM09]. Specifically, BP has a trivial fixed point wherein the algorithm fails to perform inference. If this fixed point is stable (attracting) then we expect inference to be computationally hard. In these notes we will cover this method in detail. For further references, see [MM09, ZK16]. Replica method and the complexity of the posterior. Another method borrowed from statistical physics is the replica method (see e.g. [MM09]). This is a mysterious nonrigorous calculation from statistical physics that can produce many of the same predictions as the cavity method. One way to think about this method is as a way to measure the complexity of the posterior distribution. In particular, we 4 AFONSO S. BANDEIRA, AMELIA PERRY, AND ALEXANDER S. WEIN are interesting in whether the posterior distribution resembles one big connected region or whether it fractures into disconnected clusters (indicating computational hardness). We will cover the replica method in Section 5 of these notes. Complexity of a random objective function. Another method for investigating computational hardness is through the lens of non-convex optimization. Intuitively, we expect that “easy” optimization problems have no “bad” local minima and so an algorithm such as gradient descent can find the global minimum (or at least a point whose objective value is close to the global optimum). For Bayesian inference problems, maximum likelihood estimation amounts to minimizing a particular random non-convex function. One tool to study critical points of random functions is the Kac-Rice formula (see [AT07] for an introduction). This has been used to study optimization landscapes in settings such as spin glasses [ABAČ13], tensor decomposition [GM17], and problems arising in community detection [BBV16]. There are also other methods to show that there are no spurious local minima in certain settings, e.g. [GJZ17, BVB16, LV18]. 2. Setting and vocabulary Throughout, we’ll largely focus on Bayesian inference problems. Here we have a signal σ ∗ ∈ Rn viewed through some noisy observation model. We present two examples, and examine them simultaneously through the parallel language of machine learning and statistical physics. Example 2.1 (Rademacher spiked Wigner). The signal σ ∗ is drawn uniformly at random from {±1}n . We observe the n × n matrix Y = 1 λ ∗ ∗ > σ (σ ) + √ W, n n where λ is a signal-to-noise parameter, and W is a GOE matrix1. We wish to approximately recover σ ∗ from Y , up to a global negation (since σ ∗ and −σ ∗ are indistinguishable). This problem is motivated by the statistical study of the spiked Wigner model from random matrix theory (see e.g. [PWBM16b]). This model has also been studied as a Gaussian variant of community detection [DAM16] and as a model for synchronization over the group Z/2 [JMRT16]. Example 2.2 (Stochastic block model). The signal σ ∗ is drawn uniformly at random from {±1}n . We observe a graph G with vertex set [n] = {1, . . . , n}, with edges drawn independently as follows: for vertices u, v, we have u ∼ v with probability a/n if σu σv = 1, and probability b/n if σu σv = −1. We will restrict ourselves to the case a > b. We imagine the entries σu∗ as indicating membership of vertex u in either the +1 or −1 ‘community’; thus vertices in the same community are more likely to share an edge. We wish to approximately recover the community structure σ ∗ (up to global negation) from G. This is a popular model for community detection in graphs. See e.g. [Abb17, Moo17] for a survey. Here we consider the sparse regime, but other regimes are also considered in the literature. 1Gaussian orthogonal ensemble: symmetric with the upper triangle drawn i.i.d. as N (0, 1). NOTES ON COMPUTATIONAL-TO-STATISTICAL GAPS 5 There is a key difference between the two models above. The Rademacher spiked Wigner model is dense in the sense that we are given an observation for every pair of variables. On the other hand, the stochastic block model is sparse (at least in the regime we have chosen) because essentially all the useful information comes from the observed edges, which form a sparse graph. We will see that different tools are needed for dense and sparse problems. 2.1. Machine learning view. We are interested in inferring the signal σ ∗ , so it is natural to write down the posterior distribution. For the Rademacher spiked Wigner problem (Example 2.1), we can compute the posterior distribution explicitly as follows:  2 ! Y λ n Yij − σi σj exp − Pr[σ | Y ] ∝ Pr[Y | σ] ∝ 2 n i<j   Y n λ2 2 2 = exp − Yij2 + λYij σi σj − σi σj 2 2n i<j Y ∝ exp (λYij σi σj ) . i<j (HereP∝ hides a normalizing constant which depends on Y but not σ; it is chosen so that σ∈{±1}n Pr[σ | Y ] = 1.) The above factorization over edges defines a graphQ ical model: a probability distribution factoring in the form Pr[σ] = S⊂[n] ψS (σS ) into potentials ψS that each only depend on a small (constant-size) subset S of the entries of σ. (For instance, in our example above, S ranges over all subsets of size 2.) 2.2. Statistical physicsPview. The observation Y defines a Hamiltonian, or energy function, H(σ) = i<j Yij σi σj , consisting of two-spin interactions; we refer to each entry of σ as a spin, and to σ as a state. A Hamiltonian together with a parameter T = β1 , called the temperature, defines a Gibbs distribution (or Boltzmann distribution): Pr[σ] ∝ e−βH(σ) . Thus low-energy states are more likely than high-energy states; moreover, at low temperature (large β), the distribution becomes more concentrated on lower energy states, becoming supported entirely on the minimum energy states (ground states) in the limit as β → ∞. On the other hand, in the high-temperature limit (β → 0), the Gibbs distribution becomes uniform. Connecting the ML and physics languages, we observe that the posterior distribution on σ is precisely the above Gibbs distribution, at the particular inversetemperature β = λ. (This is often referred to as lying on the Nishimori line, or being at Bayes-optimal temperature.) 2.3. Optimization and statistical physics. A common optimization viewpoint on inference is maximum likelihood estimation, or the maximization task of finding the state σ that maximizes the posterior likelihood. This optimization problem is frequently computationally hard, but convex relaxations or surrogates may be studied. To rephraze this optimization task in physical terms, we wish to 6 AFONSO S. BANDEIRA, AMELIA PERRY, AND ALEXANDER S. WEIN minimize the energy H(σ) over states σ, or equivalently sample from (or otherwise describe) the low-temperature Gibbs distribution in the limit β → ∞. This viewpoint is limited, in that the MLE frequently lacks any a priori guarantee of optimality. On the other hand, the Gibbs distribution at the true temperature β = λ enjoys optimality guarantees at a high level of generality: Claim 2.3. Suppose we are given some observation Y leading to a posterior distribution on σ. For any estimate σ b = σ b(Y ), define the (expected) mean squared error (MSE) Ekb σ − σk22 . The estimator that minimizes the expected MSE is given by σ b = E[σ | Y ], the posterior expectation (and thus the expectation under the Gibbs distribution at Bayes-optimal temperature). Remark 2.4. In the case of the Rademacher spiked Wigner model, there is a caveat here: since σ ∗ and −σ ∗ are indistinguishable, the posterior expectation is zero. Our objective is not to minimize the MSE but to minimize the error between σ and either σ b or −b σ (whichever is better). Thus the optimization approach of maximum likelihood estimation aims for too low a temperature. aggregate likelihood. Intuitively, MLE searches for the single state with highest individual likelihood, whereas the optimal Bayesian approach looks for a large cluster of closely-related states with a high aggregate likelihood. Fortunately, the true Gibbs distribution has an optimization property of its own: Claim 2.5. The Gibbs distribution with Hamiltonian H and temperature T > 0 is the unique distribution minimizing the (Helmholtz) free energy F = EH − T S, where S denotes the Shannon entropy S = −Eσ log Pr(σ). Proof. Entropy is concave with infinite derivative at the edge of the probability simplex, and the expected Hamiltonian is linear in the distribution, so the free energy is convex and minimized in the interior of the simplex. We find the unique local (hence global) minimum with a Lagrange multiplier: X const · 1 = ∇F = ∇ p(σ)(H(σ) + T log p(σ)) σ const = H(σ) + T log p(σ) const · e−H(σ)/T = p(σ), which we recognize as the Gibbs distribution.  This optimization approach is willing to trade off some energy for an increase in entropy, and can thus detect large clusters of states with a high aggregate likelihood, even when no individual state has the highest possible likelihood. Moreover, the free energy is convex, but it is a function of an arbitrary probability distribution on the state space, which is typically an exponentially large object. We are thus led to ask the question: is there any way to reduce the problem of free energy minimization to a tractable, polynomial-size problem? Can we get a theoretical or algorithmic handle on this problem? NOTES ON COMPUTATIONAL-TO-STATISTICAL GAPS 7 3. The cavity method and belief propagation 3.1. BP as an algorithm for inference. Belief propagation (BP) is a general algorithm for inference in graphical models, generally credited to Pearl [Pea86] (see e.g. [MM09] for a reference). As we’ve seen above, the study of graphical models is essentially the statistical physics of Hamiltonians consisting of interactions that each only depend on a few spins. Quite often, we care about the average case study of random graphical models that describe a posterior distribution given some noisy observation of a signal, such as in the Rademacher spiked Wigner example discussed above. Much of statistical physics is concerned with disorder and random systems, and indeed the concept of belief propagation appeared in physics as the cavity method—not only as an algorithm but as a theoretical means to make predictions about systems such as spin glasses [MPV86]. To simplify the setting and notation, let us consider sparse graphical models with only pairwise interactions: Y Pr[σ] ∝ ψuv (σu , σv ), u∼v where each vertex v has only relatively few “neighbors” u (denoted u ∼ v). Belief propagation is an iterative algorithm. We think of each spin σu as a vertex and each pair of neighbors as an edge. Each vertex tracks a “belief” about its own spin (more formally, an estimated posterior marginal). These beliefs are often initialized to something like a prior distribution, or just random noise, and then iteratively refined to become more consistent with the graphical model. This refinement happens as follows: each vertex u transmits its belief to each neighbor, and then each vertex updates its belief based on the incoming beliefs of its neighbors. If we let mu→v denote the previous beliefs sent from neighbors u to a vertex v, we can formulate a new belief for v in a Bayesian way, assuming that the incoming influences of the neighbor vertices are independent (more on this assumption below): YX mv (σv ) ∝ ψuv (σu , σv )mu→v (σu ) u∼v σu Each message mu→v is a probability distribution (over the possible values for σu ), with the proportionality constant being determined by probabilities summing to 1 over all values of σu . This is almost a full description of belief propagation, except for one detail. If the belief from vertex v at time t−2 influences the belief of neighbor u at time t−1, then neighbor u should not parrot that influence back to neighbor v, reinforcing its belief at time t without any new evidence. Thus we ensure that the propagation of messages does not immediately backtrack: YX (t−1) (1) m(t) ψuv (σu , σv )mu→v (σu ). v→w (σv ) ∝ u∼v σu u6=w This formula is the iteration rule for belief propagation. The most suspicious aspect of the discussion above is the idea that neighbors of a vertex v exert probabilistically independent influences on v. If the graphical model is a tree, then the neighbors are independent after conditioning on v, and in this setting it is a theorem (see e.g. [MM09]) that belief propagation converges to the exact posterior marginals. On a general graphical model, this independence fails, and belief propagation is heuristic. In many sparse graph models, neighborhoods of 8 AFONSO S. BANDEIRA, AMELIA PERRY, AND ALEXANDER S. WEIN most vertices are trees, with most loops being long, so that independence might approximately hold. BP certainly fails in the worst case; outside of special cases such as trees it is certainly only suitable in an average-case setting. However, on many families of random graphical models, belief propagation is a remarkably strong approach; it is general, efficient, and often yields a state-of-the-art statistical estimate. It is conjectured in many models that belief propagation achieves asymptotically optimal inference, either among all estimators or among all polynomial-time estimators, but most rigorous results in this direction are yet to be established. To connect to the previous viewpoint of free energy minimization: belief propagation is intimately connected with the Bethe free energy, a heuristic proxy for the free energy which may be described in terms of the messages mu→v (see [ZK16], Section III.B). It can be shown that the fixed points of BP are precisely the critical points of the Bethe free energy, justifying the view that BP is roughly a minimization procedure for the free energy. Again, rigorously the situation is much worse: the Bethe free energy is non-convex, and BP is not guaranteed to converge, let alone guaranteed to find the global minimum. 3.2. The cavity method for the stochastic block model. The ideas of belief propagation above appear as the cavity method in statistical physics, owing to the idea that the Bethe free energy is believed to be essentially an accurate model for the true (Helmholtz) free energy on a variety of models of interest. In passing to the Bethe free energy, we can pass from studying a general distribution (an exponentially complicated object) to studying node and edge marginals, which are theoretically much simpler objects and, crucially, can be studied locally on the graph. Local neighborhoods of sparse graphs as in the SBM (stochastic block model) look like trees, and so we are drawn to studying message passing on a tree. Much as for the Rademacher spiked Wigner model above, we derive a Hamiltonian from the block model posterior: X X H(σ) = θ + σi σj + θ − σi σj , i∼j i6∼j where u ∼ v denotes adjacency in the observed graph, and θ+ > 0 > θ− are constants depending on a and b; θ+ is of constant order, while θ− is of order 1/n. In expressing belief propagation, we will make a small notational simplification: instead of passing messages m that are distributions over {+, −}, it suffices to pass the expectation m(+) − m(−). The reader can verify that rewriting the belief propagation equations in this notation yields   X X  (t−1)   m(t) atanh(θ+ mw→u )+ atanh(θ− m(t−1) u→v = tanh  w→u ) w∼u w6=v w6∼u w6=v where tanh is the hyperbolic tangent function tanh(z) = (ez − e−z )/(ez + e−z ), and atanh is its inverse. The first term inside the tanh represents strong, constant-order attractions with the few graph neighbors, while the second term represents very weak, low-order repulsions with the multitude of non-neighbors. The value of the second term thus depends very little on any individual spin, but rather on the overall balance of positive and negative spins in the graph, with the tendency to cause the global NOTES ON COMPUTATIONAL-TO-STATISTICAL GAPS 9 spin configuration to become balanced. As we are only interested in a local view of message passing, we will assume here that the global configuration is roughly balanced and neglect the second term:   X  (t−1)  m(t) atanh(θ+ mw→u ) . u→v ≈ tanh  w∼u w6=v As this message-passing only involves the graph edges, it now makes sense to study this on a tree-like neighborhood. We now discuss a generative model for (approximate) local neighborhoods under the stochastic block model. Model 3.1 (Galton–Watson tree). Begin with a root vertex, with spin + or − chosen uniformly. Recursively, each vertex gives birth to a Poisson number of child nodes: Pois((1 − ε)k) vertices of the same spin and Pois(εk) vertices of opposite spin, up to a total tree depth of d. As shown in [MNS12], the Galton–Watson tree with k = (a + b)/2 and ε = b/(a + b) is distributionally very close to the radius-d neighborhood of a vertex in the SBM with its true spins, so long as d = o(log n). Thus we will study belief propagation on a random Galton–Watson tree. Let us consider only the BP messages passing toward the root of the tree. The upward message from any vertex v is computed as: ! X (2) mv = tanh atanh((1 − 2ε)mu ) u where u ranges over the children of v. We now imagine that the child messages (t−1) for children with spin mu are independently drawn from some distribution D+ (t−1) (t−1) for children = −D+ +, and (leveraging symmetry) from the distribution D− with spin −; this distribution represents the randomness of our BP calculation below each child, over the random subtree hanging off each one. Then, from equation (2), together with the fact that there are Pois((1 − ε)k) same-spin children and Pois(εk) (t) opposite-spin children, the distribution D± of the parent message m is determined! (t) Thus we obtain a distributional recurrence for D+ . The calculation above is independent of n, and the radius of validity of the tree approximation grows with n, so we are interested in the behavior of the recurrence above as t → ∞, i.e. fixed points of the distributional recurrence above and their stability. Typically one initializes BP with small random messages, a perturbation of the trivial all-0 fixed point that represents our prior. For P small messages, we can linearize tanh and atanh, and write mv ≈ (1 − 2ε) u mu . Then if the child (t−1) distribution D+ has mean µ and variance σ 2 , it is easily computed that the (t) parent distribution D+ has mean k(1 − 2ε)2 µ and variance k(1 − 2ε)2 σ 2 . Thus 2 if k(1 − 2ε) < 1, then perturbations of the all-0 fixed point decay, or in other words, this fixed point is stable, and BP is totally uninformative on this typical initialization. If k(1 − 2ε)2 > 1, then small perturbations do become magnified under BP dynamics, and one imagines that BP might find a more informative fixed point (though this remains an open question!). 10 AFONSO S. BANDEIRA, AMELIA PERRY, AND ALEXANDER S. WEIN This transition is known as the Kesten–Stigum threshold [KS66], and calculations of this form are loosely conjectured to describe the computational threshold beyond which no efficient algorithm can perform inference, for sparse models such as the SBM. In this particular form of the SBM, this idea has been rigorously vindicated using techniques slightly different from BP: inference is known to be statistically impossible when k(1 − 2ε)2 < 1 (meaning that any estimator has zero correlation with the truth as n → ∞) [MNS12], and efficiently possible when k(1 − 2ε)2 > 1 (meaning that asymptotically nonzero correlation is possible) [Mas14, MNS13]. One might also endeavor to study the other fixed points of BP, not just the trivial fixed points. This is a difficult undertaking in most situations, as the BP recurrence lacks convexity properties, but it is expected to give an understanding of the statistical threshold of the problem, i.e. the limit below which even inefficient inference techniques fail. This has been rigorously proven for some variants of the stochastic block model [COKPZ16]. Intuitively, exploring the BP landscape by brute force for the best (in terms of Bethe free energy) BP fixed point is a statistically optimal inference technique. For more general stochastic block models with 4 or more communities, there exists a gap between the statistical threshold and the analogous Kesten–Stigum bound [DKMZ11, AS15, BMNN16]. 4. Approximate message passing 4.1. AMP as a simplification of BP. Our cavity analysis of the block model above was well-adapted to sparse models, in which the analysis localizes onto a tree of constant average degree. But many models, such as the Rademacher spiked Wigner model, are dense and their analysis cannot be local. Thankfully, many of these models are amenable to analysis for different reasons: as each vertex is acted on by a large number of individually weak influences, the quantities of interest in belief propagation are subject to central limit theorems and concentration of measure. In this section we will demonstrate this on the Rademacher spiked Wigner example. P Recall the Hamiltonian H = i<j Yij σi σj and inverse temperature λ. As in the SBM discussion above, we can summarize BP messages by the expectation m(+) − m(−). Then BP for this model reads as   X (t−1)   m(t) atanh(λYwu mw→u ) . u→v = tanh w6=v (t−1) We next exploit the weakness of individual interactions. Note that the values mw→u lie in [−1, 1], while Ywu is of order n−1/2 in probability. Taylor-expanding atanh, we simplify:    X (t−1)   m(t) λYwu mw→u + O(n−1/2 ) w.h.p. u→v = tanh w6=v We next simplify the non-backtracking nature of BP. Naı̈vely, one might expect that we can simply drop the condition w 6= v from the sum above, as the contribution from vertex v in the above sum should be only of size n−1/2 . As our formula (t) for mu→v would then no longer depend on v, we could write down messages indexed NOTES ON COMPUTATIONAL-TO-STATISTICAL GAPS 11 by a single vertex: ! m(t) u = tanh X (t−1) λYwu mw , w or in vector notation, (3) m(t) = tanh(λY m(t−1) ), where tanh applies entrywise. This resembles the “power iteration” iterative algorithm to compute the leading eigenvector of Y : m(t) = Y m(t−1) , but with tanh(λ • ) providing some form of soft projection onto the interval [−1, 1], exploiting the entrywise ±1 structure. Unfortunately, the non-backtracking simplification above is flawed, and equation (3) does not accurately summarize BP or provide as strong an estimator. The problem is that the terms we have neglected add up constructively over two iterations. (t−2) on each neighbor Specifically: consider that vertex v exerts an influence λYvu mv (t−1) (scaled u; this small perturbation translates directly to a perturbation of mu (t) by a derivative of tanh). At the next iteration, vertex u influences mv according (t−2) (t−1) 2 , mv ; the total contribution from backtracking here is thus λ2 Yvu to λYvu mu scaled through some derivatives of tanh. This influence is a random, positive, order (t−2) . Summing over all neighbors u, we realize that the aggregate 1/n multiple of mv contribution of backtracking over two steps is in fact of order 1. Thankfully, this contribution is also a sum of small random variables, and exhibits concentration of measure. The solution is thus to subtract off this aggregate backtracking term in expectation, adding a correction called the Onsager reaction term:   (4) m(t) = tanh Y m(t−1) − λ2 (1 − kmk22 /n)m(t−2) . This iterative algorithm is known as approximate message passing. The simplifications above to BP first appeared in the work of Thouless, Anderson, and Palmer [TAP77], who used it to obtain a theoretical handle on spin glasses at high temperature. These techniques later appeared as an algorithm for compressed sensing [DMM09]. The AMP algorithm (4) for this problem was introduced (stated slightly differently) in [DAM16], and AMP has been applied to many other problems such as sparse PCA [DM14], non-negative PCA [MR16], planted clique [DM15], and synchronization over groups [PWBM16a] (just to name a few). 4.2. AMP state evolution. In contrast to belief propagation, approximate message passing (AMP) algorithms tend to be amenable to exact analysis in the limit n → ∞. Here we introduce state evolution, a simple heuristic argument for the analysis of AMP that has been proven correct in many settings. The idea of state evolution was first introduced by [DMM09], based on ideas from [Bol12]; it was later proved correct in various settings [BM11, JM13]. We will focus again on the Rademacher spiked Wigner model: we observe Y = λ > 1 xx + √ W n n 12 AFONSO S. BANDEIRA, AMELIA PERRY, AND ALEXANDER S. WEIN where x ∈ {±1}n is the true signal (drawn uniformly at random) and the n × n noise matrix W is symmetric with the upper triangle drawn i.i.d. as N (0, 1). In this setting, the AMP algorithm and its analysis are due to [DAM16]. We have seen above that the AMP algorithm for this problem takes the form v t+1 = Y f (v t ) + [Onsager] where f (v) denotes entrywise application of the function f (v) = tanh(λv). (Here we abuse notation and let f refer to both the scalar function and its entrywise application to a vector.) The superscript t indexes timesteps of the algorithm (and is not to be confused with an exponent). The details of the Onsager term, discussed previously, will not be important here. The state evolution heuristic proceeds as follows. Postulate that at timestep t, AMP’s iterate v t is distributed as v t = µt x + σt g (5) where g ∼ N (0, I). t This breaks down v into a signal term (recall x is the true signal) and a noise term, whose sizes are determined by parameters µt ∈ R and σt ∈ R≥0 . The idea of state evolution is to write down a recurrence for how the parameters µt and σt evolve from one timestep to the next. In performing this calculation we will make two simplifying assumptions that will be justified later: (1) we drop the Onsager term, and (2) we assume the noise W is independent at each timestep (i.e. there is no correlation between W and the noise g in the current iterate). Under these assumptions we have   1 λ > xx + √ W f (v t ) v t+1 = Y f (v t ) = n n 1 λ = hx, f (v t )i x + √ W f (v t ) n n which takes the form of (5) with a signal term and a noise term. We therefore have λ λ µt+1 = hx, f (v t )i = hx, f (µt x + σt g)i n n ≈ λ E [Xf (µt X + σt G)] with scalars X ∼ Unif{±1}, G ∼ N (0, 1) X,G = λ E[f (µt + σt G)] since f (−v) = −f (v). G For the noise term, think of f (v t ) as fixed and consider the randomness over W . Each entry of the noise term √1n W f (v t ) has mean zero and variance X1 X1 (σ t+1 )2 = f (vit )2 = f (µt xi + σt gi )2 n n i i ≈ λ E [f (µt X + σt G)2 ] with scalars X, G as above X,G = E[f (µt + σt G)2 ] again by symmetry of f . G We now have “state evolution” equations for µt+1 and σt+1 in terms of µt and σt . Since we could arbitrarily scale our iterates v t without adding or losing information, we really only care about the parameter γ , (µ/σ)2 . It is possible (see [DAM16]) to reduce the state evolution recurrence to this single parameter: √ (6) γt+1 = λ2 tanh(γt + γt G) E G∼N (0,1) NOTES ON COMPUTATIONAL-TO-STATISTICAL GAPS 13 (where we have substituted the actual expression for f ). We can analyze AMP as follows. Choose a small positive initial value γ0 and iterate (6) until we reach a fixed point γ∞ . We then expect the output v ∞ of AMP to behave like (7) v ∞ = µ∞ x + σ∞ g 2 where g ∼ N (0, I), µ∞ = γ∞ /λ, and σ∞ = γ∞ /λ2 . For the Rademacher spiked Wigner model, this has in fact been proven to be correct in the limit n → ∞ [BM11, JM13]. Namely, when we run AMP (with the Onsager term and without fresh noise W at each timestep), the output behaves like (7) in a particular formal sense. State evolution reveals a phase transition at λ = 1: when λ ≤ 1 we have γ∞ = 0 (so AMP has zero correlation with the truth as n → ∞) and when λ > 1 we have γ∞ > 0 (so AMP achieves nontrivial correlation with the truth). Furthermore, from (7) we can deduce the value of any performance metric (e.g. mean squared error) at any signal-to-noise ratio λ. It has in fact been shown (for Rademacher spiked Wigner) that the mean squared error achieved by AMP is information-theoretically optimal [DAM16]. It is perhaps surprising that state evolution is correct, given the seeminglyquestionable assumptions we made in deriving it. This can be understood as follows. Recall that we eliminated the Onsager term and assumed independent noise W at each timestep. Also recall that the Onsager term is a correction that makes the update step non-backtracking: a message sent across an edge at one iteration does not affect the message sent back across the edge (in the opposite direction) at the next iteration. It turns out that to leading order, using fresh noise at each timestep is equivalent to using a non-backtracking update step. This is because the largest effect of fresh noise is to terms where a particular noise entry Wij is used twice in a row, i.e. backtracking steps. So the two assumptions we made actually cancel each other out! Note that both of the two assumptions are crucial in making the state evolution analysis tractable, so it is quite spectacular that we are able to make both of these assumptions for free (and still get the correct answer)! One caveat in the rigorous analysis of AMP is that it assumes an initialization that has some nonzero correlation with the truth [DAM16]. In other words, we need to assume that we start with some nonzero γ because if we start with γ = 0 we will remain there forever. In practice this is not an issue; a small random initialization suffices. 4.3. Free energy diagrams. In this section we will finally see how to predict computational-to-statistical gaps (for dense problems)! Above we have seen how to analyze a particular algorithm: AMP. In various settings it has been shown that AMP is information-theoretically optimal. More generally, it is believed that AMP is optimal among all efficient algorithms (for a wide class of problems). We will now show how to use AMP to predict whether a problem should be easy, (computationally) hard or (statistically) impossible. The ideas here originate from [LKZ15a, LKZ15b]. Recall that the state of AMP is described by a parameter γ, where larger γ indicates better correlation with the truth and γ = 0 means that AMP achieves zero correlation with the truth. Also recall that the Bethe free energy is the quantity that belief propagation (or AMP) is locally trying to minimize. It is possible to 14 AFONSO S. BANDEIRA, AMELIA PERRY, AND ALEXANDER S. WEIN analytically write down the function f (γ) which gives the (Bethe) free energy of the AMP state corresponding to γ; in the next section, we will see one way to compute f (γ). AMP can be seen as starting near γ = 0 and naively moving in the direction of lowest free energy until it reaches a local minimum; the γ value at this minimum characterizes AMP’s output. The information-theoretically optimal estimator is instead described by the global minimum of the free energy (and this has been proven rigorously in various cases [BDM+ 16, LM16]); this corresponds to the inefficient algorithm that uses exhaustive search to find the AMP state which globally minimizes free energy. Figure 1 illustrates how the free energy landscape f (γ) dictates whether the problem is easy, hard, or impossible at a particular λ value. −0.2 −1.845 −0.4 −0.6 −1.850 f f −0.8 −1.855 −1.0 −1.2 −1.860 −1.4 −1.6 0.0 −1.865 0.5 1.0 1.5 2.0 γ 2.5 3.0 0.0 0.2 0.4 (a) impossible 0.6 0.8 γ 1.0 1.2 1.4 1.6 (b) impossible −2.6 −1.896 −2.7 −1.898 −2.8 −1.902 f f −1.900 −2.9 −1.904 −3.0 −1.906 −3.1 −1.908 −1.910 0.0 0.2 0.4 0.6 0.8 γ (c) hard 1.0 1.2 1.4 1.6 −3.2 0 1 2 γ 3 4 5 (d) easy Figure 1. (a) The global minimizer is γ = 0 so no estimator achieves nontrivial recovery. (b) A new local minimum in the free energy has appeared, but the global minimum is still at γ = 0 and so nontrivial recovery remains impossible. (c) AMP is stuck at γ = 0 but the (inefficient) statistically optimal estimator achieves a nontrivial γ (the global minimum). AMP is not statistically optimal. (d) AMP achieves nontrivial (in fact optimal) recovery. The above image is adapted from [PWBM16a] (used with permission). For Rademacher spiked Wigner, we have phase (a) (from Figure 1) when λ ≤ 1 and phase (d) when λ > 1, so there is no computational-to-statistical gap. However, for some variants of the problem (for instance if the signal x is sparse, i.e. only a NOTES ON COMPUTATIONAL-TO-STATISTICAL GAPS 15 small constant fraction of entries are nonzero) then we see phases (a),(b),(c),(d) appear in that order as λ increases; in particular, there is a computational-tostatistical gap during the hard phase (c). Although many parts of this picture have been made rigorous in certain cases, the one piece that we do not have the tools to prove is that no efficient algorithm can succeed during the hard phase (c). This is merely conjectured based on the belief that AMP should be optimal among efficient algorithms. There are a few different ways to compute the free energy landscape f (γ). One method is to use the replica method discussed in the next section. Alternatively, there is a direct formula for Bethe free energy in terms of the BP messages, which can be adapted to AMP (see e.g. [LKZ15a]). 5. The replica method The replica method is an alternative viewpoint that can derive many of the same results shown in the previous section. We will again use the example of Rademacher spiked Wigner to illustrate it. A general introduction to the replica method can be found in [MM09]. The calculations of this section are carried out in somewhat higher generality in Appendix B of [PWB16]. Recall again the setup: we observe Y = nλ xx> + √1n W with x ∈ {±1}n and Wij = Wji ∼ N (0, 1). The posterior distribution of x given Y is    2 ! Y X n λ Pr[x | Y ] ∝ exp − xi xj − Yij ∝ exp λ Yij xi xj  2 n i<j i<j and so we are interested in the Gibbs distribution over σ ∈ P {±1}n given by Pr[σ | Y ] ∝ exp(−βH(σ)) with energy (Hamiltonian) H(σ) = − i<j Yij σi σj and inverse temperature β = λ. 1 E log Z where The goal is to compute the free energy density, defined as f = − βn X Z= exp(−βH(σ)). σ∈{±1}n (This can be shown to coincide with the notion of free energy introduced earlier.) The idea of the replica method is to compute the moments E[Z r ] of Z for r ∈ N and perform the (non-rigorous) analytic continuation 1 log E[Z r ]. r Note that this is quite bizarre – we at first assume r is a positive integer, but then take the limit as r tends to zero! This will require writing E[Z r ] in an analytic form that is defined for all values of r. An informal justification for the correctness of (8) is that when r is close to 0, Z r is close to 1 and so we can interchange log and E on the right-hand side. The moment E[Z r ] can be expanded in terms of r ‘replicas’ σ 1 , . . . , σ r with a σ ∈ {±1}n :   r X X X Yij σia σja  . E[Z r ] = E exp β (8) E[log Z] = lim r→0 {σ a } i<j a=1 16 AFONSO S. BANDEIRA, AMELIA PERRY, AND ALEXANDER S. WEIN After applying the definition of Y and the Gaussian moment-generating function (to compute expectation over the noise W ) we arrive at   E[Z r ] = X {σ a }  2 X 2 X λ λ 2  exp n  c2 + qab 2 a a 4 a,b P where qab = n1 i σia σib is the correlation between replicas a and b, and ca = P 1 a i σi xi is the correlation between replica a and the truth. n Without loss of generality we can assume (by symmetry) the true spike is x = 1 (all-ones). Let Q be the (r + 1) × (r + 1) matrix of overlaps (qab and ca ), including x as the zeroth replica. Note that Q is the average of n i.i.d. matrices and so by the theory of large deviations (Cramér’s Theorem in multiple dimensions), the number of configurations {σ a } corresponding to given overlap parameters qab , ca is asymptotically (9)     X X X X X 1 1 inf exp n − µab qab + log exp  µab σa σb  . ν a ca − νa σa + µ,ν 2 2 r a a a6=b a6=b σ∈{±1} We now apply the saddle point method: in the large n limit, the expression for E[Z r ] should be dominated by a single value of the overlap parameters qab , ca . This yields 1 ∗ log E[Z r ] = −G(qab , c∗a , µ∗ab , νa∗ ) n ∗ where (qab , c∗a , µ∗ab , νa∗ ) is a critical point of X λ2 X 2 λ2 X 2 1X ca − qab + νa ca + µab qab 2 a 4 2 a a,b a6=b   X X X 1 − log exp  νa σa + µab σa σb  . 2 r a G(qab , ca , µab , νa ) = − σ∈{±1} a6=b We next assume that the dominant saddle point takes a particular form: the socalled replica symmetric ansatz. The replica symmetric ansatz is given by qaa = 1, ca = c, νa = ν, and for a 6= b, qab = q and µab = µ for constants q, c, µ, ν. This yields (10) 1 λ2 λ2 λ2 1 √ lim G(q, c, µ, ν) = − c2 − + q 2 +νc− µ(q−1)− E log(2 cosh(ν+ µz)) r→0 r 2 4 4 2 z∼N (0,1) NOTES ON COMPUTATIONAL-TO-STATISTICAL GAPS 17 where the last term is handled as follows:   X X X 1 1 lim log exp  νa σa + µab σa σb  r→0 r 2 a a6=b σ∈{±1}r   X X X 1 µ = lim log exp ν σa + σa σb  r→0 r 2 a a6=b σ∈{±1}r   X X X 1 µ rµ  = lim log exp ν σa + σa σb − r→0 r 2 2 a a,b σ∈{±1}r  !2  X X X 1 µ = lim log exp(−rµ/2) exp ν σa + σa  r→0 r 2 a a σ∈{±1}r  !2  X X X 1 µ µ exp ν σa + σa  = − + lim log 2 r→0 r 2 a a σ∈{±1}r ! X X µ 1 √ X (a) = − + lim log exp ν σa + µz σa E 2 r→0 r z∼N (0,1) r a a σ∈{±1} ! X X 1 µ √ exp (ν + µz) σa = − + lim log E 2 r→0 r z∼N (0,1) r a σ∈{±1} µ 1 √ √ r = − + lim log [exp(ν + µz) + exp(−(ν + µz))] E 2 r→0 r z∼N (0,1) 1 µ √ r = − + lim log E (2 cosh(ν + µz)) 2 r→0 r z∼N (0,1) µ √ (b) =− + log(2 cosh(ν + µz)) E 2 z∼N (0,1) where (a) uses the Gaussian moment-generating function and (b) uses the replica trick (8). We next find the critical points by setting the derivatives of (10) (with respect to all four variables) to zero, which yields √ √ ν = λ2 c, µ = λ2 q, c = Ez tanh(ν + µz), q = Ez tanh2 (ν + µz). Recall that the replicas are drawn from the posterior distribution Pr[x | Y ] and so the truth x behaves as if it is a replica; therefore we should have c = q. Using √ √ the identity Ez tanh(γ + γz) = Ez tanh2 (γ + γz) (see e.g. [DAM16]), we obtain the solution c = q and ν = µ where q and µ are solutions to √ (11) µ = λ2 q, q= tanh(µ + µz). E z∼N (0,1) The solution q to this equation tells us about the structure of the posterior distribution; namely, if we take two independent draws from this distribution, their overlap will concentrate about q. (Equivalently, the true signal x and a draw from the posterior distribution will also have overlap that concentrates about q.) Note 18 AFONSO S. BANDEIRA, AMELIA PERRY, AND ALEXANDER S. WEIN that (11) exactly matches the state evolution fixed-point equation (6) with µ in place of γ and q = γ/λ2 . The free energy density of a solution to (11) is given by  2  1 1 λ 2 1 1 √ − (q + 1) + µ(q + 1) − Ez log(2 cosh(µ + µz)) . f = lim G(q, c, µ, ν) = β r→0 r λ 4 2 This is how one can derive the free energy curves such as those shown in Figure 1. If there are multiple solutions to (11), we should take the one with minimum free energy. Above, we had a Gibbs distribution corresponding to the posterior distribution of a Bayesian inference problem. In this setting, the replica symmetric ansatz is always correct; this is justified by a phenomenon in statistical physics: “there is no static replica symmetry breaking on the Nishimori line” (see e.g. [ZK16]). More generally, one can apply the replica method to a Gibbs distribution that does not correspond to a posterior distribution (e.g. if the ‘temperature’ of the Gibbs distribution does not match the signal-to-noise of the observed data). This is important when investigating computational hardness of random non-planted or non-Bayesian problems. In this case, the optimal (lowest free energy) saddle point can take various forms, which are summarized below; the form of the optimizer reveals a lot about the structure of the Gibbs distribution. An important property of a Gibbs distribution is its overlap distribution: the distribution of the overlap between two independent draws from the Gibbs distribution (in the large n limit). • RS (replica symmetric): The overlap matrix is qaa = 1 and qab = q for some q ∈ [0, 1]. The overlap distribution is supported on a single point mass at value q. The Gibbs distribution can be visualized as having one large cluster where any two vectors in this cluster have overlap q. This case is “easy” in the sense that belief propagation can easily move around within the single cluster and find the true posterior distribution. • 1RSB (1-step replica symmetry breaking): The r × r overlap matrix takes the following form. The r replicas are partitioned into blocks of size m. We have qaa = 1, qab = q1 if a, b are in the same block, and qab = q2 otherwise (for some q1 , q2 ∈ [0, 1]). The overlap distribution is supported on q1 and q2 . The Gibbs distribution can be visualized as having a constant number of clusters. Two vectors in the same cluster have overlap q1 whereas two vectors in different clusters have overlap q2 . This case is “hard” for belief propagation because it gets stuck in one cluster and cannot correctly capture the posterior distribution. • 2RSB (2-step replica symmetry breaking): Now we have “clusters of clusters.” The overlap matrix has sub-blocks within each block. The overlap distribution is supported on 3 different values (corresponding to “same subblock”, “same block (but different sub-block)”, “different blocks”). The Gibbs distribution has a constant number of clusters, each with a constant number of sub-clusters. This is again “hard” for belief propagation. • FSRB (full replica symmetry breaking): We can define kRSB for any k as above (characterized by an overlap distribution supported on k + 1 values); FRSB is the limit of kRSB as k → ∞. Here the overlap distribution is a continuous distribution. NOTES ON COMPUTATIONAL-TO-STATISTICAL GAPS 19 • d1RSB (dynamic 1RSB): This phase is similar to RS and (unlike kRSB for k ≥ 1) can appear in Bayesian inference problems. The overlap matrix is the same as in the RS phase (and so the replica calculation proceeds exactly as in the RS case). However, the Gibbs distribution has exponentially-many small clusters. The overlap distribution is supported on a single point mass because two samples from the Gibbs distribution will be in different clusters with high probability. This phase is “hard” for BP (or AMP) because it cannot easily move between clusters. For a Bayesian inference problem, you can tell whether you are in the RS (easy) phase or 1dRSB (hard) phase by looking at the free energy curve; 1dRSB corresponds to the “hard” phase (c) in Figure 1. Acknowledgements. The authors would like to thank the engaging audience at the Courant Institute when this material was presented, and their many insightful comments. The authors would also like to thank Soledad Villar for feedback on an earlier version of this manuscript. References [ABAČ13] [Abb17] [AKS98] [AS15] [AT07] [BBV16] [BDM+ 16] [BHK+ 16] [BKS13] [BKS15] [BM11] [BM16] [BMNN16] [Bol12] [BR12] Antonio Auffinger, Gérard Ben Arous, and Jiřı́ Černỳ. Random matrices and complexity of spin glasses. Communications on Pure and Applied Mathematics, 66(2):165–201, 2013. Emmanuel Abbe. Community detection and stochastic block models: recent developments. arXiv preprint arXiv:1703.10146, 2017. N. Alon, M. Krivelevich, and B. Sudakov. Finding a large hidden clique in a random graph. SODA, 1998. Emmanuel Abbe and Colin Sandon. Detection in the stochastic block model with multiple clusters: proof of the achievability conjectures, acyclic bp, and the information-computation gap. arXiv preprint arXiv:1512.09080, 2015. R. J. Adler and J. E. Taylor. Random Fields and Geometry. Springer, 2007. A. S. Bandeira, N. Boumal, and V. Voroninski. On the low-rank approach for semidefinite programs arising in synchronization and community detection. COLT, 2016. Jean Barbier, Mohamad Dia, Nicolas Macris, Florent Krzakala, Thibault Lesieur, and Lenka Zdeborová. Mutual information for symmetric rank-one matrix estimation: A proof of the replica formula. In Advances in Neural Information Processing Systems, pages 424–432, 2016. B. Barak, S. B. Hopkins, J. Kelner, P. K. Kothari, A. Moitra, and A. Potechin. A nearly tight sum-of-squares lower bound for the planted clique problem. Available online at arXiv:1604.03084 [cs.CC], 2016. B. Barak, J. Kelner, and D. Steurer. Rounding sum-of-squares relaxations. Available online at arXiv:1312.6652 [cs.DS], 2013. Boaz Barak, Jonathan A Kelner, and David Steurer. Dictionary learning and tensor decomposition via the sum-of-squares method. In Proceedings of the forty-seventh annual ACM symposium on Theory of computing, pages 143–151. ACM, 2015. Mohsen Bayati and Andrea Montanari. The dynamics of message passing on dense graphs, with applications to compressed sensing. IEEE Transactions on Information Theory, 57(2):764–785, 2011. Boaz Barak and Ankur Moitra. Noisy tensor completion via the sum-of-squares hierarchy. In Conference on Learning Theory, pages 417–445, 2016. Jess Banks, Cristopher Moore, Joe Neeman, and Praneeth Netrapalli. Informationtheoretic thresholds for community detection in sparse networks. In Conference on Learning Theory, pages 383–416, 2016. Erwin Bolthausen. An iterative construction of solutions of the tap equations for the sherrington-kirkpatrick model. arXiv preprint arXiv:1201.2891, 2012. Q. Berthet and P. Rigollet. Optimal detection of sparse principal components in high dimension. Annals of Statistics, 2012. 20 [BR13] AFONSO S. BANDEIRA, AMELIA PERRY, AND ALEXANDER S. WEIN Q. Berthet and P. Rigollet. Complexity theoretic lower bounds for sparse principal component detection. Conference on Learning Theory (COLT), 2013. [BS14] B. Barak and D. Steurer. Sum-of-squares proofs and the quest toward optimal algorithms. Survey, ICM 2014, 2014. [BVB16] N. Boumal, V. Voroninski, and A. S. Bandeira. The non-convex burer-monteiro approach works on smooth semidefinite programs. NIPS, 2016. [COKPZ16] Amin Coja-Oghlan, Florent Krzakala, Will Perkins, and Lenka Zdeborova. Information-theoretic thresholds from the cavity method. arXiv preprint arXiv:1611.00814, 2016. [DAM16] Yash Deshpande, Emmanuel Abbe, and Andrea Montanari. Asymptotic mutual information for the binary stochastic block model. In Information Theory (ISIT), 2016 IEEE International Symposium on, pages 185–189. IEEE, 2016. [DKMZ11] Aurelien Decelle, Florent Krzakala, Cristopher Moore, and Lenka Zdeborová. Inference and phase transitions in the detection of modules in sparse networks. Physical Review Letters, 107(6):065701, 2011. [DM14] Yash Deshpande and Andrea Montanari. Information-theoretically optimal sparse PCA. In Information Theory (ISIT), 2014 IEEE International Symposium on, pages 2197–2201. IEEE, 2014. p [DM15] Yash Deshpande and Andrea Montanari. Finding hidden cliques of size N/e in nearly linear time. Foundations of Computational Mathematics, 15(4):1069–1128, 2015. [DMM09] David L Donoho, Arian Maleki, and Andrea Montanari. Message-passing algorithms for compressed sensing. Proceedings of the National Academy of Sciences, 106(45):18914–18919, 2009. [GJZ17] Rong Ge, Chi Jin, and Yi Zheng. No spurious local minima in nonconvex low rank problems: A unified geometric analysis. arXiv preprint arXiv:1704.00708, 2017. [GM15] Rong Ge and Tengyu Ma. Decomposing overcomplete 3rd order tensors using sumof-squares algorithms. arXiv preprint arXiv:1504.05287, 2015. [GM17] R. Ge and T. Ma. On the optimization landscape of tensor decompositions. Available online at arXiv:1706.05598 [cs.LG], 2017. [GW95] M. X. Goemans and D. P. Williamson. Improved approximation algorithms for maximum cut and satisfiability problems using semidefine programming. Journal of the Association for Computing Machinery, 42:1115–1145, 1995. [HLL83] P. W. Holland, K. Blackmond Laskey, and S. Leinhardt. Stochastic blockmodels: First steps. Social networks, 5(2):109–137, 1983. [HS17] Samuel B Hopkins and David Steurer. Bayesian estimation from few samples: community detection and related problems. arXiv preprint arXiv:1710.00264, 2017. [HSS15] S. B. Hopkins, J. Shi, and D. Steurer. Tensor principal component analysis via sumof-squares proofs. Available at arXiv:1507.03269 [cs.LG], 2015. [HSSS16] Samuel B Hopkins, Tselil Schramm, Jonathan Shi, and David Steurer. Fast spectral algorithms from sum-of-squares proofs: tensor decomposition and planted sparse vectors. In Proceedings of the forty-eighth annual ACM symposium on Theory of Computing, pages 178–191. ACM, 2016. [HWX14] B. Hajek, Y. Wu, and J. Xu. Computational lower bounds for community detection on random graphs. Available online at arXiv:1406.6625, 2014. [JM13] Adel Javanmard and Andrea Montanari. State evolution for general approximate message passing algorithms, with applications to spatial coupling. Information and Inference: A Journal of the IMA, 2(2):115–144, 2013. [JMRT16] Adel Javanmard, Andrea Montanari, and Federico Ricci-Tersenghi. Phase transitions in semidefinite relaxations. Proceedings of the National Academy of Sciences, 113(16):E2218–E2223, 2016. [Kar72] R. M. Karp. Reducibility among combinatorial problems. Complexity of Computer Computation, 1972. [KBG17] C. Kim, A. S. Bandeira, and M. X. Goemans. Community detection in hypergraphs, spiked tensor models, and sum-of-squares. SampTA 2017: Sampling Theory and Applications, 12th international conference, 2017. [Kho02] S. Khot. On the power of unique 2-prover 1-round games. Thiry-fourth annual ACM symposium on Theory of computing, 2002. NOTES ON COMPUTATIONAL-TO-STATISTICAL GAPS [Kho10] [KS66] [KXZ16] [Las01] [LKZ15a] [LKZ15b] [LM16] [LML+ 17] [Lov79] [LV18] [Mas14] [MM09] [MNS12] [MNS13] [Moo17] [MPV86] [MR16] [MSS16] [MW13] [Nes00] [Par00] [Pea86] [PS17] [PWB16] 21 S. Khot. On the unique games conjecture (invited survey). In Proceedings of the 2010 IEEE 25th Annual Conference on Computational Complexity, CCC ’10, pages 99–121, Washington, DC, USA, 2010. IEEE Computer Society. Harry Kesten and Bernt P Stigum. A limit theorem for multidimensional galtonwatson processes. The Annals of Mathematical Statistics, 37(5):1211–1223, 1966. Florent Krzakala, Jiaming Xu, and Lenka Zdeborová. Mutual information in rankone matrix estimation. In Information Theory Workshop (ITW), 2016 IEEE, pages 71–75. IEEE, 2016. J. B. Lassere. Global optimization with polynomials and the problem of moments. SIAM Journal on Optimization, 11(3):796–817, 2001. Thibault Lesieur, Florent Krzakala, and Lenka Zdeborová. Mmse of probabilistic low-rank matrix estimation: Universality with respect to the output channel. In 53rd Annual Allerton Conference on Communication, Control, and Computing, pages 680–687. IEEE, 2015. Thibault Lesieur, Florent Krzakala, and Lenka Zdeborová. Phase transitions in sparse pca. In Information Theory (ISIT), 2015 IEEE International Symposium on, pages 1635–1639. IEEE, 2015. Marc Lelarge and Léo Miolane. Fundamental limits of symmetric low-rank matrix estimation. arXiv preprint arXiv:1611.03888, 2016. T. Lesieur, L. Miolane, M. Lelarge, F. Krzakala, and L. Zdeborová. Statistical and computational phase transitions in spiked tensor estimation. arXiv preprint arXiv:1701.08010, 2017. L. Lovasz. On the shannon capacity of a graph. IEEE Trans. Inf. Theor., 25(1):1–7, 1979. J. Bruna L. Venturi, A. S. Bandeira. Neural networks with finite intrinsic dimension have no spurious valleys. arXiv:1802.06384 [math.OC], 2018. Laurent Massoulié. Community detection thresholds and the weak ramanujan property. In Proceedings of the forty-sixth annual ACM symposium on Theory of computing, pages 694–703. ACM, 2014. Marc Mezard and Andrea Montanari. Information, physics, and computation. Oxford University Press, 2009. Elchanan Mossel, Joe Neeman, and Allan Sly. Stochastic block models and reconstruction. arXiv preprint arXiv:1202.1499, 2012. Elchanan Mossel, Joe Neeman, and Allan Sly. A proof of the block model threshold conjecture. arXiv preprint arXiv:1311.4115, 2013. Cristopher Moore. The computer science and physics of community detection: Landscapes, phase transitions, and hardness. arXiv preprint arXiv:1702.00467, 2017. Marc Mézard, Giorgio Parisi, and MA Virasoro. SK model: The replica solution without replicas. EPL (Europhysics Letters), 1(2):77, 1986. Andrea Montanari and Emile Richard. Non-negative principal component analysis: Message passing algorithms and sharp asymptotics. IEEE Transactions on Information Theory, 62(3):1458–1484, 2016. Tengyu Ma, Jonathan Shi, and David Steurer. Polynomial-time tensor decompositions with sum-of-squares. In Foundations of Computer Science (FOCS), 2016 IEEE 57th Annual Symposium on, pages 438–446. IEEE, 2016. Z. Ma and Y. Wu. Computational barriers in minimax submatrix detection. Available online at arXiv:1309.5914, 2013. Y. Nesterov. Squared functional systems and optimization problems. High performance optimization, 13(405-440), 2000. P. A. Parrilo. Structured semidefinite programs and semialgebraic geometry methods in robustness and optimization. PhD thesis, California Institute of Technology, 2000. Judea Pearl. Fusion, propagation, and structuring in belief networks. Artificial intelligence, 29(3):241–288, 1986. Aaron Potechin and David Steurer. Exact tensor completion with sum-of-squares. arXiv preprint arXiv:1702.06237, 2017. Amelia Perry, Alexander S Wein, and Afonso S Bandeira. Statistical limits of spiked tensor models. arXiv preprint arXiv:1612.07728, 2016. 22 AFONSO S. BANDEIRA, AMELIA PERRY, AND ALEXANDER S. WEIN [PWBM16a] Amelia Perry, Alexander S Wein, Afonso S Bandeira, and Ankur Moitra. Message-passing algorithms for synchronization problems over compact groups. Communications on Pure and Applied Mathematics (to appear). arXiv preprint arXiv:1610.04583, 2016. [PWBM16b] Amelia Perry, Alexander S Wein, Afonso S Bandeira, and Ankur Moitra. Optimality and sub-optimality of PCA for spiked random matrices and synchronization. arXiv preprint arXiv:1609.05573, 2016. [Rag08] P. Raghavendra. Optimal algorithms and inapproximability results for every CSP? In Proceedings of the Fortieth Annual ACM Symposium on Theory of Computing, STOC ’08, pages 245–254. ACM, 2008. [RM14] Emile Richard and Andrea Montanari. A statistical model for tensor PCA. In Advances in Neural Information Processing Systems, pages 2897–2905, 2014. [Sho87] N. Shor. An approach to obtaining global extremums in polynomial mathematical programming problems. Cybernetics and Systems Analysis, 23(5):695–700, 1987. [Sin11] A. Singer. Angular synchronization by eigenvectors and semidefinite programming. Appl. Comput. Harmon. Anal., 30(1):20 – 36, 2011. [TAP77] David J Thouless, Philip W Anderson, and Robert G Palmer. Solution of ‘solvable model of a spin glass’. Philosophical Magazine, 35(3):593–601, 1977. [ZK16] Lenka Zdeborová and Florent Krzakala. Statistical physics of inference: Thresholds and algorithms. Advances in Physics, 65(5):453–552, 2016. (Bandeira) Department of Mathematics and Center for Data Science, Courant Institute of Mathematical Sciences, New York University E-mail address: [email protected] (Perry) Department of Mathematics, Massachusetts Institute of Technology (Wein) Department of Mathematics, Massachusetts Institute of Technology E-mail address: [email protected]
8cs.DS
Reducing the Number of Annotations in a Verification-oriented Imperative Language arXiv:1011.3407v1 [cs.PL] 15 Nov 2010 Guido de Caso, Diego Garbervetsky, and Daniel Gorín Departamento de Computación, FCEyN, Universidad de Buenos Aires {gdecaso,diegog,dgorin}@dc.uba.ar Abstract. Automated software verification is a very active field of research which has made enormous progress both in theoretical and practical aspects. Recently, an important amount of research effort has been put into applying these techniques on top of mainstream programming languages. These languages typically provide powerful features such as reflection, aliasing and polymorphism which are handy for practitioners but, in contrast, make verification a real challenge. In this work we present Pest, a simple experimental, while-style, multiprocedural, imperative programming language which was conceived with verifiability as one of its main goals. This language forces developers to concurrently think about both the statements needed to implement an algorithm and the assertions required to prove its correctness. In order to aid programmers, we propose several techniques to reduce the number and complexity of annotations required to successfully verify their programs. In particular, we show that high-level iteration constructs may alleviate the need for providing complex loop annotations. Key words: Annotations, language design, verifiability, high-level iteration constructs. 1 Introduction Formal automated software verification regained in recent years the attention of the community. There are at least two reasons behind this resurgent success: on the one hand, there were crucial developments in automated theorem proving in the last fifteen years, with SAT-solvers finally reaching industrial strength; on the other, the focus was shifted to partial specifications which somehow overcomes many of the objections raised in [20]. Verification of partial specifications must be regarded as an error-detection procedure and, as such, akin to traditional forms of testing. We will center on the particular form of verification where the source code is annotated with special assertions. These normally take the form of method pre and postconditions, loop and class invariants, etc. Special tools then read these annotated sources, generate verification conditions from them and feed these into automated provers [15]. Spec# [4] and ESC/Java [14] are two of the best-known examples. The former is based on a dialect of C# while the latter takes Java code with JML [17] annotations. 2 de Caso, Garbervetsky, Gorín Apart from the abovementioned, there are ongoing research efforts in automated verification for almost every major programming language in use [6,24,23]. The rationale is to lower the adoption barrier by giving practitioners tools for verifying the code they are writing today. Now, while this is an undeniably sensible plan, we perceive that, in almost every case, the resulting “programminglanguage-with-annotations” regarded as a whole ends-up being not entirely satisfying. We consider next some of the reasons for this. Lack of cohesion. Annotations are usually introduced as a “patch” to the language. Most of the time, this is done in a way such that regular compilers and IDE-tools regard them as mere comments. Moreover, most programming languages provide a way to perform optional run-time assertion checks. These are usually used to validate pre and postconditions or invariants and are, thus, the run-time counterparts of the verification annotations. But despite their dual nature, both mechanisms have normally no syntactical relation whatsoever. Redundancy. In statically typed languages, the type of the input and output variables of a function are clearly part of its contract. But this means one endsup with two completely unrelated ways of specifying contracts: one enforced by compilers (types) and the other by static checkers (the additional annotations). Missed optimization opportunities. Optimizing compilers cannot leverage on program annotations in the same way they currently do on type information. Inadequate semantics. We can most certainly exclude “to ease automated verifiability” from the list of goals that have driven the design of most modernday programming languages. We cannot know for sure if today’s mainstream languages would have been as popular without features such as complex inheritance mechanisms, uncontrolled method reentrancy or unrestricted aliasing. Nevertheless, the fact that the designers of Spec# already had to diverge in slight ways from C#’s semantics [4] is indicating, in our opinion, a new driver for the programming languages to come. In this paper we report on an ongoing experiment in language design. Our language forces programmers to introduce annotations specifying their intention when writing code. We will show that by coupling tightly the annotations with the language semantics we can rely on a verifying compiler to infer many of the annotations. Moreover, we find that high level iteration constructs can effectively be used as means of reducing the annotation burden of invariants. 2 A walk-through of the Pest language In this section we will briefly present the Pest1 programming language by way of examples. For a formal description the reader is referred to [8]. 1 After the eastern side of the Danube river in Budapest, pronounced ["pESt]. Reducing Annotations in a Verification-oriented Language 3 Pest is an multi-procedural, non-recursive, structured, while-style, imperative programming language whose syntax natively incorporates various kinds of annotations. Its main objective is to provide a test-bed for exploring new concepts and ideas. max(a,b,c) :? true :! (a ≥ b ⇒ c = a) ∧ (a < b ⇒ c = b) :! a = a@pre ∧ b = b@pre { if a ≥ b then c ←a else c ←b fi } Fig. 1. Simple Pest procedure definition. Figure 1 shows the definition of a simple procedure in Pest. Keywords :? and :! introduce pre and postconditions respectively. In the postcondition a@pre and b@pre denote the value of a and b at the beginning of the procedure execution. Therefore, this clause states that the value of a and b does not change; this is necessary since in Pest all values are copied-in and then copied-out. There are currently only three data types in Pest: booleans, integers and arrays of integers. Variables are monomorphic and their type is inferred from use. For example, in Figure 1, all variables are integers, since the ≥ operator takes integers as arguments. Apart from classical boolean operators, boolean expressions may include bounded first-order quantification. Figure 2 lists a Pest procedure containing a while-loop iterating over an array and a procedure call. Loop invariants are introduced using the :?! keyword and exactly one loop variant must be provided, using the :# keyword. Only variables are allowed as arguments on procedure calls and they are syntactically enforced to be distinct. Observe that since, additionally, values are copied in variable assignments, we impose a strict control over aliasing. Operationally, annotations in Pest are interpreted as assertions. Roughly speaking, preconditions are evaluated prior to procedure calls and postconditions on return; invariants are checked before evaluating the loop guard. Since most of the semantic rules include the evaluation of annotations, a program execution gets stuck when the interpretation of one of them fails. To enforce this semantics, annotations can be checked at run-time, but this can be very expensive. Alternatively, a Pest compiler can simply remove an assertion if it can be statically verified. In a way, this is reminiscent of type 4 de Caso, Garbervetsky, Gorín arrayMax(A, m) :? |A| > 0 :! ∀k / 0 ≤ k < |A| : m ≥ :! ∃k / 0 ≤ k < |A| : m = :! A = A@pre { m ← A[0] local i ← 1 while i < |A| :?! 1 ≤ i ≤ |A| :?! ∀k / 0 ≤ k < i : :?! ∃k / 0 ≤ k < i : :?! A = A@pre :# |A| − i do local t ← 0 local e ← A[i] call max(e, m, t) m←t i ← i +1 od } A[k] A[k] m ≥ A[k] m = A[k] Fig. 2. A Pest procedure containing a loop. erasure. Of course, the programmer will normally want to be aware of which assertions failed to be statically verified. A Pest compiler can also infer pre and postconditions of a procedure. If only the precondition is given a postcondition can be obtained by way of a symbolic computation; on the other hand, starting from a postcondition, a precondition can be obtained using a variation of the notion of weakest precondition. In simple cases, like the procedure in Figure 1, one can remove the annotation altogether and rely solely on inference. Details are given in §4. Eliminating the need for explicitly given loop invariants is, of course, highly desirable. A lot of research has been done in loop invariant inference (for instance, [13,18]). In §5 we will show that higher-level iteration constructs can be alternatively regarded as encapsulating “directives” on how to build a proper invariant from the loop body. Using the ideas sketched above, arrayMax can be rewritten in Pest as shown in Figure 3 which requires no annotations for the loop and still enforces its contract. Notice that, in addition to the invariant, in this case we are also able to remove the precondition and part of the postcondition since they can be inferred by the Pest compiler using the rules presented in §4. Reducing Annotations in a Verification-oriented Language 5 easyArrayMax(A,m) :! ∀k / 0 ≤ k < |A| : m ≥ A[k] :! ∃k / 0 ≤ k < |A| : m = A[k] { m ← A[0] for i from 1 to |A| do local t ← 0 local e ← A[i] call max(e, m, t) m←t od } Fig. 3. Using a for construct to remove annotations. 3 Formal semantics of Pest In this section we introduce Pest semantics. In §3.1 we briefly comment on Pest (big-step) operational semantics. As we already mentioned in the preceding section, annotations are interpreted as assertions and a computation gets stuck whenever one of these fails. In §3.2, we present a static formulation based on Hoare-style clauses. This characterizes those programs that cannot get stuck according to the operational semantics. In this sense, it is reminiscent of a type system; but, observe that it relies on a semantic entailment relation over formulas (|=) that is undecidable in the general case. In this setting, automatic verification of a Pest program can be performed by checking conformance to its static semantics using a computable approximation (⊢) of the |=-relation. Later, in §4 we will derive some calculi from the static semantics to cope with several inference tasks. 3.1 Operational semantics Pest operational semantics is based on the standard notion of while-style programming languages semantics. Annotations are handled by incorporating conditions (i.e. assertions) into the semantic rules that disallow the execution of a program that violates them. The semantic rules are given in terms of state transformations. A state σ is a function that maps program variables to concrete values of the proper type. With σ{v 7→ n} we denote a state that coincides with σ except, possibly, in the value for v which, in the former, is n; σ ⊖V is the restriction of σ to a domain that does not contain any variable in V . We use JeKσ to denote the value of an expression e under σ. We write σ ⊲ s ⊲ σ ′ to express that a Pest sentence s, when run from state σ, finishes correctly and arrives in state σ ′ . Some rules are depicted in Figure 4; for the complete set of rules refer to [8]. 6 de Caso, Garbervetsky, Gorín JgKσ = false JinvKσ = true (O-WHILE-F) σ ⊲ while g :?! inv :# var do s od ⊲ σ JgKσ = true JinvKσ = true JvarKσ > 0 σ ⊲ s ⊲ σ ′ JvarKσ′ < JvarKσ σ′ ⊖ locals(s) ⊲ while g :?! inv :# var do s od ⊲ σ ′′ σ ⊲ while g :?! inv :# var do s od ⊲ σ′′ (O-WHILE-T) Jpre(proc)Kρ = true ρ ⊲ body(proc) ⊲ ρ′ Jpost(proc)Kρ′ = true (O-CALL) σ ⊲ call proc(cp1 , . . . , cpk ) ⊲ σ{cp 1 7→ ρ′ (p1 ), . . .} def def where ρ(pi ) = σ(cpi ) and ρ(pi @pre) = σ(cpi ) Fig. 4. Pest operational semantics (fragment) Consider the rules for the while statement. Observe first that if JinvKσ 6= true then no rule applies and, thus, a computation will stick in that case. When the guard is false, the state is not affected (the language syntax guarantees that guards are free of side-effects). Alternatively, when the guard is true, the variant must be above zero in order to continue. Observe that σ ′ is the state after an execution of the loop body, including locally-defined variables; if the variant didn’t decrease the computation will stuck. For procedure calls, state ρ binds formal and actual parameters; the precondition of the called procedure must hold for this state. The state ρ′ , if defined, is the result of executing the procedure body from ρ; the postcondition must hold in ρ′ . At the end, actual parameters are updated with the final values assigned to the formal parameters (recall that all parameters are in/out in Pest). 3.2 Hoare-style static semantics We first need to introduce some preliminary definitions. For σ a state and b a Pest boolean expression2, we write σ |= b if JbKσ = true. We will write b1 |= b2 to indicate that, for all σ, whenever σ |= b1 holds, then σ |= b2 must hold too (i.e. b1 is stronger than b2 ). We also require a notion of “safeness” for the evaluation of expressions. Given an expression e, we want safe(e) to be a boolean expression such that σ |= safe(e) implies that JeKσ is defined. For example, we expect safe(a[ i ] / y) to be the expression “0 ≤ i ∧ i < |a| ∧ y 6= 0”. A formal definition of these conditions is straightforward. Finally, e1 ⌊e2 7→ e3 ⌋ denotes the expression that results from replacing every occurrence of e2 by e3 in e1 . Observe that e2 and e3 must be of the same type. 2 Throughout this section, boolean expressions are augmented with unbounded existential quantification. Reducing Annotations in a Verification-oriented Language 7 Instead of using states like in the operational case, for the static semantics we will use predicates (i.e. boolean expressions) that describe a (possibly infinite) set of states. For boolean expressions p and q and s a Pest sentence, {p} s {q} must be read “after executing s from a σ such that σ |= p, we obtain a σ ′ such that σ ′ |= q”. Figure 5 lists some of the static rules (for the complete list, refer to [8]). Consider the rule for assignments: the first premise guarantees that the program won’t get stuck when evaluating e; the second one states that q is a consequence of what was known prior to the assignment (p⌊v 7→ v ′ ⌋) and its effect (v = e⌊v 7→ v ′ ⌋). The existentially quantified variable v ′ stands for the value of v before the assignment (this requires unbounded quantification). p |= safe(e) ∃ v ′ (p⌊v 7→ v ′ ⌋ ∧ v = e⌊v 7→ v ′ ⌋) |= q {p} v ← e {q} p |= safe(g) p ∧ g |= p1 {p1 } s1 {q1 } q1 |= q p ∧ ¬g |= p2 {p2 } s2 {q2 } q2 |= q {p} if g then s1 else s2 fi {q} (S-ASSIGN) (S-IF) true |= safe(inv) inv |= safe(var) inv |= safe(g) p |= inv inv ∧ g |= p′ p′ |= var > 0 {p′ } var0 ← var s {q ′ } q ′ |= inv q ′ |= var < var0 inv ∧ ¬g |= q {p} while g :?! inv :# var do s od {q} (S-WHILE) Fig. 5. Pest static semantics (fragment) The premises of the rule for while can be seen as both a proof of the Fundamental Invariance Theorem for Loops [11] and a proof of termination using the loop variant. The predicate p′ represents any state where the invariant and the condition of the while hold; the loop body is augmented with an initial assignment to a fresh variable var 0 that is used to prove that the variant decreases. There is a clear correlation between Pest’s operational and static semantics. Using the latter, we can give a notion of safe program. In what follows, if π is a program and p a procedure, then π, p is the program obtained by appending p to π. Definition 1 (Safe programs) The set Safe of programs is inductively defined as follows: (SAFE-EMPTY) π ∈ Safe ∅ ∈ Safe {pre(p)} body(p) {post(p)} (SAFE-EXTEND) π, p ∈ Safe 8 de Caso, Garbervetsky, Gorín Theorem 1 (Safe programs execute normally) Let π ∈ Safe and let p be a procedure in π. For each σ such that σ |= pre(p), there exists a state σ ′ such that σ ⊲ body(p) ⊲ σ ′ and σ ′ |= post(p). Proof. It is a longish yet straightforward induction on the length of a derivation of {pre(p)} body(p) {post(p)}. See [8]. 4 Reducing the annotation burden In the previous section we presented the Pest programming language, including a soundness result showing that programs conforming to Pest static semantics do not go wrong. Still, providing Pest annotations is a heavy and complex task. In this section we discuss two techniques that assist the programmer by inferring and completing annotations. 4.1 Inference of procedure contracts We will describe a technique for synthesizing procedure pre and postconditions. To do that we will specialize the static semantic rules and turn them into inference rules. This will somehow resemble the process of developing type inference rules from a type system. Figure 6 shows some of the rules to compute a postcondition post(s, p) from given p and s. The complete calculus is given in [8]. p |= safe(e) (Q-ASSIGN) post(v ← e, p) = ∃ v ′ (p⌊v 7→ v ′ ⌋ ∧ v = e⌊v 7→ v ′ ⌋) p |= safe(g) (Q-IF) post(if g then s else t fi, p) = Cl∃ locals(s) (post(s, p ∧ g)) ∨ Cl∃ locals(t) (post(t, p ∧ ¬g)) true |= safe(inv) inv |= safe(var) inv |= safe(g) p |= inv inv ∧ g |= var > 0 post(var0 ← var s, inv ∧ g) = q ′ q ′ |= inv q ′ |= var < var0 (Q-WHILE) post(while g :?! inv :# var do s od, p) = inv ∧ ¬g Fig. 6. Pest postcondition calculus (fragment) Observe the way in which these rules specialize those in Figure 5. For example, in the specialized rule for assignments, post(v ← e, p) is simply the strongest Reducing Annotations in a Verification-oriented Language 9 q satisfying the original assignment rule. The rule for if eliminates (using an existential closure3 ) the local variables defined in each of the branches from their respective inferred postcondition. It is worth noticing that the inferred postcondition may contain unbounded existential quantifications. The main drawback of this is that, in that case, it is not valid to literally include it in the code. Observe also that an assertion with unbounded quantification cannot be checked at runtime; nevertheless, the inferred postconditions are correct by construction and the compiler can omit its associated runtime checks. A similar approach can be used to infer procedure preconditions (denoted pre(s, q)). In this case, we use weakest-preconditions to find a suitable predicate p, except for while sentences where we simply use the provided invariant. The rules for computing pre(s, q) can be found in [8]. Interestingly, we can infer non-trivial pre and postconditions even if the programmer provides no procedure annotations (other than loop annotations). First, we infer a predicate that guarantees the normal execution of a procedure body s: def P = pre(s, true) This gives us a proper precondition for the procedure. Next, we strengthen P by giving a symbolic initial value to each parameter (pi = pi @pre) and use it to infer a postcondition Q: def Q = post(s, P ∧ p1 = p1 @pre ∧ . . . ∧ pk = pk @pre) The reader should verify that if the pre and postconditions of the procedures in Figures 1 and 2 are omitted, this procedure will infer logically equivalent ones. 4.2 Strengthening annotations We will now show how we can take advantage of Pest’s restrictions on variable aliasing to incorporate inexpensive enhancements of invariants and postconditions. In a nutshell, we can propagate known facts about variables in certain scopes if we know that their contents are not altered. For example, let us say we know that before entering a loop it is always the case that variable j has value e; then if we can determine that the loop body does not update j, we can add j = e to the invariant. In the absence of aliasing, a simple, sound approximation of the set of unmodified variables is to compute first the set of variables potentially modified and then take its complement. We call modVars(s) the set of (potentially) modified variables; its definition is straightforward and can be found in [8]. What follows is a definition of our annotation strengthening function which takes a sentence s and an entry point p and produces a sentence s′ with possibly 3 The existential closure of a boolean expression b with respect to a set of variables {v1 , . . . , vn } is ∃v1 , . . . , vn (b) 10 de Caso, Garbervetsky, Gorín 1 ≤ i ≤ |A| ∧ ∀k / 0 ≤ k < i : m ≥ A[k] ∧ ∃k / 0 ≤ k < i : m = A[k] ∧ A = A@pre ∀k / 0 ≤ k < |A| : m ≥ A[k] ∧ ∃k / 0 ≤ k < |A| : m = A[k] ∧ A = A@pre Fig. 7. Invariant and postcondition of the main loop in the arrayMax procedure. Differences are highlighted. strengthened annotations. The translation does not alter assignments, local variable definitions or procedure calls. In the case of sentence sequence, we define it as:   def trS (s1 s2 , p) = s′1 trS s2 , post(s′1 , p) where s′1 = trS (s1 , p). That is, we first translate s1 and use its postcondition to translate s2 . When dealing with conditional statements we proceed by translating each branch using the conjunction of p with the guard g: def trS (if g then s1 else s2 fi, p) = if g then trS (s1 , p ∧ g) else trS (s2 , p ∧ ¬g) fi Finally, in the presence of a loop we strengthen its invariant. We existentially close p over the variables that are potentially modified by the loop body: def trS (while g :?! inv :# var do s od, p) = while g :?! I :# var do trS (s, I ∧ g) od where I = inv ∧ Cl∃ modVars(s) (p). Using this technique we can strengthen both invariants and postconditions. For the latter case we simply take the postcondition of the last instruction of the procedure and existentially eliminate the local variables, in order to leave the postcondition only in terms of procedure parameters. 5 High-level iteration constructs as annotations In this section we focus on what we call “high-level iteration constructs”. These capture recurrent iteration patterns and are frequently included in programming languages to reduce error-prone boilerplate code. Examples of such constructs are Pascal-style for -loop and C#’s foreach. We will see next that this kind of constructs can be seen as implicitly carrying their own proof obligations, reducing the need for explicit annotations. 5.1 The for construct We first consider the Pascal-style for loop and take as motivating example the arrayMax procedure in §2. In Figure 7 we compare the postcondition of the loop with its invariant. Clearly, they are syntactically very close. In fact, if we are given Reducing Annotations in a Verification-oriented Language 11 arrayInc(A) { local i ← 0 while i < |A| :?! 0 ≤ i ≤ |A| :?! ∀k / 0 ≤ k < i : A[k] = A@pre[k] + 1 :?! ∀k / i ≤ k < |A| : A[k] = A@pre[k] :# |A| − i do A ← update A on i with A[i] + 1 i ← i +1 od } Fig. 8. Pest procedure that increases each element in an array. a postcondition and a for -loop, we can simply try to guess a candidate invariant for the loop without even considering the loop body. Of course, the correctness of the invariant will have to be statically verified. On the other hand, a correct variant can be trivially obtained. Formally, given a sentence of the form for i from l to h do s od (without annotations) and its postcondition in the form of a predicate Qf , we can macroexpand the sentence into the following lower-level code: local i← l while i < h :?! l ≤ i ≤ h ∧ Qf ⌊h 7→ i⌋ :# h − i do s i ← i+1 od In order to apply this expansion we are required to provide a loop postcondition Qf . Nevertheless, this can be accomplished using the precondition calculus of §4.1 from the procedure postcondition up to the for -sentence we need to expand. If s contains a nested for -construct, a postcondition for it can be derived from the inferred invariant and the expansion can be recursively applied. Observe that in the easyArrayMax procedure of Figure 3, Qf is simply the postcondition of the procedure, since the for construct is located at the very end of the procedure body. 5.2 Declarative iteration constructs In §4.1 we saw that if the loop-invariants are provided, then postconditions can be omitted; conversely, in the previous section we showed that in the case of for loops invariants can be traded for postconditions. In this section we will show 12 de Caso, Garbervetsky, Gorín that when more specific iteration constructs are used, both can be dispensed with. We will only consider here the map-construct (reminiscent of the map function over lists in functional languages) but the idea is easily extensible to other constructs. Consider the procedure of Figure 8 (notice that the procedure contract was omitted and left for automatic inference). The loop iterates over an array A using an indexing variable i. On each iteration, only the element of A at position i is updated. Furthermore, this is done taking into account only the value of i and A[i]. The loop condition is not affected by changes to A. We call this iteration pattern, in which array elements are updated independently of the others, a map. The invariant for this iteration pattern states that the already visited array elements were updated whereas the remaining elements are unchanged. The variant reflects the fact that the array is traversed in a forward direction. Using our proposed map construct, the procedure in Figure 8 can be written like this: arrayInc(A) { map A[i ] ← A[i] + 1 in A[.. i ..] } Formally, this works as follows. Let A be an array, i a fresh variable and s a sentence such that modVars(s) r locals(s) = {A} and A is accessed only indexed by i. In that case, map s in A[.. i ..] is well-formed and gets expanded as follows: local i ← 0 while i < |A| :?! 0 ≤ i < |A| :?! ∀k / 0 ≤ k < i : posts ⌊i 7→ k⌋ :?! ∀k / i ≤ k < |A| : A[k] = A@pre[k] :# |A| − i do s i ← i +1 od where post s = post(s, 0 ≤ i < |A|). It can easily be seen that the inferred invariant is always correct. Thus, not only can the compiler erase the assertion checks, it doesn’t even need to statically verify them. Notice that the invariant inferred for the map high-level construct can be further strengthened using the technique presented in §4.2. Reducing Annotations in a Verification-oriented Language 6 13 Experience In order to test these ideas we developed a tool called BudaPest which is available online4 as an Eclipse plug-in. The tool takes Pest programs, statically verifies them and compiles them to Java code. For the verification step the code is translated into an intermediate assume/assert style language similar to BoogiePL [9]. Unlike the Boogie verifier, our tool leverages the structure of the original program to discharge verification conditions one by one to SMT-solvers, such as CVC3 [5], Yices [12] and Z3 [2]. We split verification conditions in several pieces in order to allow the provers to work in parallel, so we can leverage each of the provers’ power and combine their results. Splitting verification conditions also has the advantage of enabling early detection (during the verification process) of unsatisfiable conditions since once a subformula fails there is no need to continue with the rest of the subformulas. We tested the usability of this tool in a first-year Computer Science course. The curriculum of the course includes proving correctness and termination of simple imperative programs specified using contracts written in a fragment of first-order logic and proven by way of Hoare axiomatic semantics [16]. With the aid of the tool they were able to automatically verify the correctness of their implementations of algorithms such as bubble and insertion sorting, linear and binary search, etc., which they previously had to do by hand. The experience was very encouraging for the students since they found that concepts they had learnt during the course (preconditions, postconditions, invariants, variant functions) could be applied in “real” applications and produced code with guarantees of (partial) correctness and termination. Finally, it is worth mentioning that the integrated nature of the Pest language forced the students to concurrently think about both the statements needed to implement an algorithm and the assertions required to prove its correction. 7 Related Work There is a plenty of research on the automatic verification of programs. Due to lack of space we will just mention some of those we consider closer to our work. There are several languages and tools that incorporate Hoare-style specifications to automatically prove partial correctness in imperative languages. Some well known examples are ESC/Java [14], JML [17], ESC/Modula-3 [10], Spec# [4] and SPARK/Ada [3]. These systems enrich the language with user provided annotations which can be checked on runtime or statically analyzed by generating verification conditions that are discharged to a theorem prover. The approach followed by SPARK/Ada is closer to ours in the sense that they impose limitations to the language in order to make verification possible. We believe they go too far since they limit syntactically to programs where assertions 4 http://lafhis.dc.uba.ar/budapest 14 de Caso, Garbervetsky, Gorín are decidable, making them too restrictive. On the contrary, the problem with the other tools is that they deal with complex languages that provide many features such as polymorphism, concurrency, aliasing or reflection, which are comfortable for program development but complicate verification. Our work follows the philosophy that a compiler (or interpreter) should try to reject misbehaving programs. This is similar the approach followed by several languages that provide expressive type systems such as Deputy [7], which uses dependent types [19] to type-check low level imperative programs. For functional languages there are many proposals; just to name one, Cayenne [1] extends Haskell with dependent types. Recently, [21] presented a type theory for higher order functional programs which incorporates Hoare style specifications into types, making it possible to enforce correct use of side effects. 8 Final thoughts In this paper we presented Pest, a simple imperative programming language, which was designed with verifiability in mind. We proposed a series of techniques that aim at mitigating the annotation burden required to verify programs. Firstly, we showed an inference mechanism for procedure pre and postconditions and then a simple method to strengthen loop invariants and postconditions. As a distinguishing contribution we extended Pest with high-level iteration constructs that allow programmers to dramatically reduce annotations and yet maintain the ability to prove correctness of relatively complex pieces of software. Our first experiences showed that an integrated approach such as ours was gracefully adopted by young students with no pre-concepts with respect to programming languages or tools. We would like to explore, in the near future, the possibility of extending Pest incorporating features that would increase its expressiveness without sacrificing verifiability. We plan to allow the programmer to define and use her own data types and provide means to reason about representation invariants. Adding dynamic memory support is another priority but, in order to keep a verifiable language, we believe we must enforce an alias control mechanism such as [22]. Finally, we are interested in providing the means for programmers to define their own language constructs by feeding the BudaPest tool with syntax and macro expansion definitions, and relying on the base tools (i.e. pre and postcondition calculi) that we provided in this paper to ensure correctness. References 1. L. Augustsson. Cayenne-a language with dependent types. ACM SIGPLAN Notices, 34(1):239–250, 1999. 2. T. Ball, S. K. Lahiri, and M. Musuvathi. Zap: Automated theorem proving for software analysis. In LPAR, 2005. 3. J.G.P. Barnes and Praxis Critical Systems Limited. High Integrity Ada: The SPARK Approach. Addison-Wesley, 1997. Reducing Annotations in a Verification-oriented Language 15 4. M. Barnett, K.R.M. Leino, and W. Schulte. The Spec# Programming System: An Overview. In CASSIS. Springer, 2005. 5. C. Barrett and S. Berezin. CVC Lite: A new implementation of the cooperating validity checker. In Proceedings of the 16th CAV, 2004. 6. S. Chatterjee, S.K. Lahiri, S. Qadeer, and Z. Rakamaric. A reachability predicate for analyzing low-level software. 2007. 7. J. Condit, M. Harren, Z. Anderson, D. Gay, and G.C. Necula. Dependent Types for Low-Level Programming. Lecture Notes in Computer Science, 4421:520, 2007. 8. G. de Caso, D. Garbervetsky, and D. Gorín. Pest formal specification. Technical report, Universidad de Buenos Aires, http://lafhis.dc.uba.ar/budapest/ Theory section, 2008. 9. R. DeLine and K.R.M. Leino. BoogiePL: A typed procedural language for checking object-oriented programs. Technical report, Technical Report MSR-TR-2005-70, Microsoft Research, 2005. 10. D. L. Detlefs, K.R.M. Leino, G. Nelson, and J.B. Saxe. Extended static checking. Technical Report #159, Palo Alto, USA, 1998. 11. E.W. Dijkstra. A Discipline of Programming. Prentice Hall PTR Upper Saddle River, NJ, USA, 1997. 12. B. Dutertre and L. de Moura. The Yices SMT solver. Available at http://yices.csl.sri.com/, August, 2006. 13. M.D. Ernst, J.H. Perkins, P.J. Guo, S. McCamant, C. Pacheco, M.S. Tschantz, and C. Xiao. The Daikon system for dynamic detection of likely invariants. Science of Computer Programming, 2007. 14. C. Flanagan, K.R.M. Leino, M. Lillibridge, G. Nelson, J.B. Saxe, and R. Stata. Extended static checking for Java. In PLDI ’02, 2002. 15. D.I. Good, R.L. London, and WW Bledsoe. An interactive program verification system. In Proceedings of the international conference on Reliable software table of contents, pages 482–492. ACM New York, NY, USA, 1975. 16. C. A. R. Hoare. An axiomatic basis for computer programming. Commun. ACM, 12(10):576–580, 1969. 17. G.T. Leavens, A.L. Baker, and C. Ruby. JML: A notation for detailed design. In Behavioral Specifications of Businesses and Systems, pages 175–188. Kluwer Academic Publishers, 1999. 18. K. Rustan M. Leino and Francesco Logozzo. Loop invariants on demand. In APLAS, pages 119–134, 2005. 19. J. McKinna. Why dependent types matter. Proc. ACM Symp. on Principles of Programming Languages (POPL 2006), 2006. 20. R.A. De Millo, R.J. Lipton, and A.J. Perlis. Social processes and proofs of theorems and programs. Commun. ACM, 22(5):271–280, 1979. 21. A. Nanevski, G. Morrisett, and L. Birkedal. Polymorphism and separation in hoare type theory. In ICFP ’06, 2006. 22. J. Noble, J. Vitek, and J. Potter. Flexible alias protection. In ECOOP ’98: Proceedings of the 12th European Conference on Object-Oriented Programming, pages 158–185, London, UK, 1998. Springer-Verlag. 23. N. Norwitz. PyChecker. SourceForge project http://pychecker. sourceforge. net. 24. D.N. Xu. Extended static checking for Haskell. In Proceedings of the 2006 ACM SIGPLAN workshop on Haskell, pages 48–59. ACM New York, NY, USA, 2006.
6cs.PL
arXiv:1711.01130v1 [math.AC] 3 Nov 2017 ON COMBINATORIAL ASPECTS ARISING FROM MODULES OVER COMMUTATIVE RINGS RAMEEZ RAJA School of Mathematics, Harish-Chandra Research Institute, HBNI, Chhatnag Road, Jhunsi, Allahabad 211019, India [email protected] Abstract. Let R be a commutative ring with unity, M be an unitary Rmodule and Γ be a simple graph. This research article is an interplay of combinatorial and algebraic properties of M . We show a combinatorial object completely determines an algebraic object and characterize all finite abelian groups. We discuss the correspondence between essential ideals of R, submodules of M and vertices of graphs arising from M . We examine various types \ \ \ of equivalence relations on objects A\ f (M ), As (M ) and At (M ), where Af (M ) \ is an object of full-annihilators, As (M ) is an object of semi-annihilators and A\ t (M ) is an object of star-annihilators in M . We study essential ideals corresponding to elements of an object A\ f (M ) over hereditary and regular rings. Further, we study isomorphism of annihilating graphs arising from M and tensor product M ⊗R T −1 R, where T = R\C(M ), where C(M ) = {r ∈ R : rm = 0 f or some 0 6= m ∈ M }, and show that annf (Γ(M ⊗R T −1 R)) ∼ = annf (Γ(M )) for every R-module M . AMS Mathematics Subject Classification: 13A99, 05C78, 05C12 Key words: Module, ring, essential ideal, tensor product, annihilator 1. Introduction The subject of algebraic combinatorics deals with the study of combinatorial structures arising in an algebraic context, or applying algebraic techniques to a combinatorial problem. One of the areas in algebraic combinatorics introduced by Beck [7] is to study the interplay between graph theoretical and algebraic properties of an algebraic structure. Continuing the concept of associating a graph to an algebraic structure another combinatorial approach of studying commutative rings was given by Anderson and Livingston in [1]. They associated a simple graph to a commutative ring R with unity called a zero-divisor graph denoted by Γ(R) with vertices as Z ∗ (R) = Z(R)\{0}, where Z(R) is the set of zero-divisors of R. Two distinct vertices x, y ∈ Z ∗ (R) of Γ(R) are adjacent if and only if xy = 0. The zero-divisor graph of a commutative ring has also been studied in [2, 21, 23, 25] and has been extended to non-commutative rings and semigroups in [17, 24]. The combinatorial properties of zero-divisors discovered in [7] has also been studied in module theory. Recently in [19], the elements of a module M has been 1 2 RAMEEZ RAJA classified into full-annihilators, semi annihilators and star-annihilators, see Definition 2.1 in section 2. For M = R, these elements are the zero-divisors of a ring R, so the three simple graphs annf (Γ(M )), anns (Γ(M )) and annt (Γ(M )) corresponding to full-annihilators, semi annihilators and star-annihilators in M are natural generalizations of a zero-divisor graph introduced in [1]. On the other hand, the study of essential ideals in a ring R is a classical problem. For instance, Green and Van Wyk in [11] characterized essential ideals in certain class of commutative and non-commutative rings. The authors in [6, 16] also studied essential ideals in C(X) and topologically characterized the scole and essential ideals. Moreover, essential ideals also have been investigated in rings of measurable functions [18] and C ∗ - algebras [14]. For more on essential ideals see [12, 13, 22]. We call any subset of M as an object. By combinatorial object we mean an object which can be put into one-to-one correspondence with a finite set of integers and by an algebraic object we mean a combinatorial object which is also an algebraic structure. The main objective of this paper is to study combinatorial objects, objects arising from modules and the graphs with vertex set as objects and combinatorial objects. For an R-module M and x ∈ M , set [x : M ] = {r ∈ R | rM ⊆ Rx}, which clearly is an ideal of R and an annihilator of the factor module M/Rx, where as the annihilator of M is [0 : M ]. In section 2, we study the correspondence of ideals in R, submodules of M and the elements of an object A\ f (M ), and characterize all finite abelian groups (Proposition 2.2). We further show (Theorem 2.11) that an R-module [x : M ] is injective if and only if R is non-singular and the radical of R/[x : M ] is zero. In section 3, we examine two different equivalence relations on the elements of an object A\ f (M ) and discuss (Theorem 3.6) the adjacencies of vertices in the graph annf (Γ(M )). Furthermore, we explore the equivalence relations (Theorem 3.8, Theorem 3.10) to establish the structure of a module M and the annihilating graph annf (Γ(M )). Finally, in section 4, we study some applications of annihilating graphs (Theorem 4.2) and extract certain module theoretic properties from these graphs. Further, we discuss the annihilating graphs arising from the tensor product (Theorem 4.7) and show that annf (Γ(M ⊗R T −1 R)) ∼ = annf (Γ(M )) for every R-module M . We conclude this section with some notations, which are mostly standard and will be used throughout this research article. Throughout, R is a commutative ring (with 1 6= 0) and all modules are unitary unless otherwise stated. A submodule N is said to be an essential submodule of M if it intersects non-trivially with every nonzero submodule of M . [N : M ] = {r ∈ R | rM ⊆ N } denotes an ideal of ring R. The symbols ⊆ and ⊂ has usual set theoretic meaning as containment and proper containment of sets. We will denote the ring of integers by Z, positive integers by N and the ring of integers modulo n ON COMBINATORIAL ASPECTS ARISING FROM MODULES OVER COMMUTATIVE RINGS3 by Zn . For basic definitions from graph theory we refer to [[9, 27]], and for ring theory and module theory we refer to [[4, 8, 15, 28]]. 2. Essential ideals determined by elements of an object A\ f (M) In this section, we discuss the correspondence of essential ideals in R, submodules of M and the elements of an object A\ f (M ). We characterize essential ideals corresponding to Z-modules. We show that if M is not simple R-module, then an ideal [x : M ], x ∈ A\ f (M ) considered as an R-module is injective. We study essential ideals corresponding to the vertices of graph annf (Γ(M )) over hereditary and regular rings. We recall a definition concerning full-annihilators, semi annihilators and starannihilators of a module M . Definition 2.1. An element x ∈ M is a, (i) full-annihilator, if either x = 0 or [x : M ][y : M ]M = 0, for some nonzero y ∈ M with [y : M ] 6= R, (ii) semi-annihilator, if either x = 0 or [x : M ] 6= 0 and [x : M ][y : M ]M = 0, for some nonzero y ∈ M with 0 6= [y : M ] 6= R, (iii) star-annihilator, if either x = 0 or ann(M ) ⊂ [x : MR ] and [x : M ][y : M ]M = 0, for some nonzero y ∈ M with ann(M ) ⊂ [y : M ] 6= R. We denote by Af (M ), As (M ) and At (M ) respectively the objects of full-annihilators, semi-annihilators and star-annihilators for any module M over R. We set A\ f (M ) = \ Af (M )\{0}, A\ (M ) = A (M )\{0} and A (M ) = A (M )\{0}. s s t t In [19] authors introduced annihilating graphs arising from modules over commutative rings called as full-annihilating, semi-annihilating and star-annihilating graphs denoted by annf (Γ(M )), anns (Γ(M )) and annt (Γ(M )) respectively. The \ \ vertices of annihilating graphs are elements of objects A\ f (M ), As (M ) and At (M ), and two vertices x and y are adjacent if and only if [x : M ][y : M ]M = 0. By Definition 2.1, we see that there is a correspondence of ideals in R, submodules \ \ of M and the elements of objects A\ f (M ), As (M ) and At (M ). Furthermore, the containment annt (Γ(M )) ⊆ anns (Γ(M )) ⊆ annf (Γ(M )) as induced subgraphs is clear, so our main emphasis is on the object A\ f (M ) and the full-annihilating graph annf (Γ(M )). However, one can study these objects and graphs separately for any module M . Note that if M is a finite module over R or the graph annf (Γ(M )) is \ \ \ finite, then the objects A\ f (M ), As (M ) are combinatorial with |Af (M )| = |As (M )| and the annihilating graphs annf (Γ(M )), anns (Γ(M )) coincide, where as the graph annt (Γ(M )) with vertex set as combinatorial object A\ t (M ) may be different. Let G be any finite Z-module. Clearly, G is a finite abelian group. Below, we discuss the correspondence of ideals in Z and the elements of an object A\ f (G). We study cases of finite abelian groups where the essential ideals corresponding to 4 RAMEEZ RAJA the submodules generated by the vertices of graph annf (Γ(M )) are same and the submodules determined by these vertices are isomorphic. The following is an interesting result in which a combinatorial object completely determines an algebraic object. Proposition 2.2. Let G be a finite Z-module. Then for each x ∈ A\ f (G), [x : M ] is an essential ideal if and only if G is a finite abelian group without being simple. Proof. For all x ∈ A\ f (G), we have [x : G] = nZ, n ∈ N. It is clear that nZ intersects non-trivially with any ideal mZ, m ∈ N in Z. For the converse, observe that among all finite abelian groups A\ f (G) = ∅ if and only if G is simple.  Recall that a graph Γ is said to be a complete if there is an edge between every pair of distinct vertices. A complete graph with n vertices is denoted by Kn . Remark 2.3. For a finite abelian group Zp ⊕ Zp , where p ≥ 2 is prime, the essen\ tial ideals [x : M ], x ∈ Af (Z p ⊕ Zp ) corresponding to the submodules of Zp ⊕ Zp \ generated by elements of Af (Z p ⊕ Zp ) are same. In fact [x : M ] = ann(Zp ⊕ Zp ) \ for all x ∈ Af (Zp ⊕ Zp ). Furthermore, the abelian group Zp ⊕ Zp is a vector space over field Zp and all one dimensional subspaces are isomorphic. So, the submodules \ generated by elements of Af (Z p ⊕ Zp ) are all isomorphic. For a finite abelian group Zp ⊕ Zq , where p and q are any two prime numbers, the essential ideals determined \ by each x ∈ Af (Z p ⊕ Zq ) are either pZ or qZ. Remark 2.4. Proposition 2.2 is not true for all Z-modules. Consider a Z-module M = Z ⊕ Z ⊕ · · · ⊕ Z, which is a direct sum of n copies of Z. It is easy to verify c that A\ f (M ) = M with [x : M ][y : M ]M = 0 for all x, y ∈ M , which implies annf (Γ(M )) is a complete graph. The cyclic submodules generated by the vertices of annf (Γ(M )) are simply the lines with integral coordinates passing through the origin in the hyper plane R ⊕ R ⊕ · · ·⊕ R and these lines intersect at the origin only. It follows that for each x ∈ M , [x : M ] is not an essential ideal in Z, in fact [x : M ] is a zero-ideal in Z. Using the description given in Remark 2.4, we now characterize all the essential ideals corresponding to Z-modules determined by elements of A\ f (M ). Proposition 2.5. If M is any Z-module, then [x : M ] is an essential ideal if and only if [x : M ] is non-zero for all x ∈ A\ f (M ). Proof. [x : M ] is an ideal in Z for each x ∈ A\  f (M ). For any R-module M , it would be interesting to characterize essential ideals [x : M ], x ∈ A\ f (M ) corresponding to submodules determined by elements of \ Af (M ) (or vertices of the graph annf (Γ(M ))) such that the intersection of all ON COMBINATORIAL ASPECTS ARISING FROM MODULES OVER COMMUTATIVE RINGS5 essential ideals is again an essential ideal. It is easy to see that a finite intersection of essential ideals in any commutative ring is an essential ideal. But an infinite intersection of essential ideals need not to be an essential ideal, even a countable intersection of essential ideals in general is not an essential ideal as can be seen in [6]. If annf (Γ(M )) is a finite graph, then by [Theorem 3.3, [19]] M is finite over R, so the submodules determined by the vertices of graph are finite and therefore the ideals corresponding to submodules are finite in number and we conclude the intersection of essential ideals [x : M ], x ∈ A\ f (M ) in R is an essential ideal. Motivated by [6], we have have the following question regarding essential ideals corresponding to submodules M determined by vertices of the graph annf (Γ(M )). Question 2.6. Let M be an R-module. For x ∈ A\ f (M ), characterize essential ideals [x : M ] in R such that their intersection is an essential ideal. The Question 3.13 is true if every submodule of M is cyclic with nonzero intersection. Proposition 2.7. Let M be an R-module such that every submodule of M is cyclic over R. For x ∈ A\ f (M ), if the submodule generated by x intersects non-trivially with every other submodule of M , then [x : M ] is an essential ideal in R. T Rx 6= 0. If A\ Proof. Assume f (M ) = φ, then M is simple, a contradiction. x∈M Let x ∈ A\ f (M ) and let Rx be the submodule generated by x. Since Rx intersects non-trivially with every other submodule, so there exist y ∈ A\ f (M ) such that Rx ∩ Ry 6= 0. It suffices to prove the result for Rx ∩ Ry. Let z ∈ Rx ∩ Ry and let [x : M ], [y : M ], [z : M ] be ideals of R corresponding to submodules Rx, Ry and Rz. Then [z : M ] ⊆ [x : M ] ∩ [y : M ] 6= 0, which implies [x : M ] intersects non-trivially with every nonzero ideal corresponding to the submodule generatedP by an element of A\ f (M ). For any other ideal I of R, it is clear that am : a ∈ I, m ∈ M } = Ra for some a ∈ M . Thus I corresponds IM = { f inite to the cyclic submodule generated by a ∈ M . It follows that [x : M ] ∩ I 6= 0, for every nonzero ideal of R and we conclude that [x : M ] is an essential ideal for each x ∈ A\  f (M ). The converse of Proposition 2.7 is not true in general. We can easily construct examples from Z-modules such that an ideal corresponding to the submodule generated by some element of an object A\ f (M ) is an essential ideal, but the intersection of all submodules determined by elements of A\ f (M ) is empty. However, if every \ ideal [x : M ], x ∈ Af (M ) corresponds to an essential submodule of M , then we have the nonzero intersection. Corollary 2.8. Let M be an R-module. For x ∈ A\ f (M ), if the cyclic submodule Rx intersects with every other cyclic submodule of M non-trivially, then [x : M ] is 6 RAMEEZ RAJA an essential ideal in R. Corollary 2.9. The intersection T [x : M ] is an essential ideal in R if and x∈A\ f (M) only if every submodule of M is essentially cyclic over R. For an R-module M , let Z(M ) denote the following, Z(M ) = {m ∈ M : ann(m) is an essential ideal in R}. If Z(M ) = M , then M is said to be singular and if Z(M ) = 0, then M is said to be non-singular. By rad(M ), we denote the intersection of all maximal submodules of M . So, rad(R) is the Jacobson radical of a ring R. The socle of an R-module M denoted by Soc(M ) is the sum of simple submodules or equivalently the intersection of all essential submodules. To say that Soc(M ) is an essential socle is equivalent to saying that every cyclic submodule of M contains a simple submodule of M . An essential socle of M is denoted by essoc(M ). In the following result, we consider singular simple R-modules (ideals) which are injective, and obtain some properties of essential ideals corresponding to the submodules generated by elements of A\ f (M ). Lemma 2.10. For x ∈ A\ f (M ), if [x : M ] is an essential ideal, then R/[x : M ] is a singular R-module. Proof. The proof simply follows by using definition of a singular module.  Theorem 2.11. Let M be an R-module with essoc(M ) 6= 0 and T Rx 6= 0. x∈M Then every singular simple R-module [x : M ], x ∈ A\ f (M ) is injective if and only if Z(R) = 0 and rad(R/[x : M ]) = 0. T Rx 6= 0, so A\ Proof. We have essoc(M ) 6= 0 and f (M ) 6= 0. Therefore x∈M corresponding to every cyclic submodule generated by elements of A\ f (M ) we have an ideal in R. Suppose all singular simple R-modules [x : M ], x ∈ A\ f (M ) are \ injective. If for some z ∈ Af (M ), I = [z : M ] ⊆ Z(R) is a simple R-module, then Z(I) = I. This implies I is injective and thus a direct summand of R. However, the set Z(R) is free from nonzero idempotent elements. Therefore I = 0 and it follows that Z(R) = 0. For x ∈ A\ f (M ), A = [x : M ] is an essential ideal of R. Thus by Lemma 2.10, R/A is a singular module and so is every submodule of R/A. Therefore every simple submodule of R/A is injective, which implies that every simple submodule is excluded by some maximal submodule. Thus we conclude that rad(R/A) = 0. For the converse, we again consider the correspondence of cyclic submodules of M and ideals of R. Let I˜ be a singular simple R-module corresponding to the submodule of M . In order to show that I˜ is injective, we must show that for every essential ideal A in R corresponding to the submodule determined by an element ON COMBINATORIAL ASPECTS ARISING FROM MODULES OVER COMMUTATIVE RINGS7 ˜ ˜ x ∈ A\ f (M ), every ϕ ∈ HomR (A, I) has a lift ψ ∈ HomR (R, I) such that the following diagram commutes A f ϕ R ψ I˜ Let K = ker(ϕ). We claim, K is an essential ideal of R, for if K ∩ J = 0 for some nonzero ideal J of R. Then, I ∗ = J ∩ A 6= 0 and I ∗ ∩ K = 0. ˜ a contradiction, since I˜ is a singular simple submodule This implies I ∗ ⊆ ϕ(I ∗ ) ⊆ I, ˜ and Z(R) = 0. It is clear that if µ 6= 0, ϕ induces an isomorphism µ : A/K −→ I. So, A/K is a simple R-submodule of R/K. By our assumption rad(R/K) = 0, so there is a maximal submodule M/K such that R/K = A/K ⊕ M/K. Let g : R −→ R/K be a canonical map and let p : R/K −→ A/K be a projection map. Then we have pg : R −→ A/K. Therefore the composition h = µpg is the required lift such that the above diagram commutes.  In the rest of this section, we discuss some interesting consequences of preceding theorem. T Rx 6= 0 and Theorem 2.12. Let M be an R-module with essoc(M ) 6= 0, x∈M every singular simple R-module [x : M ], x ∈ A\ f (M ) is injective. Then every ideal [x : M ] is an intersection of maximal ideals, J(R)2 = 0 and [x : M ]2 = [x : M ]. Proof. For any x ∈ A\ f (M ), [x : M ] is an essential ideal in R. Therefore, J(R) ⊆ [x : M ], since J(R) is contained in every essential ideal of R. On the other hand intersection of all essential ideals in R is scole of R, therefore J(R) ⊆ Soc(R). This implies J(R)2 = 0 and [x : M ] is an intersection of maximal ideals in R. Suppose that [x : M ]2 6= [x : M ], for an essential ideal [x : M ] of R. By Theorem 2.11, Z(R) = 0 and therefore for every essential ideal I, I ⊆ I 2 . In particular, 2 [x : M ] ⊆ [x : M ]2 for each x ∈ A\ f (M ). It follows that [x : M ] is an essential ideal and is the intersection of maximal ideals in R. Finally, if y ∈ [x : M ]2 , y ∈ / [x : M ], there is some maximal ideal P of R such that [x : M ] ⊆ P , y ∈ / P. Then R = Ry + P , that is, 1 = ry + m. This implies y = yry + ym ∈ P , a contradiction and hence we conclude that [x : M ]2 = [x : M ].  Corollary 2.13. Let M be an R-module, where R is hereditary. For x ∈ A\ f (M ), if [x : M ] is an essential ideal of R and J(R)2 = 0, then every singular simple R-module [x : M ] is injective. Proof. Let R be hereditary. Then from [8], the exact sequence, 0 −→ ann(x) −→ R −→ Rx −→ 0 splits for any x ∈ R. Since J(R)2 = 0 and R/J(R) is an artinian ring. Therefore, J(R) ⊆ Soc(R). But any essential ideal of R contains Soc(R). So, J(R) ⊆ [x : M ]. This implies R/[x : M ] is completely reducible R-module and therefore rad(R/[x : 8 RAMEEZ RAJA M ]) = 0. Thus by Theorem 2.11, every singular simple R-module [x : M ] is injective.  Next, we consider modules over regular rings. Theorem 2.14. T Let M be an R-module such that every submodule of M is cyclic Rx 6= 0. Then the following are equivalent. over R and x∈M (i) R is regular (ii) A2 = A for each ideal A of R (iii) [x : M ]2 = [x : M ] for each x ∈ A\ f (M ) Proof. The equivalence of (i) and (ii) is clear and certainly (ii) implies (iii). Thus we just need to show that (iii) implies (ii). By Theorem 2.11, [x : M ] is an essential 2 ideal for each x ∈ A\ f (M ). Suppose [x : M ] = [x : M ]. If A is non-essential ideal of A, choose J to be maximal ideal of R such that A ∩ J = 0, then A + J is an essential ideal of R. Therefore again by Theorem 2.11, A + J correspond to some submodule of M and we have A + J = [z : M ] for some z ∈ M . So, If x ∈ A, then x = P f inite (A + J)2 = A2 + J 2 = A + J. P mn, where a, b ∈ A and m, n ∈ J. Therefore, ab + x− f inite X f inite ab = X mn ∈ A ∩ J = 0. f inite This implies x ∈ A2 and we conclude that A = A2 . Corollary 2.15. Let M be an R-module with essoc(M ) 6= 0 and  T Rx 6= 0. x∈M Then every singular simple R-module [x : M ], x ∈ A\ f (M ) is injective if and only if R is regular. Proof. By Theorem 2.12, if every singular simple R-module [x : M ] is injective, 2 then for x ∈ A\ f (M ), [x : M ] = [x : M ]. Therefore by Theorem 2.14, R is regular. If R is regular, then by [Theorem 6, [26]] every singular simple R-module is injective.  \ \ 3. Equivalence relations on the elements of A\ f (M), As (M), At (M) This section is devoted for the study of equivalence relations defined on elements \ \ of objects A\ f (M ), As (M ) and At (M ). We define two equivalence relations on \ Af (M ) called as neighbourhood similar relation (combinatorial relation) and the submodule similar relation (algebraic relation). We investigate the equivalence of these two relations on A\ f (M ) and study the conditions for any two elements of \ Af (M ) to be adjacent in annf (Γ(M )). We explore the neighbourhood similar relation on A\ f (M ) to establish the structure of module M and the full-annihilating graph annf (Γ(M )). ON COMBINATORIAL ASPECTS ARISING FROM MODULES OVER COMMUTATIVE RINGS9 Definition 3.1. For an R-module M , two distinct elements m1 , m2 ∈ A\ f (M ) are submodule similar (∼M ) denoted by m1 ∼M m2 if and only if the submodules ann(m1 )M and ann(m2 )M of M coincide, that is, m1 ∼M m2 if and only if ann(m1 )M = ann(m2 )M . Clearly, ∼M is an equivalence relation on A\ f (M ) and the equivalence classes of any m ∈ A\ (M ) is denoted by, f [m]M = {m∗ ∈ M : m∗ ∼M m}. Analogously, we can define the submodule relation on the elements of objects A\ s (M ) \ and At (M ). Let Γ be any connected graph. A neighbour of any vertex v in Γ is a vertex adjacent to v. N (v) denotes the set all neighbours of v and N [v] = N (v) ∪ {v}. The study of neighbourhoods of vertices in a connected graph Γ is related to the symmetry of that graph. There is a close relationship, which is being discussed in the following definition between the neighbourhoods and the distance similar classes of vertices defined in [20] . Definition 3.2. For a connected graph Γ, two distinct vertices u, v ∈ V (Γ) on a vertex set V (Γ) are neighbourhood similar (∼nbd ) denoted by u ∼nbd v if and only if N (u) = N (v). It can be easily checked that ∼nbd is an equivalence relation on V (Γ). The neighbourhood similar equivalence class of a vertex v is, [v]Γ = {w ∈ V (Γ) : N (v) = N (w)}. Two distinct vertices a, b ∈ V (Γ) which are not neighbourhood similar can be identified as the vertices for which ab ∈ E(Γ) with N (a) 6= N (b) or ab ∈ / E(Γ) with N (a) 6= N (b), where E(Γ) denotes the edge set of Γ. If Γ is a finite connected graph, then the neighbourhood similar relation on V (Γ) is a distance similar relation (∼d ) defined in [20] with two vertices u, v ∈ V (Γ) are distance similar denoted by u ∼d v if d(u, w) = d(v, w) for all w ∈ V (Γ) \ {u, v}. Clearly, vertices u and v are distance similar if either uv ∈ / E(Γ) and N (u) = N (v) or uv ∈ E(Γ) and N [u] = N [v]. The following example illustrates neighbourhood similar relation on a connected graph Γ. Example 3.3. Consider the graph Γ of order n = 10, shown in Figure 1. Two of the five neighbourhood similar equivalence classes are V1 = {v6 , v5 } and V2 = {v7 , v8 , v9 , v10 }. Each of the three remaining classes {v1 }, {v4 } and {v6 } consists of a single vertex. 10 RAMEEZ RAJA v2 v3 v7 v5 v8 v1 v6 v4 v9 v10 . Now, we explain the connection between neighbourhood similar and submodule similar equivalence relations on an object A\ f (M ). In fact, we will see that the neighbourhood similar relation ∼nbd , which is a combinatorial relation implies an algebraic relation ∼M and conversely. Moreover, we investigate the condition for any two elements of A\ f (M ) to be adjacent in annf (Γ(M )). We start with following two lemmas. Lemma 3.4. Let M be an R-module. Then for x, z, y ∈ A\ ), [x : M ][z : f (M T M ]M = 0 if and only if z ∈ ann(x)M or z ∈ ann(y)M with ann(x)M ann(y)M = {0}. Proof. The proof follows because of the fact that each element of an ideal ann(y) in R annihilate whole of Ry.  Lemma 3.5. If M is an R-module and x, y ∈ A\ f (M ) with x ∼nbd y, then either [x : M ]2 M = [y : M ]2 M = 0 or both [x : M ]2 M 6= 0 and [y : M ]2 M 6= 0. Proof. Let M be an R-module and let x ∼nbd y for x, y ∈ A\ f (M ). Assume that [x : M ]2 M = 0 and [y : M ]2 M 6= 0. We consider the following cases. Case 1. x and y are adjacent in annf (Γ(M )), that is [x : M ][y : M ]M = 0. Then it is easy to check that [x + y : M ][x : M ]M = 0, which implies x + y ∈ N (x). Note here that x + y 6= x and x + y 6= y. However, x + y ∈ / N (y), since [x + y : M ][y : M ]M 6= 0. Therefore N (x) 6= N (y), a contradiction. Case 2. x and y are not adjacent in annf (Γ(M )), that is [x : M ][y : M ]M 6= 0. Then by case 1, we can easily find an element z ∈ A\ f (M ) such that [z : M ][x : M ]M = 0, where as [z : M ][y : M ]M 6= 0. Therefore, N (x) 6= N (y), again a contradiction.  Theorem 3.6. Let M be an R-module with |A\ f (M )| being at least 3. Then for x, y ∈ A\ (M ) the following hold. f (i) If M is a multiplication module, then x ∼nbd y if and only if x ∼M y. (ii) If x ∼nbd y, then [x : M ][y : M ]M = 0 if and only if [x : M ]2 M = [y : M ]2 M = 0. ON COMBINATORIAL ASPECTS ARISING FROM MODULES OVER COMMUTATIVE RINGS 11 Proof. (i) Directly follows from Lemma 3.4 and the fact that every submodule of a multiplication module M is of the form IM , for some ideal I of R. (ii) Let x ∼nbd y and suppose [x : M ]2 M 6= 0. Then by Lemma 3.5, [y : M ]2 M 6= 0. Assume that [x : M ][y : M ]M = 0. There must be without loss of generality some m ∈ N (x) with m 6= x, such that m ∈ N (y). Then [y : M ][x + m : M ]M = 0, which implies either x + m ∈ N (x) or x + m = x or x + m = y. But, x + m 6= x as [x : M ]2 M 6= 0, also x + m ∈ / N (x), since [x : M ][x + m : M ]M 6= 0 and x + m 6= y, since y ∈ N (x). Lastly, if x + m = 0, then [x : M ]2 M = 0. Thus, we have a contradiction and therefore, [x : M ][y : M ]M 6= 0. Now, suppose [x : M ]2 M = 0. Therefore by Lemma 3.5, [y : M ]2 M = 0. Assume that [x : M ][y : M ]M 6= 0. Then by Lemma 3.4, x ∈ / ann(x)M and x ∈ / ann(y)M . \ Since |A\ (M )| ≥ 3, so there is some z ∈ A (M ) such that [x : M ][z : M ]M = 0. f f This implies z = x or z = y, since x ∼nbd y. But, z 6= y as y ∈ / N (x). Therefore z = x and we have for all r ∈ [x : M ], x + ry ∈ ann(x)M or x + ry ∈ ann(y)M . However, x + ry ∈ / ann(y)M , since [x + ry : M ][y : M ]M 6= 0. On the other hand, x + ry ∈ N (y), since x ∼nbd y, a contradiction. If x + ry = x or x + ry = y, then [x : M ][y : M ]M = 0, which is again a contradiction.  \ The preceding theorem is also true for the elements of objects A\ s (M ) and At (M ), that is, the same adjacency relations hold for the vertices of semi-annihilating anns (Γ(M )) and the star-annihilating graph annt (Γ(M )). Recall that an element a ∈ R is said to be nilpotent if for some n ∈ N, an = 0. We denote the set of all nilpotent elements of R by nil(R) called the nil radical of R which is contained in every prime ideal of R. For a module M , we denote by nil(M ) the sub module which is contained in every prime submodule of M that is, T N = {x ∈ M | [x : M ]x = 0}, nil(M ) = N ∈Spec(M) where N = {x ∈ M | [x : M ]x = 0} and Spec(M) is the set of all prime submodules of M . Also, note that a vertex v ∈ V (Γ) is said to be a pendant vertex if there is only one vertex adjacent to it. That is, if degree of vertex a v, denoted by deg(v) is 1. In the remaining section, we study the neighbourhood classes of elements in M . Consider the elements of M which are not neighbourhood similar in annf (Γ(M )), we investigate about the structure of a module M if any two elements in annf (Γ(M )) are not neighbourhood similar. We make use of neighbourhood similar elements to study the nature of all annihilating graphs arising from M . Before, we discuss the results regarding neighbourhood variant and invariant classes we have the following key lemmas. Lemma 3.7. For any R-module M , annf (Γ(M )) is not an n − gon for n ≥ 5. Proof. Suppose annf (Γ(M )) is the graph with vertices {x1 , x2 , · · · , xn } such that x1 − x2 , x2 − x3 , · · · , xn−2 − xn−1 , xn−1 − xn , xn − x1 are the only adjacencies in annf (Γ(M )). Then, we have [x1 : M ][x2 : M ]M = 0 = [x1 : M ][xn : M ]M . This implies [x1 : M ][x2 +xn : M ]M = 0. It follows that x2 +xn is either x1 , x2 , · · · , xn−1 or xn . A simple check yields that x2 + xn = x1 is the only possibility. Similarly, 12 RAMEEZ RAJA x1 + xn−1 = xn . Therefore, xn = x2 + xn + xn−1 . So, [x1 : M ][xn : M ]M = [x1 : M ][x2 : M ]M +[x1 : M ][xn : M ]M +[x1 : M ][xn−1 : M ]M. This implies [x1 : M ][xn−1 : M ]M = 0, a contradiction, and hence we conclude that annf (Γ(M )) is not an n − gon for n ≥ 5.  Lemma 3.8. Let M be an R-module. Then for all x ∈ M , [x : M ]x = 0 if and only if [x : M ]2 M = 0. Proof. The proof follows because of the fact that an ideal [x : M ] of R annihilate every multiple of x.  Lemma 3.9. For an R-module M with nil(M ) 6= 0, let annf (Γ(M )) be the full annihilating graph such that annf (Γ(M )) contains no cycle of length 3. Then the following hold. (i) If for every pair y, z ∈ A\ f (M ) with y ∼nbd z there exists an element x ∈ \ Af (M ) such that [x : M ][z : M ]M = 0 = [x : M ][y : M ]M , then either 8 ≤ |M | ≤ 16 or |M | ≥ 17 and nil(M ) = {0, x}. \ (ii) If for each x ∈ A\ f (M ), there exists a pair z, y ∈ Af (M ) \ {x} such that y ∼nbd z and [x : M ][y : M ]M = 0 = [x : M ][z : M ]M , then any a ∈ A\ f (M ) with [x : M ][a : M ]M = 0 is a pendant vertex in annf (Γ(M )). Proof. (i) Let nil(M ) 6= 0. We first show that for all r ∈ [x : M ], rn x = 0 for some n ∈ N, where x ∈ nil(M ). Consider a set S = {rn x : n ∈ N}, we must show that 0 ∈ S. Suppose that 0 ∈ / S and let N be a submodule of M such that N ∩ S = ∅. Then by Zorn’s Lemma the collection Σ = {N : N ∩ S = ∅} contains a maximal element. Let K be a maximal member of Σ. We claim that [N : M ] is a prime ideal of R. Clearly, [N : M ] ⊂ R. Let r1 , r2 ∈ R and suppose r1 r2 ∈ [N : M ] with r1 , r2 ∈ / [N : M ]. Then (r1 M + K) ∈ / Σ and (r2 M + K) ∈ / Σ. So r1n x ∈ S ∩ r1 M + K n and r2 x ∈ S ∩ r2 M + K for some n1 , n2 ∈ N. Therefore rn1 +n2 x ∈ K ∩ S, a contradiction. Thus [N : M ] is a prime ideal and by [Corollary 2.11, [10]], K is a prime submodule of M . Therefore we have rx ∈ N ∩ S, since x ∈ [N : M ], which is a contradiction and consequently rn x = 0. By well ordering principle choose n to be smallest such that rn x = 0. Then for n ≥ 1, rn−1 x 6= 0. Claim: n ≤ 3. Suppose to the contrary that n > 3. Clearly, rn−1 x, rx ∈ A\ f (M ), since [rn−1 x : M ][rx : M ]M = 0. So, there exist a vertex say y ∈ A\ (M ) such f that [rn−1 x : M ][y : M ]M = 0 = [y : M ][rx : M ]M , which implies [rn−1 x : M ][y : M ]M = 0 = [rn−1 x : M ][rx : M ]M . Therefore rn−1 x = y is the only possibility, since rn−1 x ∼nbd rx. Similarly for each i, 1 ≤ i ≤ n − 2, we have [ri x : M ][rn−1 x : M ]M = 0. For m = rn−2 x + rn−1 x, we see that annf (Γ(M )) contains a cycle of length 3, since [rn−1 x : M ][m : M ]M = 0 = [rn−2 x : M ][m : M ]M = 0 with m∈ / {0, rn−1 x, rn−2 x}. Thus n ≤ 3. We consider the following cases for n ≤ 3. Case 1. n = 3. We show that ann(r2 x)M is the unique maximal submodule of M and |M | = 8 or |M | = 16. We first show that |M | = 8 or |M | = 16. By our claim above, [r2 x : M ][rx : M ]M = 0. If 0 6= z ∈ ann(x)M , then [z : M ][x : M ]M = 0. This implies annf (Γ(M )) contains a cycle of length 3 on vertices z, rx and r2 x. ON COMBINATORIAL ASPECTS ARISING FROM MODULES OVER COMMUTATIVE RINGS 13 Therefore z = r2 x and ann(x)M ⊆ {0, r2 x}. In fact, ann(x)M ⊆ Rr2 x, since for all s ∈ R, [sr2 x : M ][rx : M ]M = 0 = [sr2 x : M ][r2 x : M ]M . Therefore sr2 x ∈ {0, rn−1 x, rn−2 x}. If sr2 x = rx, then r2 x = 0, a contradiction. Thus Rr2 x = {0, r2 x}. Moreover, ann(r2 x)M ⊆ {0, x, rx, r2 x, x + rx, x + r2 x, rx + r2 x, x + rx + r2 x}. If z ∈ ann(r2 x)M , then r2 z ∈ ann(x)M ⊆ {0, r2 x}. So, either r2 z = 0 or r2 z = r2 x. Therefore [rz : M ][rx : M ]M = 0 = [rz : M ][r2 x : M ]M or [rz − rx : M ][rx : M ]M = 0 = [rz − rx : M ][r2 x : M ]M . This implies rz ∈ {0, rx, r2 x} or rz − rx ∈ {0, rx, r2 x}. Let r2 z = 0. So, rz 6= rx and therefore either rz = 0 or r(z − rx) = 0, which implies [z : M ][rx : M ]M = 0 = [z : M ][r2 x : M ]M or [z − rz : M ][rx : M ]M = 0 = [z − rz : M ][r2 x : M ]M . Thus z ∈ {0, rx, r2 x, rx + r2 x}. Therefore we may assume that r2 z = r2 x, which implies rz − rx 6= rx. But, rz − rx ∈ {0, rx, r2 x}. So, either rz − rx = 0 or rz − rx = r2 x and by similar argument as above z ∈ {x, r2 x, x + rx, x + rx + r2 x}. If [x : M ][r2 x : M ]M = 0, then (1) ann(r2 x)M = {0, x, rx, r2 x, x + rx, x + r2 x, rx + r2 x, x + rx + r2 x}. If [x : M ][r2 x : M ]M 6= 0, then (2) ann(r2 x)M = {0, rx, r2 x, rx + r2 x} For (1), |M | = 16 and for (2), |M | = 8, since [x : M ]r2 M 6= 0, so there are t ∈ [x : M ] and m ∈ M such that r2 tm 6= 0. It is clear that r2 tm = r2 x. Let m∗ ∈ M . Then r2 tm∗ ∈ Rr2 x = {0, r2 x}. If r2 tm∗ = 0, then m∗ ∈ ann(r2 x)M and if r2 tm∗ = r2 x, then m∗ − m ∈ ann(r2 x)M . Let K = ann(r2 x)M . Clearly, K ⊂ M and Rr2 x ∼ = R/ann(r2 x). Therefore ann(r2 x) is a maximal ideal, since Rr2 x = {0, r2 x}. Thus it follows by [Theorem 2.5, [10]] that K is a maximal submodule. Further, K ⊆ Rx ⊆ nil(M ) ⊆ K. Therefore K = nil(M ) is the unique maximal submodule of M . If Af (M ) ⊆ K, then Af (M ) = K, which implies annf (Γ(M )) is a star graph. Case 2. n = 2. We show that |M | ≤ 12. If [x : M ]2 x = [x : M ]3 M 6= 0, then there exist two elements r, s ∈ [x : M ] such that rsx 6= 0. Further, there are m ∈ M and t ∈ [x : M ] such that rstm 6= 0. However, r2 x = s2 x = t2 x = 0 and there is some a ∈ A\ f (M ) such that [a : M ][rx : M ]M = 0. It is easy to check that Rrx ⊆ {0, rx, a} and a = rsx. This implies that [srx : M ][rx : M ]M = 0 and therefore Rrx = {0, rx, rsx} and ann(rx)M = {0, rx, rsx}. Clearly, [rstm : M ][s1 x : M ]M = 0, [rstm : M ][s1 s2 x : M ]M = 0 with rstm 6= s1 x. Thus rstm = rsx and it is clear that [rsm : M ][rx : M ]M = 0 and [rsm : M ][rsx : M ]M = 0. But, rsm 6= s1 x and rsm 6= rsx, a contradiction. Therefore [x : M ]2 x = 0. Moreover, we have rsm 6= 0, for some s ∈ [x : M ] and m ∈ M , since r2 x = 0, \ rx 6= 0. For x, y ∈ A\ f (M ) with [x : M ][y : M ]M = 0, there is rx ∈ Af (M ) such that [x : M ][rx : M ]M = 0 and [rx : M ][y : M ]M = 0. So, rx = x or rx = y. If rx = x, then rx = 0, which is not possible. Therefore rx = y and we have [x : M ][rx : M ]M = 0. Let z ∈ ann(x)M . Then z ∈ {0, x, rx}, since [x : M ][rx : M ]M = 0. If z = x, then x[x : M ] = [x : M ]2 M = 0, which is a contradiction. Thus ann(x)M = {0, rx} and in fact Rrx = {0, rx}. \ On the other hand, rm ∈ A\ f (M ), so there exist b ∈ Af (M ) such that [rm : 14 RAMEEZ RAJA M ][b : M ]M = 0. But, [rsm : M ][rm : M ]M = 0 and [rsm : M ][b : M ]M = 0, therefore rsm = b is the only possibility, so [rsm : M ][rm : M ]M = 0. Also, [rsm : M ][rx : M ]M = 0 and [rsm : M ][x : M ]M = 0. Thus by the same reasoning as above we have rsm = rx. Let t ∈ ann(rx)M . Therefore rt ∈ ann(x)M = {0, rx}. If rt = 0, then [t : M ][rsm : M ]M = 0 = [t : M ][rm : M ]M . If rt = rx, then [t − x : M ][rsm : M ]M = 0 = [t − x : M ][rsm : M ]M . Therefore ann(rx)M = {0, rm, rx, x+rm, x+rx}. By similar argument as in case 1, it can be shown that |M | ≤ 12 and ann(rx)M = nil(M ) is the unique maximal submodule of M . Case 3. n = 1. If [x : M ]x = [x : M ]2 M 6= 0, then by cases 1 and 2 we have 8 ≤ |M | ≤ 16. Assume that [x : M ]x = 0, we show that either |M | = 9 or P ri mi , where Λ nil(M ) = {0, x} with 2x = 0. Let x ∈ [x : M ]M . Then x = i∈Λ is finite, ri ∈ [x : M ] and mi ∈ M with 1 ≤ i ≤ |Λ|. For x ∈ A\ f (M ), there is \ rx ∈ Af (M ) such that [x : M ][y : M ]M = 0. So, Rx ⊆ {0, x, y}. If x 6= ri mi for all i, 1 ≤ i ≤ |Λ|, then ri mi ∈ Rx. Therefore ri mi = y for all i, 1 ≤ i ≤ |Λ|. Thus it follows that x = rm for some r ∈ [x : M ] and m ∈ M with rm 6= 0. Clearly, x + x ∈ Rx ⊆ {0, x, y}. If x + x 6= 0, then Rx = {0, x, 2x}, [x : M ][2x : M ]M = 0 and ann(x)M = {0, x, 2x}. Thus for all m∗ ∈ M , rm∗ ∈ Rx and we have, [m∗ : M ][x : M ]M = 0 = [m∗ : M ][2x : M ]M , or [m∗ − m : M ][x : M ]M = 0 = [m∗ − m : M ][2x : M ]M , or [m∗ − 2m : M ][x : M ]M = 0 = [m∗ − 2m : M ][2x : M ]M . By a similar argument as in case 1 it can be shown that |M | = 9 and ann(x)M is the unique maximal submodule of M . Let |M | 6= 9. Then by the above argument we must have 2x = 0. We show that nil(M ) = {0, x}. If 0 6= z ∈ nil(M ) with z 6= x, then z[z : M ] = [z : M ]2 M = 0. Therefore z = sm1 for some s ∈ [z : M ] and m1 ∈ M with s2 m1 6= 0. It is clear that [x : M ][x1 : M ]M = 0 \ and [z : M ][z1 : M ]M = 0 with x1 , z1 ∈ A\ f (M ), since x, z ∈ Af (M ). Thus Rx ⊆ {0, x, x1 } and Rz ⊆ {0, z, z1}. If 0 6= rsm ∈ Rx and rsm ∈ Rz, say rsm = x ∈ Rz, then x = z1 which implies [x : M ][z : M ]M = 0. Therefore rsm = 0, a contradiction. If rsm = x1 , then Rx = {0, x, rsm} = ann(x)M and by similar argument as above we see that |M | = 9, again a contradiction. Thus rsm = 0 and similarly rsm1 = 0. Clearly, x + z 6= x, x + z 6= z and \ x + z ∈ A\ f (M ), so there is t ∈ Af (M ) such that [x + t : M ][t : M ]M = 0. Also, rt ∈ Rx ⊆ {0, x, x1 }. If rt = 0, then [x : M ][t : M ]M = 0 = [x : M ][x + z : M ]M . That is, we have a cycle on vertices x, t and x + z, a contradiction. If rt = x1 , then Rx = {0, x, rt} = ann(x)M and by the same argument as above we have |M | = 9, again a contradiction. Therefore we may assume that x = rt and z = st. Then [x + z : M ][x : M ]M = 0 = [x + z : M ][t : M ]M . This implies x + z = 0. Thus we have a contradiction in every possible case and hence we conclude that nil(M ) = {0, x} with 2x = 0. ON COMBINATORIAL ASPECTS ARISING FROM MODULES OVER COMMUTATIVE RINGS 15 (ii) By (i), we see that nil(M ) = {0, x} for some 0 6= x ∈ M with 2x = 0, \ [x : M ]2 M = 0 and |M | ≥ 17. Let x ∈ A\ f (M ). Then, there is y ∈ Af (M ) such \ that [x : M ][y : M ]M = 0. Clearly, there is another x + y ∈ Af (M ) with x + y 6= x and x + y 6= y such that [x + y : M ][y : M ]M = 0. Therefore, x + y ∼nbd y, that is N (x + y) = N (y). If there is some t ∈ A\ f (M ) such that [x + y : M ][t : M ]M = 0, then [y : M ][t : M ]M = 0. This implies [x : M ][t : M ]M = 0, a contradiction, since annf (Γ(M )) contains no cycle of length 3. Thus, x + y = t or y = t. But, y 6= t, otherwise x = 0, a contradiction, since nil(M ) = {0, x} with 0 6= x. Therefore x + y = t and consequently t ∈ A\  f (M ) is a pendant vertex in annf (Γ(M )). Using the neighbourhood similar relation on the elements of objects A\ f (M ), \ \ As (M ) and At (M ), we now reveal the structure of a module M . Theorem 3.8. Let M be an R-module and let annf (Γ(M )) be the full annihilating graph of M which contains no cycle of length 3. If for each x ∈ A\ f (M ), there exists \ a pair z, y ∈ Af (M ) \ {x} such that y 6∼nbd z and [x : M ][y : M ]M = 0 = [x : M ][z : M ]M , then M = M1 ⊕ M2 , for some submodules M1 and M2 of M . \ Proof. Let x ∈ A\ f (M ). There are z, y ∈ Af (M ) \ {x} such that y 6∼nbd z and [x : M ][y : M ]M = 0 = [x : M ][z : M ]M . So, there is some t ∈ A\ f (M ) such that [t : M ][y : M ]M = 0, where as [t : M ][z : M ]M 6= 0. Clearly, for all r ∈ [z : M ], 0 6= rt ∈ Af (M ) and we have [rt : M ][y : M ]M = 0. This implies rt = x or rt = y, since [x : M ][y : M ]M = 0. Therefore [y : M ]2 M = 0 = y[y : M ] or [x : M ]2 M = 0 = x[x : M ]. That is, x ∈ nil(M ) or y ∈ nil(M ). By Lemma 3.7, nil(M ) = {0, m} for some 0 6= m ∈ M . Suppose that x = m. Then [m : M ][y : M ]M = 0 and [m : M ][t : M ]M 6= 0, otherwise annf (Γ(M )) contains a cycle of length three on t, m and y. So, there is some r1 ∈ [t : M ] such that r1 m 6= 0. It is clear that [r1 m : M ]2 M = 0, since [m : M ]2 M = 0. Therefore for all r1 ∈ [m : M ], r1 m = m. Let s = r1 t − t. Then [s : M ][y : M ]M = 0, since [t : M ][y : M ]M = 0. For r1 ∈ [m : M ], we see that us = ur1 t − ut = ut − t = 0. Therefore [m : M ][s : M ]M = 0. This implies s ∈ {0, y, m}, since [m : M ][y : M ]M = 0. We consider the following cases. Case 1. s = y. Then y ∈ nil(M ), which is a contradiction. Case 2. s = 0. Then r1 t = t, that is, (r1 − 1)t = 0, which implies r1 − 1 ∈ ann(t) and therefore, M = Rt ⊕ ann(t)M . Case 3. s = m. Then r1 t − t ∈ nil(M ). Let r2 = r12 − r1 . Therefore r2 ∈ [r1 t − t : M ] and by Lemma 3.7, we have r2n (r1 t − t) = 0, for some n ∈ N. Thus r2n+1 t = 0. For some suitable choice s2 in terms of r2 we see that (s22 − s2 )(1 + 4r2 )t + r2 t = 0. Therefore for v = r1 + s2 (1 − 2r1 ), we have vt = v 2 t and v ∈ [t : M ]. It follows that there is some w ∈ R such that w ∈ ann(r1 t). Thus by a similar argument as in case 2 above we conclude that M = Rr1 t ⊕ ann(r1 t)M .  16 RAMEEZ RAJA Remark 3.9. Theorem 3.8 is also true for the vertices of annihilating graphs anns (Γ(M )) and annt (Γ(M )). That is, if we have the information regarding the el\ ements of objects A\ s (M ) and At (M ), we can establish the structure of a module M . Recall that a complete bipartite graph is one whose each vertex of one partite set is joined to every vertex of the other partite set. We denote the complete bipartite graph with partite sets of size m, n ∈ N by Km,n . More generally a complete r-partite graph is one whose vertex set can be partitioned into r subsets so that no edge has both ends in any one subset and each vertex of a partite set is joined to every vertex of the another partite sets. A complete bipartite graph of the form K1,n is called a star graph. In the following result, we discuss the neighbourhood relation for the elements x, y ∈ M with [x : M ][y : M ]M 6= 0 in annf (Γ(M )). We show that the neighbourhood similar vertices determines the nature of the annihilating graphs arising from M. Theorem 3.10. Let M be an R-module and let annf (Γ(M )) be the full annihilating graph of M which contains no cycle of length 3. If for every pair z, y ∈ A\ f (M ) \ with [z : M ][y : M ]M 6= 0 there exists x ∈ Af (M ) \ {y, z} such that y ∼nbd z and [x : M ][y : M ]M = 0 = [x : M ][z : M ]M , then annf (Γ(M )) is a star graph. Proof. By Lemma 3.7 (i), we have either, 8 ≤ |M | ≤ 16 or |M | ≥ 17 and nil(M ) = {0, x} with 2x = 0, 0 6= x ∈ M . If 8 ≤ |M | ≤ 16, then again by Lemma 3.7 (i), annf (Γ(M )) is star graph with at most 5 edges. Claim 1: annf (Γ(M )) is an infinite graph, for |M | ≥ 17, with nil(M ) = {0, x}. Let y ∈ A\ f (M ) such that [x : M ][y : M ]M = 0. Then for all r ∈ [y : M ], we have n P ri , ri ∈ [y : M ] with 1 ≤ i ≤ n. If z ∈ A\ [x : M ][ry : M ]M = 0, where r = f (M ) i=1 is any other element such that [x : M ][z : M ]M = 0 = [ry : M ][z : M ]M . Then annf (Γ(M )) contains a cycle on x, z and ry, a contradiction. Similarly, it can be shown that for all p, with 1 ≤ p ≤ m, [x : M ][rp y : M ]M = 0 and consequently by Lemma 3.7 (ii), rp y is a pendant vertex in annf (Γ(M )). Note, that all rp y are distinct. If not, then rp y = rq y, with 1 ≤ p < q ≤ m. Therefore y(rp − rq )P = yrp (1 − rq−p ) = 0. This implies (1 − rq−p ) ∈ ann(rp y). By Lemma 3.7 sm = s∗ m∗ for some s∗ ∈ [x : M ] and m∗ ∈ M . Thus, (1 − rq−p )m∗ ∈ (i), x = f inite ann(rp y)M = {0, x}. So, either m∗ − rq−p m∗ = 0 or m∗ − rq−p m∗ = x. If m∗ = rq−p m∗ , then x = s∗ m∗ = s∗ rq−p m∗ ∈ s∗ rq−p−1 )m∗ Rr ⊆ [x : M ][rq−p−1 y : M ]M = 0, which is a contradiction. If m∗ − rq−p m∗ = x, then x − rq−p s∗ m∗ = s∗ m∗ − rq−p s∗ m∗ = s∗ x ⊆ [x : M ]2 M = 0, again a contradiction. Thus all rp y are distinct and consequently, annf (Γ(M )) is an infinite graph. Claim 2: annf (Γ(M )) is a star graph with center x. ON COMBINATORIAL ASPECTS ARISING FROM MODULES OVER COMMUTATIVE RINGS 17 Let a, b ∈ A\ f (M ) such that [a : M ][b : M ]M 6= 0 and [x : M ][a : M ]M = 0 = [x : M ][b : M ]M . Suppose that annf (Γ(M )) is not a star graph. There is some c ∈ A\ f (M ) \ {x, a} such that [a : M ][c : M ]M = 0, that Pis a is not a pendant vertex tα , tα ∈ [a : M ] for each in annf (Γ(M )). Consider an element tc, where t = α∈Λ α ∈ Λ, Λ is any finite index set. We show that tc 6∈ {0, a, x, c, b}. If tc = 0, then for \ a ∈ A\ f (M ) we have x, c ∈ Af (M ) with x ∼nbd c. Therefore by Lemma 3.7 (ii), a is a pendant vertex in annf (Γ(M )), which contradicts our supposition. If tc = x, then [x : M ][tc : M ]M = 0. Therefore c ∈ ann(at)M = {0, x}, a contradiction. If tc = c, then [x : M ][tc : M ]M = 0, a contradiction, since annf (Γ(M )) contains no cycle of length 3. Finally, if tc = b, then [c : M ][tc : M ]M = 0, which implies, c ∈ nil(M ) = {0, x}, again a contradiction. Thus tc ∈ A\ f (M ) \ {x, a, c, b}. So, there is some a1 ∈ A\ (M ) such that [a : M ][tc : M ]M = 0. It is easy to verify f 1 that a1 6∈ {0, tc, a, x, c, b}. Moreover, it is clear that [x : M ][a1 : M ]M 6= 0, P othλβ , erwise annf (Γ(M )) contains cycle of length 3. Let a1 = λm1 , where λ = β∈Λ λβ ∈ [a1 : M ] for each β ∈ Λ and m1 ∈ M . Then [λx : M ][a : M ]M = 0, which implies λx ∈ ann(a)M . Thus λx = x, note that λx 6= 0, otherwise [x : M ][a1 : M ]M = 0. On the other hand [a1 : M ][tc : M ]M = 0. Therefore, [λc : M ][a : M ]M = 0 = [ta1 : M ][c : M ]M , which implies λc ∈ ann(a)M . Thus λc = 0 or λc = x. So, [x : M ][c : M ]M = 0 = [x : M ][b : M ]M , a contradiction. Thus we have a contradiction in every possible case and hence it follows that annf (Γ(M )) is a star graph with center x.  We conclude this section with the following remark. Remark 3.11. Theorem 3.10 is not true for general simple connected graphs. Consider the graph Γ with vertex set V = {a1 , a2 , a3 , a4 } and edge set E = {a1 − a2 , a2 − a3 , a3 − a4 , a4 − a1 }. Clearly, a1 ∼nbd a3 with N (a1 ) = N (a3 ) = {a2 , a4 }, but Γ is not a star graph in fact Γ is a cycle graph on four vertices. 4. Graph isomorphism and graphs arising from tensor product In this section, we discuss isomorphism of annihilating graphs. We exhibit certain module theoretic properties of modules M and N which they share if their full annihilating graphs annf (Γ(M )) and annf (Γ(N )) are isomorphic. Moreover, we consider the annihilating graph arising from tensor product M ⊗R T −1 R, where T = R\C(M ), where C(M ) = {r ∈ R : rm = 0 f or some 0 6= m ∈ M }. We investigate the case when M is a multiplication module and show that annf (Γ(M )) ∼ = annf (M ⊗R T −1 R) for every module M . Definition 4.1. Let x ∈ M be a vertex in annf (Γ(M )). We say that x is primitive vertex if the submodule generated by x is cyclic over R. It can be easily checked that an element a ∈ Z ∗ (R), where R is a von Neumann regular ring is a primitive vertex in the zero-divisor graph [1] if and only if the ring 18 RAMEEZ RAJA Ra is a field. We define the order of vertex x ∈ A\ f (M ) by Θ(x) = |Rx|. Clearly, if \ x ∼nbd y for y ∈ Af (M ), then |Rx| = |Ry|, which implies Θ(x) = Θ(y). Thus we can talk about the order of equivalence classes. The following result is one of the entanglement for modules M and N if their full annihilating graphs are isomorphic. Theorem 4.2. Let M and N be two R-modules such that annf (Γ(M )) ∼ = annf (Γ(N )). If Soc(M ) is a sum of finite simple cyclic submodules, then Soc(M ) ∼ = Soc(N ). Proof. Let η : annf (Γ(M )) −→ annf (Γ(N )) be an isomorphism of graphs. It is clear that if x ∼nbd y, then η(x) ∼nbd η(y) and Θ(x) = Θ(η(x)). Also, the primitive elements of annf (Γ(M )) are in bijection with the primitive elements of annf (Γ(N )). Thus if x is primitive, so is Θ(x). Suppose that Soc(M ) contains the sum of simple cyclic submodules δ times. Then there are δ many equivalence classes of primitive vertices in annf (Γ(M )). This implies that annf (Γ(N )) must have δ equivalence classes of primitive vertices. It follows that the same number of copies of each simple cyclic submodule must occur in both Soc(M ) and Soc(N ). Thus, Soc(M ) and Soc(N ) are isomorphic.  Corollary 4.3. Let M = Q Mi and N = Q Ni , where Mi , Ni are finite simple i∈I i∈I cyclic modules for all i ∈ I and I is an index set. If annf (Γ(M )) ∼ = annf (Γ(N )), then M ∼ = N. P P Ni . Thus the result follows.  Mi and Soc(N ) = Proof. Soc(M ) = i∈I i∈I Corollary 4.4. Let M and N be two R-modules such that annf (Γ(M )) ∼ = annf (Γ(N )). If M has an essential socle, then so does N . Let Zm ⊗ Zn be tensor product of two finite abelian groups. It is easy to verify that if g.c.d of m, n ∈ Z is 1, then Zm ⊗ Zn = 0 and in general Zm ⊗ Zn ∼ = Zd , where V d is g.c.d of m and n. It follows that if g.c.d of m and n is 1, then Af (Zm ⊗ Zn ) = φ. However, if g.c.d of m and n is d, d > 1 and Zd is not a simple finite abelian group, V then Af (Zm ⊗ Zn ) 6= φ, in fact the graphs annf (Γ(Zm ⊗ Zn )) and annf (Γ(Zd )) are isomorphic. Furthermore, if Zp , Zq and Zr are any three finite simple abelian groups, where p, q, r ∈ Z are primes, then we have the following equality between the combinatorial objects, V V Af (Zp ⊕ Zq ⊗ Zp ⊕ Zr ) = Af (Zp ⊕ Zr ). It follows that the full-annihilating graph arising from the tensor product Zp ⊕ Zq ⊗ V Zp ⊕ Zr with vertex set Af (Zp ⊕ Zq ⊗ Zp ⊕ Zr ) is same as the full-annihilating ON COMBINATORIAL ASPECTS ARISING FROM MODULES OVER COMMUTATIVE RINGS 19 graph arising from the direct sum Zp ⊕ Zr . Now, we study the annihilating graph structures arising from the tensor product M ⊗R T −1 R. The following result proved in [3] is perhaps the first result which establishes a connection between the graph structure of R and its localization S −1 R (total quotient ring) at S, where S = R \ Z(R). Theorem 4.5. Let R be a commutative ring with unity and let S −1 R be the localization of R at S. Then the graphs Γ(R) and Γ(S −1 R) are isomorphic. The equivalence class corresponding to equivalence relation ∼M for m ⊗ M ⊗R T −1 R is denoted by, [m ⊗ 1s ]M⊗R T −1 R = {m∗ ⊗ 1 s 1 s ∈ ∈ M ⊗R T −1 R : m∗ ∼M m}. For any module M , it can be easily seen that the localization T −1 M at T is the special case of tensor product with T −1 M ∼ = M ⊗R T −1 R. We first investigate the cardinalities of equivalence classes corresponding to the equivalence relation ∼M on sets Af (M\ ⊗R T −1 R) and A\ f (M ). Lemma 4.6. Let M be an R-module. Then the equivalence classes corresponding to equivalence relation ∼M on sets Af (M\ ⊗R T −1 R) and A\ f (M ) have the same cardinality. Proof. It suffices to prove the result for sets Af (M\ ⊗R T −1 R) and A\ f (M ). First \ note that for all m ∈ Af (M ) and for all modules M, N we have, annT −1 R (m ⊗ 1s ) = ann(m) ⊗ T −1 R [N : M ] ⊗ T −1 R M ⊗T −1 R = [N ⊗ T −1 and R : M ⊗ T −1 R]M ⊗ T −1 R. Moreover, −1 Af (M\ ⊗ T −1 R) = A\ R f (M ) ⊗ T [m]M ⊗ T −1 R= [m 1 ]M⊗T −1 R ⊗T and −1 R. This implies, S A\ [mλ ]M and f (M ) = λ∈Λ Af (M\ ⊗ T −1 R) = S [mλ ⊗ 11 ] = λ∈Λ S λ∈Λ [ m1λ ]M⊗T −1 R . Here, Λ is an index set with [mλ ] = [mµ ] = ∅, for λ, µ ∈ Λ. We show that for all m m ∈ A\ f (M ), | [ 1 ]M⊗T −1 R | = | [m]M |. We consider the following cases. Case 1. [x : M ] 6= ann(M ). Then by [Lemma 3.2, [19]], M is a multiplication module. Subcase 1.1. | [m]M | is finite. ∗ Let ms ∈ [m ⊗ 1s ]M⊗T −1 R with m∗ ∈ [m]M , s ∈ T . Then ann(m∗ )M = ann(m)M and {sn m∗ : n ≥ 1} ⊆ [m]M . Therefore, m∗ ⊗ 1 s = m∗ s = m∗ sk sk+1 = m∗ ∈ [m]M . 20 RAMEEZ RAJA Since | [m]M | is finite, so there exists some k ∈ N such that sk m∗ = sk+1 m∗ . Thus m Af (M\ ⊗ T −1 R) ⊆ A\ f (M ) which implies [ 1 ]M⊗T −1 R ⊆ [m]M and we have, | [m 1 ]M⊗T −1 R | = | [m]M |. Subcase 1.2. | [m]M | is infinite. We define an equivalence relation ∼ on T by s ∼ x if and only if sm = xm. Define a map −1 ϕ : M × T / ∼ −→ [ m 1 ]M⊗T R (a, [s]) −→ a ⊗ 1s We first check that the map ϕ is well defined. Let m1 = m2 and [s] = [x]. Then, (s − x)M ⊆ ann(m)M = ann(m1 )M = ann(m2 )M . Since M is a multiplication module therefore we have, (s − x)M = ann(m)M = ann(m1 )M = ann(m2 )M . Thus sm1 = xm1 and sm2 = xm2 which implies, m1 m2 s = x . It is clear that the map ϕ is surjective. Thus, | [m 1 ]M⊗T −1 R | ≥ | [m]M || T / ∼|. Further, the map T / ∼ −→ [m]M [s] −→ sx is well defined and injective. Therefore, 2 | [m 1 ]M⊗T −1 R | ≤| [m]M | = | [m]M |. m Since | [m]M | is infinite we conclude that | [ 1 ]M⊗T −1 R | = | [m]M |. Case 2. [x : M ] = ann(M ), for some 0 6= x ∈ M . Then for all 0 6= y ∈ M , we \ −1 R) = M \ c have [x : M ][y : M ]M = 0. Thus A\ ⊗ T −1 R. f (M ) = M and Af (M ⊗ T Using above subcases 1.1 and 1.2, it can be shown that for each α ∈ Λ, the cardinality of equivalence classes [mα ]M and [ m1α ]M⊗T −1 R are same.  Theorem 4.7. Let M be an R-module. Then annf (Γ(M ⊗T −1 R)) ∼ = annf (Γ(M )). Proof. For each α ∈ Λ, Λ an index set, we see by Lemma 4.6 that there is a bijection ϕα : [mα ]M −→ [ m1α ]M⊗T −1 R Define a map, \ −1 R) ψ : A\ f (M ) −→ Af (M ⊗R T m −→ [mα ]M Clearly ψ is a bijective map. To show the required isomorphism of graphs we just need to show that m∗1 and m∗2 are adjacent in annf (Γ(M )) if and only if ψ(m∗1 ) and ψ(m∗2 ) are adjacent in annf (Γ(M ⊗ T −1 R)). That is, [m∗1 : M ][m∗2 : M ]M = 0 if and only if [ψ(m∗1 ) : M ][ψ(m∗2 ) : M ]M = 0. It suffices to show that for m∗1 ∈ [m]M , m∗1 ∈ [r]M , x1 ∈ [ m 1 ]M⊗R T −1 R and x2 ∈ [ 1r ]M⊗R T −1 R ON COMBINATORIAL ASPECTS ARISING FROM MODULES OVER COMMUTATIVE RINGS 21 [m∗1 : M ][m∗2 : M ]M = 0 [ x11 if and only if : M ⊗ T −1 R][ x12 : M ⊗ T −1 R]M ⊗ T −1 R = 0. Therefore, [m∗1 : M ][m∗2 : M ]M = 0 ⇐⇒ m∗1 ∈ ann(m∗2 )M = ann(r)M m∗ m∗ ⇐⇒ 11 ∈ ann( 12 )M ⊗ T −1 R = ann( r1 )M ⊗ T −1 R = ann( x12 )M ⊗ T −1 R ∗ m ⇐⇒ [ 11 : M ⊗ T −1 R][ x12 : M ⊗ T −1 R]M ⊗ T −1 R = 0 m∗ x∗ −1 R = ann( x11 )M ⊗ T −1 R ⇐⇒ 12 ∈ ann( 11 )M ⊗ T −1 R = ann( m 1 )M ⊗ T x1 x2 −1 −1 −1 ⇐⇒ [ 1 : M ⊗ T R][ 1 : M ⊗ T R]M ⊗ T R = 0. Thus it follows that, annf (Γ(M ⊗ T −1 R)) ∼ = annf (Γ(M )).  The following result is an immediate consequence of preceding theorem. Corollary 4.8. Let M be an R-module. Then the following hold. (i) anns (Γ(M ⊗ T −1 R) ∼ = anns (Γ(M )) (ii) annt (Γ(M ⊗ T −1 R) ∼ = annt (Γ(M )) Remark 4.9. Consider a Z-module Z2 ⊕ Z2 . It is easy to verify that annf (Γ(Z2 ⊕ Z2 )) ∼ = anns (Γ(Z2 ⊕ Z2 )) ∼ = K3 , By Theorem 4.7, we see that, annf (Γ(Z2 ⊕ Z2 ⊗ T −1 Z)) ∼ = annf (Γ(Z2 ⊕ Z2 )) ∼ = K3 , and anns (Γ(Z2 ⊕ Z2 ⊗ T −1 Z)) ∼ = anns (Γ(Z2 ⊕ Z2 )) ∼ = K3 , where as, annt (Γ(Z2 ⊕ Z2 ⊗ T −1 Z)) ∼ = annt (Γ(Z2 ⊕ Z2 )) ∼ = ∅. −1 It follows that annihilating graphs annt (Γ(Z2 ⊕ Z2 ⊗ T Z)) and annf (Γ(Z2 ⊕ Z2 ⊗ T −1 Z)) are not isomorphic. That is, all annihilating graphs for a same tensor product cannot be similar. However, if M is multiplication R-module, then by [Theorem 3.9, [19]] all three annihilating graphs arising from M are same. Therefore by Theorem 4.7, all three annihilating graphs arising from the tensor product M ⊗ T −1 R are same. In fact, the three annihilating graphs arising from M ⊗ T −1 R coincides with the three annihilating graphs arising from M . P Q Mi Mi / We conclude this paper with some discussion on factor modules M = i∈I i∈I P Q Ni , where I is an index set, Mi , Ni are finite simple modules Ni / and N = i∈I i∈I not equal to Z2 (Z) for any i ∈ I. Consider the equivalence relation on subsets of I given by J is equivalent to K if symmetric difference of J and K is finite. Pick P one element J from each equivalence class and for each such set J, let XJ = {x+ Mi : i∈I P Ni : y(j) = 0 ⇐⇒ j ∈ J} ⊂ N . x(j) = 0 ⇐⇒ j ∈ J} ⊂ M and YJ = {y + i∈I 22 RAMEEZ RAJA Since a finite simple module Z2 (Z) is a component of neither M nor N , therefore sets XJ and YJ have same cardinality. Let ϕJ be some bijection between sets XJ and YJ . It is clear that the graphs annf (Γ(M )), annf (Γ(N )) are complete with c \ b A\ f (M ) = M , Af (N ) = N and for each a ∈ M , we have the associated zero set J. Thus the map a to ϕJ (a) defines a bijection between the vertices of annf (Γ(M )), annf (Γ(N )) and we conclude that annf (Γ(M )) ∼ = annf (Γ(N )). References [1] D. F. Anderson and P. S. Livingston, The zero-divisor graph of a commutative ring, J. Algebra 217 (1999) 434 − 447. [2] D. F. Anderson, A. Frazier, A. Lauve and P. S. Livingston, The Zero-Divisor Graph of a Commutative Ring, II, Lecture Notes in Pure and Applied Mathematics, Vol. 220, Marcel Dekker, Newyork, Basel, (2001) 61 − 72. [3] D. F. Anderson, R. Levy and J. Shapiro, Zero-divisor graphs, von Neumann regular rings, and Boolean algebras. J. Pure Appl. Algebra 180 (2003) 221 − 241. [4] M. F. Atiyah and I. G. MacDonald, Introduction to Commutative Algebra, Addison-Wesley, Reading, MA, (1969). [5] F. Azarpanah, Essential ideals in C(X), Period. Math. Hungar. 31 (1995) 105 − 112. [6] F. Azarpanah, Intersection of essential ideals in C(X), Proc. Amer. Math. Soc. 125 (1997) 2149 − 2154. [7] I. Beck, Coloring of commutative rings, J. Algebra 116 (1988) 208 − 226. [8] H. Cartan and S. Eilenberg, Homological algebra, Princeton, (1956). [9] R. Diestal, Graph Theory, Springer-Verlag, New York, (1997). [10] Z. A. El-bast and P. F. Smith, Multiplication modules, Commun. Algebra 16 (4) (1988) 755 − 779. [11] B. W. Green and L. Van Wyk, On the small and essential ideals in certain classes of rings, J. Austral. Math. Soc. (ser. A), 46 (1989) 262 − 271. [12] F. Hongin and P. Stewart, Graded rings and essential ideals, Acta Math. Sinica, 9 (4) (1993) 344 − 351. [13] S. K. Jain, S. R. Lopez-permouth and S. T. Rizvi, Continous rings with acc on essentials is left artinian, Proc. Amer. Math. Soc. 108 (3) (1990) 192 − 195. [14] M. Kaneda and V. I. Paulsen, Characterization of essential ideals as operator modules over C ∗ − algebras, J. Operator Theory, 49 (2003) 245 − 262. [15] I. Kaplansky, Commutative Rings, rev. ed., Univ. of Chicago Press, Chicago, (1974). [16] O.A. S. Karamzadeh and M. Rostami, On the intrinsic topology and some related ideals of C(X), Proc. Amer. Math. Soc., 93 (1) (1985), 179 − 184. [17] F. D. Meyer and L. D. Meyer, Zero-divisor graphs of semigroups, J. Algebra 283 (2005) 190 − 198. [18] E. Momathan, Essential ideals in rings of measurable functions. Commun. Algebra, 38 (2010) 4739 − 4746. [19] S. Pirzada, Rameez Raja, On graphs associated with modules over commutative rings, J. Korean. Math. Soc., 53 (5) (2016) 1167 − 1182. [20] S. Pirzada, Rameez Raja, On the metric dimension of a zero-divisor graph, Commun. Algebra, 45 (4) (2017) 1399 − 1408. [21] S. Pirzada, Rameez Raja and S. P. Redmond, Locating sets and numbers of graphs associated to commutative rings, J. Algebra Appl. 13 (7) (2014) 1450047 18 pp. [22] E. R. Puczylowski, On essential extensions of rings, Bull. Austral. Math. Soc., 35 (1987) 379 − 386. [23] Rameez Raja, S. Pirzada and S. P. Redmond, On Locating numbers and codes of zero-divisor graphs associated with commutative rings, J. Algebra Appl. 15 (1) (2016) 1650014 22 pp. [24] S. P. Redmond, The zero-divisor graph of a non-commutative ring, Internat. J. Commutative Rings 1 (4) (2002) 203 − 211. [25] S. P. Redmond, An ideal-based zero-divisor graph of a commutative ring, Commun. Algebra 31 (2003) 4425 − 4443. ON COMBINATORIAL ASPECTS ARISING FROM MODULES OVER COMMUTATIVE RINGS 23 [26] A. Resenberg and D. Zelinsky, Finiteness of the injective hull, Math. Z., 70 (1959) 372 − 380. [27] D. B. West, Introduction to Graph Theory, 2nd ed. USA: Prentice Hall, (2001). [28] R. Wisbauer, Foundations of Modules and Ring Theory, Gordon and Breach Reading (1991).
0math.AC
Graph-based Clustering under Differential Privacy Rafael Pinot ∗1,2 , Anne Morvan †1,2 , Florian Yger2 , Cédric Gouy-Pailler1 , and Jamal Atif2 1 arXiv:1803.03831v1 [cs.DS] 10 Mar 2018 2 CEA, LIST, 91191 Gif-sur-Yvette, France Université Paris-Dauphine, PSL Research University, CNRS, LAMSADE, 75016 Paris, France March 10, 2018 Abstract In this paper, we present the first differentially private clustering method for arbitrary-shaped node clusters in a graph. This algorithm takes as input only an approximate Minimum Spanning Tree (MST) T released under weight differential privacy constraints from the graph. Then, the underlying nonconvex clustering partition is successfully recovered from cutting optimal cuts on T . As opposed to existing methods, our algorithm is theoretically well-motivated. Experiments support our theoretical findings. 1 Introduction Weighted graph data is known to be a useful representation data type in many fields, such as bioinformatics or analysis of social, computer and information networks. More generally, a graph can always be built based on the data dissimilarity where points of the dataset are the vertices and weighted edges express “distances” between those objects. For both cases, graph clustering is one of the key tools for understanding the underlying structure in the graph [Schaeffer, 2007]. These clusters can be seen as groups of nodes close in terms of some specific similarity. Nevertheless, it is critical that the data representation used in machine learning applications protects the private characteristics contained into it. Let us consider an application where one wants to identify groups of similar web pages in the sense of traffic volume i.e. web pages with similar audience. In that case, the nodes stand for the websites. The link between two vertices represents the fact that some people consult them both. Edge weights are the number of common users and thus, carry sensitive information about individuals. During any graph data analysis, no private user surfing behavior should be breached i.e. browsing from one page to another should remain private. As a standard for data privacy preservation, differential privacy [Dwork et al., 2006b] has been designed: an algorithm is differentially private if, given two close databases, it produces statistically indistinguishable outputs. Since then, its definition has been extended to weighted graphs. Though, machine learning applications ensuring data privacy remain rare, in particular for clustering which encounters severe theoretical and practical limitations. Indeed, some clustering methods lack of theoretical support and most of them restrict the data distribution to convexshaped clusters [Nissim et al., 2007, Blum et al., 2008, McSherry, 2009, Dwork, 2011] or unstructured data [Ho and Ruan, 2013, Chen et al., 2015]. Hence, the aim of this paper is to offer a theoretically motivated private graph clustering. Moreover, to the best of our knowledge, this is the first weight differentially-private clustering algorithm able to detect clusters with an arbitrary shape for weighted graph data. ∗ [email protected][email protected]. Partly supported by the Direction Générale de l’Armement (French Ministry of Defense). 1 Our method belongs to the family of Minimum Spanning Tree (MST)-based approaches. An MST represents a useful summary of the graph, and appears to be a natural object to describe it at a lower cost. For clustering purposes, it has the appealing property to help retrieving non-convex shapes [Zahn, 1971, Asano et al., 1988, Grygorash et al., 2006, Morvan et al., 2017]. Moreover, they appear to be well-suited for incorporating privacy constraints as will be formally proved in this work. Contributions: Our contributions are threefold: 1) we provide the first theoretical justifications of MST-based clustering algorithms. 2) We endow DBMSTClu algorithm [Morvan et al., 2017], an MST-based clustering algorithm from the literature, with theoretical guarantees. 3) We introduce a differentially-private version of DBMSTClu and give several results on its privacy/utility tradeoff. 2 Preliminaries 2.1 Notations Let G = (V, E, w) be a simple undirected weighted graph with a vertex set V , an edge set E, and a weight function w := E → R. One will respectively call the edge set and the node set of a graph G using the applications E(G) and V (G). Given a node set S ⊂ V , one denotes by G|S the subgraph induced by S. We call G = (V, E) the topology of the graph, and WE denotes the set of all possible weight functions mapping E to weights in R. For the remaining of this work, cursive letter are use to represent weighted graphs and straight letters refer to topological arguments. Since graphs are simple, the path Pu−v between two vertices u and v is characterized as the ordered sequence of vertices {u, . . . , v}. We also denote VPu−v the unordered set of such vertices. Besides, edges eij denote an edge between nodes i and j. Finally, for all positive integer K, [K] := {1, . . . , K}. 2.2 Differential privacy in graphs As opposed to node-differential privacy [Kasiviswanathan et al., 2013] and edge-differential privacy [Hay et al., 2009], both based on the graph topology, the privacy framework considered here is weight-differential privacy where the graph topology G = (V, E) is assumed to be public and the private information to protect is the weight function w := E → R. Under this model introduced by Sealfon [2016], two graphs are said to be neighbors if they have the same topology, and close weight functions. this framework allows one to release an almost minimum spanning tree with weight-approximation error of O (|V | log |E|) for fixed privacy parameters. Differential privacy is ensured in that case by using the Laplace mechanism on every edges weight to release a spanning tree based on a perturbed version of the weight function. The privacy of the spanning tree construction is thus provided by post-processing (cf. Th. 5). However, under a similar privacy setting, Pinot [2018] recently manages to produce the topology of a tree under differential privacy without relying on the post-processing of a more general mechanism such as the “Laplace mechanism”. Their algorithm, called PAMST, privately releases the topology of an almost minimum spanning tree thanks to an iterative use of the “Exponential  mechanism” instead. For fixed privacy parameters, the |V |2 weight approximation error is O |E| log |V | , which outperforms the former method from Sealfon [2016] on arbitrary weighted graphs under weak assumptions on the graph sparseness. Thus, we keep here privacy setting from Pinot [2018]. Definition 2.1 (Pinot [2018]). For any edge set E, two weight functions w, w0 ∈ WE are neighboring, denoted w ∼ w0 , if ||w − w0 ||∞ := max |w(e) − w0 (e)| ≤ µ. e∈E µ represents the sensitivity of the weight function and should be chosen according to the application and the range of this function. The neighborhood between such graphs is clarified in the following definition. Definition 2.2. Let G = (V, E, w) and G 0 = (V 0 , E 0 , w0 ), two weighted graphs, G and G 0 are said to be neighbors if V = V 0 , E = E 0 and w ∼ w0 . The so-called weight-differential privacy for graph algorithms is now formally defined. 2 Definition 2.3 (Sealfon [2016]). For any graph topology G = (V, E), let A be a randomized algorithm that takes as input a weight function w ∈ WE . A is called (, δ)-differentially private on G = (V, E) if for all pairs of neighboring weight functions w, w0 ∈ WE , and for all set of possible outputs S, one has P [A(w) ∈ S] ≤ e P [A(w0 ) ∈ S] + δ. If A is (, δ)-differentially private on every graph topology in a class C, it is said to be (, δ)-differentially private on C. One of the first, and most used differentially private mechanisms is the Laplace mechanism. It is based on the process of releasing a numerical query perturbed by a noise drawn from a centered Laplace distribution scaled to the sensitivity of the query. We present here its graph-based reformulation. Definition 2.4 (reformulation Dwork et al. [2006b]). Given some graph topology G = (V, E), for any fG : WE → Rk , the sensitivity of the function is defined as ∆fG = max ||fG (w) − fG (w0 )||1 . 0 w∼w ∈WE Definition 2.5 (reformulation Dwork et al. [2006b]). Given some graph topology G = (V, E), any function fG : WE → Rk , any  > 0, and w ∈ WE , the graph-based Laplace mechanism is ML (w, fG , ) = fG (w) + (Y1 , . . . , Yk ) where Yi are i.i.d. Lap(∆f G /), and Lap(b) denotes    random variables drawn from the Laplace distribution with scale b i.e probability density 1 2b exp − |x| b . Theorem 1 (Dwork et al. [2006b]). The Laplace mechanism is -differentially private. We define hereafter the graph-based Exponential mechanism. In the sequel we refer to it simply as Exponential mechanism. The Exponential mechanism represents a way of privately answering arbitrary range queries. Given some range of possible responses to the query R, it is defined according to a utility function uG := WE ×R → R, which aims at providing some total preorder on the range R according to the total order in R. The sensitivity of this function is denoted ∆uG := max max |uG (w, r) − uG (w0 , r)| . 0 r∈R w∼w ∈WE Definition 2.6. Given some graph topology G = (V, E), some output range R ⊂ E, some privacy parameter  > 0, some utility function uG := WE ×R → R, and some w ∈ WE the graph-based Exponential mechanism M   Exp (G, w, uG , R, ) selects and outputs an element r ∈ R with probability proportional to exp uG (w,r) 2∆uG . The Exponential mechanism defines a distribution on a potentially complex and large range R. As the following theorem states, sampling from such a distribution preserves -differential privacy. Theorem 2 (reformulation McSherry and Talwar [2007]). For any non-empty range R, given some graph topology G = (V, E), the graph-based Exponential mechanism preserves -differential privacy, i.e if w ∼ w0 ∈ WE , P [MExp (G, w, uG , R, ) = r] ≤ e P [MExp (G, w0 , uG , R, ) = r] . Further, Th 3 highlights the trade-off between privacy and accuracy for the Exponential mechanism when 0 < |R| < +∞. Th 4 presents the ability of differential privacy to comply with composition while Th 5 introduces its post-processing property. Theorem 3 (reformulation Dwork and Roth [2013]). Given some graph topology G = (V, E), some w ∈ WE , some output range R, some privacy parameter  > 0, some utility function uG := WE × R → R, and denoting OP TuG (w) = max uG (w, r), one has ∀ t ∈ R, r∈R uG (G, w, MExp (w, uG , R, )) 2∆uG ≤ OP TuG (w) − (t + ln |R|)  with probability at most exp(−t). 3 Theorem 4 (Dwork et al. [2006a]). For any  > 0, δ ≥ 0 the adaptive composition of k (, δ)-differentially private mechanisms is (k, kδ)-differentially private. Theorem 5 (Post-Processing Dwork and Roth [2013]). Let A : WE → B be a randomized algorithm that is (, δ)-differentially private, and h : B → B 0 a deterministic mapping. Then h ◦ A is (, δ)-differentially private. 2.3 Differentially-private clustering Differentially private clustering for unstructured datasets has been first discussed in Nissim et al. [2007]. This work introduced the first method for differentially private clustering based on the k-means algorithm. Since then most of the works of the field focused on adaptation of this method [Blum et al., 2008, McSherry, 2009, Dwork, 2011]. The main drawback of those works is that they are not able to deal with arbitrary shaped clusters. This issue has been recently investigated in Ho and Ruan [2013] and Chen et al. [2015]. They proposed two new methods to find arbitrary shaped clusters in unstructured datasets respectively based on density clustering and wavelet decomposition. Even though both of these works allow one to produce non-convex clusters, they only deal with unstructured datasets and thus are not applicable to node clustering in a graph. Our work focuses on node clustering in a graph under weight-differential privacy. Graph clustering has already been investigated in a topology-based privacy framework [Mülle et al., 2015, Nguyen et al., 2016], however, these works do not consider weight-differential privacy. Our work is, to the best of our knowledge, the first attempt to define node clustering in a graph under weight differential privacy. 3 Differentially-private tree-based clustering We aim at producing a private clustering method while providing bounds on the accuracy loss. Our method is an adaptation of an existing clustering algorithm DBMSTClu. However, to provide theoretical guarantees under differential privacy, one needs to rely on the same kind of guarantees in the non-private setting. Morvan et al. [2017] did not bring them in their initial work. Hence, our second contribution is to demonstrate the accuracy of this method, first in the non-private context. In the following we present 1) the theoretical framework motivating MST-based clustering methods, 2) accuracy guarantees of DBMSTClu in the non-private setting, 3) PTClust our private clustering algorithm, 4) its accuracy under differential privacy constraints. 3.1 Theoretical framework for MST-based clustering methods MST-based clustering methods, however efficient, lack of proper motivation. This Section closes this gap by providing a theoretical framework for MST-based clustering. In the sequel, notations from Section 2.1 are kept. The minimum path distance between two nodes in the graph is defined which enables to explicit our notion of Cluster. Definition 3.1 (Minimum path distance). Let be G = (V, E, w) and u, v ∈ V . The minimum path distance between u and v is X d(u, v) = min w(e) Pu−v e∈VPu−v with Pu−v a path from u to v in G, and VPu−v the set of vertices contained in Pu−v . Definition 3.2 (Cluster). Let be G = (V, E, w), 0 < w(e) ≤ 1 ∀e ∈ E a graph, (V, d) a metric space based on the minimum path distance d defined on G and D ⊂ V a node set. C ⊂ D is a cluster iff. |C| > 2 and ∀C1 , C2 s.t. C = C1 ∪ C2 and C1 ∩ C2 = ∅, one has: argmin{ min d(z, v) } ⊂ C2 z∈D\C1 v∈C1 4 Assuming that a cluster is built of at least 3 points makes sense since singletons or groups of 2 nodes can be legitimately considered as noise. For simplicity of the proofs, the following theorems hold in the case where noise is neglected. However, they are still valid in the setting where noise is considered as singletons (with each singleton representing a generalized notion of cluster). Theorem 6. Let be G = (V, E, w) a graph and T a minimum spanning tree of G. Let also be C a cluster in the sense of Def. 3.2 and two vertices v1 , v2 ∈ C. Then, VPv1 −v2 ⊂ C with Pv1 −v2 a path from v1 to v2 in G, and VPv1 −v2 the set of vertices contained in Pv1 −v2 . Proof. Let be v1 , v2 ∈ C. If v1 and v2 are neighbors, the result is trivial. Otherwise, as T is a tree, there exist a unique path within T between v1 and v2 denoted by Pv1 −v2 = {v1 , . . . , v2 }. Let now prove by reductio ad absurdum that VPv1 −v2 ⊂ C. Suppose there is h ∈ VPv1 −v2 s.t. h ∈ / C. We will see that it leads to a contradiction. We set C1 to be the largest connected component (regarding the number of vertices) of T s.t. v1 ∈ C1 , and every nodes from C1 are in C. Because of h’s definition, v2 ∈ / C1 . Let be C2 = C\C1 . C2 6= ∅ since v2 ∈ C2 . Let be z ∗ ∈ argmin{ min d(z, v) } and e∗ = (z ∗ , v ∗ ) an edge that ∗ z∈V \C1 ∗ v∈C1 reaches this minimum. Let us show that z ∈ / C. If z ∈ C, then two possibilities hold: 1. There is an edge ez∗ ∈ T , s.t. ez∗ = (z ∗ , z 0 ) with z 0 ∈ C1 . This is impossible, otherwise by definition of a connected component, z ∗ ∈ C1 . Contradiction. 2. For all ez∗ = (z ∗ , z 0 ) s.t z 0 ∈ C1 , one has ez∗ ∈ / T . In particular e∗ ∈ / T . Since h is the neighbor of 0 C1 in G there is also eh ∈ T , s.t. eh = (h, h ) with h0 ∈ C1 . Once again two possibilities hold: (a) w(ez∗ ) = min { min d(z, v) } < w(eh ). Then, if we replace eh by ez∗ in T , its total weight z∈V \C1 v∈C1 decreases. So T is not a minimum spanning tree. Contradiction. / C, one gets that (b) w(ez∗ ) = w(eh ), therefore h ∈ argmin{ min d(z, v) }. Since h ∈ z∈V \C1 v∈C1 argmin{ min d(z, v) } 6⊂ C2 . Thus, C is not a cluster. Contradiction. z∈V \C1 v∈C1 We proved that z ∗ ∈ / C. In particular, z ∗ ∈ / C2 . Then, argmin{ min d(z, v) } 6⊂ C2 . Thus, C is not a cluster. Contradiction. Finally h ∈ C and VPv1 −v2 ⊂ C. z∈V \C1 v∈C1 This theorem states that, given a graph G, an MST T , and any two nodes of C, every node in the path between them is in C. This means that a cluster can be characterized by a subtree of T . It justifies the use of all MST-based methods for data clustering or node clustering in a graph. All the clustering algorithms based on successively cutting edges in an MST to obtain a subtree forest are meaningful in the sense of Th.6. In particular, this theorem holds for the use of DBMSTClu [Morvan et al., 2017] presented in Section 3.2.1. 3.2 Deterministic MST-based clustering This Section introduces DBMSTClu [Morvan et al., 2017] that will be adapted to be differentially-private, and provide accuracy results on the recovery of the ground-truth clustering partition. 3.2.1 DBMSTClu algorithm Let us consider T an MST of G, as the unique input of the clustering algorithm DBMSTClu. The clustering partition results then from successive cuts on T so that a new cut in T splits a connected component into two new ones. Each final connected component, a subtree of T , represents a cluster. Initially, T is one cluster containing all nodes. Then, at each iteration, an edge is cut if some criterion, called Validity Index of a Clustering Partition (DBCVI) is improved. This edge is greedily chosen to locally maximize the DBCVI at each step. When no improvement on DBCVI can be further made, the algorithm stops. The DBCVI is defined as the weighted average of all cluster validity indices which are based on two positive quantities, the Dispersion and the Separation of a cluster: 5 Definition 3.3 (Cluster Dispersion). The Dispersion of a cluster Ci (DISP) is defined as the maximum edge weight of Ci . If the cluster is a singleton (i.e. contains only one node), the associated Dispersion is set to 0. More formally: ( max wj if |E(Ci )| = 6 0 j, ej ∈Ci ∀i ∈ [K], DISP(Ci ) = 0 otherwise. Definition 3.4 (Cluster Separation). The Separation of a cluster Ci (SEP) is defined as the minimum distance between the nodes of Ci and the ones of all other clusters Cj , j 6= i, 1 ≤ i, j ≤ K, K 6= 1 where K is the total number of clusters. In practice, it corresponds to the minimum weight among all already cut edges from T comprising a node from Ci . If K = 1, the Separation is set to 1. More formally, with incCuts(Ci ) denoting cut edges incident to Ci , ( min wj if K 6= 1 j, ej ∈incCuts(Ci ) ∀i ∈ [K], SEP(Ci ) = 1 otherwise. Definition 3.5 (Validity Index of a Cluster). The Validity Index of a cluster Ci is defined as: VC (Ci ) = SEP(Ci ) − DISP(Ci ) ∈ [−1; 1] max(SEP(Ci ), DISP(Ci )) Definition 3.6 (Validity Index of a Clustering Partition). The Density-Based Validity Index of a Clustering partition Π = {Ci }, 1 ≤ i ≤ K, DBCVI(Π) is defined as the weighted average of the Validity Indices of all clusters in the partition where N is the number of vertices. K X |Ci | DBCVI(Π) = VC (Ci ) ∈ [−1, 1] N i=1 DBMSTClu is summarized in Algorithm 1: evaluateCut(.) computes the DBCVI when the cut in parameter is applied to T . Initial DBCVI is set −1. Interested reader could refer to [Morvan et al., 2017] Section 4. for a complete insight on this notions. 3.2.2 DBMSTClu exact clustering recovery proof In this section, we provide theoretical guarantees for the cluster recovery accuracy of DBMSTClu. Let us first begin by introducing some definitions. Definition 3.7 (Cut). Let us consider a graph G = (V, E, w) with K clusters, T an MST of G. Let denote (Ci∗ )i∈[K] the set of the clusters. Then, CutG (T ) := {ekl ∈ T | k ∈ Ci∗ , l ∈ Cj∗ , i, j ∈ [K]2 , i 6= j}. In the sequel, for simplicity, we denote e(ij) ∈ CutG (T ) the edge between cluster Ci∗ and Cj∗ . CutG (T ) is basically the set of effective cuts to perform on T in order to ensure the exact recovery of the clustering partition. More generally, trees on which CutG (.) enables to find the right partition are said to be a partitioning topology. ∗ Definition 3.8 (Partitionning topology). Let us consider a graph G = (V, E, w) with K clusters C1∗ , . . . , CK . A spanning tree T of G is said to have a partitioning topology if ∀i, j ∈ [K], i 6= j, |{e = (u, v) ∈ CutG (T ) | u ∈ Ci∗ , v ∈ Cj∗ }| = 1. Def. 3.7 and 3.8 introduce a topological condition on the tree as input of the algorithm. Nevertheless, conditions on weights are necessary too. Hence, we define homogeneous separability which expresses the fact that within a cluster the edge weights are spread in a controlled manner. 6 Algorithm 1 DBMSTClu(T ) 1: 2: 3: 4: 5: 6: 7: 8: 9: 10: 11: 12: 13: 14: 15: 16: 17: 18: 19: Input: T , the MST dbcvi ← −1.0 clusters ← ∅ cut list ← {E(T )} while dbcvi < 1.0 do cut tp ← ∅ dbcvi tp ← dbcvi for each cut in cut list do newDbcvi ← evaluateCut(T , cut) if newDbcvi ≥ dbcvi tp then cut tp ← cut dbcvi tp ← newDbcvi if cut tp 6= ∅ then clusters← cut(clusters, cut tp) dbcvi ← dbcvi tp cut list ← cut list\{cut tp} else break return clusters, dbcvi Definition 3.9 (Homogeneous separability condition). Let us consider a graph G = (V, E, w), s ∈ E and T a tree of G. T is said to be homogeneously separable by s, if max w(e) αT max w(e) < w(s) with αT = e∈E(T ) e∈E(T ) min w(e) e∈E(T ) ≥ 1. One will write for simplicity that HT (s) is verified. Definition 3.10 (Weak homogeneity condition of a Cluster). Let us consider a graph G = (V, E, w) with ∗ K clusters C1∗ , . . . , CK . A given cluster Ci∗ , i ∈ [K], Ci∗ is weakly homogeneous if: for all T an MST of G, and ∀j ∈ [K], j 6= i, s.t. e(ij) ∈ CutG (T ), HT|C ∗ (e(ij) ) is verified. For simplicity, one denote i αi = max αT|C ∗ i T MST of G ¯ Definition 3.11 (Strong homogeneity condition of a Cluster). Let us consider a graph G = (V, E, w) with ∗ K clusters C1∗ , . . . , CK . A given cluster Ci∗ , i ∈ [K], Ci∗ is strongly homogeneous if: for all T a spanning tree (ST) of G, and ∀j ∈ [K], j 6= i, s.t. e(ij) ∈ CutG (T ), HT|C ∗ (e(ij) ) is verified. For simplicity, one i denote ᾱi = max αT|C ∗ T ST of G i We show that the weak homogeneity condition is implied by the strong homogeneity condition. ∗ Proposition 3.1. Let us consider a graph G = (V, E, w) with K clusters C1∗ , . . . , CK . If a given cluster ∗ Ci , i ∈ [K] is strongly homogeneous, then, it is weakly homogeneous. Proof. If T a spanning tree of G, and ∀j ∈ [K], j 6= i, s.t. e(ij) ∈ CutG (T ), HT|C ∗ (e(ij) ) is verified, then i in particular, it is true for any MST. Strong homogeneity condition appears to be naturally more constraining on the edge weights than the weak one. The accuracy of DBMSTClu is proved under the weak homogeneity condition, while the accuracy of its differentially-private version is only given under the the strong homogeneity condition. 7 ∗ Theorem 7. Let us consider a graph G = (V, E, w) with K homogeneous clusters C1∗ , . . . , CK and T an MST of G. Let now assume that at step k < K − 1, DBMSTClu built k + 1 subtrees C1 , . . . , Ck+1 by cutting e1 , e2 , . . . , ek ∈ E. Then, Cutk := CutG (T ) \ {e1 , e2 , . . . , ek } = 6 ∅ =⇒ DBCVIk+1 ≥ DBCV Ik , i.e. if there are still edges in Cutk , the algorithm will continue to perform some cut. Proof. See supplementary material. ∗ Theorem 8. Let us consider a graph G = (V, E, w) with K homogeneous clusters C1∗ , . . . , CK and T an MST of G. Assume now that at step k < K − 1, DBMSTClu built k + 1 subtrees C1 , . . . , Ck+1 by cutting e1 , e2 , . . . , ek ∈ E. We still denote Cutk := CutG (T )\{e1 , e2 , . . . , ek }. If Cutk 6= ∅ then argmax DBCV Ik+1 (e) ⊂ Cutk i.e. the cut edge at step k + 1 is in Cutk . e∈T \{e1 , e2 , ..., ek } Proof. See supplementary material. ∗ Theorem 9. Let us consider a graph G = (V, E, w) with K weakly homogeneous clusters C1∗ , . . . , CK and T an MST of G. Let now assume that at step K − 1, DBMSTClu built K subtrees C1 , . . . , CK by cutting e1 , e2 , . . . , eK−1 ∈ E. We still denote CutK−1 := CutG (T )\{e1 , e2 , . . . , eK−1 }. Then, for all e ∈ T \{e1 , e2 , . . . , eK−1 }, DBCV IK (e) < DBCV IK−1 i.e. the algorithm stops: no edge gets cut during step K. Proof. See supplementary material. ∗ Corollary 3.1. Let us consider a graph G = (V, E, w) with K weakly homogeneous clusters C1∗ , . . . , CK and T an MST of G. DBM ST Clu(T ) stops after K − 1 iterations and the K subtrees produced match exactly the clusters i.e. under homogeneity condition, the algorithm finds automatically the underlying clustering partition. Proof. Th. 7 and 9 ensure that under homogeneity condition on all clusters, the algorithm performs the K − 1 distinct cuts within CutG (T ) and stops afterwards. By definition of CutG (T ), it means the DBMSTClu correctly builds the K clusters. 3.3 Private MST-based clustering This section presents our new node clustering algorithm PTClust for weight differential privacy. It relies on a mixed adaptation of PAMST algorithm [Pinot, 2018] for recovering a differentially-private MST of a graph and DBMSTClu. 3.3.1 PAMST algorithm Given a simple-undirected-weighted graph G = (V, E, w), PAMST outputs an almost minimal weight spanning tree topology under differential privacy constraints. It relies on a Prim-like MST algorithm, and an iterative use of the graph based Exponential mechanism. PAMST takes as an input a weighted graph, and a utility function. It outputs the topology of a spanning tree which weight is almost minimal. Algorithm 3 presents this new method, using the following utility function: uG : WE × R (w, r) → 7→ R −|w(r) − min w(r0 )|. 0 r ∈R PAMST starts by choosing an arbitrary node to construct iteratively the tree topology. At every iteration, it uses the Exponential mechanism to find the next edge to be added to the current tree topology while keeping the weights private. This algorithm is the state of the art to find a spanning tree topology under differential privacy. For readability, let us introduce some additional notations. Let S be a set of nodes 8 from G, and RS the set of edges that are incident to one and only one node in S (also denoted xorincident). For any edge r in such a set, the incident node to r that is not in S is denoted r→ . Finally, the restriction of the weight function to an edge set R is denoted w|R . Algorithm 2 PAMST(G, uG , w, ) 1: 2: 3: 4: 5: 6: 7: 8: 9: Input: G = (V, E, w) a weighted graph (separately the topology G and the weight function w),  a degree of privacy and uG utility function. Pick v ∈ V at random SV ← {v} SE ← ∅ while SV 6= V do  ) r = MExp (G, w, uG , RSV , |V |−1 SV ← SV ∪ {r→ } SE ← SE ∪ {r} return SE Theorem 10 states that using PAMST to get an almost minimal spanning tree topology preserves weight-differential privacy. Theorem 10. Let G = (V, E) be the topology of a simple-undirected graph, then ∀ > 0, PAMST(G, uG , •, ) is - differentially private on G. 3.3.2 Differentially private clustering The overall goal of this Section is to show that one can obtain a differentially private clustering algorithm by combining PAMST and DBMSTClu algorithms. However, PAMST does not output a weighted tree which is inappropriate for clustering purposes. To overcome this, one cloud rely on a sanitizing mechanism such as the Laplace mechanism. Moreover, since DBMSTClu only takes weights from (0,1], two normalizing parameters τ and p are introduced, respectively to ensure lower and upper bounds to the weights that fit within DBMSTClu needs. This sanitizing mechanism is called the Weight-Release mechanism. Coupled with PAMST, it will allows us to produce a weighted spanning tree with differential privacy, that will be exploited in our private graph clustering. Definition 3.12 (Weight-Release mechanism). Let G = (G, w) be a weighted graph,  > 0 a privacy parameter, s a scaling parameter, τ ≥ 0, and p ≥ 1 two normalization parameters. The Weight-Release mechanism is defined as   w + (Y1 , ..., Y|E| ) + τ Mw.r (G, w, s, τ, p) = G, w0 = p where Yi are i.i.d. random variables drawn from Lap (0, s). With w + (Y1 , ..., Y|E| ) meaning that if one gives an arbitrary order to the edges E = (ei )i∈[|E|] , one has ∀i ∈ [|E|], w0 (ei ) = w(ei ) + Yi . The following theorem presents the privacy guarantees of the Weight-Release mechanism. Theorem 11. Let G = (V, E) be the topology of a simple-undirected graph, τ ≥ 0, p ≥ 1, then ∀ > 0, Mw.r G, •, µ , τ, p is - differentially private on G. Proof. Given τ ≥ 0, p ≥ 1, and  > 0, the Weight release mechanism scaled to µ can be break down into a Laplace mechanism and a post-processing consisting in adding τ to every edge and dividing them by p. Using Theorems 1 and 5, one gets the expected result. So far we have presented DBMSTClu and PAMST algorithms, and the Weight-Release mechanism. Let us now introduce how to compose those blocks to obtain a Private node clustering in a graph, called 9 Algorithm 3 PTClust(G, w, uG , , τ, p) Input: G = (V, E, w) a weighted graph (separately the topology G and the weight function w),  a degree of privacy and uG utility function. 2: T = PAMST(G, w, uG , /2) 2µ 3: T 0 = Mw.r (T, w|E(T ) ,  , τ, p) 4: return DBMSTClu(T 0 ) 1: PTClust. The algorithm takes as an input a weighted graph (dissociated topology and weight function), a utility function, a privacy degree and two normalization parameters. It outputs a clustering partition. To do so, a spanning tree topology is produced using PAMST. Afterward a randomized and normalized version of the associated weight function is released using the Weight-release mechanism. Finally the obtained weighted tree is given as an input to DBMSTClu that performs a clustering partition. The following theorem ensures that our method preserves -differential privacy. Theorem 12. Let G = (V, E) be the topology of a simple-undirected graph, τ ≥ 0, and p ≥ 1, then ∀ > 0, PTClust(G, •, uG , , τ, p) is -differentially private on G. Proof. Using Theorem 10 one has that T is produced with /2-differential privacy, and using Theorem 11 one has that w0 is obtained with /2-differential privacy as well. Therefore using Theorem 4, T 0 is released with -differential privacy. Using the post-processing property (Theorem 5) one gets the expected result. 3.4 Differential privacy trade-off of clustering The results stated in this section present the security/accuracy trade-off of our new method in the differentially-private framework. PTClust relies on two differentially private mechanisms, namely PASMT and the Weight-Release mechanism. Evaluating the accuracy of this method amounts to check whether using these methods for ensuring privacy does not deteriorate the final clustering partition. The accuracy is preserved if PAMST outputs the same topology as the MST-based clustering, and if the Weight-Release mechanism preserves enough the weight function. According to Def. 3.8, if a tree has a partitioning topology, then it fits the tree-based clustering. The following theorem states that with high probability PAMST outputs a tree with a partitioning topology. ∗ Theorem 13. Let us consider a graph G = (V, E, w) with K strongly homogeneous clusters C1∗ , . . . , CK and T = PAMST(G, uG , w, ),  > 0. T has a partitioning topology with probability at least 1− K X i=1  (|Ci∗ |  − 1) exp − A 2∆uG (|V | − 1)     with A =  ᾱi max(w(e)) − min (w(e))  + ln |E|.    e∈E G|C ∗ i e∈E G|C ∗ i Proof. See supplementary material. The following theorem states that given a tree T under the strong homogeneity condition, if the subtree associated to a cluster respects Def. 3.9, then it still holds after applying the Weight-Release mechanism to this tree. ∗ Theorem 14. Let us consider a graph G = (V, E, w) with K strongly homogeneous clusters C1∗ , . . . , CK 0 and T = P AM ST (G, uG , w, ), T = (T, w|T ) and T = Mw.r (T, w|T , s, τ, p) with s << p, τ . Given some 10 (a) Homogeneous graph (b) DBMSTClu (c) PTClust,  = 1.0 (d) PTClust,  = 0.7 (e) PTClust,  = 0.5 Figure 1: Circles experiments for n = 100. PTClust parameters: wmin = 0.1, wmax = 0.3, µ = 0.1. cluster Ci∗ , and j 6= i s.t e(ij) ∈ CutG (T ), if HT|C ∗ (e(ij) ) is verified, then HT 0 |C ∗ (e(ij) ) is verified with i i probability at least V(ϕ) 1− V(ϕ) + E(ϕ)2 with the following notations : • ϕ = (max Yj )2 − min Zj × X out j∈[|Ci∗ |−1]  • Yj ∼ Lap j∈[|Ci∗ |−1] max w(e)+τ e∈E(T ) p iid  • Zj ∼ Lap min w(e)+τ e∈E(T ) p iid • X out ∼ Lap , ps  , w(e(ij) +τ s ,p p s p    , Proof. See supplementary material. Note that Theorem 14 is stated in a simplified version. A more complete version (specifying an analytic version of V(ϕ) and E(ϕ)) is given in the supplementary material. 4 Experiments So far we have exhibited the trade-off between clustering accuracy and privacy and we experimentally illustrate it with some qualitative results. Let us discuss hereafter the quantitative performances of our algorithm. We have performed experiments on two classical synthetic graph datasets for clustering with nonconvex shapes: two concentric circles and two moons, both in their noisy versions. For the sake of readability and for visualization purposes, both graph datasets are embedded into a two dimensional Euclidean space. Each dataset contains 100 data nodes that are represented by a point of two coordinates. Both graphs have been built with respect to the strong homogeneity condition: edge weights within clusters are between wmin = 0.1 and wmax = 0.3 while edges between clusters have a weight strictly 2 above wmax /wmin = 0.9. In practice, the complete graph has trimmed from its irrelevant edges (i.e. not respecting the strong homogeneity condition). Hence, those graphs are not necessarily Euclidean 11 76 69 74 62 60 66 67 65 64 7068 71 73 63 61 58 59 49 55 4 50 54 6 5 9 78 51 52 40 1112 38 3942 37 36 34 33 16 10 31 35 32 3029 20 26 24 28 27 25 23 22 19 17 1 76 69 74 83 81 8486 85 88 91 90 87 89 92 62 60 66 67 65 64 7068 71 73 78 83 81 82 80 8486 85 88 91 90 87 49 97 45 44 55 41 43 4 50 54 6 5 9 78 51 52 99 40 34 14 18 21 1112 38 3942 37 36 13 15 33 31 35 32 3029 16 10 20 26 24 28 27 25 23 92 93 3 53 56 98 89 0 2 57 47 48 46 96 95 94 77 79 72 75 63 61 58 59 93 3 53 56 41 43 78 82 80 0 2 57 47 48 46 45 44 77 79 72 75 22 19 17 1 96 95 94 97 98 99 13 15 14 18 21 (a) Homogeneous graph (b) DBMSTClu (c) PTClust,  = 1.0 (d) PTClust,  = 0.7 (e) PTClust,  = 0.5 Figure 2: Moons experiments for n = 100. PTClust parameters: wmin = 0.1, wmax = 0.3, µ = 0.1. since close nodes in the visual representation may not be connected in the graph. Finally, weights are normalized between 0 and 1. Figures 1 and 2 (best viewed in color) show for each dataset (a) the original homogeneous graph G built by respecting the homogeneity condition, (b) the clustering partition1 of DBMSTClu with the used underlying MST, the clustering partitions for PTClust with µ = 0.1 obtained respectively with different privacy degrees2 :  = 0.5 (c),  = 0.7 (c) and  = 1.0 (e). The utility function uG corresponds to the graph weight. Each experiment is carried out independently and the tree topology obtained by PAMST will eventually be different. This explains why the edge between clusters may not be the same when the experiment is repeated with a different level of privacy. However, this will marginally affect the overall quality of the clustering. As expected, DBMSTClu recovers automatically the right partition and the results are shown here for comparison with PTClust. For PTClust, the true MST is replaced with a private approximate MST obtained for suitable τ and p ensuring final weights between 0 and 1. When the privacy degree is moderate ( ∈ {1.0, 0.7}), it appears that the clustering result is slightly affected. More precisely, in Figures 1c and 1d the two main clusters are recovered while one point is isolated as a singleton. This is due to the randomization involved in determining the edge weights for the topology returned by PAMST. In Figure 2c, the clustering is identical to the one from DBMSTClu in Figure 2b. In Figure 1d, the clustering is very similar to the DBMSTClu one, with the exception of an isolated singleton. However, as expected from our theoretical results, when  is decreasing, the clustering quality deteriorates, as DBMSTClu is sensitive to severe changes in the MST (cf. Figure 1e, 2e). 5 Conclusion In this paper, we introduced PTClust, a novel graph clustering algorithm able to recover arbitrarilyshaped clusters while preserving differential privacy on the weights of the graph. It is based on the release of a private approximate minimum spanning tree of the graph of the dataset, by performing suitable cuts to reveal the clusters. To the best of our knowledge, this is the first differential private graphbased clustering algorithm adapted to nonconvex clusters. The theoretical analysis exhibited a trade-off between the degree of privacy and the accuracy of the clustering result. This work suits to applications where privacy is a critical issue and it could pave the way to metagenomics and genes classification using 1 For the sake of clarity, the edges in those Figures are represented based on the original weights and not on the privately released weights. 2 Note that, although the range of  is in R? , it is usually chosen in practice in (0, 1] [Dwork and Roth, 2013, Chap 1&2]. + 12 individual gene maps while protecting patient privacy. Future work will be devoted to deeply investigate these applications. References T. Asano, B. Bhattacharya, M. Keil, and F. Yao. Clustering algorithms based on minimum and maximum spanning trees. In Proceedings of the Fourth Annual Symposium on Computational Geometry, SCG ’88, pages 252–257, New York, NY, USA, 1988. ACM. A. Blum, K. Ligett, and A. Roth. A learning theory approach to non-interactive database privacy. In Proceedings of the Fortieth Annual ACM Symposium on Theory of Computing, STOC ’08, pages 609– 618, New York, NY, USA, 2008. ACM. L. Chen, T. Yu, and R. Chirkova. Wavecluster with differential privacy. In Proceedings of the 24th ACM International on Conference on Information and Knowledge Management, CIKM ’15, pages 1011–1020, New York, NY, USA, 2015. ACM. C. Dwork. A firm foundation for private data analysis. Commun. ACM, 54(1):86–95, Jan. 2011. C. Dwork and A. Roth. The algorithmic foundations of differential privacy. Foundations and Trends R in Theoretical Computer Science, 9(3-4):211–407, 2013. C. Dwork, K. Kenthapadi, F. McSherry, I. Mironov, and M. Naor. Our data, ourselves: Privacy via distributed noise generation. In Eurocrypt, volume 4004, pages 486–503. Springer, 2006a. C. Dwork, F. McSherry, K. Nissim, and A.Smith. Calibrating noise to sensitivity in private data analysis. In Theory of Cryptography, pages 265–284. Springer Berlin Heidelberg, 2006b. O. Grygorash, Y. Zhou, and Z. Jorgensen. Minimum spanning tree based clustering algorithms. In 2006 18th IEEE International Conference on Tools with Artificial Intelligence (ICTAI’06), pages 73–81, Nov 2006. M. Hay, C. Li, G. Miklau, and D. Jensen. Accurate estimation of the degree distribution of private networks. In 2009 Ninth IEEE International Conference on Data Mining, pages 169–178, Dec 2009. S.-S. Ho and S. Ruan. Preserving privacy for interesting location pattern mining from trajectory data. Trans. Data Privacy, 6(1):87–106, Apr. 2013. S. P. Kasiviswanathan, K. Nissim, S. Raskhodnikova, and A. Smith. Analyzing graphs with node differential privacy. In Proceedings of the 10th Theory of Cryptography Conference on Theory of Cryptography, TCC’13, pages 457–476, Berlin, Heidelberg, 2013. Springer-Verlag. F. McSherry. Privacy integrated queries. In Proceedings of the 2009 ACM SIGMOD International Conference on Management of Data (SIGMOD). Association for Computing Machinery, Inc., June 2009. F. McSherry and K. Talwar. Mechanism design via differential privacy. In Annual IEEE Symposium on Foundations of Computer Science (FOCS), Providence, RI, October 2007. IEEE. A. Morvan, K. Choromanski, C. Gouy-Pailler, and J. Atif. Graph sketching-based massive data clustering. SIAM Data Mining 2018 (to appear), 2017. Y. Mülle, C. Clifton, and K. Böhm. Privacy-integrated graph clustering through differential privacy. In EDBT/ICDT Workshops, 2015. H. H. Nguyen, A. Imine, and M. Rusinowitch. Detecting communities under differential privacy. In Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, WPES ’16, pages 83–93, New York, NY, USA, 2016. ACM. 13 K. Nissim, S. Raskhodnikova, and A. Smith. Smooth sensitivity and sampling in private data analysis. In Proceedings of the thirty-ninth annual ACM symposium on Theory of computing - STOC. ACM Press, 2007. R. Pinot. Minimum spanning tree release under differential privacy constraints. ArXiv e-prints, Jan. 2018. S. E. Schaeffer. Graph clustering. Computer Science Review, 1(1):27 – 64, 2007. A. Sealfon. Shortest paths and distances with differential privacy. In Proceedings of the 35th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems - PODS. ACM Press, 2016. C. T. Zahn. Graph-theoretical methods for detecting and describing gestalt clusters. IEEE Trans. Comput., 20(1):68–86, Jan. 1971. 14 SUPPLEMENTARY MATERIAL 6 Proof regarding the accuracy of DBMSTClu 6.1 Proof of Theorem 7 This theorem relies on the following lemma: ∗ Lemma 1. Let us consider a graph G = (V, E, w) with K clusters C1∗ , . . . , CK and T an MST of G. If ∗ for all i ∈ [K], Ci is weakly homogeneous, then argmax w(e) ⊂ CutG (T ) i.e. the heaviest edges in T are e∈T in CutG (T ). Proof. Let us consider Ci∗ a cluster of G. As Ci∗ is weakly homogeneous, ∀j ∈ [K] s.t. e(ij) ∈ CutG (T ), max w(e) < w(e(ij) ). Hence, argmax w(e) ⊂ CutG (T ). e∈T|C ∗ e∈E(T ) i ∗ Theorem. 7 Let us consider a graph G = (V, E, w) with K homogeneous clusters C1∗ , . . . , CK and T an MST of G. Let now assume that at step k < K − 1, DBMSTClu built k + 1 subtrees C1 , . . . , Ck+1 by cutting e1 , e2 , . . . , ek ∈ E. Then, Cutk := CutG (T ) \ {e1 , e2 , . . . , ek } = 6 ∅ =⇒ DBCVIk+1 ≥ DBCV Ik , i.e. if there are still edges in Cutk , the algorithm will continue to perform some cut. Pk+1 Proof. Let note DBCVI at step k, DBCV Ik = i=1 |CNi | VC (Ci ). Let assume that Cutk 6= ∅. Therefore, there is e∗ ∈ Cutk and i ∈ {1, . . . , k + 1} s.t. e∗ ∈ E(Ci ). Since e∗ ∈ CutG (T ), using Lem. 1, one can always take e∗ ∈ argmax w(e). Then, if we denote Ci1 , Ci2 the two subtrees of Ci induced by the cut of e∗ e∈E(Ci ) (see Fig. 3 for an illustration) and DBCV Ik+1 (e∗ ) the associated DBCVI value, ∆ = DBCV Ik+1 (e∗ ) − DBCV Ik       |Ci2 | |Ci | |Ci1 | SEP(Ci1 ) − DISP(Ci1 ) SEP(Ci2 ) − DISP(Ci2 ) SEP(Ci ) − DISP(Ci ) + − = . N max(SEP(Ci1 ), DISP(Ci1 )) N max(SEP(Ci2 ), DISP(Ci2 )) N max(SEP(Ci ), DISP(Ci )) | {z } {z } {z } | | VC (Ci1 ) VC (Ci2 ) VC (Ci ) There are two possible cases: 1. VC (Ci ) ≤ 0, then SEP(Ci ) ≤ DISP(Ci ) = w(e∗ ). As for l ∈ {1, 2}, SEP(Cil ) ≥ SEP(Ci ) and DISP(Cil ) ≤ DISP(Ci ) because e∗ ∈ argmax w(e), then, for l ∈ {1, 2}, e∈E(Ci ) SEP(Cl ) − DISP(Ci ) SEP(Ci ) SEP(Cil ) − DISP(Cil ) ≥ = −1 max(SEP(Ci ), DISP(Ci )) w(e) max(SEP(Cil ), DISP(Cil )) and ∆ ≥ 0. 2. VC (Ci ) ≥ 0, then SEP(Ci ) ≥ DISP(Ci ) = w(e∗ ) i.e. max(SEP(Ci ), DISP(Ci )) = SEP(Ci ), for l ∈ {1, 2}, DISP(Cil ) ≤ DISP(Ci ) i.e. DISP(Cil ) ≤ w(e∗ ), SEP(Cil ) = w(e∗ ) hence SEP(Cil ) ≥ DISP(Cil ). Thus, VC (Ci ) = 1 − VC (Cil ) DISP(Ci ) SEP(Ci ) ≥ VC (Ci ) and ∆ ≥ 0. and for l ∈ {1, 2}, VC (Cil ) = 1 − DISP(Cil ) . SEP(Cil ) Then, for l ∈ {1, 2}, For both cases, ∆ = DBCV Ik+1 (e∗ ) − DBCV Ik ≥ 0. Hence, at least the cut of e∗ improves the current DBCVI, so the algorithm will perform a cut at this stage. 15 Ci Ci2 e∗ Ci1 Figure 3: Illustration for Th. 7’s proof. 6.2 Proof of Theorem 8 ∗ and T an Theorem. 8 Let us consider a graph G = (V, E, w) with K homogeneous clusters C1∗ , . . . , CK MST of G. Let now assume that at step k < K − 1, DBMSTClu built k + 1 subtrees C1 , . . . , Ck+1 by cutting e1 , e2 , . . . , ek ∈ E. We still denote Cutk := CutG (T )\{e1 , e2 , . . . , ek }. Then, Cutk 6= ∅ =⇒ argmax DBCV Ik+1 (e) ⊂ Cutk i.e. the edge that the algorithm cuts at step k + 1 is in Cutk . e∈T \{e1 , e2 , ..., ek } Proof. It is sufficient to show that, at step k, if there exists an edge e∗ whose cut builds two clusters, then e∗ maximizes DBCVI among all possible cuts in the union of itself and both resulting clusters. Indeed, showing this for two clusters, one can easily generalize to the whole graph as a combination of couples of clusters (see Fig. 5 for an illustration): if for each couple, the best local solution is in Cutk , then the best general solution is necessary in Cutk . Let us consider at step k of the algorithm two clusters C1∗ and C2∗ such that e∗ the edge separating them in T is in Cutk (see Fig. 4 for an illustration). For readability we denote T|C1∗ = C1∗ and T|C2∗ = C2∗ Let us proof that for all ẽ ∈ T|C1∗ ∪C2∗ , one has: DBCV Ik+1 (e∗ ) > DBCV Ik+1 (ẽ). W.l.o.g. let assume ∗ ∗ ẽ ∈ C1∗ and let denote C1,1 and C1,2 the resulting subtrees from the cut of ẽ. We still denote DBCV Ik+1 (e) the value of the DBCVI at step k + 1 for the cut of e. ∆ := DBCV Ik+1 (e∗ ) − DBCV Ik+1 (ẽ)     |C ∗ | |C2∗ | SEP(C1∗ ) − DISP(C1∗ ) SEP(C2∗ ) − DISP(C2∗ ) + = 1 N max(SEP(C1∗ ), DISP(C1∗ )) N max(SEP(C2∗ ), DISP(C2∗ )) | {z } A ! !! ∗ ∗ ∗ ∗ ∗ ∗ | ) − DISP(C1,1 ) | ) − DISP(C1,2 ) |C1,1 SEP(C1,1 |C1,2 SEP(C1,2 − + ∗ ), DISP(C ∗ )) ∗ ), DISP(C ∗ )) N max(SEP(C1,1 N max(SEP(C1,2 1,1 1,2 | {z } B By weak homogeneity of C1∗ and C2∗ , A = |C1∗ | N  1− DISP(C1∗ ) SEP(C1∗ ) 16  + |C2∗ | N  1− DISP(C2∗ ) SEP(C2∗ )  >0 ∗ |C1,1 | B= N | ! ∗ ∗ ∗ |C1,2 | SEP(C1,1 ) − DISP(C1,1 ) + ∗ ∗ max(SEP(C1,1 ), DISP(C1,1 )) N {z } | By Lem. 1, e∗ ∈ B1 ! ∗ ∗ SEP(C1,2 ) − DISP(C1,2 ) ∗ ), DISP(C ∗ )) max(SEP(C1,2 1,2 {z } B2 ∗ w(e) so DISP(C1,2 ) = w(e∗ ). argmax e∈E(T|C ∗ ∪C ∗ ) ∗ 1 2 ∗ Since e ∈ CutG (T ), one has w(e∗ ) ≥ max(SEP(C1∗ ), SEP(C2∗ )). Moreover, as C2∗ is a subtree of C1,2 ,   ∗ ∗ |C | SEP(C ) 1,2 1,2 ∗ ∗ ∗ ∗ then SEP(C1,2 ) ≤ SEP(C2 ). Thus, w(e ) ≥ SEP(C1,2 ). Finally, B2 = N DISP(C ∗ ) − 1 ≤ 0. 1,2 ∗ ∗ Besides, w(ẽ) ≤ SEP(C1∗ ) =⇒ SEP(C1,1 ) = w(ẽ) ≤ max∗ w(e) and DISP(C1,1 )= e∈E(C1 ) max ∗ ) e∈E(C1,1 w(e) ≥ min w(e). Then, two possibilities hold: e∈E(C1∗ ) 1. B1 < 0 =⇒ B < 0 < A. 2. B1 ≥ 0, thus one has B1 = condition, there is: ∗ |C1,1 | N DISP(C1∗ ) SEP(C1∗ )  1− ∗ DISP(C1,1 ) ∗ ) SEP(C1,1  ≤ ∗ |C1,1 | N min w(e) 1− ∗ e∈C1 max w(e) ! . Under weak homogeneity ∗ e∈C1 min w(e) < ∗ e∈C1 max∗ w(e) . Thus, e∈C1   ∗ |C1,1 | DISP(C1∗ ) 1− N SEP(C1∗ )   ∗ |C | DISP(C1∗ ) ∗ < 1 1− because C1,1 is a subtree ofC1∗ N SEP(C1∗ ) B1 < <A So, B1 + B2 = B < A = DBCV Ik+1 (e∗ ). Since B < A, ∆ > 0 and e∗ maximizes DBCVI among all possible cuts in the union of itself and both resulting clusters. Q.E.D. C1∗ ∗ C1,1 ẽ e∗ C2∗ ∗ C1,2 Figure 4: Illustration for Th. 8’s proof. 6.3 Proof of Theorem 9 ∗ Theorem. 9 Let us consider a graph G = (V, E, w) with K weakly homogeneous clusters C1∗ , . . . , CK and T an MST of G. Let now assume that at step K − 1, DBMSTClu built K subtrees C1 , . . . , CK by cutting e1 , e2 , . . . , eK−1 ∈ E. We still denote CutK−1 := CutG (T )\{e1 , e2 , . . . , eK−1 }. 17 Figure 5: Illustration for Th. 8’s proof. Each circle corresponds to a cluster. The six clusters are handled within five couples of clusters. Then, for all e ∈ T \{e1 , e2 , . . . , eK−1 }, DBCV IK (e) < DBCV IK−1 i.e. the algorithm stops: no edge gets cut during step K. Proof. According to Th. 7 and Th. 8, for all k < K, if Cutk 6= ∅, the algorithm performs some cut from CutG (T ). We still denote for all j ∈ [K] Cj∗ = T|Cj∗ .Since |CutG (T )| = K − 1, the K − 1 first steps produce P |Cj∗ | ∗ K − 1 cuts from CutG (T ). Therefore, DBCVIK−1 = N VC (Cj ). j∈[K−1] ∗ ∗ Let be e the (expected) edge cut at step K, splitting the tree Ci∗ into Ci,1 and Ci,2 . ∆ = DBCVIK−1 − DBCVIK ∗ ∗ |Ci,1 | |Ci,2 | |Ci∗ | ∗ ∗ VC (Ci∗ ) − VC (Ci,1 )− VC (Ci,2 ) N N N ∗ ∗ ∗ ∗ ∗ ∗ ) − DISP(Ci,1 ) ) − DISP(Ci,2 ) |Ci,1 | SEP(Ci,1 |Ci,2 | SEP(Ci,2 |C ∗ | SEP(Ci∗ ) − DISP(Ci∗ ) = i − − ∗ ∗ ∗ ∗ ∗ ∗ )) N max(SEP(Ci ), DISP(Ci )) N max(SEP(Ci,1 ), DISP(Ci,1 )) N max(SEP(Ci,2 ), DISP(Ci,2 = Since Ci∗ is a weakly homogeneous cluster, therefore SEP(Ci∗ ) ≥ DISP(Ci∗ ). Then, minimal value of ∗ ∗ ∗ ∗ ∗ ∗ ∆, ∆min is reached when SEP(Ci,1 ) ≥ DISP(Ci,1 ), SEP(Ci,2 ) ≥ DISP(Ci,2 ), SEP(Ci,1 ) = SEP(Ci,2 ) = 0 ∗ ∗ 0 min w(e ), DISP(C ) = DISP(C ) = max w(e ). Then, i,1 i,2 ∗ ∗ 0 0 e ∈E(Ci ) N × ∆min e ∈E(Ci ) ! !   ∗ ∗ ∗ DISP(C ) DISP(C ) DISP(C ) i,1 i,2 i ∗ ∗ − |Ci,1 | 1− − |Ci,2 | 1− = |Ci∗ | 1 − ∗ ) ∗ ) SEP(Ci∗ ) SEP(Ci,1 SEP(Ci,2       max w(e0 ) max w(e0 ) ∗ 0 ∈E(C ∗ ) 0 ∈E(C ∗ ) e e DISP(C ) i i i ∗  ∗   − |Ci,2  = |Ci∗ | 1 − − |Ci,1 | 1− | 1− 0) SEP(Ci∗ ) min min w(e w(e0 ) ∗ ∗ 0 0  = |Ci∗ | − DISP(Ci∗ ) + SEP(Ci∗ ) By weak homogeneity condition on e ∈E(Ci ) max∗ w(e0 ) 0  min ∗ w(e0 ) 0  e ∈E(Ci ) e ∈E(Ci ) e ∈E(Ci ) DISP(C ∗ ) Ci∗ , SEP(C ∗i) i < min w(e0 )) max w(e0 ) e0 ∈E(C ∗ ) i e0 ∈E(C ∗ ) i and ∆ > 0. 18 max ≤ w(e0 )) e0 ∈E(C ∗ ) i ) e0 ∈E(C ∗ i minw(e0 ) . Therefore, ∆min > 0 7 7.1 Proofs regarding the accuracy of PTClust Proof of Theorem 13 ∗ Theorem. 13 Let us consider a graph G = (V, E, w) with K strongly homogeneous clusters C1∗ , . . . , CK and T = PAMST(G, uG , w, ),  > 0. T has a partitioning topology with probability at least  − 2∆u (|V |−1) (ᾱi max(w(e))−min (w(e)))+ln(|E|) K X G e∈E(G|C ∗ ) e∈E(G|C ∗ ) i i 1− (|Ci∗ | − 1)e i=1 Proof. Let T = PAMST(G, uG , w, ), {R1 , ..., R|V |−1 } denotes the ranges used in the successive calls of  the Exponential mechanism in PAMST(G, uG , w, ), rk = MExp (G, w, uG , Rk , ), and Steps(Ci∗ ) |V | − 1 | {z } 0 the set of steps k of the algorithm were Rk contains at least one edges from G|Ci∗ . Finally for readability we denote uk = uG (w, rk ) P[T has a partitioning topology] =P[∀i, j ∈ [K], i 6= j, |{(u, v) ∈ E(T ), u ∈ Ci∗ , v ∈ Cj∗ }| = 1] = 1 − P[¬A] | {z } A If we denote B = “∀i ∈ [K], ∀k > 1 ∈ Steps(Ci∗ ), if rk−1 ∈ E(G|Ci∗ ) then rk ∈ E(G|Ci∗ )” One easily has: B =⇒ A, therefore P[¬A] ≤ P(¬B). Moreover, by using the privacy/accuracy trade-off of the exponential mechanism, one has     2∆uG  ≤ exp(−t). ∀t ∈ R, ∀i ∈ [K], ∀k ∈ Steps(Ci∗ ) P  u ≤ − (t + ln |R |) k k   0 {z | } Ak (t) Moreover one can major P[¬B] as follows   P ∃i ∈ [K], ∃k ∈ Steps(Ci∗ ) s.t rk−1 ∈ E(G|Ci∗ ) and rk ∈ / E(G|Ci∗ ) By using the union bound, one gets ≤ X i∈[K]   P ∃k ∈ Steps(Ci∗ ) s.t rk−1 ∈ E(G|Ci∗ ) and rk ∈ / E(G|Ci∗ ) Using the strong homogeneity of the clusters, one has   X = P ∃k ∈ Steps(Ci∗ ) s.t uk ≤ −|ᾱi max w(e) − min w(r)| e∈E(G|C ∗ ) i∈[K] i r∈Rk  ≤ X i∈[K] By setting tk,i =  P ∃k ∈ Steps(Ci∗ ) s.t uk ≤ −|ᾱi max w(e) − min w(e) | e∈E(G|C ∗ ) i 0 2∆uG (ᾱi max(w(e)) e∈E(G|C ∗ ) i = X i∈[K] e∈E(G|C ∗ ) − min (w(e))) + ln(|Rk |) one gets e∈E(G|C ∗ ) i P [∃k ∈ Steps(Ci∗ ) s.t Ak (tk,i )] 19 i Since for all i ∈ [K], and k ∈ Steps(Ci∗ ), |Rk | ≤ |E|, and using a union bound, one gets ≤ X X P i∈[K] k∈Steps(Ci∗ ) [Ak (tk,i )] ≤  K X ≤ (|Ci∗ | − 1) exp − i=1 7.2 X X exp (−ti,k ) i∈[K] k∈Steps(Ci∗ )     ᾱi max w(e) − min w(e)  + ln(|E|) 2∆uG (|V | − 1) e∈E(G|C ∗ ) e∈E(G|C ∗ ) i i Proof of Theorem 14 Let recall the theorem from S. Kotz on the Laplace distribution and generalizations (2001): Theorem 15. Let n ∈ N, (Xi )i∈[n] ∼ Lap(θ, s), denoting Xr:n the order statistic of rank r one has for iid all k ∈ N, h i k E (Xr:n − θ) = sk   n−r r−1 X X n!Γ(k + 1)  (−1)k aj,r,k + bj,r,k  (r − 1)!(n − r)! j=0 j=0 {z } | α(n,k) ∗ Theorem. 14 Let us consider a graph G = (V, E, w) with K strongly homogeneous clusters C1∗ , . . . , CK 0 ∗ and T = PAMST(G, uG , w, ), and T = Mw.r (T, w|T , s, τ, p) with s << p, τ . Given some cluster Ci , and j 6= i s.t e(ij) ∈ CutG (T ), if HT|C ∗ (e(ij) ) is verified, then HT 0 |C ∗ (e(ij) ) is verified with probability at i i least 2 2 2 Λ1 + (θ(ij) + δ)Λ2 − (Λ3 + θ(ij) Λ24 ) 1− 2 Λ1 + (θ(ij) + δ)Λ2 + 2Λ3 Λ4 with the following notations: • δ = ps , θmin = min w(e)+τ e∈E(T ) p max w(e)+τ • θmax = e∈E(T ) p ,θ(ij) = w(e(ij) +τ p 2 3 4 • Λ1 = 24δ 4 nα(n, 4) + 12θmax δ 3 nα(n, 3) + 12θmax δ 2 nα(n, 2) + 4θmax δnα(n, 1) + θmax 2 • Λ2 = 2δ 2 nα(1, 2) + 2θmin δnα(1, 1) + θmin 2 • Λ3 = 2δ 2 nα(n, 2) + 2θmax δnα(n, 1) + θmax • Λ4 = δnα(1, 1) + θmin Proof. Let τ > 0 and p > 1, according to the weight-release mechanism, all the randomized edge weights w0 (e) with e ∈ E(T 0 ) are sampled from independents Laplace distributions Lap( w(e)+τ , ps ). p Given some cluster Ci∗ , and j 6= i s.t e(ij) ∈ CutG (T ), HT|C ∗ (e(ij) ) is verified. Finding the probabili   2 ity that HT 0 |C ∗ (e i (ij) ) is verified is equivalent to find the probability P  , ps ) and X out ∼ Lap( w(e Lap( w(e)+τ p (ij) p )+τ (max Xe ) e∈E (C ∗ ) i min Xe e∈E (C ∗ ) i < X out  with Xe ∼ indep , ps ). Denoting with Yi ∼ Lap (θmax , δ) , Zi ∼ Lap (θmin , δ) and X out ∼ iid 20 iid  Lap(θ(ij) , δ), one can lower bounded this probability by P  min Zi i∈[|Ci∗ |−1] (max Yi )2 i∈[|C ∗ |−1] i min Zi i∈[|C ∗ |−1] i  < X out  . Choosing τ big enough s.t < 0 is negligible, one has   P (max Yi )2 i∈[|Ci∗ |−1] min Zi   < X out  i∈[|Ci∗ |−1]       out 2 . × X (max Y ) − min Z =P  < 0 i i    i∈[|Ci∗ |−1] i∈[|Ci∗ |−1]  | {z } ϕ Moreover since τ , p >> s, one has E(ϕ) ≤ 0. Therefore,     P [ϕ < 0] =P ϕ − E(ϕ) < −E(ϕ) | {z } ≥0 =1 − P [ϕ − E(ϕ) > −E(ϕ)] Using the one-sided Chebytchev inequality, one gets ≥1 − V(ϕ) V(ϕ) =1− V(ϕ) + E(ϕ)2 E(ϕ2 ) By giving an analytic form to E(ϕ) and V(ϕ) by using Theorem 15 one gets the expected result. 21
8cs.DS
Polynomial Transformation Method for Non-Gaussian Noise Environment Jugalkishore K. Banoth, Pradip Sircar* Department of Electrical Engineering Indian Institute of Technology Kanpur Kanpur 208016, India *Corresponding author; Email address: [email protected] Abstract - Signal processing in non-Gaussian noise environment is addressed in this paper. For many real-life situations, the additive noise process present in the system is found to be dominantly non-Gaussian. The problem of detection and estimation of signals corrupted with nonGaussian noise is difficult to track mathematically. In this paper, we present a novel approach for optimal detection and estimation of signals in non-Gaussian noise. It is demonstrated that preprocessing of data by the orthogonal polynomial approximation together with the minimum errorvariance criterion converts an additive non-Gaussian noise process into an approximation-error process which is close to Gaussian. The Monte Carlo simulations are presented to test the Gaussian hypothesis based on the bicoherence of a sequence. The histogram test and the kurtosis test are carried out to verify the Gaussian hypothesis. Keywords: Orthogonal polynomial approximation, Signal detection and estimation, Non-Gaussian noise 1 Introduction In the signal detection and estimation problems, we often assume that the additive random noise process is Gaussian distributed because this distribution is simple and mathematically tractable, and the assumption makes analytical results possible. However for many real-life situations, the additive noise process is found to be dominantly nonGaussian. Some examples are the ocean acoustic noise and the urban radio-frequency (RF) noise [1]. The RF receivers designed to perform in white Gaussian noise can not perform satisfactorily when the electromagnetic environment encountered by the receiver system is non-Gaussian in nature [2]. For detection and estimation of radar signals in high clutter environments and similar processing of sonar signals in presence of high reverberation, we need to deal with nonGaussian noise [1, 2]. There are two existing approaches for solving the problems of detection and estimation of signals in non-Gaussian noise environment. The first approach is to use the robust statistics in lieu of the classical mathematical statistics, and to look for procedures which are consistent or in other words, insensitive to deviations of the noise distribution from the idealized model, i.e., the Gaussian distribution [3]. An optimally robust procedure minimizes the maximum degradation of performance for a preset deviation of the noise distribution. The robust techniques, however, can not provide consistent performance for a noise process with an arbitrary probability density function (PDF). The second approach to deal with a non-Gaussian noise environment is to use a noise model which is general enough to depict an arbitrary PDF, yet the model retains the desirable simplicity of manipulation as that of a Gaussian PDF. Accordingly, the Gaussian-mixture PDF, the generalized Gaussian PDF, the Middleton class A PDF, and some such PDFs are employed to model non-Gaussian noise [4]. Incidentally, as the noise model is required to be more accurate, the ease of analysis as that of a Gaussian PDF disappears. In this paper, we present a third approach to deal with a nonGaussian noise environment, by employing the polynomial transformation method. Preprocessing of data by the orthogonal polynomial approximation (OPA) together with the minimum error-variance criterion (MEC) has an excellent noise-rejection capability [5, 6]. The OPA based transformation was originally proposed to convert nonuniformly sampled data into uniformly sampled data [5]. However, since the transformation provides significant signal enhancement by rejecting the high frequency interference, preprocessing of data may be useful in detection and estimation problems for better accuracy even for uniformly sampled data [6]. Perhaps the most desirable feature of preprocessing the signal samples by the OPA based method is that the statistical distribution of the approximation-error process in the preprocessed data becomes close to Gaussian when the noise process is not necessarily Gaussian distributed [5]. Based on this argument, the maximum likelihood estimator (MLE) can be designed to estimate parameters of a signal corrupted with non-Gaussian noise [7]. In the present work, we take a closer look of the preprocessing of data by the OPA based method, and we test the hypothesis that the approximation-error process in the preprocessed data is Gaussian distributed even when the noise process corrupting the sampled data is non-Gaussian. Several types of tests are applied for testing the hypothesis. We plot the histogram of a given sequence and look for the proverbial bell shape as a simple test for its Gaussian distribution [8]. We compute the kurtosis [9] and apply the Hinich test [10, 11] for validation of the Gaussian hypothesis. We consider the following noise processes for the Monte Carlo simulation: (i) Gaussian, (ii) Laplacian, (iii) Uniform, and (iv) Gamma distributed. 2 Orthogonal Polynomial The real-valued discrete-time signal g[n] is to be detected/ estimated utilizing the sampled sequence x[n]  g[n]  w[n] , where w[n] is the noise sequence which may not be Gaussian x[n] are preprocessed by the distributed. The sampled data orthogonal polynomial transformation transformed data  y[n] as follows [6], to obtain the (1)  nm we can compute the autocorrelation functions (ACFs) of the error process [6], provided the ACFs of the noise process are known. Furthermore, by invoking the central limit theorem when the random variables w[n] are independent with zero mean and identical variance, and the coefficients  nm are bounded [5, 13], we can argue that the error process will be close to Gaussian even when the distribution of the noise process is non-Gaussian. 3 Transformations y  PQ1PT x where Gaussian Hypothesis Testing The third order cumulant of the noise/ error process u[n] is given by C3u [k1 , k2 ]  E u[n]u[n  k1 ]u[n  k2 ] (3) where E is the expectation operator, and the third order spectrum, commonly known as the bispectrum, is defined as the two-dimensional Fourier transform of the third order cumulant, S3u (1, 2 )  where x   x[0], x[1], , x[ N  1] ,    p [n] p [m]  j j    N 1 , 2 j 0   p [i]   i 0 j J 1    C k1  k2  3u [k1, k2 ]exp{ j (1k1  2 k2 )} T y   y[0], y[1], , y[ N  1] , The squared bicoherence B3u 1 , 2   P ij  p j [i]; i  0,1,, N  1; j  0,1,, J  1; follows T N 1 N 1  N 1 2  Q  P P  Diag  p0 [m], p12 [m], , pJ2 1[m] m 0 m 0  m 0   T  Bu 1 , 2   2  The orthogonal polynomials p j [n] are computed by the recurrence relation given in [5, 12], and the order of approximation J is chosen such that the error-variance is minimum. The transformed sequence y[n] is given by y[n]  g[n]  e[n] , where e[n] is the approximation error. By utilizing the relation between the error sequence e[n] and the noise sequence w[n] , e[n]  N 1  m 0 nm w[m] (2) S3u 1 , 2  2 is determined as 2 S2u 1  S2u 2  S2u 1  2  (5) where S2u ( ) is the power spectrum. The Hinich test is based upon the squared bicoherence at a bifrequency 1 , 2  being zero for Gaussianity of the underlying sequence. The B 2 value is averaged over the principal domain [10, 11], and the resulting statistics is central  2 distributed under the null hypothesis: S3u 1 , 2   0 . Hence, it is easy to devise a statistical test to determine whether the observed squared bicoherence is consistent with a 2 central  distribution by computing a probability of false alarm (PFA) value. If the null hypothesis of the bispectrum being zero is not rejected, we then compute the average kurtosis K u given by [9] (4) Ku  E u 4   E u 2    2 3 5 (6) where the value is averaged over each element of the sequence u[n] . The kurtosis test is based on the null hypothesis: Ku  0 for a Gaussian distribution of the underlying process. 4 Concluding Remarks In this paper, we present a new technique for optimal detection and estimation of signals corrupted with nonGaussian noise. We preprocess the sampled data by the polynomial transformation method which converts the noise process into an approximation-error process which is Gaussian distributed. Simulation Results The real part of the complex-exponential transient discretetime signal 3 g[n]   bi exp( ji )exp( si nT ) (7) i 1 b1  1.0, s1  0.2  j 2.0, 1  0; where b2  0.5, s2  0.1  j 4.0, 3   4; b3  0.5, s3  0.3  j1.0, 3   6; Figure 1(a): The Bispectrum of the input noise (Gaussian) and the output error process corrupted with non-Gaussian noise setting the signal-to-noise ratio (SNR) at 10 dB, is sampled at 60 uniformly spaced points with time interval T  0.15 . We present the three cases of Laplacian, Uniform, and Gamma distributed noise environments in this work, beside the Gaussian noise case. In each case, after applying the polynomial transformation we obtain the transformed data, and then, subtracting the transient signal from the transformed data, the error process is separated. The input noise and the output error processes are tested for Gaussianity. Figs. 1− 4 show the bispectrum and the histogram plots. For the Gaussian noise case, we calculate the bicoherence of the output error and check whether the squared bicoherence is 2 consistent with a central  distribution by computing the PFA value. The PFA is computed to be 0.9479, which is high, and we cannot reject the null hypothesis. The average kurtosis value for the output error is computed to be −0.1526, whereas the kurtosis value for the input noise is computed to be −0.0857 (theoretical value zero). For the Laplacian case, the PFA for the input noise is 0.396, and the PFA for the output error is 0.9975. Since the PFA of the output error is high, we cannot reject the null hypothesis. The kurtosis values are 2.9359 for the input noise and 0.0148 for the output error. For the Uniform noise case, we compute the PFA for the input noise to be 0.6973 and the PFA for the output error to be 0.9649. The average kurtosis values are computed to be −1.2408 for the input noise and −0.1346 for the output error. For the Gamma distributed noise environment, the PFA for the input noise is 0.7379, and the PFA for the output error is 0.9847. The kurtosis values are 0.6962 for the input noise and 0.1025 for the output error. In all cases, we find that the average kurtosis value of the output error process is near zero, confirming that the error process is close to Gaussian. Figure 1(b): The Histogram of the input noise (Gaussian) and the output error process Figure 2(a): The Bispectrum of the input noise (Laplacian) and the output error process Figure 2(b): The Histogram of the input noise (Laplacian) and the output error process [3] P.J. Huber and E.M. Ronchetti, Robust Statistics, John Wiley, Hoboken, N.J., 2009. [4] S. A. Kassam, Signal Detection in Non-Gaussian Noise, Springer-Verlag, New York, 1988. Figure 3(a): The Bispectrum of the input noise (Uniform) and the output error [5] P. Sircar and A.C. Ranade, “Nonuniform sampling and study of transient systems response”, IEE Proceedings F Radar and Signal Processing, vol. 139 , no. 1, pp. 49–55, 1992. [6] M. Ravi Shankar and P. Sircar, “Nonuniform sampling and polynomial transformation method”, IEEE Int’l Conf. on Commun. ICC 2002, vol. 3, pp. 1721–1725, 2002. [7] P. Sircar and S. Mukhopadhyay, “Parameter estimation of transient signal in non-Gaussian noise”, IEEE Region 10 Int’l Conf. on EC3 – Energy, Computer, Commun. & Cont. Systems TENCON '91, vol. 3, pp. 236–240, 1991. Figure 3(b): The Histogram of the input noise (Uniform) and the output error [8] D.C. Montgomery and G. C. Runger, Applied Statistics and Probability for Engineers, John Wiley, New York, 1999. [9] J.A. Cadzow, “Blind deconvolution via cumulant extrema”, IEEE Signal Process. Mag., vol. 13, no. 5, pp. 24– 42, 1996. [10] M.J. Hinich, “Testing for Gaussianity and linearity of a stationary time series”, J. Time Series Analysis, vol. 3, no. 3, pp. 169–176, 1982. Figure 4(a): The Bispectrum of the input noise (Gamma distributed) and the output error [11] J.K. Tugnait, “Validation, testing, and noise modeling”, In: V.K. Madisetti and D.B. Williams (Eds.), The Digital Signal Processing Handbook, pp. 16.1–16.12, CRC Press, Boca Raton, 1998. [12] A. Ralston and P. Rabinowitz, A First Course in Numerical Analysis, McGraw-Hill, Singapore, 1988. [13] W. Feller, An Introduction to Probability Theory and Its Applications, Vol. I & II, John Wiley, New York, 1965. . Figure 4(b): The Histogram of the input noise (Gamma distributed) and the output error 6 References [1] E.J. Wegman and J.G. Smith (Eds.), Statistical Signal Processing, Marcel Dekker, New York, 1984. [2] E.J. Wegman, S.C. Schwartz and J.B. Thomas (Eds.), Topics in Non-Gaussian Signal Processing, Springer-Verlag, New York, 1989.
5cs.CE
A natural-inspired optimization machine based on the annual migration of salmons in nature Ahmad Mozaffari1,*, Alireza Fathi2 1: Systems Design Engineering Department, University of Waterloo, ON, Canada 2: Department of Mechanical Engineering, Babol University of Technology, Babol, Iran * Corresponding Author, E-mail: [email protected] Abstract Bio inspiration is a branch of artificial simulation science that shows pervasive contributions to variety of engineering fields such as automate pattern recognition, systematic fault detection and applied optimization. In this paper, a new metaheuristic optimizing algorithm that is the simulation of “The Great Salmon Run” (TGSR) is developed. The obtained results imply on the acceptable performance of implemented method in optimization of complex nonconvex, multi-dimensional and multi-modal problems. To prove the superiority of TGSR in both robustness and quality, it is also compared with most of the well-known proposed optimizing techniques such as Simulated Annealing (SA), Parallel Migrating Genetic Algorithm (PMGA), Differential Evolutionary Algorithm (DEA), Particle Swarm Optimization (PSO), Bee Algorithm (BA), Artificial Bee Colony (ABC), Firefly Algorithm (FA) and Cuckoo Search (CS). The obtained results confirm the acceptable performance of the proposed method in both robustness and quality for different bench-mark optimizing problems and also prove the author’s claim. I. INTRODUCTION Metaheuristic algorithms are population based methods that work with a set of feasible solutions and try to improve them gradually. These algorithms can be divided into two main categories: Evolutionary Algorithms (EA) which attempt to simulate the phenomenon of natural evolution and swarm-intelligence-based algorithms. There are many different variants of evolutionary algorithms. The common ideas behind these techniques are the same: defining a population of individuals and survival of the fittest according to the theory of evolution. Another branch of population-based algorithms which is known as swarm intelligence focuses on the collective behavior of self-organized systems in order to develop metaheuristics procedures. The interactive behavior between individuals with one another or with their environment contributes to the collective intelligence of the society and often leads to convergence of global behavior. There is a wide variety of swarm-based algorithms which mimic the natural behavior of insects and animals such as ants, fishes, birds, bees, fireflies, penguins, frogs and many others [15, 16]. Particle swarm optimization algorithm (PSO) [4], Mutable Smart Bee Algorithm (MSBA) [17], Bee Algorithm (BA) [5], Artificial Bee Colony (ABC) [3], Firefly Algorithm (FA) [9] and Cuckoo Search (CS) [10] are some of the most well-known swarm base algorithms. In this paper, a new algorithm called TGSR [11-14] is proposed that is inspired by natural migration of salmons and the dangers which are laid in their migration. In the next section, this phenomenon will be described briefly. Thereafter, all steps for implementing a simulated form of this major natural event will be scrutinized. Then, the features and controlling parameters of the proposed inspired algorithm will be described precisely. At last, it will be compared with cited optimization techniques to elaborate on the strength and weakness of the proposed technique. II. THE GREAT SALMON RUN IN NATURE The salmon run phenomena is one of the great annual natural events happening in the North America where millions of salmons migrate through mountain streams for spawning. Since these creatures provide one of the major food sources for living organisms, their passage upstream is fraught with some grave dangers. Among them, hungry Grizzly bears, human fishers and waterfalls are most crucial dangers that they should face. The hungry Grizzly bears congregate in forested valleys where they forage for whatever food source they can find. However, they can hardly find food and also they are in danger by hungry wolves. Salmons are the most important food sources for these hungry bears. Bears communicate with each other to find a passage with higher amount of chubby salmons. In fact, they follow the swarm intelligence rules for hunting salmons with higher qualities. Humans are one of the other major hunters of salmons. These fishers often congregate in Alaska where there is an appropriate condition for hunting plenty of salmons. Humans often mimic some diverse heuristic methodologies to find a region that possesses salmons with higher quality and quantity. They employ scout ships for investigating the complete passage region. The rest of the fishers are integrated in areas with higher salmon’s intensity. Fig. 1 illustrates a scheme of great salmon run phenomena. Figure 1. A scheme of great salmon run : grizzly bear and commercial fishers The experiments prove that the humans’ hunting technique is really effective since they first separate into some subparts to investigate the whole area and then integrate in intense areas. There are still many other elements that menace salmon’s life during their migration. Waterfalls are another major danger since they can be found in all pathways. At the beginning of the salmon’s migration, they divide into subgroups using their instinct and some stochastic interprets. Each of these groups follows different pathways to their destination. Some of them choose forested passages which are full of different dangerous hunters such as Grizzly bears and salmon sharks while others move towards oceans, lakes and ponds. Released annual official reports about the incremental quality and quantity of hunted salmons, suggests a high potential of this great natural phenomenon to be simulated in the form of a parallel evolutionary strategy. Here, this concept has been utilized to create a novel intelligent optimization algorithm. In the next section, all of the abovementioned stages that occur during the natural salmon’s migration will be applied in the simulation of TGSR algorithm. Thereafter, the resulted algorithm will be compared with other intelligent optimization techniques. III. THE GREAT SALMON RUN (TGSR) ALGORITHM The proposed TGSR contains two independent intelligent evolutionary operators [18]. Each of these two operators delegates an independent salmon’s migration pathway. The first one belongs to the salmons that move through forested regions and mountain’s canyons. The other one belongs to the salmons which are passed through oceans, lakes and ponds. As it was mentioned in the former section, salmons choose their passage based on their instinct and without a meaningful inference. However, the experimental evidence shows that these creatures prefer to cross from ponds and lakes rather than canyons and forested passages [7]. Each of these ways is incorporated with their own natural menaces. Commercial fishers are concentrating on the ponds and ocean pathways while Grizzly bears hunt the salmons that pass through mountain’s canyons and forested regions [8]. Each of these two main hunters utilizes different techniques for hunting salmons with higher qualities. TGSR utilized all above steps to handle an optimization problem. Here, the main steps of the algorithm are given. A. Initialization In the proposed algorithm, each potential solution delegates the salmon intensity in a region (amount of salmons in a sub group). In other words, region with higher salmon intensity yields a solution with higher fitness. The solutions are initialized stochastically spanning to the passage dominance (between lower bound and upper bounds). (1) represents a procedure which is used to initialize random solutions with respect to the solution space.      =  +  ∗  −   1 where lb and ub are the lower and upper bounds, respectively and rand is a random number spanning to 0 and 1 with a uniform distribution. After initializing the solutions, optimization procedure is started. At the beginning of the optimization process, all of these initialized solutions (salmons sub groups) are prepared for their migration (iterative movements). It is obvious that each iteration cycle is equivalent to a natural migration phenomenon. B. Choosing Pathways for Migration Before migration, salmons choose their pathway based on their instinct. This suggests a stochastic shuffling control parameter for thrusting the salmon groups (initial solutions) in both pathways (evolutionary operators). (2) formulates a mathematical form of this process.      ℎ: ! "#$ = % & ∗ '( ) "#* = '( − "#$ + 2 where N.$ is the number of salmon groups passing through ocean and ponds, N.* is the number of salmon group passing through forested regions and mountain canyons, P0 is the number of all salmon groups which participate in the migration and μ is a sharing factor that represents the salmon’s instinct.. As seen, the proposed formulation is a strategy for shuffling the solutions stochastically. The results will confirm the effectiveness of this shuffling in the diversification of the solutions. After exerting the sharing process, these subgroups are entered in their pathway (evolutionary operator). They face different dangers while crossing these pathways. In the following, the details of the passage traversing are given. C. Crossing Lakes and Ponds In the first operator, the human hunting is simulated. Humans hire scout ships to investigate the passage dominance (solution space). These scout ships applies some arithmetic graphical search (an intelligent diversification methodology) to explore the passage as best as they can. This exploration has been mathematically modeled in (3). 23 = 24 + 56,  − 24 8 + 3  ! 2 8 23 = 24 + 56, 4 −  where t represents the current iteration number, X; represents a new detected region (new solution) and X< shows the former region of the scout ship (former solution). δx, y is calculated using (4). ? 5?, @ = @ ∗  ∗ 1 − B A 4 where T is the number of the maximum iteration, b is a random number larger than 1 and  is a random number spanning to 0 and 1 with a uniform distribution. The remaining ships (known as commercial fishers) communicate with both scout ships and other active commercial fishers to find better areas (with higher salmon intensity) for hunting salmons. Then they congregate in the areas with higher intensity of salmons. Fisher groups often consist of two main hunter ships and one recruited ship. First, the main hunters find regions with an acceptable salmon intensity (solution fitness). After that, they inform the recruited agent to exploit nearby regions to find more intense areas (solution with higher fitness). This exploitation has been mathematically modeled in (5). 2D = E ∗ 2FG − 2FH  + 2FG 5 where β is a random number spanning to 0 and 1 with uniform distribution, XR represents the new detected solution by the recruited agent, XLG is the solution obtained by the first main hunter and XLH is the solution obtained by the second one. D. Crossing Mountain Canyons and Forested Regions The second operator simulates the Grizzly bears hunting methodology. Similar to other animals, Grizzly bears communicate with each other to find a region with higher salmon intensity. Their hunting method is really simple. They always inform each other if they find an acceptable region. Then, the entire Grizzly bear groups approach the best region and search nearby areas. If they find an area with higher salmon intensity, they inform other bears. Otherwise, they leave the region and continue the local search. One of the main disadvantages of the bears hunting procedure is the lack of an independent diverse exploration. Bears hunting methodology is mathematically expressed in (6). 2M = N  O ∗ PD − QD  + PD 6 where XS represents a new detected region, BU is the best reported region by the hunting team, LU is the current region for which the bears have decided to perform a local exploitation and φ is an arbitrary angle spanning to 0 and 360 degrees. cos φ directs the bears to their destination. Fig. 2 shows the schematic of Grizzly bear’s movements around the best solution. It is obvious that these animals perform an exploitation search with different radii and angle of attacks. E. Regrouping for Spawning At the end of the migration, the survived salmons congregate in their destination for spawning. In TGSR, this natural event is simulated through a collection container. After salmons pass through their pathways (operator’s performance), the salmon subgroups (solutions) are collected in a unique container. In other words, the solutions are extracted from both operators and make a unique population. At this state, the algorithm has reached the end of the first iteration. The change in climate and urge for spawning are two main motivations which force the remaining salmons to begin another migration. Continuity of these permanent migrations turns the TGSR to a powerful iterative optimization algorithm. Fig. 3 illustrates the flowchart of the proposed TGSR algorithm. Figure 2. Schematic of Grizzly bear’s movemen Figure 3. The flowchart of the TGSR algorithm In the following section, different numerical benchmark optimization problems are applied to elaborate on the high robustness and acceptable quality of the TGSR algorithm. IV. A. RESULTS AND DISCUSSION Definition of the Control Parameters and Comparison Metrics For validating the performance of the proposed optimization algorithm, the obtained results have been compared with most of the well-known optimization techniques. The comparison metrics are measure of the quality and robustness of the algorithm. For all benchmark optimization problems, the maximum iteration number is the stopping criterion. Table 1 indicates the control parameters which are considered in this case study. In the next section, the performance of TGSR will be compared to other optimization algorithms. TGSR for Benchmark Probleems B. In this section, the performance of TGSR will be tested for optimizing some well-known unconstraint problems (functions). These functions are extracted from Belkadi et al. [2]. All algorithms were executed in 30 different runs with different initial random seeds. Table 2 compares the quality (mean) and standard deviation (robustness) of the tested algorithms in optimization problems with 30 independent dimensions. It seems that TGSR is an optimization method with high robustness and quality in optimizing the stochastic test functions with high dimensionality. It is also evident that the proposed algorithm dominates all other techniques in both robustness and quality. In the first case, DEA, CS and TGSR reached the global solution for the Schaffer function. It can also be seen that BA and SA show weaker results comparing to the other optimization algorithms. The robustness and quality of ABC and PSO are acceptable in this case. The results show that FA and SA possessed 95% and 90% success respectively which are acceptable in this case. Again, for Sphere function, all of the optimization algorithms reach the local optimum condition. However, it can be seen that TGSR and PMGA reach better optimum solutions compared to the other optimization techniques. For Griewank function, PMGA, DEA and TGSR find the global optimum solution with 100% success. It shows the high reliability of these techniques in optimizing unimodal problems. ABC, PSO and SA find an acceptable local optimum solution and FA and CS show weaker results in both quality and robustness. In optimizing the Rastrigin function; it is only TGSR that is completely successful in finding the global optimum solution. CS shows an acceptable quality in finding a nearly optimum solution. It can also be seen that BA, PSO, ABC and DEA show weak results in optimization of the Rastrigin function. In the last case, TGSR shows an explicit predominance (100% success) in optimization of the Rosenbrock problem versus other algorithms. After above numerical investigations, it can be concluded that the TGSR algorithm is highly reliable in optimizing unconstraint problems. V. CONCLUSIONS In this paper, a novel bio inspired metaheuristic method called TGSR has been proposed that is implemented based on the natural phenomenon of salmon’s migration and the dangers that are laid behind their passages. To confirm the high robustness and efficient performance of proposed method, it has been compared with most of the famous optimization techniques. The obtained results were really promising. After that the algorithm has been applied for optimal designing of spring elements. The gained results show the high potential of TGSR for dealing with serious engineering problems. In the next work, the effects of controlling parameters on the convergence speed and diversification of proposed algorithm will be verified more closely. Besides, a multi objective form of TGSR will be introduced for optimizing some real life engineering problems. REFERENCES [1] B. Akay, D. Karaboga, A Modified Artificial Bee Colony Algorithm for Real-Parameter Optimization, Information Science , doi: 10.1016/j.ins.2010.07.015. [2] K. Belkadi, M. Gourgand, M. Benyettou, Parallel Genetic Algorithm with Migration for the hybrid flowshop scheduling problem, Journal of Applied Mathematics and Decision Sciences 2006 1-17. [3] D. Karaboga, B. Basturk, On the performance of artificial bee colony (ABC) algorithm, Applied Soft Computing 8(2007) 687-697. [4] J. Kennedy, R.C. Eberhart,Particle swarm optimization, In: IEEE International Conference on Neural Networks, January, Vol.7, No. 6, 1995, pp. 1942-1948. [5] D.T. Pham, A. Ghanbarzadeh, E. Koc, S. Otri, S. Rahim, M. Zaidi, The Bees Algorithm, Technical Note, Manufacturing Engineering Centre, Cardiff University, UK, 2004. [6] R. Storn, K. Price, Differential Evolution: A Simple and Efficient Heuristic for Global Optimization over Continuous Spaces, International Journal of Global Optimization 11(1997) 341–359. [7] L.F. Sundstom, E. Petersson, J.I. Johnsson, Heart rate responses to predation risk in Salmo trutta are affected by the rearing environment, International Journal of Fish Biology 67(2005) 1280–1286. [8] E.B. Taylor, A review of local adaptation in Salmonidae, with particular reference to Atlantic and Pacific salmon, International Journal of Aquaculture 98(1991) 185–207. [9] X.S. Yang, Firefly algorithms for multimodal optimization, In: H. Broersma (Editor), Proceedings of the Stochastic Algorithms: Foundations and Applications, Sapporo, Springer, 2009, 5792, pp. 178-178. [10] X.S. Yang, S. Deb, Cuckoo search via L´evy flights, In: F. Rothlauf (Editor), Proceeding of World Congress on Nature & Biologically Inspired Computing, India: IEEE CS Press, 2009, pp. 210-214. [11] A. Mozaffari, A. Fathi, S. Behzadipour, The Great Salmon Run: A novel bio-inspired algorithm for artificial system design and optimization, International Journal of Bio-Inspired Computation 4 (2012) 286-301. [12] A. Fathi, A. Mozaffari, Modeling a shape memory alloy actuator using an evolvable recursive black-box and hybrid heuristic algorithms inspired based on the annual migration of salmons in nature, Applied Soft Computing 14 (2014) 229-251. [13] A. Mozaffari, A. Fathi, Identifying the behavior of laser solid freeform fabrication system using aggregated neural network and the great salmon run optimization algorithm, International Journal of Bio-Inspired Computation 4 (2012) 330-343. [14] A. Mozaffari, A.M. Goudarzi, A. Fathi, P. Samadian, Bio-inspired methods for fast and robust arrangement of thermoelectric modulus, International Journal of Bio-Inspired Computation 5 (2013) 19434. [15] A. Mozaffari, M. Gorji-Bandpy, T.B. Gorji, Optimal design of constraint engineering systems: application of mutable smart bee algorithm, International Journal of Bio-Inspired Computation 4 (2012) 167-180. [16] A. Fathi, A. Mozaffari, Stochastic social particle swarm optimizer: A simple and efficient tool for global optimization, Journal of Bioinformatics and Intelligent Control 2 (2013) 253-264. [17] A. Mozaffari, A. Ramiar, A. Fathi, Optimal design of classic Atkinson engine with dynamic specific heat using adaptive neuro-fuzzy inference system and mutable smart bee algorithm, Swarm and Evolutionary Computation 12 (2013) 74-91. [18] A. Fathi, A. Mozaffari, TGSR: The great salmon run optimization algorithm, International Journal of Computer Applications in Technology, In-Press (Available Online). TABLE I. CONTROL PARAMETERS OF THE BENCHMARK OPTIMIZATION ALGORITHMS Algorithm TGSR PMGA [2] Parameters &= 0.75 '\]^((^_`] = 0.8 '( = 40 [=10 '( =100 [=100 [=100 =1.6 WFP=0.1 'Fab =0.05 MigNum=3 ABC [3] Limit= 10 NP=200 PSO [4] nSW=100 [=100 FA, Ref. [9] FN=50 [=100 c=0.5 CS [10] Nests=40 [=100 '=0.25 c=0.9 SA [1] Material=1 DEA [6] '( =50 F=1.25 CR=0.3 BA [5] n=100 nep=25 [=100 [=100 [=100 nsp=10 Prob=0.1 c1= 2 IW=0.72 c2=2 e=0.95 E=0.2 d=1.0 e=8 ngh= rang/10 m=20 TABLE II. PERFORMANCE OF THE OPTIMIZATION ALGORITHMS FOR UNCONSTRAINT PROBLEMS WITH A DIMENSION OF 30 Problems (Dimensions=30) Algorithms ABC [1] PMGA BA [9] PSO [10] SA DEA [1] CS [10] FA [9] TGSR Quality (Success %) Schaffer 11.43E+000 (100%) Sphere 356.06E+000 (100%) Griewank 1.27E-001 (100%) Rastrigin 989.44E+000 (100%) Rosenbrock 123.72E+000 (75%) Robustness (Success %) Quality (Success %) 44E+000 (100%) 12.63E+000 (100%) 151.03E+000 (100%) 34.43E+001 (100%) 14.44 E-002 (100%) 0 (100%) 165.29E+000 (100%) 120.34E+000 (90%) 209.87E+000 (75%) 101.11E+000 (90%) Robustness (Success %) Quality (Success %) 23.55E-019 (100%) 23.52E+000 (66%) 4.92E+000 (100%) 3425.34E+000 (78%) 0 (100%) 23.84E+000 (100%) 23.05E+000 (90%) 6823.32E+000 (70%) 342.72E+000 (90%) 1142.45E+001 (77%) Robustness (Success %) Quality (Success %) 29.76E+000 (66%) 0.53E-007 (88%) 2131.02E+000 (78%) 3110.12E-008 (74%) 21.96E+000 (100%) 11.33E+000 (67%) 5644.32E+000 (70%) 1322.11E+000 (80%) 4591.47E+000 (77%) 4545.23E+000 (58%) Robustness (Success %) Quality (Success %) 9.00E-008 (88%) 27.53E+000 (90%) 2314.65E+000 (74%) 8554.34E+000 (88%) 78.95E+000 (67%) 19.88E+000 (%90) 121.44E+000 (80%) 7752.98E+000 (66%) 2242.12E+000 (58%) 29.65E+000 (63%) Robustness (Success %) Quality (Success %) 18.00E+000 (90%) 0 (100%) 1111.02E+000 (88%) 21.21E-004 (68%) 12.46E+000 (90%) 0 (100%) 1112.76E-001 (66%) 235.31E+000 (83%) 16.61E+000 (63%) 143.67E+000 (100%) Robustness (Success %) Quality (Success %) 0 (100%) 0 (100%) 34.00E+000 (68%) 260.78E-001 (90%) 0 (100%) 210.78E+000 (100%) 27.44E+001 (83%) 10.34E+000 (72%) 20.23E+001 (100%) 2.12E+002 (100%) Robustness (Success %) Quality (Success %) 0 (100%) 6.63E-015 (95%) 311.13E-001 (90%) 19.57E+000 (80%) 110.02E+000 (100%) 211.32E+000 (100%) 4.10E+000 (72%) 1323.39E+000 (90%) 5.06E+001 (100%) 19.76E+000 (97%) Robustness (Success %) Quality (Success %) 12.31 (95%) 144.73E+000 (80%) 145.45E+000 (100%) 1231.07E+000 (90%) 25.69E+000 (97%) 0 (100%) 5.33E-017 (100%) 0 (100%) 1.23E-002 (97%) 1.04E-002 (100%) Robustness (Success %) 0 (100%) 11.09E-023 (100%) 0 (100%) 0.34E-014 (97%) 2.96E-009 (100%)
9cs.NE
Container Relocation Problem: Approximation, Asymptotic, and Incomplete Information arXiv:1505.04229v2 [cs.DS] 7 Oct 2015 Setareh Borjian ∗ Virgile Galle † Vahideh H. Manshadi Patrick Jaillet ¶ ‡ Cynthia Barnhart Abstract The Container Relocation Problem (CRP) is concerned with finding a sequence of moves of containers that minimizes the number of relocations needed to retrieve all containers respecting a given order of retrieval. While the problem is known to be NP-hard, there is much evidence that certain algorithms (such as the A∗ search [20]) and heuristics perform reasonably well on many instances of the problem. In this paper, we first focus on the A∗ search algorithm, and analyze lower and upper bounds that are easy to compute and can be used to prune nodes and also to determine the gap between the solution found and the optimum. Our analysis sheds light on which bounds result in fast computation within a given approximation gap. We also present extensive simulation results that improve upon our theoretical analysis, and further show that our method finds the optimum solution on most instances of medium-size bays. On the “hard” instances, our method finds an approximate solution with a small gap and within a time frame that is fast for practical applications. We also study the average-case asymptotic behavior of the CRP where the number of columns grows. We calculate the expected number of relocations in the limit, and show that the optimum number of relocations converges to a simple and intuitive lower-bound. This gives strong evidence that the CRP is “easier” in large instances, and heuristics such as [4] finds near optimal solution. We further study the CRP with incomplete information by relaxing the assumption that the order of retrieval of all containers are initially known. This assumption is particularly unrealistic in ports without an appointment system. In our model, we assume that the retrieval order of a subset of containers is known initially and the retrieval order of the remaining containers is observed later at a given specific time. Before this time, we assume a probabilistic distribution on the retrieval order of unknown containers. We extend the A∗ algorithm and combine it with sampling technique to solve this two-stage stochastic optimization problem. We show that our algorithm is fast and the error due to sampling and pruning the nodes is reasonably small. Using ∗ Oracle, Burlington. Email: [email protected]. ORC, MIT. Email: [email protected]. ‡ School of Management, Yale. Email: [email protected]. § CEE, MIT. Email: [email protected]. ¶ EECS and ORC, MIT. Email: [email protected]. † 1 § our framework, we study the value of information and its timing effect on the average number of relocations. 1 Introduction With the growth in international container shipping in maritime ports, there has been an increasing interest in improving the operations efficiency in container terminals on the sea side and land side. The operations on the sea side include loading export containers on the vessels or discharging import containers from vessels and loading them onto internal trucks. The import containers are then transferred to the land side and are stacked in the storage area. These containers are later retrieved and delivered to external trucks to be distributed in the city. Due to limited space in the storage area, containers are stacked in tiers on top of each other. As shown in Figure 1, several columns of containers in a row create a bay of containers. If a container that needs to be retrieved (target container) is not located at a top most tier and is covered by other containers, the blocking containers must be relocated to another slot. As a result, during the retrieval process, one or more relocation moves are performed by the yard cranes. Such relocations are costly for the port operators and result in delay in the retrieval process. Thus, reducing the number of relocations is one of the main challenges faced by port operators. Finding the sequence of moves that minimizes the number of relocations while retrieving containers from a bay in a predefined order is referred to as the Container Relocation Problem (CRP) or the Block Relocation Problem (BRP). A common assumption of the CRP is that only the containers that are blocking the target container can be relocated. We refer to the CRP with this setting as the restricted CRP. Figure 1: Illustration of a bay of containers in storage area The CRP has been widely studied in the literature and has been shown to be NP-hard [4]. A few papers have developed mathematical models for the CRP and have solved small-sized instances of the problem exactly ([4], [14], [1]). In other papers, different heuristics are designed and tested on real-sized instances ([9], [3], [11], [5]). Many of these heuristics are fast and shown to be empirically close to optimal for small-sized instances. However, none of them have provable guarantees and their performance on large-sized instances cannot be well assessed. Among the optimization methods 2 that provide exact solution for the CRP, the A∗ algorithm (a branch and bound framework) has shown to be very effective and able to solve large instances of the problem in a time frame that is suitable for practical application [20], [22], [16]. In this paper, we apply the A∗ algorithm ([20], [22],[16]) to the CRP, and analyze various upper and lower bounds. First, we study the properties of a counting lower bound that simply counts the number of blocking containers in the initial configuration (introduced in [9]). We show that this bound is non-decreasing on each path of the A∗ tree, implying that the guaranteed optimality gap given by the A∗ algorithm may only be improved as more levels of the tree are constructed (see Proposition 2.2). Moreover, we analyze a generalized family of look-ahead lower bounds that also counts the future relocation moves due to unavoidable blocking (introduced in [22]), and we prove that this family provide tighter lower-bounds that are still monotone in each path (see Proposition 2.4 and 2.5 and Figure 10). Our result implies that using look-ahead lower bounds (with a slightly higher computation time compared to the counting bound) can decrease the number of branching needed to achieve a desired optimality gap. We also study several properties of the H heuristic presented in [4] which indicates that this heuristic serves well as an upper bound. In particular, we prove that the A∗ algorithm terminates after a certain level when the H heuristic is used combined with the appropriate lower bound (see Proposition 2.8, 2.7, and 2.9). Our numerical simulations show that, the algorithm typically finds the optimal solution much faster than what is suggested by the theoretical results (see Figures 8 and 9). We also use the idea of branching to design a heuristic called the Tree-Heuristic (TH-L, see Algorithm 2). We use randomly generated instances to benchmark several existing heuristics and the new Tree Heuristic against the optimal solution given by the A∗ algorithm. We show that TH-L has the best performance (smallest optimality gap) on average (see Table 2). Building upon the previous results, we perform an average case analysis of the CRP in a bay with finite height. First we compute the expected value of the counting lower bound ([4], see Proposition 3.1) for an evenly distributed bay. Then we provide an asymptotic result and prove that as the number of columns grows, in expectation, the optimum number of relocations converges to the counting lower bound (see Theorem 3.3). The intuition behind this result is that as the number of columns grows, the probability of finding a good column for a blocking container (i.e., a column where the blocking container will never be relocated again) approaches 1. In that case, the optimal number of relocations is essentially the number of blocking containers in the initial bay. Furthermore, we strengthen this result by showing experimentally that the expected number of relocations performed by heuristic H ([4]) also converges to the counting lower bound (see Figure 6a). This further highlights the effectiveness of both heuristics H and TH-L in the case of large instances. A critical assumption of the CRP is that the retrieval order of all containers in the bay is considered to be known in advance. However, in practice, such information is not available far in advance and the exact departure order of containers becomes known only as their retrieval times 3 approach. Here we relax this assumption in the following way: We consider a 2-stage setting, where the retrieval order of a subset of containers is known initially and the retrieval order of the remaining containers is revealed all at once at a later time. We refer to this problem as the CRP with incomplete information. Before the entire information becomes available, we assume a probabilistic distribution on the unknown retrieval orders. We develop a 2-stage approximate stochastic optimization algorithm, called ASA*, and use it to solve medium-sized instances of the CRP with incomplete information. This algorithm is an extension of the A∗ algorithm combined with sampling and pruning techniques based on the bounds defined earlier. We give theoretical bounds on the approximation error incurred by this algorithm (see Propositions 4.1, 4.2, and 4.3). Furthermore, we introduce a myopic heuristic, which is fast and performs well on average compared to the ASA* algorithm (see Figure 12). We use the heuristic to solve large instances of the problem and show through experiments that the ratio of expected number of relocations in the incomplete information setting to that of complete information converges to a constant, as the bay gets larger (see Figure 13). Moreover, we use the ASA* algorithm and the myopic heuristic to assess the value of information (see Figure 12). Our experiments show that when the retrieval order of 50%-75% of containers is known at the beginning, the loss from the missing information is negligible and the average number of relocations is very close to that of the CRP with full information. Our algorithms can serve as a decision support tool for port operators as well as an analytical tool to draw insights on managerial decisions such as determining the size/capacity of the bays and assessing the value of information. This issue of lack of information is particularly critical as it captures port operations more realistically. Understanding the value of information could help port operators design efficient appointment systems for trucks. 1.1 Literature Review Stahlbock and Voß[15] provide a general survey on port operations literature. For a recent general review and classification survey of the existing literature on the CRP as well as the stacking problem, we refer the reader to Lehnfeld and Knust [12]. Many heuristics have been developed for the CRP. Kim and Hong suggest a decision rule that uses an estimate of expected number of additional relocations for a column [9]. Caserta et al. [3] propose a binary description of configurations and use it in a four steps heuristic. Lee and Lee [11] consider an extended objective incorporating working time of cranes in a three phases heuristic. Caserta et al. [5] derive a meta-heuristic based on the corridor method, which again optimizes over a restricted set of moves and Caserta et al. in [4] present a heuristic that is defined later in this paper. Ünlüyurt and Aydın [17] propose a branch and bound approach with several heuristics based on this idea. Foster and Bortfeld [7] use a tree search procedure to improve a greedy initial solution. Finally, Petering and Hussein [14] describe a look-ahead heuristic that does not make the common assumption of the restricted CRP. In our experimental result, we use randomly generated 4 instances to compare the performance of these heuristics (and our new TH-L heuristic) to that of the optimal solution given by the A* algorithm. We show that on average our TH-L outperforms the existing heuristics. In the mathematical programming formulations that insure optimality on the entire feasible set of moves, the first binary formulation was suggested by Kim and Hong [9]. Petering and Hussein [14] propose another formulation which is more tractable but cannot solve real-sized instances efficiently. Caserta et al. [4] derive a different Integer Program (IP). Borjian et al. [2] develop an IP formulation which allows for incorporating a time component into the model. This model is used to jointly optimize the number of relocations and total service delay. In all these IP formulations, due to the combinatorial nature of the problem, the number of variables and constraints dramatically increases as the size of the bay grows, and the IP cannot be solved for large instances. A way to bypass this problem has been to look at a new type of algorithm called A∗ . It was first introduced to this problem by Zhang et al. [20], studied by Zhu et al. [22], and Tanaka and Takii [16] proposed a new lower bound for the algorithm. Our paper contributes to this line of research (applying A∗ to CRP) by theoretically analyzing several lower and upper bounds, also by computing (both theoretically and via simulation) how the optimality gap behaves as the number of branches increases. Average case analysis of CRP is fairly new. The only other paper in this direction is the recent paper by Olsen and Gross [13]. They also provide a probabilistic analysis of the asymptotic CRP when both the number of columns and tiers grow to infinity. They show that there exists a polynomial time algorithm that solves this problem close to optimality with high probability. Our model departs from theirs in two (related) aspects: (i) We keep the maximum height (number of tiers) a constant whereas in [13] the height also grows. Our assumption is motivated by the fact that the maximum height is limited by the crane height, and it cannot grow arbitrarily. (ii) We assume the ratio of the number of containers initially in the bay to the bay size stays constant (i.e., the bay is almost full at the beginning). On the other hand, in [13], the ratio of the number of containers initially in the bay to the bay size decreases (and it approaches zero) as the number of columns grows. In other words, in the model of [13], in large bays, the bay is under-utilized. Finally, we mention that another major challenge in port optimization is uncertainty (together with the value of information) which has not been considered in the literature until very recently. Zhao and Goodchild [21] model uncertainty in truck arrivals at the terminal. They assume that trucks arrive in groups and that the information is revealed for the whole group at the same time. Using this assumption of rolling information, they use a myopic heuristic to get insights on the trade-off between information and optimality. Ku [10] consider a model where the trucks arrive in groups, and the retrieval order within in each group is unknown in advance. They propose a stochastic dynamic programming for this problem. They note that the size of decision tree grows exponentially with the bay size, making the computation time prohibitive. Thus they develop a heuristic called Expected Reshuffling Index (ERI) to approximately solve the problem. This heuristic, moves each blocking container to the column that minimizes the expected number of 5 future relocations. In our work, we model uncertainty as a 2-stage stochastic optimization problem, and we use a generalization of the A∗ algorithm combined with sampling and pruning techniques to find the near optimal solution of this stochastic optimization problem. This paper is structured as follows: Section 2 presents the A∗ Algorithm in the full information case. It describes the method, introduces lower and upper bounds and derives theoretical results for these bounds. Section 3 presents the asymptotic analysis of the CRP. Section 4 provides a stochastic scheme for the case of incomplete information and studies the value of information about container departure times. In Section 5, we present several experimental results for the average case analysis of the CRP in both the complete and incomplete information cases. Finally, Section 6 concludes and suggests future research topics. The proofs for all theoretical statements are given in the Appendix. 2 Optimal solution for the CRP with full information In this section and for the sake of completeness, we present the A∗ algorithm applied to the CRP, as previously introduced by [22]. We also discuss bounds developed in the literature ([4] and [22]) and derive new theoretical results on them. 2.1 Description of the algorithm Before describing the A∗ algorithm, we review the Container Relocation Problem (CRP) and introduce a few notations used throughout the paper: We are given a bay B with C columns and P tiers, where C ≥ P ≥ 3. Initially N containers are stored in the bay. We label the containers based on their departure order, i.e., container 1 is the first one to be retrieved. The CRP corresponds to finding a sequence of moves to retrieve containers 1, 2, . . . , N (respecting the order) with a minimum number of relocations. For bay B, we denote the minimum number of relocation by zopt (B). To find a solution, we use the A∗ algorithm, which is basically a move-based approach using a special decision tree. This approach takes 4 entries: B is the bay with N containers to be solved optimally. R(D) and S(D) are functions giving respectively upper and lower bounds on zopt (D) for any configuration D. In this paper, upper bound functions that are considered also give us feasible solutions. Finally, N is the maximum number of nodes in the decision tree. The algorithm returns two results: The best incumbent (in objective function) found by A∗ , denoted zA , to which we associate the sequence of moves needed to find this incumbent called σA and the gap guaranteed between zA and zopt (B) denoted by γ. Notice that if the algorithm did not reach N nodes, then the algorithm found an solution (i.e. γ = 0 and zA = zopt (B)). Let us define the following notations: l is the level of the tree. A node is at level l, if l relocations have been done from the initial bay to get to this node. This is the reason why this method is called a move-based approach. Below we describe the algorithm in detail and introduce the notation used in the description of Algorithm 1. 6 Algorithm 1 A∗ Algorithm 1: 2: 3: 4: 5: 6: 7: 8: 9: 10: 11: 12: 13: 14: 15: 16: 17: 18: 19: 20: 21: 22: 23: 24: 25: 26: 27: 28: 29: 30: 31: 32: 33: procedure [zA ,γ]=A∗ (B, R, S, N ) Pre-processing: while target container n is on top do retrieve target container n of B and n ← n + 1 end while Initialize: zA ← ∞, l ← 0, Bl ← B, m ← 0 (number of nodes) while there exists a non-visited node do for all nodes Bl at level l do Mark node Bl as visited U(Bl ) = R(Bl ) + l and L(Bl ) = S(Bl ) + l Updating the incumbent: if U(Bl ) < zA then zA ← U(Bl ) end if Pruning: if U(Bl ) ≤ L(Bl ) or L(Bl ) ≥ zA then Prune node Bl (i.e. stop branching from this node) else Branching: for Every “Child” of Bl do if m ≥ N then Stop else add a non-visited “Child” to the tree at level l + 1 and m = m + 1 end if end for end if end for l← l+1 end while Gap: Lmin = min (L(D)) D non-visited leaf γ ← zA − Lmin 35: end procedure 34: 7 The tree represents the sequence of relocation moves. Suppose n is the target container. If n is not blocked, it can be retrieved since a retrieval is optimal. In that case, no decision has to be made, therefore no new node is created. If n is blocked, the topmost blocking container needs to be relocated to another column. This column has to be chosen in order to minimize all future relocations. In order to do so, we generate all possible feasible moves for the blocking container by creating children of the corresponding node in a decision tree procedure. Considering all possible nodes gives the optimal solution. Building the whole tree of feasible moves would not be tractable since the number of nodes increases exponentially with the number of relocations. Consequently, we use certain decision rules to prune the tree with the guarantee of keeping the optimal path in the tree. Let Bl be any configuration that appears at level l in the tree. By definition, S(Bl ) ≤ zopt (Bl ) ≤ R(Bl ) (1) Let us define the cumulative upper and lower bounds as the sum of the bound evaluated at the current state and the number of relocations already performed (i.e., l relocations have been done at level l of the tree) U(Bl ) = R(Bl ) + l and L(Bl ) = S(Bl) + l (line 11 of Algorithm 1). Notice that in this case L(Bl ) ≤ zopt (B) ≤ U(Bl ), for all Bl in the A∗ tree (2) At any level l, the algorithm prunes paths using the following two rules (line 17 of Algorithm 1): (i) If L(Bl ) = U(Bl ), then zopt (Bl ) = U(Bl ) and we can stop branching on this path. From this point, we can simply follow the feasible solution given by the upper bound. (ii) If L(Bl ) ≥ zA (i.e. the lower bound L(Bl ) is larger than the best solution found so far zA ) then this node can be pruned because the optimal solution for this node is going to be greater than its lower bound, hence greater than zA . The best incumbent is updated if a Bl such that U(Bl ) < zA is found (lines 13, 14 of Algorithm 1). By construction, the above rules maintain the optimal path in the A∗ tree. 6 1 5 4 2 3 Figure 2: Bay with 3 tiers, 3 columns and 6 containers 8 U=5 6 1 5 4 2 U=4 1 5 4 2 5 4 2 3 5 6 2 3 3 L=3 6 U=5 , L=4 6 4 U=5 , L=4 3 U=4 L=2 5 1 5 6 4 2 3 4 6 2 U=4 , L=4 3 5 6 L=3 4 2 U=5 , L=4 3 Figure 3: Example of A∗ algorithm using H as upper bound and S0 as lower bound (defined in subsection 2.2.1) Example 1 Figure 3 presents the A∗ where the initial bay is shown in Figure 2. It uses upper and lower bounds that are presented in Section 2.2. None of the nodes at level 1 can be pruned. Now let us consider the 4 nodes at level 2 (the 4 rightmost configurations in Figure 3). The third one uses rule (i) to stop branching from this node since lower and upper bounds are both equal to 4. At this level zA = 4. Therefore we can also prune the first, second and fourth nodes using rule (ii). Therefore, the tree is complete at level 2. We follow the path until the third node at level 2, and then follow the feasible solution given by the upper bound. We know from [4] that the restricted CRP is NP hard. Therefore, there exist some instances for which the number of nodes needed to find the optimal solution with this method grows exponentially with the problem size. However to limit the computation time, we set a maximum number of nodes N allowed in the A∗ tree. If the number of nodes reaches N , we return our best upper-bound as a feasible solution. In this case, we cannot insure optimality, but we can provide a guaranteed gap with the optimum solution. Let Lmin be the minimum of the cumulative lower bounds of every leaf of the tree that is not pruned by A∗ . Notice that zopt (B) ≥ Lmin . Thus zA − zopt (B) ≤ zA − Lmin = γ (line 24 of Algorithm 1). We show later that given certain properties on the lower bounds, γ is nonincreasing in N . In any case, there exists N ∗ such that if N > N ∗ then γ = 0. In our numerical average-case analysis 9 (Section 5), we show how N and γ are related. The size of the A∗ tree depends on the local lower and upper bounds used. The closer they are to the optimal solution at each node, the faster the tree is pruned, hence the faster it solves. In this paper, we define some of the possible candidates, explain these choices and provide details about the efficiency of the chosen bounds. Note that the algorithm can also be implemented using depth first search instead of breadth first search; in this paper, we implement the latter as we find experimentally that it is the most efficient one on average. 2.2 2.2.1 The Candidate Bounds The Lower Bounds The counting lower bound. This bound was introduced by Kim and Hong in [9] and it is based on the following simple observation. In the initial configuration, if a container is blocking, then it must be relocated at least once. Thus we count the number of blocking containers in B and we denote it S0 (B). Note that if a container blocks more than one container (for instance, container 6 blocks containers 1 and 4 in Figure 2), we count this container only once. Observation 2.1. For any configuration B, S0 (B) ≤ zopt (B) We define L0 as the cumulative bound computed with S0 . As mentioned in section 2.1, we want our algorithm to have the following property: As we increase N , γ should not increase. One way to enforce this is to insure that given any path of the tree, the cumulative lower bound is nondecreasing on this path. We will indeed show that L0 follows this property. Before proceeding let us define a few notations: Let ci be the ith column of the configuration and min(ci ) be the index of the container with the smallest retrieval time in ci . Now suppose we want to move the blocking container r. If we relocate r to column ci and r < min(ci ), then we call such a move a “good” move and column ci is a “good” column for r. On the other hand, if r > min(ci ), we call this move a “bad” move and ci a “bad” column for r. Proposition 2.2. For any configuration B, any level l ≥ 0, any configuration Bl in level l of A∗ and any child Bl+1 of Bl , we have L0 (Bl+1 ) ≥ L0 (Bl ). The look-ahead lower bounds. Note that the counting lower bound (S0 ) is only taking into account the initial configuration of the bay. By definition, a “bad” move implies a future relocation for the relocated container. Therefore we can construct lower bounds that anticipate “bad” moves and hence are closer to the optimal solution. This idea has been used by Zhu et al ([22]) to define 10 the following family of lower bounds. For the sake of completeness, we redefine the bounds formally. In this paper, we prove in Proposition 2.5 that these lower bounds have the non-decreasing property as we branch in the A∗ tree. The basic idea is the following: We want to count unavoidable “bad” moves in any feasible sequence of moves. In order to do so, we need to keep track of the “maximum of minimums of each column of B” denoted by MM(B) = max (min(ci )). Suppose r is the first blocking container; i∈{1,...,C} a “bad” move for r is unavoidable if MM(B) ≤ r. As we empty the bay, the maximum of minimums is changing. More precisely it depends on the sequence of moves that we use. We can, however, compute an upper bound on this value for every feasible sequence of moves. One way is to assume that every container that is relocated is discarded from the bay. At any time, the maximum of minimums in the “discarded” bay will be not smaller than if we computed it given any feasible sequence of moves. Before introducing formal notations, we give an example. 6 1 5 4 2 5 3 4 (a) B = B1 2 3 4 (b) B2 3 (c) B3 Figure 4: Example of discarded bays with 3 tiers, 3 columns and 6 initial containers Example 2 Consider the leftmost bay B in Figure 4. First, one can see that S0 (B) = 2 since 6 is blocking 1, and 5 is blocking 2. Now in B1 , 6 is blocking 1 and MM(B1 ) is 3; thus 6 has to be relocated at least twice. Therefore the optimum is at least 1 more than S0 . Now consider bay B2 where 1 and 6 have been discarded. 5 is blocking 2 and MM(B2 ) is 4; thus 5 has to be relocated at least twice. Therefore the optimum is at least 2 more than S0 . Now we formalize this idea: Let n1 be the smallest container in the bay. Let k be a container (k ∈ {n1 , . . . , N}) and let Rk (B) be the set of containers blocking k and not blocking any container k′ such that k′ < k. Let Bn1 = B and let Bn1 +1 be the bay where container n1 and containers in Rn1 (B) have all been discarded from Bn1 . By recursion, we can define a sequence of bays Bk for k ∈ {n1 + 1, . . . , N}. For p ∈ N, we now define the pth look-ahead lower bound (denoted by Sp (B)): Sp (B) = S0 (B) + min(p+n1 −1,N ) X X k=n1 r∈Rk (B) χ(r > MM(Bk )), (3) where χ(·) is the indicator function. The corresponding cumulative lower bound is denoted by Lp (B). 11 Observation 2.3. For every configuration B and p ∈ 1, . . . , N, Sp (B) ≤ zopt (B) Proposition 2.4. For p ∈ 1, . . . , N and any bay B, we have Lp (B) ≥ Lp−1 (B). This result shows that as we increase p, Sp gets closer to the optimal solution. In Section 5, we numerically study the effect of the choice of lower bounds in the A∗ algorithm in terms of the number of nodes needed to solve a random set of instances. We observe that on average, most of the gain comes from the first look ahead. We remark that SN (B) = SN−C (B) simply because when we reach N-C, there is always at least one empty column. Note that if k is the smallest integer such that Bk has an empty column, then the lower bound does not change, i.e., SN (B) = Sk−1 (B). Thus, in practice, the process of computing the lower bounds terminates much before N − C. In the next proposition, we show that similar to L0 , the cumulative upper bound Lp has the desirable monotone property, i.e., they do not decrease as we branch in the A∗ tree. Proposition 2.5. For any p ∈ 1, . . . , N, configuration B, level l ≥ 0, configuration Bl in level l and any child Bl+1 of Bl in the A∗ tree, we have Lp (Bl+1 ) ≥ Lp (Bl ). In general it is hard to find the rate at which the lower bound increases on a given path. In Section 5, we show how the lower bound SN increases on the optimal path of random instances. 2.2.2 The Upper Bound Any feasible solution can be used as an upper bound. Thus, we use heuristics to construct feasible solutions that serve as upper bounds. Ideally we would want a heuristic that is close to the optimal solution and at the same time easy to compute. Note that we need to compute an upper bound at every node. The heuristic proposed by Casserta et al. ([4]) seems to meet those criteria. For completeness, we redefine this heuristic. In this article we prove several properties of the upper bound that we will use in later parts (see Propositions 2.7, 2.8 and 2.9). The Heuristic H ([4]) Suppose n is the target container located in column c, and r is the topmost blocking container in c. We use the following rule to determine c∗ , the column where r should be relocated to. Recall that min(ci ) is the minimum of column ci . We set min(ci ) = N + 1 if ci is empty. We have:   argmin {min(ci ) : min(ci ) > r} if ∃ ci such that min(ci ) > r     ci ∈{1,...,C}\c ∗ c =   {min(ci )} otherwise   cargmax ∈{1,...,C}\c i 12 The rule says: if there is a column where min(ci ) is greater than r (r can do a “good” move), then choose such a column where min(ci ) is minimized, since columns with larger minimums can be useful for larger blocking containers. If there is no column satisfying min(ci ) > r (r can only do “bad” moves), then choose the column where min(ci ) is maximized in order to delay the next unavoidable relocation of r as much as possible. We will refer to this heuristic as heuristic H and denote its number of relocations by zH (B). Example 2 Consider the bay B in Figure 2. Using heuristic H, the sequence is going to be: relocation of 6 to column c3 , retrieval of 1, relocation of 5 to column c1 , retrieval of 2, relocation of 6 to column c2 , retrieval of 3, relocation of 5 to column c2 , retrievals of 4,5 and 6. Thus zH (B) = 4. Notice that we had S2 (B) = 4, so heuristic H is optimal for this initial configuration. By definition, H is a feasible solution, so it is an upper bound on the optimal solution. Observation 2.6. For any configuration B, we have zopt (B) ≤ zH (B). The heuristic H has a certain number of useful properties stated below. Proposition 2.7. In a bay with C columns, for any configuration B with at most C containers, we have S0 (B) = zopt (B) = zH (B). (4) Proposition 2.8. In a bay with C columns, for any configuration B with at most C + 1 containers, we have S1 (B) = zopt (B) = zH (B). This result implies that if we use heuristic H as an upper bound and the S1 lower bound in the approach, the tree will stop at most after N − C − 1 retrievals with the guarantee of an optimal solution. We provide two similar bounding results on H. A∗ Proposition 2.9. In a bay with C columns, for any configuration B with at most C + k containers, we have: • zH (B) ≤ zopt (B) + 2, if k = 2 • zH (B) ≤ zopt (B) + k(k+1) 2 , if 3 ≤ k ≤ C. Remark 2.10. The following example shows that this upper bound can increase as we branch in the A∗ tree. In Figure 5, bay (a) shows the initial configuration and bay (b) is one of its two “children”. It is easy to check that heuristic H needs 7 relocations for bay (a) and 8 for bay (b). 13 5 5 9 7 9 7 1 2 4 2 4 3 6 8 6 8 3 (a) (b) Figure 5: Heuristic H can increase on a path of A∗ tree 3 An asymptotic analysis of CRP In this section, we study CRP for random large bays and we show that as the number of columns in the bay grows, the problem gets “easier” in the sense that the gap between the optimal solution and our simplest lower bound (S0 ), does not increase on average, and in fact it is bounded by a constant. The basic intuition is that, as the number of columns grows, for any blocking container, we can find a “good” column with high probability. This implies that each blocking container is only relocated once with high probability. Throughout this section, we assume that initial configurations have P tiers, C columns, N containers and that there are exactly h containers in each column, where h ≤ P − 1. For more clarity we denote by BC such a bay with C columns.We assume that the initial configuration is a uniform sample among all possible such configurations. Notice that in that case, when C grows to infinity, N = h × C also grows to infinity. First let us explain how a uniformly random bay is generated. We view a bay as an array of P × C columns. The slots are numbered from bottom to top, and left to right from 1 to PC. For example, let P = 4 and C = 7, the second topmost slot of the third column is 11. The goal is to get a bay B with uniform probability, meaning each container is equally likely to be anywhere in the configuration, with the restriction that there are h containers per column. We first generate uniformly at random a permutation of {1, . . . , N} called π. Then we assign a slot for each container with the following relation: B(j, i) = π(h × (i − 1) + j) for j ≤ h and B(j, i) = 0 for j ≥ h + 1. One 1 can see that each bay is generated with probability N! . There is a one to one mapping between configurations with C columns and permutations of {1, . . . , hC}, denoted by ShC . Finally, we denote the expectation of random variable X over this uniform distribution by EC [X]. Now we compute the expected counting lower bound. Proposition 3.1. Let S0 be the counting lower bound (defined in Section 2), we have EC [S0 (BC )] = αh × C, 14 (5) where αh is the expected number of blocking containers in one column and can be computed as h−1 X αh = k=1 k × pk,h (6) and pk,h = P[there are k blocking containers in a column with h containers] can be computed by recrusion as k ∀h ≥ 0, p0,h = X1 1 and ∀k ≥ 1, pk,h = pk−j+1,h−j h! h j=1 Remark 3.2. Note that αh only depends on the distribution of the relative order of the h containers in one column (and not on the actual labels). Thus the expected number of blocking containers in one column only depends on its height. The major result of this part is the following. In the asymptotic case where the number of columns increases to infinity, the expected optimal number of relocations is asymptotically proportional to the expected number of blocking containers (the counting lower bound). Theorem 3.3. Let S0 be the counting lower bound (defined in Section 2) and zopt be the optimal number of relocations. Then for C ≥ h + 1, we have h i EC zopt (BC ) ≤ f (C) (7) 1≤ EC [S0 (BC )] where f (C) = 1 + K C → 1 C→ ∞ (8) where K is a constant defined by equation (19). The proof of Theorem 3.3 is given in the Appendix. Here we just give an intuition of the h i proof. We show that as C grows, with high probability EC+1 [zopt (BC+1 )] − EC zopt (BC ) is exactly h i αh . Therefore, for C large enough, EC zopt (BC ) essentially behaves like αh × C, which is equal to EC [S0 (BC )] (according to Proposition 3.1). In the next corollary, we show that the optimal solution of the unrestricted CRP has a similar asymptotic behavior. We remind that the unrestricted CRP refers to the problem where we can also relocate non-blocking containers. Corollary 3.4. Let zgen (BC ) be the optimal number of relocations for the unrestricted CRP. For C ≥ h + 1, we have h i EC zgen (BC ) 1≤ ≤ f (C) (9) αh C where f is the function defined in Theorem 3.3. 15 The above theorem gives insights on how the expected optimal solution of the CRP behaves asymptotically on random bays. To conclude this section, we show experimentally that the same result holds for heuristic H, i.e., the ratio of E [zH (BC )] and E [S0 (BC )] converges to 1 as C goes to infinity. For each size C, we compute both expectations over a million instances, take their ratio E[zopt (B )] E[z (B )] and plot the result in Figure 6a. Notice that we have 1 ≤ E[S0 (BCC)] ≤ E[SH0 (BCC)] , so Figure 6a also shows experimentally that Theorem 3.3 holds. 1.4 1.3 1.2 1.25 E[H-S0] E[H]/E[S0] 1 1.2 1.15 0.6 1.1 0.4 1.05 1 0.8 0.2 0 20 40 60 80 100 (a) Convergence of the ratio 0 200 400 600 800 1000 C: Number of columns C: Number of columns E[zH (BC )] (b) Convergence of the difference E [zH (BC )] − E [S0 (BC )] E[S0 (BC )] Figure 6: Simulations for the Asymptotic Theorem First, note that Figure 6a implies that the relative gap between heuristic H and S0 shrinks to E[zH (BC )]−E[zopt (BC )] E[z (BC )]−E[S0 (BC )] 0 as C increases. Moreover we have and thus the relative gap ≤ H E[S 0 (BC )] E[zopt (BC )] of H with optimality also converges to 0 as C grows to infinity. h i In the proof of Theorem 3.3, we also study the function g(C) = EC zopt (BC ) − EC [S0 (BC )]. Note that g(C) ≤ EC [zH (BC )] − EC [S0 (BC )] where the right-hand side of the inequality is the function plotted in Figure 6b. The plot shows that g(C) ≤ 1.25 for all C, meaning that g(C) is bounded as we proved in Theorem 3.3. Moreover, the plot implies that heuristic H is on average at most 1.25 away from the optimal solution, so heuristic H is relatively more efficient in the case of large bays. Intuitively, the probability of having a good column converges to 1, as we increase the number of columns; hence the problem tends to become easier as C grows. Finally, in the proof, we note that the rate of convergence for the optimal solution to S0 is at least C1 . Interestingly, we can infer from Figure 6a. that the rate of convergence of the ratio for heuristic H is also proportional to C1 . 4 CRP with Incomplete Information The A∗ algorithm as explained in Section 2, relies on the assumption that the departure order of containers is known in advance. However, in practice, we often only know the departure order of 16 some of the containers (those that are going to depart in the near future). In this section, we explain how the A∗ algorithm can be adapted in a Dynamic Programming (DP) framework for solving the CRP in the case that some of the decisions should be made with incomplete information. We use the A∗ algorithm to obtain an approximate solution for this problem. In what follows, we describe the setting of the problem, introduce some notations, and explain the algorithm for the CRP with incomplete information. Moreover, we show how to bound the approximation error. In Section 5, we present the results of computational experiments. The CRP with incomplete information involves retrieving N containers from a bay with C columns and P tiers, where partial information about the departure order of the containers is initially available. To model the CRP with incomplete information, we discretize time into time steps of equal length and assume that each move (a relocation or a retrieval) takes exactly one time step. Further we assume that the label (or index) of a container indicates the earliest time that it can be retrieved (i.e., container n can be retrieved at time n or later). Usually, very little information is available about the containers that are going to be retrieved far in the future. Thus, it is reasonable to assume that at any given time step t, we only know the departure order of a certain number of containers in the bay (the containers that are going to be retrieved within a short time horizon after t). We refer to such containers in the bay as known containers. Similarly, we refer to the remaining containers in the bay as unknown containers. By definition, all unknown containers have larger indices (i.e., later departure times) than the known containers. As time passes, some of the known containers are retrieved and as more information becomes available, some of the unknown containers become known. In general, the information might be updated multiple times during the retrieval process (every time that the arrival time of a truck is provided by the truck driver, the information gets updated and some unknown containers become known). In the most general case, the information can be updated every time step. Alternatively, we can consolidate several small pieces of information into one or a few pieces, and assume that the information is revealed at Γ different times during the retrieval process (i.e., Γ is the number of time that information is updated). In this case, we have a multi-stage problem and Γ sets of decisions need to be made. In this paper, we focus on a 2-stage setting; we assume that a subset of containers is initially known and that the departure order of all the remaining ones becomes known at time t∗ . We denote the set of known containers by K and assume that containers {1, 2, . . . , |K|} are those known at time zero. Similarly, the set of unknown containers is denoted by U, and containers {|K| + 1, . . . , N} become known at time step t∗ > 0. We refer to this setting as the 2-stage CRP since there are two types of decisions that need to be made: first-stage decisions (retrievals and relocations before time step t∗ ) and second-stage decisions (retrievals and relocations after time step t∗ ). We assume that before t∗ , we have probabilistic information about the containers in U, meaning that we know the probability of realization of each possible departure order. Such information can be obtained from historical data or from an appointment system that provides some estimate of departure times of 17 the containers (for example a time window for retrieving each container). We denote the set of possible departure orders of the containers in U (possible scenarios) by Q. From now on, we assume 1 that all scenarios are equally likely, i.e., the probability of each scenario is , and the number of |Q| scenarios is (N − |K|)!. Note, however, that we could use the algorithm to solve the CRP with any other probability distribution on the departure order of unknown containers. We use a 2-stage stochastic optimization technique to solve this problem, where in the first-stage we minimize E[z] as follows: min E[z] = σ1 ,...,σt∗ −1 X 1 z(B(q)). |Q| (10) q∈Q where B(q) is the resulting bay when scenario q is realized, z(B(q)) is the total number of relocations for B(q), and σ1 , . . . , σt∗ −1 are the first-stage decisions. The 2-stage problem can be solved with the A∗ algorithm as follows: (1). We build the tree with t∗ − 1 moves for time-steps 1, 2, . . . , t∗ − 1, in a similar way as illustrated in Figure 3; we denote this tree by T[1,t∗ −1] . (2). For each node at level t∗ − 1, we need to compute the expected number of remaining relocations. We enumerate all possible scenarios and solve the CRP with complete information corresponding to each scenario, using the A∗ algorithm. (3). We find p∗ (the optimal path or sequence of moves) that minimizes the expected total number of relocations over all paths. (4). Once p∗ up to time-step t∗ − 1 is selected and we observe the information at t∗ , we use the A∗ algorithm to solve a specific instance through the end. Notice that to find the optimal path for time interval [1, t∗ − 1], we need to solve up to (C − ∗ 1)(t −1) (N − |K|)! instances in Step (2) with the A∗ algorithm. Although A∗ is fast, the number of scenarios is prohibitively large and enumerating all scenarios is not feasible due to limited resources of memory and long computation time. We next explain how we use sampling and pruning to overcome these issues. We also quantify the error incurred as a result of sampling and pruning. We refer to the resulting algorithm as ASA∗ (Approximate Stochastic A∗ ). Limiting the number of possible scenarios on each path. We overcome this issue by sampling S scenarios on each path and computing the number of relocations for the sampled departure orders rather than for all possible orders. For each path p, let z̄ be the number of relocations averaged over samples. Also let E[z] be the true mean. To determine the number of samples needed to get a good approximation, we use the following version of Hoeffding’s inequality: ! −2Sδ2 P(|E[z] − z̄| > δ) ≤ 2 exp , (rmax − rmin )2 18 (11) where δ is a pre-specified level of desired precision, and rmax /rmin are lower/upper bounds on random variable z. Note that we can set rmin = 0; for rmax , we do not have a tight bound, but we can use N(P − 1) as an upper bound (since each of the N containers is blocked by at most P − 1 containers). Let us denote the desired probability for bounding the error (i.e., RHS of (11)) by ǫ. For a given δ and ǫ, the required number of samples can be computed as follows. S≥ r2 max ln 2ǫ −2δ2 . (12) By sampling from the possible scenarios on each path, we can significantly reduce the number of scenarios (and thus the computation time). For example, for a bay with 7 columns, 4 tiers, 21 containers, and |K| = 6, the total number of possible scenarios on any of the paths at time t∗ is about 1011 . Using inequality (12), the total number of scenarios would be around 30,000 for δ = 0.5, ǫ = 0.05, and rmax = 63. Note that by sampling, we incur an error and ASA∗ may choose a suboptimal path pASA where E[zpASA ] > E[zp∗ ] (recall that p∗ is the optimal path that would be chosen without sampling). In the next proposition, we show that such an error, denoted by ∆ e1 = E[zpASA ] − E[zp∗ ], is bounded in expectation (over a uniform distribution on the initial bay). Proposition 4.1. Suppose for each path, we estimate the number of relocations using S independent samples, where S is given in (12). Also suppose ASA∗ chooses path pASA as the optimal path, and s π e1 = E[zpASA ] − E[zp∗ ]. We have E[e1 ] ≤ 2δ ǫ . − ln( ) 2 Pruning the paths of T[1,t∗ −1] . To address this issue, we use the upper bound and lower bounds to prune the nodes of T[1,t∗ −1] , similar to the A∗ algorithm. However, since some of the containers are unknown before t∗ , we have to compute the expectations (E[L] and E[U]). Again, we use the idea of sampling and we estimate these values by computing L and U using S samples, where S is obtained from Inequality (12). Because of the sampling error, we may prune an optimal path by mistake, resulting in an error that is illustrated in Figure 7. This error is the difference between E(Up̂ ) (the true upper bound of the path with the minimum estimated upper bound), and E(Lp̃ ) (the true lower bound of the path selected by ASA∗ for pruning). Intuitively, this is because E(Up̃ ) is the worst we would achieve if we prune p̃ (by mistake), and E(Lp̂ ) is the best we could achieve if we do not prune p̃. In the next two propositions, we show that the error due to pruning is bounded, whether we prune some paths once at t∗ − 1 (resulting in error e2 ) or prune some paths at several time-steps before t∗ − 1 (resulting in error e3 ). Proposition 4.2. Suppose that for each path p at time-step t∗ − 1, we estimate the expected lower and upper bounds (Lp and Up ) from S samples, where S is given in (12). Also, suppose ASA∗ 19 Figure 7: Illustration of the error due to pruning: the thick line segment is the error as a result of pruning the optimal path by mistake. s chooses to prune one or more paths. We have E[e2 ] ≤ 2δ π ǫ . − ln( ) 2 Proposition 4.3. Suppose we prune some paths at m time-steps t1 , t2 , ..., tm < t∗ − 1. At each time of pruning and for each path p, we estimate the expected lower and upper bounds (Lp and Up ) from S samples where S is given in (12). Also, suppose that at each time, i, of pruning, ASA∗ chooses to prune one s or more paths (denoted by p̃i ). The expected total loss, E[e3 ], is bounded    ǫ  2 2   s  )π −ln( d d min min max  max ǫ 2   π dmin  ǫ 2  2  δ 2δ  + Up̂  , where Up̂ = max{Up̂1 , . . . , Up̂m }, ( )  δ + by m  ( ) ǫ   2 δ 2 2     − ln( ) 2 di = Lp̃i − Up̂i , dmin = min{d1 , . . . , dm }. In Propositions 4.1-4.3, we bound the loss that can be incurred by pruning some paths at time − 1 (e1 and e2 ) or at t < t∗ − 1 (e3 ). Notice that for fixed δ and ǫ, the errors e1 and e2 are independent of the bay size if we increase the number of samples S according to (12); thus if we prune paths only at t∗ − 1, the loss remains unchanged and the relative loss (as a percentage of total relocations) decreases as the bay gets larger. Therefore, for large bays and “hard-to-solve” configurations, one can pick larger δ and ǫ that result in a smaller number of samples, and the relative error would still be small. Table 1 shows e1 , e2 and e3 . The losses are very small even for combinations of δ and ǫ that result in reasonably small number of samples. For example, for δ ≤ 1 and ǫ < 0.1, E[e1 ] and E[e2 ] e1 + e2 are no more than 2. Because e1 and e2 are independent of the bay size, the relative error ( ) E[z] decrease as the bay gets larger (E[z] is the average number of relocations when full information is available). For the e3 , this measure is almost constant for different bay sizes and can be controlled by changing ǫ, δ, and m (number of times that we do pruning at t < t∗ − 1), t∗ 20 δ ǫ E[e1 ] and E[e2 ] C E[e3 ] 3] % error( E[e E[z] ) 0.1 0.1 0.1 0.5 0.5 0.5 1 1 1 0.01 0.05 0.1 0.01 0.05 0.1 0.01 0.05 0.1 0.15 0.18 0.2 0.77 0.92 1.02 1.54 1.85 2.05 10 15 20 25 30 35 40 45 50 0.91 1.36 1.81 2.26 2.72 3.17 3.62 4.07 4.52 0.07 0.073 0.074 0.075 0.076 0.076 0.076 0.076 0.076 Table 1: Left table: Expected loss due to sampling and pruning at t∗ − 1, for C = 7, P = 4, and N = 21; Right table: Expected loss due to pruning at t < t∗ − 1 for ǫ = 0.05, δ = 0.5, dmin = 1, max Up̂ = 2N, and m = 5 In Section 5, we use ASA∗ to solve the CRP with incomplete information for a bay with 7 columns and 4 tiers and with different amounts of information initially available. Moreover, we introduce a heuristic for this problem and compare the results of ASA∗ with those of the heuristic. 5 Experimental Results In this section, several experimental results are presented to further understand the effectiveness of our algorithms in both complete and incomplete information settings. In the complete information case, we study thoroughly the A∗ algorithm and the effect of parameters on the efficiency and performance of the algorithm. First we show that using the Nth look-ahead lower bound improves dramatically the computational tractability of the algorithm. Moreover, our experiments shows that on the optimal path of the tree, the Nth look-ahead lower bound reaches the optimum solution after a few levels. We also show the trade-off between N (maximum number of nodes in the tree) and the number of instances solved optimally. Further we introduce a new class of heuristics, the Tree Heuristic (TH-L), compare it with 3 existing heuristics ([9], [4], [14]) and show that it outperforms the existing heuristics. In the incomplete information setting, we show through experiments that the ASA∗ algorithm is fast and efficient and most of the instances are solvable within a reasonable time for mediumsized instances. We introduce a myopic heuristic which expands on the H heuristic in [4]. Using the ASA∗ algorithm and the heuristic, we study the value of information. Our simulations results show that while more information results in fewer relocations, the marginal value of information decreases with the level of information. We also use the myopic heuristic to examine the effect of 21 the level of information on the number of relocations for different bay sizes. We show that for any level of information, the ratio of relocations with incomplete information and complete information converges to a constant as the bay gets larger. 5.1 Experimental results for complete information In most of the experiments, we consider medium-sized instances of the CRP. We consider bays of size 4 tiers and 7 columns with 21 containers (P = 4 = h + 1, C = 7 and N = 21 = hC with 3 containers per column). We generate randomly 100,000 instances using the uniform distribution on bays described in Section 4. The effect of lower bounds on the size of the A∗ Tree. In Section 2, we introduced a family of lower bounds (S0 , S1 ,. . . ,SN ). Clearly SN is more computationally expensive to use than S0 , but we proved that SN was a tighter lower bound. We show here that using SN improves the performance of the A∗ algorithm significantly. For each instance, we solve it using 4 types of lower bounds S0 , S1 , S2 and S21 (here N = 21). For each of them we record the number of nodes needed to solve the instance optimally. Figure 8 presents the results. First, we show in the box-plots, the distribution of the number of nodes for each of those lower bounds. Second, we give the average number of nodes. We give two main insights from this experiment. First, the average number of nodes needed to solve with S21 is 1/3 of the number of nodes with S0 . Also, we point out that using S1 and S2 instead of S0 decreases the average number of nodes by 1/3 and 1/2, respectively. The fact that the number of nodes is decreasing as we use tighter lower bounds is not surprising and it is aligned with what we proved in Section 2. The more surprising insight from the experiment is that introducing lower bounds that look just one or two steps ahead (i.e., S1 and S2 ) makes a great improvement in terms of performance of the A∗ approach, without affecting the computation time significantly. Second, it can be seen that the box is concentrated around 0 for each lower bound, which implies that most instances are solved within a few hundred nodes. What influences the average number of nodes are the “hard-to-solve” cases where a large number of nodes is needed. Using S21 instead of S0 makes the A∗ algorithm more efficient by decreasing the number of nodes by a factor of 3 for those cases. From now on, we use S21 as the lower bound. Recall that actually we only need to compute Sk for k ≤ N − C, as Sk+1 , . . . , SN are all equal to Sk . Taking advantage of this property further improves computational tractability. The convergence rate of the lower bound. After introducing the lower bounds, we have shown in Propositions 2.2 and 2.5 that on any given path, the lower bound is non-decreasing. The efficiency of the algorithm mainly depends on the rate of increase of the lower bound on each path. If this rate is high, then the algorithm has a greater chance to find the optimal solution with fewer 22 Figure 8: The effect of the Lower Bound on A∗ Difference between L0 and optimum nodes, as the tree is pruned faster. The lower bounds can either “collapse” with the upper bounds, or exceeds the best incumbent available. In this experiment and for the sake of clarity, we only focus on the rate of convergence of the lower bound on the optimal path. For each instance, we find the optimal path, and at each level l, we compute the difference between S21 (Bl ) and zopt (Bl ). We average this difference on all instances and plot the results in Figure 9 0.25 0.2 0.15 0.1 0.05 0 0 2 4 6 8 10 12 14 level of the A* Tree Figure 9: The convergence rate of the lower bound on the optimal path First of all, we can see that even at level 0 (meaning at the root node), the average difference is less than 0.25. This shows that on average the lower bound is close to optimal, therefore it does 23 not need to increase a lot to reach the optimal solution. Second, we can see that after level 10, the average gap is less than 0.001, meaning that after 10 relocations, in most cases, the lower bound has reached optimality on the optimal path. Therefore, this path will terminate at level 10 if the upper bound also collapsed to the optimal. Finally, the trend of the curve shows that the gap between optimal and the lower bound decreases faster at the beginning of the tree. A simple way to explain this is that the lower bound increases when a future “bad” move can be predicted. But such bad moves become harder to predict as the bay gets emptier (there are more empty columns in the bay). Percentage of instances solved optimally The effect of N . By construction, the A∗ method is tunable. In this experiment, we study the impact of N on the average guaranteed gap with optimality, and the percentage of instances solved optimally. Notice that from Propositions 2.2 and 2.5, we know that the guaranteed gap is a non-increasing function of N . We solve each instance with different N and we record the gap with the optimal solution obtained by the A∗ algorithm. We show the results in Figure 10. On the left, we give the average gap as a function of N and on the right, we show the percent of instances solved optimally. 0.4 0.35 Average Gap 0.3 0.25 0.2 0.15 0.1 0.05 0 0 1 2 3 4 5 6 1 0.95 0.9 0.85 0.8 0.75 0.7 0 1 2 3 4 5 6 log(N) log(N) (a) Average Gap as a function of N (b) Percentage of instances solved optimally as a function of N Figure 10: The Effect of N First, we observe that the average guaranteed gap at the root node is very small (less than 0.4). Also, in more than 70% of instances, the optimal solution is found at the root node. Second, as we increase N , the gap sharply decreases and the number of instances solved to optimality increases. This experiment is very useful from a practical a point of view in order to determine N . We can set an average gap that we allow in our solutions and infer the minimum N that is needed to achieve this performance on average. For example for bays of 4 by 7, if we allow for a gap of 0.05 on average, we can set our N to 100. This experiment is related to the first experiment. As shown in Figure 8, most instances only require few hundreds of nodes, but there are some that require hundreds of thousands. This explains 24 the “concavity” of the function in the left plot and the “convexity” of the function in the right plot. In conclusion, this experiment highlights the trade-off between the quality of the solution (represented by the average guaranteed gap) and its tractability (represented by N ). Benchmark of a new heuristic and existing heuristics. Many heuristics have been developed for the CRP. From a practical point of view, heuristics are valuable since they are fast and easy to implement in container terminals. Therefore, it is relevant to evaluate their performance to advise operators. In order to benchmark existing heuristics, one can measure: • The distribution of the difference between heuristics and the optimal solution; and • The expected performance ratio of the heuristic defined as PR(heuristic) = zheuristic − zopt zopt (13) , where zheuristic is the number of relocations in the heuristic solution. PR shows the relative gap with optimality for a given heuristic. From Figure 8, if we set N to 400, 000, then all 100, 000 instances are solved optimally using the algorithm. In addition to heuristic H, we study two other existing heuristics presented by Kim and Hong (KH from [9] which uses the estimation of future relocation) and Petering and Hussein (LA-5 from [14] that takes into account “repositioning moves”, i.e. repositioning containers that are not in the same column as the target container). A∗ Gap with Heuristic H Heuristic KH Heuristic LA-5 Heuristic TH-2 Optimal Distribution Distribution Distribution Distribution 0 87.0% 31.8% 83.5% 95.7% 1 11.4% 21.4% 13.7% 3.98% 2 1.4% 21.3% 2.0% 0.3% ≥ 3 0.2% 11.4% 0.3% 0.02% E [PR] 1.44% 16.0% 1.81% 0.44% Table 2: Benchmarks of Heuristics on 100,000 instances We use the same idea as in the A∗ algorithm and introduce a new class of heuristics that can improve any existing heuristics; we refer to this class as Tree Heuristic (TH-L). The basic idea of TH-L is to take the L best columns and branch on them to construct a decision tree. The L best columns can be chosen using any of the existing heuristics that compute a score for each column. Using this principle and considering several good candidates for each relocation, we are less likely 25 to make a mistake. Here, we implement the TH-L with the H heuristic. The algorithm is presented in Algorithm 2. In our experiment, we set L = 2. Note that TH results in less or the same number of relocations compared to H since the path of H is included in the tree of TH-L. Algorithm 2 Tree Heuristic 1: 2: 3: 4: 5: 6: 7: 8: 9: 10: procedure [ZTH ] = TreeHeuristic(B, L) ZTH ← 0 while B is not empty do Retrieval: if target container n is on top of its column then Retrieve n form B Relocation: else r ← topmost blocking container C1 ← sort arg increasingly {min(ci )| min(ci ) > r} ci ∈{1,...,C}\c 11: C2 ← sort arg decreasingly {min(ci )| min(ci ) < r} 12: C3 ← [C1 , C2 ] S ← C3 [1 : L] ZTH = ZTH + min{TreeHeuristic (B where r moves to column s,L)} 13: 14: end if 16: end while 17: end procedure 15: ci ∈{1,...,C}\c s∈S Results for the four heuristics are summarized in Table 2. First, H is optimal in most instances (87%). This is one of the main reasons that heuristic H was chosen as an upper bound in the A∗ method. Second, TH-2 is indeed closer to optimality than H, KH and LA-5, in distribution and in terms of the average performance ratio. Finally, notice that the percentages for LA-5 do not sum to 100% since there are cases for which LA-5 is better than A∗ , which is because LA-5 considers “repositioning moves”, i.e., it solves for the unrestricted CRP. As a result, for 0.5% of the 100,000 instances, LA-5 solves the instance with one relocation less than A∗ . In our last experiment for complete information, we study how the parameter L affects the performance of the TH-L heuristic. We consider the same 100,000 instances and solve them with L varying from 1 to 6, and we record their performance ratio. Notice that TH with L=6 considers all possibilities for the blocking container therefore it gives the same solution as the A∗ without the use of bounds. Thus PR(TH-6) = 0. Further note that L = 1 gives heuristic H. The main observation is that the marginal gain of branching is maximum when we increase L from 1 to 2. By considering two promising columns instead of one, TH-2 finds better solutions 26 L PR (TH-L) 1 2 3 4 5 6 1.44% 0.44% 0.27% 0.20% 0.16% 0% Table 3: Effect of parameter L on the performance of heuristic TH-L for most instances where H was not optimal. Note that increasing L (considering more candidate columns) will further improve the solution; however the gain from more branching is small considering the exponentially increasing cost of computation. 5.2 Experimental results for the CRP with Incomplete Information Number of nodes and computation time for ASA∗ . Stochastic optimization methods that are based on enumerating scenarios are usually computationally expensive. The ASA∗ algorithm, however, is fast and tractable due to the use of sampling and pruning that allow for suppressing many nodes in the tree. More importantly, the ASA∗ is tunable in the sense that one can set ǫ and δ to change the number of nodes and thereby solve an instance within a desired amount of time, and yet ensure that the loss from using large ǫ or small δ is bounded (as shown in propositions 4.1-4.3). Figure 11a shows the cumulative distribution of the number of nodes (after pruning) for the tree up to t∗ =11, for a bay with 7 columns, 4 tiers, 3 containers per column, and |K| = 11 (Recall that t∗ is the time step at which the set of unknown containers become known and |K| is the number of containers that are initially known). We implement ASA∗ with δ = 0.5 and ǫ = 0.05. It can be seen that for half of the instances, the tree up to t∗ has 100 or fewer nodes. Also, about 90% of instances have 200 or fewer nodes. Note that the nodes of the trees that are constructed after time t∗ for solving instances corresponding to different scenarios do not have too much of an effect on computation time because the A∗ algorithm is very fast. Figure 11b shows the cumulative density of the average computation time. It can be seen that half of the instances are solved in less than two minutes and 90% of the instances are solved in 15 minutes or less. Although the ASA∗ algorithm is fast for medium-sized bays, it might not be tractable for large bays. We next introduce a myopic heuristic and use both ASA∗ and the heuristic to provide several insights on the value of information. Myopic Heuristic. This is an extension of the heuristic H that we explained in Section 2. Similar to the setting that we explained in Section 4, the problem is to retrieve N containers from a bay with C column and P tiers. In the incomplete information setting, the departure order of containers {1, 2, . . . , |K|} are known at time zero; the departure order of containers {|K|, |K|+1, . . . , N} become known at time step t∗ > 0. Suppose n is the target container located in column c. If n is not blocked by any container, it is retrieved without any relocation. Otherwise, let r be the topmost blocking container in column 27 (a) ASA∗ implemented with δ = 0.5 and ǫ = 0.05 (b) Experiments were done on desktop computer with Intel i73770s processor (3.90 GHz) and 16Gb RAM. Figure 11: Tractability of the ASA∗ algorithm c, and c∗ be the column where r should be relocated. The myopic heuristic determines c∗ using the same rules as the H heuristic explained in Section 2, except that we assign an index of N + 1 to all unknown containers and we set min(ci ) = N + 2 if ci is empty. Ties are broken arbitrarily. In the following experiments we study myopic heuristic and compare its performance to that of ASA*. Value of information. To study the effect of the level of information initially available (|K|), we take 1000 random instances of a bay with 7 columns, 4 tiers, N = 21 containers, and 3 containers per column. We solve each instance with 6 levels of information: |K| = ⌈0.25N⌉, ⌈0.375N⌉, ⌈0.5N⌉, ⌈0.625N⌉, ⌈0.75N⌉, and ⌈0.9N⌉, using the ASA∗ algorithm and the myopic heuristic (⌈x⌉ is the smallest integer larger than x). For all cases, we fix t∗ at ⌈0.25N⌉ + 1 to ensure that at every timestep before t∗ , at least one container is known. For each of the 12 cases, we compute the average of relocations over the 1000 instances. We then compare the relative gap of each case with the E[zASA∗ ]−E[zopt ] E[zMH ]−E[zopt ] average relocation for the CRP with full information: and , where zMH is E[zopt ] E[zopt ] the number of relocations obtained by the myopic heuristic. Figure 12a shows the relative gap in relocations for different levels of information. With the ASA∗ algorithm (implemented with δ = 0.5 and ǫ = 0.05), the gap is about 8% when 25% of the containers (6 containers) are known at time zero. The gap reduces to 3% when half of the containers are initially known and is almost zero when 90% of containers are known at time zero. The same behaviour can be observed for the heuristic. In both cases, the marginal value of information becomes smaller when more information is available. This is more significant for the heuristic. For example, when the level of information increases from 25% to 50%, there is a significant drop in the gap; then the gap decreases more slowly and approaches zero at 100% information. Note that 28 with 100% information, the myopic heuristic is the same as the H heuristic. To get an insight into the value of information for the myopic heuristic, recall that it behaves similar to the H heuristic as long as min(ci ) for all columns are known. Since all unknown containers have larger indices than the known containers, knowing at least one container in each column is sufficient to obtain the same min(ci ) as in the heuristic H. Thus, after some point, having more information does not have much of effect on the number of relocations when we use the myopic heuristic. Figure 12b shows how the gap between the myopic heuristic and ASA∗ shrinks as the level of information increases. When 25% of the containers are initially known, using the myopic heuristic results in 12% more relocations on average (compared to ASA∗ ). This gap drops to less than 2% when all containers are known. Note that when more than 50% of the containers are initially known, the solution provided by the myopic heuristic is reasonably close to the solution of ASA∗ (less than 5%). Therefore, the myopic heuristic can be used in practice as it is easy to implement and efficient. (a) Value of information: relative gap in relocations text (b) Comparing the myopic heuristic and the ASA∗ algowith the case of full information rithm: relative gap in relocations for different levels of information Figure 12: Experiment results for 7×4 bay It is interesting to see the effect of different levels of information on the number of relocations in larger bays. Figure 13 shows the average relative gap in relocations for bays of different sizes. For each bay size, the average relative gap is computed for 100,000 instances, using the myopic heuristic. The most important observation is that the ratio of E[zMH ] and E[zH ] does not constantly increase with bay size. And, for each information level, this ratio converges to a constant as the bay gets larger. Two other observations can be made from Figure 13. First, the converging ratio for large bays drops fast as the level of information increases. For example, when 25% of containers are 29 initially known, the ratio converges to 1.4. This number drops to 1.03 when the level of information is 75%. Second, the rate of convergence is much faster when more information is available. For example, when 75% or more of the containers are initially known, the ratio is almost constant independent of the bay size. When 25% of the containers are known, the ratio converges to 1.4 for bays with 40 or more columns. Last, note that the asymptotic behaviour of the myopic heuristic in Figure 13, is as an upper bound on the performance of the ASA∗ algorithm. What is shown in Figure 13 provides useful insights for port operators. Considering the gain (fewer relocations) at each level of information, port operators can design appointment systems that capture this gain by offering faster or discounted service to the customers who provide their arrival time in advance. Figure 13: Asymptotic behaviour of myopic heuristic: larger. E[zMH ] E[zH ] approaches a constant as the bay gets Comparing the myopic heuristic with existing heuristic. To the best of our knowledge, only a few recent papers studied CRP with incomplete information, and developed heuristic algorithms for this problem [10, 21]. Here we compare our myopic heuristic with the RDH (revised difference heuristic of [21]) and show that myopic outperforms the RDH. Zhao et al. [21] show the percentage savings of RDH over a nearest relocation strategy for different bay sizes and for different amounts of information initially available. The greatest savings is about 50% and is realized for a bay with 12 columns and 7 maximum height, with 50 or more containers initially known (see Figure 13 of [21]). The total number of containers is not indicated for this simulation, so we assume the bay is full with 72 containers. (With 50 known containers, the level of information is about 70%). For a bay with 12 columns and 3 containers per column, the maximum savings is about 40% and is realized when 22 or more containers are known (i.e., when the information level is about 60%). 30 Figure 14: Percentage of saving of myopic heuristic over nearest relocation strategy. In Figure 14, we show the percentage savings of the myopic heuristic over the nearest location strategy for bays with different numbers of columns, with 4 tiers and 3 containers per column. The savings are shown for 4 different levels of information. It can be seen that when level of information is 50%, the saving is about 48%, which is greater than the saving for RDH when even more information (about 70%) is available. When the level of information is 25%, the savings of the myopic heuristic is about 35%, whereas for the same setting, RDH results in less than 25% savings over the nearest relocation strategy. 6 Conclusion Managing the relocation moves is one of the main challenges in the storage yard of container terminals and has a direct effect on the costs and efficiency of yard operations. The Container Relocation Problem (CRP) is notorious for its computational intractability and most research studies have designed heuristics in order to solve the problem, particularly for large bays. In this paper, we revisited a fast and efficient method, the A∗ algorithm that provides optimal solution for the CRP. We proved several properties of the method as applied to the CRP and assessed its performance and computational tractability through experiments. We also studied the asymptotic behavior of optimal solutions of the CRP and showed that the ratio of the optimal number of relocations and a simple counting lower bound converges to 1 as the bay gets very large. This gives strong evidence that CRP is easier in large bays. Moreover, we showed through experiments that the H heuristic (introduced in [4]) has the same behavior. An important result of our experiments is that it is recommended to apply the heuristic H to large blocks of containers (several bays) in order to minimize the loss from using a heuristic rather than optimization methods 31 (that are computationally expensive). We also presented an improvement over H heuristic, and show through experiments that it outperforms existing heuristics. Further, we extended our study to the CRP with incomplete information, which is an important case in practice because the retrieval order of containers are usually not known far in advance. We introduced a two-stage approximate stochastic optimization framework (ASA∗ ) that optimizes the expected number of relocations given a probabilistic distribution on the departure order of containers. We also presented a myopic heuristic that is very fast and efficient for the CRP with incomplete information. We used ASA∗ and the heuristic to study the value of information for different bay sizes and showed that the relative gap between ASA∗ and the heuristic shrinks as the level of information increases. In fact, when the available information is more than 50%, the myopic heuristic is very efficient and can be used in practice. We also showed that the ratio of the number of relocations between heuristic H and the myopic heuristic converges to a constant fast as bays get larger, which again implies that the loss from using the myopic heuristic is minimized when applied to large bays. Our paper opens directions to many further studies in both complete information setting and the incomplete one. A very interesting problem in the complete information case is to generalize our model to a setting where stacking and retrieving processes overlap in time. In such a setting, the goal would be to jointly optimize the number of relocation for stacking and retrieving. We believe that one of the major questions of this problem is how to prioritize between stacking and retrieving at a given time. In the incomplete information case, one can easily generalize our twostage stochastic optimization problem to a multi-stage setting where ASA* could be extended. However, as we increase the number of stages, the computation time grows rapidly. Additional assumptions and/or other efficient heuristics would be needed to ensure a reasonable running time. Finally, another interesting problem is to study the case where no information about any containers is known in advance. Intuitively, it appears that the policy of placing the container on the emptiest column should be the optimal solution; however this remains to be proven. Other storage systems such as steel plate stacking and warehousing systems face the relocation problem with complete and incomplete information (see Kim et al. [8], Zäpfel and Wasner [19] for the former, and Chen et al. [6] for the latter). We believe that the frameworks proposed in this paper could also be applicable to those problems. References [1] Akyüz, M. H. and Lee, C.-Y. (2014). A mathematical formulation and efficient heuristics for the dynamic container relocation problem. Naval Research Logistics (NRL), 61(2):101–118. [2] Borjian, S., Manshadi, V. H., Barnhart, C., and Jaillet, P. (2015). Managing relocation and delay in container terminals with flexible service policies. ArXiv: 1503.01535. 32 [3] Caserta, M., Schwarze, S., and Voß, S. (2009). A new binary description of the blocks relocation problem and benefits in a look ahead heuristic. Evolutionary Computation in Combinatorial Optimization, 5482:37–48. [4] Caserta, M., Schwarze, S., and Voß, S. (2012). A mathematical formulation and complexity considerations for the blocks relocation problem. European Journal of Operational Research, 219(1):96–104. [5] Caserta, M., Voß, S., and Sniedovich, M. (2011). Applying the corridor method to a blocks relocation problem. OR Spectrum, 33(4):915–929. [6] Chen, L., Langevin, A., and Riopel, D. (2011). A tabu search algorithm for the relocation problem in a warehousing system. International Journal of Production Economics, 129(1):147– 156. [7] Forster, F. and Bortfeldt, A. (2012). A tree search procedure for the container relocation problem. Computers & Operations Research, 39(2):299–309. [8] Kim, B.-I., Koo, J., and Sambhajirao, H. P. (2011). A simplified steel plate stacking problem. International Journal of Production Research, 49(17):5133–5151. [9] Kim, K. H. and Hong, G.-P. (2006). A heuristic rule for relocating blocks. Computers & Operations Research, 33(4):940–954. [10] Ku, D. (2014). Rehandling problem of pickup containers under truck appointment system. In Computational Collective Intelligence. Technologies and Applications, volume 8733 of Lecture Notes in Computer Science, pages 272–281. Springer International Publishing. [11] Lee, Y. and Lee, Y.-J. (2010). A heuristic for retrieving containers from a yard. Computers & Operations Research, 37(6):1139–1147. [12] Lehnfeld, J. and Knust, S. (2014). Loading, unloading and premarshalling of stacks in storage areas: Survey and classification. European Journal of Operational Research, 239(2):297–312. [13] Olsen, M. and Gross, A. (2014). Average case analysis of blocks relocation heuristics. 5th International Conference ICCL Proceedings, 8760:81–92. [14] Petering, M. E. and Hussein, M. I. (2013). A new mixed integer program and extended lookahead heuristic algorithm for the block relocation problem. European Journal of Operational Research, 231(1):120–130. [15] Stahlbock, R. and Voß, S. (2008). Operations research at container terminals: a literature update. OR Spectrum, 30(1):1–52. 33 [16] Tanaka, S. and Takii, K. (2014). A faster branch-and-bound algorithm for the block relocation problem. 2014 IEEE International Conference on Automation Science and Engineering (CASE), 14:7–12. [17] Ünlüyurt, T. and Aydın, C. (2012). Improved rehandling strategies for the container retrieval process. Journal of Advanced Transportation, 46(4):378–393. [18] Vondrák, J. M. J. (2001). The Probabilistic Method: Lecture Notes. (KAM-DIMATIA series. Charles Univ). [19] Zäpfel, G. and Wasner, M. (2006). Warehouse sequencing in the steel supply chain as a generalized job shop model. International Journal of Production Economics, 104(2):482–501. [20] Zhang, H., Guo, S., Zhu, W., Lim, A., and Cheang, B. (2010). An investigation of IDA* algorithms for the container relocation problem. Proceedings of the 23rd International Conference on Industrial Engineering and Other Applications of Applied Intelligent Systems (IEA/AIE), 3140. [21] Zhao, W. and Goodchild, A. V. (2010). The impact of truck arrival information on container terminal rehandling. Transportation Research Part E: Logistics and Transportation Review, 46(3):327–343. [22] Zhu, W., Qin, H., Lim, A., and Zhang, H. (2012). Iterative deepening A* algorithms for the container relocation problem. IEEE Transactions on Automation Science and Engineering, 9(4):710–722. 34 Appendix Proof of Proposition 2.2. Between level l and l + 1, one move has been operated (r moved to column ci ). If r < min(ci ) (‘good” move) then r was a blocking container in Bl but not in Bl+1 , thus S0 (Bl+1 ) = S0 (Bl ) − 1. If r > min(ci ), we have S0 (Bl+1 ) = S0 (Bl ). So S0 (Bl+1 ) = S0 (Bl ) − χ(r < min(ci )) where χ is the indicator function. Therefore L0 (Bl+1 ) = S0 (Bl+1 ) + (l + 1) = S0 (Bl ) − χ(r < min(ci )) + 1 + l ≥ S0 (Bl ) + l = L0 (Bl ).  Proof of Proposition 2.4. We have Lp (B) − Lp−1 (B) = negative function, the results follows. P r∈Rp (B) χ(r > MM(Bp )). Since χ is a non  Proof of Proposition 2.5. Intuitively, this property comes from the fact that Sp (Bl+1 ) ≥ Sp (Bl ) − 1. Indeed, if this holds, we have Lp (Bl+1 ) = Sp (Bl+1 ) + l + 1 ≥ Sp (Bl ) − 1 + l + 1 = Sp (B) + l = Lp (B) So let us prove Sp (Bl+1 ) ≥ Sp (Bl ) − 1. Let r be the container that is relocated between Bl and Bl+1 . We have two cases: • If r can do a good move, r has only been counted once in Sp (Bl ) as it is a blocking container in Bl and it might or might not contribute to Sp (Bl+1 ). Therefore Sp (Bl+1 ) ≥ Sp (Bl ) − 1. • If r cannot do a good move, it has been counted twice in Sp (Bl ). But since it cannot do a good move, it is necessarily a blocking container in Bl+1 so it counts at least once in Sp (Bl+1 ). Thus Sp (Bl+1 ) ≥ Sp (Bl ) − 1. This completes the proof.  Proof of Proposition 2.7. Using heuristic H, a container is relocated only if it is blocking. For any blocking container, there exists at least one empty column which means there is a possible good move. So each blocking container is relocated at most once, i.e, zH (B) = S0 (B). Since S0 (B) ≤ zopt (B) ≤ zH (B) = S0 (B) and we have equation (4).  Proof of Proposition 2.8. For simplicity of proofs we assume that n1 , the target container in the bay is 1. If 1 is not blocked then it is retrieved. In that case, there are C containers left and thus we use Proposition 2.7 (note that in that case S1 (B) = S0 (B)). Then let us suppose 1 is blocked by some containers. If there is more than one blocking container, all except the last one can be relocated to empty columns. So we come back to the case where 1 is only blocked by container r, and there is no empty column. Now we consider two cases: If r can do a good move and H relocates r to a good column and then retrieves 1. We call B′ the new configuration. By Proposition 2.7, we have zH (B′ ) = S0 (B′ ) = S1 (B′ ). Notice that zH (B) = zH (B′ ) + 1 and S1 (B) = S1 (B′ ) + 1 and the result follows. 35 Now suppose r cannot do a good move. This can only happen if r = C + 1 and all the other columns have exactly one container. It is easy to check that in that case, zH (B) = S1 (B).  Proof of Proposition 2.9. First let us introduce some notations. Let B be the initial configuration and B′ be the configuration obtained after retrieving container 1 using heuristic H. We denote R1 the set of containers blocking container 1 in B. Now let us consider the case k = 2. Note that using Proposition 2.8 we have zH (B′ ) = S1 (B′ ) and S1 (B′ ) ≤ S0 (B′ ) + 1. There are four possibilities to consider: • If |R1 | = 0, then it is easy to see that zH (B) = zH (B′ ) = zopt (B′ ) = zopt (B). • If |R1 | = 1, we know that S0 (B′ ) ≤ S0 (B). Therefore zH (B) = 1 + zH (B′ ) = 1 + S1 (B′ ) ≤ 1 + S0 (B′ ) + 1 ≤ S0 (B) + 2 ≤ zopt (B) + 2. • If |R1 | > 2, then there are at least |R1 | − 2 columns that are empty in B. Therefore the |R1 | − 2 topmost containers blocking 1 find necessarily a ”good” column in B. Hence this case can be reduced to the case where |R1 | = 2. • If R1 = 2, then we claim that S1 (B′ ) ≤ S0 (B). If this is true, then zH (B) = zH (B′ ) + 2 = S1 (B′ ) + 2 ≤ S0 (B) + 2 ≤ zopt (B) + 2. Now let us denote r1 and r2 the two containers blocking 1 in B. – If r1 ≤ C or r2 ≤ C then S0 (B′ ) ≤ S0 (B) − 1 and therefore S1 (B′ ) ≤ S0 (B′ ) + 1 ≤ S0 (B). – If r1 > C and r2 > C, then if one of them finds an empty column then again S0 (B′ ) ≤ S0 (B)− 1. Otherwise it means that all columns have one container and C + 1 and C + 2 are on top of 1. In those two bays we can verify that zH (B) = 4 ≤ 2 + 2 = S0 (B) + 2 ≤ zopt + 2. This concludes the case k = 2. For 3 ≤ k ≤ C, the proof is simpler and works by induction. For k = 2, the previous paragraph proves a stronger inequality. Let us suppose it is true for k − 1, and B has C + k containers. We k(k−1) have by induction hypothesis, zH (B′ ) ≤ S0 (B′ ) + 2 . We have three cases: • If |R1 | = 0, then zH (B) = zH (B′ ) ≤ S0 (B′ ) + k(k−1) 2 ≤ S0 (B) + k(k+1) 2 ≤ zopt (B) + k(k+1) 2 . • If |R1 | > k, then there are at least (C − 1) − (C + k − (|R1 | + 1)) = |R1 | − k empty columns and k(k−1) therefore S0 (B′ ) ≤ S0 (B) + k − |R1 | which implies zH (B) = |R1 | + zH (B′ ) ≤ |R1 | + S0 (B′ ) + 2 ≤ k(k−1) k(k+1) k(k+1) |R1 | + S0 (B) + k − |R1 | + 2 = S0 (B) + 2 ≤ zopt (B) + 2 . • If 0 < |R1 | ≤ k, then since S0 (B′ ) ≤ S0 (B) we have zH (B) = |R1 | + zH (B′ ) ≤ |R1 | + S0 (B′ ) + k(k−1) k(k+1) k(k+1) k + S0 (B) + 2 = S0 (B) + 2 ≤ zopt (B) + 2 . k(k−1) 2 ≤ which concludes the proof.  36 Proof of Proposition 3.1. Let Si0 (BC ) be the number of blocking containers in column i. By the linearity of expectation, we have  C  C h i X  X i  EC [S0 (BC )] = EC  S0 (BC ) = E Si0 (BC ) = αh × C, i=1 i=1 h i where αh = E S10 (BC ) . The last equality comes from the fact that each column is identically distributed. P Now let us compute αh . By definition, αh = h−1 k=1 kpk,h . Let us start with p0,h . Given h randomly chosen containers, the probability that they are placed in the first column in a descending order (meaning there is no blocking container) is p0,h = h!1 . Now for 1 ≤ k ≤ h − 1, we compute pk,h by recursion (conditioning on the position of the smallest container). Let n∗ be the smallest container among these h containers. n∗ is located in jth topmost tier with probability 1h . Conditioned on that event, it means that (j − 1) containers are blocking n∗ . So if j > k + 1, then the event of having k blocking container is not possible. Therefore for j ≤ k + 1 there should be (k − (j − 1)) blocking containers below the jth topmost tier and this happens with probability pk−( j−1),h−j (since there are h − j tier below the jth topmost tier). Summing over all j (possible positions of n∗ ), we have pk,h = k X 1 j=1 h pk−j+1,h−j , which completes the proof  Proof of Theorem 3.3. Since for all configurations BC , zopt (BC ) ≥ S0 (BC ) then Moreover, we have: h i h i EC zopt (BC ) − EC [S0 (BC )] EC zopt (BC ) =1+ EC [S0 (BC )] EC [S0 (BC )] i  1  h =1+ EC zopt (BC ) − αh C αh C g(C) =1+ αh C EC [zopt (BC )] EC [S0 (BC )] ≥ 1. (14) where h i g(C) = EC zopt (BC ) − αh C. (15) h i In Lemma 6.1, we study how EC zopt (BC ) evolves and we show that it increases almost linearly in α which shows that the function g(.) is essentially bounded. Lemma 6.1. Let zopt (BC ) be the optimal number of relocations for configuration BC , then there exists a constant θ (defined in equation (37)) such that: h i h i EC+1 zopt (BC+1 ) ≤ EC zopt (BC ) + αh + h(P − 1)(C + 1)e−θ(C+1) , ∀C ≥ h + 1 (16) 37 Using Lemma 6.1, we have for all C ≥ h + 1: h i h i EC+1 zopt (BC+1 ) ≤ EC zopt (BC ) + αh + h(P − 1)(C + 1)e−θ(C+1) h i h i =⇒ EC+1 zopt (BC+1 ) − αh (C + 1) ≤ EC zopt (BC ) − αh C + h(P − 1)(C + 1)e−θ(C+1) =⇒ g(C + 1) ≤ g(C) + h(P − 1)(C + 1)e−θ(C+1) C  ∞  X X   −θi =⇒ g(C) ≤ g(h + 1) + h(P − 1) ie ≤ g(h + 1) + h(P − 1) ie−θi i=1 i=h+2 =⇒ g(C) ≤ g(h + 1) + eθ h(P (eθ − 1) − 1) 2 = K′ . (17) Therefore using equations (14) and (17), we have h i EC zopt (BC ) K ≤ 1 + = f (C), EC [S0 (BC )] C (18) where K= K′ α g(h + 1) + = α which completes the proof of the theorem. eθ h(P−1) (eθ −1) 2 (19)  Proof of Lemma 6.1. Now we need to prove equation (16). Define a column to be “special” if all its containers are not smaller than ω = (h − 1)(C + 1) + 1. Now let us consider the following event: n o Ω = The bay with C + 1 columns has at least one “special” column . (20) The intuition is the following: the probability of having a “special” column grows quickly to 1 as a function of C implying that the event Ω happens with high probability. Now, conditioned on Ω, we more easily express the difference between bays of size C + 1 and C in the following way. We claim that h i h i EC+1 zopt (BC+1 )|Ω ≤ EC zopt (BC ) + αh , (21) Let BC+1 be a given bay of size C + 1 that verifies Ω. Since columns in bays can be interchanged, we suppose that a “special” column is the first (leftmost) column of the bay. We also denote n1 , n2 , . . . , nh the containers of the first column. We know that n1 , n2 , . . . , nh ≥ ω and n1 , n2 , . . . , nh . Finally let BC be the bay BC+1 without its first column (see Figure 15). First we prove that    n1    (22) zopt (BC+1 ) ≤ zopt (BC ) + S0  . . .  .   nh 38 Figure 15: Bay decomposition of BC+1 (The part on the right has C columns) To prove equation (22), we construct a feasible sequence σ for the bay of size C + 1 for which the number of relocations is equal to the right side of equation (22). Let σopt (BC ) the optimal sequence for BC , t′ be the first time step when the target container in σopt (BC ) is larger than min{n1 , n2 , . . . , nh } and B′C be the bay obtained at t′ using σopt (BC ). Let the first t′ − 1 moves of σ be the first t′ − 1 moves of σopt (BC ). Note that B′C has at most C − h containers due to the choice of ω. By Proposition 2.7, the number of relocations performed by σopt (BC ) from t′ until the end is S0 (B′C ). Therefore zopt (BC ) = # relocations up to t′ done by zopt (BC ) + S0 (B′C ). (23)      n1        ′ ′ ′ After t , we run heuristic H on BC+1 =  . . .  ∪ BC .    nh We claim that zσ is exactly the right side of equation (22). There are at most C containers in ′ BC+1 , therefore using Proposition 2.7, we know that if we apply the heuristic H to this configuration,    n1    then the number of relocations done by H is S0 (B′C+1 ) = S0 (B′C ) + S0  . . . . Therefore   nh    n1    zopt (BC+1 ) ≤ zσ (BC+1 ) = # relocations up to t′ done by zopt (BC ) + S0 (B′C ) + S0  . . .  ,   nh and we have    n1    zopt (BC+1 ) ≤ zopt (BC ) + S0  . . .  ,   nh (24) which proves equation (22). Now we can take the expectation from both sides of equation (21) over a uniform distribution of the rest of the hC containers that are not in the first column. We claim that the first term on 39 h i the right hand-side of equation (24) is exactly EC zopt (B) . For any configuration that appears in BC , we can map it to a unique configuration where all containers are between 1 and hC. Thus,       n1   n1   h i      (25) EC zopt (BC+1 )  . . .  ≤ EC zopt (BC ) + S0  . . .  .      nh nh Next, we take the expectation of both sides of equation (25) over possible first columns, which is a “special” column. Now notice that if BC+1 is generated uniformly in the sets of bays of size C + 1, then conditioned on Ω, the probability of having a certain column [n1 , . . . , nh ]T is identical for any n1 , . . . , nh ≥ ω and it is given by      n1       (C − h)! P   . . .  Ω  = . (26) C!     nh Moreover, if we withdraw this first column from BC+1 and look at the last C columns (after renumbering the containers so that the numbers lie between 1 and hC), then this bay is also uniformly distributed in the sets of bays with C columns. Therefore we can write:                  n n 1 1         X   h i                EC zopt (BC+1 )  . . .  , Ω  × P   . . .  Ω  (27) EC+1 zopt (BC+1 )|Ω =           (n1 ,...,nh )  nh nh n, n i j ni ≥ ω   X   E z (B ) =  C  opt C+1   (n1 ,...,nh )  ni , n j ni ≥ ω ≤ EC h      n1  n1       . . .   × P   . . .           nh nh         n1  n1     n1  X i X                         S0  . . .  × P   . . . P   . . .  Ω  + zopt (BC )        (n1 ,...,nh ) (n1 ,...,nh )   n  nh nh h n, n n, n i i j ≤ EC        Ω      j      n1  n1  X i         S0  . . .  × P   . . . zopt (BC ) +     (n1 ,...,nh ) nh nh n, n i (28) ni ≥ ω ni ≥ ω h        Ω             Ω      (29) j ni ≥ ω The equality between 27 and 28 comes from the fact that if we know that BC+1 has a “special”  col    n1       P    P   . . .  Ω  = umn, then we do not need to condition on Ω. Equation 29 uses the fact that     n1 , ..., nh ni ≥ ω nh 1. 40 Note that, given any (n1 , . . . , nh ) such that ni , n j , we have      n1     E S0  . . .  = αh ,    nh when the expectation is over a random order of (n1 , . . . , nh ). This is true regardless of the set (n1 , . . . , nh ) that is drawn from (See Remark 3.2). This implies that the second term in the right hand side of equation (29) is equal to αh ; Therefore, we get equation (21). Lemma 6.2 states that the event Ω has a probability that increases exponentially fast to 1 as a function of C. Lemma 6.2. Let Ω be the event defined by equation (20), then there exists a constant θ > 0 such that P(Ω) ≤ e−θ(C+1) (30) where θ is given by equation (37). h i Now we want to focus on the event Ω. We give an upper bound on EC+1 zopt (BC+1 )|Ω . For any configuration, in order to retrieve one container, we need at most P − 1 relocations (since at most P − 1 containers are blocking it), thus for any configuration, the optimal number of relocations is at most P − 1 times the number of containers (h(C + 1)) which gives us h(P − 1)(C + 1) as an upper bound on the optimal number of relocations. We use this universal bound to get h i EC+1 zopt (BC+1 )|Ω ≤ h(P − 1)(C + 1). (31) Finally using Lemma 6.2, we have h h h i i i EC+1 zopt (BC+1 ) = EC+1 zopt (BC+1 )|Ω P(Ω) + EC+1 zopt (BC+1 )|Ω P(Ω) h i h i ≤ EC+1 zopt (BC+1 )|Ω + EC+1 zopt (BC+1 )|Ω × e−θ(C+1) h i ≤ EC zopt (BC ) + αh + h(P − 1)(C + 1)e−θ(C+1) , which completes the proof of Lemma 6.1.  Proof of Lemma 6.2. Recall that Ω= n The bay with C + 1 columns has at least one “special” column o . We know that each bay of size C + 1 can be mapped to a permutation π of Sh(C+1) taken uniformly at random. Let q(.) be the function from Sh(C+1) to R+ defined by q : π 7−→ number of “special” columns in the resulting bay of π. 41 Note that    P Ω = P q(π) = 0 . First we compute the expected value of q(.) C+1  X   EC+1 [q] = EC+1  χ (ci is a “special” column) i=1 EC+1 [q] = (C + 1) × P ({c1 is a “special” column}) , (32) where we use linearity of expectation and the fact that columns are identically distributed. A simple counting implies that 1 : (C + 1)[(C + 1) − 1] . . . [(C + 1) − h + 1] h(C + 1)[h(C + 1) − 1] . . . [h(C + 1) − h + 1] !h (C + 1) − h + 1 ≥ h(C + 1) !h 2 ≥ , h(h + 1) P ({c1 is a “special” column}) = (33) where we use C + 1 ≥ h + 1 to show the last inequality. Therefore we know that !h 2 . EC+1 [q] ≥ (C + 1) × h(h + 1) (34) We claim that q(.) is well concentrated around its mean. In order to do so, we prove that q(.) is 1-Lipschitz. Define ρ the distance between two permutations π1 , π2 ∈ Sh(C+1) as ρ(π1 , π2 ) = | {i ∈ [h(C + 1)] : π1 (i) , π2 (i)} |. We want to prove that |q(π1 ) − q(π2 )| ≤ ρ(π1 , π2 ), ∀ (π1 , π2 ) ∈ Sh(C+1) . (35) Let π1 , π2 ∈ Sh(C+1) . Let us first consider the case where ρ(π1 , π2 ) = 2. (Notice that if ρ(π1 , π2 ) , 0 then ρ(π1 , π2 ) ≥ 2). In that case, we have i, j ∈ {1, . . . , n} such that π1 (i) = π2 (j) and π1 (j) = π2 (i). Let B1 and B2 be the configurations generated by π1 and π2 . Having ρ(π1 , π2 ) = 2 corresponds to the fact that if we swap 2 containers in B1 , we get B2 and we denote those containers a = π1 (i) and b = π1 (j). We have three cases: • a and b are both in “special” columns in B1 . In this case, swapping them will not change anything since both their new columns in B2 will also be “special” and hence |q(π1 )−q(π2 )| = 0. 1 1 Notice that when C → ∞, the probability is equivalent to ( )h which would guarantee a faster convergence rate. h 42 • a and b are both in columns that are not “special” columns in B1 . If a, b ≥ ω or a, b < ω then we do not create any new special column in B2 . Now suppose that a ≥ ω and b < ω, then the column of a in B2 might be a “special” column, but the column of b in B2 cannot be “special”. Therefore in that case, |q(π1 ) − q(π2 )| ≤ 1. • a is in a “special” column in B1 but b is not. Now we know that a ≥ ω. If b < ω then the column of b in B2 cannot be “special” but the column of a might be and in that case |q(π1 ) − q(π2 )| ≤ 1. If b ≥ ω, then the column of b in B2 is “special” and the column of a in B2 is not “special” which gives us |q(π1 ) − q(π2 )| = 0. Note that the proof is identical if b is in a “special” column in B1 but a is not. So far we have shown that If ρ(π1 , π2 ) = 2, then |q(π1 ) − q(π2 )| ≤ 1. (36) Now we suppose that ρ(π1 , π2 ) = k where 2 ≤ k ≤ h(C + 1). Note that we can construct a sequence of permutations (π′1 , π′2 , . . . , π′k ) such that π′1 = π1 , π′k = π2 and ρ(π′i , π′i+1 ) = 2. Now using this fact and equation (36), |q(π1 ) − q(π2 )| = k−1 X i=1 q(π′i ) − q(π′i+1 ) ≤ k−1 X i=1 |q(π′i ) − q(π′i+1 )| ≤ k−1 X i=1 1 = k − 1 ≤ k = ρ(π1 , π2 ), which proves that q(.) is 1-Lipschitz.  Now we use Theorem 8.3.3 of Matoušek and Vondrák [18] which states that P q ≤ EC+1 [q] − t ≤ t2 e− 8h(C+1) and apply it with t = EC+1 [q] and equation (34) to get 2 (EC+1 [q])   P q = 0 = P q ≤ EC+1 [q] − EC+1 [q] ≤ e− 8h(C+1) ≤ e−θ(C+1) , where 2 1 θ= 8h h(h + 1) !2h > 0, (37) which concludes the proof.  Proof of Corollary 9. Using that S0 (BC ) ≤ zgen (BC ) ≤ zopt (BC ), we have 1 ≤ EC [zopt (BC )] EC [S0 (BC )] ≤ f (C). Finally we know that EC [S0 (BC )] = αh C. EC [zgen (BC )] EC [S0 (BC )] ≤  Proof of Proposition 4.1. We can write E[e1 ] as follows: E[e1 ] = (E[E[zpASA ] − z̄pASA ]) − (E[E[zp∗ ] − z̄p∗ ]) + E[z̄pASA − z̄p∗ ] ≤ E[|E[zpASA ] − z̄pASA |] + E[|E[zp∗ ] − z̄p∗ |].(38) 43 The above inequality holds because ASA∗ chose pASA , and thus we have z̄pASA < z̄p∗ . Moreover, we can compute E[|E[zpASA ]− z̄pASA |] and E[|E[zp∗ ]− z̄p∗ |] using their CDF. We denote |E[zpASA ]− z̄pASA | by ∆. Note that 0 ≤ ∆ ≤ rmax and inequality (11) gives a bound on its CDF, when estimating z̄pASA with S samples. For E[∆], we have: Z rmax E[∆] = Z0 rmax 1 − F∆ (x)dx (39) −2Sx2 )dx r2 max 0 Z rmax Z ∞ s ǫ x22 π ǫ x22 = 2 ( ) δ dx ≤ 2 ( ) δ dx = δ ǫ . 2 2 0 0 − ln( ) 2 ≤ 2 exp( (40) (41) We can compute E[|E[zp∗ ] − z̄p∗ |] in a similar way. The first equality in (41) is obtained by substituting S with the expression in (12). Using the bound on E[∆] and inequality (38), we can compute E[e1 ] as follows: s E[e1 ] ≤ 2δ π ǫ . − ln( ) 2 (42)  Proof of Proposition 4.2. For an arbitrary initial bay B, let p̂ be the path with the minimum estimated upper bound. Notice that pruning p̃ may be a mistake if the true mean of Lp̃ is less than the true mean of Up̂ , i.e., E[Lp̃ ] < E[Up̂ ]; in such a case, e2 ≤ E[Up̂ ] − E[zp̃ ] ≤ E[Up̂ ] − E[Lp̃ ]. Otherwise e2 is zero; thus we have e2 ≤ (E[Up̂ ] − E[Lp̃ ])+ . Let us denote Lp̃ − E[Lp̃ ] and E[Up̂ ] − Up̂ by xL and xU , respectively. Also, let d be Lp̃ − Up̂ . The true and estimated values of the upper bound and lower bound, and the loss are illustrated in Figure 7; e2 is shown by the thick line segment. For any bay with an arbitrary initial configuration, we can bound e2 as follows:  + e2 ≤ (E[Up̂ ] − Up̂ ) + (Up̂ − Lp̃ ) + (Lp̃ − E[Lp̃ ]) = (xU − d + xL )+ . (43) The expected loss, E[e2 ], can be bounded as shown in (46). E[e2 ] = E[(xL + xU − d)+ ] ≤ E[(xL + xU )+ ] ≤ E[|xL + xU |] ≤ E[|xL | + |xU |] = E[|xL |] + E[|xU |] s π ≤ 2δ ǫ . − ln( ) 2 44 (44) (45) (46) The first inequality in 44 holds because d is always positive. Inequality 45 results from the triangular inequality, and the last inequality is obtained by replacing E[|xL |] and E[|xU |] by the expression in (41).  Proof of Proposition 4.3. For an arbitrary initial bay B, let p̂max be the path that maximizes E[Up̂ ] among p̂1 , . . . , p̂m . We bound e3 (the expected loss due to prununig) as follows: e3 ≤ P(mistake at t1 ∪ · · · ∪ mistake at tm )(E[zp̂max ] − E[zp∗ ]) (47) ≤ m P(mistake at t1 )(E[Up̂max ] − 0) (48) = m P(mistake at t1 )(E[Up̂max ] − Up̂max + Up̂max ) (49) ≤ m P(mistake at t1 )(|xU | + (50) max Up̂ ). Notice that inequality 48 is obtained by using the union bound. Moreover, we replace the probability of mistakes at each step by the maximum probability. Without loss of generality we assume that maximum probability is at t1 . Also note that we do not know which path is p̂max because we have not observed E[Up̂1 ], . . . , E[Up̂m ]. Nevertheless, regardless of the path, we can max replace E[Up̂max ] − Up̂max with |xU | (by definition) to obtain (50). Also, we can bound Up̂max by Up̂ . Now we compute P(mistake at t1 ). Let us denote |xL | and |xU | by x and y, respectively. Also, let w = x + y and fW (w) be the PDF of w. Notice that the probability of making a mistake depends on the value of d; the maximum probability corresponds to the stage with the smallest value of d and can be computed as follows: Z ∞ Z ∞Z w P(mistake at t1 ) = P(x + y − dmin > 0) = fW (w)dw = fX (w − y) fY (y) dy dw. (51) dmin dmin 0 fX (x) and fY (y) can be obtained from (11), and the above integral can be bounded as follows: Z ∞ dmin Z 0 w 2)  − ln( ǫ ) 2 ǫ (y2 +(w−y) 2 δ2 y(w − y)( ) 4 2 δ2 dmin 0 r p 2 2 −ln( 2ǫ )π ǫ dmin dmin −ln( 2ǫ ) ǫ dmin d min ( ) δ2 + ) ( ) 2δ2 Erf( √ 2 δ 2 2 2δ r 2 −ln( 2ǫ )π ǫ d2min ǫ dmin d min 2 ( ) δ + ( ) 2δ2 . 2 δ 2 2 E[|xU |], it follows that: Z fX (w − y) fY (y) = = ≤ From 50, 52, and expression 41 for ∞ Z w (52) v t  E[e3 ] ≤ m 2 ǫ  −ln( )π ǫ d2min  s π max 2 , U ( ) 2δ2 δ + p̂ ǫ 2 2 − ln( ) 2 = max{Up̂1 , . . . , Up̂m }, and dmin = min{d1 , . . . , dm }. ǫ dmin dmin ( ) δ2 + 2 δ max where Up̂ 45 (53)  46
8cs.DS
arXiv:1611.01415v2 [math.AC] 17 Nov 2016 Explicit Implicit Function Theorem for All Fields YINING HU CNRS, Institut de Mathématiques de Jussieu-PRG Université Pierre et Marie Curie, Case 247 4 Place Jussieu F-75252 Paris Cedex 05 (France) [email protected] Abstract We give an explicit implicit function theorem for formal power series that is valid for all fields, which implies in particular Lagrange inversion formula and and Flajolet-Soria coefficient extraction formula known for fields of characteristic 0. Theorem 1. Let K be an arbitrary field. If P (X, Y ) ∈ K[[X, Y ]] and f (X) ∈ K[[X]] are such that f (0) = 0, P (X, f (X)) = f (X) and PY′ (0, 0) = 0. Then X [X n ]f = [X n Y m−1 ](1 − PY′ (X, Y ))P m (X, Y ). m≥1 If the characteristic of K is 0, we also have the following form [X n ]f = X 1 [X n Y m−1 ]P m (X, Y ). m m≥1 Remark 1. The conditions P (X, f (X)) = 0 and f (0) = 0 imply that P (0, 0) = 0. As PY′ (0, 0) is also 0, the sums in both expressions of [X n ]f are finite. Remark 2. When P (X, Y ) = Xφ(Y ), where φ(X) ∈ K[[X]] and φ(0) 6= 0, we obtain the Lagrange inversion formula [X n ]f = [Y n−1 ](φ(X)n − Y φ′ (X)φ(X)n−1 ). If the characteristic of K is 0, we also have the following form [X n ]f = 1 n−1 [Y ]φ(Y )n . n Remark 3. When P (X, Y ) is a polynomial in X and Y , we obtain a generalisation of FlajoletSoria coefficient extraction formula [2]. Definition 1. Let P (X, Y ) ∈ K[[X, Y ]], P (X, Y ) = ∞ X j=0 where aj (x) ∈ K[[X]]. We define 1 aj (x)Y j , [m] P ∞   X j aj (x)Y j−m . (X, Y ) = m j=m for m ∈ N. The motivation of the definition of P [m] is to avoid the factorials in the denominators in the Taylor series, which do not make sense in positive characteristic. Once this obstacle is circumvented, the Taylor formula works as expected. Proposition 1. Let K be an arbitrary field. Let P (X, Y ) ∈ K[[X, Y ]] and f (X) ∈ K[[X]] with f (0) = 0. Then ∞ X P (X, Y ) = (Y − f (X))m P [m] (X, f (x)). (*) m=0 Proof. Let P (X, Y ) = ∞ P aj (X)Y j with aj (X) ∈ K[[X]] for j ∈ N. We prove that for all k ∈ N, j=0 the coefficient of Y k in the left side and right side of (∗) is equal. Indeed, we have [Y k ] ∞ X (Y − f (X))m P [m] (X, f (x)) m=0 ∞   ∞   X X j m m−k aj (x)f (X)j−m = (−f (X)) m k j=m m=k = ∞ X aj (X)f (X)j−k j=k = ∞ X j    X j m (−1)m−k m k m=k aj (X)f (X)j−k j=k j  X  j (−1)m−k j − m, m − k, k m=k =ak (X). j P We have the last equality because m=k j j−m,m−k,k  (−1)m−k = 1 if j = k and 0 if j > k. This is because we have the multinomial expansion  X  j j (a + b + c) = aj−m bm−k ck j − m, m − k, k k≤m≤j = j X j  X k=0 m=k  j aj−m bm−k ck j − m, m − k, k When we take a = 1, b = −1, the identity becomes j c = j X k=0 j  X m=k !  j m−k ck . (−1) j − m, m − k, k Seeing this as a polynomial identity in the variable c gives us the desired result. 2 The following corollary is immediate. Corollary 1. Let K be an arbitrary field. Let Q(X, Y ) ∈ K[[X, Y ]] and f (X) ∈ K[[X]] be such that f (0) = 0 and Q(X, f (X)) = 0. Then there exists R(X, Y ) ∈ K[[X, Y ]] such that Q(X, Y ) = (Y − f (X))R(X, Y ). Definition 2. For the formal power series in K((X1 , ..., Xm )) X nm P (X1 , X2 , ..., Xm ) = an1 n2 ...nm X1n1 X2n2 ...Xm ni >−µ its (principal) diagonal Df (t) is defined as the element in κ((T )) X DP (T ) = ann...n T n . The following proposition is a generalization of Proposition 2 from [1], the only difference in the proof is in the first step where we use Corollary 1 to factorize Q(X, Y ). Proposition 2. Let K be an arbitrary field. Let Q(X, Y ) ∈ K[[X, Y ]] and f (X) ∈ K[[X]] be such that f (0) = 0, Q(X, f (X)) = 0 and Q′Y (0, 0) 6= 0, then   Q′ (XY, Y ) . f (X) = D Y 2 Y Q(XY, Y ) Proof. Using Corollary 1 we can write Q(X, Y ) = (Y −f (X))R(X, Y ) with R(X, Y ) ∈ K[[X, Y ]]. We have R(0, 0) 6= 0 because f (0) = 0 and Q′Y 6= 0. Then 1 R′ (X, Y ) 1 Q′Y (X, Y ) = + Y . Q(X, Y ) Y − f (X) R(X, Y ) Replacing X by XY and multiplying by Y 2 we get       Q′ (XY, Y ) R′ (XY, Y ) Y2 D Y2 Y =D +D Y2 Y . Q(XY, Y ) Y − f (XY ) R(XY, Y ) (†) For the first term on the right side of (†) we have   Y2 D Y − f (XY )   Y =D 1 − Y −1 f (XY ) ! ∞ X −n+1 n =D Y f (XY ) n=0 =D (f (XY )) =f (X). R′ (XY,Y ) Y For the second term, as R(0, 0) 6= 0, R(XY,Y ) is a power series in XY and Y , so when we 2 multiply this by Y there is no diagonal term. 3 Proof of Theorem 1. Let the power series Q(X, Y ) be defined as Q(X, Y ) = P (X, Y ) − Y , then Q′Y (0, 0) = PY′ (0, 0) − 1 6= 0, and Q(X, f (X)) = P (X, f (X)) − f (X) = 0. According to Proposition 2, f = D{Y 2 Q′Y (XY, Y )/Q(XY, Y )} = D{Y 2 (PY′ (XY, Y ) − 1)/(P (XY, Y ) − Y )} P (XY, Y ) )} Y X P (XY, Y ) )m )}. = D{Y (1 − PY′ (XY, Y ))(1 + ( Y = D{Y (1 − PY′ (XY, Y ))/(1 − m≥1 ) has no constant term, and We have the last equality due to the fact that PY′ (0, 0) = 0, P (XY,Y Y P P (XY,Y ) P (XY,Y ) m therefore 1/(1 − ) = 1 + m≥1 ( Y ) . Y As in each term of Y (1−PY′ (XY, Y )) the power of Y is larger than that of X, it cannot contribute to the diagonal. Therefore, fn = [X n Y n ]Y (1 − PY′ (XY, Y ))(1 + X P (XY, Y ) ( )m ) Y m≥1 X P (XY, Y ) = [X n Y n ]Y (1 − PY′ (XY, Y ))( )m ) ( Y m≥1 X n m−1 ′ = [X Y ](1 − PY (X, Y ))P (X, Y )m . m≥1 References [1] H. Furstenberg, “Algebraic functions over finite fields”, J. Algebra 7, 271–277 (1967). [2] M. Soria, Thèse d’habilitation (1990), LRI, Orsay. 4
0math.AC
Nonparametric Regression for Spatial Data with Wavelets ∗ arXiv:1609.06744v3 [math.ST] 11 Feb 2018 Johannes T. N. Krebs† February 13, 2018 Abstract We study nonparametric regression estimates for random fields. The data satisfies certain strong mixing conditions and is defined on the regular N -dimensional lattice structure. We show consistency and obtain rates of convergence. The rates are optimal modulo a logarithmic factor in some cases. As an application, we estimate the regression function with multidimensional wavelets which are not necessarily isotropic. We simulate random fields on planar graphs with the concept of concliques (cf. Kaiser et al. (2012)) in numerical examples of the estimation procedure. Keywords: Asymptotic statistics; Concliques; Graphical networks; Multidimensional wavelets; Nonparametric regression; Rates of convergence; Random fields; Sieve estimation; Spatial lattice processes; Strong spatial mixing conditions MSC 2010: Primary 62G08, 62H11, 65T60; Secondary: 65C40, 60G60 1 Introduction In this article we consider a nonparametric regression model with random design for data which is observed on a spatial structure such as a regular N -dimensional lattice or a finite and undirected graph G = (V, E) with a set of nodes V and a set of edges E. Consider the random field (X, Y ) = {(X(s), Y (s)) : s ∈ ZN } ⊆ Rd × R. We assume that (X, Y ) has equal marginal distributions, e.g., (X, Y ) is stationary. Denote the probability distribution of the X(s) by µX . The process satisfies the regression model Y (s) = m(X(s)) + ς(X(s)) ε(s), s ∈ ZN , (1.1) where m and ς are two elements of the function space L2 (µX ). The collection of error terms ε = {ε(s) : s ∈ ZN } is independent of X. The ε(s) have mean zero and unit variance. There is a vast literature on nonparametric regression models, e.g., the books of Härdle (1990), Györfi et al. (2002) and Györfi et al. (2013). A particular choice for the estimation of (1.1) are sieve estimators, see Grenander (1981). One class of sieve estimators are neural networks: Hornik (1991) investigates approximation properties of multilayer feedforward networks. Rates of L2 -convergence for sigmoidal neural networks have been studied by Barron (1994) and McCaffrey and Gallant (1994). Franke and Diagne (2006) use neural networks for modeling financial time series. Kirch and Tadjuidje Kamgaing (2014) model autoregressive processes by a feedforward neural network. Another popular choice for the construction of the sieve are wavelets, see Härdle et al. (2012) and Fan and Gijbels (1996). While the kernel method is efficient if the probability distribution of the X(s) has unbounded support, it can have disadvantages if the distribution is compactly supported because of the boundary bias. Moreover, the kernel method requires a smooth regression function, e.g., two-times continuous differentiability. In situations where these requirements are not satisfied, the wavelet method is an alternative which performs relatively well because it adapts automatically to the ∗ This research was supported by the German Research Foundation (DFG), Grant Number KR-4977/1 and by the Fraunhofer ITWM, 67663 Kaiserslautern, Germany which is part of the Fraunhofer Gesellschaft zur Förderung der angewandten Forschung e.V. † Department of Statistics, University of California, Davis, CA, 95616, USA, email: [email protected] 1 regularity of the underlying regression function. The wavelet estimator does not depend on the smoothness parameters of the curve of interest, however, it behaves as if the true curve is known in advance. In this article, we consider the sieve estimator as defined in Györfi et al. (2002) and we construct the sieve in applications with general multidimensional wavelets. The wavelet method has already been studied both in the classical i.i.d. case and for dependent data in various ways: Donoho et al. (1996) and Donoho and Johnstone (1998) use wavelets for univariate density estimation with i.i.d. data. Cai (1999) studies block thresholding of the wavelet estimator in the regression model with fixed design. Kerkyacharian and Picard (2004) construct warped wavelets for the random design regression model which admit an orthonormal basis w.r.t. the design distribution. Kulik and Raimondo (2009) use warped wavelets in the regression model with dependent data and heteroscedastic error terms. Brown et al. (2010) study the wavelet method in the context of nonparametric regression estimators for exponential families. Recently, the analysis of spatial data has gained importance in many applications, e.g., in astronomy, image analysis, environmental sciences or more general in GIS applications. Spatial data, which is often referred to as random fields, is mostly indexed by the discrete set ZN , N ∈ N+ . The monographs of Cressie (1993) and Kindermann and Snell (1980) offer a detailed introduction to this topic. Consequently, nonparametric regression models (with random design) for dependent data have become a major tool in spatial statistics. We only mention a few related references: Koul (1977), Roussas and Tran (1992), Baraud et al. (2001), Guessoum and Saı̈d (2010), Yahia and Benatia (2012), Li and Xiao (2017). So far, the kernel method has been a popular when considering regression models for spatial data, see e.g., Carbon et al. (2007) or Hallin et al. (2004). The wavelet method however has received little attention: Li (2016) studies a wavelet estimator for the nonparametric regression model in the context of spatial data under the assumption that the design distribution of the X(s) is known. In this article, we continue with these ideas but we remove the assumption that the design distribution is known. We transfer the nonparametric regression model of Györfi et al. (2002) for i.i.d. data to spatially dependent data. The model of Györfi et al. (2002) has three important features. Firstly, the regression function m can be any function in L2 (µX ). It is not required that m belongs to a certain range of function classes. E.g., other papers in the wavelet context often assume that the regression function belongs to the class of Besov spaces. Secondly, the function classes we construct the estimator from can take a very general form; we could use neural networks instead of multidimensional wavelets. Thirdly, the predicted variables Y (s) are not necessarily bounded and neither the design distribution of the X(s) nor the distribution of the error terms ε(s) needs to admit a density w.r.t. the Lebesgue measure. Furthermore, in this paper, we enrich the model with the following novelties. The data is not necessarily i.i.d. distributed any more. We prove consistency and derive rates of convergence of the least-squares estimator under strong mixing conditions. We relax the assumptions on the marginal distributions of the random field (X, Y ): the design distribution does not have to be known and does not have to admit a density w.r.t. the d-dimensional Lebesgue measure. The latter condition is assumed for instance in Hallin et al. (2004). In applications we choose d-dimensional wavelets to construct the sieve. These wavelets can take a very general form and do not have to be isotropic. Moreover, we remove the usual assumption of stationarity: we show that our estimator is consistent if the random field has equal marginal distributions. This is useful in applications to (Markov) random fields defined on irregular graphical networks which do not satisfy the usual definitions of stationarity. A Gaussian random field defined on a finite graph G = (V, E) is such an example. There, the dependency structure of the data is determined by the adjacency matrix of G and is supposed to vanish with an increasing graph-distance. Particular applications we have in mind are data like traffic intensity or road roughness indices on road networks, which may be represented on graphs. The simulation examples in the present manuscript are constructed with the algorithm of Kaiser et al. (2012) and use the concept of concliques. This approach puts us in position to consider our simulation as iterations of an ergodic Markov chain and we achieve a fast convergence of the simulated random field when compared to the Gibbs sampler. We give two simulation examples where we consider one bivariate and one univariate nonparametric linear regression problem on real graphical structures. The results give encouraging prospects in the handling of random fields on graphs. Altogether, on the one hand, the main contribution of the paper is the generalization of the theory of distributionfree nonparametric regression of Györfi et al. (2002) to spatial data. On the other hand, we demonstrate how practical inference on irregular graphs can be performed with the studied estimation technique. The remainder of this manuscript is organized as follows: we introduce the basic notation in detail in Section 2. Besides, we present two general theorems on the consistency and the rate of convergence of the truncated nonparametric 2 linear least-squares estimator. In Section 3 we use general d-dimensional wavelets to construct a consistent estimator of the regression function. Additionally, we derive rates of convergence for this estimator in examples where the regression function satisfies certain smoothness conditions. Section 4 is devoted to numerical applications: we present simulation concepts for random fields on graphical structures and discuss the developed theory in two examples. Section 5 contains the proofs of the presented theorems. Appendix A consists of useful exponential inequalities for dependent sums. Appendix B contains a deferred verification of an example. 2 Linear Regression on Spatial Data In this section, we present two main results of this article: we prove the consistency of the nonparametric estimator and derive its rate of convergence under very general conditions. The section is divided into three subsections. We start with the necessary notation and definitions in the first subsection and explain the estimation procedure in the second subsection. The last subsection contains the results. 2.1 Notation and Definitions Since we focus on random variables defined on a spatial structure, we introduce some notation usually used in this context. We work on a probability space (Ω, A, P) that is equipped with a generic random field Z; in our application Z will often be the random field (X, Y ). So Z is a collection of random variables {Z(s) : s ∈ ZN }, where N is the lattice dimension. Each Z(s) maps from Ω to S, where (S, S) is a measurable space. The random field is called (strictly) stationary if for each k ∈ N+ , for all points s1 , . . . , sk ∈ ZN and for each translation t ∈ ZN , it is true that the joint distribution of {Z(s1 + t), . . . , Z(sk + t)} coincides with the joint distribution of {Z(s1 ), . . . , Z(sk )}. If U is a random variable on (Ω, A, P) with values in [−∞, ∞], we write kU kP,p for the p-norm of U w.r.t. P for p ∈ [1, ∞]. Similarly, if ν is a measure on (Rd , B(Rd )) and f a real-valued function on Rd , we write kf kLp (ν) for the Lp -norm of f w.r.t. ν for p ∈ [1, ∞]. We define the 2-norm of a square matrix A = (ai,j )1≤i,j≤d ∈ Rd×d as kAk2 = supx:kxk2 =1 kAxk2 and write λ (resp. λd ) for the one-dimensional (resp. d-dimensional) Lebesgue measure on (R, B(R)) (resp. (Rd , B(Rd ))). Denote  the space of square integrable Borel functions on Rd w.r.t. the d-dimensional Lebesgue measure by L2 Rd , B(Rd ), λd . We sometimes abbreviate it by L2 (λd ). Furthermore, we write k · k∞ for the maximum norm on RN and d∞ for the corresponding metric which is extended to subsets I, J of RN via d∞ (I, J) := inf{d∞ (s, t) : s ∈ I, t ∈ J}. Additionally, we write s ≤ t for s, t ∈ RN if and only if the single coordinates satisfy si ≤ ti for each 1 ≤ i ≤ N . The N -dimensional vector (1, . . . , 1) is abbreviated by eN . Let I be a subset ZN . Then the σ-algebra which is generated by the Z(s) with s in I is denoted by F(I). The α-mixing coefficient was introduced by Rosenblatt (1956), we define it for a random field as α(k) := sup Z sup |P(A ∩ B) − P(A)P(B)| , I,J⊆ N , A∈F(I), d∞ (I,J)≥k B∈F(J) k ∈ N. A random field is strongly spatial mixing if α(k) → 0 as k → ∞. The β-mixing coefficient was introduced by Kolmogorov and Rozanov (1960), it is defined for two sub-σ-algebras F, G of A as    X X 1 P(Ui ∩ Vj ) − P(Ui )P(Vj ) : (Ui )i∈I ⊆ F, (Vj )j∈J ⊆ G are finite partitions of Ω . β(F, G) := sup   2 i∈I j∈J We define the β-mixing coefficient of the random field Z as β(k) := sup β(F(I), F(J)). Z I,J⊆ N , d∞ (I,J)≥k 3 We have the following relation between the two mixing coefficients 2α(k) ≤ β(k) ≤ 1, see Bradley (2005). N In the following we associate to each n ∈ NN + an index sets In := {s ∈ Z : eN ≤ s ≤ n}. As we study regression estimates based on data defined on this index set, we need to precise the asymptotics of the vector n. Consider a sequence (n(k) : k ∈ N) ⊆ NN such that min(ni (k) : i = 1, . . . , N ) ≥ C ′ max(ni (k) : i = 1, . . . , N ) for some C ′ ∈ R+ and max(ni (k + 1) : i = 1, . . . , N ) > max(ni (k) : i = 1, . . . , N ). (2.1) We say that such a sequence converges to infinity and write n → ∞. Moreover, if (An(k) : k ∈ N) is sequence which is indexed by the sequence (n(k) : k ∈ N), we also write An for this sequence. In particular, we characterize limits for real-valued sequences An in this notation, i.e., we agree to write limn→∞ An for limk→∞ An(k) . Equation (2.1) allows us to proceed at different speeds in each direction, as long as the ratio between the minimum and the maximum does not fall below a certain level. The amendment that the running maximum is strictly increasing ensures that we select sufficiently many data points in the sampling process and guarantees a strongly universally consistent estimator. We need two regularity conditions to prove the consistency of the sieve estimator. The first condition concerns both the index set on which the data is defined and the distribution of the data. We consider two models (α) and (β): Condition 2.1. Z := {Z(s) : s ∈ ZN } is an Rd -valued random field for N, d ∈ distributions, i.e., LZ(s) = LZ(t) for all s, t ∈ ZN . Furthermore, N+ which has equal marginal (α) the α-mixing coefficients decrease exponentially, i.e., α(k) ≤ c0 exp(−c1 k), k ∈ N and for certain c0 , c1 ∈ R+ . (β) for each pair (s, t) ∈ ZN × ZN the joint distribution of (Z(s), Z(t)) is absolutely continuous w.r.t. the product measure PZ(eN ) ⊗ PZ(eN ) such that the corresponding Radon-Nikodým derivatives are uniformly bounded in that sup s,t∈ Z N dP(Z(s),Z(t))  d PZ(eN ) ⊗ PZ(eN ) P,∞ < ∞. Moreover, the β-mixing coefficients of Z decrease exponentially, i.e., β(k) ≤ c0 exp(−c1 k), k ∈ certain c0 , c1 ∈ R+ . (2.2) N and for Condition 2.1 (α) is a very weak condition if the regression estimator is expected to be consistent. A usual assumption in this context is stationarity, as in Hallin et al. (2004) or Li (2016). However, since we want to cover irregular networks, we need this relaxed assumption because there is no definition of stationarity for random fields on a general (finite) graphical structure. Clearly, the dependence within the data has to vanish with increasing distance on the lattice. The decay of the α-mixing coefficients is not unusual. In particular, one can show that for time series exponentially decreasing α-mixing coefficients are guaranteed under mild conditions (Davydov (1973), Withers (1981)). Condition 2.1 (β) implies the first condition. The assumption on the Radon-Nikodým derivatives is reasonable as the dependence between the observations vanishes with increasing distance. Note that this condition does not imply that the marginal laws of the Z(s) have to admit a density w.r.t. the Lebesgue measure. Assuming this condition, we obtain optimal rates of convergence. The technical reason why β-mixing ensures optimal rates is that the data (X(s), Y (s)) can be coupled with a sample (X ∗ (s), Y ∗ (s)) which is sufficiently independent, we give more details below. Chen and Christensen (2013) also obtain optimal rates of convergence for regression estimates of time series under a β-mixing condition. At this point, it is important to remember the relation of Condition 2.1 (β) to m-dependence. Bradley (1989) shows that for random fields β-mixing and stationarity imply m-dependence if N is at least two. Thus, each strong mixing condition which is stricter than α-mixing implies m-dependence if the random field is stationary. In the following, we will work only in a few cases with a combination of Condition 2.1 (β) and stationarity. Especially, we do not need the assumption of stationarity when establishing rates of convergence under β-mixing. So our results apply indeed to β-mixing data and not only to m-dependent data. 4 In order to study sieve estimators, we have to quantify the approximability of function classes by a finite collection  of functions. For that reason let ε > 0 and let Rd , B(Rd ) be endowed with a probability measure ν. Consider a class of real-valued Borel functions G on Rd . Every finite collection g1 , . . . , gM of Borel functions on Rd is called an ε-cover of size M of G w.r.t. the Lp -norm k · kLp (ν) if for each g ∈ G there is a j, 1 ≤ j ≤ M , such that kg − gj kLp (ν) = 1/p R p < ε. The ε-covering number of G w.r.t. k · kLp (ν) is defined as Rd |g − gj | dν   n o N ε, G, k · kLp (ν) := inf M ∈ N : ∃ ε − cover of G w.r.t. k · kLp (ν) of size M . (2.3)     N is monotone, i.e., N ε2 , G, k · kLp (ν) ≤ N ε1 , G, k · kLp (ν) if ε1 ≤ ε2 . The covering number can be bounded uniformly over all probability measures under mild regularity conditions, compare the theorem of Haussler (1992) which is stated as Proposition A.1 in the appendix. Thus, many function classes G satisfy the following condition Condition 2.2. G is a class of uniformly bounded, measurable functions f : Rd → R, i.e., there is a B ∈ R+ such that kf k∞ = sup{|f (x)| : x ∈ Rd } ≤ B for all f ∈ G. Additionally, for all ε > 0 and all M ≥ 1: for any choice z1 , . . . , zM ∈ Rd the ε-covering number of G w.r.t. the L1 -norm of the discrete measure with point masses M −1 in z1 , . . . , zM is bounded by a deterministic function depending only on ε and G.   P We denote this function by HG (ε), i.e., N ε, G, k · kL1 (ν) ≤ HG (ε), where ν = M −1 M k=1 δzk . The key requirement of Condition 2.2 is that the covering number (which can be stochastic) admits a deterministic bound which only depends on the function class itself and on the parameter ε. A comparison with Proposition A.1 shows that almost every deterministic class of uniformly bounded functions admits such a bound. In particular, Condition 2.2 is valid for classes of uniformly bounded Sobolev functions or Hölder continuous functions. 2.2 The Estimation Procedure In this subsection, we describe the estimation procedure in detail. It coincides largely with the framework of Györfi et al. (2002). We assume that the random field (X, Y ) satisfies Condition 2.1 (α) or (β). The Y (s) are real-valued, and each pair (X(s), Y (s)) satisfies the relation (1.1) for each observation location s ∈ ZN . The error terms ε(s) are independent of X, have mean zero and unit variance. Note that we do not require any specific distribution of the error terms, e.g., a Gaussian distribution is not necessary. In addition, let Fn(k) ⊆ L2 (µX ) be deterministic increasing function classes the union of which is dense in L2 (µX ). The function classes are indexed by the sequence from (2.1). In this context, increasing means that Fn(k) ⊆ Fn(k+1) for k ∈ N+ . Preferably, one chooses function classes which satisfy the universal approximation property, see e.g. Hornik (1991): as the distribution µX is unknown in practice, the union of the function spaces Fn should be dense in L2 (µ) for any probability measure µ on (Rd , B(Rd )). We come back to this in more detail in Section 3. The least-squares estimator is defined for a function class Fn and a sample In as X 2 mn := arg min |In |−1 Y (s) − f (X(s)) . (2.4) f ∈Fn s∈In Later, we will choose finite-dimensional linear spaces spanned by real-valued functions fj : Rd → R for the Fn , i.e., Fn = ( Kn X j=1 ) aj fj : aj ∈ R, j = 1, . . . , Kn . (2.5) Note that the basis functions fj are ordered, so that Fn(k) ⊆ Fn(k+1) if Kn(k) ≤ Kn(k+1) . Using linear spaces as function classes has the computational advantage that the minimization is an unrestricted ordinary least-squares problem on the domain of the parameters without an additional penalizing term, i.e., the minimizing function in Equation (2.4) P PKn can be determined by the parameters (a1 , . . . , aKn ) which minimize |In |−1 s∈In (Y (s) − i=1 ai fi (X(s)))2 . In examples of application, the parameters ai are estimated with principal component regression and singular value decomposition. Nevertheless, the subsequent results are derived for more general function classes Fn . These merely 5 have to satisfy a technical condition on the measurability of the random variables (X(s), Y (s)) mapping from the probability space (Ω, A, P) to Rd × R; we indicate this by the writing Ω ∋ ω 7→ (X(s, ω), Y (s, ω)). In what follows, let (ρn(k) : k ∈ N+ ) be a real-valued and positive sequence which tends to infinity. Denote the truncation operator by TL y := max(min(y, L), −L) (L > 0). Then we define the truncated function classes of Fn by Tρn Fn := {Tρn f : f ∈ Fn }. The function classes Fn , resp. Tρn Fn , must not be too complex in the sense that taking the supremum preserves measurability: to be more precise, we need that the map Ω ∋ ω 7→ sup f ∈Tρn Fn |In |−1 X s∈In h i 2 2 |f (X(s, ω)) − TL Y (s, ω)| − E |f (X(eN )) − TL Y (eN )| (2.6) is A-B(R)-measurable for all n(k) and for all L > 0. This is necessary to apply exponential inequalities to (2.6). Finitedimensional linear spaces satisfy (2.6), so this condition is satisfied in our applications. In order to obtain a consistent estimator in regions of Rd with sparse data, we consider the truncated least-squares estimator m̂n := Tρn mn . (2.7) Consequently, the properties of the truncated least-squares estimator are determined by the sample In , by the sequence ρn and by the function classes Fn . In the case of linear spaces the latter are defined in terms of the number of basis functions Kn . In the following results the interplay between ρn , In and the Fn determines the consistency of the estimator and its rate of convergence. 2.3 Consistency and Rate of Convergence This subsection contains the main results of Section 2. We start with a result on the consistency of the truncated leastsquares estimator m̂n from Equation (2.7): Theorem 2.3. Let the random field (X, Y ) satisfy (1.1). Let the Fn be increasing function classes the union of which is dense in L2 (µX ) and fulfills (2.6). Assume that Condition 2.2 is satisfied for the truncated function classes Tρn Fn and define κn (ε, ρn ) := log HTρn Fn (ε/(4ρn )) . Assume that κn (ε, ρn ) → ∞ as n → ∞ in NN for each ε > 0. Let Condition 2.1 (α) be satisfied. If for each ε > 0 κn (ε, ρn )ρ4n (log |In |)2 /|In |1/N → 0 as n → ∞, then the estimate m̂n is weakly universally consistent, i.e., limn→∞ E tionally (X, Y ) is stationary and if additionally R R d |m̂n − m|2 dµX (2.8)  = 0. Moreover, if addi- 4 ρ4n (log |In |) /|In |1/N → 0 as n → ∞, then m̂n is strongly universally consistent, i.e., limn→∞ Let Condition 2.1 (β) be satisfied. If for each ε > 0 R R d |m̂n − m|2 dµX = 0 a.s. κn (ε, ρn )ρ4n (log |In |)N /|In | → 0 as n → ∞, then the estimate m̂n is weakly universally consistent. Moreover, if (X, Y ) is stationary and if additionally ρ4n (log |In |)N +2 /|In | → 0 as n → ∞, then m̂n is strongly universally consistent. The growth rates of the truncation sequence and of the covering number are upper bounds which guarantee a consistent estimator. We see that the conditions in the case of α-mixing data are more restrictive than in the case of β-mixing data. In the first case the growth in ρ4n times the logarithm of the covering number, κn (ε, ρn ), have to be overcompensated by the sample size |In |1/N modulo a logarithmic factor for a weakly universally consistent estimator. In the second 6 case of β-mixing data, the sample size |In | is not corrected by the exponent 1/N . This last result corresponds to the classical case of i.i.d. data, see Györfi et al. (2002). Below we will see again this analogy between i.i.d. and β-mixing data. Moreover in both dependence settings, we need an additional growth condition which ensures a strongly universally consistent estimate. Note that in the case where Condition 2.1 (β) is satisfied and (X, Y ) is stationary, we have that (X, Y ) is indeed m-dependent if N > 1 with the result of Bradley (1989). Hence, the last statement in Theorem 2.3 is actually achieved under m-dependence if N > 1. In the next corollary, we give an application to the linear spaces from Equation (2.5). For linear function spaces we can compute an upper bound of the covering number with Proposition A.1. This corollary is also a generalized result of Györfi et al. (2002) Theorem 10.3: Corollary 2.4. Let Fn be the linear span of continuous and linear independent functions f1 , . . . , fKn as in (2.5) such that ∪k∈N+ Fn(k) is dense in L2 (µX ). Assume Condition 2.1 (α). m̂n is weakly universally consistent if Kn ρ4n log ρn (log |In |)2 /|In |1/N → 0 as n → ∞. m̂n is strongly universally consistent if additionally (X, Y ) is stationary and if additionally ρ4n (log |In |)4 /|In |1/N → 0 as n → ∞. Assume Condition 2.1 (β). m̂n is weakly universally consistent if Kn ρ4n log ρn (log |In |)N /|In | → 0 as n → ∞. m̂n is strongly universally consistent if additionally (X, Y ) is stationary and if additionally ρ4n (log |In |)N +2 /|In | → 0 as n → ∞. One usually chooses a truncation sequence ρn growing at a rate of O(log |In |) which is negligible, e.g., see Kohler (2003) who considers piecewise polynomials as basis functions in the case of i.i.d. data. The next result gives the rate of convergence of the truncated least-squares estimator m̂n in both dependence scenarios. This rate can be divided into an empirical error which depends on the realization ω ∈ Ω and an approximation error which relates the regression function m to its projection onto the function classes Fn . However, in order to derive a rate of convergence result, we need an additional requirement on the error terms because we do not rule out conditional dependence between two distinct observations Y (s) and Y (t). Thus, we need a condition on the conditional covariance matrix of the observations Y (s) given the observations X(s). We denote this matrix by Cov(Y (In ) | X(In )). Note that in the special case with uncorrelated error terms ε(s), Cov(Y (In ) | X(In )) is a diagonal matrix and it is sufficient to impose a restriction on the conditional variances. Theorem 2.5. Assume that the regression function and the conditional variance function are essentially bounded, i.e.,   kmk∞ , kςk∞ ≤ L. If the error terms ε(s) are correlated, assume that E |ε(eN )|2+γ < ∞ for some γ > 0. The function classes Fn are linear spaces as in Equation (2.5). If Condition 2.1 (α) is satisfied, assume Kn log(|In |)/|In |1/(2N ) → 0 as n → ∞. Then there is a C ∈ R+ such that Z  Z Kn log |In | . E |m̂n − m|2 dµX ≤ 8 inf |f − m|2 dµX + C f ∈Fn Rd |In |1/(2N ) Rd If Condition 2.1 (β) is satisfied, assume Kn (log |In |)N +2 /|In | → 0 as n → ∞. Then there is a C ∈ R+ such that E Z R 2 d |m̂n − m| dµX  ≤ 16 inf f ∈Fn Z R d 2 |f − m| dµX + C Kn (log |In |)N +2 . |In | The first term appearing on the right-hand side of both inequalities is a multiple of the the approximation error which depends on the function class Fn . The second term is the estimation error. The number of basis functions Kn has a linear influence on this error. This influence is negative because if Kn increases, there are more parameters which need to be estimated. Conversely, a growing sample size reduces this error. In the case of β-mixing data, an increasing sample size reduces the error more than in the case of α-mixing data. The boundedness of the functions m and ς and the assumption that we know this bound are essential to derive rates of convergence, see Györfi et al. (2002) for more details. However, note that we do not assume the error terms to be   bounded. We only require a moment condition, i.e., E |ε(eN )|2+γ < ∞ for some γ > 0. This is not unexpected if we want to bound the summed conditional covariances in our model from (1.1) which has the multiplicative heteroscedastic structure. 7 In the case of linear function spaces, Györfi et al. (2002) find that the estimation error can be bounded by Kk (log k)/k times a constant under similar assumptions for the case of an i.i.d. sample of size k. This guarantees an optimal rate of convergence in terms of Stone (1982) up to a logarithmic factor. We see that for β-mixing data our result guarantees the same rate up to a logarithmic factor. We discuss this in detail in Section 3 below. 3 Linear Wavelet Regression on Spatial Data In this section we consider an adaptive wavelet estimate of the regression function m. The section is divided into two subsections. We give the main definitions in the first subsection, the results follow in the second subsection. 3.1 Preliminaries A detailed introduction to the properties of wavelets, in particular the construction of wavelets with compact support, can be found in Meyer (1995) and Daubechies (1992). Since we consider d-dimensional data, we give a short review on important concepts of wavelets in d dimensions indexed by the lattice Zd . The definitions are taken from Strichartz (1993). In the following, M ∈ Rd×d is a matrix which preserves the lattice, i.e., M Zd ⊆ Zd . Moreover, M is strictly expanding in that all eigenvalues ζ of M satisfy |ζ| > 1. Denote the absolute value of the determinant of M by |M |.  A multiresolution analysis (MRA) of L2 λd with a scaling function Φ : Rd → R is an increasing sequence of subspaces . . . ⊆ U−1 ⊆ U0 ⊆ U1 ⊆ . . . such that the following four conditions are satisfied  S (1) (Denseness) j∈Z Uj is dense in L2 λd , T (2) (Separation) j∈Z Uj = {0}, (3) (Scaling) f ∈ Uj if and only if f (M −j · ) ∈ U0 , (4) (Orthonormality) {Φ( · − γ) : γ ∈ Zd } is an orthonormal basis of U0 . The relationship between an MRA and an orthonormal basis of L2 (λd ) is summarized in the next theorem: Theorem 3.1 (Strichartz (1993)). Suppose Φ generates a multiresolution analysis and the ak (γ) satisfy for all 0 ≤ j, k ≤ |M | − 1 and γ ∈ Zd the equations X X aj (γ ′ ) ak (M γ + γ ′ ) = |M | δ(j, k) δ(γ, 0) and a0 (γ) = |M |. γ′∈ Z d γ∈ Z d P Furthermore, define the functions Ψk := γ∈Zd ak (γ) Φ(M · −γ) for k = 1, ..., |M | − 1. Then the set of functions {|M |j/2 Ψk (M j · −γ) : j ∈ Z, k = 1, . . . , |M | − 1, γ ∈ Zd } forms an orthonormal basis of L2 (λd ): M M L2 (λd ) = U0 ⊕ Wj = Wj , where Wj := h |M |j/2 Ψk (M j · −γ) : k = 1, . . . , |M | − 1, γ ∈ Zd i. j∈ N j∈ Z The scaling function Φ is also called the father wavelet and also denoted by Ψ0 . The Ψk are the mother wavelets for k = 1, . . . , |M | − 1. We sketch in a short example how to construct a d-dimensional MRA provided that one has a father and a mother wavelet on the real line. Example 3.2 (Isotropic d-dimensional MRA from one-dimensional MRA via tensor products). Let d ∈ N+ and let ϕ be a father wavelet on the real line R together with a mother wavelet ψ, so that ϕ and ψ are related by the identities √ X √ X ϕ≡ 2 hγ ϕ(2 · −γ) and ψ ≡ 2 gγ ϕ(2 · −γ), γ∈ Z γ∈ Z for real sequences (hγ : γ ∈ Z) and (gγ : γ ∈ Z). Let ϕ generate an MRA of L2 (λ) with the corresponding spaces Uj′ , j ∈ Z. The d-dimensional wavelets are derived as follows. Define M by 2Id , where Id is the identity matrix in Rd×d . 8 Denote the mother wavelets as pure tensors by Ψk := ξk1 ⊗ . . . ⊗ ξkd for k ∈ {0, 1}d \ 0, where ξ0 := ϕ and ξ1 := ψ. The scaling function is given as Φ := Ψ0 := ⊗di=1 ϕ. In Appendix B we demonstrate that Φ and the linear spaces Uj := ⊗di=1 Uj′ form an MRA of L2 (λd ) and that the functions Ψk , generate an orthonormal basis in the sense that D E M M  Wj = Wj , where Wj = |M |j/2 Ψk M j · −γ : γ ∈ Zd , k ∈ {0, 1}d \ 0 . L2 (λd ) = U0 ⊕ j∈ N j∈ Z 3.2 Consistency and Rate of Convergence In the sequel, we bridge the gap between nonparametric regression and wavelet theory. As indicated in Theorem 2.3 the S function spaces k∈N+ Fn(k) are preferably dense in L2 (µ) for any probability measure µ. The next theorem states that wavelets satisfy this universal approximation property. Theorem 3.3. Consider an isotropic MRA on Rd with corresponding scaling function Φ constructed as in Example 3.2 from a compactly supported real scaling function ϕ. Let µ be a probability measure on B(Rd ) and let 1 ≤ p < ∞. S Then j∈Z Uj is dense in Lp (µ). In what follows we assume that Φ is a compactly supported scaling function and that M is a diagonalizable matrix, i.e., M = S −1 DS for a diagonal matrix D which contains the eigenvalues of M . Denote the maximum of the absolute values of the eigenvalues by ζmax := max{|ζi | : i = 1, . . . , d}. Set Φj,γ := |M |j/2 Φ(M j · −γ), where γ ∈ Zd and j ∈ Z. Let (wn(k) : k ∈ N) ⊆ Z and (j(n(k)) : k ∈ N) ⊆ Z be two increasing sequences with limn→∞ wn = ∞ and limn→∞ j(n) = ∞. We set Kn := {γ ∈ Zd : kγk∞ ≤ wn } ⊆ Zd . Then, we define the linear function space by Fn :=  X  γ∈Kn   aγ Φj(n),γ : aγ ∈ R  ⊆ Uj(n) . (3.1) So the j(n) scale Φ, whereas the wn control which translations are used for the construction of the function space Fn . Based on the results from the previous section, the following statements are true for the linear wavelet estimate. Theorem 3.4. Assume that the wavelet basis is dense in L2 (µX ). Set ρn := c log |In | for some constant c ∈ R+ . Define the wavelet estimator m̂n by Equations (2.7) and (3.1). Let limn→∞ (ζmax )j(n) /wn = 0. Assume that Condition 2.1 (α) is satisfied, then m̂n is weakly universally consistent if  lim wnd (log |In |)6 log log |In | |In |1/N = 0. (3.2) n→∞  m̂n is strongly universally consistent if (X, Y ) is stationary, if (3.2) holds and if limn→∞ (log |In |)8 |In |1/N = 0.  Assume that Condition 2.1 (β) is satisfied, if limn→∞ wnd (log |In |)N +4 log log |In | |In | = 0, then m̂n is weakly universally consistent. m̂n is strongly universally consistent if additionally (X, Y ) is stationary and if additionally  limn→∞ (log |In |)N +6 |In | = 0. Theorem 3.5. Let Condition 2.1 (β) and the assumptions of Theorem 2.5 be satisfied, then there is a constant C independent of n such that  Z Z  2 |m̂n − m| dµX ≤ C wnd (log |In |)N +2 |In | + 16 inf |f − m|2 dµX . E R f ∈Fn d R d We give a short application in the case where the wavelet basis is generated by isotropic Haar wavelets in d dimensions and where the regression function m is (A, r)-Hölder continuous on a compact subset of Rd . This means that r |m(x) − m(y)| ≤ A kx − yk∞ for all x, y in the domain of m, for an A ∈ R+ and for an r ∈ (0, 1]. 9 Corollary 3.6. Let the conditions of Theorem 3.5 be satisfied such that the data satisfies Condition 2.1 (β). Let the conditional mean function m be (A, r)-Hölder continuous. Define the level j as a function of n by 2j ≃ |In |1/(d+2r) . Then the mean integrated squared error satisfies Z    E (3.3) |m̂n − m|2 dµ = O (log |In |)N +2 |In |−2r/(d+2r) . R d Proof. Note that by construction it suffices to choose wn proportional to 2j because the domain of the function m is bounded, we can cover it with 2jd wavelets from the j-th scale. This means that the estimation error behaves as O(2jd (log |In |)N +2 /|In |). It remains to compute the approximation error: there is a function f ∈ Fn piecewise constant on dyadic ddimensional cubes of edge length 2−j with values    f (x) = m (γ1 , . . . , γd )/2j for x ∈ (γ1 , . . . , γd )/2j , ((γ1 , . . . , γd ) + eN )/2j , where γi ∈ Z for i = 1, . . . , d such that γ = (γ1 , . . . , γd ) is an admissible element from Kn . Hence for this f Z |f − m|2 dµX ≤ sup |f − m|2 ≤ A2 2−2rj(n) . R d dom m The choice of j as 2j ≃ |In |1/(d+2r) approximately equates the estimation and the approximation error. The interpretation of the two parameters d and r in the rate of convergence is well known: on the one hand, an increase in d deteriorates the rate (the curse of dimensionality). On the other hand, an increase in r towards 1 increases the rate of convergence because the regression function becomes smoother and can be better approximated by finite linear combinations of functions. We compare the above result to the results for the classical case of i.i.d. data: if the regression function is Hölder  continuous, the rate of convergence is in O k −2r/(d+2r) up to a logarithmic factor, where the sample size is k, see Kohler (2003) or Györfi et al. (2002). This is nearly optimal when compared to Stone (1982). The additional log-loss is due to the increasingly complex sieves.  Hence, our rate of O (log |In |)N +2 |In |−2r/(d+2r) is the same modulo a logarithmic factor. Note that this result is independent of the lattice dimension N on which the data is defined. Chen and Christensen (2013) also consider regression function estimates with wavelets for β-mixing time series. Their results can be compared to the present findings in the special case where the lattice dimension N equals 1. They also obtain a nearly optimal rate w.r.t. the sup-norm. Li (2016) considers a wavelet based regression estimator for spatial data similar to our model from (1.1). He also obtains a nearly optimal rate. However, some of the regularity conditions are more restrictive than those in Condition 2.1: the design distribution of the regressors X(s) has to admit a density and, additionally, this density must be known. This knowledge is used in the estimation process of the regression function. Furthermore, the response variables Y (s) have to be bounded. Our results are derived without these additional restrictions. 4 Examples of Application We begin this section with some well-known results on Gaussian Markov random fields necessary for the following applications. The monograph of Kindermann and Snell (1980) gives an introduction to Markov random fields. Let G = (V, E) be a finite graph. We write Ne(s) for the neighbors of a node s w.r.t. the graph G and −s for the set V \ {s}. Assume that {Y (s) : s ∈ V } is multivariate normally distributed with expectation α ∈ R|V | and covariance matrix  d 1 Σ ∈ R|V |×|V | . Then Y has the density fY (y) = (2π)− 2 det(Σ)− 2 exp − (y − α)T Σ−1 (y − α)/2 . In particular, if we write P for the precision matrix Σ−1 , the conditional distribution of Y (s) given the remaining observations Y (−s) is     X Y (s) | Y (−s) ∼ N α(s) − (P (s, s))−1 P (s, t) y(t) − α(t) , P (s, s)−1 . t6=s 10 Since P = Σ−1 is symmetric and since we can assume that P (s, s)−1 > 0, Y is a Markov random field if and only if P (s, t) 6= 0 for all t ∈ Ne(s) and P (s, t) = 0 for all t ∈ V \ Ne(s), for all nodes s ∈ V . Cressie (1993) investigates the conditional specification   X  c(s, t) Y (t) − α(t) , τ 2 (s) , (4.1) Y (s) | Y (−s) ∼ N α(s) + t∈Ne(s)  where C = c(s, t) 1≤s,t≤|V | is a |V | × |V | matrix and T = diag(τ 2 (s) : s ∈ V ) is a |V | × |V | diagonal matrix such that the coefficients satisfy the condition τ 2 (s)c(t, s) = τ 2 (t)c(s, t) for s 6= t and c(s, s) = 0 as well as c(s, t) = 0 = c(t, s) if s, t are no neighbors. This means P (s, t) = −c(s, t)P (s, s), i.e., Σ−1 = P = T −1 (I − C). If I − C is invertible and if (I − C)−1 T is symmetric and positive definite, then the entire random field is multivariate normal with  Y ∼ N α, (I − C)−1 T . It is plausible to use equal weights c(s, t) in many applications, see Cressie (1993). Thus, we can write the matrix C as C = ηH, where H is the adjacency matrix of G, i.e., H(s, t) is 1 if s and t are neighbors, otherwise it is 0. Denote the maximal (resp. minimal) eigenvalue of H by hm (resp. h0 ). Assume that h0 < 0 < hm which is often satisfied in applications. We know from the properties of the Neumann series that in this case the matrix I − C is invertible if (h0 )−1 < η < (hm )−1 . This insight allows us to simulate a Gaussian Markov random field with an MCMC-algorithm using concliques with a full conditional distribution. Here we refer to Kaiser et al. (2012) for a general introduction to the concept of concliques. An overview of the exact simulation procedure can be found in Krebs (2018a). In the present simulation examples, we run 15k iterations of the MCMC-algorithm. These suffice to ensure a nearly stationary distribution of the Gaussian random field. We sketch the simulation procedure: let G = (V, E) be a finite graph with nodes s1 , . . . , s|V | . We simulate a d-dimensional random field Z on G such that each component Zi takes values in R|V | , for i = 1, . . . , d. We use copulas to simulate some of the components Zi as dependent. Each random field Zi has a specification Zi ∼  N α (1, . . . , 1)′ , σ 2 Σ , where α, σ ∈ R and σ > 0. Furthermore, Σ is a correlation matrix which satisfies the relation (I − ηH)−1 T = σ 2 Σ. (4.2)  The parameter η is chosen such that I − ηH is invertible and T is a diagonal matrix T = diag τ 2 (s1 ), . . . , τ 2 (s|V | ) . A large absolute value of η indicates a strong dependence within the random variables of one component, whereas η = 0 indicates independence within the component. The marginal distributions within a component equal each other, i.e., Zi (s) ∼ N(α, σ 2 ) for s ∈ V . However, the conditional variances τ 2 ( · ) within a component Zi may differ. In the next step, we use some of the components to construct the random field {X(s) : s ∈ V } and use another independent component to construct the error terms {ε(s) : s ∈ V }. We specify this below. Then we simulate the random field Y as in Equation (1.1) for a choice of m and a constant ς. So the conditional heteroscedastic part is constant. However, depending on the underlying graph G, the error terms ε(s) can have complex dependence patterns among each other. We estimate m with the truncated least-squares estimator from Equation (2.7). In the situation where the regression function m is known, the L2 -error can serve as a criterion for the goodness-of-fit of m̂: we split the whole sample into a learning sample VL and a testing sample VT . Here both VL and VT should be two connected sets w.r.t. the underlying graph if this is possible. We estimate m̂ from the learning sample and compute the approximate L2 -error with Monte Carlo integration over the testing sample, i.e., Z X |m̂ − m|2 dµX ≈ |VT |−1 |m̂(X(s)) − m(X(s))|2 . (4.3) R d s∈VT We run this entire simulation procedure 1000 times. Afterwards, we compute the mean and the standard deviation of the (approximate) L2 -error from (4.3) based on these simulations. Example 4.1 (Bivariate nonparametric regression). We simulate a random field on a planar graph G = (V, E) which represents the administrative divisions in the Sydney bay area on the statistical area level 1. For further reference see the 11 website of the Australian bureau of statistics, www.abs.gov.au. It comprises 7,713 nodes and approximately 47k edges in total. Hence, G is highly connected compared to the standard four-nearest neighborhood lattice. Figure 1(a) illustrates the graph. On this graph we model a three-dimensional Gaussian Markov random field Z = (Z1 , Z2 , Z3 ). Every Zi has a specification as in Equation (4.1) such that the marginals Zi (s) within each component are standard normally distributed. The parameter space of η is derived from the adjacency matrix of the graph G and contains the interval (−0.2221, 0.1312). Note that the range for the lattice with a four-nearest-neighborhood structure is (−0.25, 0.25). Then we adjust the marginal conditional variance of the variable Zi (s) given by τi2 (s) such that the entire random vector Zi has a covariance structure of the type Σi as in (4.2) for a correlation matrix Σi for i = 1, 2, 3. j 1 2 3 4 Estimates on the graph D4 wavelet Haar wavelet 0.264 0.413 (0.006) (0.008) 0.122 0.258 (0.009) (0.008) 0.163 0.198 (0.036) (0.010) 0.422 0.259 (0.075) (0.012) Independent reference estimates D4 wavelet Haar wavelet 0.260 0.406 (0.006) (0.007) 0.119 0.254 (0.009) (0.007) 0.170 0.196 (0.044) (0.010) 0.435 0.257 (0.077) (0.012) Table 1: L2 -error of the bivariate regression problem: the estimated mean and in parentheses the estimated standard deviation for a level j = 1, . . . , 4. The first two columns give the results for the random field, the last two columns those of the independent reference sample. In order to obtain dependent components Z1 and Z2 , we draw the error terms from a two-dimensional Gaussian copula in each iteration. The exact simulation parameters are given by µZi = 0, σi = 1 for i = 1, 2, 3, η1 = 0.12, η2 = −0.18 and η3 = 0.12. The covariance between the first two components is 0.7. The third component Z3 is simulated as independent. n   o−1 (s) for i = 1, 2, 3. The vectors τi2 ∈ R|V | are computed with the formula τi2 (s) = diag∼ inv I − ηi H Here we denote the inverse of a matrix by inv, the operator that maps the diagonal of a matrix to a vector by diag∼ and the elementwise inversion of a vector by {·}−1 . Afterwards, we transform the first two components Z1 and Z2 with the distribution function of a two-dimensional standard normal distribution onto the unit square and obtain the random field (X1 , X2 ). We specify the mean function in this example as m: R2 → R, (x1 , x2 ) 7→ (2 − 3x22 + 4x42 ) exp − (2x1 − 1)2 .  Figure 1(b) shows the function plot of m. We simulate Y (s) = m(X1 (s), X2 (s)) + Z3 (s) and we use two different wavelet scaling functions for the estimation of m: we perform the first regression with the Haar scaling function ϕ = 1[0,1) and the second with Daubechies 4-scaling function D4 (which is also known as db2). Figure 2 displays the results: Figure 2(a) depicts the estimate with Daubechies 4-scaling function, Figure 2(b) the one with the Haar scaling function. Table 1 gives the L2 -error statistics. Note that the L2 -error minimizing j for the Haar wavelet differs from the j minimizing the error for Daubechies 4-scaling function. The latter outperforms the Haar scaling function in this example. Moreover, Table 1 shows the L2 -error statistics with independent sample data of the same size. Note that this estimator with independent data is slightly better than the estimate from the random field for both wavelet types. Example 4.2 (Univariate nonparametric regression). In this example we consider a one-dimensional spatial regression problem based on a graph which represents Australia divided into administrative divisions on the statistical area level 3. The graph consists of 330 nodes and 1600 edges, cf. Figure 3(a). Again, this graph is highly connected in certain regions relatively to the four nearest neighborhood structure on a lattice. 12 (a) The Sydney bay area (on statistical area level 1-scale) 3 2.5 z 2 1.5 1 0.5 0 0 1 0.2 0.8 0.4 0.6 0.6 0.4 0.8 x 0.2 1 0 y (b) Function plot of m Figure 1: Input graph and regression function for the bivariate regression problem 13 3 2.5 z 2 1.5 1 0.5 0 0 1 0.2 0.8 0.4 0.6 0.6 0.4 0.8 0.2 1 x 0 y (a) Estimate of m with the D4 scaling function for j = 2 3 2.5 z 2 1.5 1 0.5 0 0 1 0.2 0.8 0.4 0.6 0.6 0.4 0.8 x 0.2 1 0 y (b) Estimate of m with the Haar scaling function for j = 3 Figure 2: Estimated regression functions for a bivariate regression problem 14 10° S 15° S 20° S 25° S 30° S 35° S 40° S 115° E 120° E 125° E 130° E 135° E 140° E 145° E 150° E 155° E (a) Administrative divisions of mainland Australia 6 5 4 3 2 1 0 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 (b) A realization of X and the mean function m Figure 3: Graph and true regression function. 15 0.9 1 4.5 4.5 4 4 3.5 3.5 3 3 4.5 4 3.5 3 2.5 2.5 2.5 2 2 2 1.5 1.5 1.5 0 0.5 1 1 0 0.5 1 0 0.5 1 (a) Estimate of m with the D4 scaling function for j = 3, 4, 5. 4.5 4.5 4.5 4 4 4 3.5 3.5 3.5 3 3 3 2.5 2.5 2.5 2 2 2 1.5 1.5 0 0.5 1 1.5 0 0.5 1 0 0.5 (b) Estimate of m with the Haar scaling function for j = 3, 4, 5. Figure 4: The estimates for the univariate regression problem. 16 1 We simulate two Gaussian random fields Z1 and Z2 on G with marginal means 0 and marginal variances 1 with the Markov chain method as in Example 4.1. The parameter space for η contains the interval (−0.3060, 0.1615). We choose η for both components equal to 0.15 and run 15k iterations of the MCMC-algorithm. Then we use the inverse of the standard normal distribution to retransform the component Z1 onto the unit interval and obtain the random field X with marginals uniformly distributed on [0, 1]. The conditional mean function is defined as the discontinuous function p   m : [0, 1] → R, x 7→ 2 + 8x2 − (1.7x)4 1{x≤0.7} + 2 4(x − 0.7) + 1 1{0.7<x} . We specify Y as Y (s) = m(X(s)) + Z2 (s)/2. Figure 3(b) depicts the simulated random field. Figure 4(a) shows the estimation with the Daubechies 4-scaling function, while Figure 4(b) depicts the case for the Haar wavelet. Table 2 shows that in all cases the L2 -error is minimized for the level j = 4. Note that in this example the Daubechies wavelet always outperforms the Haar wavelet when measured by the L2 -error. Furthermore, we see that the L2 -error of the independent reference estimates are minimal for the same level j = 4. j 2 3 4 5 6 Estimates on the graph D4 wavelet Haar wavelet 0.326 0.405 (0.031) (0.059) 0.241 0.344 (0.033) (0.064) 0.224 0.284 (0.077) (0.073) 0.319 0.349 (0.172) (0.117) 0.772 0.753 (0.437) (0.213) Independent reference estimates D4 wavelet Haar wavelet 0.321 0.401 (0.029) (0.061) 0.233 0.341 (0.035) (0.067) 0.213 0.280 (0.062) (0.078) 0.299 0.333 (0.134) (0.093) 0.712 0.727 (0.380) (0.212) Table 2: L2 -error of the univariate regression problem: the estimated mean and in parentheses the estimated standard deviation for a level j = 2, . . . , 6. The first two columns give the results for the random field, the last two columns those of an independent reference sample of the same size. 5 Proofs of the Results in Section 2 and Section 3 The first lemma is a consequence of the coupling lemma of Berbee (1979). In the case of β-mixing, we construct another sample (X ∗ , Y ∗ ) which has good properties. Lemma 5.1. Let (X, Y ) be a random field on ZN . For each n ∈ NN + and q ∈ N+ such that 2q < min{ni : i = 1, . . . , N }, there is a partition of In which is denoted by {I(l, u) : l = 1, . . . , 2N , u = 1, . . . , R} and collection N of random variables Z ∗ (l, u) = ((X ∗ (s), Y ∗ (s)) : s ∈ I(l, u)) ∈ R(d+1)q such that for each l the collection Z ∗ (l, 1), . . . , Z ∗ (l, R) is independent and P(Z ∗ (l, u) 6= Z(l, u)) = β(q) where Z(l, u) = ((X(s), Y (s)) : s ∈ I(l, u)) and β is the β-mixing coefficient of (X, Y ). Moreover, Z ∗ (l, u) is independent of Z(l, 1), . . . , Z(l, u − 1) for each u = 1, . . . , R and for each l = 1, . . . , 2N . Proof. The proof follows as in Carbon et al. (1997) where a similar coupling result is established under the α-mixing condition. We only sketch the main parts. Firstly, we give the construction of the partition. We choose R1 , . . . , RN such that 2q(Ri − 1) < ni ≤ 2qRi =: n∗i for each k = 1, . . . , N. For the k-th coordinate direction, we partition the summation index set {1, . . . , n∗i } ⊇ {1, . . . , ni } into Ri subsets each consisting of two disjoint intervals of length q. So, we have a union of 2Ri intervals of length q. 17 Combining the partitions in all N coordinate directions, we get a partition of the N -dimensional rectangle In∗ = {s ∈ ZN ; eN ≤ s ≤ n∗ } ⊇ In into R = R1 ·. . .·RN blocks containing (2q)N points of the N -dimensional integer lattice each. Within each block, there are 2N smaller subsets, which are N -dimensional rectangles with all edges of length q. Write I(l, u) for the l-th subset in the u-th block, l = 1, . . . , 2N and u = 1, . . . , R. Its cardinality is q N . Moreover, using the requirement on n, we have that Ri ≥ 2 for each k = 1, . . . , 2N . Thus, q N R ≤ |In | and |In |/2N ≤ q N R. The subcubes I(l, u) have the property that for fixed l the distance between I(l, u) and I(l, u′ ) is at least q. Secondly, we apply recursively (as in Carbon et al. (1997)) the lemma of Berbee (1979) to the collection of random N variables Z(l, 1), . . . , Z(l, R) for each l. We obtain random variables Z ∗ (l, 1), . . . , Z ∗ (l, R) ∈ R(d+1)q with the desired properties. The claim follows now when defining the X ∗ (s) and the Y ∗ (s) such that Z ∗ (l, u) = ((X ∗ (s), Y ∗ (s)) : s ∈ I(l, u)) a.s. for each u = 1, . . . , R and for each l = 1, . . . , 2N . The next proposition is a well-known result of Györfi et al. (2002) which states sufficient conditions for a consistent estimator. It holds as well for dependent data because in the proof of the proposition those terms which are related to the dependence structure of the data converge to zero by assumption. So it is our task to verify these assumptions later. More precisely, it is assumed that the function classes can approximate the regression function m arbitrarily exactly both in part (a) and in part (b) of this proposition. In our case this assumption does not depend on the data. However, the second requirement in both parts of the proposition is affected by the dependence structure of the data: here it is assumed that a certain empirical mean uniformly converges to the corresponding true mean for each possible function in the sieve. This requirement crucially depends on the data and we can verify this assumption later. Proposition 5.2 (Modified version of Györfi et al. (2002) Theorem 10.2). Let (Ω, A, P) be a probability space endowed with the random field (X, Y ) which satisfies the model (1.1) and Condition 2.1 such that each X(s) is Rd -valued and each Y (s) is R-valued. Let Fn(k) ⊆ L2 (µX ) be a class of functions f : Rd → R for each k ∈ N+ . Let (ρn(k) : k ∈ N) ⊆ R+ be an sequence which increases to infinity. Denote the truncated least-squares estimate of m from Equation (2.7) by m̂n . In addition, let the map from (2.6) be A-B(R)-measurable. (a) If for all L > 0 both   inf kf − mkL2 (µX ) = 0 and lim E n→∞ f ∈Fn ,||f ||∞ ≤ρn " #  2 2  X −1 TL Y (s) − f (X(s)) − E TL Y (eN ) − f (X(eN ) sup |In | = 0, lim E n→∞ f ∈Tρn Fn s∈In i hR 2 then m̂n is weakly universally consistent, i.e., limn→∞ E Rd (m̂n − m) dµX = 0.   P (b) If furthermore, limn→∞ |In |−1 s∈In |Y (s) − TL Y (s)|2 = E |Y (eN ) − TL Y (eN )|2 a.s. and if both lim inf n→∞ f ∈Fn ,||f ||∞ ≤ρn lim sup n→∞ f ∈Tρ Fn n |In | kf − mkL2 (µX ) = 0 a.s. and −1  2  2 X =0 TL Y (s) − f (X(s)) − E TL Y (eN ) − f (X(eN )) a.s. n∈In for all L > 0, then m̂n is strongly universally consistent, i.e., limn→∞ We proceed with the proof of the first main theorem of Section 2. 2 R R d (m̂n − m) dµX = 0 a.s. Proof of Theorem 2.3. We verify that in both dependence scenarios the sufficient criteria of Proposition 5.2 are satisfied for the given choices of the parameters. The structure of the proof is quite similar to the one of Theorem 10.3 in Györfi et al. (2002). Therefore we sketch those parts which differ because of the dependence in the data and the assumed covering condition (Condition 2.2). The approximation property of the function classes is satisfied by assumption. Moreover, we can assume w.l.o.g. that L < ρn in both cases because ρn tends to infinity. We have to consider the function classes  Hn := h : Rd × R → R, h(x, y) = |f (x) − TL (y)|2 for all (x, y) ∈ Rd × R, for some f ∈ Tρn Fn . 18 We begin with the case of α-mixing data. From Condition 2.2 we obtain a uniform bound on the ε-covering number  N ε, Hn , k · kL1 (ν) which we denote by HHn (ε), here ν is an arbitrary probability measure with equal mass concentrated at certain points z1 , . . . , zu ∈ R, u ∈ N+ . Provided that L ≤ ρn , we have for the covering number of this class Hn     ε ε ε HH n ≤ HTρn Fn = HTρn Fn = exp κk (ε/32, ρn ). 32 32(4ρn ) 128ρn For details on the first inequality, see the proof of Theorem 10.3 in Györfi et al. (2002). Note that the functions in Hn are  bounded by 4ρ2n if L ≤ ρn . By assumption, ρ4n κn (ε/32, ρn ) (log |In |)2 |In |1/N → 0 as n → ∞. We use Theorem A.4 to give an upper bound on the following probability (note that we only need to consider the exponential term in (A.2) which decays at a slower rate) ! i h 1 X 2 2 |f (X(s)) − TL Y (s)| − E |f (X(eN )) − TL Y (eN )| >ε (5.1) sup P f ∈Tρn Fn |In | s∈I n ( ) A2 |In |1/N ε2 ≤ A1 exp {κn (ε/32, ρn)} exp − 2 16ρ4n + 4ρ2n ε (log |In |) !) ( (5.2) 2 κn (ε/32, ρn)[16ρ4n + 4ρ2n ε (log |In |) ] ε2 |In |1/N , A2 − = A1 exp − 2 ε2 |In |1/N 16ρ4n + 4ρ2n ε (log |In |) for suitable constants A1 and A2 . The weak consistency follows from (5.2): let ε > 0 be arbitrary but fixed, then # " i h 1 X 2 2 sup |f (X(s)) − TL Y (s)| − E |f (X(eN )) − TL Y (eN )| E f ∈Tρn Fn |In | s∈I n ( ) Z ∞ A2 |In |1/N t2 ≤ ε + A1 exp {κn (ε, ρn )} exp − dt → ε, 16ρ4n + 4ρ2n t (log |In |)2 ε as n → ∞. Concerning the a.s. convergence of the estimate, we find that under the condition of α-mixing and station2 arity the random variables {|Y (s) − TL Y (s)| : s ∈ ZN } are ergodic, see Theorem B.4 in Krebs (2018a). This implies that X   a.s. lim |In |−1 |Y (s) − TL Y (s)|2 = E |Y (eN ) − TL Y (eN )|2 n→∞ s∈In for all L > 0. Furthermore, if additionally 4 ρ4n (log |In |) /|In |1/N → 0 as n → ∞, Equation (5.2) remains summable for a sequence of index sets In(k) which satisfies the condition in (2.1). Thus, an application of the Borel-Cantelli Lemma to the same equation yields that the estimator is strongly universally consistent. This finishes the case for α-mixing data. It follow the considerations for the case of β-mixing data. Again, we assume that ρn > L. Therefore we use the partition of In which is provided by Lemma 5.1 for the choice q = ⌈2 log |In |/c1 ⌉. As in Tran (1990) we assume that Ri q = ni for each i = 1, . . . , N . We use the coupled random field (X ∗ , Y ∗ ) to obtain the estimator m̂∗n of the regression function m. We split the integrated error as follows Z Z Z 2 ∗ 2 |m̂n − m| dµX ≤ 2 |m̂n − m| dµX + 2 |m̂∗n − m̂n |2 dµX (5.3) R d R R d d Exploiting the properties of (X ∗ , Y ∗ ), we find that the second term is at most Z |m̂∗n − m̂n |2 dµX ≤ 4ρ2n 1{(X ∗ (s), Y ∗ (s)) 6= (X(s), Y (s)) for one s ∈ In } . R d 19 Using that β(q) ∈ O(|In |−2 ), we have the following bound for the expectation Z  ∗ 2 |m̂n − m̂n | dµX ≤ 4ρ2n β(q) ≤ Cρ2n /|In |2 → 0, E R d n → ∞, where we use that by assumption ρ4n /|In | vanishes. Moreover, we have ∞ X k=1 P Z R d |m̂∗n(k) − m̂n(k) |2 dµX > ε  ≤ 4ε−1 ∞ X k=1 ρ2n(k) β(q(n(k))) ≤ C ∞ X k=1 |In(k) |−1.5 < ∞. Hence, Rd |m̂∗n − m̂n |2 dµX both vanishes in the mean and a.s. Consequently, the first integral in (5.3) remains and we need to study the probability in (5.1) in this scenario, it equals   2N X R i h X X 1 2 2 P  sup |f (X ∗ (s)) − TL Y ∗ (s)| − E |f (X ∗ (eN )) − TL Y ∗ (eN )| > ε f ∈Tρn Fn |In | l=1 u=1 s∈I(l,u)     2N R i h X X X |I |ε 1 n 2 2  P  sup |f (X ∗ (s)) − TL Y ∗ (s)| − E |f (X ∗ (eN )) − TL Y ∗ (eN )|  > N  . ≤ 2 R f ∈Tρn Fn R u=1 R l=1 s∈I(l,u) (5.4) Using the properties of the coupled process and the stationarity of (X, Y ), we see that the summands over the index sets I(l, 1), . . . , I(l, R) are i.i.d. for each l = 1, . . . , 2N . Consequently, we can apply Theorem 9.1 in Györfi et al. (2002). Note that in the proof of this theorem it is only necessary that the data is independent but not that it is identically distributed. Hence, we obtain for Equation (5.4) the bound        ε2 |In | ε2 |In | εq N εq N N +3 HTρn Fn exp − 2N +13 N 4 exp − 2N +13 N 4 ≤ 2 2 HH n 2N +3 2 q ρn 2N +3 (4ρ2n ) 2 q ρn   N   2 εq ε |In | = 2N +3 exp κn , ρn − 4N +13 2N +3 2 (c1 )−N (log |In |)N ρ4n N +3  (5.5) using the definition of κn and of the block size q. Note that the factor q N inside κn can be neglected as it only decreases κn marginally if ε > 0 is fixed. Now, the same computations as in the case of α-mixing data yield the result. We do not go into the details. The proof of Corollary 2.4 requires the concept of the Vapnik-Chervonenkis-dimension (VC-dimension). The definition of the VC-dimension is rather technical and can be found in the book of Györfi et al. (2002), Definition 9.6. Proof of Corollary 2.4. It remains to consider some technical issues. Clearly, the map RKn × Ω ∋ (a, ω) 7→ Kn X i=1 ai fi (X(s, ω)) is B(RKn ) ⊗ A-measurable. The desired measurability of the map in Equation (2.6) follows from the fact that for any measurable function g on a product space (S × T, S ⊗ T) the set    t ∈ T : sup g(s, t) > c = t ∈ T ∃s ∈ S : g(s, t) > c s∈S = πTS×T {(s, t) ∈ S × T : g(s, t) > c} ∈ T, where πTS×T is the projection from S × T onto T . Furthermore, the Vapnik-Chervonenkis-dimension is at least 2 if Kn ≥ 2. Indeed, choose functions f1 and f2 . Without loss of generality, there is an x̄ in Rd and an a in R such that af1 (x̄) = f2 (x̄) > 0. Since f1 and f2 are 20 linearly independent, exactly one of the following three cases occurs: (1) either there are x1 and x2 in a neighborhood of x̄ such that af1 (x1 ) > f2 (x1 ) and f2 (x2 ) > af1 (x2 ), (2) or af1 = f2 on U and af1 > f2 on Rd \ U , where U ⊂ Rd contains x̄, (3) or f2 = af1 on U and f2 > af1 on Rd \ U . In the last two cases we can modify a such that we achieve the first case, by linear independence. Thus, the two points pi := (xi , ti ) (for i = 1, 2) with the property that af1 (x1 ) > t1 > f2 (x1 ) and f2 (x2 ) > t2 > af1 (x2 ) are shattered by the set of all subgraphs of the linear space hf1 , f2 i, hence, Vhf1 ,...,fn i+ ≥ Vhf1 ,f2 i+ ≥ 2. Consequently, the conditions of Theorem A.1 are satisfied. We have κn (ε, ρn ) = log HTρn Fn  ε 4ρn  ! V 24eρ2n (Tρn Fn )+ 16eρ2n ≤ log 3 log ε ε   e 2  ρ4n = O(Kn log ρn ). ≤ log 3 + (Kn + 1) log (24)2 ε  The statement follows now from Theorem 2.3. We need another proposition and a piece of notation to prove the rate of convergence of the regression estimator. Notation 5.3. Let f be a real-valued function on Rd and let the distribution of the X(s) be given by µX . Let X ′ = {X ′ (s) : s ∈ ZN } be an i.i.d. ghost sample with the same marginals as X. Moreover, X ∗ is constructed for each † ∗ n ∈ NN + as in Lemma 5.1 and the random field X is an independent copy of X . Define the following empirical L2 -norms kf k|In | := |In |−1 and kf k∼ |In | := as well as X f (X(s))2 s∈In (2|In |)−1 ∗ kf k|In | := X !1/2 , ′ ′ f (X(s))2 + f (X (s))2 s∈In |In |−1 X s∈In |In |−1 kf k|In | := f (X ∗ (s))2 !1/2 !1/2 and X ′ f (X (s))2 s∈In † kf k|In | := |In |−1 !1/2 X s∈In f (X † (s))2 !1/2 . Consider the random point measure ν with equal masses which is induced by the sample of the random field and of  P the ghost sample (X(In ), X ′ (In ), i.e., ν = (2|In |)−1 s∈In δX(s) + δX ′ (s) . We abbreviate the ε-covering number of a function class G w.r.t. 2-norm of ν by     ′ N2 ε, G, (X(In ), X (In )) := N ε, G, k · kL2 (ν) . The next two statements prepare the second main theorem of Section 2 which is Theorem 2.5. The first is intended for α-mixing data, the second for β-mixing data. Proposition 5.4. Assume that the random field X satisfies Condition 2.1 (α). Let G be a class of R-valued functions on Rd which are all bounded by a universal constant B. Then for all ε > 0 ! ! √ ′ 2ε , G, (X(In ), X (In )) P sup kf k − 2 kf kIn > ε ≤ A1 N2 32 f ∈G P,∞ (5.6) !  ! 4 1/N A3 ε2 |In | A2 ε |In | + exp − · exp − B2 B 4 + B 2 ε2 (log |In |)2 for constants 0 < A1 , A2 , A3 < ∞ which neither depend on the bound B, nor on ε, nor on the index set In . Provided that the Vapnik-Chervonenkis dimension VG+ is at least 2 and that ε is sufficiently small, the bound from 21 Proposition 5.4 is non-trivial: we have with Proposition A.1    3 2  ′ 24 · 162 eB 2 16 eB ε √ , G, (X(In ), X (In )) . · log ≤ log 3 + VG+ log log N2 ε2 ε2 16 2 P,∞ Proof of Proposition 5.4. Let {X(s) : s ∈ In } be a subset of the strongly mixing and stationary random field X and let ′ {X (s) : s ∈ In } be the corresponding ghost sample. We use the relation ! ! ! ε ε ′ ′ P sup kf k − 2 kf kIn > ε ≤ P sup kf k − 2 kf kIn > + P sup kf kIn − kf kIn > . 2 4 f ∈G f ∈G f ∈G We only consider the second probability on the right-hand-side of the last inequality, bounds on the first probability are given by the second term Let √ in the second line of (5.6) and are derived in2 Theorem 11.2 of Györfi et al. (2002).  ′ of G with respect to the empirical L -norm of the sample X(I ), X (I ) with U1 , . . . , UH ∗ be an ε/(16 2)-covering n n √ √  ′ the definition H ∗ := N2 ε/(16 2), G, X(In ), X (In ) and Uk := {f ∈ G : kf − gk k∼ In < ε/(16 2)}, where the ′ covering functions are g1 , . . . gH ∗ . Note that H ∗ and the Uk are random and that both k · kIn and k · kIn are bounded by √ ∼ 2 k · kIn . Then, ||H ∗ ||P,∞   X ′ ′ ε ε P ∃f ∈ G : kf kIn − kf kIn > P ∃f ∈ Uk : kf kIn − kf kIn > . ≤ 4 4 (5.7) k=1 Now, we use that kf kIn ≤ √ ∼ 2 kf kIn to obtain for f ∈ Uk the inequality ′ ′ ′ ′ kf kIn − kf kIn = kf kIn − kgk kIn + kgk kIn − kgk kIn + kgk kIn − kf kIn   √ ′ ′ ≤ kf − gk kIn + kgk kIn − kgk kIn + kf − gk kIn ≤ 2 2   ′ ε √ + kgk kIn − kgk kIn . 16 2  ′  ′ Hence, ∃f ∈ Uk : kf kIn − kf kIn > 4ε is a subset of kgk kIn − kgkIn > 8ε . Since the inequality a − b > c implies a2 − b2 > c2 for a, b, c ≥ 0, we get for the probabilities on the right-hand-side of Equation (5.7) the following bounds   2  2 ′ ′ ε ε2 kgk kIn − kgk kIn > P kgk kIn − kgk kIn > ≤P 8 64 ! io h   ′ ′ 1 X 1 Xn ε2 2 2 2 2 − gk (X (s)) − E gk (X (eN )) gk (X(s)) − E gk (X(eN )) > ≤P |In | |In | 64 s∈In s∈In ! i h ′ ′ ε2 1 X ≤P gk (X (s))2 − E gk (X (eN ))2 > |In | 128 s∈In ! (5.8)   ε2 1 X 2 2 . +P > gk (X(s)) − E gk (X(eN )) |In | 128 s∈In The first term from (5.8) can be bounded by Hoeffding’s inequality, we have !   i h ′ ′ |In | ε2 1 X 2 2 ≤ 2 exp −Cε4 4 . > gk (X (s)) − E gk (X (eN )) P |In | 128 B (5.9) s∈In We apply Proposition A.3 to the second term and obtain that P   ε2 1 X gk (X(s))2 − E gk (X(s))2 > |In | 128 s∈In 22 ! ≤ exp − Cε4 |In |1/N B 4 + B 2 ε2 (log |In |) 2 ! . (5.10) Obviously, the bound in (5.10) dominates the bound in (5.9). This finishes the proof. The next proposition is a generalization of Theorem 11.2 of Györfi et al. (2002) for β-mixing data. Proposition 5.5. Assume that the random field X satisfies Condition 2.1 (β). Let G be a class of R-valued functions on Rd which are all bounded by B ∈ R+ . Let n be sufficiently large such that both 8/c1 log |In | < min{ni : i = 1, . . . , N } and C ∗ ≤ 23N −1 (c1 )−N (log |In |)N where the constant C ∗ is defined in (5.13). Then for all ε > 0 ! ! √ ′ 2ε ∗ N P sup kf k − 2 kf kIn ≥ ε ≤ 3 · 2 N2 , G, (X(In ), X (In )) 32 f ∈G P,∞ (5.11)   ε2 |In | · exp − N 25N +5 B 2 c−N 1 (log |In |) Proof of Proposition 5.5. Set q = ⌈2/c1 log |In |⌉ and apply Lemma 5.1. We obtain a partition of In given by {I(l, u) : l = 1, . . . , 2N , u = 1, . . . , R} such that we can write N N |In |−1 X f (X ∗ (s))2 = R−1 R 2 X X Z ∗ (l, u)2 and l=1 u=1 s∈In |In |−1 X f (X † (s))2 = R−1 R 2 X X Z † (l, u)2 , l=1 u=1 s∈In 1/2 1/2   P P . Note that and Z † (l, u) = R|In |−1 s∈I(l,u) f (X † (s))2 where Z ∗ (l, u) = R|In |−1 s∈I(l,u) f (X ∗ (s))2 0 ≤ Z ∗ (l, u), Z † (l, u) ≤ B. In the following, let f˜ be a function in G such that f˜ − 2 f˜ In ≥ ε if there is such a function. Otherwise, f˜ is any other function. We write P for the conditional probability measure and E∗ for the conditional expectation given the data X ∗ (In ). The remaining proof is a modification of Theorem 11.2 in Györfi et al. (2002) and is split in three steps. In the first step, we show that ! ! ε 3 ∗ ∗ † P sup kf k − 2 kf kIn ≥ ε ≤ P sup kf kIn − kf kIn ≥ , (5.12) 2 4 f ∈G f ∈G ∗ if B 2 /ε2 ≤ |In |/(22N +6 C ∗ ) where C ∗ := √ p 2 1 + CP (1 + CN β̄∞ ). (5.13) Here CP is a uniform p bound of the essential suprema of the Radon-Nikodým derivatives in (2.2) and the factor β̄∞ P∞ equals k=0 k N −1 β(k) < ∞; additionally, the constant CN depends on the lattice dimension N and is given below. For this result, we need that    2 !! 2 2 † 2 † ε ε ∗ ∗ P 2 f˜ + ≥ f˜ ≥ 1 − P 3 f˜ + ≤ 4 f˜ − f˜ (5.14) 2 4 In In Indeed, this follows with some calculations (see the proof of Theorem 11.2 Györfi et al. (2002)). Furthermore, we need a result, which follows using the β-mixing property and a lemma in Krebs (2018b), h i √ p h i X X β(ks − tk∞ )1/2 E∗ f˜(X † (s))2 f˜(X † (t))2 ≤ 2 1 + CP E∗ f˜(X † (eN ))4 s,t∈I(l,u) s,t∈I(l,u) √ p ≤ 2 1 + CP (1 + CN β̄∞ )B 2 f˜ for a certain constant CN which depends on the lattice dimension N . 23 2 qN , Moreover, using that for a fixed l the blocked random variables {X † (I(l, u)) : u = 1, . . . , R} are independent, the probability on the right-hand-side of (5.14) is at most  2    P P ∗ ˜(X † (s))2 N ∗ P † 2 E f ˜ 2 R s∈I(l,u) l,u s∈I(l,u) f (X (s)) 2N +4 X X 16 Var ≤   2 2 2 2 2 2 |In | |In | 2 2 l=1 u=1 3 f˜ + ε4 3 f˜ + ε4 2 N ∗ 2 ˜ N 22N +6 C ∗ B 2 2N +4 2 RC B f q ≤ . ≤   2 2 |In |2 3|In |ε2 2 3 f˜ + ε (5.15) 4 This last term is at most 1/3 if |In | ≥ 22N +6 C ∗ B 2 /ε2 . In particular, the right-hand-side of (5.14) is then at least 2/3. Using once more a result of Györfi et al. (2002), we have that !      † ∗ ε ε † ∗ + ≥ f˜ ≥ E 1 f˜ − 2 f˜ ≥ ε P∗ 2 f˜ P sup kf k|In | − kf k|In | ≥ 4 2 |In | |In | f ∈G Consequently, (5.12) follows from this last inequality if |In | ≥ 22N +6 C ∗ B 2 /ε2 . √ In the second step, consider an ε/(16 2)-covering of G with respect to the empirical L2 -norm of the sample  ∗ X (In ), X † (In ) . It follows as in the proof of Proposition 5.4 that P sup f ∈G where ||H ∗ ||P,∞ ≤ N2 † kf kIn √ − ∗ kf kIn ε ≥ 4 !  ′ 2ε 32 , G, (X(In ), X (In )) ≤ ||H ∗ ||P,∞ X k=1 P,∞  P kgk k†In − kgk k∗In ≥ ε , 8 (5.16) . Consequently, it remains to bound the last probability in (5.16). This is done in the third step. Consider a function f such that |f | ≤ B, then     1/2  1/2  X X ε ε P kf k†In − kf k∗In ≥ = P  R−1 − R−1 Z † (l, u)2 ≥  Z ∗ (l, u)2 8 8 l,u l,u   P † 2 ∗ 2 −1 R ε  l,u Z (l, u) − Z (l, u) = P  1/2 ≥ 8  1/2  P P + R−1 l,u Z ∗ (l, u)2 R−1 l,u Z † (l, u)2   PR 2N −1 † 2 ∗ 2 X R ε  u=1 Z (l, u) − Z (l, u) ≤ P  1/2 ≥ 2N +3  1/2  P P R R l=1 + R−1 u=1 Z ∗ (l, u)2 R−1 u=1 Z † (l, u)2 ! 2N R R  1/2  1/2 X X X ε −1 † 2 −1 ∗ 2 = P R (5.17) Z (l, u) − R Z (l, u) ≥ N +3 . 2 u=1 u=1 l=1 Next, we use a trick which induces additional randomness and which can be applied to the last probabilities. W.l.o.g. we consider the case l = 1. Then, choose i.i.d. random variables V (1), . . . , V (R) which are uniformly distributed on {−1, 1} and define † U (u) := ( Z † (1, u) ∗ Z (1, u) if V (u) = 1 if V (u) = −1 and 24 ∗ U (u) := ( Z ∗ (1, u) † Z (1, u) if V (u) = 1 if V (u) = −1. As the Z ∗ (1, u) and Z † (1, u) are independent and have for each u identical distributions, we can replace their distribution with the distribution of the U ∗ (u) and U † (u). Now, write P∗ for the probability measure conditioned on σ(Z † (1, u), Z ∗ (1, u), u = 1, . . . R). Then if l = 1, the probability in (5.17) equals P R R 1/2  1/2  X X R−1 − R−1 U † (u)2 ≥ U ∗ (u)2 =E P∗ ! 2N +3 )# ( R R R 1/2  1/2  X X X ε −1 † 2 ∗ 2 −1 −1 † 2 ∗ 2 R V (u)(Z (1, u) − Z (1, u) ) ≥ N +3 . R + R Z (1, u) Z (1, u) 2 u=1 u=1 u=1 u=1 " ε u=1 Due to the independence between the V (u) and the (Z † (1, u), Z ∗ (1, u)), we can bound the inner conditional probability with Hoeffding’s inequality and obtain the bound ! PR   † 2 ∗ 2 Z (1, u) + Z (1, u) Rε2 ε2 |In | u=1 2 exp − 2N +5 PR ≤ 2 exp − 3N +5 2 N † 2 ∗ 2 2 2 2 B q u=1 |Z (1, u) − Z (1, u) |   ε2 |In | . (5.18) ≤ 2 exp − N 25N +5 B 2 c−N 1 (log |In |) N We use for the last inequality the three relations R ≥ |In |/(2N q N ) and q N ≤ 22N /cN 1 (log |In |) as well as |Z † (1, u)2 − Z ∗ (1, u)2 |2 ≤ Z † (1, u)4 + Z ∗ (1, u)4 ≤ B 2 (Z † (1, u)2 + Z ∗ (1, u)2 ). Combining Equations (5.12) to (5.18) yields the result given in (5.11) if |In | ≥ 22N +6 C ∗ B 2 /ε2 . Otherwise in the case that |In | < 22N +6 C ∗ B 2 /ε2 , the exponential in (5.18) is at least e−1 if C ∗ ≤ 23N −1 (c1 )−N (log |In |)N , hence, the right-hand-side of (5.11) is greater than one; so the inequality is also true in this case. Proof of Theorem 2.5. We begin with the case of α-mixing data and use the decomposition Z 2 2 |m̂n − m|2 dµX = km̂n − mk = km̂n − mk − 2 km̂n − mkIn + 2 km̂n − mkIn R d ≤ 2 max km̂n − mk − 2 km̂n − mkIn , 0 2 + 8 km̂n − mkIn 2 (5.19) The exponentially decreasing mixing rates ensure that the norm of the conditional covariance matrix remains bounded and that we can use Theorem 11.1 of Györfi et al. (2002) even in the case where the error terms ε(s) are not uncorrelated. There is a constant C1 such that kCov(Y (In ) | X(In ))k2 ≤ C1 for all k ∈ N. Indeed, consider the operator norms for matrices which are defined for a matrix A ∈ Ru1 ×u2 and p ∈ [1, ∞] by the corresponding p-norm on Ru1 (resp. on Ru2 ) p as kAkp = maxx∈Ru2 :kxkp =1 kAxkp . We have the norm inequality kAk2 ≤ kAk1 kAk∞ . As the covariance matrix is symmetric, the ∞- and the 1-norm are equal. We consider a line (resp. a column) of the covariance matrix that contains   the conditional covariances of the Y (s). By assumption, the error terms satisfy E |ε(s)|2+γ < ∞ for some γ > 0. We use Davydov’s inequality from Appendix A.2 and the bound on the mixing coefficients, α(k) ≤ c0 exp(−c1 k) for certain c0 , c1 ∈ R+ . We obtain X | Cov(Y (s), Y (t) | X(In ))| t∈In 2 ≤ kςk∞ X t∈In 2/(2+γ) X  2 α(ks − tk∞ )γ/(2+γ) | Cov(ε(s), ε(t))| ≤ 10 kςk∞ E |ε(s)|2+γ  2/(2+γ) 2 ≤ 10 kςk∞ c0 E |ε(s)|2+γ t∈In max1≤i≤N ni X u=0  (2u + 1)N − (2u − 1)N exp(−c1 γ/(2 + γ)u) ≤ C1 , for a universal constant C1 < ∞ and for all s ∈ In . Hence, kCov(Y (In ) | X(In ))k2 ≤ C1 . Thus, we find with Theorem 25 11.1 of Györfi et al. (2002), which is applicable to dependent data too, that Z i h Kn 2 + inf (f − m)2 dµX . E km̂n − mkIn ≤ C1 |In | f ∈Fn Rd (5.20) Next, consider the expectation of the first term in Equation (5.19), it admits the upper bound h  i E max km̂n − mk − 2 km̂n − mkIn , 0 2 Z ∞     P max km̂n − mk − 2 km̂n − mkIn , 0 2 > u du ≤v+ Zv ∞ √  P ∃f ∈ TL Fn : kf − mk − 2 kf − mkIn > u du, ≤v+ (5.21) v for each v > 0 and if |In | is large enough. We apply Proposition 5.4; note that the second exponential term in (5.6) so we only consider the first  is negligible, 2(Kn +1)  2 term here. We find with Proposition A.1 that the covering number is in O L /v provided that v < 162 L2 ; w.l.o.g. this is the case. Hence, (5.21) can be bounded by !  2 2(Kn +1) Z ∞ A2 u2 |In |1/N L exp − v + A1 du. (5.22) 2 v L4 + L2 u (log |In |) v Define v := Kn log(|In |)/|In |1/(2N ) which converges to zero by assumption. One finds that (5.22) is in O(v). Combining this result with Equations (5.19) and (5.20) implies the assertion for α-mixing data. Next, we consider the case of β-mixing data. For that reason we need the coupled process (X ∗ , Y ∗ ) obtained from Lemma 5.1 for q = ⌈2/c1 |In |⌉. We also compute the truncated least-squares estimate for the coupled regression problem and denote it by m̂∗n . Then the following upper bound of Equation (5.19) is true in terms of the estimate m̂∗n   4 max km̂∗n − mk − 2 km̂∗n − mkIn , 0 2 2 2 2 + 16 km̂n − mkIn + 16 km̂n − m̂∗n kIn + 2 km̂n − m̂∗n k . (5.23) Consider the expectation of the last two terms: we have i h h i E km̂n − m̂∗n k2In + E km̂n − m̂∗n k2 ≤ 2N +3 L2Rβ(q) = o(|In |−1 ), this follows from the coupling property. Consequently, these two terms are negligible. A bound on the expectation of the second term in (5.23) has already been established in (5.20). We can bound the expectation of the first term in (5.23) similar as in the case of α-mixing data in (5.21) but this time using Proposition 5.5. Thus, instead of (5.22) and if |In | is large enough, we obtain for the expectation of this term the bound v + A1  L2 v 2(Kn +1) Z v ∞  exp − u |In | 5N +5 2 N 2 L c−N 1 (log |In |)  du, (5.24) where v is positive and again A1 is a positive constant. One finds that for the choice v = Kn (log |In |)N +2 /|In | both terms in (5.24) are in O(v). This proofs the result in the case of β-mixing data. We come to the proofs of the theorems in Section 3. R S Proof of Theorem 3.3. If j∈Z Uj is not dense in Lp (µ), there is a 0 6= g ∈ Lq (µ) which satisfies Rd f g dµ = 0 for all S f ∈ j∈Z Uj where q is Hölder conjugate to p. We show that the Fourier transform of g is zero which contradicts the S assumption that g 6= 0. This proves in particular that j∈Z Uj is dense. Consider the Fourier transform of this element 26 g which we define here for reasons of simplicity as Fg : R → C, ξ 7→ d Z R g(x) eihx,ξi µ(dx), d where h·, ·i is the Euclidean inner product on Rd . Since the scaling function Φ is of the form Φ = ⊗di=1 ϕ and ϕ is a compactly supported one-dimensional scaling function, we can assume that the support of Φ is contained in the cube [0, A]d for some A ∈ N+ . Choose 1 > ε > 0 arbitrary, there is an n ∈ N such that we have for Q := [−An, An]d µ(Rd \ Q)1/p < ε  3 · 2d−1 max(kgkLq (µ) , 1)). Consider ξ ∈ Rd arbitrary, then we get with the assumed properties of g that |Fg(ξ)| ≤ Z R d (coshx, ξi − F1 (x))g(x) µ(dx) + Z R d (sinhx, ξi − F2 (x))g(x) µ(dx) (5.25) S S for all F1 , F2 ∈ j∈Z Uj . We show that the first term in Equation (5.25) is smaller than ε for suitable F ∈ j∈Z Uj ; the second term can be treated in the same way. Therefore, we use several times the trigonometric identities sin =  − cos · + π2 , as well as, cos(α + β) = cos α cos β − sin α sin β: we can split cosh · , ξi in 2d−1 terms as coshx, ξi = P2d−1 i=1 bi cos(ξ1 x1 + ai,1 ) · . . . · cos(ξd xd + ai,d ), where the bi are in {−1, 1}. First, we prove that each of the functions cos(ξk · +ai,k ) can be uniformly approximated on finite intervals. Indeed, define the kernel K: R2 → R, (x, y) 7→ X k∈ Z ϕ(x − k) ϕ(y − k) and the associated linear wavelet projection operator Kj for j ∈ Z by Kj : L2 (λ) → Uj , f 7→ XD k∈ Z E f, 2j/2 ϕ(2j · −k) 2j/2 ϕ(2j · −k). Then, K satisfies the moment condition M (N ) from Härdle et al. (2012) for N = 0: since ϕ is a scaling function, we R P have R K( · , y)dy = k∈Z ϕ( · − k) ≡ 1. Furthermore, |K(x, y)| = X k∈ Z 2 ϕ(x − k) ϕ(y − k) ≤ (A + 1) kϕk∞ 1{|x−y|≤A} =: F (x − y), where we assume w.l.o.g. that supp ϕ ⊆ [0, A]. Thus, F is integrable w.r.t. the Lebesgue measure λ and K satisfies the moment condition M (0). Next, let I(i, k) ⊇ [−An, An] be a finite interval such that cos(ξk · +ai,k ) is zero at the boundary of I(i, k). Then by Theorem 8.1 and Remark 8.4 in Härdle et al. (2012) the uniformly continuous restriction cos(ξk · +ai,k ) 1I(i,k) can be approximated in L∞ (λ) with elements from some Uj , i.e., cos(ξk · +ai,k ) 1I(i,k) − Kj cos(ξk · +ai,k ) 1I(i,k) L∞ (λ) → 0. Thus, if ε̃ > 0 is arbitrary but fixed, we can choose for each factor cos(ξk · +ai,k ) 1I(i,k) an approximation fi,k in some Uj such that cos(ξk · +ai,k )1I(i,k) − fi,k L∞ (λ) ≤ ε̃. This implies that for each of the i = 1, . . . , 2d−1 products we have cos(ξ1 x1 + ai,1 )1I(i,1) · . . . · cos(ξd xd + ai,d )1I(i,d) − fi,1 ⊗ . . . ⊗ fi,d  ≤ (1 + ε̃)d − 1 ≤ dε̃edε̃ ≤ ded ε̃. L∞ (λ) This means that the d-dimensional approximation follows from the one-dimensional approximations. 27 (5.26)   bi fi,1 ⊗ . . . ⊗ fi,d and ε̃ := ε/ 3 · 2d−1 ded kgkLq (µ) , then we arrive at P2d−1 Set now F1 := i=1 Z ≤ (cos hx, ξi − F1 (x)) g(x) µ(dx) RZ d | cos hx, ξi − F1 (x)| |g(x)|µ(dx) + Q Z R d \Q | cos hx, ξi − F1 (x)| |g(x)|µ(dx) (5.27) We consider the terms in (5.27) separately. We can estimate the first term by Z Q | cos hx, ξi − F1 (x)| |g(x)|µ(dx) ≤ d−1 2X i=1 Z Q  ε ded ε̃ |g(x)| µ(dx) ≤ 2d−1 ded kgkLq (µ) ε̃ = . 3 (5.28) Likewise, for the second term we infer that Z | cos hx, ξi − F1 (x)| |g(x)|µ(dx) R ≤ d \B d−1 2X i=1 Z ...+ d Y R d \B d−1 2X i=1 k=1 Z R d \B ! cos(ξk xk + ai,k ) 1×dk=1 I(i,k) − d Y k=1 d Y k=1 ! fi,k (xk ) |g(x)| µ(dx) + . . . cos(ξk xk + ai,k ) 1Rd \×dk=1 I(i,k) |g(x)| µ(dx) 1 ≤ 2d−1 ded ε̃ kgkLq (µ) µ Rd \ B p + 2d−1 kgkLq (µ) µ ε ε ε + . = · 3 3 · 2d−1 max(kgkLq (µ) , 1) 3 Rd \ B  p1 (5.29) All in all, we have when combining Equations (5.28) and (5.29) that (5.27) is less than ε as desired. R 2 Proof of Theorem 3.4 and of Theorem 3.5. We prove that inf f ∈Fn ,kf k∞ ≤ρn Rd |f − m| dµX → 0. Let ε > 0. Since S U is dense in L2 (µX ), there is a function f and a j0 ∈ N such that for all j ≥ j0 , we have f ∈ Uj and R j∈N j 2 Rd |f − m| dµX < ε/4. We can write for each level j(n) f= X aj,γ Ψj,γ + γ∈Kn for coefficients aj,γ ∈ R. Set gn := P γ ∈K / n X aj,γ Ψj,γ γ ∈K / n aj,γ Ψj,γ . The support of the gn decreases monotonically to zero:  {gn 6= 0} ⊆ x ∈ Rd : M j x − γ ∈ [0, L]d , kγk∞ > wn   ⊆ x ∈ Rd : M j x ∞ ≥ kγk∞ − L, kγk∞ > wn ⊆ x ∈ Rd : M j x  ⊆ x ∈ Rd : S −1 2 (ζmax )j kSk2 kxk2 ≥ wn − L ↓ ∅ (n → ∞), 2 ≥ wn − L by the assumption that (ζmax )j /wn → 0 as n → ∞. Furthermore, there is a k1 ∈ N such that we have the estimate R  d d 2 Rd f 1 R \ [−k1 , k1 ] dµX < ε/4 for all k ≥ k1 . Hence, there is a k2 ∈ N such that both [−k1 , k1 ]d ⊆ [ supp Ψj,γ and f γ∈Kn 1 [−k1 , k1 ]d  ∞ ≤ ρn  for all k ≥ k2 . In particular, the function f 1 [−k1 , k1 ]d is admissible in the sense that it is in Tρn Fn and that  R d 2 Rd |m − f 1 [−k1 , k1 ] | dµX < ε as desired. For the second part, it remains to compute κn (ε, ρn ) = log HTρn Fn (ε/(4ρn )). We use the bound which is given in 28 Proposition A.1, we have   HTρn Fn (ε/(4ρn )) ≤ 3 exp 2((2wn + 1)d + 1) log(384e ρ2n/ε) , i.e., κn (ε, ρn ) = O wnd log(ρn ) for ε > 0 which is arbitrary but fixed. The statement concerning the consistency properties follows now from Theorem 2.3. The statement which concerns the rate of convergence follows from Theorem 2.5. A Exponential Inequalities for Dependent Sums In this section, we give a short review on important concepts which we use throughout the article. We begin with a result concerning the covering number of a function class G of real-valued functions on Rd . Denote the class of all subgraphs  of this class G by G+ := (z, t) ∈ Rd × R : t ≤ g(z) : g ∈ G and the Vapnik-Chervonenkis-dimension of G+ by VG+ . In this case Condition 2.2 is satisfied if ε is sufficiently small and if the Vapnik-Chervonenkis dimension of G+ is at least two. More precisely, we have the following statement Proposition A.1 (Haussler (1992)). Let [a, b] ⊆ R. Let G be a class of uniformly bounded real valued functions g : Rd → [a, b] such that VG+ ≥ 2. Let 0 < ε < (b − a)/4. Then for any probability measure ν on (Rd , B(Rd ))     3e(b − a)p 2e(b − a)p . log log N ε, G, k · kLp (ν) ≤ log 3 + VG+ log εp εp In particular, VG+ ≤ r + 1 in the case where G is an r-dimensional linear space. Davydov’s inequality relates the covariance of two random variables to the α-mixing coefficient: Proposition A.2 (Davydov (1968)). Let (Ω, A, P) be a probability space and let G, H be sub-σ-algebras of A. Set α := sup{|P(A ∩ B) − P(A)P(B)| : A ∈ G, B ∈ H}. Let p, q, r ≥ 1 be Hölder conjugate, i.e., p−1 + q −1 + r−1 = 1. Let ξ (resp. η) be in Lp (P) and G-measurable (resp. in Lq (P) and H-measurable). Then |Cov(ξ, η)| ≤ 10 α1/r kξkLp (P) kηkLq (P) . In the remaining part of this appendix we derive upper bounds on the probability of events of the type ( ) X −1 sup |In | g(Z(s)) − E [ g(Z(eN )) ] > ε , g∈G (A.1) s∈In where G is a class of functions and Z is an α-mixing random field on ZN . (Here we assume that G is sufficiently regular, so that this set is indeed measurable.) Proposition A.3. Let the real valued random field Z satisfy Condition 2.1 (α). The Z(s) have expectation zero and are ′ bounded by B. Assume that n ∈ NN + satisfies min{ni : i = 1, . . . , N }/ max{ni : i = 1, . . . , N } ≥ C , for a constant C ′ > 0. Then there is a constant A ∈ R+ which depends on the lattice dimension N , the constant C ′ and the bound on the mixing coefficients but neither on n ∈ NN + , nor on ε, nor on B such that for all ε > 0  P |In |−1 X s∈In   Z(s) ≥ ε ≤ exp − A|In |1/N ε2 2 B + Bε(log |In |)(log log |In |)  . Proof. One can apply the exponential inequality of Merlevède et al. (2009) for strongly mixing time series to the random field Z as follows: consider a fixed n ∈ NN and set j ∗ = min{1 ≤ j ≤ N : nj = min{ni : i = 1, . . . , N }}. Then define a time series Y by X Yk = Zs , k = 1, . . . , nj ∗ . s∈In ,sj∗ =k We have that the Yk are bounded by B(C nj ∗ )N −1 . Moreover, this time series is strongly mixing with exponentially decreasing mixing coefficients. The result follows now from Theorem 1 of Merlevède et al. (2009). ′ 29 We can prove with the previous proposition an important statement Theorem A.4. Assume that the conditions of Proposition A.3 are satisfied. Let G be a set of measurable functions g : Rd → [0, B] for B ∈ [1, ∞) which satisfies Condition 2.2 and assume that (A.1) is measurable. Then there is a constant A which is independent of ε, n and B such that for all ε > 0 ! X −1 P sup |In | g(Z(s)) − E [ g(Z(eN )) ] ≥ ε g∈G s∈In (A.2)      ε  |In |ε2 A|In |1/N ε2 ≤ 10HG exp − + exp − 2 . 32 512B 2 B + Bε(log |In |)2 Proof of Theorem A.4. We assume the probability space to be endowed with the i.i.d. random variables Z ′ (s) for s ∈ In which have the same marginal laws as the Z(s). We write for shorthand Sn (g) := 1 X 1 X g(Z(s)) and Sn′ (g) := g(Z ′ (s)). |In | |In | s∈In s∈In We can decompose the probability with these definitions as follows ! P sup |Sn (g) − E [ g(Z(eN )) ]| ≥ ε g∈G ≤P ε sup |Sn (g) − Sn′ (g)| ≥ 2 g∈G ! ε sup |Sn′ (g) − E [ g(Z ′ (eN )) ]| ≥ 2 g∈G +P ! . Next, we apply Theorem 9.1 from Györfi et al. (2002) to second term on the right-hand side of (A.3) and obtain !   ε ε |In |ε2 ′ ′ P sup |Sn (g) − E [ g(Z (eN )) ]| ≥ ≤ 8HG exp − . 2 16 512B 2 g∈G (A.3) (A.4) To get a bound on the first term of the right-hand side of (A.3), we use Condition 2.2 to construct an ε/32-covering.  ε Write H ∗ := HG 32 for the upper bound on the covering number. Let gk∗ for k = 1, . . . , H ∗ be as in Condition 2.2. Define ) ( ε 1 X . g(Z(s)) − gk∗ (Z(s)) + g(Z ′ (s)) − gk∗ (Z ′ (s)) ≤ Uk := g ∈ G : 2|In | 32 s∈In Then P sup |Sn (g) − g∈G Sn′ (g)| ε ≥ 2 ! ∗ ≤ H X k=1  P sup |Sn (g) − Sn′ (g)| ≥ g∈Uk ε 2  . (A.5) Thus, using the approximating property of the functions gk∗ , we get for each probability in (A.5)   7ε ∗ ′ ∗ P sup |Sn (g) − ≤ P |Sn (gk ) − Sn (gk )| ≥ 16 g∈Uk     7ε 7ε ∗ ′ ∗ ∗ ∗ ′ + P |Sn (gk ) − E [ gk (Z (eN )) ]| ≥ . ≤ P |Sn (gk ) − E [ gk (Z(eN )) ]| ≥ 32 32  Sn′ (g)| ε ≥ 2  The second term on the right-hand side of (A.6) can be estimated using Hoeffding’s inequality, we have     98 |In | ε2 7ε ≤ 2 exp − . P |Sn′ (gk∗ ) − E [ gk∗ (Z ′ (eN )) ]| ≥ 32 322 B 2 30 (A.6) We apply Proposition A.3 to the first term of Equation (A.6). Finally, we use that HG ε 16  ≤ HG ε 32  . B Details on Example 3.2 We show how to derive an isotropic MRA in d dimensions from a one-dimensional MRA. It is straightforward to show that for a multiresolution analysis with corresponding scaling function Φ there is a sequence (a0 (γ) : γ ∈ Γ) ⊆ R such R P that Φ ≡ γ∈Γ a0 (γ) Φ(M · −γ) and the coefficients a0 (γ) satisfy the equations a0 (γ) = |M | Rd Φ(x) Φ(M x−γ) dx P P as well as γ∈Γ |a0 (γ)|2 = |M | = γ∈Γ a0 (γ). S In the first step, we show that the conditions for an MRA are satisfied. The spaces j∈Z Uj are dense: we have by the definition d O Uj′ = f1 ⊗ . . . ⊗ fd : fi ∈ Uj′ ∀i = 1, . . . , d . Uj = i=1 Note that the set of pure tensors g1 ⊗ . . . ⊗ gd : gi ∈ L2 (λ) is dense in L2 (λd ). Hence, it only remains to show that we can approximate any pure tensor g1 ⊗ . . . ⊗ gd by a sequence (Fj ∈ Uj : j ∈ N+ ). Let ε > 0 and let 2 g1 ⊗ . . . ⊗ gd ∈ L2 (λd ) be a a pure tensor. n Choose a sequence of pure tensors (fi,j :oj ∈ N+ ) converging to gi in L (λ) for i = 1, . . . , d. Denote by L := sup kfi,j kL2 (λ) , kgi kL2 (λ) : j ∈ Z, i = 1, . . . , d < ∞. Then kg1 ⊗ . . . ⊗ gd − f1,j ⊗ . . . ⊗ fd,j k2L2 (λd ) ≤ d2 L2(d−1) max kgi − fi,j k2L2 (λ) → 0 as j → ∞. 1≤i≤d T Pn Furthermore, j∈Z Uj = {0}: Let f = i=1 ai fi,1 ⊗ . . . ⊗ fi,d be an element of each Uj . Then each fi,k is an element of each Uj′ for all j and, hence, zero. The scaling property is immediate, too. Indeed, f ∈ Uj ⇔ f = n X i=1 ⇔f = ai fi,1 ⊗ . . . ⊗ fi,d and fi,k ∈ Uj′ , n X i=1 k = 1, . . . , d ai fi,1 ⊗ . . . ⊗ fi,d and fi,k (2−j · ) ∈ U0′ ⇔ f (M −j · ) ∈ U0 . The functions {Φ( · − γ) : γ ∈ Γ} form an orthonormal basis of U0 . We have for γ, γ ′ ∈ Zd Z Z Φ(x − γ) Φ(x − γ ′ ) dx = ⊗dk=1 ϕ(xk − γk ) · ⊗dk=1 ϕ(xk − γk′ ) dx R = R d d d Y k=1 Z R ϕ(xk − γk )ϕ(xk − γk′ ) dxk = δγ,γ ′ Pn Pn and for each f ∈ U0 by definition f = i=1 ai ϕ( · − γ1i ) · . . . · ϕ( · − γdi ) = i=1 ai Φ( · − γ i ) for γ 1 , . . . , γ n ∈ Zd . This proves that Φ together with the linear spaces Uj generates an MRA of L2 (λd ). It remains to prove that the wavelets generate an orthonormal basis of L2 (λd ). √ √ d For an index k ∈ i=1 {0, 1}, define akl i by 2hl if ki = 0 and 2gl if ki = 1 for i = 1, . . . , d. Furthermore, set ak (γ) := akγ11 · . . . · akγdd . Then, the scaling function and the wavelet generators satisfy × Ψk = X γ1 ,...,γd akγ11 · . . . · akγdd ϕ(2 · −γ1 ) ⊗ . . . ⊗ ϕ(2 · −γd ) = X γ ak (γ)Φ(M · −γ). Since ϕ is a scaling function, the coefficients a0 (γ) of the scaling function Φ satisfy the relation X γ a0 (γ) = 2 d/2 X γ1 ,...,γd h γ1 · . . . · h γd = 2 31 d/2 X γ1 h γ1 !d = 2d . Furthermore, we have for j, k ∈ {0, 1}d and γ ∈ Γ,       X X X ajγd′ ak2γdd +γ ′ = 2d δj,k δγ,0 . ajγ1′ ak2γ1 1 +γ ′ · . . . · aj (γ ′ )ak (M γ + γ ′ ) = 1 1 d d  ′  ′ ′ γ γ1 γd Indeed, for s = 1, . . . , d and z := γs X ajγss′ ak2γs s +γs′ γs′  P  2 l hl g2z+l    2 P h h l l 2z+l = P 2  l gl h2z+l    P 2 l gl g2z+l if js = 0 and ks = 1, if js = ks = 0, if js = 1 and ks = 0, if js = ks = 1. Since the ϕ( · − z) form an ONB of U0′ , we have Z X X δz,0 = ϕ(x − z) ϕ(x) dx = hl hm δ2z+l,m = hl h2z+l . R l,m l In the same way, δz,0 = Z R ψ(x − z)ψ(x) dx = X gl gm δ2z+l,m = l,m X gl g2z+l . l In addition, as U1′ = U0′ ⊗ W0′ , we get Z X X X ψ(x − z) ϕ(x) dx = gl hm δ2z+l,m = gl h2z+l = gl−2z hl , 0= R l,m l l for all z ∈ Z. Hence, the conditions of Theorem 3.1 (Theorem 1.7 in Strichartz (1993)) are satisfied and the family of L functions {|M |j/2 Ψk (M j · −γ) : γ ∈ Γ, k = 1, . . . , |M | − 1} forms an ONB of Wj and L2 (λd ) = j∈Z Wj . References Y. Baraud, F. Comte, and G. Viennet. Adaptive estimation in autoregression or β-mixing regression via model selection. The Annals of Statistics, pages 839–875, 2001. A. R. Barron. Approximation and estimation bounds for artificial neural networks. Machine Learning, 14(1):115–133, 1994. H. C. Berbee. Random walks with stationary increments and renewal theory. MC Tracts, 1979. R. C. Bradley. A caution on mixing conditions for random fields. Statistics & Probability Letters, 8(5):489–491, 1989. R. C. Bradley. Basic properties of strong mixing conditions. a survey and some open questions. Probability surveys, 2 (2):107–144, 2005. L. D. Brown, T. T. Cai, and H. H. Zhou. Nonparametric regression in exponential families. The Annals of Statistics, 38 (4):2005–2046, 2010. T. T. Cai. Adaptive wavelet estimation: a block thresholding and oracle inequality approach. The Annals of Statistics, pages 898–924, 1999. M. Carbon, L. T. Tran, and B. Wu. Kernel density estimation for random fields (density estimation for random fields). Statistics & Probability Letters, 36(2):115–125, 1997. 32 M. Carbon, C. Francq, and L. T. Tran. Kernel regression estimation for random fields. Journal of Statistical Planning and Inference, 137(3):778–798, 2007. X. Chen and T. Christensen. Optimal uniform convergence rates for sieve nonparametric instrumental variables regression. Cowles Foundation Discussion Paper No. 1923, 2013. N. Cressie. Statistics for spatial data. Wiley series in probability and mathematical statistics: Applied probability and statistics. J. Wiley, 1993. I. Daubechies. Ten lectures on wavelets. SIAM, 1992. Y. A. Davydov. Convergence of distributions generated by stationary stochastic processes. Theory of Probability & Its Applications, 13(4):691–696, 1968. Y. A. Davydov. Mixing conditions for Markov chains. Teoriya Veroyatnostei i ee Primeneniya, 18(2):321–338, 1973. D. L. Donoho and I. M. Johnstone. Minimax estimation via wavelet shrinkage. The Annals of Statistics, 26(3):879–921, 1998. D. L. Donoho, I. M. Johnstone, G. Kerkyacharian, and D. Picard. Density estimation by wavelet thresholding. The Annals of Statistics, pages 508–539, 1996. J. Fan and I. Gijbels. Local polynomial modelling and its applications: monographs on statistics and applied probability 66, volume 66. CRC Press, 1996. J. Franke and M. Diagne. Estimating market risk with neural networks. Statistics and Decisions, 24:1001–1021, 2006. U. Grenander. Abstract inference. John Wiley & Sons, 1981. Z. Guessoum and E. O. Saı̈d. Kernel regression uniform rate estimation for censored data under α-mixing condition. Electronic Journal of Statistics, 4:117–132, 2010. L. Györfi, M. Kohler, A. Krzyżak, and H. Walk. A distribution-free theory of nonparametric regression. Springer Berlin, New York, Heidelberg, 2002. L. Györfi, W. Härdle, P. Sarda, and P. Vieu. Nonparametric curve estimation from time series, volume 60. Springer, 2013. M. Hallin, Z. Lu, and L. T. Tran. Local linear spatial regression. The Annals of Statistics, 32(6):2469–2500, 2004. W. Härdle. Applied nonparametric regression. Cambridge University Press, 1990. W. Härdle, G. Kerkyacharian, D. Picard, and A. Tsybakov. Wavelets, approximation, and statistical applications. Lecture Notes in Statistics. Springer New York, 2012. D. Haussler. Decision theoretic generalizations of the pac model for neural net and other learning applications. Information and Computation, 100(1):78–150, 1992. K. Hornik. Approximation capabilities of multilayer feedforward networks. Neural networks, 4(2):251–257, 1991. M. S. Kaiser, S. N. Lahiri, and D. J. Nordman. Goodness of fit tests for a class of markov random field models. The Annals of Statistics, pages 104–130, 2012. G. Kerkyacharian and D. Picard. Regression in random design and warped wavelets. Bernoulli, 10(6):1053–1105, 2004. R. Kindermann and L. Snell. Markov random fields and their applications. The American Mathematical Society, 1980. C. Kirch and J. Tadjuidje Kamgaing. A uniform central limit theorem for neural network-based autoregressive processes with applications to change-point analysis. Statistics, 48(6):1187–1201, 2014. 33 M. Kohler. Nonlinear orthogonal series estimates for random design regression. Journal of Statistical Planning and Inference, 115(2):491–520, 2003. A. N. Kolmogorov and Y. A. Rozanov. On strong mixing conditions for stationary gaussian processes. Theory of Probability & Its Applications, 5(2):204–208, 1960. H. L. Koul. Behavior of robust estimators in the regression model with dependent errors. The Annals of Statistics, pages 681–699, 1977. J. T. N. Krebs. Orthogonal series estimates on strong spatial mixing data. Journal of Statistical Planning and Inference, 193:15–41, 2018a. J. T. N. Krebs. A large deviation inequality for β-mixing time series and its applications to the functional kernel regression model. Statistics & Probability Letters, 133:50–58, 2018b. R. Kulik and M. Raimondo. Wavelet regression in random design with heteroscedastic dependent errors. The Annals of Statistics, 37(6A):3396–3430, 2009. L. Li. Nonparametric regression on random fields with random design using wavelet method. Statistical Inference for Stochastic Processes, 19(1):51–69, 2016. L. Li and Y. Xiao. Wavelet-based estimation of regression function with strong mixing errors under fixed design. Communications in Statistics-Theory and Methods, 46(10):4824–4842, 2017. D. F. McCaffrey and A. R. Gallant. Convergence rates for single hidden layer feedforward networks. Neural Networks, 7(1):147–158, 1994. F. Merlevède, M. Peligrad, E. Rio, et al. Bernstein inequality and moderate deviations under strong mixing conditions. In High dimensional probability V: the Luminy volume, pages 273–292. Institute of Mathematical Statistics, 2009. Y. Meyer. Wavelets and operators, volume 1. Cambridge university press, 1995. M. Rosenblatt. A central limit theorem and a strong mixing condition. Proceedings of the National Academy of Sciences, 42(1):43–47, 1956. G. G. Roussas and L. T. Tran. Asymptotic normality of the recursive kernel regression estimate under dependence conditions. The Annals of Statistics, pages 98–120, 1992. C. J. Stone. Optimal global rates of convergence for nonparametric regression. The Annals of Statistics, pages 1040– 1053, 1982. R. S. Strichartz. Construction of orthonormal wavelets. In J. J. Benedetto, editor, Wavelets: mathematics and applications, pages 23–50. CRC press, 1993. L. T. Tran. Kernel density estimation on random fields. Journal of Multivariate Analysis, 34(1):37–53, 1990. C. S. Withers. Conditions for linear processes to be strong-mixing. Zeitschrift für Wahrscheinlichkeitstheorie und Verwandte Gebiete, 57(4):477–480, 1981. D. Yahia and F. Benatia. Nonlinear wavelet regression function estimator for censored dependent data. Afrika Statistika, 7(1):391–411, 2012. 34
10math.ST
Integrability conditions for Compound Random Measures arXiv:1707.06768v2 [stat.ME] 12 Nov 2017 Alan Riva Palacio and Fabrizio Leisen School of Mathematics, Statistics and Actuarial Sciences, University of Kent Sibson Building, Canterbury, Kent CT2 7FS Abstract Compound random measures (CoRM’s) are a flexible and tractable framework for vectors of completely random measure. In this paper, we provide conditions to guarantee the existence of a CoRM. Furthermore, we prove some interesting properties of CoRM’s when exponential scores and regularly varying Lévy intensities are considered. 1 Introduction Recently, a growing literature in Bayesian non-parametrics (BNP) proposed new priors which can take into account different features of the data, such as partial exchangeability, see De Finetti (1938). In this case, one would like to consider different densities for different groups instead of a single common density for all the data. After the seminal paper of MacEachern (1999), the problem of modeling a finite number of dependent densities has become an active area of research in Bayesian nonparametrics. A common approach is to construct BNP priors based on functions of Completely Random Measures (CRM’s), see Lijoi and Prünster (2010). For example, special attention has been given to the normalization of CRM’s starting with the work of Regazzini, Lijoi and Prünster (2003). Roughly speaking, a CRM is a generalization of a subordinator, that is a process with independent increments and almost surely increasing paths; for a full account of CRM’s see Kingman (1993). This property is very helpful to derive the Laplace functional transform which is the basis to derive some analytical quantities of interest such as posterior and predictive distributions or the Exchangeable Partition Probability Function (EPPF), see James, Lijoi and Prünster (2009). To build more flexible priors in possibly higher dimensional spaces, vectors of dependent CRM’s are constructed for example in Leisen and Lijoi (2011), Leisen, Lijoi and Spano (2013) and Zhu and Leisen (2015) where respectively they build vectors of Poisson-Dirichlet and Dirichlet processes. These papers deal with the Lévy-Copula approach introduced in Cont and Tankov (2004) to induce dependence among the components of the vector. In a similar fashion, Lijoi, Nipoti and Prünster 1 (2014a) introduce a vector of random probability measures where the dependence arises by virtue of a suitable construction of the Poisson random measures underlying the CRM’s; furthermore, in the framework of survival analysis, Lijoi and Nipoti (2014) introduce a new class of vectors of random hazard rate functions that are expressed as kernel mixtures of dependent CRM’s. Camerlenghi, Lijoi and Prünster (2017) focus on partial exchangeable models which arise from hierarchical specifications of CRM’s. Compound random measures (CoRM’s), introduced by Griffin and Leisen (2017), are a flexible and tractable framework for many dependent random measures including many of the superposition and Lévy copula approaches. They have recently been applied to modeling graphs for overlapping communities by Todeschini, Miscouridou and Caron (2017). Griffin and Leisen (2017) and Griffin and Leisen (2018) described posterior sampling methods for a particular class of normalized compound random measure mixtures which exploits a representation of the Laplace transform of the CoRM through a univariate integral of a moment generating function. In this paper we aim to provide explicit existence conditions for CoRM’s in order to guarantee the existence of the marginal Lévy intensities. On the other hand, we prove that the resulting CoRM is well posed in the sense that it satisfies the usual integrability condition for multivariate Lévy processes. Furthermore, this paper provides an interesting result for CoRM’s when regularly varying Lévy intensities are considered. The paper closes highlighting a representation on the multivariate Lévy intensity of a CoRM when the score distribution is the result of marginal independent and identically distributed exponential scores. The outline of the paper is as follows. Section 2 will set the scene by introducing the basic definitions which are required in the CoRM setting. Section 3 is devoted to prove our main results. Section 4 deals with CoRM’s built with regularly varying Lévy intensities and exponential scores. Section 5 concludes. 2 Preliminaries Let (Ω, F , P ) be a probability space and X a Polish space with corresponding Borel σ-algebra X . We denote by MX the space of boundedly finite measures on the measurable space (X, X ) and by MX the associated Borel σ-algebra, see Appendix 2 in Daley and Vere-Jones (2003) for technical details. Definition 1. A random measure µ on X is called a completely random measure (CRM) if for any n > 1 and disjoint sets A1 , . . . , An ∈ X the random variables µ( A1 ), . . . , µ( An ) are mutually independent. In the following we consider only CRM’s without fixed jumps, namely CRM’s of the form µ = ∑i∞=1 wi δui for collections of random variables {wi }i∞=1 in R + and {ui }i∞=1 in X. Such CRM’s can be characterized by their Laplace transform h i R − s f ( x ))ν̃ (ds,dx ) −µ( f ) E e = e − R + × X (1− e 2 R where µ( f ) = X f ( x )µ(dx ), f : X → R + is such that µ( f ) < ∞ and ν̃(ds, dx ) is a measure in (R + × X, B(R + ) ⊗ X ) such that Z R+ ×X min{1, s}ν̃ (ds, dx ) < ∞ (1) for any bounded set X ∈ X . A measure ν̃ satisfying the condition displayed in equation (12) is called the Lévy intensity of µ. We say that ν̃ is homogeneous when ν̃(ds, dx ) = ρ(ds)α(dx ) with ρ a measure in (R + , B(R + )) and α a measure in (X, X ). The notion of a completely random measure can be generalized to higher dimensions in a similar fashion to Definition 1, see for instance Griffin and Leisen (2017). As a result, we have a representation in terms of a Laplace functional transform. Precisely, for a vector of completely random measures µ = (µ1 , . . . , µd ) on X we have that R h i − (R + ) d ×X (1− e−s1 f1 ( x )−···−s d f d ( x ) ) ν̃d (dss ,dx ) − µ1 ( f 1 )−···− µ d ( f d ) E e =e with f j : X → R + , j ∈ {1, . . . , d} such that µ j ( f j ) < ∞, where for g : X → R + we R  have µ j ( g) = X g( x )µ j (dx ). The measure ν̃d in (R + )d × X, B((R + )d ⊗ X must be such that Z (R + ) d × X min{1, ks k}ν̃d (dss , dx ) < ∞ (2) for any bounded set X ∈ X ; we call ν̃d a multivariate Lévy intensity. We set the notation νj ( A, X ) = Z (R + ) d −1 ν̃d (ds1 , . . . , ds j−1, A, ds j+1, . . . , dsd , X ) with j ∈ {1, . . . , d} and A ∈ B (R + ). We call νj the j-th marginal of the d-variate Lévy intensity ν̃d ; it follows that for each j ∈ {1, . . . , d}, µ j has Lévy intensity νj . In this framework we can define the concept of Compound Random Measure (CoRM). The following definition differs from the one in Griffin and Leisen (2017) since it takes into account the inhomogeneous case, where the locations and associated weights in the CRM are not independent. Definition 2. A Compound Random Measure (CoRM) is a vector of CRM’s whose Lévy intensity is given by Z s s  (3) ν̃d (dss , dx ) = z−d h 1 , . . . , d dss ν⋆ (dz, dx ) z z R+ where h, the score distribution, is a d-variate probability density function and, ν⋆ , the directing Lévy measure, is a Lévy intensity. By performing a simple change of variable we note that Z s s  1 , . . . , d dss = 1. z− d h z z (R + ) d 3 Therefore, z−d h sd  s1 , . . . , z z can be seen as the density of a distribution function   ds1 dsd H . ,..., z z This allows to write the multivariate Lévy intensity in equation (3) as   Z dsd ds1 ν⋆ (dz, dx ). ,..., ν̃d (dss , dx ) = H z z R+ (4) To write the Lévy intensity of a CoRM in terms of distribution functions rather than densities will be convenient for the results proved in the next section. 3 Integrability conditions The specification of a CoRM needs the initial choice of a score distribution and a directing Lévy measure. Although this sounds straightforward, it is necessary to check that theses choices lead to a well defined CoRM. Otherwise, the risk is to perform a Bayesian statistical analysis based on an ill-posed prior. In this section we look at two important aspects of Definition 2: 1. we provide conditions on the score distribution and the directing Lévy measure for the existence of the marginal Lévy intensities of a CoRM, see Theorem 1 and Corollary 1, 2. we provide conditions on the score distribution and the directing Lévy measure for the existence of the multivariate Lévy intensity of a CoRM, see Theorem 2. Summing up, Theorem 1 and Corollary 1 are focusing on the marginal existence of a CoRM. On the other hand, Theorem 2 focuses on the global existence of a CoRM. The proofs of the theorems can be found in the supplementary material. Theorem 1. Let H be a d-variate score distribution and ν⋆ a directing Lévy measure defining a measure ν̃d as in (4) with corresponding marginals νj for j ∈ {1, . . . , d}. Let X be a bounded set in X , then the measure νj satisfies the integrability condition (12) if and only if   Z 1 ⋆ P Sj ≥ ν (dz, dx ) < ∞ (5) z (0,1)× X and Z  1 zν⋆ (dz, dx ) < ∞. P Sj ≤ z [1,∞)× X  Furthermore if the marginal score H j satisfies that   1 ≤ z ∀ z ∈ (0, ǫ) for some ǫ > 0 1 − Hj z 4 (6) (7) and   1 <∞ lim zH j z→∞ z (8) then conditions (15), (16) are satisfied with an arbitrary choice of the directing Lévy measure ν⋆ . As set in Definition 2, we usually work with CoRM’s given by a score with a probability density; in such case the following corollary to Theorem 1 follows. Corollary 1. If S j has probability density function h j then conditions (17), (18) reduce to lim hj   1 z 2 z <1 (9) lim h j (ǫ) < ∞. (10) z →0 and ǫ →0 The previous results concerned conditions for the marginals of a CoRM to be well defined, now we focus on such a result for the CoRM. For a score density function h and directing Lévy measure ν⋆ to properly define a CoRM we need to check the condition (2) which takes the form Z R+ ×X Z (R + ) d min{1, ks k}h s 1 z ,..., sd  dss ⋆ ν (dz, dx ) < ∞ z zd (11) for bounded set X ∈ X . As stated at the beginning of this section, in the next theorem we provide conditions on the score distribution and the directing Lévy measure for the existence of the multivariate Lévy intensity of a CoRM. This is equivalent to provide conditions such that the latter inequality holds true. Theorem 2. Consider a CoRM which satisfies conditions (15) and (16) for each marginal νj , j ∈ {1, . . . , d}, then the integrability condition (11) is satisfied. We conclude this section by providing two examples of the use of the previous results when considering Gamma and Beta distributed scored distributions. Example 1: Gamma scores We consider the marginal gamma score case. Let h be the d-variate probability density of the score distribution; for j ∈ {1, . . . , d} we denote the j-th marginal density h j and let it correspond to a Gamma distribution with shape and rate parameters α j , β j , i.e. αj h j (s ) = β j s α j −1 e − β j s Γ(α j ) 5 1{s∈(0,∞)} . We check the constraints (17), (18) by making use of Corollary 1 as we have probability densities. To check (24) we see that   βj αj h j 1s β j e− s =0 = lim lim s →0 Γ ( α j ) s α j + 1 s →0 s2 and constraint (25) is satisfied for arbitrary Lévy directing measure ν⋆ whenever α j ≥ 1, as in the examples presented in Griffin and Leisen (2017). However for α j < 1 the associated CoRM will be well posed depending on the choice of ν⋆ . If for example we take the directing Lévy measure to be the σ-stable, i.e. ν⋆ (dz, dx ) = σ z1+ σ dzdx then constraint (15) in Theorem 1 can be reduced to Z 1Z ∞ 0 1 z h j (s ) σ z1+ σ Z ∞Z 1 dsdz = 1 s 1 h j (s ) σ zσ+1 dzds = Z ∞ 1 h j (s)(sσ − 1)ds < ∞, which is always satisfied since h j is a Gamma density. On the other hand, condition (16) in Theorem 1 becomes Z ∞Z 1 1 z 0 h j (s ) σz z1+ σ Z 1Z dsdz = 0 1 s 1 σ h j (s) σ dzds = z Z 1 0 h j (s)σ(sσ−1 − 1)ds < ∞ which is not satisfied when α j + σ < 1. Example 2: Beta scores In the setting as above, if the marginal scores are Beta distributed, i.e. h j (s ) = s α j − 1 (1 − s ) β j − 1 1{s∈(0,1)} B(α j , β j ) then constraint (17) becomes lim hj s →0   1 s 2 s ( s − 1) β j −1 = 0, s →0 s α j + β j B ( α j , β j ) = lim so it is always satisfied; and condition (18) is satisfied whenever α j ≥ 1. We consider again a σ-stable Lévy intensity for ν⋆ when α j < 1. Proceeding as in the previous example, constraint (15) becomes Z ∞Z 1 1 s 1 h j (s ) σ zσ+1 dzds = 0 < ∞ so it always holds; and constraint (16) becomes Z 1 0 h j (s)σ(sσ−1 − 1)ds < ∞, which does not hold if α j + σ < 1. 6 4 Other interesting properties The aim of this section is to investigate two interesting properties of CoRM’s. First, we focus on CoRM’s which arise from regurlarly varying directing Lévy measures. This result is motivated by the recent papers of Caron and Fox (2017) and Todeschini, Miscouridou and Caro (2017) which made use of regularly varying Lévy measures to construct sparse random graphs. Second, we provide an explicit expression of the multivariate Lévy intensity of a CoRM with independent exponential scores. This result is interesting when compared with Theorem 3.2 in Zhu and Leisen (2015) and Corollary 2 in Griffin and Leisen (2017) which provide, respectively, the Lévy copula representation and the Laplace exponent of CoRM’s with independent exponential scores. The proofs of the theorems can be found in the supplementary material. Both results deal with a d-variate CoRM given by an homogeneous directing Lévy intensity ν⋆ (dz, dx ) = ρ⋆ (dz)α(dx ). Therefore, the corresponding marginals can be written as νj (ds, dx ) = ρ j (ds)α(dx ) with ρ j a measure in (R + , B(R + )). 4.1 Regularly varying directing Lévy measure In this section we focus on CoRM’s given by a directing Lévy measure that is regularly varying. We recall that a real valued function L is slowly varying if limt→∞ L(at)/L(t) = 1 ∀ a > 0. Definition 3. An homogeneous LévyR measure ρ⋆ (dz)α(dx ) in R + × X is said to be regularly ∞ varying if the tail integral U ⋆ (y) = y ρ⋆ (ds) is a regularly varying function, i.e. it satisfies   1 1 U (y) = L y yσ ⋆ for some σ ∈ [0, 1) which we call the index and L a slowly varying function. The following Theorem highlights an interesting link between the directing Lévy measure and the marginal Lévy intensities in terms of the regularly varying property. Theorem 3. Consider a CoRM with an homogeneous directing Lévy measure ρ⋆ (ds)α(dx ) such that the conditions of Theorem 2 are satisfied. If ρ⋆ is regularly varying with tail integral U then the marginals ρ j , j = 1, . . . , d, are regularly varying. Example 3: σ-stable directing Lévy measure Consider a σ-stable directing Lévy measure ν⋆ (ds, dx ) = σ dsdx. Γ (1 − σ ) s σ + 1 The related tail integral is U ⋆ (y) = 1 Γ (1 − σ ) y σ 7 which is a regularly varying function with index σ and slowly varying function L(y) = 1 . We see that the regularly varying tail integrals related to the CoRM construcΓ (1− σ ) h i tion arise as a factor of U, namely U j (y) = E Sσj U ⋆ (y) and from Theorem 3 the associated marginal tail integrals are regularly varying. 4.2 Independent Exponential scores Consider a d-variate CoRM given by an homogeneous directing Lévy measure ν⋆ (dz, dx ) = ρ⋆ (dz)α(dx ) and a score distribution corresponding to d independent standard exponential distributions, i.e. d h ( s1 , . . . , s d ) = ∏ e − s i . i =1 We observe that each associated marginal takes the form νj (ds, dx ) = f (s)dsα(dx ), R∞ s where f (s) = 0 z−1 e− z ρ⋆ (dz). The following Theorem provides a characterization for this class of CoRM’s. Theorem 4. Consider a CoRM as described above; the corresponding d-variate Lévy intensity ν̃d (dss , dx ) = ρ̃d (s )dss α(dx ) is such that ρ̃d (s ) = (−1)d−1 ∂ d−1 f (s ) ∂sd−1 . s= s1 + ...+ sd 5 Conclusions In this paper, we proved some integrability condition for Compound Random Measures. The new findings can be useful to Statisticians which aim to use vectors of dependent completely random measures which arise from CoRM’s with directing Lévy measure and score distribution that have not been considered so far. Furthermore, in the homogeneous case, we proved that the marginal Lévy intensities are regularly varying whenever a regularly varying directing Lévy measure is considered. Finally, we provide a representation of the homogeneous CoRM’s when the score distribution is the result of independent and identically distributed exponential distributions. Acknowledgments Fabrizio Leisen was supported by the European Community’s Seventh Framework Programme [FP7/2007-2013] under grant agreement no: 630677. 8 References References Camerlenghi, F., Lijoi, A. and Prünster, I. (2017). ’Bayesian prediction with multiplesamples information’, Journal of Multivariate Analysis, 156, 18-28. Caron, F. and Fox, E. (2017). ’Sparse graphs using exchangeable random measures’, forthcoming in the Journal of the Royal Statistical Society-Series B. Cont, R., and Tankov, P., (2004). Financial modelling with jump processes, Boca Raton, FL: Chapman & Hall/CRC. Daley, D.J., and Vere-Jones, D., (2003), An introduction to the theory of point processes. Vol. 1., New York: Springer. De Finetti, B. (1938). ’Sur la condition de ”equivalence partielle”’, Colloque consacré à la théorie des probabilités, Vol. VI, Université de Genève, Hermann et C. ie, Paris. Griffin J. E. and Leisen F. (2017). ’Compound random measures and their use in Bayesian nonparametrics’, Journal of the Royal Statistical Society - Series B, 79, 525545. Griffin J. E. and Leisen F. (2018). ’Modelling and computation using NCoRM mixtures for density regression ’, forthcoming in Bayesian Analysis. James, L. F., Lijoi, A., and Prünster, I. (2009). ’Posterior analysis for normalized random measures with independent increments’, Scandinavian Journal of Statistics, 36(1), 76-97. Kingman, J.F.C., (1993), Poisson processes, Oxford: Oxford University Press. Leisen, F., and Lijoi, A., (2011). ‘Vectors of Poisson-Dirichlet processes’, J. Multivariate Anal., 102, 482–495. Leisen, F., Lijoi, A., and Spano, D., (2013). ‘A Vector of Dirichlet processes’, Electronic Journal of Statistics, 7, 62–90. Lijoi, A. and Nipoti, B. (2014). ‘A class of hazard rate mixtures for combining survival data from different experiments’, Journal of the American Statistical Association, 109, 802-814. Lijoi, A., Nipoti, B., and Prünster, I. (2014). ‘Bayesian inference with dependent normalized completely random measures’, Bernoulli, 20, 1260-1291. A. Lijoi and I. Prünster (2010). Beyond the Dirichlet process. Bayesian Nonparametrics (Holmes, C.C., Hjort, N.L., Müller, P. and Walker, S.G., Eds.), 80–136, Cambridge University Press, Cambridge. 9 MacEachern, S.N., (1999). ‘Dependent nonparametric processes’. ASA Proceedings of the Section on Bayesian Statistical Science, 50–55. E. Regazzini, A. Lijoi, I. Prünster (2003). Distributional results for means of normalized random measures with independent increments. Ann. Statist. 31, 560–585. Todeschini A., Miscouridou X. and Caron F. (2017). ’Exchangeable random measures for sparse and modular graphs with overlapping communities’, arXiv: 1602.02114v2 . Zhu W. and Leisen F. (2015). ’A multivariate extension of a vector of Poisson-Dirichlet processes’, Journal of Nonparametric Statistics, 27, 89–105. 6 Supplemetary Material: Proofs First, we recall the integrability condition for a Lévy measure: Z R+ ×X min{1, s}ν̃ (ds, dx ) < ∞ (12) see Section 2 of the main document. Let H and ν⋆ be, respectively, a score distribution and a directing Lévy measure which define a CoRM. We denote with H j , j ∈ {1, . . . , d}, the j-th marginal of a d-dimensional score distribution H. A simple change of variable leads to the j-th marginal of a CoRM, namely   Z Z Z Z ⋆ ⋆ dz νj ( A, X ) = , dx H j (ds). (13) H j (ds)ν (dz, dx ) = ν s R + × X A/z R + A× X We can see the formula above as a mean. Let S j be a random variable with distribution H j , then " !# A ⋆ νj ( A, X ) = E ν ,X (14) Sj for A ∈ B (R + ). We use the last identity to give conditions for the marginal intensity νj to be a proper Lévy intensity, i.e. a measure that satisfies the condition displayed in equation (12). Proof of Theorem 1 We recall the conditions stated in the first part of the theorem: Z   1 ⋆ P Sj ≥ ν (dz, dx ) < ∞ z (0,1)× X 10 (15) and Z  1 zν⋆ (dz, dx ) < ∞, P Sj ≤ z [1,∞)× X  and the conditions stated in the second part of the Theorem:   1 ≤ z ∀ z ∈ (0, ǫ) for some ǫ > 0 1 − Hj z (16) (17) and   1 lim zH j < ∞. z→∞ z (18) Proof. We recall that ν⋆ satisfies (12) since it is a Lévy intensity. Using (14), condition (12) for νj becomes !# "Z dz ,X E min{1, z}ν⋆ Sj R+ ×X     = E Z ⋆  0, S1 j  ×X zν (dz, dx ) + E  Therefore, νj satisfies (12) if and only if  and E Z  E  Z  0, S1 j  1 S j ,∞ ×X  ×X Z  1 S j ,∞  ×X ν⋆ (dz, dx ) < ∞. (19)  (20)  (21) zν⋆ (dz, dx ) < ∞ ν⋆ (dz, dx ) < ∞. The former can be decomposed using the Fubini-Tonelli theorem in     Z Z 1 ⋆   zν⋆ (dz, dx ) zν (dz, dx ) = P Sj ≤ E 1 + z 0, S × X R ×X j     Z Z 1 1 ⋆ = P Sj ≤ zν (dz, dx ) + zν⋆ (dz, dx ). P Sj ≤ z z (0,1)× X [1,∞)× X Condition (16) ensures that the second term of the above equation is finite. It is easy to see that the first term is finite as well. Indeed,   Z Z 1 ⋆ P Sj ≤ zν⋆ (dz, dx ) < ∞. zν (dz, dx ) ≤ z (0,1)× X (0,1)× X 11 On the other hand, the second term in (19) can be decomposed in     Z Z 1 ⋆     ≤ S j ν⋆ (dz, dx ) ν (dz, dx ) = E P 1 ,∞ × X + ×X z R Sj     Z Z 1 ⋆ 1 ⋆ = P Sj ≥ ν (dz, dx ) + ν (dz, dx ). P Sj ≥ z z (0,1)× X [1,∞)× X Condition (15) ensures that the first term of the above equation is finite. It is easy to see that the second term is finite as well. Indeed,   Z Z 1 ⋆ P Sj ≥ ν (dz, dx ) ≤ ν⋆ (dz, dx ) < ∞. z [1,∞)× X [1,∞)× X Therefore, the first part of the theorem follows from (19), (20) and (21). For the remaining part of the Theorem we use that (12) is attained when considering the directing Lévy measure ν⋆ . Indeed, if   1 <∞ (22) lim zP S j ≤ z→∞ z then as ν⋆ is a Lévy intensity   1 P Sj ≤ zν⋆ (dz, dx ) < ∞. (23) z [1,∞)× X   so (20) holds. And if there exists ǫ > 0 such that 1 − H j 1z ≤ z ∀ z ∈ (0, ǫ) then Z Z   Z 1 ⋆ P ≤ S j ν (dz, dx ) < zν⋆ (dz, dx ) < ∞, z (0,1)× X (0,1)× X so (21) also holds. From the first part of the theorem the CoRM marginal νj satisfies the integrability conditions for arbitrary ν⋆ . Proof of Corollary 1 We recall the conditions stated in Corollary 1: lim hj   1 z 2 z <1 (24) lim h j (ǫ) < ∞. (25) z →0 and ǫ →0 12   ) and observe that f (0+ ) = 0 so the existence of f ′ (0+ ) > 0 implies (17). As S j has a probability density we get that f ′ (0+ ) exists and (17) is equivalent to f ′ (0+ ) > 0 which we write as   h j 1z lim < 1. z →0 z2 Proof. We define f (z) = z − (1 − H j 1 z Using the fundamental theorem of calculus we see that (18) reduces to   1 = lim h j (ǫ) < ∞ lim zP S j ≤ z→∞ ǫ →0 z which is satisfied when h j is continuous at zero. 6.1 Proof of Theorem 2 Proof. Denote Pj = {s ∈ (R + )d : max{s1 , . . . , sd } = s j } for j ∈ {1, . . . , d}; then, by using (13) and the fact that each νj is a Lévy intensity we get that for any bounded set X in X Z Z s s  dss ⋆ min{1, ks k}h 1 , . . . , d ν (dz, dx ) z z zd R + × X (R + ) d Z s d Z s  dss ⋆ ν (dz, dx ) =∑ min{1, ks k}h 1 , . . . , d d + ×X P z z z R j j =1 ≤ ≤ = d Z Z d Z Z d Z Z ∑ + j =1 R × X ∑ + j =1 R × X ∑ j =1 = ≤ = R+ ×X Pj min{1, (R + ) d R+ √ ds j }h min{1, min{1, √ √ √ sd  dss ⋆ ν (dz, dx ) ,..., z z zd s 1 ds j }h ds}h j s 1 z  s  ds z d Z min{1, d Z √ √ min{ d, ds}νj (ds, dx ) ∑ + j =1 R × X ∑ + j =1 R × X √ d Z d∑ + j =1 R × X ,..., z ν⋆ (dz, dx ) ds}νj (ds, dx ) min{1, s}νj (ds, dx ) < ∞. 13 sd  dss ⋆ ν (dz, dx ) z zd Proof of Theorem 3 We recall that for the case at hand   1 1 U (y) = L y yσ ⋆ (26) is a tail integral. Proof. We note that equation (14) implies that " ρ j ( A) = E ρ⋆ A Sj !# It follows that the marginals of the CoRM are given by U j (y) = ρ j ((y, ∞)) !# " y = E U⋆ Sj     σ  Sj Sj =E L y y     Sj 1 =E L Sσj . y yσ i h Hence, it is enough to check if the function l (z) = E L(S j z)Sσj is slowly varying for L a slowly varying function. Let a > 0, we need to check i h σ E L ( atS ) S j j l (at) i = 1. = lim h lim t→∞ t→∞ l (t) E L(tS )Sσ j j For a fixed ǫ > 0 we can choose t0 such that ∀u > t0 ǫ | L(au)/L(u) − 1| < , 2 14 since L is slowly varying. Then for t > t0 i h h i E L(atS j )Sσj E Sσj L(atS j ) − L(tS j ) h i −1 = h i σ σ E L(tS j )S j E L(tS j )S j     σ σ n n o o E 1 S j L(atS j ) − L(tS j ) S j L(atS j ) − L(tS j ) E 1 t t S j > t0 S j ≤ t0 h i h i + ≤ E L(tS j )Sσj E L(tS j )Sσj     ǫ σ σ n n o o E 1 S j 2 L(tS j ) S j L(atS j ) − L(tS j ) E 1 t t S j > t0 S j ≤ t0 h i h i < + σ σ E L(tS j )S j E L(tS j )S j   σ o n S j L(atS j ) − L(tS j ) E 1 t S j ≤ t0 ǫ h i < + 2 E L(tS j )Sσj   σ σ o n S j t L(atS j ) − L(tS j ) E 1 t S j ≤ t0 ǫ = + 2 U j ( 1t ) R sσ tσ | L(ats) − L(ts)| H j (ds) t ǫ (0, t0 ] = + 2 U j ( 1t )   R du σ | L( au) − L(u)| H u j t ǫ (0,t0 ] = + 1 2 Uj ( t ) (27) We observe that limx→0 U j ( x ) = ∞. since U j is a tail integral. From (26) it follows that limx→0 x σ ( L(ax ) − L( x )) = 0. Hence, the function g( x ) = x σ ( L(ax ) − L( x )) is bounded in [0, t0 ] by a constant K1,t0 . Finally we observe that for t > t0   Z Z du Hj < H j (du) ≤ 1. t (0,t0 ] (0,1] We set t1 > t0 such that for u > t1 2K1,t0 < U j (1/u). ǫ Choosing t > t1 we get R (0,t0 ] uσ | L(au) − L(u)| H j U j ( 1t ) 15  du t  < K1,t0 U j ( 1t ) < ǫ 2 It follows from (27) that i h E L(atS j )Sσj h i − 1 < ǫ. E L(tS j )Sσj Consequently, l defined above is slowly varying, implying that the marginal tail integral U j is regularly varying. 6.2 Proof of Theorem 4 Proof. It is straightforward to see that ρ̃d (s ) = Z ∞ 0 z −d h s sd  ⋆ ρ (dz) = ,··· , z z 1 Z ∞ 0 z− d e− s1 + ...+ s d z ρ⋆ (dz). From Example 1 in the main document, we know that, for arbitrary ρ⋆ and d ∈ N \ {0}, the previous integral is finite. Therefore for s 6= 0 Z ∞ ∂ j −1 − s ⋆ z e z ρ (dz) = ρ̃ j+1 (s, 0, . . . , 0) < ∞ j 0 ∂s and this concludes the proof since using the Dominated Convergence Theorem we can take the derivative under the integral sign as follows (−1)d−1 ∂ d−1 f (s ) ∂sd−1 = (−1)d−1 s= s1 + ...+ sd = Z ∞ 0 Z ∞ d−1   ∂ −1 − zs ρ⋆ (dz) z e d−1 z− d e 16 0 ∂s s + ...+ s − 1 z d ρ⋆ (dz). s= s1 + ...+ sd
10math.ST
WEAKLY TRIPOTENT RINGS arXiv:1704.01303v1 [math.RA] 5 Apr 2017 S. BREAZ, A. CÎMPEAN Abstract. We study the class of rings R with the property that for x ∈ R at least one of the elements x and 1 + x are tripotent. 1. Introduction An element x of a ring R is called tripotent if x3 = x, and a ring R is tripotent if all its elements are tripotent. Hirano and Tominaga proved in [4, Theorem 1] that a ring R is tripotent if and only if every element of R is a sum of two commuting idempotents. The class of these rings was extended in [7, Section 4] to the class of rings R such that every element is a sum or a difference of two commuting idempotents. This is a natural approach since similar methods were applied for other classes of rings. For instance, the classes of clean rings or nil-clean rings were extended in [1] and [2] to the classes of weakly clean, respectively weakly nil-clean in the following ways: a ring R is weakly (nil-)clean if and only if every element of R is a sum or a difference of a unit (nilpotent) element and an idempotent. Apparently the natural question which asks if we can properly extend in a similar way the classes of rings which satisfy identities which involve tripotents instead of idempotents has a negative answer, since −u is tripotent whenever u is tripotent. However, we want to propose such an extension, starting by the following remarks: (1) every element of a ring R is a sum or a difference of two (commuting) idempotents if and only if for every element x ∈ R at least one of the elements x or 1 + x is a sum of two (commuting) idempotents; (2) a ring R is weakly clean if and only if for every element x ∈ R at least one of the elements x or 1 + x is a sum of a unit and an idempotent. (3) a ring R is weakly nil-clean if and only if for every element x ∈ R at least one of the elements x or 1 + x is a sum of a nilpotent and an idempotent. Therefore, we will say that a ring R is weakly tripotent if for every element x ∈ R at least one of the elements x or 1 + x is tripotent. Two main differences between the properties of tripotent rings and weakly tripotent rings are the following: while tripotent rings are always commutative and the class of tripotent rings is closed under direct products, these propoerties are not valid for weakly tripotent rings. One of the main result of the present paper is Theorem 15 where we provide a characterization of commutative weakly tripotent rings as subrings of rings of the form R0 × R1 × R2 , where R0 is a weakly tripotent ring 2010 Mathematics Subject Classification. 16R50, 16A32, 16U99. 1 2 S. BREAZ, A. CÎMPEAN without nontrivial idempotents (these rings are described in Corollary 10), R1 is a Boolean ring, and R2 is a tripotent ring of characteristic 3. Moreover, we will obtain connections between the class of weakly tripotent rings and the rings studied in [7]. In particular, it is proved in the end of the paper that the class of rings such that every element is a sum or a difference of two commuting idempotents is strictly contained in the class of weakly tripotent rings (Corollary 19). 2. Weakly tripotent rings Before we will study the connections between these classes, we state some some basic properties of weakly tripotent rings. Lemma 1. Let R be a weakly tripotent ring. Then (1) every subring of R is weakly tripotent; (2) every homomorphic image of R is weakly tripotent; (3) 24 = 0, hence R has a decomposition R = R1 × R2 such that R1 and R2 are weakly tripotent and 8R1 = 3R2 = 0; For the the case R is of characteristic 3 weakly tripotent rings are in fact tripotent, we can restrict our study to rings on characteristic 2k , k ∈ {1, 2, 3}. We refer to [3] for other extensions of other generalizations of tripotent rings of characteristic 3. Lemma 2. If R is a ring that is weakly tripotent and has characteristic 3 then R is tripotent, hence it is isomorphic to a subdirect product of a direct product of Z3 . Proof. The identity (1 + x)3 = 1 + x is equivalent to 1 + 3x + 3x2 + x3 = 1 + x and since 3 = 0 this is equivalent to x3 = x.  We start with the Proposition 3. The following are equivalent for a ring R: (a) R is weakly tripotent; (b) for every element x ∈ R at least one of the elements x or 1 − x is tripotent. Proof. (a)⇒(b) Let x ∈ R such that x3 6= x. It follows that (−x)3 6= −x, hence (1 − x)3 = 1 − x. (b)⇒(a) is proved in a similar way.  Remark 4. Let us remark that a similar equivalence is not valid neither for Boolean rings nor for nil-clean conditions. More precisely: (a) a ring is Boolean (clean, respectively nil-clean) if and only if for every element x ∈ R at least one of the elements x or 1 − x is idempotent (clean, respectively nil-clean); (b) in the ring Z3 for every element x ∈ R at least one of the elements x or 1 + x is idempotent (resp. nil-clean), but Z3 is not Boolean or nil-clean, while Z(15) (i.e. the ring of rational numbers with denominator coprime with 15) is a weakly clean ring which is not clean, [1]. WEAKLY TRIPOTENT RINGS 3 In the following result we describe a connection between the class of weakly tripotent rings and one of the classes studied in [7]. A second connection will be established in Corollary 19. Corollary 5. The class of all weakly tripotent ring is strictly contained in the class of rings such that all elements are sums an idempotent and a tripotent that commute. Proof. The first statement is obvious since for every element x of a weakly tripotent ring such that x3 6= x we have that x − 1 is tripotent. To produce an example, we observe that in the ring Z4 × Z4 every element is a sum of a idempotent and a tripotent, but x = (1, 2) and (1, 1) + x are not tripotent elements.  It is easy to see that the class of weakly tripotent rings is contained in the class studied in [7, Section 2] of those rings such that every element is a sum of two commuting tripotents. The proof of the following proposition is easy. Proposition 6. If a ring R is weakly tripotent then it can be embedded as a subring of a direct product of subdirectly irreducible weakly tripotents rings. However, in the case of characteristic 2k a direct product of weakly tripotent ring is not necessarily weakly tripotent. The proof of the following proposition is standard. We refer to the similar property stated for weakly nil-clean rings in [1, Theorem 1.7] Q Proposition 7. A direct product i∈I Ri of weakly tripotent rings is weakly tripotent if and only if there exists i0 ∈ I such that Ri0 is weakly tripotent and for all i ∈ I \ {i0 } the rings Ri are tripotent. The following result was proved in [7, Theorem 3.6] by using the fact that if every element of a ring R is a sum of an idempotent and a tripotent that commute then R is strongly nil-clean, hence R/J(R) is Boolean and J(R) is nil, [5, Theorem 5.6]. We present for reader’s convenience a proof which uses the general procedure described in [6, Section 12]. Theorem 8. [7, Theorem 3.6] Let R be a ring of characteristic 2k . The following are equivalent: (1) every element of R is a sum of an idempotent and a tripotent that commute; (2) x4 = x6 for every x ∈ R; (3) R/J(R) is Boolean and U (R) is a group of exponent 2; (4) R/J(R) is Boolean, and for every x ∈ J(R) we have x2 = 2x. Consequently, if R satisfies the above conditions then J(R) coincides to the set of all nilpotent elements of R. Proof. (1)⇒(2) This is the implication (2)⇒(3) from [7, Theorem 3.6]. (2)⇒(3) First, we observe that for every ring R which satisfies (2) and every x ∈ U (R) we have x2 = 1. The class of rings which satisfies (2) is closed with respect to subrings and factor rings. More, precisely, we embed R/J(R) as a subring of a direct product of left primitive rings 4 S. BREAZ, A. CÎMPEAN which are factor rings of R, [6, Theorem 12.5]. We will prove that every left primitive ring which satisfies (2) is isomorphic to a division ring. In order to prove this, we first observe that ifK is a division ring  of characteristic 2 1 1 0 ... 0  1 0 0 ... 0      then for every n ≥ 2, for the n × n matrix A =  0 0 0 . . . 0  with coefficients in  .. .. .. .   . . . · · · ..  0 0 0 ... 0 4 6 K we have A 6= A . Then for every n ≥ 2 and every division ring K of characteristic 2, the rings Mn (K) of n × n matrices over K do not satisfy (2). Suppose that R is left primitive and satisfies (2). If R is not left artinian then we use [6, Theorem 11.19] to conclude that there exists a subring S of R and a division ring (of characteristic 2) such that there exists an onto ring homomorphism from S to the ring of M2 (K), which is not possible. Therefore there exists a positive integer n and a division ring K such that R ∼ = Mn (K). This is possible only if n = 1, hence K is a division ring of characteristic 2. Moreover, for every x ∈ K we have x2 = 1, which is possible only if K∼ = Z2 (if we have a nonzero element x 6= 1 in K then the subfield generated by x has 4 elements, and it follows that x2 6= 1). Coming back to the general case, it follows that for every ring R which satisfies (2) then ring R/J(R) is Boolean, since it is a subring of a direct product of copies of Z2 .  Corollary 9. If every element of R is a sum of an idempotent and a tripotent that commute then (i) the ideal J(R) is nil and it contains all nilpotent elements of R; (ii) for every x ∈ J(R) we have x2 = 2x, 4x = 0, and x3 = 0 . (iii) xy = yx for all x, y ∈ J(R); (iv) 2J(R)2 = 0. Proof. (i) is obvious. (ii) For every x ∈ J(R) the elements 1 ± x are invertible. Hence (1 ± x)2 = 1, and it follows that x2 = 2x = −2x. Hence 0 = 4x = x3 . (iii) Since 1 + x and 1 + y are invertible, and the group U (R) is commutative, we have (1 + x)(1 + y) = (1 + y)(1 + x), hence xy = yx. (iv) Observe that 2(x + y) = (x + y)2 = x2 + xy + yx + y 2 = 2x + 2y + xy + yx, hence xy = −yx. Therefore, 2xy = 0.  In the following corollary we have a characterization of weakly tripotent rings without nontrivial idempotents. This will be useful in order to describe commutative weakly tripotent rings, since in this case every subdirectly irreducible ring is without nontrivial idempotents. Corollary 10. The following are equivalent for a ring R without nontrivial idempotents such that 3 ∈ U (R): (1) every element of R is a sum of an idempotent and a tripotent that commute; WEAKLY TRIPOTENT RINGS 5 (2) R is local such that R/J(R) ∼ = Z2 , x2 = 1 for all x ∈ U (R); ∼ (3) R/J(R) = Z2 , for every x ∈ J(R) we have x2 = 2x; (4) R is weakly tripotent. Consequently, every weakly tripotent ring without nontrivial idempotents is commutative. Proof. (1)⇒(2) This follows from Theorem 8 since every idempotent of R/J(R) can be lifted to an idempotent of R. (2)⇒(3) This can be proved as in Corollary 9(ii). (3)⇒(4) Let x ∈ R \ J(R). Then 1 + x ∈ J(R), and it follows that (1 + x)2 = 2(1 + x). This implies that x2 = 1. If x ∈ J(R) then 1 + x ∈ / J(R), hence (1 + x)2 = 1, hence 1 + x is tripotent. For the last statement, it is enough to observe that every element of R \ J(R) is of the form 1 + x with x ∈ J(R), and to apply Corollary 9. (4)⇒(1) See Corollary 5.  We recall that a ring is abelian if every idempotent of R is central. Corollary 11. Every abelian ring such that every element of R is a sum of an idempotent and a tripotent that commute is commutative. In particular, every abelian weakly tripotent ring is commutative. Proof. If we have an abelian weakly tripotent ring, we embed the ring as a subdirect product of a family of subdirectly irreducible abelian weakly tripotent rings (Proposition 6). Since every subdirectly irreducible abelian ring has no nontrivial idempotents, the conclusion follows from Corollary 10.  But, let us remark that there exists non-commutative subdirectly irreducible weakly tripotent rings which are not local rings: Example 12. The ring T2 (Z2 ) of upper triangular matrices over Z2 is subdirectly irreducible and weakly tripotent. The above corollary allows us to provide nontrivial examples: k Example 13. (1) If N is an abelian group such that  2 N = 0, with k ≤ 3, then the x n idealization of N by Z2k , i.e. the ring af all matrices , is weakly tripotent if and 0 x only if 2N = 0. (2) Let 2 ≤ k ≤ 3 be a positive integer. If N = Z4 then the multiplication defined on the abelian group R = Z2k × N by (x, n) ∗ (y, m) = (xy, xm + ny + 2mn) induces a structure of weakly tripotent ring on Z4 × Z4 . (3) The ring R = Z4 [X, Y ]/(X 2 , Y 2 , XY − 2, 2X + 2Y ) is a subdirectly irreducible weakly tripotent ring. In order to prove that R is subdirectly irreducible, we observe that if I is an ideal in R such that X or Y is in I then 2 ∈ I. Moreover, if 2 + X ∈ I then 2X = X(2 + X) ∈ I and 2Y + 2 = Y (2 + X) ∈ I. Therefore, 2 = 2X + 2Y + 2 ∈ I. It follows that the ideal {0, 2} is the smallest ideal of R. 6 S. BREAZ, A. CÎMPEAN In order to provide a characterization for general weakly tripotent rings, we need the following lemma. Lemma 14. Let R be a commutative weakly tripotent ring of characteristic 2k (k ≤ 3), and let N be the nil radical of R. Then for every idempotent e in R one of the following properties is true: (a) en = 0 for all n ∈ N ; (b) en = n for all n ∈ N . Proof. We will denote f = 1 − n. If n is a nilpotent element then (e + n)3 = e + n or (f − n)3 = f − n. Suppose that (e + n)3 = e + n. Using the identities 8n = 0, n2 = 2n and n3 = 0 it follows that (e + n)3 = e + en, hence en = n. This also implies that f n = 0. If (f − n)3 = f − n it follows in the same way that f n = n, hence en = 0. Now suppose that there exists n1 and n2 nonzero nilpotents such that en1 = 0 and f n2 = 0. Since n1 + n2 is nilpotent, we can suppose that e(n1 + n2 ) = 0. But this implies that en2 = 0. Therefore n2 = 0, a contradiction, and the proof is complete.  We have the following characterization: Theorem 15. A commutative ring R is weakly tripotent if and only if R = R′ × R′′ such that: (1) R′′ is a tripotent ring of characteristic 3 or R′′ = 0;  Q (2) R′ = 0 or R′ can be embedded as a subring of a direct product R0 × i∈I Ri such that R0 is a weakly tripotent ring without nontrivial idempotents, and all Ri are boolean rings. Proof. We only have to prove that if R is a weakly tripotent ring of characteristic 2k then it can be embedded in a direct product as in (2). Let J be the Jacobson radical of R, and recall that J coincides to the set of all nilpotent elements of R. We fix an ideal L which is maximal with the property J ∩ L = 0. Then L∼ = (L + J)/J can be embedded in R/J. Therefore all elements of L are idempotents and 2L = 0. Let e be an idempotent in R/L. Then R/L ∼ = eR/L × f R/L, where f = 1 − e. Since (J + L)/L ⊆ J(R/L) we can suppose by Lemma 14 that (J + L)/L ⊆ eR. Therefore, if K is an ideal in R such that L ⊆ K and K/L ∼ = f R/L then K ∩ J = 0. By the maximality of L it follows that K = L, hence R/L has no nontrivial idempotents. In order to complete the proof, we proceed as in the proof of Birkhoff’s Theorem, [6, Theorem 12.3]. For every 0 6= x ∈ L we choose an ideal Ix which is maximal with the property x ∈ / Ix . By Zorn’s Lemma we can choose Ix such that J ⊆ Ix . Therefore R/Ix Q is Boolean, and there exists an injective ring homomorphism R → R/L × 06=x∈L R/Ix which provides a subdirect decomposition for R.  We complete this theorem with an example of a weakly tripotent ring R as in Theorem 15(2) such that it has no a direct factor isomorphic to R0 . WEAKLY TRIPOTENT RINGS 7 Example 16. Let R0 be a subdirectly irreducible weakly Q tripotent ring. For every positive integer k we fix a ring Rk ∼ = Z2 . In the direct product k≥0 Rk we consider the ring R generated by 1 = (1k )k≥0 and the ideal J(R0 ) ⊕ (⊕k≥1 Rk ) of all families of finite support Q in k≥0 Rk such that the 0-th component is in J(R0 ). It is easy to see that R has the desired properties. Remark 17. Let us remark that the ring R0 from Theorem 15 is not necessarily subdirectly irreducible. In order to see this, we consider the ring R from Example 13(1) with N = Z2 × Z2. This ring  is not subdirectly irreducible since for every subgroup S ≤ N the set 0 n IS = { ∈ R | x ∈ S} is a minimal ideal of R. Therefore, if we view R as a 0 0 subdirect product of a family of subdirectly irreducible rings, at least two factors of this product are not tripotent rings. Using the same proof as in Theorem 15 we obtain: Proposition 18. The following are equivalent for a ring R: (a) every element of R is a sum or a difference of two commuting idempotents; (b) R is isomorphic to a subring of a direct product R0 × R2 × R2 such that R0 is 0 or Z4 , R1 is Boolean, and R2 is a subdirect product of a family of copies of Z3 ; Proof. (a)⇒(b) Let R be a ring such that every element is a sum or a difference of two commuting idempotents. From [7, Lemma 4.2(5)] it follows that R is abelian, hence R is commutative by Corollary 11. By [7, Theorem 4.4] we have R = R1 × R2 such that R1 /J(R1 ) is Boolean such that J(R1 ) = 0 or J(R1 ) = {0, 2} and R2 is a tripotent ring, so it is enough to assume that R/J(R) is Boolean such that J(R) = {0, 2}. In this hypothesis, we observe that for every idempotent e ∈ R we have 2e = 0 or 2(1 − e) = 0. Therefore, we can apply the same technique as in the proof of Theorem 15 to conclude that R is isomorphic to a subring of a direct product of a subdirectly irreducible factor ring of R and a Boolean ring. Since in this case subdirectly irreducible factor rings of R are isomorphic to Z2 or Z4 , the proof is complete. (b)⇒(a) This is obvious.  Corollary 19. If every element of a ring R is a sum or a difference of two commuting idempotents then R is weakly tripotent. The converse is not true. Proof. The first statement follows from Proposition 18 and Theorem 15. In order to see that the converse is not true, let us observe that Z8 is weakly tripotent, but not all elements of R are sums or differences of two commuting idempotents.  References [1] M.-S. Ahn, D.D. Anderson, Weakly clean rings and almost clean rings, Rocky Mt. J. Math. 36 (2006), 783–798. [2] S. Breaz, P. Danchev, Y. Zhou, Rings in which every element is either a sum or a difference of a nilpotent and an idempotent, J. Algebra Appl. 15, No. 8, Article ID 1650148, 11 p. (2016). 8 S. BREAZ, A. CÎMPEAN [3] H. Chen and M. Sheibani, On Yaqub nil-clean ring, preprint arXiv:1704.00213 [math.RA]. [4] Y. Hirano, H. Tominaga, Rings in which every element is the sum of two idempotents, Bull. Aust. Math. Soc. 37 (1988), 161–164. [5] T. Koşan, Z. Wang, Y. Zhou, Nil-clean and strongly nil-clean rings, J. Pure Appl. Algebra 220 (2016), 633–646. [6] T.Y. Lam, A first course in noncommutative rings, Graduate Texts in Mathematics, 131. New York: Springer-Verlag, 1991. [7] Z. Ying, T. Koşan, Y. Zhou, Rings in which every element is a sum of two tripotents, Can. Math. Bull. 59 (2016), 661–672. Simion Breaz: ”Babeş-Bolyai” University, Faculty of Mathematics and Computer Science, Str. Mihail Kogălniceanu 1, 400084, Cluj-Napoca, Romania E-mail address: [email protected] Simion Breaz: ”Babeş-Bolyai” University, Faculty of Mathematics and Computer Science, Str. Mihail Kogălniceanu 1, 400084, Cluj-Napoca, Romania E-mail address: cimpean [email protected]
0math.AC
LinkedCT: A Linked Data Space for Clinical Trials Oktie Hassanzadeh, M.Sc.1, Anastasios Kementsietsidis, Ph.D. 2, Lipyeow Lim, Ph.D. 2, Renée J. Miller, Ph.D.1, Min Wang, Ph.D.2 1 University of Toronto, Ontario, Canada; 2 IBM T.J. Watson Research Center, Hawthorne, NY, U.S.A. Abstract The Linked Clinical Trials (LinkedCT) project aims at publishing the first open semantic web data source for clinical trials data. The database exposed by LinkedCT is generated by (1) transforming existing data sources of clinical trials into RDF, and (2) discovering semantic links between the records in the trials data and several other data sources. In this paper, we discuss several challenges involved in these two steps and present the methodology used in LinkedCT to overcome these challenges. Our approach for semantic link discovery involves using state-of-the-art approximate string matching techniques combined with ontology-based semantic matching of the records, all performed in a declarative and easy-to-use framework. We present an evaluation of the performance of our proposed techniques in several link discovery scenarios in LinkedCT. Introduction Clinical trials data are used extensively in drug development and clinical research1. The data collected in trials are widely used by a variety of different individuals for different purposes. Creating a single web data source of clinical trials data that is highly interlinked with existing medical data sources and that can be queried with semantically rich and complex queries, is a challenging task. This is the goal of the Linked Clinical Trials (LinkedCT) project. Such a web data source could significantly enhance the discovery of clinical trials in order to match patients with trials, perform advanced studies and enable tailored therapeutics2. The LinkedCT data space (http://linkedct.org) is published according to the principles of publishing linked data3. These principles greatly enhance adaptability and usability of data on the web, either by humans or machines. Each entity in LinkedCT is identified by a unique HTTP dereferenceable Uniform Resource Identifier (URI). When the URI is looked up, related RDF statements about the entity is returned in HTML or RDF/XML based on the user’s browser. Moreover, a SPARQL endpoint is provided as the standard access method for RDF data. Figure 1. Sample interlinked entities in LinkedCT*. Another important aspect of linked data publication is providing typed links to other relevant information sources for each resource. Without establishing such links, the online sources will resemble islands of data (or data silos), where each island maintains only part of the data necessary to satisfy the information needs of the particular users of that data source. In such a setting, apart from finding relevant data in a given island, users are also responsible for finding which other islands might hold relevant data, and what the specific pieces of relevant data are within these islands. To illustrate, consider the simple case of matching a patient with a clinical trial, where a clinician is trying to match a patient in “Westchester Medical Center” who is using the drug “Campath” with a related trial. For this, the clinician needs to identify the sources of information about trials, and in addition she first needs to identify all the locations close to where the patient lives, possibly using a source of geographical information (e.g., GeoNames†), and then find all the synonyms (generic names and brand names) of the drug using perhaps a drug data source (e.g., DrugBank‡). All of this is * Only the links to external entities are shown. http://geonames.org ‡ http://drugbank.ca † needed in order to identify, for example, a trial at “Columbia University” on “Alemtuzumab” (the generic name of the drug “Campath”). Previous research in finding semantic links between data items has mainly focused on a more restricted version of the problem, namely, entity resolution or record linkage, i.e., the identification of entities in disparate sources that represent the same real-world entity4. Yet, the general problem investigated here considers links between entities that are not necessarily identical, although they are semantically related. For example, in Figure 1, “Columbia University” is linked with “New York” using a link of type based_near and “Beta-Thalassemia” is linked with “Blood Disorders” with link type is_a_type_of. In practice, the type of the links is usually specified using existing vocabularies, for example, owl:sameAs specifies that two entities are the same, rdfs:seeAlso specifies that the target resource may contain additional information about the source, and foaf:based_near specifies that the source entity is located in the target resource (which is of type location). Discovering such typed links is currently an area of active research. relational views over the XML data, and to materialize the views to enhance the performance. Third, the relational data is mapped into RDF format. We use the popular D2RQ tool for transforming the relational data to RDF6 and the companion D2R server for publishing the relational data as a linked data source. Table 1 shows the overall statistics of the data and Table 2 shows the statistics of some of the entities in the data space. Table 1. Overall Statistics. 7,011,000 822,824 Number of links to external linked data sources 308,904 Table 2. Sample Entities. Triplification of Trials Data In this section, we outline the linked data generation (or triplification) of trials data in LinkedCT. The core of the LinkedCT dataset is derived from ClinicalTrials.gov5, a registry of clinical trials conducted in the United States and around the world. As of November 2008, this registry contained information about more than 60,000 trials conducted in 158 countries. Each trial is associated with a brief description of the trial, related conditions and interventions, eligibility criteria, sponsors, locations, and several other pieces of information. The data on ClinicalTrials.gov is semi-structured and is available in HTML and XML formats. Transforming the data into RDF involves several steps. First, the XML collection of the trials needs to be crawled and stored locally. This results in a collection of over 60,000 XML files. Second, the XML data needs to be mapped into relational format. The mapping is obtained by manually inspecting the data and the Document Type Definition (DTD) of the data. In addition to all the entities and facts in the data, the mapping also extracts the relationships between the entities and their types. The relational schema needs to be reasonably normalized to ensure performance and avoid update anomalies when the data is refreshed. For LinkedCT, we have used a hybrid relational-XML DBMS (IBM DB2) to create Total number of RDF triples Number of Entities Entity Trials Count 60,520 Condition 14,243 Intervention 67,271 Location 222,115 Collaborator Agency 7,071 Overall Official 52,660 Primary Outcomes 55,761 Reference 45,110 Criteria 73,688 Total 822,824 Interlinking LinkedCT with Other Data Sources After the triplification of the trials data, we are faced with the challenge of finding useful links between the data in LinkedCT and other data sources. We have interlinked LinkedCT with several linked data sources of medical information: DBpedia§ and YAGO (linked data sources derived from Wikipedia articles, containing many useful pieces of information about diseases and drugs), DailyMed** (published by the National Library of Medicine, providing high quality information about marketed drugs), Diseasome†† (containing information about 4,300 disorders and disease genes linked by known disorder–gene associations for exploring known phenotype and disease gene associations and indicating the common genetic origin of many diseases), DrugBank (a repository of roughly 5,000 § http://dbpedia.org http://www4.wiwiss.fu-berlin.de/dailymed/ (derived from http://dailymed.nlm.nih.gov/) †† http://www4.wiwiss.fu-berlin.de/diseasome/ (derived from http://www.ncbi.nlm.nih.gov/omim) ** FDA-approved drugs), Bio2RDF’s PubMed (Bio2RDF‡‡ project’s linked data version of PubMed), GeoNames (linked data source of geographical information) and Lingvoj (information about languages). Also, the trials, conditions, interventions, locations and references on LinkedCT have been linked to their related web pages on ClinicalTrials.gov, Wikipedia, Freebase and Pubmed using foaf:page links. Table 3 shows the statistics of the external links in LinkedCT. Table 3. Statistics of the links between LinkedCT and several other data sources. Source / Target Link Type Count LinkedCT (intervention) ↔ DBpedia (drug) owl:sameAs 11,527 LinkedCT (intervention) ↔ DrugBank (drug) rdfs:seeAlso 23,493 LinkedCT (intervention) ↔ DailyMed (drug) rdfs:seeAlso 39,396 LinkedCT (condition) ↔ DBpedia (disease) owl:sameAs 342 LinkedCT (condition) ↔ Diseasome (disease) owl:sameAs 830 LinkedCT Geonames foaf:based_ne ar 129,177 LinkedCT (reference) → Bio2RDF’s PubMed owl:sameAs 42,219 LinkedCT (trial) ClinicalTrials.gov foaf:page 61,920 (trial) → → The difficulty in discovering links between different data sources lies in the absence of globally unique identifiers in many of the disparate data sources. The problem is exacerbated by presence of errors in the data. The consequence is that establishing links using exact matching of data fields is not robust enough to capture the amount of real linkages. This calls for approximate string matching in combination with semantic matching of the data fields. Approximate string matching is required when there are different string representations for the same entity. For example, “Alzheimer's disease” in LinkedCT should be matched with “Alzheimer_disease” in Diseasome. String matching is also robust against misspelled words and alternative spellings (eg. "Thalassemia" and "Thalassaemia"). Semantic matching is particularly useful for matching clinical terms, since many drugs and diseases have multiple names. Drugs may have generic names and ‡‡ http://bio2rdf.org/ several brand names. Diseases may also have different scientific and non-scientific names or may be abbreviated. For example, "Acquired Immunodeficiency Syndrome" is abbreviated as "AIDS", or the terms "Klinefelter Syndrome" and "Hypogonadotropic hypogonadism" are alternatively used to refer to the same disease. Obviously, approximate string matching is not sufficient for data with such different representations. String Matching for Semantic Link Discovery String data is prone to several types of inconsistencies and errors including typos, spelling mistakes, using abbreviations or different conventions. Therefore, finding similar strings, or approximate string matching, is an important part of an (online) link discovery process. Approximate string matching is performed based on a similarity function sim() that quantifies the amount of closeness (as opposed to distance) between two strings. A similarity threshold θ is set by the user to specify that there is a link from the base record to the target record if their similarity score, returned by function sim(), is above θ. Similarity Function There exists a variety of similarity functions for string data in the literature. The performance of a similarity functions usually depends on the characteristics of data, such as length of the strings, along with the type of the errors and inconsistencies present in the data. An increasingly popular class of string similarity functions is based on tokenization of the strings into q-grams, i.e., substrings of length q of the strings. Using q-gram tokens makes it possible to treat strings as sets of tokens and use a set similarity measure as the measure of similarity between the two strings. Based on comparison of several such measures, we use weighted Jaccard similarity along with q-gram tokens as the measure of our choice due to its relatively high efficiency and accuracy compared with other measures, especially in matching records in medical domain. In particular, this similarity function has the ability to take into account the importance of the tokens, and therefore could match two records that differ in many unimportant tokens. This allows matching “HIV virus” with “HIV”, and “Alzheimer” with “Alzheimer’s Disease”. Moreover, this function captures token swaps, therefore matching “Adenocarcinoma of the Colon” with “Colon adenocarcinoma” for example. Many traditional string similarity functions (such as edit similarity) fail to capture such differences in the strings. Jaccard similarity between two string records r1 and r2 is the fraction of tokens in r1 and r2 that are present in both. Weighted Jaccard similarity is the weighted version of Jaccard similarity, i.e., where w(t,R) is a weight function that reflects the commonality of the token t in the relation R, i.e., the higher the weight of a q-gram, the more important the q-gram is. We choose RSJ (Robertson/Sparck Jones) weight for the tokens which are similar to (but more effective than) the commonly-used Inverse Document Frequency (IDF) weights: where N is the number of tuples in the base relation R and nt is the number of tuples in R containing the token t. The similarity value returned is between 0 (for strings that do not share any q-grams) and 1 (for equal strings). Implementation We have implemented the weighted Jaccard similarity predicate declaratively in standard SQL and used it as a join predicate in a standard RDBMS engine by extending our previous work on approximate selection7. Alternatively, this predicate can be used with some of the specialized, high performance, state-of-the-art approximate join algorithms4 that make the process scalable to very large databases. In our experiments we used q-grams of size 2 and a specific q-gram generation technique to enhance the effectiveness of the predicate: strings are first padded with whitespaces at the beginning and the end, then all whitespace characters are replaced with q − 1 special symbols (e.g., $). Ontology-based Semantic Matching for Link Discovery In order to find meaningful semantic links between values, it is often necessary to leverage some semantic knowledge about the domain from which these values originate. In many domains, including health care, there are existing, commonly accepted, semantic knowledge bases that can be used to this end. A common type of such semantic knowledge is an ontology. In the health care domain, well-known ontologies such as the NCI thesaurus are widely used that encapsulate a number of diverse relationship types between their recorded medical terms, including, synonymy, hyponymy/hypernymy, etc. Such relationship types can be conveniently represented in the relational model and (recursive) SQL queries can be used to test whether two values are associated with a relationship of a certain type. Implementation We extend the existing methods for ontology-based keyword search over relational data for ontology-based link discovery. Assume that the semantic knowledge is stored in a table thesaurus with columns src and tgt. The column src contains concept IDs of the terms, and the column tgt contains the terms. This is a common approach in storing semantic knowledge, used in sources such as NCI thesaurus and Wordnet’s synsets. For example, the terms “Acetaminophen”, “Tylenol”, “Paracetamol” and “APA” all have the same concept ID “Acetaminophen” in the NCI thesaurus. In practice, this data could be stored in a table thesaurus with an additional column rel that stores the type of the relationship, or it could be stored in XML format which is a common approach particularly in the health care domain. For the data stored in XML, thesaurus can be a view defined in a hybrid XML relational DBMS such as DB2. Due to space constraints, we limit our discussion in this paper to semantic knowledge stored as relational data. Assume that the trial intervention names are stored in the table ctintervention(tid,name) and the DBpedia drug titles are stored in the table dbpediadrug(tid,title). The following SQL query returns names and titles related through the semantic knowledge stored in the table thesaurus: SELECT DISTINCT c.*, d.* FROM ctintervention AS c, dbpediadrug AS d, thesaurus AS t WHERE src IN (SELECT src FROM thesaurus WHERE tgt = c.name) AND tgt = d.title For more complex relationships such as hyponymy or hypernymy, a recursive query can be used to traverse the ontology tree to a specific depth. In our experiments in this paper, we only use synonym information from NCI thesaurus. Experiments We show the effectiveness of semantic link discovery using string and semantic matching techniques described above using five linkage scenarios in LinkedCT. Table 4 shows the summary of the results. The columns “Link #” show the number of links discovered using exact matching, string matching, semantic matching and the overall number of links. Matching each entity in LinkedCT with the target data source may result in several links. For example, if there are 10 trials on condition “AIDS”, and “AIDS” is matched with its corresponding resource on DBpedia, then 10 links are added to the total number of links. The columns “Linked Entity #” show the number of distinct entities in LinkedCT that Table 4. Statistics of the Links Discovered Using String and Semantic Matching. Intervention ↔ DBpedia (drug) Intervention DrugBank (drug) Intervention DailyMed (drug) Condition DBpedia (disease) Condition Diseasome ↔ ↔ ↔ ↔ Exact Match Link Linked Entity # # Link # String Matching Linked Diff Entity # % 8,442 867 9,716 9,867 926 11,865 +20.2% 1,938 +109.3% 12,127 +22.9% 1,641 +77.2% 23,493 +138.1% 2,477 +167.5% 14,257 673 24,461 +71.6% 1,296 +92.6% 27,685 +94.2% 1,099 +63.3% 39,396 +176.3% 1,688 +150.8% 164 164 333 +103.0% 330 +101.2% 173 +5.5% 173 +5.5% 342 +108.5% 342 +108.5% 232 192 778 +235.3% 575 +199.5% 301 +29.7% 247 +28.6% 830 +257.8% 615 +220.3% +15.1% 1,558 Diff % Link # Semantic Matching Diff Linked Diff Entity # % % +79.7% 10,630 25.9% are linked. The “Diff %” columns show the improvement over the exact matching of the strings. Note that since the links are automatically discovered, some may be inaccurate. These can best be filtered by a user from the query results. The benefit of using automatically discovered links is that a very large number of links is achieved at the cost of some precision. In our case, manually inspecting a subset of the links showed above 98% precision on average in all the scenarios. The results in Table 4 clearly show the effectiveness of both string and semantic matching in all these linkage scenarios. Using semantic knowledge has resulted in more links between intervention and drugs as compared to conditions and diseases since drugs tend to have more semantic equivalences (brand names and generic names). The use of semantic matching however is useful particularly for matching disease names that are abbreviated. The overall numbers of the links show that although there is some overlap between the links discovered using semantic matching and string matching, there is a significant number of links that are not found using a single matching technique. Overall Linked Diff Entity # % +53.9% 11,527 +36.5% Diff % 1,913 +120.6% also means that the integration only has to happen one time. A distinctive feature of LinkedCT data space is the large number of links to other existing data sources. We demonstrated how state-of-the-art approximate string matching and ontology-based semantic matching can be used for discovery of such semantic links between LinkedCT and several other data sources. The ratio of external links per entities in LinkedCT is more than two orders of magnitude larger than the average ratio in the existing linked data sources (that are part of the Linking Open Data community project at W3C). This shows the effectiveness of our proposed techniques in semantic interlinking of trials data and web data sources in general. Due to the declarative nature of our implementation methods, our approach is also useful for matching electronic medical records (EMRs) with trials data. We therefore plan to develop a flexible declarative framework for semantic link discovery over medical databases. References 1. Conclusion In this paper, we briefly discussed the challenges involved in creating the LinkedCT data space, the first open RDF data source of clinical trials. The data is published using the principles of linked data. Our approach can be used for the publication of other medical datasets as well. Currently, when clinical researchers and pharmaceutical companies bring copies of data within their organizations for integration, they each need to have experts who understand the connectivity across data sets. However, with the Linked Data approach, this responsibility is shifted to the data providers. This is a much more efficient approach, as the data providers are the individuals who understand their data best. It 1,334 Link # 2. Barrett J, What's behind clinical trial data?(Global News). Journal of Applied Clinical Trials 18.1 (Jan 2009): 22(1). Knowledge@Wharton, Eli Lilly's Sidney Taurel: 'Tailored Therapeutics' -- the Pharmaceutical Industry's Next Blockbuster? March 13, 2008 http://knowledge.wharton.upenn.edu/article.cfm?articleid=1915 3. 4. 5. 6. 7. Berners-Lee T, Linked Data - Design Issues, 07-2006, http://www.w3.org/DesignIssues/LinkedData.html Elmagarmid AK, Ipeirotis PG, Verykios VS , Duplicate record detection: A survey. IEEE Transactions on Knowledge and Data Engineering 2007;19(1), 1–16. Mi, M, Clinical trials database: linking patients to medical research <http//clinicaltrials.gov>. Journal of Consumer Health on the Internet, 2005; 9(3): 59-67. Bizer C, Seaborne A, D2RQ - Treating non-RDF databases as virtual RDF graphs, Proceedings of the 3rd International Semantic Web Conference (posters), 2004. Hassanzadeh O, Benchmarking declarative approximate selection predicates. Master’s thesis, University of Toronto, Feb. 2007.
5cs.CE
Vector Quantization using the Improved Differential Evolution Algorithm for Image Compression 1 Sayan Nag* 1 Department of Electrical Engineering, Jadavpur University Kolkata India * Corresponding Author Abstract- Vector Quantization (VQ) is a popular image compression technique with a simple decoding architecture and high compression ratio. Codebook designing is the most essential part in Vector Quantization. Linde–Buzo–Gray (LBG) is a traditional method of generation of VQ Codebook which results in lower PSNR value. A Codebook affects the quality of image compression, so the choice of an appropriate codebook is a must. Several optimization techniques have been proposed for global codebook generation to enhance the quality of image compression. In this paper, a novel algorithm called IDE-LBG is proposed which uses Improved Differential Evolution Algorithm coupled with LBG for generating optimum VQ Codebooks. The proposed IDE works better than the traditional DE with modifications in the scaling factor and the boundary control mechanism. The IDE generates better solutions by efficient exploration and exploitation of the search space. Then the best optimal solution obtained by the IDE is provided as the initial Codebook for the LBG. This approach produces an efficient Codebook with less computational time and the consequences include excellent PSNR values and superior quality reconstructed images. It is observed that the proposed IDE-LBG find better VQ Codebooks as compared to IPSO-LBG, BA-LBG and FA-LBG. Keywords – Image Compression, Vector Quantization, Codebook, Improved Differential Evolution (IDE) Algorithm, Linde-Buzo-Gray (LBG) Algorithm, Improved Particle Swarm Optimization (IPSO) Algorithm, Bat Algorithm (BA), Firefly Algorithm (FA). ______________________________________ * Corresponding Author, Email: [email protected] 1. Introduction The major role of Image compression lies in medical sciences, internet browsing and navigation applications, TV broadcasting and so on. With the advancement of science and technology, the storage space requirement and the need for reduction in transmission time for digital images are becoming essential concerns. The transmission bandwidth being limited creates a problem. An efficient and proper image compression technique is of prime requirement to tackle the problem of limited bandwidth. This area of study attracted many researchers over the past decades who have suggested several techniques for image compression. Vector Quantization (VQ) technique outperforms other techniques such as pulse code modulation (PCM), differential PCM (DPCM), Adaptive DPCM which belongs to the class of scalar quantization methods. Vector quantization (VQ) [1, 2], one of the most popular lossy image compression methods is primarily a c-means clustering approach widely used for image compression as well as pattern recognition [3, 4], speech recognition [5], face detection [6] speech and image coding because of its advantages which include its simple decoding architecture and the high compression rate it provides with low distortion- hence its popularity. Vector Quantization involves the following three steps: (i) Firstly, the image in consideration is divided into non-overlapping blocks commonly known as input vectors. (ii) Next, a set of representative image blocks from the input vectors is selected referred to as a codebook and each representative image vector is referred to as a code-word. (iii) Finally, each of the input vectors is approximately converted to a code-word in the codebook, the corresponding index of which is then transmitted. Codebook training is considered sacrosanct in the process of Vector Quantization, because a codebook largely affects the quality of image compression. Such significance of Codebook training gave new impetus to many researchers leading to the proliferation of researches to design codebook using several projected approaches. Vector Quantization methods are categorized into two classes: crisp and fuzzy [7]. Sensitive to codebook initialization, Crisp VQ follows a hard decision making process. Of this type, C-Means algorithm is the most representative of all. Linde et al. propounded the famous Linde-Buzo-Gray (LBG) algorithm in this respect. Starting with the smallest possible codebook size the gradual parlay in the size occurs by using a splitting procedure [8]. By implanting specific functions (utility measures) in the learning process the performance of the LBG algorithm is significantly enhanced. Fuzzy VQ incorporates fuzzy C-Means algorithm. The approach is similar to that of fuzzy cluster analysis. Each training vector is posited to be a property of multiple clusters with membership values which makes the learning a soft decision making process [9]. The drawback of LBG Algorithm is that it gets stuck in a local optimum. In order to overcome such problem, a clustering algorithm known as enhanced LBG is proposed [10]. By changing the lower utility codewords to the one with higher utility the problem of local optimal with LBG is overcome. Recently researches involve the association of the evolutionary optimization algorithms with the LGB algorithm. This conglomeration for design the codebook has a significant impact in improving the results of the LGB algorithm. Rajpoot, et al. formulated a codebook using an Ant Colony Optimization (ACO) algorithm [11] yielding fascinating results thereby clearly depicting the improvement in the results obtained by the hybridization of ACO with LBG. Codebook is optimized abreast appointing the vector coefficients in a bidirectional graph; next, a appropriate implementation of placing pheromones on the edges of the graph is expounded in the ACO-LBG Algorithm. The speed of convergence of the ACO_LBG algorithm is proliferated by Tsaia et al. by discarding the redundant calculations [12]. Particle Swarm Optimization (PSO) is also an adaptive swarm optimization approach based on updating the global best (gbest) and local best (lbest) solutions. The ease of improvement and fast convergence to an expected solution attracted many researchers to apply PSO for solving optimization problems. Particle swarm optimization along with vector quantization [13] overcomes the drawbacks of the LBG algorithm. Evolutionary fuzzy particle swarm optimization algorithm [14] is an efficient and robust algorithm in terms of performances compared to that of the LBG learning algorithms. Quantum particle swarm algorithm (QPSO) is yet another PSO put forward by Wang et al. for solving the 0–1 knapsack problem [15]. Applied together with LBG, the QPSO-LBG algorithm outperforms LBG algorithm as well. Yang et al. devised a new method for image compression which involves an Evolutionary clustering based vector quantization primarily focused on One-Step Gradient Descent Genetic Algorithm (OSGD-GA). The particular algorithm is formulated for optimizing the codebooks of the low-frequency wavelet coefficient by expounding the consequence of every coefficient involved abreast employing fuzzy membership values for automatic clustering [16]. The Firefly Algorithm (FA) is an efficient Swarm Intelligence tool which is largely applied to many engineering design problems nowadays. Firefly Algorithm is inspired by the social activities of fireflies. In presence of a firefly with brighter intensity, the one with lower intensity value move towards the former and in the absence of the brighter firefly then one with lower intensity moves in a random fashion. Horng successfully applied a newly developed Firefly Algorithm (FA) for designing the codebook for vector quantization [17]. An efficient algorithm by the name of Honey Bee Mating Optimization (HBMO) is applied for codebook generation yielding a good quality reconstructed image with modicum of distortion in Image Compression Problems [18]. Dynamic programming is used as an efficient optimization technique for layout optimization of interconnection networks by Tripathy et al. [19]. Tsolakis et al. [20] presented a fast fuzzy vector quantization technique for compression of gray scale images. Based on a crisp relation, an input block is assigned to more than one code-word following a fuzzy vector quantization method [21]. LBG Algorithm alone cannot guarantee optimum results since the initialization of the codebook has a significantly impact on the quality of results. Thus, an attempt has been made in this respect where an Improved PSO-LBG (IPSO-LBG) applied to design codebook for Vector Quantization showed fascinating results when compared to other algorithms like QPSO-LBG and PSO-LBG [22]. Contextual region is encoded giving high priority with high resolution Contextual vector quantization (CVQ) algorithm [23]. Huanga et al. devised a dynamic learning vector– scalar quantization for compressing ECG images [24]. Bat Algorithm (BA) is yet another advanced nature inspired algorithm which is based on the echolocation behavior of bats with variation in the pulse rates of loudness and emission. BA in association with LBG is applied as BA-LBG for fast vector quantization in image compression [25]. Results obtained from BA-LBG when compared with QPSO-LBG, HBMO-LBG, PSO-LBG and FA-LBG showed that BA-LBG outperforms the other mentioned algorithms. Optimization problems are applied in various domains of Engineering Design, Structural Optimization, Economics and Scheduling Assignments. These problems have some mathematical models and Objective Functions. Two varieties of such problems exist: Unconstrained (without constraints) and Constrained (with Constraints) involving both continuous as well as discrete variables. They are usually non-linear in nature. The task of finding the optimal solutions is difficult with several restraints being active at the global optima. Traditional methods for solving these problems are Gradient Descent, Dynamic Programming and Newton Methods. But they are computationally inefficient. This mark the advent of the meta-heuristic algorithms which provide feasible solutions in a reasonable amount of time. There list of meta-heuristics include Genetic Algorithm (GA) [26], Particle Swarm Optimization (PSO) [27], Gravitational Search Algorithm (GSA) [28], Ant Colony Optimization (ACO) [29, 30], Stimulated Annealing (SA) [31, 32], Plant Propagation Algorithm (PPA) [33, 34] and so on [35, 36]. Differential Evolution (DE) is one such metaheuristic algorithm used for fast convergence and less computation time. It optimizes a problem by trying to improve a candidate solution through generations based on a fitness function and using a crossover strategy which is different from that of the Genetic Algorithm. DE is modified to Improved DE (IDE) and used to generate high quality codebook with LBG for vector quantization for image compression. A comparison with other algorithms like IPSO, BA and FA clearly reveals that IDE outperforms all of the other mentioned algorithm in terms of efficiency as judged from the PSNR values of the images. The paper is organized as follows: In Section 2, codebook design using generalized LBG Vector Quantization Algorithm is discussed. In Section 3, the proposed method of IDE-LBG Algorithm is presented. Section 4 includes the experimental results, discussions and comparisons. Eventually, Section 5 contains the concluding part. 2. Codebook Design for Vector Quantization The Vector Quantization (VQ) is a block (vector) coding technique which is to be optimized for image compression. Designing a proper codebook lessens the distortion between reconstructed image and original image with a modicum of computational time. Let us consider an Image of size N x N which is to be vector quantized. It is 𝑁 𝑁 then subdivided into Nb blocks with size n × n pixels, where, 𝑁𝑏 = ( ∗ ). These subdivided image blocks are known 𝑛 𝑛 as training vectors each of which are of size n × n pixels are represented with Xi (where i = 1, 2, 3,. . ., Nb). In the process of Codebook design, a Codebook has a set of code words, where the ith Code-word is represented as Ci (where i = 1, 2, ..., Nc) where Nc is the total number of Code-words in Codebook. Every subdivided image vector is approximately represented by the index of a Code-word using a closest match technique. The approach is based on the minimum Euclidean distance between the vector and corresponding code-words. In the decoding phase, the same codebook is used to translate the index back to its corresponding Code-word for image reconstruction. Then the distortion between the actual and the reconstructed image is calculated. The distortion D between training vectors and the codebook is given as: 𝐷= 1 𝑁𝑐 𝑐 ∑𝑁 ∑𝑁 𝑏 𝑗=1 𝑖=1 𝑢𝑖𝑗 . ‖𝑋𝑖 − 𝐶𝑗 ‖ 2 (1) Subject to the following restraints: 𝑁 𝑐 𝐷 = ∑𝑗=1 𝑢𝑖𝑗 = 1, ∀ 𝑖 ∈ {1, 2, … , 𝑁𝑏 } 1, iff 𝑋𝑖 ∈ 𝑗𝑡ℎ cluster 0, otherwise 𝑢𝑖𝑗 = { (2) (3) The other two necessary conditions which are to be followed for an optimal vector quantizer are:  The partition 𝑅𝑗 ∀ 𝑗 = 1,2,3, … , 𝑁𝑐 must meet the following criterion:  The Code-word Cj should be defined as the centroid of Rj such that, 𝑅𝑗 ͻ {𝑥 ∈ 𝑋: 𝑑(𝑐, 𝐶𝑗 ) < 𝑑(𝑥, 𝐶𝑘 ), ∀ 𝑘 ≠ 𝑗} 𝐶𝑗 = 1 𝑁𝑗 𝑁 𝑗 ∑𝑖=1 𝑥𝑖 , ∀ 𝑥𝑖 ∈ 𝑅𝑗 (4) (5) where Nj is the net number of vectors which belong to Rj. The procedure for the most commonly used method for codebook design in Vector Quantization, the Lloyd-Buzo-Gray (LBG) Algorithm is provided as follows: Steps: 1. 2. 3. 4. 5. Initialization: Iteration counter is set as m = 1 and the initial distortion D1 = 0. Initial codebook C1 is of size N. One block (vector) from the set of training vectors is selected and compared with all code-words from codebook, Cm-1 = {Yi} to find the closest code-word using nearest neighbor condition and then the code-word set is added. Once all the blocks are grouped into sets of code-words using the above mentioned step, the centroids of all the code-word sets are evaluated to give an improved codebook Cm. Next, the total distortion of all code-word sets from the respective centroid points are calculated. The average distortion is given as Dm. If |(Dm-1 - Dm)| ≤ ε, the algorithm terminates and the current codebook is recorded as the final answer. Otherwise, m = m + 1, the current codebook is used as the initial codebook for step 1 and the entire process is then repeated. LBG Algorithm ensures the reduction in distortion with increase in iteration number. But there is no assurance regarding the resulting codebook, whether it will become an optimum one or not. It is seen that the initial condition of the codebook has a significant effect on the results. So the initial codebook selection is of prime importance in the LBG Algorithm. Thus we propose to combine an efficient modified heuristic Improved Differential Evolution (IDE) with LBG Algorithm, thereby giving a state-of-the-art IDE-LBG Algorithm and the problem initial codebook selection is tackled with this attempt. 3. Proposed IDE-LBG Vector Quantization A:gorithm Differential Evolution (DE) is a powerful population-based efficient global optimization technique which was posited by Storn et al. [37]. It has been successfully applied to diverse fields including pattern recognition, communication and so on. In our algorithm we have used the DE/current to best/1 scheme. We have modified DE to IDE with certain modifications in the mutation strategy and in the boundary control strategy. In the mutation strategy we have considered a different scaling factor. The boundary control strategy is improved such that when the limits are crossed then based on a probability there can be either of the two possibilities: (i) the solutions are adjusted within the boundary limits by making the values equal to the values of the limits, or, (ii) by randomly generating a fresh candidate within the bounds and replacing the one which violated the limits. The training image vectors or blocks are demarcated into different groups. One block from each group is selected at random as the initial candidates. A candidate is constructed by Nc × 16 pixels, where Nc is the size of a codebook. In the process, all the candidates of the entire population are moved nonlinearly to cover all searching space, a process known as exploration. In each generation, G, IDE uses the mutation and crossover operations to engender a trial vector Ui,G for each individual vector XiG, known as target vector in the present population. The mutation and crossover operations along with the fitness function are described below: a. b. Mutation: There exists an associated mutant vector, Vi,G for each target vector XiG at generation G in the current population. The DE/current to best/1 scheme dictates the mutation operations as follows: 𝐺 𝑉𝑖𝐺 = 𝑋𝑖𝐺 + 𝐹 . (𝑋𝑏𝑒𝑠𝑡 − 𝑋𝑖𝐺 ) + 𝐹. (𝑋𝑟𝐺1 − 𝑋𝑟𝐺2 ) (6) where r1 and r2 are random integers which are essentially mutually different and lies in the range [1, NP]. F is called the Weighting Factor, F = 3.randn, where randn ~ N(0,1), N being the standard normal 𝐺 distribution. 𝑋𝑏𝑒𝑠𝑡 is by far the fittest individual in the population at generation G. Crossover Operation: Post-mutation period, a binomial crossover strategy is adopted to generate a trial vector Ui,G = {u1iG, u2iG, ….., udiG,}, where d is the dimension. CR is the crossover operator, a value between 0 and 1. We have considered CR = 0.9. 𝑈𝑗𝑖𝐺 = { c. 𝑣𝑗𝑖𝐺 , 𝑖𝑓 (𝑟𝑎𝑛𝑑𝑗 (0, 1) ≤ 𝐶𝑅, 𝑜𝑟, 𝑗 = 𝑗𝑟𝑎𝑛𝑑 (7) 𝑥𝑗𝑖𝐺 , 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒 Fitness function: Size of the testing images is N x N, 𝐼 is the recompressed image pixels, and 𝐼 ̅ is the compressed image pixels. The fitness function is given in the following set of equations (8-10). First Mean Square Error (MSE) is calculated, then Peak Signal to Noise Ratio (PSNR) is evaluated which is nothing but the fitness function of the problem. 𝑀𝑆𝐸 = 𝑁 ̅ 2 ∑𝑁 𝑖=1 ∑𝑗=1(𝐼𝑖,𝑗 − 𝐼𝑖,𝑗 ) (8) 𝑁×𝑁 𝑃𝑆𝑁𝑅 = 10 × log( 2552 ) (9) 𝑓𝑓𝑖𝑡𝑛𝑒𝑠𝑠 = max(𝑃𝑆𝑁𝑅) (10) 𝑀𝑆𝐸 The detailed steps for IDE-LBG Algorithm for finding optimal Codebook are described as follows: 1. 2. 3. Parameters and Functions: Fitness function = ffitness, iteration parameter = iter = 1, number of generations = NGen, codebook size = Nc, and population size = NP. Testing images divided into Nb non-overlapping image blocks or input vectors (bk ; k = 1, 2, …, Nb). They are put into a training set tSet, which of each block is n × n pixels, the total pixels of each image block is evaluated and the blocks are sorted in the increasing order of pixel number. Here we have considered n = 4. 𝑁 Nb blocks are separated into Nc groups according to the index number of blocks, each group having 𝑏 number 𝑁𝑐 of blocks. Blocks from groups are selected at random to form the Code-words to form the initial population of size NP. 4. 5. 6. 7. 8. At current iteration G, the individual candidates of the population are updated using the mutation and crossover strategies using equations (6)-(7). Boundary control is applied so that the solutions remain within the limits of the search space. 𝐺 𝐺+1 The fitness of the off-springs are calculated and compared. If any individual is better than 𝑋𝑏𝑒𝑠𝑡 , 𝑋𝑏𝑒𝑠𝑡 is 𝐺+1 𝐺 updated with value equal to that of the fittest individual, otherwise 𝑋𝑏𝑒𝑠𝑡 = 𝑋𝑏𝑒𝑠𝑡 . 𝐺𝑒𝑛 If current value of iteration parameter iter reaches NGen, then 𝑋𝑏𝑒𝑠𝑡 is considered as the optimal solution obtained to be used as an initial codebook for the LBG algorithm, otherwise iter = iter + 1 and the process is repeated again from step 4. 𝐺𝑒𝑛 Global best candidate solution 𝑋𝑏𝑒𝑠𝑡 obtained from IDE is used as an initial codebook for LBG Algorithm where each Code-word essentially represents the centroid point of current Code-word set. The LBG Algorithm is then applied whose steps are provided in detail in the previous section (Section 2). 4. Experimental Results In this section, we performed computational experiments and compared the results to show the efficacy of our newly propounded IDE-LBG approach for VQ for Image Compression. All the simulations are carried out in MATLAB 2013a in a workstation with Intel Core i3 2.9 GHz processor. Five tested 512 × 512 grayscale images, namely, ‘‘LENA’’, ‘‘PEPPER’’, ‘‘BABOON’’, ‘‘GOLDHILL’’ and ‘‘LAKE’’, were selected to be used as training images to train different size of Codebooks and as the basis of comparison of proffered IDE-LBG with other algorithms. The selected images are compressed with IDE-LBG, IPSO-LBG, BA-LBG and FA-LBG and the results are compared. The testing image which is to be compressed is subdivided into non-overlapping image blocks of size 4 × 4 pixels. Each subdivided image block is a training vector of (4 x 4) 16 dimensions. The training vectors to be 512 encoded are ( 2 × 512 2 ) 16384 in number. The subdivided image blocks are sorted by the total pixels of each image block and are grouped by the codebook size. Six different codebook sizes are used for comparison with values 8, 16, 32, 64, 128, 256. The values considered are: ε = 0.001, NP = 20, are NGen = 10, for the training process. The members of the initial population of IDE is chosen at random from each group. Eventually, the best solution (Codebook) obtained by the IDE is used as the initial Codebook for the LBG algorithm-the problem of LBG with random initialization as mentioned before is overcome. We have considered bitrate per pixel (bpp) to evaluate the data size of the compressed image for different codebook sizes and the Peak Signal to Noise Ratio (PSNR) values are calculated for individual codebook sizes. Then the plots of PSNR values versus corresponding bpp values give a clear picture of the quality of reconstructed images with different algorithms considered, thus giving an idea about the effectiveness of the proposed IDE-LBG Algorithm. 𝑏𝑝𝑝 = log2 𝑁𝑐 𝑘 (11) where Nc is the size of the Codebook and k is the size of the non-overlapping image block. The total number of runs considered is 10. Table 1 shows the average PSNR values in ten runs (averaged) obtained by the IDE-LBG, IPSO-LBG, BA-LBG, and FA-LBG algorithms for different codebook sizes (Nc = 8, 16, 32, 64, 128 and 256). Horng et al. [18] simulated five different algorithms in C++6.0, with population size = 100 and number of iterations = 100. PSNR values obtained by different algorithms are also reported in the same paper, but since the platform and the value of parameters, namely, the iteration number and the population size is different, there will be some dissimilarity in the final results obtained for PSNR values of FA-LBG in this paper with that obtained in [17]. The results from the Table 1 (plots are in Fig. 3) confirmed that the fitness (PSNR) of the five test images using the IDE-LBG algorithm is higher than the IPSO-LBG, BA-LBG, and FA-LBG algorithm, yet the difference in PSNR values of IDE-LBG and IPSO-LBG is not very distinct for most of Codebook sizes for various images. Five reconstructed images of Codebook size 128 and block size 16 are also displayed in Fig. 2. It is clearly visible that the reconstructed image quality obtained using the IDE-LBG algorithm has the edge over the IPSO-LBG, BA-LBG and FA-LBG algorithms. Table 1. PSNR values of image compression for 5 different 512 x 512 images with 6 different Codebook sizes. Nc 8 16 32 64 128 256 Method IDE-LBG IPSO-LBG BA-LBG FA-LBG IDE-LBG IPSO-LBG BA-LBG FA-LBG IDE-LBG IPSO-LBG BA-LBG FA-LBG IDE-LBG IPSO-LBG BA-LBG FA-LBG IDE-LBG IPSO-LBG BA-LBG FA-LBG IDE-LBG IPSO-LBG BA-LBG FA-LBG (a)LENA Lena 25.82 25.75 24.20 24.01 27.19 27.03 25.67 25.42 28.50 28.38 25.89 25.73 29.39 29.32 26.47 26.22 30.45 30.45 28.23 27.75 31.47 31.46 28.94 28.49 (b)BABOON Baboon 20.89 20.33 19.19 19.17 21.11 21.02 20.17 20.14 21.28 21.23 20.24 20.26 22.84 22.72 21.86 21.74 24.09 24.02 22.43 22.21 24.75 24.66 22.92 22.58 (c)GOLDHILL Goldhill 26.97 26.12 25.01 24.38 27.32 27.11 26.23 25.89 28.83 28.14 26.39 26.36 28.62 28.44 27.26 27.24 29.92 29.80 28.30 28.18 30.63 30.62 29.19 28.93 Pepper 25.79 25.78 24.72 24.64 26.51 26.40 25.95 25.31 27.61 27.23 26.58 26.53 29.25 28.95 28.69 28.21 30.84 30.61 29.90 29.71 31.66 31.62 30.54 30.44 (d)PEPPERS Barbara 25.32 25.27 24.35 23.58 26.03 25.96 24.88 24.49 27.58 27.55 26.38 26.36 28.18 28.07 27.98 27.85 29.94 29.92 29.01 28.98 30.48 30.41 29.34 29.23 (e)BARBARA Fig1. The five testing Images of size 512 x 512. (a)LENA reconstructed (b)BABOON reconstructed (c)GOLDHILL reconstructed (d)PEPPERS reconstructed (e)BARBARA reconstructed Fig2. The five reconstructed Images of Codebook size 128 and Block size 16. IDE-LBG IPSO-LBG IDE-LBG IPSO-LBG BA-LBG FA-LBG BA-LBG FA-LBG IDE-LBG IPSO-LBG BA-LBG FA-LBG 30.38 24.17 31 29.38 30 PSNR in db PSNR in db 28 27 PSNR in db 23.17 29 22.17 21.17 28.38 27.38 26.38 26 20.17 25.38 25 24 19.17 0.1875 0.25 0.3125 0.375 0.4375 0.5 Bitrate (a)PSNR of LENA IDE-LBG IPSO-LBG 24.38 0.1875 0.25 0.3125 0.375 0.4375 0.5 Bitrate 0.1875 0.25 0.3125 0.375 0.4375 0.5 Bitrate (b)PSNR of BABOON BA-LBG FA-LBG (c)PSNR of GOLDHILL IDE-LBG IPSO-LBG BA-LBG FA-LBG 31.6 29.57 30.6 28.57 PSNR in dB PSNR in db 29.6 28.6 27.6 26.6 27.57 26.57 25.57 24.57 25.6 24.6 23.57 0.1875 0.25 0.3125 0.375 Bitrate (d)PSNR of PEPPERS 0.4375 0.5 0.1875 0.25 0.3125 0.375 Bitrate (e)PSNR of BARBARA Fig 3. Average PSNR of six VQ methods for 5 test images of size 512 x 512 0.4375 0.5 5. Conclusion In this study, an Improved Differential Evolution (IDE) Algorithm based codebook training has been presented for Image Compression. The Peak signal to noise ratio (PSNR) of vector quantization is optimized by using IDE-LBG Algorithm where PSNR is considered as the fitness function for the optimization problem. The algorithm parameters have been tuned suitably for efficient codebook design. The proposed IDE-LBG Algorithm is tested on five standard 512 x 512 grayscale images. Results reveal the potency of the proposed algorithm when compared to IPSO-LBG, BALBG and FA-LBG Algorithms. It is observed that using the proposed IDE-LBG Algorithm the PSNR values and the quality of reconstructed image obtained are much better than that obtained from the other algorithms in comparison for six different Codebook sizes. References [1] R.M. Gray, Vector quantization, IEEE Signal Process. Mag. 1 (2) (1984) 4–29. [2] D. Ailing, C. Guo, An adaptive vector quantization approach for image segmentation based on SOM network, Neurocomputing 149 (2015) 48–58. [3] H.B. Kekre, Speaker recognition using vector quantization by MFCC and KMCG clustering algorithm, in: IEEE International Conferences on Communication, Information & Computing Technology (ICCICT), IEEE, Mumbai, 2012, pp. 1–5. [4] C.W. Tsai, C.Y. Lee, M.C. Chiang, C.S. Yang, A fast VQ codebook generation algorithm via pattern reduction, Pattern Recognit. Lett. 30 (2009) 653–660. [5] S.K. Frank, R.E. Aaron, J. Hwang, R.R. Lawrence, Report: a vector quantization approach to speaker recognition, AT&T Tech. J. 66 (2) (2014) 14–16. [6] C.H. Chan, M.A. Tahir, J. Kittler, M. Pietikäinen, Multiscale local phase quantization for robust component-based face recognition using kernel fusion of multiple descriptors, IEEE Trans. Pattern Anal. Mach. Intell. 35 (5) (2013) 1164–1177. [7] G.E. Tsekouras, D. Darzentas, I. Drakoulaki, A.D. Niros, Fast fuzzy vector quantization, in: IEEE International Conference on Fuzzy Systems (FUZZ), IEEE, Barcelona, 2010, pp. 1–8. [8] Y. Linde, A. Buzo, R.M. Gray, An algorithm for vector quantizer design, IEEE Trans. Commun. 28 (1) (1980) 702–710. [9] G.E. Tsekouras, D.M. Tsolakis, Fuzzy clustering-based vector quantization for image compression, in: A. Chatterjee, P. Siarry (Eds.), Computational Intelligence in Image Processing, Springer Berlin, Heidelberg, 2012, pp. 93–105. [10] G. Patane, M. Russo, The enhanced LBG algorithm, Neural Netw. 14 (2002) 1219–1237. [11] A. Rajpoot, A. Hussain, K. Saleem, Q. Qureshi, A novel image coding algorithm using ant colony system vector quantization, in: International Workshop on Systems, Signals and Image Processing, Poznan, Poland, 2004, pp. 13–15. [12] C.W. Tsaia, S.P. Tsengb, C.S. Yangc, M.C. Chiangb, PREACO: a fast ant colony optimization for codebook generation, Appl. Soft Comput. 13 (2013) 3008–3020. [13] M. Kumar, R. Kapoor, T. Goel, Vector quantization based on self-adaptive particle swarm optimization, Int. J. Nonlinear Sci. 9 (3) (2010) 311–319. [14] H.M. Feng, C.Y. Chen, F. Ye, Evolutionary fuzzy particle swarm optimization vector quantization learning scheme in image compression, Expert Syst. Appl. 32 (2007) 213–222. [15] Y. Wang, X.Y. Feng, X.Y. Huang, D.B. Pu, W.G. Zhou, Y.C. Liang, et al., A novel quantum swarm evolutionary algorithm and its applications, Neurocomputing 70 (2007) 633–640. [16] S. Yang, R. Wu, M. Wang, L. Jiao, Evolutionary clustering based vector quantization and SPIHT coding for image compression, Pattern Recognit. Lett. 31 (2010) 1773–1780. [17] M.H. Horng, Vector quantization using the firefly algorithm for image compression, Expert Syst. Appl. 39 (1) (2012) 1078–1091. [18] M.H. Horng, T.W. Jiang, Image vector quantization algorithm via honey bee mating optimization, Expert Syst. Appl. 38 (3) (2011) 1382–1392. [19] P.K. Tripathy, R.K. Dash, C.R. Tripathy, A dynamic programming approach for layout optimization of interconnection networks, Eng. Sci. Technol. 18 (2015) 374–384. [20] D. Tsolakis, G.E. Tsekouras, A.D. Niros, A. Rigos, On the systematic development of fast fuzzy vector quantization for gray scale image compression, Neural Netw. 36 (2012) 83–96. [21] G.E. Tsekouras, A fuzzy vector quantization approach to image compression, Appl. Math. Comput. 167 (1) (2005) 539–5605. [22] Ping-Yi C, Tsai JT, Chou JH, Ho WH, Shi HY, Chen SH. Improved PSO-LBG to design VQ codebook. InSICE Annual Conference (SICE), 2013 Proceedings of 2013 Sep 14 (pp. 876-879). IEEE. [23] S.M. Hosseini, A. Naghsh-Nilchi, Medical ultrasound image compression using contextual vector quantization, Comput. Biol. Med. 42 (2012) 743–750. [24] B. Huanga, Y. Wanga, J. Chen, ECG compression using the context modeling arithmetic coding with dynamic learning vector–scalar quantization, Biomed. Signal Process. Control 8 (2013) 59–65. [25] Chiranjeevi Karri, Umaranjan Jena, Fast vector quantization using a Bat algorithm for image compression, In Engineering Science and Technology, an International Journal, Volume 19, Issue 2, 2016, Pages 769781, ISSN 2215-0986, https://doi.org/10.1016/j.jestch.2015.11.003. [26] S.-J. Wu and P.-T. Chow, Genetic algorithms for nonlinear mixed discrete-integer optimization problems via meta-genetic parameter optimization, Engineering Optimization, vol. 24, no. 2, pp. 137–159, 1995. [27] R. Eberhart and J. Kennedy, A new optimizer using particle swarm theory, in Proceedings of the 6th International Symposium on Micro Machine and Human Science (MHS ’95), pp. 39– 43, IEEE, Nagoya, Japan, October 1995. [28] Rashedi, E., Nezamabadi-pour, H., Saryazdi, S., GSA: A Gravitational Search Algorithm 179(13), 2232– 2248 (2009). [29] M. Dorigo and G. D. Caro, Ant algorithms for discrete optimization, Artificial Life, vol. 5, no. 3, (1999), pp. 137-172. [30] M. Dorigo and L. M. Gambardella, Ant colony system: a cooperative learning approach to the traveling salesman problem, IEEE Transactions on Evolutionary Computation, vol. 1, no. 1, (1997), pp. 53-66. [31] C. Zhang and H.-P. Wang, Mixed-discrete nonlinear optimization with simulated annealing, Engineering Optimization, vol. 21, no. 4, pp. 277–291, 1993. [32] E. H. L. Aarts, J. H. M. Korst, and P. J. M. van Laarhoven, Simulated annealing, in Local Search in Combinatorial Optimization, pp. 91–120, 1997. [33] Nag S. Adaptive Plant Propagation Algorithm for Solving Economic Load Dispatch Problem. arXiv preprint arXiv:1708.07040. 2017 Aug 4. [34] Nag S. A Type II Fuzzy Entropy Based Multi-Level Image Thresholding Using Adaptive Plant Propagation Algorithm. arXiv preprint arXiv:1708.09461. 2017 Aug 23. [35] JC Bansal, H Sharma and SS Jadon, Artificial bee colony algorithm: a survey. Int. J. of Advanced Intelligence Paradigms 5.1 (2013): 123-159. [36] X.S. Yang, Firefly algorithms for multimodal optimization, LNCS, vol. 5792, pp. 169–178. Springer, Heidelberg (2009). [37] Storn, R., Price, K., Differential evolution-a simple and efficient heuristic for global optimization over continuous spaces. Journal of Global Optimization 11, 341–359 (1997).
9cs.NE
A large neighbourhood based heuristic for two-echelon routing problems arXiv:1505.08003v2 [cs.DS] 4 Oct 2016 Ulrich Breunig Department of Business Administration University of Vienna, Austria [email protected] Verena Schmid Christian Doppler Laboratory for Effcient Intermodal Transport Operations University of Vienna, Austria [email protected] Richard F. Hartl Department of Business Administration University of Vienna, Austria [email protected] Thibaut Vidal Departemento de Informtica Pontifcia Universidade Catlica do Rio de Janeiro, Brazil [email protected] October 5, 2016 Abstract In this paper, we address two optimisation problems arising in the context of city logistics and two-level transportation systems. The two-echelon vehicle routing problem and the two-echelon location routing problem seek to produce vehicle itineraries to deliver goods to customers, with transits through intermediate facilities. To efficiently solve these problems, we propose a hybrid metaheuristic which combines enumerative local searches with destroy-and-repair principles, as well as some tailored operators to optimise the selections of intermediate facilities. We conduct extensive computational experiments to investigate the contribution of these operators to the search performance, and measure the performance of the method on both problem classes. The proposed algorithm finds the current best known solutions, or better ones, for 95% of the twoechelon vehicle routing problem benchmark instances. Overall, for both problems, it achieves high-quality solutions within short computing times. Finally, for future reference, we resolve inconsistencies between different versions of benchmark instances, document their differences, and provide them all online in a unified format. 1 Introduction The traffic of vehicles is a major nuisance in densely populated areas. Trucks disturb peoples’ well-being by emitting noise and air pollution. As the amount of goods in transit increases, a proper planning of road networks and facility locations becomes critical to mitigate congestion. To face these challenges, algorithmic tools have been developed to optimise city logistics at several levels: considering traffic regulation, itineraries and network design choices. Boosting the efficiency of goods transportation from suppliers to customers 1 presents important challenges for different planning horizons. On the operational level, efficient itineraries must be found for the available vehicles from day to day, e.g., reducing the travelled distance. On a tactical level, the overall fleet size, vehicle dimensions, capacities and characteristics are of interest. Larger trucks are more efficient in terms of cost per shipped quantity, whereas smaller vehicles are more desirable in city centres: they emit less noise, and only need smaller parking spots. Finally, the clever selection of locations for production sites, warehouses, and freight terminals is a typical strategic decision. In this article, we consider the problem of jointly determining good routes to deliver goods to customers, and at which intermediate facilities a switch from larger trucks to smaller city freighters should happen. This problem is challenging, due to the combination of these two families of combinatorial decisions. To address this problem, we propose a simple metaheuristic, which combines local and large neighbourhood search with the ruin and recreate principle. The method is conceptually simple and fast, exploiting a limited subset of neighbourhoods in combination with a simple strategy for closing and opening intermediate facilities. We conduct extensive computational experiments on two-echelon vehicle routing problem (2EVRP) and twoechelon location routing problem with single depot (2ELRPSD) instances to investigate the contribution of these operators, and measure the performance of the method on both problem classes. For the 2EVRP, this algorithm is able to reach or outperform 95% of the best known solutions. In general, for both problems, high-quality solutions are attained in short computing times. As such, this algorithm will serve as a good basis for future developments on more complex and realistic two-tiered delivery problems. The paper is organised as follows. The problems are described in Section 2 and an overview of the related literature is given in Section 3. Mathematical formulations are presented in Section 4. Section 5 describes the proposed algorithm. Section 6 reviews current available benchmark instances and examines the performance of the proposed method. Section 7 concludes. 2 Problem description Vehicle routing problems (VRPs) are a class of combinatorial optimisation problems, which aim to find good itineraries to service a number of customers with a fleet of vehicles. The 2EVRP is a variant of a VRP, which exploits the different advantages of small and large vehicles in an integrated delivery system. The goal is to design an efficient distribution chain, organised in two levels: trucks operate on the first level between a central depot and several selected intermediate distribution facilities, called satellites. The second level also includes the satellites – because both levels are interconnected there – as well as the end-customers. Small city freighters are operated between satellites and customers. The depot supplies sufficient quantities to satisfy all customer demands. The products are directly transferred from trucks to city freighters at satellite locations. These city freighters will perform the deliveries to the final customers. Any shipment or part of shipment has to transit through exactly one satellite, and the final delivery to the customer is done in one block. As such, split deliveries are not allowed for city freighters. The quantity (“demand”) of goods shipped to a satellite is not explicitly given, but evaluated as the sum of all customer demands served with city freighters originating from this satellite. Depending on the second level itineraries, split deliveries can occur on the first level since the total quantity needed at one satellite can exceed the capacity of one truck. Finding good combined decisions for routing and intermediate facility openings is significantly more difficult than in well-studied settings such as the capacitated vehicle routing problem (CVRP). The special case of a 2EVRP with only one satellite can be seen as a VRP (Cuda et al., 2015; Perboli et al., 2011). The first level of the 2EVRP reduces to a CVRP with split deliveries. The structure of the second level is a multi-depot vehicle routing problem (MDVRP), where the depots correspond to the satellite locations (Jepsen et al., 2012). Those two levels have to be synchronised with each other. The 2EVRP is a generalisation of the classical VRP and is thus NP-hard. Figure 1 shows different set-ups for goods distribution. The depot is represented by a triangle, satellites by squares, and customers by circles. Figures 1a and 1b show graphical representations of a split delivery vehicle routing problem (SDVRP) and a MDVRP respectively. Figures 1c–1e represent feasible solutions for the 2EVRP: with split deliveries occurring at one of the satellites, without split deliveries, and in Figure 1e a solution where only a subset of satellites is used. The proposed algorithm has primarily been designed for the 2EVRP, and then tested on the 2ELRPSD, which includes additional tactical decisions. The basic structure of the 2ELRPSD is very similar to the 2EVRP. 2 (a) SDVRP / first level of 2EVRP (c) 2EVRP I (b) MDVRP / second level of 2EVRP (d) 2EVRP II (e) 2EVRP III Figure 1: Subproblems related to the 2EVRP and different solutions depending on which intermediate facilities are used The main difference is that it corresponds to a more tactical planning since only potential locations for depots or satellites are known and the use of any location results in opening costs. In contrast with the 2EVRP, the fleet size is unbounded, but fixed costs are counted for the use of each vehicle. The classical benchmark sets from the literature include different costs per mile for large first level trucks and small city freighters, unlike in 2EVRP benchmark instances, where mileage costs are identical for all vehicles. Finally, split deliveries are not allowed at both levels. We thus applied our algorithm to 2ELRPSD instances, where location decisions have to be taken at the secondary facilities. Following the notations of Boccia et al. (2011) we focus on 3/T /T problems. 3 Literature Review Jacobsen and Madsen (1980) were amongst the first to introduce a two-echelon distribution optimisation problem. They proposed a three stage heuristic to solve the daily distribution of newspapers in Denmark, but no mathematical model was designed. Several possible transfer points were considered to transfer newspapers from one vehicle to another. The solution to this problem consists of three layers of decisions: the number and location of transfer points, the tours from the printing office and the tours from the transfer points to the retailers. An improved solution algorithm for the same problem can be found in Madsen (1983). Following the nomenclature of the authors and the classification in the recent survey on two-echelon routing problems by Cuda et al. (2015), the problem includes location decisions. Nevertheless, from today’s point of view, it cannot be categorised as a two-echelon location routing problem (2ELRP) as there are no opening costs associated with the use of intermediate facilities and retailers can also be served directly from the printing office without using intermediate nodes. In addition, the problem cannot be categorised as a 2EVRP since first-level split deliveries are not allowed. Two-echelon vehicle routing problem Crainic et al. (2004) used data from Rome to study an integrated urban freight management system. As large trucks cannot pass through the narrow streets in the city centre, 3 they used intermediate facilities to redistribute loads from large trucks to smaller vehicles. The city was divided into several commercial and external zones, and a mathematical location-allocation formulation was proposed and solved using a commercial solver. A comparison between solutions for delivering goods lead to the conclusion that intermediate facilities reduce the use of large trucks significantly, and more work is done by smaller city freighters. Crainic et al. (2009) formulated a time dependent version of the problem, including time windows at the customers. To our knowledge, there are no test instances or solution approaches for this variant so far. Crainic et al. (2010) studied the impact of different two-tiered transportation set-ups on total cost. According to their results, the 2EVRP can yield better solutions than the VRP if the depot is not located within the customer area but externally. Perboli et al. (2011) introduced a flow-based mathematical formulation and generated three sets of instances for the 2EVRP with a maximum of 50 customers and four satellites, based on VRP instances. Their branch-and-cut approach is able to solve instances with up to 21 customers to optimality. Perboli and Tadei (2010) solved additional instances and reduced the optimality gap on others by means of new cutting rules. Crainic et al. (2011) solved the 2EVRP with a multi-start heuristic. The method first assigns customers to satellites heuristically, and then solves the remaining VRPs with an exact method. In a perturbation step, the assignment of customers to satellites is changed, then the problem is solved again, until a number of iterations is reached. Jepsen et al. (2012) presented a branch-and-cut method, solving 47 out of 93 test instances to optimality, 34 of them for the first time. The authors have been the first to consider a constraint on the number of vehicles per satellite, although it was already specified before in the existing data set. This additional constraint had not been taken into account by previous publications. Hemmelmayr et al. (2012) developed a metaheuristic based on adaptive large neighbourhood search (ALNS) with a variety of twelve destroy and repair operators. This approach tends to privilege accuracy (high quality solutions) over simplicity and flexibility (Cordeau et al., 2002). The authors also introduced new larger test instances with up to 200 customers and five to ten satellites. Note that the results of ALNS on the problem instances with 50 customers cannot be compared with the proven optimal solutions by Jepsen et al. (2012), since the algorithm does not consider a limit on the number of vehicles per satellite, but rather a constraint on the total number of vehicles. For most problem instances, this algorithm found the current best known solution or improved it. Santos et al. (2014) implemented a branch-and-cut-and-price algorithm, which relies on a reformulation of the problem to overcome symmetry issues. They also introduced several classes of valid inequalities. The algorithm performs well in comparison to other exact methods, and they reported solutions for instances with up to 50 customers. Baldacci et al. (2013) presented a promising exact method to solve the 2EVRP. They decomposed the problem into a limited set of MDVRPs with side constraints. Detailed results and comparisons with previous publications were provided, as they considered both variants on the instances with 50 customers: with and without the constraint on vehicles per satellite. They also introduced a new set of instances with up to 100 customers. Recently Zeng et al. (2014) published a greedy randomized adaptive search procedure, combined with a route-first cluster-second splitting algorithm and a variable neighbourhood descent. They also provide a mathematical formulation. They provide quite good results, although unfortunately their algorithm was tested only with instances comprising up to 50 customers. Two-echelon location routing problem The capacitated 2ELRP is by far the most studied version of the 2ELRP. Many papers consider location decisions only at the second stage, either because the use of depots is an outcome of the first level routing optimisation, or they consider problems with only one single depot location which is known a priori (2ELRPSD). Laporte (1988) presented a general analysis of location routing problems and multi-layered problem variants. They compared several mathematical formulations and their computational performance. In a slightly different context, Laporte and Nobert (1988) formulated a vehicle flow model for the 2ELRP. The locations of the depots are assumed to be fixed and unchangeable, such that the location decisions only occur for the satellites. Following the notation by Boccia et al. (2011) they analysed 3/R/R, 3/R/T , 3/T /R, and 3/T /T problem settings. 4 Boccia et al. (2011) provided three mathematical formulations for the 2ELRP using one-, two-, and three indexed variables inspired from VRP and MDVRP formulations. A commercial solver was used to solve some instances generated by the authors, comparing two of the formulations in terms of speed and quality. Nguyen et al. (2012a) introduced two new sets of instances for the 2ELRPSD. They implemented a GRASP with path relinking and a learning process and provided detailed results. In Nguyen et al. (2012b) the authors improved their findings on the same instances by using a multi-start iterated local search. Contardo et al. (2012) proposed a branch-and-cut algorithm, which is based on a two-indexed vehicle flow formulation, as well as an ALNS heuristic. Both solution approaches were applied to one set of 2ELRP instances, and two sets of 2ELRPSD instances, outperforming previous heuristics. Schwengerer et al. (2012) extended a variable neighbourhood search (VNS) solution approach for the location routing problem from Pirkwieser and Raidl (2010) and applied it to several instance sets, including the two aforementioned ones with a single depot. For further details on both problem classes, we refer to the recent survey by Cuda et al. (2015). The previous literature review shows that, on the side of exact methods, the best approaches still cannot consistently solve (in practicable time) 2EVRP instances with more than 50 customers to optimality. On the side of heuristics, only few methods have been designed and tested to deal with instances with more than 50 delivery locations. To the best of our knowledge, only one heuristic has reported, to this date, computational results on larger 2EVRP instances (Hemmelmayr et al., 2012). Hence, there is a need for a more fine-grained study of solution methods for larger problems, as well as for simpler approaches able to efficiently deal with the two families of decisions related to routing and intermediate facilities selection. The proposed method has been designed to cope with these challenges. We developed a technique which performs very well on the classic benchmark instances and, in the meantime, uses fewer and simpler neighbourhood structures than previously published algorithms. During our research, we finally found inconsistencies regarding different benchmark instances used in previous papers. Some slightly different instances have also been referenced with the same name. Thus we collected the different versions and make them available online with unique names in a uniform file format, as described in Section 6.1. 4 Mathematical model Different mathematical formulations have been proposed for the 2EVRP (Perboli et al., 2011; Jepsen et al., 2012; Baldacci et al., 2013; Santos et al., 2013, 2014) and for the 2ELRP (Boccia et al., 2011; Contardo et al., 2012). In this section, we display compact formulations based on the model of Cuda et al. (2015). The 2EVRP can be defined on a weighted undirected graph G = (N, E), where the set of vertices N consists of the depot {0}, the set of possible satellite locations S = {1, . . . , |S|} and the set of customers C = {|S| + 1, . . . , |S| + |C|}. The set of edges E is divided into two subsets, representing the first and second echelon respectively. Set E 1 = {(i, j) : i < j, i, j ∈ {0} ∪ S} represents the edges which can be traversed by first-level vehicles: those connecting the depot to the satellites, and those interconnecting satellites with each other. The set of edges E 2 = {(i, j) : i < j, i, j ∈ S ∪ C, (i, j) ∈ / S × S} is used for the second level, and corresponds to possible trips between satellite and customers or pairs of customers. A fleet of v 1 homogeneous trucks with capacity Q1 is located at the depot. A total of v 2 homogeneous city freighters are available, each with a given capacity of Q2 . They can be located at any satellite s ∈ S. Still, the number of city freighters at one satellite is limited to vs2 . The set R1 contains all possible routes starting from the depot and delivering a given sequence of customers, then returning to the depot again. Similarly each route r in the set of secondary routes R2 starts at a satellite s ∈ S, visits one or several customers in C, and returns again to satellite s. Each customer c ∈ C has a demand of dc units. Each unit of freight shipped through a satellite induces a handling cost hs . Given a secondary route r ∈ R2 and a customer c ∈ C, the parameter βrc ∈ {0, 1} is equal to 1 if and P only if customer c is visited in route r, and 0 otherwise. Let dr = c∈C:c∈r dc ≤ Q2 denote the total demand of customers visited in route r, and pr represents the cost of each route r ∈ R1 ∪ R2 . The binary variables xr ∈ {0, 1} with r ∈ R1 ∪ R2 take the value 1 if and only if route r is in the solution. Finally, each decision variable qrs ≥ 0 with r ∈ R1 , s ∈ S ∩ r, gives the load on the truck on route r that has to be delivered to satellite s. 5 X min p r xr + r∈R1 ∪R2 X s∈S hs X qrs (1) r∈R1 s.t. X xr ≤ v 1 (2) xr ≤ v 2 (3) r∈R1 X r∈R2 X xr ≤ vs2 s∈S (4) r ∈ R1 (5) s∈S (6) c∈C (7) r ∈ R1 ∪ R2 (8) r∈R2 :s∈r X qrs ≤ Q1 xr s∈S∩r X dr xr r∈R2 :s∈r r∈R1 X X qrs = βrc xr = 1 r∈R2 xr ∈ {0, 1} 1 qrs ≥ 0 r ∈ R ,s ∈ S ∩ r (9) The objective function (1) sums up routing costs for all routes on both levels and handling costs per unit moved through each satellite. Constraints (2) and (3) set the number of available vehicles for trucks and city freighters, respectively. The number of city freighters per satellite is constrained by Constraint (4). Constraints (5) ensure that the maximum capacity of the trucks is not exceeded. Constraints (6) link the quantities of goods between the first and the second level. They guarantee that the incoming goods equal the outgoing goods at the satellites. As there are no split deliveries allowed on the second level, Constraints (7) ensure that each customer is visited exactly once. The domains of the decision variables are defined by Constraints (8) and (9). The mathematical model for the 2ELRPSD is similar to the previous model, but needs some adjustments. Each satellite s ∈ S has a given opening cost fs and a capacity of ks units of freight. There is an unbounded number of vehicles available at both levels. Therefore, Constraints (2) to (4) are not needed. The routing of a vehicle incurs fixed costs of f 1 for each truck, and f 2 for each used city freighter. Each binary parameter αrs is equal to 1 if and only if satellite s is visited on route r, and 0 otherwise. If satellite s is opened in the solution, binary variable ys takes value 1, and 0 otherwise. P 1 P Using2 ConstraintsP(5) to (9), the objective function needs to be changed to min r∈R1 (f + pr )xr + r∈R2 (f + pr )xr + s∈S fs ys to consider fixed and mileage-based vehicle costs for both P levels separately, as well as opening costs for satellites. The capacity limit at the satellites is imposed by r∈R1 qrs ≤ ks ys for all s ∈ S. If a satellite s has been selected to be open, then the delivery by exactly one truck is guaranteed by P Constraints r∈R1 αrs xr = ys for all s ∈ S. 5 Solution method The proposed metaheuristic follows the basic structure of a large neighbourhood search (LNS), which was first introduced by Shaw (1998). An initial feasible solution is iteratively destroyed and repaired in order to gradually improve the solution. Such a ruin and recreate approach (Schrimpf et al., 2000) has been successfully applied to multiple variants of vehicle routing problems in the past (see, e.g., Pisinger and Ropke 2010). The destruction of parts of a previous solution (ruin) gives freedom to create a new and better solution (recreate). Algorithm 1 shows the basic structure of the proposed method. At each iteration of the proposed method, 1) a partial solution destruction is performed on the routes of the second level; 2) then the second level is repaired and improved by means of local search, and finally 3) the 6 Algorithm 1: LNS-2E 1 2 3 4 5 6 7 S best ← S ← localSearch(repair(instance)) g←0 repeat for i ← 0 to imax do S temp ← localSearch(repair(destroy(S, g))) if Satellite was opened/closed during previous destroy phase then g←0 10 11 g ←g+1 9 12 13 14 15 16 17 /* reset grace period */ temp if cost(S ) < cost(S) then S ← S temp i←0 8 /* initial solution */ /* accept better solution */ /* reset re-start period */ if cost(S) < cost(S best ) then S best ← S /* store best solution */ else S ← localSearch(repair(instance)) /* re-start: new solution */ until time > timemax return S best first level is reconstructed with a simple heuristic. As such, the first level is constructed from scratch in every iteration, but since the number of nodes in the first-level sub-problem is relatively small, this simple heuristic already finds an optimal or near-optimal solution. Each of the destroy phases performs all the destroy operators sequentially as they are described in Section 5.1. One single repair mechanism is used for solution reconstruction and also to obtain an initial solution (Line 1 and 5). This procedure is described in Section 5.2. Afterwards, as needed quantities at the satellites are known, the first level is reconstructed as described in Section 5.3. The choices of intermediate facilities may change as a consequence of the repair operator, or through dedicated destroy operators which temporarily close or re-open some possible locations for intermediate facilities. If a change in open or closed satellites has recently taken place, the status of another satellite will not be changed (Line 5) for a number of iterations that we call grace period (g is reset to 0 in Line 7). We then put emphasis on a strong local search phase, exploiting well-known procedures like 2-opt (Croes, 1958), 2-opt*, or simple relocate and swap moves. Relocate shifts a node before or after one of the closest neighbours, if costs are improved. Swap explores the exchange of one node with one of the neighbour nodes, as well as exchanging one node with two successive neighbour nodes. This local search phase is applied after the destroy and repair operators. In order to reduce the complexity, moves are only attempted between close customers, as done in the granular search by Toth and Vigo (2003). Further information on these moves can be found in the survey by Vidal et al. (2013). If a better solution is obtained, it is accepted as the new incumbent solution (Line 9). If no improvement can be found for a large number of iterations, then the algorithm will restart from a new initial solution, even if the objective value is worse (Line 15). In general, our algorithm requires less local and large neighbourhood operators than the ALNS proposed by Hemmelmayr et al. (2012). The destruction operator parameters are also selected randomly, since the method performed equally well, during our computational experiments, without need for a more advanced adaptive scoring system. In the following, we describe the sets of destroy and repair operators, as well as the management of the decisions related to the first level. 7 5.1 Destroy operators Our algorithm relies on different destroy operators which are all invoked at each iteration in sequential order. They are applied only to the second level. All of them, except the open all satellites neighbourhood, select nodes which are removed from the current solution. The first four destroy operators are used at each iteration. The last two ones, which change the status of a satellite to closed or open again, are only invoked if g in Line 5 of Algorithm 1 has exceeded the grace period gmax (i.e. no change in open/closed satellites has taken place recently). The destroy operators are now described, in their order of use. When applicable, all random samples are uniformly distributed within their given interval. Related node removal A seed customer is randomly chosen. A random number of its Euclidean closest customers as well as the seed customer are removed from the current solution and added to the list of nodes to re-insert. This operator receives a parameter p1 , which denotes the maximum percentage of nodes to remove. At most dp1 · |C|e nodes are removed, with |C| being the overall number of customers. Biased node removal First, the removal cost of each customer is computed: the savings associated to a removal of node j, located between i and k, is given by δj = cik − cij − cjk , where cij denotes the travel cost from node i to node j. The probability of selection of a node for removal is then linearly correlated with the delta evaluation value. The higher the gain after removal, the more likely it will be selected and removed. In every destroy phase, a random percentage of customers from the interval [0, p2 ] is removed. Random route removal Randomly selects routes and removes all containing customers, adding them to the X dc list of nodes to re-insert. This operator randomly selects a number of routes in the interval [0, dp3 · e]. Q2 c∈C Remove single node routes This operator removes all routes which contain only one single customer. In the case of the 2EVRP there is a limited number of overall vehicles available, and thus removing the short routes allows to use a vehicle originating from a different satellite in the next repair phase. This operator is used with a probability of p̂4 . The last two destroy operators can be used at most at each gmax iterations. During this grace period after satellite selection has been actively altered, none of these two operators will be executed. Close satellite Chooses a random satellite. If the satellite can be closed and the remaining open ones still can provide sufficient capacity for a feasible solution, the chosen satellite is closed temporarily. All the customers, which are assigned to it, are removed and added to the list of nodes to re-insert. The satellite stays closed until it is opened again in a later phase. This operation is chosen with a probability of p̂5 , given variable g has already exceeded the grace period. If this operator has been executed, g is reset to 0. Open all satellites This neighbourhood makes all previously closed satellites available again. It comes into p̂5 effect with a probability |S| , and thus it depends on the same parameter as the close satellite operator and the number of satellites. This operator can only be executed if g > gmax , i.e. outside the grace period. Its execution resets g to 0. 5.2 Repair operator, randomisation and initial solution At each repair phase, the insertion of the nodes is done in random order. This repair mechanism can sometimes fail, if one customer remains with a higher demand than the largest free capacity available on any vehicle. In this exceptional case, the repair process is restarted, and the nodes are inserted by decreasing demands to preserve feasibility. Repair is achieved with a simplified cheapest insertion heuristic. All nodes are sequentially inserted at their cheapest possible position in the solution. The main difference with the classic cheapest insertion heuristic is 8 that the method does not aim to insert the node with the lowest increase in total costs, but just takes the next candidate from the list and inserts it, in order to reduce complexity and enhance solution diversity. It is a simple and greedy heuristic. Both the initial solution and every partial solution are always repaired by the same operator. The initial solution can be seen as a “completely destroyed” solution. After the second level has been repaired, the local search procedure is performed: 2-opt on each of the routes, 2-opt* on all routes originating at the same satellite. The algorithm then tries to relocate single nodes, swap one node with another and to swap two nodes with one other, within a limited neighbourhood of the τ closest nodes, again accepting only improvements. This procedure stops when no improving move exists in the entire neighbourhood. After this procedure, the delivery quantity of each of the satellites is known, and the first level can be constructed using the same insertion heuristic as for the second level and performing local search. 5.3 Reconstruction of the first level For the 2EVRP, it is essential to allow satellites to be delivered by several trucks. In particular, if the demanded quantity at a satellite is larger than a full truckload and no other satellite is available, then there would be no feasible solution. To reconstruct a first level solution, we propose a very simple preprocessing step. Any satellite with a demand larger than a full truckload is virtually duplicated into nodes with demands equal to a truckload, until the remaining demand is smaller than Q1 . The same insertion procedure as the repair operator is used to generate a first level solution. This creates back-and-forth trips to the virtual nodes with demands equal to a full truckload, and completes the solution analogously for the remaining nodes. Usually there are few nodes associated with the SDVRP on the first level. The largest benchmark instances from literature so far contain only ten satellites at most. This very simple policy enabled to find nearly-optimal first level solutions for most considered instances with limited computational effort. Finally, note that in the considered 2ELRPSD instances, the capacity of a satellite is never larger than the trucks’ capacity. Therefore, split deliveries are not generated during reconstruction. 6 Computational Experiments This section describes the currently available sets of instances for the 2EVRP (in Section 6.1) and the used instances for the 2ELRPSD (Section 6.2) and attempts to resolve some inconsistencies. The calibration of the method is described in Section 6.3. The computational results and the comparisons with other state-of-the-art algorithms are discussed in Sections 6.4 and 6.5. Finally, Section 6.6 analyses the sensitivity of the method with respect to several key parameters and design choices. 6.1 Benchmark Instances for the two-echelon vehicle routing problem When looking at the literature, it may appear that there are six unique sets of benchmark instances. However, due to inconsistencies with respect to constraints, nomenclature or locations, we identified in fact several different subsets. In what follows, we explain the differences and provide high quality solutions for them. We consider five different sets of benchmark instances from literature. Sets 2 and 3 were proposed by Perboli et al. (2011) and have been generated based on the instances for the CVRP by Christofides and Eilon. Different customers were chosen and converted into satellites. They also proposed the small Set 1 instances, with just twelve customers and two satellites, which we did not consider. Set 4 was proposed by Crainic et al. (2010); all of them were downloaded from OR-Library (Beasley, 2014). The instance Sets 2 to 5 as used in Hemmelmayr et al. (2012) were also communicated to us by email (Hemmelmayr, 2013). We noticed a few key differences with the ones available from Beasley (2014). Set 6 instances were provided from the authors (Baldacci, 2013). All distances are Euclidean, and computed with double precision. Note that handling costs are set to 0 for all sets except 6b. We will now explain the characteristics of these instance sets in detail, and propose unique names for the sets to overcome existing inconsistencies: 9 Set 2 There are two different versions in circulation: Please note that the instances with 50 customers in the OR-Library contain a mistake1 . This can be resolved by exchanging Q1 and Q2 capacity values, which is also the way we treated them, like previous authors did. The names of the instances downloaded from Beasley (2014) and used by Hemmelmayr et al. (2012) were the same, but the instances with 50 customers included different locations for the satellites. For future reference we provide both versions, and we rename the instances with less than 50 customers to Set 2a, the Hemmelmayr (2013) version of 50 customer Set 2 instance files to Set 2b, and the OR-Library version will be called Set 2c. Table 3 shows the characteristics of all Set 2 instances. Instance names used by Baldacci et al. (2013) have the satellite numbers incremented by one. Apart from that they are identical with what we received from Hemmelmayr (2013). For example Set 2a instance named E-n51-k5-s2-17 (Satellites 2 and 17) corresponds to E-n51-k5-s3-18 in the result tables of Baldacci et al. (2013). We provide both versions (OR-Library with corrected capacities as well as the ones received by Hemmelmayr) with distinguishable names at https://www.univie.ac.at/prolog/research/TwoEVRP. Set 3 There are also two different versions of the Set 3 instances in circulation. We collected and solved all of them and distinguished between different versions and identified inconsistencies. Again, the sources Beasley (2014) and Hemmelmayr (2013) were identical for instances with 21 and 32 customers, but different for instances with 50 customers. In the case of Set 3, the filenames for the different instances were also different, so there is no need to introduce new distinguishable names. The only difference between Set 3 instances with 50 customers from the two sources is the location of the depot. The locations of satellites and customers, as well as the vehicles and demands are identical. All Set 3 instances from Hemmelmayr (2013) place the depot at coordinates (0,0), whereas the files of Beasley (2014) have the depot located at (30,40). Table 13 shows which instances correspond to each other, apart from satellite location. Please also note that like in Set 2, the Set 3 instances with 50 customers from the OR Library also have the capacities of the two vehicle types interchanged (see Footnote 1). This has been corrected in the files which we provide online. For easier referencing, we also divide the instances in three parts. Set 3a includes all instances with less than 50 customers, Set 3b the larger instances which have been used by Hemmelmayr et al. (2012), and Set 3c the larger instances as they are available at the OR-Library, and have been used by Baldacci et al. (2013), among others. Set 4 These instances have been treated differently in literature, either with a limit on the number of second level vehicles allowed per satellite or only considering a total number of vehicles, with no limitations on the distribution amongst satellites. As proposed in Baldacci et al. (2013), we solved both versions and follow their nomenclature: Set 4a with the limit per satellite, and Set 4b when the constraint of vehicles per satellite is relaxed. Set 5 This set of instances has been proposed by Hemmelmayr et al. (2012). To the best of our knowledge they were the only ones to report solutions on all instances of that set. Baldacci et al. (2013) were able to find solutions on the small instances with only five satellites. Set 6 To the best of our knowledge, solutions on these instances have only been reported in Baldacci et al. (2013). Set 6 includes two subsets: Set 6a, with hs = 0, and Set 6b, which considers different handling costs per freight unit at each of the satellites. Table 1 displays an overview of the characteristics of the individual sets. It lists the number of instances in the according set and subset with number of customers (C), satellites (S), trucks (T), city freighters (CF) and available city freighters per satellite vs2 . Column hC shows if the handling costs are non-zero. The source of the instance sets is also provided (Hemmelmayr, 2013; Beasley, 2014; Baldacci, 2013). 1 First level vehicles have a capacity of Q1 = 160 units, and second level vehicles, which by design are supposed to be smaller than level 1 trucks, have a capacity of Q2 = 400 units. For instances with twoP satellites for example, there are 3 trucks available. They can ship a maximum of 3 ∗ 160 = 480 units. Overall customers’ demand c∈C dc is larger than 480 units, so there is per se no feasible solution for those instances. 10 Table 1: Characteristics and Sources of Instance Sets Set Subset Inst. 2 a b c 3 a b c 4 a b 5 6 a b 6.2 C S T hC vs2 HCC OR-Library Baldacci CF 6 6 6 3 6 3 21 32 50 50 50 50 2 2 2 4 2 4 3 3 3 4 3 4 4 4 5 5 5 5 - • • • • 6 6 6 6 21 32 50 50 2 2 2 2 3 3 3 3 4 4 5 5 - • • • 18 18 18 18 18 18 50 50 50 50 50 50 2 3 5 2 3 5 3 3 3 3 3 3 6 6 6 6 6 6 4 3 2 - • • • 6 100 6 200 6 200 5 10 10 5 [15,32] 5 [17,35] 5 [30,63] - • • • 2 3 4 2 3 4 - 9 50 [4,6] 9 75 [4,6] 9 100 [4,6] 9 50 [4,6] 9 75 [4,6] 9 100 [4,6] 50 75 100 50 75 100 • • • • • • • • • • • • • • • • • • • Benchmark Instances for the two-echelon location routing problem The proposed algorithm was originally designed for the 2EVRP, nevertheless we also tested it on benchmark instances for the 2ELRPSD. Two sets, called “Nguyen” and “Prodhon” are available at http://prodhonc. free.fr/Instances/instances0_us.htm. They present some small errors or unclear descriptions, which are documented in Appendix 8.3. 6.3 Parameters The parameters of the proposed method have been calibrated using meta-calibration: the problem of finding good parameters is assimilated to a black-box optimisation problem, in which the method parameters are the decision variables, and the objective function is simulated by running the method on a set of training instances, containing five randomly selected instances, for each set. To perform a fast optimisation we rely on the covariance matrix adaptation evolution strategy (CMA-ES) by Hansen (2006). The source code (in Java) is available at https://www.lri.fr/~hansen/cmaes_inmatlab.html. The performance of our algorithm is rather insensitive to changes in parameters for the small instances, but the rules for closing and opening satellites have to be adjusted to the number of overall available satellites. Our calibration experiments have been conduced for each instance set, independently, and then we searched for one compromise setting for the parameters that yields satisfying results for all different benchmark instances. The calibration results are displayed in Table 2, as well as the average value, standard deviation, and the compromise value which was used for the runs reported in Section 6.4. The size of the limited neighbourhood for the local search relocate and swap moves was also determined by CMA-ES. This parameter always converged to τ = 25 already in early stages of the tuning process, and thus relocate and swap moves are attempted only for nodes within the radius including the 25 Euclidean closest nodes. 11 Table 2: Parameter values obtained by meta-calibration 2EVRP 2ELRPSD Set 2 Set 3 Set 4a Set 4b Set 5 Set 6a Set 6b Nguyen Prodhon Mean Std. Dev. compromise p1 p2 p3 p̂4 p̂5 6.4 0.35 0.18 0.09 0.33 0.06 0.39 0.20 0.07 0.73 0.01 0.32 0.12 0.14 0.19 0.29 0.31 0.07 0.16 0.09 0.24 0.29 0.80 0.14 0.32 0.14 0.33 0.52 0.21 0.21 0.28 0.26 0.78 0.19 0.41 0.26 0.14 0.50 0.28 0.37 0.21 0.34 0.19 0.17 0.57 0.20 0.30 0.37 0.16 0.36 0.19 0.07 0.27 0.06 0.18 0.09 0.20 0.35 0.25 0.50 0.20 Computational Results As done in previous literature, we performed five independent runs on each of the 2EVRP benchmark instances and 20 runs on the 2ELRPSD instances. The code is written in Java with JDK 1.7.0 51 and tested on a Intel E5-2670v2 CPU at 2.5 GHz with 3 GB RAM. The code was executed single threaded on one core. We compare the performance of our method on the 2EVRP instances with the hybrid GRASP +VND by Zeng et al. (2014) and the ALNS by Hemmelmayr et al. (2012), when applicable; as well as the currently best known solutions for each instance from the literature. We also show the results of the algorithm on the 2ELRP with single depot and compare with the VNS of Schwengerer et al. (2012). We describe the data of the following tables in general and discuss results in detail on each of the instance sets separately. Tables 3 to 11 show the characteristics and detailed results for each instance. The columns C, S, T and CF display the main characteristics of the instance, where C is the number of customers, S is the number of satellites, T and CF the number of available trucks and city freighters, respectively. The last two columns are not applicable for Tables 10 to 11, as they correspond to 2ELRPSD instances with unbounded fleet size. The next columns display the results of the proposed method (LNS-2E), and methods by Hemmelmayr et al. (2012) (HCC), Zeng et al. (2014) (ZXXS) for the 2EVRP when applicable, and Schwengerer et al. (2012) (SPR) for the 2ELRPSD. The average objective value of five runs is given in column Avg. 5. Column Best 5 shows the best solution found within these five runs, and Best gives the best objective value found during all experiments, including parameter calibration. Following the work of Schwengerer et al. (2012), we also used average and best of 20 for the 2ELRPSD for better comparison. Column t reports the average overall runtime of the algorithms in seconds, and t* the average time when the best solution was found. For easier comparison we chose a simple time limit for termination of our algorithm: 60 seconds for instances with up to 50 customers, and 900 seconds for larger ones. Our time measure corresponds to the wall-clock time of the whole execution of the program, including input and output, computation of the distance matrix, and other pre-processing tasks. Hemmelmayr et al. (2012) and Schwengerer et al. (2012) report CPU times (which may be slightly smaller than wall clock times). Zeng et al. (2014) only report the time when the best solution was found, but no overall runtime of the algorithm. BKS refers to the best known solution of that instance. Best known solutions are highlighted in boldface when found by the algorithm, and new BKS are also underlined. We highlight an instance with an asterisk after BKS if the best known solution of the instance is known to be optimal from previous literature. Tables 3 and 4 provide detailed results on the instances of Set 2 and Set 3. HCC, ZXXS and our algorithm find the best known solutions at every run. The solutions have been proven to be optimal for all the instances except Set 2c and Set 3b. To the best of our knowledge, we are the first ones to report solutions on the 2c instances obtained from Beasley (2014). For Set 3c, the optimal objective values are derived from Baldacci et al. (2013) and Jepsen et al. (2012), but no results from HCC or ZXXS are available. Summarising Tables 3 and 4, we can conclude that Sets 2 and 3 are easy in the sense that all runs of all algorithms always found the optimal or best known solution. The instances of Set 4 have been addressed in various ways in the literature. Jepsen et al. (2012) considered a limit on the number of city freighters available at each satellite, HCC and ZXXS did not impose this limit, and instead considered the limit on the total number of city freighters only. Baldacci et al. (2013) addressed both variants of the instances to compare their results to both previous results, introducing a new nomenclature: Set 4a for the instances including the limit of vehicles per satellite, and Set 4b when this limit is relaxed. Tables 5 and 6 display the results on Set 4a and 4b instances. 102 out of the 108 instances have been solved to optimality by Baldacci et al. (2013). Nevertheless we observed small differences of objective values with 12 our solutions (up to a 0.006% difference). This could be explained by a different rounding convention (we use double precision), or by the small optimality gap of Cplex. As a consequence, bold fonts were used for BKS within 0.006% precision. In all these cases the underlying solution is identical, just the objective value is marginally different. We can see from Tables 5 and 6 that in all cases our best solution corresponds to the optimal or best known solution. Only in 3 and 2 instances of Set 4a and 4b, respectively, some of the runs gave slightly worse solutions. On average, in instance Set 4b our results are slightly better than those of the other heuristics. To the best of our knowledge, Hemmelmayr et al. (2012) were the only authors who published results on the large Set 5 instances with 10 satellites to this date. Baldacci et al. (2013) report solutions on the small Set 5 instances (100 customers/5 satellites), improving three out of six instances to optimality. The algorithm of Hemmelmayr et al. (2012) was evaluated with a limit of 500 iterations. We compare our results in Table 7 and were able to improve the best known solutions on 9 of the 18 instances, depicted with an underlined BKS value. Known optimal solutions are retrieved at least once within the five performed test runs. Tables 8 and 9 report the results for the instances of Set 6a and b. From the 54 instances, all except 13 solutions have been proven to be optimal, and on nine of those remaining LNS-2E was able to find better solutions. Best solutions were found typically after less than three minutes. Table 3: Results for Set 2 Instances HCC Instance ZXXS LNS-2E C S T CF Avg. 5 t(s) t*(s) Avg. 5 t*(s) Avg. 5 Best 5 Best Set 2a1,2 E-n22-k4-s6-17 E-n22-k4-s8-14 E-n22-k4-s9-19 E-n22-k4-s10-14 E-n22-k4-s11-12 E-n22-k4-s12-16 E-n33-k4-s14-22 E-n33-k4-s1-9 E-n33-k4-s2-13 E-n33-k4-s3-17 E-n33-k4-s4-5 E-n33-k4-s7-25 Avg. 21 21 21 21 21 21 32 32 32 32 32 32 2 2 2 2 2 2 2 2 2 2 2 2 3 3 3 3 3 3 3 3 3 3 3 3 4 4 4 4 4 4 4 4 4 4 4 4 417.07 384.96 470.60 371.50 427.22 392.78 779.05 730.16 714.63 707.48 778.74 756.85 577.59 37 34 35 37 31 36 85 74 64 58 77 53 51 0 0 0 0 0 0 0 0 0 0 3 0 0 417.07 384.96 470.60 371.50 427.22 392.78 730.16 714.63 707.48 778.74 756.85 779.05 577.59 0 0 0 0 0 0 0 0 0 1 0 0 0 417.07 384.96 470.60 371.50 427.22 392.78 779.05 730.16 714.63 707.48 778.74 756.85 577.59 417.07 384.96 470.60 371.50 427.22 392.78 779.05 730.16 714.63 707.48 778.74 756.85 577.59 417.07 384.96 470.60 371.50 427.22 392.78 779.05 730.16 714.63 707.48 778.74 756.85 577.59 60 60 60 60 60 60 60 60 60 60 60 60 60 1 1 1 2 2 1 1 1 1 1 1 1 1 417.07* 384.96* 470.60* 371.50* 427.22* 392.78* 779.05* 730.16* 714.63* 707.48* 778.74* 756.85* 577.59 Set 2b1 E-n51-k5-s11-19 E-n51-k5-s11-19-27-47 E-n51-k5-s2-17 E-n51-k5-s2-4-17-46 E-n51-k5-s27-47 E-n51-k5-s32-37 E-n51-k5-s4-46 E-n51-k5-s6-12 E-n51-k5-s6-12-32-37 Avg. 50 50 50 50 50 50 50 50 50 2 4 2 4 2 2 2 2 4 3 4 3 4 3 3 3 3 4 5 5 5 5 5 5 5 5 5 581.64 527.63 597.49 530.76 538.22 552.28 530.76 554.81 531.92 549.50 182 147 100 154 136 141 173 149 150 148 6 1 7 1 1 1 0 2 0 2 597.49 530.76 554.81 581.64 538.22 552.28 530.76 531.92 527.63 549.50 1 0 1 4 1 1 1 1 1 1 581.64 527.63 597.49 530.76 538.22 552.28 530.76 554.81 531.92 549.50 581.64 527.63 597.49 530.76 538.22 552.28 530.76 554.81 531.92 549.50 581.64 527.63 597.49 530.76 538.22 552.28 530.76 554.81 531.92 549.50 60 60 60 60 60 60 60 60 60 60 1 4 3 3 1 2 3 4 2 2 581.64* 527.63* 597.49* 530.76* 538.22* 552.28* 530.76* 554.81* 531.92* 549.50 Set 2c2 E-n51-k5-s11-19 E-n51-k5-s11-19-27-47 E-n51-k5-s2-17 E-n51-k5-s2-4-17-46 E-n51-k5-s27-47 E-n51-k5-s32-37 E-n51-k5-s4-46 E-n51-k5-s6-12 E-n51-k5-s6-12-32-37 Avg. 50 50 50 50 50 50 50 50 50 2 4 2 4 2 2 2 2 4 3 4 3 4 3 3 3 3 4 5 5 5 5 5 5 5 5 5 617.42 530.76 601.39 601.39 530.76 752.59 702.33 567.42 567.42 607.94 617.42 530.76 601.39 601.39 530.76 752.59 702.33 567.42 567.42 607.94 617.42 530.76 601.39 601.39 530.76 752.59 702.33 567.42 567.42 607.94 60 60 60 60 60 60 60 60 60 60 3 1 3 4 3 5 4 5 6 4 617.42 530.76 601.39 601.39 530.76 752.59 702.33 567.42 567.42 607.94 1 included in Hemmelmayr (2013) 2 included in Beasley (2014) 13 t(s) t*(s) BKS Table 4: Results for Set 3 Instances HCC ZXXS LNS-2E Instance C S T CF Avg. 5 t(s) t*(s) Avg. 5 t*(s) Avg. 5 Best 5 Best Set 3a1,2 E-n22-k4-s13-14 E-n22-k4-s13-16 E-n22-k4-s13-17 E-n22-k4-s14-19 E-n22-k4-s17-19 E-n22-k4-s19-21 E-n33-k4-s16-22 E-n33-k4-s16-24 E-n33-k4-s19-26 E-n33-k4-s22-26 E-n33-k4-s24-28 E-n33-k4-s25-28 Avg. 21 21 21 21 21 21 32 32 32 32 32 32 2 2 2 2 2 2 2 2 2 2 2 2 3 3 3 3 3 3 3 3 3 3 3 3 4 4 4 4 4 4 4 4 4 4 4 4 526.15 521.09 496.38 498.80 512.81 520.42 672.17 666.02 680.36 680.37 670.43 650.58 591.30 43 44 49 43 26 34 76 77 84 77 88 63 59 0 0 0 0 0 0 3 0 0 0 0 0 0 526.15 521.09 496.38 498.80 512.81 520.42 672.17 666.02 680.36 680.37 670.43 650.58 591.30 0 0 0 0 0 0 0 0 0 0 0 0 0 526.15 521.09 496.38 498.80 512.80 520.42 672.17 666.02 680.36 680.36 670.43 650.58 591.30 526.15 521.09 496.38 498.80 512.80 520.42 672.17 666.02 680.36 680.36 670.43 650.58 591.30 526.15 521.09 496.38 498.80 512.80 520.42 672.17 666.02 680.36 680.36 670.43 650.58 591.30 60 60 60 60 60 60 60 60 60 60 60 60 60 2 2 1 1 4 2 4 1 1 1 2 1 2 526.15* 521.09* 496.38* 498.80* 512.80* 520.42* 672.17* 666.02* 680.36* 680.36* 670.43* 650.58* 591.30 Set 3b1 E-n51-k5-s12-18 E-n51-k5-s12-41 E-n51-k5-s12-43 E-n51-k5-s39-41 E-n51-k5-s40-41 E-n51-k5-s40-43 Avg. 50 50 50 50 50 50 2 2 2 2 2 2 3 3 3 3 3 3 5 5 5 5 5 5 690.59 683.05 710.41 728.54 723.75 752.15 714.75 147 133 217 155 154 158 161 4 38 1 18 17 15 16 690.59 683.05 710.41 728.54 723.75 752.15 714.75 1 1 1 4 3 9 3 690.59 683.05 710.41 728.54 723.75 752.15 714.75 690.59 683.05 710.41 728.54 723.75 752.15 714.75 690.59 683.05 710.41 728.54 723.75 752.15 714.75 60 60 60 60 60 60 60 8 11 5 7 5 12 8 690.59 683.05 710.41 728.54 723.75 752.15 714.75 Set 3c2 E-n51-k5-s13-19 E-n51-k5-s13-42 E-n51-k5-s13-44 E-n51-k5-s40-42 E-n51-k5-s41-42 E-n51-k5-s41-44 Avg. 50 50 50 50 50 50 2 2 2 2 2 2 3 3 3 3 3 3 5 5 5 5 5 5 560.73 564.45 564.45 746.31 771.56 802.91 668.40 560.73 564.45 564.45 746.31 771.56 802.91 668.40 560.73 564.45 564.45 746.31 771.56 802.91 668.40 60 60 60 60 60 60 60 10 3 2 5 15 16 9 560.73* 564.45* 564.45* 746.31* 771.56* 802.91* 668.40 1 included in Hemmelmayr (2013) 2 included in Beasley (2014) 14 t(s) t*(s) BKS Table 5: Results for Set 4a Instances (with constraint on the number of city freighters per satellite) LNS-2E Inst. C Set 4a 1 50 2 50 3 50 4 50 5 50 6 50 7 50 8 50 9 50 10 50 11 50 12 50 13 50 14 50 15 50 16 50 17 50 18 50 19 50 20 50 21 50 22 50 23 50 24 50 25 50 26 50 27 50 28 50 29 50 30 50 31 50 32 50 33 50 34 50 35 50 36 50 37 50 38 50 39 50 40 50 41 50 42 50 43 50 44 50 45 50 46 50 47 50 48 50 49 50 50 50 51 50 52 50 53 50 54 50 Avg. S T CF 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 Avg. 5 Best 5 Best 1569.42 1438.32 1570.43 1424.04 2193.52 1279.89 1458.60 1363.76 1450.25 1407.65 2052.21 1209.46 1481.80 1393.64 1489.92 1389.20 2088.48 1227.68 1564.66 1272.98 1577.82 1281.83 1807.35 1282.69 1522.40 1167.47 1481.56 1210.46 1722.06 1211.63 1490.32 1199.05 1508.32 1233.96 1718.42 1228.95 1528.73 1169.20 1520.92 1199.42 1667.96 1194.54 1439.67 1045.14 1451.48 1088.79 1587.29 1082.21 1434.88 1083.16 1398.03 1125.69 1567.79 1127.66 1420.05 1569.42 1438.32 1570.43 1424.04 2193.52 1279.89 1458.60 1363.76 1450.25 1407.65 2047.43 1209.46 1481.80 1393.64 1489.92 1389.20 2088.48 1227.68 1564.66 1272.98 1577.82 1281.83 1807.35 1282.69 1522.40 1167.47 1481.56 1210.46 1722.00 1211.63 1490.32 1199.05 1508.32 1233.96 1718.42 1228.95 1528.73 1169.20 1520.92 1199.42 1667.96 1194.54 1439.67 1045.14 1450.95 1088.79 1587.29 1082.21 1434.88 1083.16 1398.03 1125.69 1567.79 1127.66 1419.95 1569.42 1438.32 1570.43 1424.04 2193.52 1279.89 1458.60 1363.76 1450.25 1407.65 2047.43 1209.46 1481.80 1393.64 1489.92 1389.20 2088.48 1227.68 1564.66 1272.98 1577.82 1281.83 1807.35 1282.69 1522.40 1167.47 1481.56 1210.46 1722.00 1211.63 1490.32 1199.05 1508.32 1233.96 1718.42 1228.95 1528.73 1169.20 1520.92 1199.42 1667.96 1194.54 1439.67 1045.14 1450.95 1088.79 1587.29 1082.21 1434.88 1083.16 1398.03 1125.69 1567.79 1127.66 1419.95 15 t(s) t*(s) 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 4 16 8 7 10 0 2 29 5 6 3 8 7 1 16 2 15 1 3 25 2 3 8 0 4 1 42 3 31 12 7 24 14 7 41 0 25 15 17 2 9 19 14 24 3 2 15 23 14 23 21 6 21 15 12 BKS 1569.42* 1438.33* 1570.43* 1424.04* 2193.52* 1279.87* 1458.63* 1363.74* 1450.27* 1407.64* 2047.46* 1209.42* 1481.83* 1393.61* 1489.94* 1389.17* 2088.49* 1227.61* 1564.66* 1272.97* 1577.82* 1281.83* 1807.35* 1282.68* 1522.42* 1167.46* 1481.57* 1210.44* 1722.04 1211.59* 1490.34 1199.00* 1508.30 1233.92* 1718.41 1228.89* 1528.73* 1169.20* 1520.92* 1199.42* 1667.96* 1194.54* 1439.67* 1045.13* 1450.96* 1088.77* 1587.29* 1082.20* 1434.88* 1083.12* 1398.05* 1125.67* 1567.77* 1127.61* 1419.94 Table 6: Results for Set 4b Instances (vs2 = v 2 ) HCC Inst. C S T CF Set 4b 1 50 2 50 3 50 4 50 5 50 6 50 7 50 8 50 9 50 10 50 11 50 12 50 13 50 14 50 15 50 16 50 17 50 18 50 19 50 20 50 21 50 22 50 23 50 24 50 25 50 26 50 27 50 28 50 29 50 30 50 31 50 32 50 33 50 34 50 35 50 36 50 37 50 38 50 39 50 40 50 41 50 42 50 43 50 44 50 45 50 46 50 47 50 48 50 49 50 50 50 51 50 52 50 53 50 54 50 Avg. 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 Avg. 5 Best 1569.42 1441.02 1570.43 1424.04 2194.11 1279.87 1458.63 1360.32 1450.27 1360.56 2059.88 1209.42 1481.83 1393.61 1489.94 1387.83 2088.49 1227.61 1546.28 1272.97 1577.82 1281.83 1652.98 1282.68 1440.84 1167.46 1447.79 1210.44 1561.81 1211.59 1440.86 1199.00 1478.86 1233.92 1570.80 1228.89 1528.81 1163.07 1520.92 1165.24 1652.98 1190.17 1408.95 1035.32 1406.43 1058.97 1564.41 1074.50 1435.28 1065.25 1387.72 1103.76 1545.73 1113.62 1401.39 1569.42 1438.33 1570.43 1424.04 2194.11 1279.87 1458.63 1360.32 1450.27 1360.56 2059.88 1209.42 1481.83 1393.61 1489.94 1387.83 2088.49 1227.61 1546.28 1272.97 1577.82 1281.83 1652.98 1282.68 1440.68 1167.46 1444.50 1210.44 1559.82 1211.59 1440.86 1199.00 1478.86 1233.92 1570.72 1228.89 1528.73 1163.07 1520.92 1163.04 1652.98 1190.17 1406.11 1035.03 1403.10 1058.11 1559.82 1074.50 1434.88 1065.25 1387.51 1103.42 1545.73 1113.62 1400.96 ZXXS t(s) t*(s) 235 155 183 130 614 99 169 205 204 174 648 205 220 189 173 147 625 94 171 99 155 127 175 110 154 96 163 143 178 132 144 102 159 93 182 123 143 88 158 84 150 95 151 109 144 74 185 83 140 92 138 102 148 90 169 6 43 3 11 63 2 6 5 46 1 101 44 25 6 9 6 165 3 25 12 61 2 5 2 53 0 12 7 102 5 37 11 16 4 116 6 55 15 33 20 12 31 60 30 104 17 103 2 81 16 46 47 37 2 32 Avg. 5 Best 1569.42 1438.33 1570.43 1429.04 2193.52 1279.87 1408.57 1360.32 1403.53 1360.56 2059.41 1209.42 1450.93 1393.61 1466.83 1387.83 2088.49 1227.61 1546.28 1272.97 1577.82 1281.83 1652.98 1282.68 1408.57 1167.46 1454.63 1210.44 1555.56 1211.59 1441.07 1199.00 1478.86 1233.92 1570.72 1228.89 1528.98 1163.07 1520.92 1163.04 1652.98 1190.17 1406.11 1035.03 1402.03 1058.11 1557.04 1074.50 1434.88 1065.25 1387.51 1103.42 1545.73 1113.62 1397.69 1569.42 1438.33 1570.43 1424.04 2193.52 1279.87 1408.57 1360.32 1403.53 1360.56 2059.41 1209.42 1450.93 1393.61 1466.83 1387.83 2088.49 1227.61 1546.28 1272.97 1577.82 1281.83 1652.98 1282.68 1408.57 1167.46 1444.51 1210.44 1552.66 1211.59 1440.86 1199.00 1478.86 1233.92 1570.72 1228.89 1528.73 1163.07 1520.92 1163.04 1652.98 1190.17 1406.11 1035.03 1402.03 1058.11 1552.66 1074.50 1434.88 1065.25 1387.51 1103.42 1545.73 1113.62 1397.27 16 LNS-2E t*(s) 1 40 1 73 34 1 16 4 4 1 4 6 2 1 1 6 27 1 25 57 19 28 3 1 17 7 39 2 30 1 29 10 14 11 4 2 43 1 16 7 9 71 24 7 27 7 25 1 38 2 3 22 4 12 16 Avg. 5 Best 5 Best 1569.42 1438.32 1570.43 1424.04 2193.52 1279.89 1408.58 1360.32 1403.53 1360.54 2054.60 1209.46 1450.95 1393.64 1466.84 1387.85 2088.48 1227.68 1546.28 1272.98 1577.82 1281.83 1652.98 1282.69 1408.58 1167.47 1444.49 1210.46 1552.66 1211.63 1440.85 1199.05 1478.87 1233.96 1570.73 1228.95 1528.73 1163.07 1520.92 1163.04 1652.98 1190.17 1407.09 1035.05 1401.87 1058.10 1552.66 1074.51 1434.88 1065.30 1387.51 1103.47 1545.76 1113.66 1397.21 1569.42 1438.32 1570.43 1424.04 2193.52 1279.89 1408.58 1360.32 1403.53 1360.54 2047.43 1209.46 1450.94 1393.64 1466.84 1387.85 2088.48 1227.68 1546.28 1272.98 1577.82 1281.83 1652.98 1282.69 1408.58 1167.47 1444.49 1210.46 1552.66 1211.63 1440.85 1199.05 1478.87 1233.96 1570.73 1228.95 1528.73 1163.07 1520.92 1163.04 1652.98 1190.17 1406.10 1035.05 1401.87 1058.10 1552.66 1074.51 1434.88 1065.30 1387.51 1103.47 1545.76 1113.66 1397.06 1569.42 1438.32 1570.43 1424.04 2193.52 1279.89 1408.58 1360.32 1403.53 1360.54 2047.43 1209.46 1450.94 1393.64 1466.84 1387.85 2088.48 1227.68 1546.28 1272.98 1577.82 1281.83 1652.98 1282.69 1408.58 1167.47 1444.49 1210.46 1552.66 1211.63 1440.85 1199.05 1478.87 1233.96 1570.73 1228.95 1528.73 1163.07 1520.92 1163.04 1652.98 1190.17 1406.10 1035.05 1401.87 1058.10 1552.66 1074.51 1434.88 1065.30 1387.51 1103.47 1545.76 1113.66 1397.06 t(s) t*(s) 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 60 15 6 7 7 18 0 17 8 11 1 2 20 10 3 2 12 13 5 34 11 16 4 4 1 20 16 20 6 39 5 15 21 15 11 10 6 27 17 25 5 14 9 13 42 21 16 24 4 9 33 19 17 21 5 14 BKS 1569.42* 1438.33* 1570.43* 1424.04* 2193.52* 1279.87* 1408.57* 1360.32* 1403.53* 1360.56* 2047.46* 1209.42* 1450.93* 1393.61* 1466.83* 1387.83* 2088.49* 1227.61* 1546.28* 1272.97* 1577.82* 1281.83* 1652.98* 1282.68* 1408.57* 1167.46* 1444.50* 1210.44* 1552.66* 1211.59* 1440.86* 1199.00* 1478.86* 1233.92* 1570.72* 1228.89* 1528.73 1163.07* 1520.92* 1163.04* 1652.98* 1190.17* 1406.11* 1035.03* 1401.87* 1058.11* 1552.66* 1074.50* 1434.88 1065.25* 1387.51* 1103.42* 1545.73* 1113.62* 1397.04 Table 7: Results for Set 5 Instances HCC Instance C Set 5 100-5-1 100-5-1b 100-5-2 100-5-2b 100-5-3 100-5-3b 100-10-1 100-10-1b 100-10-2 100-10-2b 100-10-3 100-10-3b 200-10-1 200-10-1b 200-10-2 200-10-2b 200-10-3 200-10-3b Avg. 100 100 100 100 100 100 100 100 100 100 100 100 200 200 200 200 200 200 S T CF Avg. 5 5 5 5 5 5 5 10 10 10 10 10 10 10 10 10 10 10 10 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 32 15 32 15 30 16 35 18 33 18 32 17 62 30 63 30 63 30 1588.73 1126.93 1022.29 789.05 1046.67 828.99 1137.00 928.01 1009.49 773.58 1055.28 861.88 1626.83 1239.79 1416.87 1018.57 1808.24 1208.38 1138.14 Best LNS-2E t(s) t*(s) 1565.45 353 1111.34 397 1016.32 406 782.25 340 1045.29 352 828.99 391 1130.23 429 916.48 476 990.58 356 768.61 432 1043.25 415 850.92 418 1574.12 888 1201.75 692 1374.74 1072 1003.75 1058 1787.73 916 1200.74 1217 1121.81 589 Avg. 5 116 1566.87 45 1111.93 117 1017.94 170 783.07 80 1045.29 127 828.54 136 1132.11 262 922.85 232 1014.61 157 786.64 209 1053.55 29 858.72 207 1598.46 374 1217.23 496 1406.16 221 1016.05 305 1809.44 478 1206.85 209 1132.02 Best 5 Best t(s) t*(s) 1564.46 1108.62 1016.32 782.25 1045.29 828.54 1125.53 916.25 1012.14 781.27 1049.77 854.90 1580.34 1191.59 1366.36 1008.46 1797.80 1202.21 1124.01 1564.46 1108.62 1016.32 782.25 1045.29 828.54 1124.93 916.25 1002.15 774.11 1048.53 854.90 1556.79 1187.62 1365.74 1002.85 1793.99 1197.90 1120.62 900 900 900 900 900 900 900 900 900 900 900 900 900 900 900 900 900 900 900 Table 8: Results for Set 6a Instances (no handling costs) LNS-2E Instance C Set 6a A-n51-4 A-n51-5 A-n51-6 A-n76-4 A-n76-5 A-n76-6 A-n101-4 A-n101-5 A-n101-6 B-n51-4 B-n51-5 B-n51-6 B-n76-4 B-n76-5 B-n76-6 B-n101-4 B-n101-5 B-n101-6 C-n51-4 C-n51-5 C-n51-6 C-n76-4 C-n76-5 C-n76-6 C-n101-4 C-n101-5 C-n101-6 Avg. 50 50 50 75 75 75 100 100 100 50 50 50 75 75 75 100 100 100 50 50 50 75 75 75 100 100 100 S T CF 4 5 6 4 5 6 4 5 6 4 5 6 4 5 6 4 5 6 4 5 6 4 5 6 4 5 6 2 2 2 3 3 3 4 4 4 2 2 2 3 3 3 4 4 4 2 2 2 3 3 3 4 4 4 Avg. 5 Best 5 Best t(s) t*(s) 50 652.00 652.00 652.00 60 50 663.41 663.41 663.41 60 50 662.51 662.51 662.51 60 75 985.98 985.95 985.95 900 75 981.19 979.15 979.15 900 75 971.65 970.20 970.20 900 100 1194.38 1194.17 1194.17 900 100 1215.89 1211.40 1211.40 900 100 1161.91 1158.97 1155.96 900 50 563.98 563.98 563.98 60 50 549.23 549.23 549.23 60 50 556.32 556.32 556.32 60 75 793.97 792.73 792.73 900 75 784.27 784.19 784.19 900 75 775.75 774.24 774.17 900 100 939.79 939.21 939.21 900 100 971.27 969.13 969.13 900 100 961.91 960.29 960.29 900 50 689.18 689.18 689.18 60 50 723.12 723.12 723.12 60 50 697.00 697.00 697.00 60 75 1055.61 1054.89 1054.89 900 75 1115.32 1115.32 1115.32 900 75 1066.88 1060.52 1060.52 900 100 1305.94 1302.16 1302.16 900 100 1307.24 1306.27 1305.82 900 100 1292.10 1284.48 1284.48 900 912.51 911.11 910.98 620 17 19 37 23 128 286 233 267 414 154 6 55 39 320 190 160 377 161 88 13 19 46 339 113 474 236 141 446 177 BKS 652.00* 663.41* 662.51* 985.95* 979.15* 970.20* 1194.17* 1211.38* 1155.96 563.98* 549.23* 556.32* 792.73* 783.93* 774.17* 939.21* 967.82* 960.29* 689.18* 723.12* 697.00* 1054.89* 1115.32* 1060.52 1302.16 1305.82 1284.48 910.92 201 176 75 152 131 62 567 424 471 416 105 175 730 588 534 721 675 523 374 BKS 1564.46* 1108.62 1016.32* 782.25 1045.29* 828.54 1124.93 916.25 990.58 768.61 1043.25 850.92 1556.79 1187.62 1365.74 1002.85 1787.73 1197.90 1118.81 Table 9: Results for Set 6b Instances (hs 6= 0) LNS-2E Instance C Set 6b A-n51-4 A-n51-5 A-n51-6 A-n76-4 A-n76-5 A-n76-6 A-n101-4 A-n101-5 A-n101-6 B-n51-4 B-n51-5 B-n51-6 B-n76-4 B-n76-5 B-n76-6 B-n101-4 B-n101-5 B-n101-6 C-n51-4 C-n51-5 C-n51-6 C-n76-4 C-n76-5 C-n76-6 C-n101-4 C-n101-5 C-n101-6 Avg. 50 50 50 75 75 75 100 100 100 50 50 50 75 75 75 100 100 100 50 50 50 75 75 75 100 100 100 S T CF 4 5 6 4 5 6 4 5 6 4 5 6 4 5 6 4 5 6 4 5 6 4 5 6 4 5 6 2 2 2 3 3 3 4 4 4 2 2 2 3 3 3 4 4 4 2 2 2 3 3 3 4 4 4 50 50 50 75 75 75 100 100 100 50 50 50 75 75 75 100 100 100 50 50 50 75 75 75 100 100 100 Avg. 5 Best 5 Best t(s) t*(s) 744.24 811.51 930.11 1385.51 1519.86 1666.28 1884.48 1723.06 1795.36 653.09 672.10 767.13 1094.52 1218.12 1328.90 1500.80 1398.05 1455.05 866.58 943.12 1050.42 1439.39 1745.49 1759.40 2076.36 1974.39 1867.45 1343.36 744.24 811.51 930.11 1385.51 1519.86 1666.06 1883.79 1714.58 1793.76 653.09 672.10 767.13 1094.52 1218.12 1328.90 1500.55 1398.05 1453.54 866.58 943.12 1050.42 1438.96 1745.39 1756.54 2073.84 1967.51 1861.50 1342.20 744.24 811.51 930.11 1385.51 1519.86 1666.06 1883.79 1711.95 1791.44 653.09 672.10 767.13 1094.52 1218.12 1326.76 1500.55 1395.32 1453.54 866.58 943.12 1050.42 1438.96 1745.39 1756.54 2064.86 1964.63 1861.50 1341.39 60 60 60 900 900 900 900 900 900 60 60 60 900 900 900 900 900 900 60 60 60 900 900 900 900 900 900 620 17 49 31 26 71 533 283 318 100 21 51 58 44 19 329 82 317 460 22 12 18 84 281 358 378 285 401 172 BKS 744.24* 811.52* 930.11* 1385.51* 1519.86* 1666.06* 1881.44* 1709.06 1777.69 653.09* 672.10* 767.13* 1094.52* 1218.13* 1326.76* 1500.55 1395.32 1450.39 866.58* 943.12* 1050.42* 1438.96* 1745.39* 1756.54* 2064.86 1964.63 1861.50 1340.57 To test the robustness of our algorithm we applied it also to the 2ELRPSD instances without any further changing of operators or tuning. The results can be seen in Tables 10 and 11. BKS are derived from Schwengerer et al. (2012); Nguyen et al. (2012a,b); Contardo et al. (2012). Also on this problem class LNS-2E is competitive, with solutions being on average within 0.6% of the solutions found by the state-of-the-art VNS by Schwengerer et al. (2012) (SPR). Table 10: Results for 2ELRPSD Instances Set Nguyen SPR Instance C Set Nguyen 25-5N 25 25-5Nb 25 25-5MN 25 25-5MNb 25 50-5N 50 50-5Nb 50 50-5MN 50 50-5MNb 50 50-10N 50 50-10Nb 50 50-10MN 50 50-10MNb 50 100-5N 100 100-5Nb 100 100-5MN 100 100-5MNb 100 100-10N 100 100-10Nb 100 100-10MN 100 100-10MNb 100 200-10N 200 200-10Nb 200 200-10MN 200 200-10MNb 200 Avg. S Avg. 20 5 5 5 5 5 5 5 5 10 10 10 10 5 5 5 5 10 10 10 10 10 10 10 10 80370.00 64562.00 78947.00 64438.00 137815.00 110204.40 123484.00 105687.00 115725.00 87345.00 135519.00 110613.00 200685.05 164508.10 206567.40 166357.35 214585.60 155790.60 203798.05 170791.25 349584.15 264228.90 332207.50 292036.65 163993.75 LNS-2E Best 20 t(s) t*(s) 80370 64562 78947 64438 137815 110094 123484 105401 115725 87315 135519 110613 193228 158927 204682 165744 209952 155489 201275 170625 345267 256171 323801 287076 161938 76 91 61 89 116 132 125 202 143 176 144 218 168 258 184 315 223 352 229 347 641 907 453 944 275 Avg. 20 Best 20 Best t(s) t*(s) 3 80370.00 80370 80370 60 0 64562.00 64562 64562 60 1 78947.00 78947 78947 60 0 64438.00 64438 64438 60 35 137815.00 137815 137815 60 51 110981.85 110094 110094 60 41 123484.00 123484 123484 60 48 105783.45 105401 105401 60 24 117325.55 115725 115725 60 66 88212.00 87520 87315 60 10 138241.35 135519 135519 60 13 111520.80 110613 110613 60 101 193806.85 193229 193229 900 144 159064.10 158927 158927 900 159 204876.10 204682 204682 900 247 165795.35 165744 165744 900 167 216265.50 210799 209952 900 251 161273.30 155489 155489 900 163 204396.15 201275 201275 900 283 172202.45 170625 170625 900 525 359948.65 350680 350680 900 791 260698.20 257191 257191 900 441 329486.45 324279 324279 900 843 297857.50 293339 290702 900 184 164472.98 162531 162377 480 18 5 16 6 4 25 22 4 16 20 23 14 22 239 315 105 252 344 442 324 268 758 748 777 778 230 BKS 80370 64562 78947 64438 137815 110094 123484 105401 115725 87315 135519 110613 193228 158927 204682 165744 209952 155489 201275 170625 345267 256171 323801 287076 161938 Table 11: Results for 2ELRPSD Instances Set Prodhon SPR Instance C Set Prodhon 20-5-1 20 20-5-1b 20 20-5-2 20 20-5-2b 20 50-5-1 50 50-5-1b 50 50-5-2 50 50-5-2b 50 50-5-2BIS 50 50-5-2bBIS 50 50-5-3 50 50-5-3b 50 100-5-1 100 100-5-1b 100 100-5-2 100 100-5-2b 100 100-5-3 100 100-5-3b 100 100-10-1 100 100-10-1b 100 100-10-2 100 100-10-2b 100 100-10-3 100 100-10-3b 100 200-10-1 200 200-10-1b 200 200-10-2 200 200-10-2b 200 200-10-3 200 200-10-3b 200 Avg. S Avg. 20 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 10 10 10 10 10 10 10 10 10 10 10 10 89075.00 61863.00 84489.50 61033.80 130859.30 101548.00 131825.00 110332.00 122599.00 105935.50 128436.00 104006.00 318667.00 257436.35 231340.00 194812.70 245334.90 195586.20 357381.40 300239.15 304931.20 264592.00 312701.25 261577.90 552488.90 448095.45 513673.40 432687.00 529578.00 404431.25 245251.87 Best 20 LNS-2E t(s) 89075 63 61863 83 84478 62 60838 125 130843 80 101530 128 131825 97 110332 198 122599 112 105696 198 128379 80 104006 131 318225 226 256991 301 231305 204 194763 240 244470 174 195381 180 352694 233 298186 299 304507 248 264092 307 311447 227 260516 303 548730 1009 445791 635 497451 1158 422668 730 527162 970 402117 592 243599 313 t*(s) Avg. 20 Best 20 Best t(s) t*(s) 2 89075.00 89075 89075 60 0 61863.00 61863 61863 60 11 84478.00 84478 84478 60 0 60838.00 60838 60838 60 16 131454.00 131085 130843 60 35 101669.20 101530 101530 60 11 131827.00 131825 131825 60 12 110332.00 110332 110332 60 91 122599.00 122599 122599 60 155 105707.85 105696 105696 60 9 128614.50 128379 128379 60 6 104006.00 104006 104006 60 153 319268.60 318399 318399 900 220 257686.40 256991 256888 900 131 231488.85 231305 231305 900 202 194800.35 194763 194729 900 124 245178.75 244071 244071 900 111 195123.20 194110 194110 900 167 362648.70 354525 352122 900 194 312451.60 299758 298298 900 194 307937.60 304909 304438 900 208 265814.85 264173 263876 900 141 318952.10 311699 310930 900 218 265442.40 262932 261566 900 748 564159.80 550672 550672 900 576 456952.40 448188 447113 900 832 499499.45 498486 498397 900 696 428912.35 422967 422877 900 903 568539.15 534271 533174 900 557 425078.20 417686 417429 900 224 248413.28 244720 244395 564 4 2 19 5 24 14 16 14 3 18 10 7 303 268 229 176 377 327 401 540 520 310 512 437 725 692 656 601 668 700 286 BKS 89075 61863 84478 60838 130843 101530 131825 110332 122599 105696 128379 104006 318134 256878 231305 194728 244071 194110 351243 297167 304438 263873 310200 260328 548703 445301 497451 422668 527162 401672 243363 Finding high-quality solutions is increasingly difficult as the problem size grows, and different instance characteristics influence solution quality. Figure 2 displays boxplots of 2EVRP instances grouped together by number of customers (2a), or number of satellites (2b), similar customer distribution (2c) and similar satellite distribution (2d) using gaps of the average value of five runs to BKS. Problem difficulty quickly grows with the number of satellites, as well as with the number of customers, as plotted in the upper part of Figure 2. The number of samples for the different classes varies a lot: There are only 18 instances with 75 customers, but 165 instances with 50 customers, which explains the large number of outliers for those instances. Crainic et al. (2010) provide a detailed overview on the distribution of customers and satellites in instances of Set 4. There are three distribution patterns for customers: random, with equally distributed nodes; centroids, where more customers are located in six centroids in a central zone, and some customers closer together in four outer areas, representing suburbs. In the quadrant pattern customers are arranged in conglomerations of higher density in each of the four quadrants. The three patterns for satellites are: random, where satellites are randomly placed on a ring around the customers; sliced, with the satellites distributed more evenly on the ring around customers; and forbidden zone: a random angle on the ring was chosen where no satellites could be used, to simulate various conditions like cities located near lakes or mountains. Figure 2c shows that instances with customers located in centroids are harder to solve. On the other hand, the distribution pattern of the satellites doesn’t have a large impact on solution quality. 6.5 Graphical Example Several structurally different 2EVRP solutions can have similar objective values. We discuss and visualise this with the help of a demonstrative graphical example. Also the solution differences for an instance with or without constraining the number of city freighters per satellite are pointed out. The selection of the correct subset of satellites to use is crucial. A graphical representation of different solutions of the Set 4 instance 38 is provided in Figure 3. The locations of the depot (square), satellites (triangles) and customers (circles) is the same for each solution. Nevertheless, the obtained vehicle routes are substantially different given different subsets of open satellites. 19 Figure 3a represents the optimal solution to the Set 4a instance 38. A maximum of vs2 = 2 city freighters per satellite are available. The total demand of all customers sums up to 20206 units of freight. The capacity Q2 of a city freighter is 5000 units. Any feasible solution needs at least d 20206 5000 e = 5 city freighters, and thus at least d5/2e = 3 satellites have to be used. Two city freighter routes are located on the left of the figure, and three city freighter routes on the right hand side, where two city freighters leave from the same satellite, and a third one from a close by satellite. Considering the instance as in Set 4b, with a global number of city freighters available but no constraints on the distribution amongst satellites (vs2 = v 2 ), the optimal solution is displayed in Figure 3b. Three city freighters can leave the same satellite, as is the case on the left hand side. Only two of the five satellites have to be used. LNS-2E starts with the construction of routes at the second level. In early stages of the optimisation process, all customers are likely assigned to their closest satellites. Without neighbourhoods that impact the selection of satellites, the algorithm would likely be trapped in a local optimum such as the one of Figure 3c. If partial routes originating at the bottom right satellite exist, customers may be sequentially inserted in those routes and the bottom left satellite may not be opened. The solution displayed in Figure 3d is often obtained. It has the best cost considering only the second level, but long truck routes on the first level set this gain off, leading to a worse solution overall. Figure 3e shows the best found solution if only the top right satellite is open. The cost differences from one solution to the next one are small, although the solution itself is fundamentally different. If the two satellites at the bottom are both selected for closure at the same time, then the algorithm finds the optimal solution within seconds. We tried different strategies to evaluate the chances of a satellite to be included in the best solution: taking into account a delta evaluation on the truck route, or combining this value with the total units shipped through this satellite; or the absolute distance from the depot. We observed that closing satellites randomly is a straightforward and very simple approach, which performs quite well on average over all the different benchmark instances, whereas other techniques present advantages and disadvantages in several special cases. For further research, we suggest to shift the cost structure towards more realistic scenarios. In the classic 2EVRP as we considered it, the cost of large trucks and small city freighters is the same. For instance Sets 2 to 4, the capacity of a truck is 2.5 times higher than of a city freighter. For Set 5 instances this ratio gets up to more than 14, so one can safely assume that the operating cost of a truck will be higher than of a city freighter in more realistic set-ups. This has not yet been taken into account in previous publications on the 2EVRP, and would lead to large differences between the solution costs of Figure 3. 6.6 Sensitivity Analysis Sensitivity analyses were conducted to evaluate the impact of major parameters and components of the method. In particular, we evaluate the impact of disabling single destroy operators or local search procedures at a time and provide the average objective value over five runs of all benchmark instances. Table 12 shows the average objective values for instances of each class and its average deviation (Gap (%)) when disabling elements of the algorithm. The elimination of the open all satellites (no open) neighbourhood has a strong impact on solution quality. As closed satellites are only opened again in a re-start phase, the algorithm is likely to be trapped in a local optimum. If no satellites are forced to be closed, there is no need to open up any satellite again. In this case, solution quality deteriorates by 1.15% on average (no close). For some instances, satellites located very far away from the depot will not be used in the best solution, but on the second level it seems to be beneficial to use them for customers close by. The impact on the 2ELRPSD, especially the instance Set Prodhon is quite strong, as the fixed costs of a satellite are not taken into account on the second level. If a satellite with high opening costs is located close to many customers, it will very likely be used, although it would pay off to use a cheaper one further away. A similar behaviour was discussed in Section 6.5 and Figure 3. Some techniques work better on smaller instances, while others perform better on the larger instances. For some cases we even observed small improvements when an operator was not used. Not using biased node 1 hinges depict approximately the first and third quartile of the solutions. The whiskers extend to ±1.58 Q3√−Q . (The R n Foundation for Statistical Computing, 2014). See the Appendix 8.2 for a detailed definition. 2 The 20 3.5 3.5 ● ● ● ● 3.0 2.5 2.5 3.0 ● ● 1.0 ● 2.0 Gap (%) ● ● 1.5 2.0 1.5 ● ● 1.0 Gap (%) ● ● ● ● ● ● ● 21 32 50 0.0 ● ● ● ● ● ● ● ● ● 0.5 ● ● 0.0 0.5 ● ● 75 100 200 ● ● ● ● ● ● ● ● ● 2 3 Customers ● ● 4 5 6 10 Satellites (a) number of Customers (b) number of Satellites ● ● 3.5 3.5 ● ● ● ● 2.5 2.5 3.0 ● 3.0 ● ● ● 2.0 ● ● ● ● ● ● ● 0.5 ● Centroids Quadrants ● 0.0 ● ● 0.0 0.5 ● 1.0 1.5 ● 1.5 Gap (%) 2.0 ● 1.0 Gap (%) ● ● ● Random Forbidden Customer Characteristics ● ● ● ● ● ● ● Random Sliced ● ● Satellite Characteristics (c) Set 4: Customer distribution (d) Set 4: Satellite distribution Figure 2: Boxplots2 of solution quality for instances grouped by number of customers/satellites and distribution characteristics 21 (a) max. 2 CF/Sat, 1169.20*, optimal for Set 4a (b) 2 Satellites used, 1163.07*, optimal for Set 4b (d) 4 Satellites used, 1226.43 (c) 3 Satellites used, 1210.81 (e) 1 Satellite used, 1255.98 Figure 3: Different Solutions of Instance 38 from Set 4, depending on satellite openings and vs2 22 removal for example is needed to robustly find optimal solutions on the smaller instance sets (2-4) but yields improvements on the larger sets. For local search techniques, we also observe differences on methods for small or large instance sets respectively. Removing classic 2-opt has a small impact. The repair mechanism finds already high quality single routes in terms of 2-optimality. Eliminating the inter-tour operator 2-opt* has a stronger effect on larger Set 5 and Set 6 instances, which contain more routes than the smaller instances. The relocate neighbourhood is essential for instances with more than 50 customers, whereas exchanging two nodes against one can have a negative effect on those larger instances. We still decided to keep it in the design of the algorithm, as this local search is needed to find optimal solutions for smaller instances. Of course the algorithm could be fine-tuned for specific applications or instance sizes. Table 12: Sensitivity Analysis and contribution of individual components Set Sensitivity Analysis base no related no biased no route no single no close 2 578.27 3 641.44 4a 1420.05 4b 1397.21 5 1132.02 6a 912.51 6b 1343.36 Prodhon 248413.28 Nguyen 164492.82 Avg. 46703.44 Set base no restart 2 578.27 3 641.44 4a 1420.05 4b 1397.21 5 1132.02 6a 912.51 6b 1343.36 Prodhon 248413.28 Nguyen 164492.82 Avg. 46703.44 7 0.21% 0.31% 0.25% 0.16% 0.69% 0.25% 0.15% 0.95% 0.61% 0.40% 0.08% 0.13% 0.11% 0.10% 0.06% 0.11% 0.07% 0.43% -0.08% 0.11% 0.02% 0.06% 0.02% -0.01% -0.07% -0.03% 0.04% -0.31% 0.05% -0.03% 0.17% 0.27% 0.10% 0.18% 0.31% 0.07% 0.06% -0.55% 0.28% 0.10% 0.02% 0.06% 0.04% 0.05% 0.35% -0.01% 0.01% -0.36% 0.19% 0.04% 0.07% 0.07% 0.53% 1.14% 0.39% 1.20% 1.15% 4.65% 1.13% 1.15% no open 2.07% 1.66% 1.37% 1.39% 2.35% 1.36% 0.97% 3.58% 1.38% 1.79% no 2opt no 2opt* no relocate no swap no swap 2 0.04% 0.05% 0.05% 0.03% 0.31% 0.02% 0.05% -0.29% -0.20% 0.01% 0.10% 0.09% 0.03% 0.27% 0.53% 0.15% 0.17% 0.30% 0.21% 0.21% 0.00% 0.06% -0.01% 0.04% 0.47% 0.24% 0.12% 0.56% 0.40% 0.21% 0.00% 0.08% 0.01% 0.02% 0.29% -0.03% 0.05% -0.51% 0.22% 0.01% 0.00% 0.18% -0.01% 0.03% 0.09% 0.02% -0.01% 0.00% 0.03% 0.04% Conclusion We presented a very simple and fast LNS heuristic for the 2EVRP and 2ELRPSD. LNS-2E makes use of one repair operator and only a few destroy operators. The proposed method finds solutions of higher quality than existing algorithms, while being fast and conceptually simpler. The impact of various parameters and design choices was highlighted. Meta-calibration techniques were used to set the parameters to good values, which were subsequently verified during sensitivity analyses. Different techniques were attempted to open or close satellites, and thus explore various combinations of design choices. At the end, a simple randomised approach for fixing satellites, assorted with a minimum number of iterations without change of this decision led to good and robust results on a wide range of benchmark instances. LNS-2E was able to improve 18 best known solutions on the 49 2EVRP instances for which no proven optimal solution exists so far. Having resolved the inconsistencies on the different sets of benchmark instances used in literature paves the way for future research on this topic, which will focus on solving rich city logistics problems, and shifting the cost structure to a more realistic scenario. It will be interesting to examine the implications of using higher operating costs for larger trucks than for smaller city freighters, approaching more realistic and real-life transportation problems. Online Resources All necessary data can be found in the online section at https://www.univie.ac.at/prolog/research/ TwoEVRP. All instances have been transformed into a uniform format and can be downloaded. Set 4 instances used to have negative and real x/y coordinates (with a maximum of two positions after decimal space). We 23 added a fixed factor to shift them only to be positive and multiplied them by 100 to be able to use positive integers. This does not change the solution, but note that the objective should be adjusted by a factor 100. We also provide detailed results on the new found best known solutions, both in human readable text and a graphical representation. Acknowledgement This work is partially funded by the Austrian Climate and Energy Fund within the “Electric Mobility Flagship projects” program under grant 834868 (project VECEPT). The financial support by the Austrian Federal Ministry of Science, Research and Economy and the National Foundation for Research, Technology and Development is gratefully acknowledged. We would like to thank Roberto Baldacci, Vera Hemmelmayr, Sandro Pirkwieser, Martin Schwengerer and Gianfranco Guastaroba for providing us detailed information, and/or solutions on the instances solved by their methods. We would also like to thank the two anonymous reviewers for their helpful and constructive comments which helped us to improve the manuscript. 8 8.1 Appendix Nomenclature of Set 3 instances Table 13: Set 3 instances with 50 customers: identical except for depot coordinates Set 3b1 depot at (0,0) E-n51-k5- Set 3c2 depot at (30,40) 12-18 12-41 12-43 39-41 40-41 40-43 E-n51-k5- 13-19 13-42 13-44 40-42 41-42 41-44 1 included in Hemmelmayr (2013) 2 included in Beasley (2014) Hemmelmayr et al. (2012) report a best solution with total costs of 690.59 for instance E-n51-k5-s12-18, which corresponds exactly to the solution found by our algorithm. On the other hand Jepsen et al. (2012) report an objective value of 560.73 for an instance of that name. This corresponds exactly to the objective value found by our algorithm for the instance E-n51-k5-s13-19 from Beasley (2014). So we assume Jepsen et al. (2012) used the same instances as are provided from Beasley (2014), but the IDs of satellites in the names have to be increased by one. Both versions exist in literature, as we described in Section 6.1. The only difference between Sets 3b and 3c is the location of the depot. Table 13 shows, which instances correspond to each other, apart from depot coordinates. 8.2 Definition of boxplots in Figure 2 The two hinges are versions of the first (Q1 ) and third quartile (Q3 ), i.e., close to quantile (x, c(1,3)/4). The hinges equal the quartiles for odd n (where n ← length(x)) and differ for even n. Whereas the quartiles only equal observations for n = (1 mod 4), the hinges do so additionally for n = (2 mod 4), and are in the middle of two observations otherwise. They are based on asymptotic normality of the median and roughly equal sample sizes for the two medians being compared, and are said to be rather insensitive to the underlying distributions of √ , where Interquartile Range IQR = Q3 − Q1 . This gives roughly the samples. The notches extend to ± 1.58 IQR n 24 a 95% confidence interval for the difference in two medians. (The R Foundation for Statistical Computing, 2014) 8.3 2ELRPSD instances The instances for the 2ELRPSD were downloaded at the homepage3 of Caroline Prodhon. If the description file is renamed to “.doc” it can be opened in human readable format by Word. We found some small typos in the description: At the end of the Prodhon files first the fixed cost of a second level vehicle (F2) is given, then the fixed cost of a truck on first level (F1). The description of the cost structure also seems to contain an error: According to the description, second level vehicles operate at higher cost per distance than first level trucks, which should be the other way round, obviously. This is also the way we treated the instances, and we believe previous authors did, too. The cost linking point A to point B was calculated as shown in Table 14. Please note that first level vehicles do not operate at exactly twice the Euclidean distance, due to the use of the ceil function after multiplication by factor 2. Table 14: Distance Matrix Calculation for the 2ELRPSD Instance set first level d p (xA second level d p (xA Prodhon Nguyen p − xB )2 + (yA − yB )2 ∗ 100 ∗ 2e d (xA − xB )2 + (yA − yB )2 ∗ 10 ∗ 2e p − xB )2 + (yA − yB )2 ∗ 100e d (xA − xB )2 + (yA − yB )2 ∗ 10e In the instance file 200-10-3b, the capacity of first level vehicles is missing, and thus we used 5000 (as this is the value used for all the other Prodhon instance files). Some customers in the 2ELRPSD instances have a demand of 0. This case was not explicitly dealt with in the papers: our algorithm still plans an itinerary for a city freighter which will visit the customer, but does not deliver any quantity of goods. Acronyms 2EVRP two-echelon vehicle routing problem 2ELRP two-echelon location routing problem 2ELRPSD two-echelon location routing problem with single depot ALNS adaptive large neighbourhood search CMA-ES covariance matrix adaptation evolution strategy CVRP capacitated vehicle routing problem LNS large neighbourhood search MDVRP multi-depot vehicle routing problem SDVRP split delivery vehicle routing problem VNS variable neighbourhood search VRP vehicle routing problem Bibliography References R. Baldacci. personal communication. email, May 20th 2013. R. Baldacci, A. Mingozzi, R. Roberti, and R. Wolfler Calvo. An Exact Algorithm for the Two-Echelon Capacitated Vehicle Routing Problem. Operations Research, 61(2):298–314, 2013. doi: 10.1287/opre.1120. 1153. 3 http://prodhonc.free.fr/Instances/instances0_us.htm 25 J. E. Beasley. OR-Library, accessed Oct. 6th 2014. URL http://people.brunel.ac.uk/~mastjjb/jeb/ orlib/files/vrp2e.rar. M. Boccia, T. G. Crainic, A. Sforza, and C. Sterle. Location-Routing Models for Designing a Two-Echelon Freight Distribution System. Technical report, Cirrelt, 2011. C. Contardo, V. C. Hemmelmayr, and T. G. Crainic. Lower and upper bounds for the two-echelon capacitated location-routing problem. Computers & Operations Research, 39:3185–3199, 2012. J.-F. Cordeau, M. Gendreau, G. Laporte, J.-Y. Potvin, and F. Semet. A guide to vehicle routing heuristics. Journal of the Operational Research Society, 53(5):512–522, 2002. doi: 10.1057/palgrave/jors/2601319. T. G. Crainic, N. Ricciardi, and G. Storchi. Advanced Freight Transportation Systems for Congested Urban Areas. Transportation Research Part C: Emerging Technologies, 12(2):119–137, 2004. doi: 10.1016/j.trc.2004. 07.002. T. G. Crainic, N. Ricciardi, and G. Storchi. Models for Evaluating and Planning City Logistics Systems. Transportation Science, 43(4):432–454, 2009. doi: 10.1287/trsc.1090.0279. T. G. Crainic, G. Perboli, S. Mancini, and R. Tadei. Two-Echelon Vehicle Routing Problem: a Satellite Location Analysis. Procedia - Social and Behavioral Sciences, 2(3):5944–5955, 2010. doi: 10.1016/j.sbspro.2010.04.009. T. G. Crainic, S. Mancini, G. Perboli, and R. Tadei. Multi-Start Heuristics for the Two-Echelon Vehicle Routing Problem. In P. Merz and J.-K. Hao, editors, Evolutionary Computation in Combinatorial Optimization, volume 6622, pages 179–190. Springer Berlin Heidelberg, Berlin Heidelberg, 2011. G. A. Croes. A method for solving traveling-salesman problems. Operations Research, 6(6):791–812, 1958. doi: 10.1287/opre.6.6.791. R. Cuda, G. Guastaroba, and M. G. Speranza. A Survey on Two-Echelon Routing Problems. Computers & Operations Research, 55:185–199, 2015. doi: 10.1016/j.cor.2014.06.008. N. Hansen. The CMA evolution strategy: a comparing review. In J. Lozano, P. Larranaga, I. Inza, and E. Bengoetxea, editors, Towards a new evolutionary computation. Advances on estimation of distribution algorithms, pages 75–102. Springer Berlin Heidelberg, 2006. V. C. Hemmelmayr. personal communication. email, March 21st 2013. V. C. Hemmelmayr, J.-F. Cordeau, and T. G. Crainic. An Adaptive Large Neighborhood Search Heuristic for Two-Echelon Vehicle Routing Problems Arising in City Logistics. Computers & Operations Research, 39(12): 3215–3228, 2012. doi: 10.1016/j.cor.2012.04.007. S. Jacobsen and O. Madsen. A Comparative Study of Heuristics for a Two-Level Routing-Location Problem. European Journal of Operational Research, 5(6):378–387, 1980. doi: 10.1016/0377-2217(80)90124-1. M. Jepsen, S. Spoorendonk, and S. Ropke. A Branch-and-Cut Algorithm for the Symmetric Two-Echelon Capacitated Vehicle Routing Problem. Transportation Science, 47(1):23–37, 2012. doi: 10.1287/trsc.1110.0399. G. Laporte. Location routing problems. In B. L. Golden and A. A. Assad, editors, Vehicle Routing: Methods and Studies, pages 163–197. Elsevier Science Publishers B.V., North-Holland, 1988. G. Laporte and Y. Nobert. A vehicle flow model for the optimal design of a two-echelon distribution system. In H. A. Eiselt and G. Pederzoli, editors, Advances in Optimization and Control: Proceedings of the Conference “Optimization Days 86” Held at Montreal, Canada, April 30 – May 2, 1986, pages 158–173, Berlin, Heidelberg, 1988. Springer Berlin Heidelberg. doi: 10.1007/978-3-642-46629-8 11. O. B. Madsen. Methods for solving combined two level location-routing problems of realistic dimensions. European Journal of Operational Research, 12(3):295–301, mar 1983. doi: 10.1016/0377-2217(83)90199-6. 26 V. P. Nguyen, C. Prins, and C. Prodhon. Solving the two-echelon location routing problem by a GRASP reinforced by a learning process and path relinking. European Journal of Operational Research, 216(1): 113–126, 2012a. doi: 10.1016/j.ejor.2011.07.030. V. P. Nguyen, C. Prins, and C. Prodhon. A multi-start iterated local search with tabu list and path relinking for the two-echelon location-routing problem. Engineering Applications of Artificial Intelligence, 25(1):56–71, 2012b. doi: 10.1016/j.engappai.2011.09.012. G. Perboli and R. Tadei. New Families of Valid Inequalities for the Two-Echelon Vehicle Routing Problem. Electronic Notes in Discrete Mathematics, 36:639–646, 2010. G. Perboli, R. Tadei, and D. Vigo. The Two-Echelon Capacitated Vehicle Routing Problem: Models and Math-Based Heuristics. Transportation Science, 45(3):364–380, 2011. doi: 10.1287/trsc.1110.0368. S. Pirkwieser and G. R. Raidl. Variable Neighborhood Search coupled with ILP-based Very Large Neighborhood Searches for the (Periodic) Location-Routing Problem. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), volume 6373 LNCS, pages 174–189, Berlin, Heidelberg, 2010. Springer Berlin Heidelberg. doi: 10.1007/978-3-642-16054-7 13. D. Pisinger and S. Ropke. Large Neighborhood Search. In M. Gendreau and J.-Y. Potvin, editors, Handbook of Metaheuristics, volume 146, pages 399–419. Springer, 2010. F. A. Santos, A. Salles da Cunha, and G. R. Mateus. Branch-and-price algorithms for the Two-Echelon Capacitated Vehicle Routing Problem. Optimization Letters, 7:1537–1547, 2013. doi: 10.1007/s11590-012-0568-3. F. A. Santos, G. R. Mateus, and A. Salles da Cunha. A Branch-and-Cut-and-Price Algorithm for the TwoEchelon Capacitated Vehicle Routing Problem. Transportation Science, 2014. doi: 10.1287/trsc.2013.0500. G. Schrimpf, J. Schneider, H. Stamm-Wilbrandt, and G. Dueck. Record Breaking Optimization Results Using the Ruin and Recreate Principle. Journal of Computational Physics, 159:139–171, 2000. doi: 10.1006/jcph.1999.6413. M. Schwengerer, S. Pirkwieser, and G. R. Raidl. A variable neighborhood search approach for the twoechelon location-routing problem. In J.-K. Hao and M. Middendorf, editors, Evolutionary Computation in Combinatorial Optimization, volume 7245 of Lecture Notes in Computer Science, pages 13–24. Springer Berlin Heidelberg, 2012. doi: 10.1007/978-3-642-29124-1 2. P. Shaw. Using Constraint Programming and Local Search Methods to Solve Vehicle Routing Problems. In M. Maher and J.-F. Puget, editors, Principles and Practice of Constraint Programming, volume 1520 of Lecture Notes in Computer Science, pages 417–431. Springer Berlin Heidelberg, 1998. doi: 10.1007/3-540-49481-2\ 30. The R Foundation for Statistical Computing. R help documentation on boxplot.stats, version 3.1.2, 2014. URL http://web.mit.edu/r/r_v3.0.1/lib/R/library/grDevices/html/boxplot.stats.html. retrieved Feb. 20th 2015. P. Toth and D. Vigo. The Granular Tabu Search and its Application to the Vehicle-Routing Problem. INFORMS Journal on Computing, 15(4):333–346, 2003. T. Vidal, T. G. Crainic, M. Gendreau, and C. Prins. Heuristics for Multi-Attribute Vehicle Routing Problems: A Survey and Synthesis. European Journal of Operational Research, 231(1):1–21, 2013. Z.-y. Zeng, W.-s. Xu, Z.-y. Xu, and W.-h. Shao. A Hybrid GRASP+VND Heuristic for the Two-Echelon Vehicle Routing Problem Arising in City Logistics. Mathematical Problems in Engineering, 2014:1–11, 2014. doi: 10.1155/2014/517467. 27
8cs.DS
A An Abstract Interpretation-based Model of Tracing Just-In-Time Compilation arXiv:1411.7839v2 [cs.PL] 28 Oct 2015 STEFANO DISSEGNA, University of Padova FRANCESCO LOGOZZO, Facebook Inc. FRANCESCO RANZATO, University of Padova Tracing just-in-time compilation is a popular compilation technique for the efficient implementation of dynamic languages, which is commonly used for JavaScript, Python and PHP. It relies on two key ideas. First, it monitors program execution in order to detect so-called hot paths, i.e., the most frequently executed program paths. Then, hot paths are optimized by exploiting some information on program stores which is available and therefore gathered at runtime. The result is a residual program where the optimized hot paths are guarded by sufficient conditions ensuring some form of equivalence with the original program. The residual program is persistently mutated during its execution, e.g., to add new optimized hot paths or to merge existing paths. Tracing compilation is thus fundamentally different from traditional static compilation. Nevertheless, despite the practical success of tracing compilation, very little is known about its theoretical foundations. We provide a formal model of tracing compilation of programs using abstract interpretation. The monitoring phase (viz., hot path detection) corresponds to an abstraction of the trace semantics of the program that captures the most frequent occurrences of sequences of program points together with an abstraction of their corresponding stores, e.g., a type environment. The optimization phase (viz., residual program generation) corresponds to a transform of the original program that preserves its trace semantics up to a given observation as modeled by some abstraction. We provide a generic framework to express dynamic optimizations along hot paths and to prove them correct. We instantiate it to prove the correctness of dynamic type specialization and constant variable folding. We show that our framework is more general than the model of tracing compilation introduced by Guo and Palsberg [2011] which is based on operational bisimulations. In our model we can naturally express hot path reentrance and common optimizations like dead-store elimination, which are either excluded or unsound in Guo and Palsberg’s framework. Categories and Subject Descriptors: D.2.4 [Software Engineering]: Software/Program Verification – correctness proofs, formal methods; D.3.4 [Programming Languages]: Processors – compilers, optimization; F.3.2 [Logics and Meanings of Programs]: Semantics of Programming Languages – program analysis Additional Key Words and Phrases: Tracing JIT compilation, abstract interpretation, trace semantics 1. INTRODUCTION Efficient traditional static compilation of popular dynamic languages like JavaScript, Python and PHP is very hard if not impossible. In particular, these languages present so many dynamic features which make all traditional static analyses used for program optimization very imprecise. Therefore, practical implementations of dynamic languages should rely on dynamic information in The work of Francesco Logozzo was carried out while being affiliated with Microsoft Research, Redmond, WA, USA. The work of Francesco Ranzato was partially supported by Microsoft Research Software Engineering Innovation Foundation 2013 Award (SEIF 2013) and by the University of Padova under the PRAT projects BECOM and ANCORE. Author’s addresses: S. Dissegna and F. Ranzato, Dipartimento di Matematica, University of Padova, Padova, Italy; F. Logozzo, Facebook Inc., Seattle, WA, USA. Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies show this notice on the first page or initial screen of a display along with the full citation. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, to republish, to post on servers, to redistribute to lists, or to use any component of this work in other works requires prior specific permission and/or a fee. Permissions may be requested from Publications Dept., ACM, Inc., 2 Penn Plaza, Suite 701, New York, NY 10121-0701 USA, fax +1 (212) 869-0481, or [email protected]. c YYYY ACM 0164-0925/YYYY/01-ARTA $15.00 DOI:http://dx.doi.org/10.1145/0000000.0000000 ACM Transactions on Programming Languages and Systems, Vol. V, No. N, Article A, Publication date: January YYYY. A:2 S. Dissegna et al. order to produce an optimized version of the program. Tracing just-in-time (JIT) compilation (TJITC) [Bala et al. 2000; Bauman et al. 2015; Bebenita et al. 2010; Böhm et al. 2011; Bolz et al. 2009; Bolz et al. 2011; Gal et al. 2006; Gal et al. 2009; Pall 2005; Schilling 2013] has emerged as a valuable implementation and optimization technique for dynamic languages (and not only, e.g. Java [Häubl and Mössenböck 2011; Häubl et al. 2014; Inoue et al. 2011]). For instance, the Facebook HipHop virtual machine for PHP and the V8 JavaScript engine of Google Chrome use some form of tracing compilation [Adams et al. 2014; Facebook Inc. 2013; Google Inc. 2010]. The Mozilla Firefox JavaScript engine used to have a tracing engine, called TraceMonkey, which has been later substituted by whole-method just-in-time compilation engines (initially JägerMonkey and then IonMonkey) [Mozilla Foundation 2010; Mozilla Foundation 2013]. The Problem. Tracing JIT compilers leverage runtime profiling of programs to detect and record often executed paths, called hot paths, and then they optimize and compile only these paths at runtime. A path is a linear sequence (i.e., no loops or join points are allowed) of instructions through the program. Profiling may also collect information about the values that the program variables may assume during the execution of that path, which is then used to specialize/optimize the code of the hot path. Of course, this information is not guaranteed to hold for all the subsequent executions of the hot path. Since optimizations rely on that information, the hot path is augmented with guards that check the profiled conditions, such as, for example, variable types and constant variables. When a guard fails, execution jumps back to the old, non-optimized code. The main hypotheses of tracing compilers, confirmed by the practice, are: (i) loop bodies are the most interesting code to optimize, so they only consider paths inside program loops; and (ii) optimizing straight-line code is easier than a whole-method analysis (involving loops, goto, etc.). Hence, tracing JIT compilers look quite different than traditional compilers. These differences raise some natural questions on trace compilation: (i) what is a viable formal model, which is generic yet realistic enough to capture the behavior of real optimizers? (ii) which optimizations are sound? (iii) how can one prove their soundness? In this paper we answer these questions. Our formal model is based on program trace semantics [Cousot 2002] and abstract interpretation [Cousot and Cousot 1977; Cousot and Cousot 2002]. Hot path detection is modeled just as an abstraction of the trace semantics of the program, which only retains: (i) the sequences of program points which are repeated more than some threshold; (ii) an abstraction of the possible program stores, e.g., the type of the variables instead of their concrete values. As a consequence, a hot path does not contain loops nor join points. Furthermore, in the hot path, all the correctness conditions (i.e., guards) are explicit, for instance before performing integer addition, we should check that the operands are integers. If the guard condition is not satisfied then the execution leaves the hot path, reverting to the non-optimized code. Guards are essentially elements of some abstract domain, which is then left as a parameter in our model. The hot path is then optimized using standard compilation techniques—we only require the optimization to be sound. We define the correctness of the residual (or extracted) program in terms of an abstraction of its trace semantics: the residual program is correct if it is indistinguishable, up to some abstraction of its trace semantics, from the original program. Examples of abstractions are the program store at the exit of a method, or the stores at loop entry and loop exit points. Main Contributions. This paper puts forward a formal model of TJITC whose key fea- tures are as follows: ACM Transactions on Programming Languages and Systems, Vol. V, No. N, Article A, Publication date: January YYYY. An Abstract Interpretation-based Model of Tracing Just-In-Time Compilation A:3 – We provide the first model of tracing compilation based on abstract interpretation of trace semantics of programs. – We provide a more general and realistic framework than the model of TJITC by Guo and Palsberg [2011] based on program bisimulations: we employ a less restrictive correctness criterion that enables the correctness proof of practically implemented optimizations; hot paths can be annotated with runtime information on the stores, notably type information; optimized hot loops can be re-entered. – We formalize and prove the correctness of type specialization of hot paths. Our model focusses on source-to-source program transformations and optimizations of a low level imperative language with untyped global variables, which may play the role of intermediate language of some virtual machine. Our starting point is that program optimizations can be seen as transformations that lose some information on the original program, so that optimizations can be viewed as approximations and in turn can be formalized as abstract interpretations. More precisely, we rely on the insight by Cousot and Cousot [2002] that a program source can be seen as an abstraction of its trace semantics, i.e. the set of all possible execution sequences, so that a sourceto-source optimization can be viewed as an abstraction of a transform of the program trace semantics. In our model, soundness of program optimizations is defined as program equivalence w.r.t. an observational abstract interpretation of the program trace semantics. Here, an observational abstraction induces a correctness criterion by describing what is observable about program executions, so that program equivalence means that two programs are indistinguishable by looking only at their observable behaviors. A crucial part of tracing compilation is the selection of the hot path(s) to optimize. This choice is made at runtime based on program executions, so it can be seen once again as an abstraction of trace semantics. Here, a simple trace abstraction selects cyclic instruction sequences, i.e. loop paths, that appear at least N times within a single execution trace. These instruction sequences are recorded together with some property of the values assumed by program variables at that point, which is represented as an abstract store belonging to a suitable store abstraction, which in general depends on the successive optimizations to perform. A program optimization can be seen as an abstraction of a semantic transformation of program execution traces, as described by Cousot and Cousot [2002]. The advantage of this approach is that optimization properties, such as their correctness, are easier to prove at a semantic level. The optimization itself can be defined on the whole program or, as in the case of real tracing JIT compilers, can be restricted to the hot path. This latter restriction is achieved by transforming the original program so that the hot path is extracted, i.e. made explicit: the hot path is added to the program as a path with no join points that jumps back to the original code when execution leaves it. A guard is placed before each command in this hot path that checks if the necessary conditions, as selected by the store abstraction, are satisfied. A program optimization can then be confined to the hot path only, making it linear, by ignoring the parts of the program outside it. The guards added to the hot path allows us to retain precision. We apply our TJITC model to type specialization. Type specialization is definitely the key optimization for dynamic languages such as Javascript [Gal et al. 2009], as they make available generic operations whose execution depends on the type of runtime values of their operands. Moreover, as a further application of our model, we consider the constant variable folding optimization along hot paths, which relies on the standard constant propagation abstract domain [Wegman and Zadeck 1991]. Related Work. A formal model for tracing JIT compilation has been put forward by Guo and Palsberg [2011] at POPL symposium. It is based on operational bisimulation ACM Transactions on Programming Languages and Systems, Vol. V, No. N, Article A, Publication date: January YYYY. A:4 S. Dissegna et al. [Milner 1995] to describe the equivalence between source and optimized programs. We show how this model can be expressed within our framework through the following steps: Guo and Palsberg’s language is compiled into ours; we then exhibit an observational abstraction which is equivalent to Guo and Palsberg’s correctness criterion; finally, after some minor changes that address a few differences in path selection, the transformations performed on the source program turn out to be the same. Our framework overcomes some significant limitations in Guo and Palsberg’s model. The bisimulation equivalence model used in [Guo and Palsberg 2011] implies that the optimized program has to match every change to the store made by the original program, whereas in practice we only need this match to hold in certain program points and for some variables, such as in output instructions. This limits the number of real optimizations that can be modeled in this framework. For instance, dead store elimination is proven unsound in [Guo and Palsberg 2011], while it is implemented in actual tracing compilers [Gal et al. 2009, Section 5.1]. Furthermore, their formalization fails to model some important features of actual TJITC implementation: (i) traces are mere linear paths of instructions, i.e., they cannot be annotated with store properties; (ii) hot path selection is completely non-deterministic, since they do not model a selection criterion; and, (iii) once execution leaves an optimized hot path the program will not be able to re-enter it. It is also worth citing that abstract interpretation of program trace semantics roots at the foundational work by Cousot [1997; 2002] and has been widely used as a technique for defining a range of static program analyses [Barbuti et al. 1999; Colby and Lee 1996; Handjieva and Tzolovski 1998; Logozzo 2009; Rival and Mauborgne 2007; Schmidt 1998; Spoto and Jensen 2003]. Also, Rival [2004] describes various program optimizations as the trace abstractions they preserve. In the Cousot and Cousot terminology [Cousot and Cousot 2002], Rival’s approach corresponds to offline transformations whereas tracing compilation is an online transformation. Structure. The rest of the paper is organized as follows. Sections 2 and 3 contain some necessary background: the language considered in the paper and its operational trace semantics are defined in Section 2, while Section 3 recalls some basic notions of abstract interpretation, in particular for defining abstract domains of program stores. Hot paths are formally defined in Section 4 as a suitable abstract interpretation of program traces, while Section 5 defines the program transform for extracting a given hot path. The correctness of the hot path extraction transform is defined and proved correct in Section 6, which also introduces in Subsection 6.2 program optimizations along hot paths together with a methodology for proving their correctness. Section 7 applies our model of hot path optimization to type specialization of untyped program commands, while Section 8 describes an application to constant variable folding along hot paths. Nested hot paths and the corresponding program transform for their extraction are the subject of Section 9. Section 10 provides a thorough formal comparison of our model with Guo and Palsberg [2011]’s framework for tracing compilation. Finally, Section 11 concludes, also discussing some directions for future work. This is an expanded and revised version of the POPL symposium article [Dissegna et al. 2014] including all the proofs. 2. LANGUAGE AND CONCRETE SEMANTICS 2.1. Notation Given a finite set X of objects, we will use the following notation concerning sequences: ǫ is the empty sequence; X + is the set of nonempty finite sequences of objects of X; X ∗ , X + ∪ {ǫ}; if σ ∈ X ∗ then |σ| denotes the length of σ; indices of objects in a ACM Transactions on Programming Languages and Systems, Vol. V, No. N, Article A, Publication date: January YYYY. An Abstract Interpretation-based Model of Tracing Just-In-Time Compilation A:5 nonempty sequence σ ∈ X + start from 0 and thus range in the interval [0, |σ|) , [0, |σ| − 1]; if σ ∈ X + and i ∈ [0, |σ|) then σi ∈ X (or σ(i)) denotes the i-th object in σ; if σ ∈ X ∗ and i, j ∈ [0, |σ|) then σ[i,j] ∈ X ∗ denotes the subsequence σi σi+1 . . . σj , which is therefore the empty sequence if j < i, while if k ∈ N then σk ∈ X ∗ denotes the suffix σk σk+1 . . . σ|σ|−1 , which is the empty sequence when k ≥ |σ|. If f : X → Y is any function then its collecting version f c : ℘(X) → ℘(Y ) is defined pointwise by f c (S) , {f (x) ∈ Y | x ∈ S}, and when clear from the context, by a slight abuse of notation, it is sometimes denoted by f itself. 2.2. Syntax We consider a basic low level language with untyped global variables, a kind of elementary dynamic language, which is defined through the notation used in [Cousot and Cousot 2002]. Program commands range in C and consist of a labeled action which specifies a next label (Ł is the undefined label, where the execution becomes stuck: it is used for defining final commands). Labels: Values: Variables: Expressions: Boolean Expressions: Actions: Commands: L∈L Ł 6∈ L v ∈ Value x ∈ Var Exp ∋ E ::= v | x | E1 + E2 BExp ∋ B ::= tt | ff | E1 ≤ E2 | ¬B | B1 ∧ B2 A ∋ A ::= x := E | B | skip C ∋ C ::= L : A → L′ (with L′ ∈ L ∪{Ł}) For any command L : A → L′ , we use the following notation: lbl(L : A → L′ ) , L, act(L : A → L′ ) , A, suc(L : A → L′ ) , L′ . Commands L : B → L′ whose action is a Boolean expression are called conditionals. A program P ∈ ℘(C) is a (possibly infinite, at least in theory) set of commands. In order to be well-formed, if a program P includes a conditional C ≡ L : B → L′ then P must also include a unique complement conditional L : ¬B → L′′ , which is denoted by cmpl(C) or C c , where ¬¬B is taken to be equal to B, so that cmpl(cmpl(C)) = C. The set of well-formed programs is denoted by Program. In our examples, programs P will be deterministic, i.e., for any C1 , C2 ∈ P such that lbl(C1 ) = lbl(C2 ): (1) if act(C1 ) 6= act(C2 ) then C1 = cmpl(C2 ); (2) if act(C1 ) = act(C2 ) then C1 = C2 . We say that two programs P1 and P2 are equal up to label renaming, denoted by P1 ∼ = P2 , when there exists a suitable renaming for the labels of P1 that makes P1 equal to P2 . 2.3. Transition Semantics The language semantics relies on values ranging in Value, possibly undefined values ranging in Valueu , truth values in Bool, possibly undefined truth values ranging in Boolu and type names ranging in Types, which are defined as follows: Value , Z ∪ Char∗ Bool , {true, false} Valueu , Z ∪ Char∗ ∪{undef} Boolu , {true, false, undef} Types , {Int, String, Undef, ⊤T , ⊥T } ACM Transactions on Programming Languages and Systems, Vol. V, No. N, Article A, Publication date: January YYYY. A:6 S. Dissegna et al. E : Exp → Store → Valueu EJvKρ , v EJxKρ , ρ(x)  EJE1 Kρ +Z EJE2 Kρ EJE1 + E2 Kρ , EJE1 Kρ · EJE2 Kρ  undef if type(EJEi Kρ) = Int if type(EJEi Kρ) = String otherwise B : BExp → Store → Boolu BJttKρ , true BJ ff Kρ , false  EJE1 Kρ ≤Z EJE2 Kρ BJE1 ≤ E2 Kρ , ∃σ ∈ String . EJE2 Kρ = (EJE1 Kρ)·σ  undef BJ¬BKρ , ¬BJBKρ if type(EJEi Kρ) = Int if type(EJEi Kρ) = String otherwise BJB1 ∧ B2 Kρ , BJB1 Kρ ∧ BJB2 Kρ A : A → Store → Store ∪ {⊥} AJskipKρ , ρ  ρ[x/EJEKρ] if EJEKρ 6= undef AJx := EKρ , ⊥ if EJEKρ = undef  ρ if BJBKρ = true AJBKρ , ⊥ if BJBKρ ∈ {false, undef} Fig. 1. Semantics of program expressions and actions. where Char is a nonempty finite set of characters and undef is a distinct symbol. The mapping type : Valueu → Types provides the type of any possibly undefined value:  if v ∈ Z Int type(v) , String if v ∈ Char∗  Undef if v = undef The type names ⊥T and ⊤T will be used in Section 7 as, respectively, top and bottom type, that is, subtype and supertype of all types. Let Store , Var → Valueu denote the set of possible stores on variables in Var, where ρ(x) = undef means that the store ρ is not defined on a program variable x ∈ Var. Hence, let us point out that the symbol undef will be used to represent both store undefinedness and a generic error when evaluating an expression (e.g., additions and comparisons between integers and strings), two situations which are not distinguished in our semantics. A store ρ ∈ Store will be denoted by [x/ρ(x)]ρ(x)6=undef , thus omitting undefined variables, while [ ] will denote the totally undefined store. If P ∈ Program then vars(P ) denotes the set of variables in Var that occur in P , so that StoreP , vars(P ) → Valueu is the set of possible stores for P . The semantics of expressions E, Boolean expressions B and program actions A is standard and goes as defined in Fig. 1. Let us remark that: (i) the binary function +Z denotes integer addition, ≤Z denotes integer comparison, while · is string concatenation; ACM Transactions on Programming Languages and Systems, Vol. V, No. N, Article A, Publication date: January YYYY. An Abstract Interpretation-based Model of Tracing Just-In-Time Compilation A:7 (ii) logical negation and conjunction in Boolu are extended in order to handle undef as follows: ¬undef = undef and undef ∧ b = undef = b ∧ undef; (iii) ρ[x/v] denotes a store update for the variable x with v ∈ Value; (iv) the distinct symbol ⊥ 6∈ Valueu is used to denote the result of: AJx := EKρ when the evaluation of the expression E for ρ generates an error; AJBKρ when the evaluation of the Boolean expression B for ρ is either false or generates an error. With a slight abuse of notation we also consider the collecting versions of the semantic functions in Fig. 1, which are defined as follows: E : Exp → ℘(Store) → ℘(Valueu ) EJEKS , {EJEKρ ∈ Valueu | ρ ∈ S} B : BExp → ℘(Store) → ℘(Store) BJBKS , {ρ ∈ S | BJBKρ = true} A : A → ℘(Store) → ℘(Store) AJAKS , {AJAKρ | ρ ∈ S, AJAKρ ∈ Store} Let us point out that, in the above collecting versions, if EJEKρ = undef then EJEK{ρ} = {undef} and AJx := EK{ρ} = ∅, while if BJBKρ ∈ {false, undef} then BJBK{ρ} = ∅ and AJBK{ρ} = ∅. Generic program states are pairs of stores and commands: State , Store × C. We extend the previous functions lbl, act and suc to be defined on states, meaning that they are defined on the command component of a state. Also, store(s) and cmd (s) return, respectively, the store and the command of a state s. The transition semantics S : State → ℘(State) is a relation between generic states defined as follows: Shρ, Ci , {hρ′ , C ′ i ∈ State | ρ′ ∈ AJact(C)K{ρ}, suc(C) = lbl(C ′ )}. If P is a program then StateP , StoreP ×P is the set of possible states of P . Given P ∈ Program, the program transition relation SJP K : StateP → ℘(StateP ) between states of P is defined as: SJP Khρ, Ci , {hρ′ , C ′ i ∈ StateP | ρ′ ∈ AJact(C)K{ρ}, C ′ ∈ P, suc(C) = lbl(C ′ )}. Let us remark that, according to the above definition, if C ≡ L : A → L′ , C1 ≡ L′ : B → L′′ and C1c ≡ L′ : ¬B → L′′′ are all commands in P and ρ′ ∈ AJAKρ then we have that SJP Khρ, Ci = {hρ′ , C1 i, hρ′ , C1c i}. A state s ∈ StateP is stuck for P when SJP Ks = ∅. Let us point that: (i) If the conditional command of a state s = hρ, L : B → L′ i ∈ StateP is such that BJBKρ = false then s is stuck for P because there exists no store ρ′ ∈ AJBK{ρ} = ∅. (ii) If the command of a state s = hρ, L : A → Łi ∈ StateP has the undefined label Ł as next label then s is stuck for P . (iii) We have a stuck state s when an error happens. E.g., this is the case for an undefined evaluation of an addition as in s = h[y/3, z/foo], L : x := y + z → L′ i and for an undefined evaluation of a Boolean expression as in s = h[y/3, z/foo], L : y ≤ x → L′ i. Programs typically have an entry point, and this is modeled through a distinct initial label Lι ∈ L from which execution starts. StateιP , {hρ, Ci | lbl(C) = Lι } denotes the set of possible initial states for P . 2.3.1. Trace Semantics. A partial trace is any nonempty finite sequence of generic program states which are related by the transition relation S. Hence, the set Trace of ACM Transactions on Programming Languages and Systems, Vol. V, No. N, Article A, Publication date: January YYYY. A:8 S. Dissegna et al. partial traces is defined as follows: Trace , {σ ∈ State+ | ∀i ∈ [1, |σ|). σi ∈ Sσi−1 }. The partial trace semantics of P ∈ Program is in turn defined as follows: TJP K = TraceP , {σ ∈ (StateP )+ | ∀i ∈ [1, |σ|). σi ∈ SJP Kσi−1 }. A trace σ ∈ TraceP is complete if for any state s ∈ StateP , σs 6∈ TraceP and sσ 6∈ TraceP . Observe that TraceP contains all the possible partial traces of P , complete traces included. Let us remark that a trace σ ∈ TraceP does not necessarily begin with an initial state, namely it may happen that σ0 6∈ StateιP . Traces of P starting from initial states are denoted by Tι JP K = TraceιP , {σ ∈ TraceP | σ0 ∈ StateιP }. Also, a complete trace σ ∈ TraceιP such that suc(σ|σ|−1 ) = Ł corresponds to a terminating run of the program P . Example 2.1. Let us consider the program Q below written in some while-language: x := 0; while (x ≤ 20) do x := x + 1; if (x%3 = 0) then x := x + 3; Its translation as a program P in our language is given below, with Lι = L0 , where, with a little abuse, we assume an extended syntax that allows expressions like x%3 = 0.  P = C0 ≡ L0 : x := 0 → L1 , C1 ≡ L1 : x ≤ 20 → L2 , C1c ≡ L1 : ¬(x ≤ 20) → L5 , C2 ≡ L2 : x := x + 1 → L3 , C3 ≡ L3 : (x%3 = 0) → L4 , C3c ≡ L3 : ¬(x%3 = 0) → L1 C4 ≡ L4 : x := x + 3 → L1 , C5 ≡ L5 : skip → Ł Its trace semantics from initial states TraceιP includes the following complete traces, where [ ] is the initial totally undefined store. h[ ], C0 ih[x/0], C1c i h[ ], C0 ih[x/0], C1 ih[x/0], C2 ih[x/1], C3 i h[ ], C0 ih[x/0], C1 ih[x/0], C2 ih[x/1], C3c ih[x/1], C1c i ··· ··· h[ ], C0 ih[x/0], C1 ih[x/0], C2 ih[x/1], C3c ih[x/1], C1 i · · · h[x/21], C4 ih[x/24], C1 i h[ ], C0 ih[x/0], C1 ih[x/0], C2 ih[x/1], C3c ih[x/1], C1 i · · · h[x/21], C4 ih[x/24], C1c ih[x/24], C5 i Observe that the last trace corresponds to a terminating run of P . 3. ABSTRACTIONS 3.1. Abstract Interpretation Background In standard abstract interpretation [Cousot and Cousot 1977; Cousot and Cousot 1979], abstract domains, also called abstractions, are specified by Galois connections/insertions (GCs/GIs for short) or, equivalently, adjunctions. Concrete and abstract domains, hC, ≤C i and hA, ≤A i, are assumed to be complete lattices which are related by abstraction and concretization maps α : C → A and ACM Transactions on Programming Languages and Systems, Vol. V, No. N, Article A, Publication date: January YYYY. An Abstract Interpretation-based Model of Tracing Just-In-Time Compilation A:9 γ : A → C such that, for all a and c, α(c) ≤A a ⇔ c ≤C γ(a). A GC is a GI when α ◦ γ = λx.x. It is well known that a join-preserving α uniquely determines, by adjunction, γ as follows: γ(a) = ∨{c ∈ C | α(c) ≤A a}; conversely, a meet-preserving γ uniquely determines, by adjunction, α as follows: α(c) = ∧{a ∈ A | c ≤C γ(a)}. Let f : C → C be some concrete monotone function—for simplicity, we consider 1-ary functions—and let f ♯ : A → A be a corresponding monotone abstract function defined on some abstraction A related to C by a GC. Then, f ♯ is a correct abstract interpretation of f on A when α ◦ f ⊑ f ♯ ◦ α holds, where ⊑ denotes the pointwise ordering between functions. Moreover, the abstract function f A , α ◦ f ◦ γ : A → A is called the best correct approximation of f on A because any abstract function f ♯ is correct iff f A ⊑ f ♯ . Hence, for any A, f A plays the role of the best possible approximation of f on the abstraction A. 3.2. Store Abstractions As usual in abstract interpretation [Cousot and Cousot 1977], a store property is modeled by some abstraction Store♯ of ℘(Store) which is formalized through a Galois connection: (αstore , h℘(Store), ⊆i, hStore♯ , ≤i, γstore ). Given a program P , when Store♯ is viewed as an abstraction of h℘(StoreP ), ⊆i we emphasize it by adopting the notation Store♯P . A store abstraction Store♯P also induces a state abstraction State♯P , Store♯P ×P and, in turn, a trace abstraction defined by Trace♯P , (State♯P )∗ . 3.2.1. Nonrelational Abstractions. Nonrelational store abstractions (i.e., relationships between program variables are not taken into account) can be easily designed by a standard pointwise lifting of some value abstraction. Let Value♯ be an abstraction of sets of possibly undefined values in ℘(Valueu ) as formalized by a Galois connection (αvalue , h℘(Valueu ), ⊆i, hValue♯ , ≤Value♯ i, γvalue ). The abstract domain Value♯ induces a nonrelational store abstraction ρ♯ ∈ Store♯value , hVar → Value♯ , ⊑i where ⊑ is the pointwise ordering induced by ≤Value♯ : ρ♯1 ⊑ ρ♯2 iff for all x ∈ Var, ρ♯1 (x) ≤Value♯ ρ♯2 (x). Hence, the bottom and top abstract stores are, respectively, ♯ λx.⊥Value♯ and λx.⊤Value♯ . The abstraction map α⊑ value : ℘(Store) → Storevalue is defined as follows: α⊑ value (S) , λx.αvalue ({ρ(x) ∈ Valueu | ρ ∈ S}) ⊑ The corresponding concretization map γvalue : Store♯value → ℘(Store) is defined, as recalled in Section 3.1, by adjunction from the abstraction map α⊑ value and it is easy to check that it can be given as follows: ⊑ γvalue (ρ♯ ) = {ρ ∈ Store | ∀x ∈ Var . ρ(x) ∈ γvalue (ρ♯ (x))}. Let us observe that: (i) α⊑ value (∅) = λx.αvalue (∅) = λx.⊥Value♯ because αvalue (∅) = ⊥Value♯ always holds in a GC; (ii) α⊑ value ({[ ]}) = λx.αvalue ({undef}); ACM Transactions on Programming Languages and Systems, Vol. V, No. N, Article A, Publication date: January YYYY. A:10 S. Dissegna et al. ⊑ (iii) if γvalue (⊥Value♯ ) = ∅, ρ♯ ∈ Store♯value and ρ♯ (x) = ⊥Value♯ then γvalue (ρ♯ ) = ∅; ⊑ (iv) if γvalue (⊥Value♯ ) = {undef} then γvalue (λx.⊥Value♯ ) = {[ ]}. Example 3.1 (The constant propagation abstraction). The constant propagation (see [Wegman and Zadeck 1991]) lattice hCP, i is depicted below. ⊤ · · · v−2 v−1 v0 v1 v2 · · · ⊥ where {vi }i∈Z is any enumeration of Valueu , thus undef is included. Abstraction αcp : ℘(Valueu ) → CP and concretization γcp : CP → ℘(Valueu ) functions are defined as follows:   if a = ⊥ ⊥ if S = ∅ ∅ αcp (S) , vi if S = {vi } γcp (a) , {vi } if a = vi   ⊤ otherwise Valueu if a = ⊤ and give rise to a GI (αcp , h℘(Valueu ), ⊆i, hCP, i, γcp ). The corresponding nonrelational ˙ where αCP : ℘(Store) → CPst and store abstraction is denoted by CPst , hVar → CP, i, γCP : CPst → ℘(Store) denote the abstraction and concretization maps. For example, for Var = {x, y, z, w} and omitting the bindings v/undef also in abstract stores, we have that: αCP ({[x/2, y/foo, z/1], [x/2, y/bar]}) = [x/2, y/⊤, z/⊤], γCP ([x/2, y/⊤, w/foo]) = {ρ ∈ Store | ρ(x) = 2, ρ(y) ∈ Valueu , ρ(z) = undef, ρ(w) = foo}, γCP ([x/2, y/⊤, w/⊥]) = ∅. 4. HOT PATH SELECTION A loop path is a sequence of program commands which is repeated in some execution of a program loop, together with a store property which is valid at the entry of each command in the path. A loop path becomes hot when, during the execution, it is repeated at least a fixed number N of times. In a TJITC, hot path selection is performed by a loop path monitor that also records store properties (see, e.g., [Gal et al. 2009]). Here, hot path selection is not operationally defined, it is instead semantically modeled as an abstraction map over program traces, i.e., program executions. Given a program P and therefore its trace semantics TraceP , we first define a mapping loop : TraceP → ℘(TraceP ) that returns all the loop paths in some execution trace of P . More precisely, a loop path is a proper substring (i.e., a segment) τ of a program trace σ such that: (1) the successor command in σ of the last state in τ exists and coincides with the command – or its complement, when this is the last loop iteration – of the first state in τ ; (2) there is no other such command within τ (otherwise the sequence τ would contain multiple iterations); (3) the last state of τ performs a backward jump in the program P . ACM Transactions on Programming Languages and Systems, Vol. V, No. N, Article A, Publication date: January YYYY. An Abstract Interpretation-based Model of Tracing Just-In-Time Compilation A:11 To recognize backward jumps, we consider a topological order on the control flow graph of commands in P , denoted by ⋖. This leads to the following formal definition:  loop(hρ0 , C0 i · · · hρn , Cn i) , hρi , Ci ihρi+1 , Ci+1 i · · · hρj , Cj i | 0 ≤ i ≤ j < n, Ci ⋖ Cj , suc(Cj ) = lbl(Ci ), ∀k ∈ (i, j]. Ck 6∈ {Ci , cmpl(Ci )} . Let us remark that a loop path hρi , Ci i · · · hρj , Cj i ∈ loop(hρ0 , C0 i · · · hρn , Cn i) may contain some sub-loop path, namely it may happen that loop(hρi , Ci i · · · hρj , Cj i) 6= ∅ so that some commands Ck , with k ∈ [i, j], may occur more than once in hρi , Ci i · · · hρj , Cj i; for example, this could be the case of a while loop whose body includes a nested while loop. We abuse notation by using αstore to denote a map αstore : TraceP → Trace♯P which “abstracts” a program trace τ into Trace♯P by abstracting the sequence of stores occurring in τ : αstore (hρ0 , C0 i · · · hρn , Cn i) , hαstore ({ρ0 }), C0 i · · · hαstore ({ρn }), Cn i. Given a static integer parameter N > 0, we define a function hot N : TraceP → ℘(Trace♯P ) which returns the set of Store♯ -abstracted loop paths appearing at least N times in some program trace. In order to count the number of times a loop path appears within a trace we need an auxiliary function count : Trace♯P × Trace♯P → N such that count(σ, τ ) yields the number of times an abstract path τ occurs in an abstract trace σ: ′ count(ha0 , C0 i · · · han , Cn i, hb0 , C0′ i · · · hbm , Cm i) ,  n−m X 1 if hai , Ci i · · · hai+m , Ci+m i = hb0 , C ′ i · · · hbm , C ′ i 0 m 0 otherwise i=0 Hence, hot N can be defined as follows:  hot N (σ ≡ hρ0 , C0 i · · · hρn , Cn i) , hai , Ci i · · · haj , Cj i | ∃hρi , Ci i · · · hρj , Cj i ∈ loop(σ) s.t. αstore (hρi , Ci i · · · hρj , Cj i) = hai , Ci i · · · haj , Cj i, count(αstore (σ), hai , Ci i · · · haj , Cj i) ≥ N . ♯ Finally, an abstraction map αN hot : ℘(TraceP ) → ℘(TraceP ) collects the results of applying hot N to a set of traces: [ αN hot N (σ). hot (T ) , σ∈T A N -hot path hp in a program P is therefore any hp ∈ αN hot (TraceP ) and is compactly denoted as hp = ha0 , C0 , ..., an , Cn i. Let us observe that if the hot path corresponds to the body of some while loop then its first command C0 is a conditional, namely C0 is the Boolean guard of the while loop. We define the successor function next for indices in a hot path ha0 , C0 , ..., an , Cn i as follows: next , λi. i = n ? 0 : i + 1. For a N -hot path ha0 , C0 , ..., an , Cn i ∈ αN hot (TraceP ), for any i ∈ [0, n], if Ci is a conditional command Li : Bi → Lnext(i) then throughout the paper its complement Cic = cmpl(Ci ) will be also denoted by Li : ¬Bi → Lcnext(i) . ACM Transactions on Programming Languages and Systems, Vol. V, No. N, Article A, Publication date: January YYYY. A:12 S. Dissegna et al. Example 4.1. Let us consider the program P in Example 2.1 and a trivial one-point store abstraction Store♯ = {⊤}, where all the stores are abstracted to the same abstract store ⊤, i.e., αstore = λS.⊤. Here, we have two 2-hot paths in P , that is, it turns out that α2hot (TraceP ) = {hp1 , hp2 } where: hp1 = h⊤, C1 ≡ L1 : x ≤ 20 → L2 , ⊤, C2 ≡ L2 : x := x + 1 → L3 , ⊤, C3c ≡ L3 : ¬(x%3 = 0) → L1 i; hp2 = h⊤, C1 ≡ L1 : x ≤ 20 → L2 , ⊤, C2 ≡ L2 : x := x + 1 → L3 , ⊤, C3 ≡ L3 : (x%3 = 0) → L4 , ⊤, C4 ≡ x := x + 3 → L1 i. Therefore, the hot paths hp1 and hp2 correspond, respectively, to the cases where the Boolean test (x%3 = 0) fails and succeeds. Observe that the maximal sequence of different values assumed by the program variable x is as follows: ? 7→ 0 7→ 1 7→ 2 7→ 3 7→ 6 7→ 7 7→ 8 7→ 9 7→ 12 7→ 13 7→ 14 7→ 15 7→ 18 7→ 19 7→ 20 7→ 21 7→ 24 Hence, if σ is the complete terminating trace of P in Example 2.1 then it turns out that count(αstore (σ), hp1 ) = 8 and count(αstore (σ), hp2 ) = 4. 5. TRACE EXTRACTION For any abstract store a ∈ Store♯ , a corresponding Boolean expression denoted by guard Ea ∈ BExp is defined (where the notation Ea should hint at an expression which is induced by the abstract store a), whose semantics is as follows: for any ρ ∈ Store,  true if ρ ∈ γstore (a) BJguard Ea Kρ , false if ρ 6∈ γstore (a) In turn, we also have program actions guard Ea ∈ A such that:  ρ if ρ ∈ γstore (a) AJguard Ea Kρ , ⊥ if ρ 6∈ γstore (a) Let P be a program and hp = ha0 , C0 , ..., an , Cn i ∈ αN hot (TraceP ) be a hot path on some ♯ store abstraction Store . We define a syntactic transform of P where the hot path hp is explicitly extracted from P . This is achieved by a suitable relabeling of each command Ci in hp which is in turn preceded by the conditional guard Eai induced by the corresponding store property ai . To this aim, we consider three injective relabeling functions ℓ : [0, n] → L1 l : [1, n] → L2 (·) : L → L (∗) where L1 , L2 and L are pairwise disjoint sets of fresh labels, so that labels(P )∩(L1 ∪L2 ∪ L) = ∅. The transformed program extr hp (P ) for the hot path hp is defined as follows and a graphical example of this transform is depicted in Fig. 2. Definition 5.1 (Trace extraction transform). The trace extraction transform of P for the hot path hp = ha0 , C0 , ..., an , Cn i is:  extr hp (P ) , P r {C0 } ∪ {cmpl(C0 ) | cmpl(C0 ) ∈ P } ∪ {L0 : act(C0 ) → L1 } ∪ {L0 : ¬act(C0 ) → Lc1 | cmpl(C0 ) ∈ P } ∪ stitch P (hp) ACM Transactions on Programming Languages and Systems, Vol. V, No. N, Article A, Publication date: January YYYY. An Abstract Interpretation-based Model of Tracing Just-In-Time Compilation A:13 . . . L0 guard Ea0 . . . L0 B0 ℓ0 B0 Lc1 B0 L0 Lc1 Lc1 l1 guard Ea1 L1 A1 L1 A1 ℓ1 L2 A1 L2 . . . . . . l2 . . . Ln An ln guard Ean Ln An ℓn An Fig. 2. An example of trace extraction transform: on the left, a hot path hp with commands in pink (in black/white: loosely dotted) shapes; on the right, the corresponding trace transform extr hp (P ) with new commands in blue (in black/white: densely dotted) shapes. where the stitch of hp into P is defined as follows: stitch P (hp) , {L0 : guard Ea0 → ℓ0 , L0 : ¬guard Ea0 → L0 } ∪ {ℓi : act(Ci ) → li+1 | i ∈ [0, n − 1]}∪{ℓn : act(Cn ) → L0 } ∪ {ℓi : ¬act(Ci ) → Lcnext(i) | i ∈ [0, n], cmpl(Ci ) ∈ P } ∪ {li : guard Eai → ℓi , li : ¬guard Ea i → Li | i ∈ [1, n]}. The new command L0 : guard Ea0 → ℓ0 is therefore the entry conditional of the stitched hot path stitch P (hp), while any command C ∈ stitch P (hp) such that suc(C) ∈ labels(P ) ∪ L is a potential exit (or bail out) command of stitch P (hp). L EMMA 5.2. If P is well-formed then, for any hot path hp, extr hp (P ) is well-formed. P ROOF. Recall that a program is well-formed when for any its conditional command it also includes a unique complement conditional. It turns out that extr hp (P ) is wellformed because: (1) P is well-formed; (2) for each conditional in Pnew = extr hp (P ) r P = ACM Transactions on Programming Languages and Systems, Vol. V, No. N, Article A, Publication date: January YYYY. A:14 S. Dissegna et al. stitch P (hp) ∪ {L0 : act(C0 ) → L1 } ∪ {L0 : ¬act(C0 ) → Lc1 | cmpl(C0 ) ∈ P } we also have a unique complement conditional in Pnew . Moreover, observe that if P is deterministic then extr hp (P ) still is deterministic. Let us remark that the stitch of the hot path hp into P is always a linear sequence of different commands, namely, stitch P (hp) does not contain loops nor join points. Furthermore, this happens even if the hot path hp does contain some inner sub-loop. Technically, this is achieved as a consequence of the fact that the above relabeling functions ℓ and l are required to be injective. Hence, even if some command C occurs more than once inside hp, e.g., Ci = C = Cj for some i, j ∈ [0, n − 1] with i 6= j, then these multiple occurrences of C in hp are transformed into differently labeled commands in stitch P (hp), e.g., because ℓi 6= ℓj and li+1 6= lj+1 . Let us now illustrate the trace extraction transform on a first simple example. Example 5.3. Let us consider the program P in Example 2.1 and the hot path hp = h⊤, C1 , ⊤, C2 , ⊤, C3c i in Example 4.1 (denoted there by hp1 ), where stores are abstracted to the trivial one-point abstraction Store♯ = {⊤}. Here, for any ρ ∈ Store, we have that BJguard E⊤ Kρ = true. The trace extraction transform of P w.r.t. hp is therefore as follows: extr hp (P ) = P r {C1 , C1c } ∪ {L1 : x ≤ 20 → L2 , L1 : ¬(x ≤ 20) → L5 } ∪ stitch P (hp) where stitch P (hp) = {H0 ≡ L1 : guard E⊤ → ℓ0 , H0c ≡ L1 : ¬guard E⊤ → L1 } ∪ {H1 ≡ ℓ0 : x ≤ 20 → l1 , H1c ≡ ℓ0 : ¬(x ≤ 20) → L5 } ∪ {H2 ≡ l1 : guard E⊤ → ℓ1 , H2c ≡ l1 : ¬guard E⊤ → L2 } ∪ {H3 ≡ ℓ1 : x := x + 1 → l2 } ∪ {H4 ≡ l2 : guard E⊤ → ℓ2 , H4c ≡ l2 : ¬guard E⊤ → L3 } ∪ {H5 ≡ ℓ2 : ¬(x%3 = 0) → L1 , H5c ≡ ℓ2 : (x%3 = 0) → L4 }. The flow graph of extr hp (P ) is depicted in Figure 3, while a higher level representation using while-loops and gotos is as follows: x := 0; L1 : while guard E⊤ do if ¬(x ≤ 20) then goto L5 if ¬guard E⊤ then goto L2 x := x + 1; if ¬guard E⊤ then goto L3 if (x%3 = 0) then goto L4 if ¬(x ≤ 20) then goto L5 L2 : x := x + 1; L3 : if ¬(x%3 = 0) then goto L1 L4 : x := x + 3; goto L1 ; L5 : skip; 6. CORRECTNESS As advocated by Cousot and Cousot [2002, par. 3.8], correctness of dynamic program transformations and optimizations should be defined with respect to some observational abstraction of program trace semantics: a dynamic program transform is correct ACM Transactions on Programming Languages and Systems, Vol. V, No. N, Article A, Publication date: January YYYY. An Abstract Interpretation-based Model of Tracing Just-In-Time Compilation A:15 L0 C0 x := 0 L1 H0 H0c guard E⊤ L1 C1 ℓ0 H1 H1c x ≤ 20 C1c x ≤ 20 L5 L2 l1 H2 H2c C2 x := x + 1 C5 skip Ł guard E⊤ L3 ℓ1 H3 x := x + 1 C3 C3c l2 H4 H4c guard E⊤ x%3 = 0 L4 C4 x := x + 3 ℓ2 H5 H5c ¬(x%3 = 0) Fig. 3. The flow graph of the trace extraction transform extr hp (P ) in Example 5.3, where commands of stitch P (hp) are in blue (in black/white: densely dotted) shapes, while commands of the source program P are in pink (in black/white: loosely dotted) shapes. when, at some level of abstraction, the observation of the execution of the subject program is equivalent to the observation of the execution of the transformed/optimized program. Store Changes Abstraction. The approach by Guo and Palsberg [2011] to tracing compilation basically relies on a notion of correctness that requires the same store changes to happen in both the transformed/optimized program and the original program. This can be easily encoded by an observational abstraction αsc : ℘(Trace) → ℘(Store∗ ) of partial traces that observes store changes in execution traces: sc : Trace → Store∗  ε    ρ sc(σ) ,  sc(hρ, C1 iσ ′ )   ρ0 sc(hρ1 , C1 iσ ′ ) if σ if σ if σ if σ =ε = hρ, Ci = hρ, C0 ihρ, C1 iσ ′ = hρ0 , C0 ihρ1 , C1 iσ ′ , ρ0 6= ρ1 αsc (T ) , {sc(σ) | σ ∈ T } Since the function αsc obviously preserves arbitrary set unions, as recalled in Section 3.1, it admits a right adjoint γsc : ℘(Store∗ ) → ℘(Trace) defined as γsc (S) , ∪{T ∈ ACM Transactions on Programming Languages and Systems, Vol. V, No. N, Article A, Publication date: January YYYY. A:16 S. Dissegna et al. ℘(Trace) | αsc (T ) ⊆ S}, that gives rise to a GC (αsc , h℘(Trace), ⊆i, h℘(Store∗ ), ⊆i, γsc ). By a slight abuse of notation, αsc is also used as an abstraction of the partial trace semantics of a given program P , that is, αsc : ℘(TraceP ) → ℘(Store∗P ), which, clearly, gives rise to a corresponding GC (αsc , h℘(TraceP ), ⊆i, h℘(Store∗P ), ⊆i, γsc ). Output Abstraction. The store changes abstraction αsc may be too strong in practice. This can be generalized to any observational abstraction of execution traces αo : h℘(Trace), ⊆i → hA, ≤A i (which gives rise to a GC). As a significant example, one may consider an output abstraction that demands to have the same stores (possibly restricted to some subset of program variables) only at some specific output points. For example, in a language with no explicit output primitives, as that considered by Guo and Palsberg [2011], one could be interested just in the final store of the program (when it terminates), or in the entry and exit stores of any loop containing an extracted hot path. If we consider a language including a distinct primitive command “put X ” that “outputs” the value of program variables ranging in some set X then we may want to have the same stores for variables in X at each output point put X . In this case, optimizations should preserve the same sequence of outputs, i.e. optimizations should not modify the order of output commands. More formally, this can be achieved by adding a further sort of actions: put X ∈ A, where X ⊆ Var is a set of program variables. The semantics of put X obviously does not affect program stores, i.e., AJput X Kρ , ρ. Correspondingly, if StoreX denotes stores on variables ranging in X then the following output abstraction αout : ℘(Trace) → ℘(Store∗X ) of partial traces observes program stores at output program points only: out : Trace → Store∗X  ε out (σ) , out (σ ′ )  ρ|X out(σ ′ ) if σ = ε if σ = sσ ′ ∧ act(s) 6= put X if σ = hρ, L : put X → L′ iσ ′ αout (T ) , {out(σ) | σ ∈ T } where ρ|X denotes the restriction of the store ρ to variables in X . Similarly to αsc , here again we have a GC (αo , h℘(Trace), ⊆i, h℘(Store∗X ), ⊆i, γo ). Example 6.1 (Dead store elimination). This approach based on a generic observational abstraction enables to prove the correctness of program optimizations that are unsound in Guo and Palsberg [2011]’s framework based on the store changes abstraction, such as dead store elimination. For example, in a program fragment such as while (x ≤ 0) do z := 0; x := x + 1; z := 1; one can extract the hot path hp = hx ≤ 0, z := 0, x := x + 1, z := 1i (here we ignore store abstractions) and perform dead store elimination of the command z := 0 by optimizing hp to hp′ = hx ≤ 0, x := x + 1, z := 1i. As observed by Guo and Palsberg [2011, Section 4.3], this is clearly unsound in bisimulation-based correctness because this hot path optimization does not output bisimilar code. By contrast, this optimization can be made sound by choosing and then formalizing an observational abstraction of program traces which requires to have the same stores at the beginning and at the exit of loops containing an extracted hot path, while outside of hot paths one could still consider the store changes abstraction. ACM Transactions on Programming Languages and Systems, Vol. V, No. N, Article A, Publication date: January YYYY. An Abstract Interpretation-based Model of Tracing Just-In-Time Compilation A:17 Observational Abstraction. One can generalize the store changes abstraction αsc by considering any observational abstraction αo : h℘(Trace), ⊆i → hA, ≤A i which is less precise (i.e., more approximate) than αsc : this means that for any T1 , T2 ∈ ℘(Trace), if αsc (T1 ) = αsc (T2 ) then αo (T1 ) = αo (T2 ), or, equivalently, for any T ∈ ℘(Trace), γsc (αsc (T )) ⊆ γo (αo (T )). Informally, this means that αo abstracts more information than αsc . As an example, when considering programs with output actions, the following abstraction αosc : ℘(Trace) → ℘(Store∗X ) observes store changes at output program points only: osc : Trace → Store∗X  ε      ρ|X    osc(hρ, L1 : put X → L′1 iσ ′ ) osc(σ) ,  osc(hρ, L1 : A1 → L′1 iσ ′ )    ′  1 iσ )  ρ0|X osc(hρ1 , C  osc(hρ1 , C1 iσ ′ ) if σ if σ if σ if σ if σ if σ = ε or σ = hρ, Ci, act(C) 6= put X = hρ, Ci, act(C) = put X , = hρ, C0 ihρ, L1 : A1 → L′1 iσ ′ , act(C0 ) = put X = hρ, C0 ihρ, L1 : A1 → L′1 iσ ′ , act(C0 ) 6= put X = hρ0 , C0 ihρ1 , C1 iσ ′ , ρ0 6= ρ1 , act(C0 ) = put X = hρ0 , C0 ihρ1 , C1 iσ ′ , ρ0 6= ρ1 , act(C0 ) 6= put X αosc (T ) , {osc(σ) | σ ∈ T } Clearly, it turns out that αosc is more approximate than αsc since osc(σ) records a store change ρ0 ρ1 only when the two contiguous subsequences of commands whose common stores are ρ0 and ρ1 contain among them at least a put command. 6.1. Correctness of Trace Extraction It turns out that the observational correctness of the hot path extraction transform in Definition 5.1 can be proved w.r.t. the observational abstraction αsc of store changes. T HEOREM 6.2 (C ORRECTNESS OF TRACE EXTRACTION ). For any P ∈ Program and hp ∈ αN hot (TraceP ), we have that αsc (TJextr hp (P )K) = αsc (TJP K). This is the crucial result concerning the correctness of our hot path extraction transform. We will show in Section 10.5 (see Theorem 10.12) that the correctness of the hot path extraction strategy defined in [Guo and Palsberg 2011] can be proved by a simple adaptation of the proof technique that we will use here. In order to prove Theorem 6.2, we need to define some suitable “dynamic” transformations of execution traces. Let us fix a hot path hp = ha0 , C0 , ..., an , Cn i ∈ αN hot (TraceP ) (w.r.t. some store abstraction) and let Php , extr hp (P ) denote the corresponding transform of P given by Definition 5.1. We first define a mapping trout hp of the execution traces of the program P into execution traces of the transformed program Php that unfolds the hot path hp (or any prefix of it) according to the hot path extraction strategy given by Definition 5.1: a function application trout hp (τ ) should replace any occurrence of the hot path hp in the execution trace τ ∈ TraceP with its corresponding guarded and suitably relabeled path obtained through Definition 5.1. More precisely, Fig. 4 provides the definitions for the following two functions: trout hp : TraceP → TracePhp ∗ trin hp : TraceP → (StateP ∪ StatePhp ) Let us first describe how the trace transform trout hp works. A function application trout (sσ) on a trace sσ of P —the superscript out hints that the first state s of the hp trace sσ is still outside of the hot path hp so that trout hp (sσ) could either enter into the transform of hp or remain outside of hp—triggers the unfolding of the hot path hp in Php when the first state s is such that: ACM Transactions on Programming Languages and Systems, Vol. V, No. N, Article A, Publication date: January YYYY. A:18 S. Dissegna et al. (i) s = hρ, C0 i, where C0 is the first command of hp; (ii) the entry conditional guard Ea0 of stitch P (hp) is satisfied in the store ρ of the state s = hρ, C0 i, that is, αstore ({ρ}) ≤ a0 . If the unfolding for the trace hρ, C0 iσ is actually started by applying trout hp (hρ, C0 iσ) then: (iii) the first state hρ, C0 i is unfolded into the following sequence of two states of Php : hρ, L0 : guard Ea0 → ℓ0 ihρ, ℓ0 : act(C0 ) → l1 i; (iv) in turn, the unfolding of the residual trace σ is carried on by applying trin hp (σ). in Let us now focus on the function trin hp . A function application trhp (sσ)—here the superscript in suggests that we are currently inside the hot path hp so that trin hp (sσ) could either exit from the unfolding of hp or advance with the unfolding of hp—carries on the unfolding of hp as a trace in Php when the current state s is such that: (i) s = hρ, Ci i, where i ∈ [1, n − 1], meaning that the command Ci is strictly inside hp, i.e., Ci is different from the first command C0 and the last command Cn of hp; (ii) the guarded conditional guard Eai is satisfied in the store ρ of the state s = hρ, Ci i, that is, αstore ({ρ}) ≤ ai . If one of these two conditions does not hold then the trace transformation trin hp (hρ, Ci iσ), after a suitable unfolding step for hρ, Ci i, jumps back to the “outside of hp” modality by progressing with trout hp (σ). Example 6.3. Consider the transform Php of Example 5.3 for the program P in Example 2.1 w.r.t. the hot path hp = h⊤, C1 , ⊤, C2 , ⊤, C3c i. In particular, we refer to the notation Hi , Hic used to denote the commands in the stitch of hp into P . Consider the following trace fragment τ ∈ TraceP : τ = h[x/3], C0 ih[x/0], C1 ih[x/0], C2 ih[x/1], C3c ih[x/1], C1 ih[x/1], C2 ih[x/2], C3c i h[x/2], C1 ih[x/2], C2 ih[x/3], C3 ih[x/3], C4 i Then, we have that the dynamic transformation trout hp (τ ) acts as follows: in out   trout hp (τ ) = h[x/3], C0 itrhp (τ1 ) = h[x/3], C0 ih[x/0], H0 ih[x/0], H1 itrhp (τ2 ) in   trin hp (τ2 ) = h[x/0], H2 ih[x/0], H3 itrhp (τ3 ) in   trin hp (τ3 ) = h[x/1], H4 ih[x/1], H5 itrhp (τ4 ) ···  trin hp (τ9 ) out c = trin hp (h[x/3], C3 ih[x/3], C4 i) = h[x/3], H4 ih[x/3], H5 itrhp (h[x/3], C4 i) = h[x/3], H4 ih[x/3], H5c ih[x/3], C4 itrout hp (ǫ) = h[x/3], H4 ih[x/3], H5c ih[x/3], C4 i Summing up, using the colors in the flow graph of Php in Fig. 3 and representing traces as sequences of commands only, we have that: τ ≡ C0 → C1 → C2 → C3c → C1 → C2 → C3c → C1 → C2 → C3 → C4 trout hp (τ ) ≡ C0 → H0 → H1 → H2 → H3 → H4 → H5 → H0 → H1 → H2 → → H3 → H4 → H5 → H0 → H1 → H2 → H3 → H4 → H5c → C4 ACM Transactions on Programming Languages and Systems, Vol. V, No. N, Article A, Publication date: January YYYY. An Abstract Interpretation-based Model of Tracing Just-In-Time Compilation A:19 hp = ha0 , C0 , ..., an , Cn i is a given hot path trout hp (ǫ) , ǫ  hρ, L0 : guard Ea0 → ℓ0 ihρ, ℓ0 : act(C0 ) → l1 i trin  hp (σ)     if s = hρ, C0 i, αstore ({ρ}) ≤ a0       hρ, L0 : ¬guard Ea0 → L0 ihρ, L0 : act(C0 ) → L1 i trout  hp (σ)    if s = hρ, C i, α  0 store ({ρ}) 6≤ a0   trout hρ, L0 : guard Ea0 → ℓ0 ihρ, ℓ0 : ¬act(C0 ) → Lc1 i trout hp (sσ) , hp (σ)    if s = hρ, cmpl(C 0 )i, αstore ({ρ}) ≤ a0     hρ, L : ¬guard E → L ihρ, L : ¬act(C ) → Lc i trout (σ)  0 a0 0 0 0  1 hp    if s = hρ, cmpl(C )i, αstore ({ρ}) 6≤ a0  0     s · trout otherwise hp (σ) trin hp (ǫ) , ǫ  hρ, li : guard Eai → ℓi ihρ, ℓi : act(Ci ) → li+1 i trin  hp (σ)    if s = hρ, Ci i, i ∈ [1, n − 1], αstore ({ρ}) ≤ ai        hρ, ln : guard Ean → ℓn ihρ, ℓn : act(Cn ) → L0 i trout hp (σ)     if s = hρ, C i, α ({ρ}) ≤ an n store      hρ, li : ¬guard Eai → Li ihρ, Ci i trout  hp (σ)  in if s = hρ, Ci i, i ∈ [1, n], αstore ({ρ}) 6≤ ai trhp (sσ) ,    hρ, li : guard Eai → ℓi ihρ, ℓi : ¬act(Ci ) → Lcnext(i) i trout  hp (σ)     if s = hρ, cmpl(C )i, i ∈ [1, n], αstore ({ρ}) ≤ ai  i      hρ, li : ¬guard Eai → Li ihρ, cmpl(Ci )i trout  hp (σ)     if s = hρ, cmpl(C i )i, i ∈ [1, n], αstore ({ρ}) 6≤ ai     s · trout otherwise hp (σ) in Fig. 4. Definitions of trout hp and trhp . where red boxes denote commands of τ and trout hp (τ ) outside of the hot path hp, black boxes with red commands denote commands of τ inside hp, while black boxes with blue out commands denote commands of trout hp (τ ) in stitch P (hp). Hence, trhp (τ ) carries out the unfolding of the hot path hp for the execution trace τ of P , and therefore provides an execution trace of the transformed program Php . It turns out that trout hp maps traces of P into traces of Php and does not alter store change sequences. out L EMMA 6.4. trout hp is well-defined and for any σ ∈ TraceP , sc(trhp (σ)) = sc(σ). P ROOF. We first show that: (1) trout hp is well-defined, i.e., for any σ ∈ TraceP , out trhp (σ) ∈ TracePhp , and (2) for any σ ∈ TraceP , if cmd (σ0 ) 6∈ {C0 , cmpl(C0 )} then ACM Transactions on Programming Languages and Systems, Vol. V, No. N, Article A, Publication date: January YYYY. A:20 S. Dissegna et al. hp = ha0 , C0 , ..., an , Cn i is a given hot path rtrhp (ǫ) , ǫ rtrhp (sσ) ,  hstore(s), Ci i       rtrhp (σ)       hρ, C0 irtrhp (σ)      hρ, C c irtrhp (σ) 0  hρ, Ci irtrhp (σ)        hρ, Cic irtrhp (σ)       hρ, Cn irtrhp (σ)     s · rtrhp (σ) if σ = ǫ, act(s) ∈ {guard Eai , ¬guard Eai }, i ∈ [1, n] if σ 6= ǫ, act(s) ∈ {guard Eai , ¬guard Eai }, i ∈ [1, n] if s = hρ, L0 : act(C0 ) → L1 i if s = hρ, L0 : ¬act(C0 ) → Lc1 i if s = hρ, ℓi : act(Ci ) → li+1 i, i ∈ [1, n − 1] if s = hρ, ℓi : ¬act(Ci ) → Lcnext(i) i, i ∈ [1, n] if s = hρ, ℓn : act(Cn ) → L0 i otherwise Fig. 5. Definition of rtrhp . trin hp (σ) ∈ TracePhp . In order to prove these two points, it is enough an easy induction on the length of the execution trace σ and to observe that: out (i) for the first four clauses that define trout hp (sσ) in Fig. 4 we have that trhp (sσ) = out ′ ′ ′′ ′ ′′ in s′ s′′ trout hp (σ) or trhp (sσ) = s s trhp (σ), where s is a guard command of Php and s s is in turn a legal sub-execution trace of Php ; (ii) for the last clause that defines trout hp (sσ) in Fig. 4 we have that cmd (s) 6∈ out {C0 , cmpl(C0 )}, hence s is a legal state in Php and, in turn, trout hp (sσ) = s · trhp (σ) is a trace of Php ; in (iii) for the clauses 1, 2 and 4 that define trin hp (sσ) in Fig. 4 we have that trhp (sσ) = in ′ ′′ out ′ ′′ s′ s′′ trin hp (σ) or trhp (sσ) = s s trhp (σ), where s is a guard command and s is an ′ ′′ action command such that s s is a legal sub-execution trace of Php ; in (iv) for the clauses 3 and 5 that define trin hp (sσ) in Fig. 4 we have that trhp (sσ) = in ′ ′ ′ s strhp (σ) where s is a guard command and s s turns out to be a legal sub-execution trace of Php ; (v) for the last clause that defines trin hp (sσ) in Fig. 4 we have that cmd (s) 6∈ {Ci , cmpl(Ci ) | i ∈ [1, n]}; by hypothesis, cmd (s) 6∈ {C0 , cmpl(C0 )}, so that cmd (s) 6∈ {Ci , cmpl(Ci ) | i ∈ [0, n]}, hence s is a legal state in Php and in turn trin hp (sσ) = s · trout (σ) is a trace of P ; hp hp out (vi) trin hp (sσ) is never recursively called by a function application trhp (s0 sσ) when cmd (s) ∈ {C0 , cmpl(C0 )}. ′ ′′ Then, it is immediate to check from the definitions in Fig. 4 that if trout hp (sσ) = s s τ ′ ′′ then store(s) = store(s ) = store(s ). Therefore, for any σ ∈ TraceP , we obtain that sc(trout hp (σ)) = sc(σ). Vice versa, it is a simpler task to define a reverse transformation function rtrhp that “decompiles” an execution trace σ of Php into an execution trace of P by removing guarded commands in σ, as generated by the hot path hp, and by mapping the relabeled ACM Transactions on Programming Languages and Systems, Vol. V, No. N, Article A, Publication date: January YYYY. An Abstract Interpretation-based Model of Tracing Just-In-Time Compilation A:21 commands of hp in σ back to their corresponding source commands of hp. This function rtrhp : TracePhp → TraceP is correctly defined by the clauses in Fig. 5 and it preserves store change sequences. L EMMA 6.5. rtrhp is well-defined and for any σ ∈ TracePhp , sc(rtrhp (σ)) = rtrhp (σ). P ROOF. We show that rtrhp is well-defined, i.e., for any σ ∈ TracePhp , rtrhp (σ) ∈ TraceP . This follows by an easy induction on the length of the execution trace σ by observing that: (i) the first clause that defines rtrhp (sσ) in Fig. 5 is an extremal base case where sσ = s and the command action of s is a guard command guard Eai (or its complement); in this case, we simply retain the store of s and pick the command Ci of P . (ii) the clause 2 of rtrhp (sσ) in Fig. 5 simply removes the states whose commands are some guard Eai ; since guard Eai does not alter stores, this removal preserves the sequence of store changes. (iii) the clauses 3-7 of rtrhp (sσ) in Fig. 5 map a state s of Php whose command Hi is a relabeled action act(Ci ) or ¬act(Ci ) of the hot path hp to a corresponding state of P that has the same store(s) and whose command is: Ci for act(Ci ) and Cic for ¬act(Ci ); here, we observe that since guards in σ are removed, by induction, these definitions allow us to obtain that sσ is mapped to a legal trace of P that does not alter the sequence of store changes. (iv) the clause 8 of rtrhp (sσ) in Fig. 5 states that if s is already a state of P then it is left unchanged. Hence, the above points also show that the sequence of store changes is not affected by rtrhp , i.e., for any σ ∈ TracePhp , sc(rtrhp (σ)) = sc(σ). Example 6.6. We carry on Example 6.3 by considering the following trace fragment σ ∈ TracePhp , where the transformed program Php is in Example 5.3: σ = h[x/2], H4 ih[x/2], H5 ih[x/2], H0 ih[x/2], H1 ih[x/2], H2 ih[x/2], H3 ih[x/3], H4 i h[x/3], H5c ih[x/3], C4 ih[x/6], C1 i Here, the decompilation of σ back into an execution trace of P through rtrhp yields: rtrhp (σ) = rtrhp (σ1 ) = h[x/2], C3c irtrhp (σ2 ) = h[x/2], C3c irtrhp (σ3 ) = h[x/2], C3c ih[x/2], C1 irtrhp (σ4 ) = h[x/2], C3c ih[x/2], C1 irtrhp (σ5 ) = h[x/2], C3c ih[x/2], C1 ih[x/2], C2 irtrhp (σ6 ) = h[x/2], C3c ih[x/2], C1 ih[x/2], C2 irtrhp (σ7 ) = h[x/2], C3c ih[x/2], C1 ih[x/2], C2 ih[x/3], C3 irtrhp (σ8 ) = h[x/2], C3c ih[x/2], C1 ih[x/2], C2 ih[x/3], C3 ih[x/3], C4 irtrhp (σ9 ) = h[x/2], C3c ih[x/2], C1 ih[x/2], C2 ih[x/3], C3 irtrhp (σ8 ) = h[x/2], C3c ih[x/2], C1 ih[x/2], C2 ih[x/3], C3 ih[x/3], C4 ih[x/6], C1 i Indeed, h[x/2], C3c ih[x/2], C1 ih[x/2], C2 ih[x/3], C3 ih[x/3], C4 ih[x/6], C1 i is a well-defined execution trace of P . We are now in the position to prove Theorem 6.2. P ROOF OF T HEOREM 6.2. With an abuse of notation for rtrhp , let us define two functions trhp : ℘(TraceP ) → ℘(TracePhp ) and rtrhp : ℘(TracePhp ) → ℘(TraceP ) which out are the collecting versions of trout hp and rtrhp , that is, trhp (T ) , {trhp (σ) | σ ∈ T } and ACM Transactions on Programming Languages and Systems, Vol. V, No. N, Article A, Publication date: January YYYY. A:22 S. Dissegna et al. rtrhp (T ) , {rtrhp (σ) | σ ∈ T }. As consequences of the above lemmata, we have the following properties. (A) (B) (C) (D) αsc ◦ trhp = αsc : by Lemma 6.4. trhp (TJP K) ⊆ TJPhp K: because, by Lemma 6.4, trout hp is well-defined. αsc ◦ rtrhp = αsc : by Lemma 6.5. rtrhp (TJPhp K) ⊆ TJP K: because, by Lemma 6.5, rtrhp is well-defined. We therefore obtain: αsc (TJP K) = αsc (trhp (TJP K)) ⊆ αsc (TJPhp K) = αsc (rtrhp (TJPhp K)) ⊆ αsc (TJP K) [By point (A)] [By point (B)] [By point (C)] [By point (D)] and this closes the proof. 6.2. Correctness of Hot Path Optimizations Guarded hot paths are a key feature of our tracing compilation model and are meant to be dynamically recorded by a hot path monitor. An abstract guard for a command C of some stitched hot path stitch P (hp) encodes a property of program stores which is represented as an element of an abstract domain Store♯ and is guaranteed to hold at the entry of C. This information on program stores, as encapsulated by the abstract guards in stitch P (hp), can then be used in hot path optimizations, namely, to optimize the commands in hp. We follow a modular approach for proving the correctness of hot path optimizations. A hot path optimization O should optimize P along some hot path hp of P , by relying on the abstract store information recorded in hp, while leaving unchanged the commands outside of hp. Hence, in our framework, fixed P ∈ Program, an optimization O is defined to be a program transform of the commands in stitch P (hp), that is, O : {stitch P (hp) | hp ∈ αN hot (TraceP )} → Program where Program may allow new optimized expressions and/or actions introduced by O, as it will be the case of type-specific additions +Type in the type specialization optimization described in Section 7. Let P¬hp , extr hp (P ) r stitch P (hp) denote the commands outside of the stitched hot path. Then, the corresponding full optimization Ofull of the whole program P w.r.t. the hot path hp should extract and simultaneously optimize hp, namely, this is defined by Ofull (P, hp) , P¬hp ∪ O(stitch P (hp)) where Ofull (P, hp) is required to be a well-formed program, i.e., Ofull (P, hp) ∈ Program. This full optimization Ofull (P, hp) has to be proved correct w.r.t. some observational abstraction αo : ℘(TraceP ) → A of program traces, which is assumed to be more abstract than the store changes abstraction αsc (cf. Section 6). Then, this full optimization is correct for αo when: αo (TJOfull (P, hp)K) = αo (TJP K). Since Theorem 6.2 ensures that the unoptimized trace extraction transform is already correct for the store changes abstraction αsc , which is more precise than αo , the intuition is that in order to prove the correctness of Ofull w.r.t. αo , it is enough to focus ACM Transactions on Programming Languages and Systems, Vol. V, No. N, Article A, Publication date: January YYYY. An Abstract Interpretation-based Model of Tracing Just-In-Time Compilation A:23 on the correctness of the optimization O along the stitched hot path stitch P (hp). This therefore leads to the following definition of correctness for a hot path optimization. Definition 6.7 (Correctness of hot path optimization). O is correct for the observational abstraction αo if for any P ∈ Program and for any hp ∈ αN hot (TraceP ), αo (TJO(stitch P (hp))K) = αo (TJstitch P (hp)K). In order to prove that this correctness of a hot path optimization implies the correctness of the corresponding full optimization, we define two functions to : Tracestitch P (hp) → TraceO(stitch P (hp)) tdo : TraceO(stitch P (hp)) → Tracestitch P (hp) which must be well-defined, i.e. they have to map well-formed traces into well-formed traces, and, intuitively, encode the effect of optimizing (function to) and de-optimizing (function tdo) execution traces along a stitched hot path. Since Tracestitch P (hp) ⊆ Traceextr hp (P ) and TraceO(stitch P (hp)) ⊆ TraceOfull (P,hp) , we then extend to and tdo to two functions to full : Traceextr hp (P ) → TraceOfull (P,hp) tdo full : TraceOfull (P,hp) → Traceextr hp (P ) which simply apply to and tdo to maximal subtraces, respectively, in Tracestitch P (hp) and TraceO(stitch P (hp)) , while leaving unchanged the remaining states. Let us formalize this idea. If σ ∈ Traceextr hp (P ) is nonempty and, for some k ∈ [0, |σ|), cmd (σk ) ∈ stitch P (hp) then σ[k,nst ] denotes the maximal subtrace of σ beginning at σk which belongs to Tracestitch P (hp) , that is, the index nst ≥ k is such that: (1) cmd (σnst ) ∈ stitch P (hp), (2) if nst < |σ| − 1 then cmd (σnst +1 ) 6∈ stitch P (hp), (3) for any j ∈ [k, nst ], cmd (σj ) ∈ stitch P (hp). Analogously, if τ ∈ TraceOfull (P,hp) is nonempty and cmd (τk ) ∈ O(stitch P (hp)) then τ[k,nst ] denotes the maximal subtrace of τ beginning at τk which belongs to TraceO(stitch P (hp)) . Then, the formal definition of to full goes as follows:   if σ = ǫ ǫ  if σ 6= ǫ, cmd (σ0 ) 6∈ stitch P (hp) to full (σ) , σ0 to full (σ1 )  to(σ [0,nst ] ) to full (σ(nst +1) ) if σ 6= ǫ, cmd (σ0 ) ∈ stitch P (hp) and analogously for tdo full . Since to and tdo are supposed to be well-defined, it turns out that to full and tdo full are well-defined once we make the weak and reasonable assumption that to and tdo do not modify the entry (which is always L0 ) and exit labels of the stitched hot path. This assumption, e.g., for to can be formalized as follows: if σ ∈ Tracestitch P (hp) and to(σ) = τ then (i) if lbl(σ0 ) = L0 then lbl(τ0 ) = L0 ; (ii) if suc(σ|σ|−1 ) = L′ 6∈ labels(P ) then suc(τ|τ |−1) = L′ . In the following, to full and tdo full are also used to denote their corresponding collecting functions defined on sets of traces. L EMMA 6.8. Assume that αo ◦ to full = αo = αo ◦ tdo full . If O is correct for αo then Ofull is correct for αo . P ROOF. We have that: αo (TJOfull (P, hp)K) = αo (tdo full (TJOfull (P, hp)K)) ⊆ αo (TJextr hp (P )K) = αo (to full (TJextr hp (P )K)) ⊆ αo (TJOfull (P, hp)K) [By αo ◦ tdo full = αo ] [Since tdo full is well-defined] [By αo ◦ to full = αo ] [Since to full is well-defined] ACM Transactions on Programming Languages and Systems, Vol. V, No. N, Article A, Publication date: January YYYY. A:24 S. Dissegna et al. Thus, αo (TJOfull (P, hp)K) = αo (TJextr hp (P )K). By Theorem 6.2, αsc (TJextr hp (P )K) = αsc (TJP K), so that, since αsc is more precise than αo , αo (TJextr hp (P )K) = αo (TJP K), and, in turn, αo (TJOfull (P, hp)K) = αo (TJP K). We will see in Sections 7 and 8 two significant examples of hot path optimizations, namely, type specialization and constant folding. 7. TYPE SPECIALIZATION One key optimization for dynamic languages like JavaScript and PHP is type specialization, that is, the use of type-specific primitives in place of generic untyped operations whose runtime execution can be costly. As a paradigmatic example, a generic addition operation could be defined on more than one type, so that the runtime environment must check the type of its operands and execute a different operation depending on these types: this is the case of the addition operation in JavaScript (see its runtime semantics in the ECMA-262 standard [Ecma International 2015, Section 12.7.3.1]) and of the semantics of + in our language as given in Section 2.3. Of course, type specialization avoids the overhead of dynamic type checking and dispatch of generic untyped operations. When a type is associated to each variable before the execution of a command in some hot path, this type environment can be used to replace generic operations with type-specific primitives. In this section, we show that type specialization can be viewed as a particular hot path optimization which can be proved correct according to our definition in Section 6.2. 7.1. Type Abstraction Let us recall that the set of type names is Types = {⊤T , Int, String, Undef, ⊥T }, which can be viewed as the following finite lattice hTypes, ≤t i: ⊤T Int String Undef ⊥T The abstraction αtype : ℘(Valueu ) → Types and concretization γtype ℘(Valueu ) functions are defined as follows:     ⊥T if S = ∅ ∅ if T         if ∅ 6= S ⊆ Z if T Int Z αtype (S) , String if ∅ 6= S ⊆ Char∗ γtype (T ) , Char∗ if T       Undef if ∅ = 6 S = {undef} {undef} if T       ⊤T otherwise Valueu if T : Types → = ⊥T = Int = String = Undef = ⊤T Thus, αtype (S) provides the smallest type in hTypes, ≤t i for a set S of values. In particular, given v ∈ Valueu , αtype ({v}) coincides with type(v). Following the approach described in Section 3.2.1, we then consider a simple nonrelational store abstraction for types Storet , hVar → Types, ≤˙ t i where ≤˙ t is the standard pointwise lifting of ≤t , so that λx.⊥T and λx.⊤T are, respectively, the bottom and top abstract stores in Storet . The abstraction and concretization maps αstore : ℘(Store) → Storet and γstore : Storet → ℘(Store) are defined as a straight instantiation of the definitions in Section 3.2.1. ACM Transactions on Programming Languages and Systems, Vol. V, No. N, Article A, Publication date: January YYYY. An Abstract Interpretation-based Model of Tracing Just-In-Time Compilation A:25 The abstract type semantics Et : Exp → Storet → Types of expressions is defined as the best correct approximation of the concrete collecting semantics E : Exp → ℘(Store) → ℘(Value) on the type abstractions Storet and Types, i.e., Et JEKρt , αtype (EJEKγstore (ρt )). Hence, this definition leads to the following equalities: Et JvKρt = type(v) Et JxKρt = ρt (x)  ⊥T    t E JE1 Kρt Et JE1 + E2 Kρt =  Undef   ⊤T if ∃i. Et JEi Kρt = ⊥T else if Et JE1 Kρt = Et JE2 Kρt ∈ {Int, String} else if ∀i. Et JEi Kρt < ⊤T otherwise For instance, we have that: Et Jx + yK[x/ String, y/⊥T ] = αtype (EJx + yK∅) = αtype (∅) = ⊥T Et Jx + yK[x/ String, y/ String] = αtype (EJx + yK{ρ | ρ(x), ρ(y) ∈ Char∗ }) = = αtype (Char∗ ) = String, Et Jx + yK[x/ Int, y/ String] = αtype (EJx + yK{ρ | ρ(x) ∈ Z, ρ(y) ∈ Char∗ }) = αtype ({undef}) = Undef, Et Jx + yK[x/ Int, y/⊤T ] = αtype (EJx + yK{ρ | ρ(x) ∈ Z, ρ(y) ∈ Valueu }) = αtype (Z ∪ {undef}) = ⊤T Being defined as best correct approximation, it turns out that the abstract type semantics Et of expressions is correct by definition. C OROLLARY 7.1. If ρ ∈ γstore (ρt ) then EJEKρ ∈ Et JEKρt . According to Section 5, for any abstract type store (that we also call type environment) [xi /Ti | xi ∈ Var] ∈ Storet we consider a corresponding Boolean action guard denoted by guard x0 : T0 , . . . , xn : Tn ∈ BExp whose corresponding action semantics is automatically induced, as defined in Section 5, by the Galois connection (αstore , ℘(Store), Storet , γstore ): for any ρ ∈ Store,  ρ if ρ ∈ γstore ([xi /Ti | xi ∈ Var]) AJguard x0 : T0 , ..., xn : Tn Kρ , ⊥ otherwise  ρ if ∀i. ρ(xi ) ∈ γtype (Ti ) = ⊥ ∃i. ρ(xi ) 6∈ γtype (Ti ) For example, we have that: AJguard x : String, y AJguard x : String, y AJguard x : String, y AJguard x : String, y : StringK[x/foo, y/bar] = [x/foo, y/bar], : ⊤T K[x/foo, y/3] = [x/foo, y/3], : ⊤T K[x/1, y/3] = ⊥, : UndefK[x/foo] = [x/foo]. ACM Transactions on Programming Languages and Systems, Vol. V, No. N, Article A, Publication date: January YYYY. A:26 S. Dissegna et al. 7.2. Type Specialization of Hot Paths Let us consider some hot path hp = hρt0 , C0 , . . . , ρtn , Cn i ∈ αN hot (TraceP ) on the type abstraction hStoretP , ≤˙ t i, where each ρti is therefore a type environment for P . Thus, in the transformed program extr hp (P ), the stitched hot path stitch P (hp) contains n + 1 typed guards, that, for any i ∈ [0, n], we simply denote as guard ρti . Typed guards allow us to perform type specialization of commands in the stitched hot path. In order to keep the notation simple, we only focus on type specialization of addition operations occurring in assignments, while one could also consider an analogous type specialization of Boolean comparisons in conditional commands. This is defined as a program transform that instantiates most type-specific addition operations in place of generic untyped additions by exploiting the type information dynamically recorded by typed guards in stitch P (hp). Note that if C ∈ stitch P (hp) and act(C) ≡ x := E1 + E2 then C ≡ ℓi : x := E1 + E2 → L′ , for some i ∈ [0, n], where L′ ∈ {li+1 , L0 }. Let Ct denote the extended set of commands which includes type specific additions +Int and +String and, in turn, let Programt denote the possibly type-specialized programs with commands ranging in Ct . The semantic function E for expressions is then updated to type specific additions as follows:  EJE1 Kρ +Z EJE2 Kρ if type(EJEi Kρ) = Int EJE1 +Int E2 Kρ , undef otherwise  EJE1 Kρ · EJE2 Kρ if type(EJEi Kρ) = String EJE1 +String E2 Kρ , undef otherwise Given a hot path hp = hρt0 , C0 , . . . , ρtn , Cn i, the type specialization function tshp : stitch P (hp) → Ct is defined as follows:  ′ if Et JE1 + E2 Kρti = Int ℓi : x := E1 +Int E2 → L ′ ′ tshp (ℓi : x := E1 + E2 → L ) , ℓi : x := E1 +String E2 → L if Et JE1 + E2 Kρti = String  ℓi : x := E1 + E2 → L′ otherwise tshp (C) , C if C 6≡ ℓi : x := E1 + E2 → L′ Hence, if a typed guard guard ρti preceding a command ℓi : x := E1 + E2 → L′ allows us to derive abstractly on Storet that E1 and E2 have the same type (Int or String) then the addition E1 + E2 is accordingly type specialized. This function allows us to define the hot path type specialization optimization t Ots : {stitch P (hp) | hp ∈ αN hot (TraceP )} → Program simply by Ots (stitch P (hp)) , {tshp (C) | C ∈ stitch P (hp)}. In turn, as described in Section 6.2, this induces the full type specialization optimization ts Ofull (P, hp) , extr hp (P ) r stitch P (hp) ∪ Ots (stitch P (hp)). ts (P, hp) is also called typed trace extraction since it extracts and simultaneously Ofull type specializes a typed hot path hp in a program P . The correctness of this program optimization can be proved for the store changes observational abstraction by relying on Lemma 6.8. T HEOREM 7.2 (C ORRECTNESS OF TYPED TRACE EXTRACTION ). For any typed ts hot path hp ∈ αN hot (TraceP ), we have that αsc (TJOfull (P, hp)K) = αsc (TJP K). ACM Transactions on Programming Languages and Systems, Vol. V, No. N, Article A, Publication date: January YYYY. An Abstract Interpretation-based Model of Tracing Just-In-Time Compilation A:27 P ROOF. Let td : TraceOts (stitch P (hp)) → Tracestitch P (hp) be the following type despecialization function, where Type is either Int or String: td(ǫ) , ǫ  ′  hρ, ℓi : x := E1 + E2 → L i     td(sσ) , hρ, ℓi : x := E1 + E2 → L′ i · td(σ)      s · td(σ) if s = hρ, ℓi : x := E1 +Type E2 → L′ i, type(EJE1 + E2 Kρ) 6= Type if s = hρ, ℓi : x := E1 +Type E2 → L′ i, type(EJE1 + E2 Kρ) = Type otherwise Let us explain the first defining clause of td(sσ), i.e., s = hρ, ℓi : x := E1 +Type E2 → L′ i and type(EJE1 + E2 Kρ) 6= Type. These conditions can never hold in an inductive call of the function td: in fact, when td(sσ) is recursively called by td(s′ sσ), we necessarily have that s′ = hρ, li : guard ρti → ℓi i, so that ρ ∈ γstore (ρti ), and, in turn, by Corollary 7.1, EJE1 + E2 Kρ ∈ Et JE1 + E2 Kρt , which implies type(EJE1 + E2 Kρ) = Type, which is a contradiction. Thus, the first defining clause of td(sσ) only applies to type specialized traces in TraceOts (stitch P (hp)) whose first state is s = hρ, ℓi : x := E1 +Type E2 → L′ i: in this case, we necessarily have that σ = ǫ, because AJE1 +Type E2 Kρ = undef so that Ss = ∅. This clarifies the definition of td in this particular case. Also, observe that in this case, sc(td(s)) = sc(s) trivially holds. In all the remaining cases, it is clear that td maps type specialized traces into legal unspecialized traces of stitch P (hp) since labels are left unchanged. Moreover, sc ◦ td = sc holds, in particular because in the second defining clause of td(sσ), the condition type(EJE1 + E2 Kρ) = Type guarantees that EJE1 + E2 Kρ = EJE1 +Type E2 Kρ. On the other hand, we define a trace specialization function sp : Tracestitch P (hp) → TraceOts (stitch P (hp)) as follows: sp(ǫ) , ǫ sp(hµ0 , H0 i· · ·hµk , Hk i) ,   hµ0 , tshp (H0 )i   if tshp (H0 ) ≡ ℓi : x := E1 +Type E2 → L′ , µ0 6∈ γstore (ρti ) hµ0 , tshp (H0 )i· · ·hµk , tshp (Hk )i otherwise Let us comment on this definition. If σ ∈ Tracestitch P (hp) and σ 6= ǫ then it may happen that the first state hµ0 , H0 i of σ is such that the command H0 is ℓi : x := E1 + E2 → L′ and, since Et JE1 + E2 Kρti = Type (Int or String), H0 is type specialized to tshp (H0 ) ≡ ℓi : x := E1 +Type E2 → L′ , while the store µ0 is not approximated by the abstract store ρti , i.e., µ0 6∈ γstore (ρti ). Thus, in this case, the trace in Ots (stitch P (hp)) beginning at hµ0 , tshp (H0 )i is stuck, because the concrete semantics of addition is EJE1 +Type E2 Kµ0 = undef, and in turn AJx := E1 +Type E2 Kµ0 = ⊥, so that we necessarily have to define sp(σ) = hµ0 , tshp (H0 )i. Otherwise, sp(σ) simply type specializes through tshp all the commands (actually, addition expressions) occurring in σ. Here, it turns out that sp is well-defined, i.e. sp(σ) is a legal trace of Ots (stitch P (hp)), because any state hρ, ℓi : x := E1 + E2 → L′ i of σ is always preceded by the state hρ, li : guard ρti → ℓi i and ρ ∈ γstore (ρti ) must hold. Thus, by Corollary 7.1, EJE1 + E2 Kρ ∈ Et JE1 + E2 Kρt = Type, so that AJx := E1 +Type E2 Kρ = AJx := E1 + E2 Kρ holds. Consequently, the trace fragment sp(hρ, li : guard ρti → ℓi ihρ, ℓi : x := E1 + E2 → L′ i) = hρ, li : guard ρti → ℓi ihρ, ℓi : x := E1 +Type E2 → L′ i ACM Transactions on Programming Languages and Systems, Vol. V, No. N, Article A, Publication date: January YYYY. A:28 S. Dissegna et al. is legal in Ots (stitch P (hp)). Furthermore, let us also observe that sc ◦ ts = sc trivially holds. Thus, following the scheme in Section 6.2, these two functions td and ts allow us to ts (P,hp) → Traceextr ts (P,hp) define tdfull : TraceOfull and tsfull : Traceextr hp (P ) → TraceOfull hp (P ) such that αsc ◦ tdfull = αsc = αsc ◦ tsfull , so that the thesis follows by Lemma 6.8. Example 7.3. Let us consider the following sieve of Eratosthenes in a Javascriptlike language—this is taken from the running example in [Gal et al. 2009]—where primes is an array initialized with 100 true values: for (var i = 2; i < 100; i = i + 1) do if (!primes[i]) then continue for (var k = i + i; k < 100; k = k + i) do primes[k] = false With a slight abuse, we assume that our language is extended with arrays and Boolean values ranging in the type Bool. The semantics of read and store for arrays is standard: first, the index expression is checked to be in bounds, then the value is read or stored into the array. If the index is out of bounds then the corresponding action command gives ⊥, that is, we assume that the program generates an error (e.g., it is aborted). The above program is encoded in our language as follows:  P = C0 ≡ L0 : i := 2 → L1 , C1 ≡ L1 : i < 100 → L2 , C1c ≡ L1 : ¬(i < 100) → L8 , C2 ≡ L2 : primes[i] = tt → L3 , C2c ≡ L2 : ¬(primes[i] = ff ) → L7 , C3 ≡ L3 : k := i + i → L4 , C4 ≡ L4 : k < 100 → L5 , C4c ≡ L4 : ¬(k < 100) → L7 , C5 ≡ L5 : primes[k] := ff → L6 , C6 ≡ L6 : k := k + i → L4 , C7 ≡ L7 : i := i + 1 → L1 , C8 ≡ L8 : skip → Ł . Let us consider the following type environment ρt , {primes[n]/ Bool, i/ Int, k/ Int} ∈ Storet where primes[n]/ Bool is a shorthand for primes[0]/ Bool, . . . , primes[99]/ Bool. Then the first traced 2-hot path on the type abstraction Storet is hp1 , hρt , C4 , ρt , C5 , ρt , C6 i. As a consequence, the typed trace extraction of hp1 yields: ts P1 , Ofull (P, hp1 ) = P r {C4 , C4c } ∪ {L4 : k < 100 → L5 , L4 : ¬(k < 100) → L7 } ∪ Ots (stitch P (hp1 )) where:  Ots (stitch P (hp1 )) = H0 ≡ L4 : guard (primes[n] : Bool, i : Int, k : Int) → ℓ0 , H0c ≡ L4 : ¬guard (primes[n] : Bool, i : Int, k : Int) → L4 , H1 ≡ ℓ0 : k < 100 → l1 , H1c ≡ ℓ0 : ¬(k < 100) → L7 , H2 ≡ l1 : guard (primes[n] : Bool, i : Int, k : Int) → ℓ1 , H2c ≡ l1 : ¬guard (primes[n] : Bool, i : Int, k : Int) → L5 , H3 ≡ ℓ1 : primes[k] := ff → l2 , H4 ≡ l2 : guard (primes[n] : Bool, i : Int, k : Int) → ℓ2 , H4c ≡ l2 : ¬guard (primes[n] : Bool, i : Int, k : Int) → L6 , H5 ≡ ℓ2 : k := k +Int i → L4 . ACM Transactions on Programming Languages and Systems, Vol. V, No. N, Article A, Publication date: January YYYY. An Abstract Interpretation-based Model of Tracing Just-In-Time Compilation A:29 8. CONSTANT VARIABLE FOLDING Constant variable folding, a.k.a. constant propagation [Wegman and Zadeck 1991], is a standard and well-known program optimization, whose goal is to detect which program variables at some program point are constant on all possible executions and then to propagate these constant values as far forward through the program as possible. Guo and Palsberg [2011] show how to define this optimization along hot paths and then prove its correctness. As a significant example, we show here how to specify and prove the correctness w.r.t. the store changes abstraction αsc of this simple hot path optimization according to the approach defined in Section 6.2. The constant propagation store abstraction CPst and its corresponding GI (αCP , ℘(Store), CPst , γCP ) have been defined in Example 3.1. Following Section 5, any abstract store [xi /ai | xi ∈ Var] ∈ CPst , where, as usual, the bindings xi /undef are omitted, defines a corresponding guard x0 : a0 , . . . , xn : an ∈ BExp whose semantics is induced by the GI (αCP , ℘(Store), CPst , γCP ), as defined in Section 5: for any ρ ∈ Store,  ρ if ρ ∈ γCP ([xi /ai | xi ∈ Var]) AJguard x0 : a0 , ..., xn : an Kρ , ⊥ otherwise  ρ if ∀i. ρ(xi ) ∈ γcp (ai ) = ⊥ ∃i. ρ(xi ) 6∈ γcp (ai ) Therefore, we have that: AJguard x : 2, y AJguard x : 2, y AJguard x : 2, y AJguard x : 2, y AJguard x : 2, y AJguard x : 2, y : fooK[x/2, y/3] = ⊥, : fooK[x/2, y/foo, z/4] = ⊥, : fooK[x/2] = ⊥, : fooK[x/2, y/foo] = [x/2, y/foo], : ⊤K[x/2, y/foo] = [x/2, y/foo], : ⊤K[x/2] = [x/2]. Let us consider some hot path hp = hρc0 , C0 , . . . , ρcn , Cn i ∈ αN hot (TraceP ) on the constant propagation abstraction CPst , where each ρci is therefore an abstract store in CPst , whose corresponding guard in stitch P (hp) will be denoted by guard ρci . The constant value information encoded in these guards is used to define the variable folding in the stitched hot path. Following Guo and Palsberg [2011, Section 2.4], let FV : ℘(C) → ℘(Var) denote the function that returns the “free” variables occurring in some set of commands (in particular, a well-defined program), i.e., FV(P ) is the set of variables occurring in P which are never-assigned-to in some command of P . As in Guo and Palsberg [2011], constant variable folding is restricted to expressions E of some assignment x := E and is defined as a program transform which exploits the constant information recorded by abstract guards in stitch P (hp). The constant folding function cfhp : stitch P (hp) → C is defined as follows: cfhp (ℓi : x := E → L′ ) ,  ′ ℓi : x := E[y1 /vy1 , ..., yk /vyk ] → L if {y1 , ..., yk } = {y ∈ vars(E) ∩ FV(stitch P (hp)) | 6 ∅ ρci (y) = vy ∈ Value} =  ′ ℓi : x := E → L otherwise cfhp (C) , C if C 6≡ ℓi : x := E → L′ where E[y1 /vy1 , ..., yk /vyk ] denotes the standard synctatic substitution of variables yj ∈ vars(E) with constant values ρci (yj ) = vyj ∈ Value. Hence, when the abstract ACM Transactions on Programming Languages and Systems, Vol. V, No. N, Article A, Publication date: January YYYY. A:30 S. Dissegna et al. guard guard ρci which precedes an assignment ℓi : x := E → L′ tells us that a free variable y occuring in the expression E is definitely a constant value vy ∈ Value then cfhp performs the corresponding variable folding in E. Thus, the hot path constant folding optimization is defined by Ocf (stitch P (hp)) , {cfhp (C) | C ∈ stitch P (hp)} cf and, in turn, this induces the full constant folding optimization Ofull (P, hp). The correctness of this constant folding optimization can be proved for the store changes observational abstraction T HEOREM 8.1 (C ORRECTNESS OF CONSTANT FOLDING OPTIMIZATION ). For any hot path hp ∈ αN hot (TraceP ) w.r.t. the constant propagation store abstraction CPst , cf αsc (TJOfull (P, hp)K) = αsc (TJP K). This proof is omitted, since it follows the same pattern of Theorem 7.2 for the correctness of typed trace extraction, in particular it relies on Lemma 6.8. Example 8.2. Let us consider the following program written in a while-language: x := 0; a := 2; while (x ≤ 15) do if (x ≤ 5) then x := x + a else {a := a + 1; x := x + a; } whose translation as P ∈ Program goes as follows:  P = C0 ≡ L0 : x := 0 → L1 , C1 ≡ L1 : a := 2 → L2 C2 ≡ L2 : x ≤ 15 → L3 , C2c ≡ L2 : ¬(x ≤ 15) → L7 , C3 ≡ L3 : x ≤ 5 → L4 , C3c ≡ L3 : ¬(x ≤ 5) → L5 , C4 ≡ L4 : x := x + a → L2 , C5 ≡ L5 : a := a + 1 → L6 C6 ≡ L6 : x := x + a → L2 , C7 ≡ L7 : skip → Ł The first traced 2-hot path for the abstraction CPst is: hp = h[x/⊤, a/2], C2 , [x/⊤, a/2], C3 , [x/⊤, a/2], C4 i. In fact, the initial prefix of the complete trace of P which corresponds to the terminating run of P is as follows: h[ ], C0 ih[x/0], C1 ih[x/0, a/2], C2 ih[x/0, a/2], C3 ih[x/0, a/2], C4 ih[x/2, a/2], C2 i h[x/2, a/2], C3 ih[x/2, a/2], C4 ih[x/4, a/2], C2 ih[x/4, a/2], C3 ih[x/4, a/2], C4 i so that hp ∈ α2hot (TraceP ). Hence, the constant folding optimization Ocf along hp provides: cf Ofull (P, hp) = P r{C2 , C2c } ∪ {L2 : x ≤ 15 → L3 , L2 : ¬(x ≤ 15) → L7 } ∪ Ocf (stitch P (hp)) where:  Ocf (stitch P (hp)) = H0 ≡ L2 : guard [x : ⊤, a : 2] → ℓ0 , H0c ≡ L2 : ¬guard [x : ⊤, a : 2] → L2 , H1 H2 H3 H4 ≡ ℓ0 : x ≤ 15 → l1 , H1c ≡ ℓ0 : ¬(x ≤ 15) → L7 , ≡ l1 : guard [x : ⊤, a : 2] → ℓ1 , H2c ≡ l1 : ¬guard [x : ⊤, a : 2] → L3 , ≡ ℓ1 : x ≤ 5 → l2 , H3c ≡ ℓ1 : ¬(x ≤ 5) → L5 , ≡ l2 : guard [x : ⊤, a : 2] → ℓ2 , H4c ≡ l2 : ¬guard [x : ⊤, a : 2] → L4 , H5 ≡ ℓ2 : x := x + 2 → L2 . ACM Transactions on Programming Languages and Systems, Vol. V, No. N, Article A, Publication date: January YYYY. An Abstract Interpretation-based Model of Tracing Just-In-Time Compilation A:31 Therefore, this hot path optimization allows us to fold the constant value 2 for the variable a, in the hot path command H5 ≡ ℓ2 : x := x + 2 → L2 . 9. NESTED HOT PATHS Once a first hot path hp1 has been extracted by transforming P to P1 , extr hp1 (P ), it may well happen that a new hot path hp2 in P1 contains hp1 as a nested sub-path. Following TraceMonkey’s trace recording strategy [Gal et al. 2009], we attempt to nest an inner hot path inside the current trace: during trace recording, an inner hot path is called as a kind of “subroutine”, this executes a loop to a successful completion and then returns to the trace recorder that may therefore register the inner hot path as part of a new hot path. In order to handle nested hot paths, we need a more general definition of hot path which takes into account previously extracted hot paths and a corresponding program transform for extracting nested hot paths. Let P be the original program and let P ′ be a hot path transform of P so that P ′ r P contains all the commands (guards included) in the hot path. We define a function hotcut : TraceP ′ → (StateP ′ )∗ that cuts from an execution trace σ of P ′ all the states whose commands appear in some previous hot path hp except for the entry and exit states of hp:  if σ = ǫ ǫ hotcut(σ) , hotcut (hρ1 , C1 ihρ3 , C3 iσ ′ ) if σ = hρ1 , C1 ihρ2 , C2 ihρ3 , C3 iσ ′ & C1 , C2 , C3 6∈ P  otherwise σ0 hotcut (σ1 ) In turn, we define outerhot N : TraceP ′ → ℘((State♯P ′ )∗ ) as follows: outerhot N (σ) , {hai , Ci i · · · haj , Cj i ∈ (State♯P ′ )∗ | ∃hρi , Ci i · · · hρj , Cj i ∈ loop(hotcut(σ)) such that i ≤ j, αstore (hρi , Ci i · · · hρj , Cj i) = hai , Ci i · · · haj , Cj i, count(αstore (hotcut (σ)), hai , Ci i · · · haj , Cj i) ≥ N }. Clearly, when P ′ = P it turns out that hotcut = λσ.σ so that outerhot N = hot N . We define the usual collecting version of outerhot N on ℘(TraceP ′ ) as the abstraction map N N ′ αN outerhot , λT.∪σ∈T outerhot (σ). Then, αouterhot (TJP K) provides the set of N -hot paths ′ in P . Example 9.1. Let us consider again Example 5.3, where Store♯ is the trivial one-point store abstraction {⊤}. In Example 5.3, we first extracted hp1 = h⊤, C1 , ⊤, C2 , ⊤, C3c i by transforming P to P1 , extr hp (P ). We then consider the following trace in TJP1 K: σ =h[ ], C0 ih[x/0], H0 ih[x/0], H1 ih[x/0], H2 ih[x/0], H3 ih[x/1], H4 ih[x/1], H5 i · · · h[x/2], H3 i h[x/3], H4 ih[x/3], H5c ih[x/3], C4 ih[x/6], H0 i · · · h[x/9], H5c ih[x/9], C4 ih[x/12], H0 i · · · Thus, here we have that hotcut (σ) = h[ ], C0 ih[x/0], H0 ih[x/3], H5c ih[x/3], C4 ih[x/6], H0 ih[x/9], H5c ih[x/9], C4 i · · · so that hp2 = h⊤, H0 , ⊤, H5c , ⊤, C4 i ∈ α2outerhot (TJP1 K). Hence, hp2 contains a nested hot path, which is called at the beginning of hp2 and whose entry and exit commands are, respectively, H0 and H5c . ′ ′ Let hp = ha0 , C0 , . . . , an , Cn i ∈ αN outerhot (TJP K) be a N -hot path in P , where, for all i ∈ [0, n], we assume that Ci ≡ Li : Ai → Lnext(i) . Let us note that: – If for all i ∈ [0, n], Ci ∈ P then hp actually is a hot path in P , i.e., hp ∈ αN hot (TJP K). ACM Transactions on Programming Languages and Systems, Vol. V, No. N, Article A, Publication date: January YYYY. A:32 S. Dissegna et al. – Otherwise, there exists some Ck 6∈ P . If Ci ∈ P and Ci+1 6∈ P then Ci+1 is the entry command of some inner hot path; on the other hand, if Ci 6∈ P and Ci+1 ∈ P then Ci is the exit command of some inner hot path. The transform of P ′ for extracting hp is then given as the following generalization of Definition 5.1. Definition 9.2 (Nested trace extraction transform). The nested trace extraction transform of P ′ for the hot path hp = ha0 , C0 , . . . , an , Cn i is: extr hp (P ′ ) , P (1) r ({C0 | C0 ∈ P } ∪ {cmpl(C0 ) | cmpl(C0 ) ∈ P }) (2) ∪ {H0 : act(C0 ) → L1 | C0 ∈ P } ∪ {H0 : ¬act(C0 ) → Lc1 | cmpl(C0 ) ∈ P } (3) (4) (5) ∪ {L0 : guard Ea0 → ~0 , L0 : ¬guard Ea → H0 | C0 ∈ P } ∪ {~i : act(Ci ) → hi+1 | i ∈ [0, n − 1], Ci , Ci+1 ∈ P } ∪ {~n : act(Cn ) → L0 | Cn ∈ P } ∪ {~i : ¬act(Ci ) → Lcnext(i) | i ∈ [0, n], Ci , cmpl(Ci ) ∈ P } (6) (7) (8) (9) ∪ {hi : guard Eai → ~i , hi : ¬guard Eai → Li | i ∈ [1, n], Ci ∈ P } ∪ {~i : act(Ci ) → Li+1 | i ∈ [0, n − 1], Ci ∈ P, Ci+1 6∈ P } r {Ci | i ∈ [0, n − 1], Ci 6∈ P, Ci+1 ∈ P } ∪ {Li : act(Ci ) → hi+1 | i ∈ [0, n − 1], Ci 6∈ P, Ci+1 ∈ P } where we define stitch P ′ (hp) , (3) ∪ (4) ∪ (5) ∪ (6) ∪ (7) ∪ (9). Let us observe that: – Clauses (1)–(6) are the same clauses of the trace extraction transform of Definition 5.1, with the additional constraint that all the commands Ci of hp are required to belong to the original program P . This is equivalent to ask that any Ci is not the entry or exit command of a nested hot path inside hp, i.e., Ci 6∈ P ′ r P . In Definition 5.1, where no previous hot path extraction is assumed, any command Ci of hp belongs to P , so that this constraint is trivially satisfied. – Clause (7) where Ci ∈ P and Ci+1 6∈ P , namely next(Ci ) is the call program point of a nested hot path nhp and Ci+1 is the entry command of nhp, performs a relabeling that allows to neatly nest nhp in hp. – Clauses (8)–(9) where Ci 6∈ P and Ci+1 ∈ P , i.e., Ci is the exit command of a nested hot path nhp that returns to the program point lbl(Ci+1 ), performs the relabeling of suc(Ci ) in Ci in order to return from nhp to hp; – H0 , ~i and hi are meant to be fresh labels, i.e., they have not been already used in P ′. Example 9.3. Let us go on with Example 9.1. The second traced hot path in α2outerhot (TJP1 K) is: hp2 = h⊤, H0 ≡ L1 : guard E⊤ → ℓ0 , ⊤, H5c ≡ ℓ2 : (x%3 = 0) → L4 , ⊤, C4 ≡ L4 : x := x + 3 → L1 i. ACM Transactions on Programming Languages and Systems, Vol. V, No. N, Article A, Publication date: January YYYY. An Abstract Interpretation-based Model of Tracing Just-In-Time Compilation A:33 According to Definition 9.2, trace extraction of hp2 in P1 yields the following transform: extr hp2 (P1 ) , [by clause (8)] P1 r {H5c } [by clause (9)] ∪ {ℓ2 : (x%3 = 0) → h2 } [by clause (6)] ∪ {h2 : guard E⊤ → ~2 , h2 : ¬guard E⊤ → L4 } [by clause (4)] ∪ {~2 : x := x + 3 → L1 } where we used the additional fresh labels h2 and ~2 . Example 9.4. Let us consider again Example 7.3. After the trace extraction of hp1 that transforms P to P1 , a second traced 2-hot path is the following: hp2 , hρt , C1 , ρt , C2 , ρt , C3 , ρt , H0 , ρt , H1c , ρt , C7 i where ρt = {primes[n]/ Bool, i/ Int, k/ Int} ∈ Storet . Thus, hp2 contains a nested hot path which is called at suc(C3 ) = L4 and whose entry and exit commands are, respectively, H0 and H1c . Here, typed trace extraction according to Definition 9.2 provides the following transform of P1 :  ts P2 , Ofull (P1 , hp2 ) = P1 r {C1 , C1c } ∪ H0 : i < 100 → L2 , H0 : ¬(i < 100) → L8 , H6 ≡ L1 : guard (primes[n] : Bool, i : Int, k : Int) → ~0 , H6c ≡ L1 : ¬guard (primes[n] : Bool, i : Int, k : Int) → H0 , H7 ≡ ~0 : i < 100 → h1 , H7c ≡ ~0 : ¬(i < 100) → L8 , H8 ≡ h1 : guard (primes[n] : Bool, i : Int, k : Int) → ~1 , H8c ≡ h1 : ¬guard (primes[n] : Bool, i : Int, k : Int) → L2 , H9 ≡ ~1 : primes[i] = t t → h1 , H9c ≡ ~1 : ¬(primes[i] = t t) → L7 , H10 ≡ h2 : guard (primes[n] : Bool, i : Int, k : Int) → ~2 , c H10 ≡ h2 : ¬guard (primes[n] : Bool, i : Int, k : Int) → L3 , H11 ≡ ~2 : k := i +Int i → L4  r {H1c } ∪ (H1c )′ ≡ ℓ0 : ¬(k < 100) → h3 , H12 ≡ h3 : guard (primes[n] : Bool, i : Int, k : Int) → ~3 , c H12 ≡ h3 : ¬guard (primes[n] : Bool, i : Int, k : Int) → L7 , H13 ≡ ~3 : i := i +Int 1 → L1 . Finally, a third traced 2-hot path in P2 is hp3 , hρt , H6 , ρt , H9c , ρt , C7 i which contains a nested hot path which is called at the beginning of hp3 and whose entry and exit commands are, respectively, H6 and H9c . Here, typed trace extraction of hp3 yields:  ts P3 , Ofull (P2 , hp3 ) = P2 r {H9c } ∪ (H9c )′ ≡ ~1 : ¬(primes [i] = t t) → j2 , j2 : guard (primes[n] : Bool, i : Int, k : Int) → 2 , j2 : ¬guard (primes[n] : Bool, i : Int, k : Int) → L7 , 2 : i := i +Int 1 → L1 . We have thus obtained the same three trace extraction steps described by Gal et al. [2009, Section 2]. In particular, in P1 we specialized the typed addition operation k +Int i, in P2 we specialized i +Int i and i +Int 1, while in P3 we specialized once ACM Transactions on Programming Languages and Systems, Vol. V, No. N, Article A, Publication date: January YYYY. A:34 S. Dissegna et al. again i +Int 1 in a different hot path. Thus, in P3 all the addition operations occurring in assignments have been type specialized. 10. COMPARISON WITH GUO AND PALSBERG’S FRAMEWORK A formal model for tracing JIT compilation has been put forward at POPL 2011 symposium by Guo and Palsberg [2011]. Its main distinctive feature is the use of a bisimulation relation [Milner 1995] to model the operational equivalence between source and optimized programs. In this section, we show how this model can be expressed within our framework. 10.1. Language and Semantics Guo and Palsberg [2011] rely on a simple imperative language (without jumps and) with while loops and a so-called bail construct. Its syntax is as follows: E ::= v | x | E1 + E2 B ::= tt | ff | E1 ≤ E2 | ¬B | B1 ∧ B2 Cmd ∋ c ::= skip; | x := E; | if B then S | while B do S | bail B to S Stm ∋ S ::= ǫ | cS where ǫ stands for the empty string. Thus, any statement S ∈ Stm is a (possibly empty) sequence of commands cn , with n ≥ 0. We follow Guo and Palsberg [2011] in making an abuse in program syntax by assuming that if S1 , S2 ∈ Stm then S1 S2 ∈ Stm, where S1 S2 denotes a simple string concatenation of S1 and S2 . We denote by StateGP , Store × Stm the set of states for this language. The baseline small-step operational semantics →B ⊆ StateGP × StateGP is standard and is given in continuation-style (where K ∈ Stm): hρ, ǫi 6→B hρ, skip; Ki →B hρ, Ki hρ, x := E; Ki →B hρ[x/EJEKρ], Ki  hρ, Ki if BJBKρ = false hρ, (if B then S)Ki →B hρ, SKi if BJBKρ = true hρ, (while B do S)Ki →B hρ, (if B then (S while B do S)) Ki  hρ, Ki if BJBKρ = false hρ, (bail B to S)Ki →B hρ, Si if BJBKρ = true The relation →B is clearly deterministic and we denote by TraceGP , {σ ∈ State+ GP | ∀i ∈ [0, |σ| − 1). σi →B σi+1 } the set of generic program traces for Guo and Palsberg’s language. Then, given a program S ∈ Stm, so that StoreS , vars(S) → Valueu denotes the set of stores for S, its partial trace semantics is TGP JSK = TraceGP , {σ ∈ TraceGP | σ0 = hρ, Si, ρ ∈ StoreS }. S Notice that, differently from our trace semantics, a partial trace of the program S always starts from an initial state, i.e., hρ, Si. 10.2. Language Compilation Programs in Stm can be compiled into Program by resorting to an injective labeling function l : Stm → L that assigns different labels to different statements. ACM Transactions on Programming Languages and Systems, Vol. V, No. N, Article A, Publication date: January YYYY. An Abstract Interpretation-based Model of Tracing Just-In-Time Compilation A:35 Definition 10.1 (Language compilation). The “first command” compilation function C : Stm → ℘(C) is defined as follows: C(ǫ) , {l(ǫ) : skip → Ł}  C S ≡ (skip; K) , {l(S ′ ) : skip → l(K)}  C S ′ ≡ (x := E; K) , {l(S ′ ) : x := E → l(K)}  C S ′ ≡ ((if B then S)K) , {l(S ′ ) : B → l(SK), l(S ′ ) : ¬B → l(K)}  C S ′ ≡ ((while B do S)K) , {l(S ′ ) : skip → l((if B then (S while B do S))K)}  C S ′ ≡ ((bail B to S)K) , {l(S ′ ) : B → l(S), l(S ′ ) : ¬B → l(K)} ′ Then, the full compilation function C : Stm → ℘(C) is recursively defined by the following clauses: C(ǫ) , C(ǫ) C(skip; K) , C(skip; K) ∪ C(K) C(x := E; K) , C(x := E; K) ∪ C(K) C((if B then S)K) , C((if B then S)K) ∪ C(SK) ∪ C(K) C((while B do S)K) , C((while B do S)K) ∪ C((if B then (S while B do S))K) C((bail B to S)K) , C((bail B to S)K) ∪ C(S) ∪ C(K) Given S ∈ Stm, l(S) is the initial label of C(S), while Ł is, as usual, the undefined label where the execution becomes stuck. It turns out that the recursive function C is well-defined—the easy proof is standard and is omitted, let us just observe that C((while B do S)K) is a base case—so that, for any S ∈ Stm, C(S) is a finite set of commands. Let us observe that, by Definition 10.1, if hρ, Si →B hρ′ , S ′ i then C(S ′ ) ⊆ C(S) (this can be proved through an easy structural induction on S). Consequently, if hρ, Si →∗B hρ′ , S ′ i then C(S ′ ) ⊆ C(S). Example 10.2. Consider the following program S ∈ Stm in Guo and Palsberg’s syntax: x := 0; while B1 do x := 1; x := 2; bail B2 to x := 3; x := 4; S is then compiled in our language by C in Definition 10.1 as follows:  C(S) = l(S) : x := 0 → lwhile , lwhile : skip → lifwhile , lifwhile : B1 → l1 , lifwhile : ¬B1 → l2 , l1 : x := 1 → lwhile , l2 : x := 2 → lbail , lbail : B2 → l3 , lbail : ¬B2 → l4 , l3 : x := 3 → lǫ , l4 : x := 4 → lǫ , lǫ : skip → Ł . Notice that in the command lbail : B2 → l3 , the label l3 stands for l(x := 3; ) so that C(x := 3; ) ≡ l3 : x := 3 → lǫ , i.e., after the execution of x := 3 the program terminates. Correctness for the above compilation function C means that for any S ∈ Stm: (i) C(S) ∈ Program and (ii) program traces of S and C(S) have the same store sequences. ACM Transactions on Programming Languages and Systems, Vol. V, No. N, Article A, Publication date: January YYYY. A:36 S. Dissegna et al. C s (hρ, ǫi) , hρ, l(ǫ) : skip → Łi C s (hρ, S ≡ (skip; K)i) , hρ, l(S) : skip → l(K)i C s (hρ, S ≡ (x := E; K)i) , hρ, l(S) : x := E → l(K)i  hρ, l(S) : B → l(S ′ K)i if BJBKρ = true s ′ C (hρ, S ≡ ((if B then S )K)i) , hρ, l(S) : ¬B → l(K)i if BJBKρ = false C s (hρ, S ≡ ((while B do S ′ )K)i) , hρ, l(S) : skip → l((if B then (S ′ while B do S ′ ))K)i  hρ, l(S) : B → l(S ′ )i if BJBKρ = true s ′ C (hρ, S ≡ ((bail B to S )K)i) , hρ, l(S) : ¬B → l(K)i if BJBKρ = false Fig. 6. Definition of the state compile function C s : StateGP → State. In the proof we will make use of a “state compile” function C s : StateGP → State as defined in Figure 6. In turn, C s allows us to define a “trace compile” function C t : TGP JSK → Tι JC(S)K which applies state-by-state the function C s to traces as follows: C t (ǫ) , ǫ; C t (sτ ) , C s (s)C t (τ ). L EMMA 10.3. (1) hρ, Si →B hρ′ , S ′ i ⇔ C s (hρ′ , S ′ i) ∈ S(C s (hρ, Si)) (2) C t is well-defined. P ROOF. We show the equivalence (1) by structural induction on S ∈ Stm. [S ≡ ǫ]: Trivially true, since hρ, Si 6→B and Shρ, l(ǫ) : skip → Łi = ∅. [S ≡ x := E; K] (⇒): If hρ, x := E; Ki →B hρ[x/EJEKρ], Ki, C s (hρ, x := E; Ki) = hρ, l(S) : x := E → l(K)i and C s (hρ[x/EJEKρ], Ki) = hρ[x/EJEKρ], l(K) : A → l(S ′ )i for some action A and statement S ′ , then, by definition of the transition semantics S, hρ[x/EJEKρ], l(K) : A → l(S ′ )i ∈ Shρ, l(S) : x := E → l(K)i. (⇐): If hρ′′ , Ci = C s (hρ′ , S ′ i) ∈ Shρ, l(S) : x := E → l(K)i then: (1) EJEKρ 6= undef , (2) ρ′′ = ρ[x/EJEKρ], and therefore ρ′ = ρ[x/EJEKρ]; (3) lbl(C) = l(K), and therefore S ′ = K. Hence, hρ, x := E; Ki →B hρ[x/EJEKρ], Ki = hρ′ , S ′ i. [S ≡ skip; K] Analogous to S ≡ x := E; K. [S ≡ (if B then T )K] (⇒): Assume that BJBKρ = false, so that hρ, (if B then T )Ki →B hρ, Ki, C s (hρ, (if B then T )Ki) = hρ, l(S) : ¬B → l(K)i and C s (hρ, Ki) = hρ, l(K) : A → l(T ′ )i for some A and T ′ ∈ Stm. Hence, by definition of S, hρ, l(K) : A → l(T ′ )i ∈ Shρ, l(S) : ¬B → l(K)i. On the other hand, if BJBKρ = true then hρ, (if B then T )Ki →B hρ, T Ki, C s (hρ, (if B then T )Ki) = hρ, l(S) : B → l(T K)i and C s (hρ, T Ki) = hρ, l(T K) : A → l(T ′ )i for some A and T ′ . Hence, hρ, l(T K) : A → l(T ′ )i ∈ Shρ, l(S) : B → l(T K)i. (⇐): Assume that BJBKρ = false, so that C s (hρ, (if B then T )Ki) = hρ, l(S) : ¬B → l(K)i, and hρ′′ , Ci = C s (hρ′ , S ′ i) ∈ Shρ, l(S) : ¬B → l(K)i. Hence: (1) ρ′′ = ρ and therefore ρ′ = ρ; (2) lbl(C) = l(K), and therefore S ′ = K. Hence, hρ, (if B then T )Ki →B hρ, Ki = hρ′ , S ′ i. On the other hand, if BJBKρ = true then C s (hρ, (if B then T )Ki) = hρ, l(S) : B → l(T K)i and hρ′′ , Ci = C s (hρ′ , S ′ i) ∈ Shρ, l(S) : B → l(T K)i. We thus have that: (1) ρ′′ = ρ and therefore ρ′ = ρ; (2) lbl(C) = l(T K), and therefore S ′ = T K. Hence, hρ, (if B then T )Ki →B hρ, T Ki = hρ′ , S ′ i. ACM Transactions on Programming Languages and Systems, Vol. V, No. N, Article A, Publication date: January YYYY. An Abstract Interpretation-based Model of Tracing Just-In-Time Compilation A:37 [S ≡ (while B do T )K] (⇒): We have that hρ, (while B do T )Ki →B hρ, (if B then (T while B do T )) Ki and C s (hρ, (while B do T )Ki) = hρ, l(S) : skip → l((if B then (T while B do T )) K)i. If BJBKρ = true then C s (hρ, (if B then (T while B do T )) Ki) = hρ, l((if B then (T while B do T )) K) : B → l(T (while B do T )K)i; on the other hand, if BJBKρ = false then C s (hρ, (if B then (T while B do T )) Ki) = hρ, l((if B then (T while B do T )) K) : ¬B → l(K)i. In both cases, we have that: hρ, l((if B then (T while B do T )) K) : B → l(T (while B do T )K)i, hρ, l((if B then (T while B do T )) K) : B → l(K)i ∈ Shρ, l(S) : skip → l((if B then (T while B do T )) K)i. (⇐): If hρ′′ , Ci = C s (hρ′ , S ′ i) ∈ Shρ, l(S) : skip → l((if B then (T while B do T )) K)i then: (1) ρ′′ = ρ, and therefore ρ′ = ρ; (2) lbl(C) = l((if B then (T while B do T )) K), and therefore S ′ = (if B then (T while B do T )) K. Hence, hρ, (while B do T )Ki →B hρ, (if B then (T while B do T )) Ki = hρ′ , S ′ i. [S ≡ (bail B to T )K] Analogous to S ≡ (if B then T )K. Let us now turn to point (2). By the ⇒ implication of the equivalence (1), we have that if τ ∈ TGP JSK then C t (τ ) ∈ TJC(S)K: this can be shown by an easy induction on the length of τ and by using the fact that if C t (τ ) = hρ0 , C0 ihρ1 , C1 i · · · hρn , Cn i then, for any i, Ci ∈ C(S). Moreover, since l(S) is the initial label of the compiled program C(S) and lbl(C0 ) = l(S), we also notice that C t (τ ) ∈ Tι JC(S)K. Therefore, C t is a well-defined function. Let st : TraceGP ∪ Trace → Store∗ be the function that returns the store sequence of any trace, that is: st (ǫ) , ǫ and st(hρ, Siσ) , ρ · st(σ). Also, given a set X of traces, let αst (X) , {st(σ) | σ ∈ X}. Then, correctness of the compilation function C goes as follows: T HEOREM 10.4 (C ORRECTNESS OF LANGUAGE C(S) ∈ Program and αst (TGP JSK) = αst (Tι JC(S)K). COMPILATION ). If S ∈ Stm then P ROOF. We define a “trace de-compile” function Dt : Tι JC(S)K → TGP JSK as follows. Consider a trace σ = hρ0 , C0 i · · · hρn , Cn i ∈ Tι JC(S)K, so that lbl(C0 ) = l(S), for any i ∈ [0, n], Ci ∈ C(S) and for any i ∈ [0, n), hρi+1 , Ci+1 i ∈ SJC(S)Khρi , Ci i. Since lbl(C0 ) = l(S), by definition of C s , we have that hρ0 , C0 i = C s (hρ0 , Si). Then, since hρ1 , C1 i ∈ SJC(S)K(C s (hρ0 , Si)), there exists S1 ∈ Stm such that lbl(C1 ) = l(S1 ), so that, hρ1 , C1 i = C s (hρ1 , S1 i). Hence, from C s (hρ1 , S1 i) ∈ SJC(S)K(C s (hρ0 , Si)), by the implication ⇐ of Lemma 10.3 (1), we obtain that hρ0 , Si →B hρ1 , S1 i. Thus, an easy induction allows us to show that for any i ∈ [1, n] there exists Si ∈ Stm such that hρ0 , Si →B hρ1 , S1 i →B · · · →B hρn , Sn i and C s (hρi , Si i) = hρi , Ci i. We therefore define Dt (σ) , hρ0 , Sihρ1 , S1 i · · · hρn , Sn i ∈ TGP JSK. Moreover, we notice that st(Dt (σ)) = st(σ). Let us also observe that st◦C t = st, since C t does not affect stores. ACM Transactions on Programming Languages and Systems, Vol. V, No. N, Article A, Publication date: January YYYY. A:38 S. Dissegna et al. Summing up, we obtain: αst (TGP JSK) = αst (C t (TGP JSK)) ⊆ αst (Tι JC(S)K) = αst (Dt (Tι JC(S)K)) ⊆ αst (TGP JSK) [since st ◦ C t = st] [by Lemma 10.3 (2), C t is well-defined] [since st ◦ Dt = st] [since Dt is well-defined] and this closes the proof. 10.3. Bisimulation Correctness of trace extraction in [Guo and Palsberg 2011] relies on a notion of bisimulation relation, parameterized by program stores. Let us recall this definition. If hρ, Si →B hρ, S ′ i then this “silent” transition that does not change the store is also deτ noted by hρ, Si →B hρ, S ′ i. Moreover, for the assignment transition hρ, x := E; Ki →B hρ[x/EJEKρ], Ki, if δ = [x/EJEKρ] denotes the corresponding store update of ρ then this δ transition is also denoted by hρ, x := E; Ki →B hρ[x/EJEKρ], Ki. Let Act , {δ | δ is a store update} ∪ {τ }. Then, for a nonempty sequence of actions s = a1 · · · an ∈ Act + , we define: s hρ, Si ⇒B hρ′ , S ′ i iff τ ∗ a τ ∗ τ ∗ a τ ∗ n ′ ′ hρ, Si →B ◦ →1 B ◦ →B · · · →B ◦ → B ◦ →B hρ , S i, namely, there may be any number of silent transitions either in front of or following a any ai -transition →i B . Moreover, if s ∈ Act + is a nonempty sequence of actions then ∗ ŝ ∈ Act denotes the possibly empty sequence of actions where all the occurrences of τ are removed. Definition 10.5 ([Guo and Palsberg 2011]). A relation R ⊆ Store × Stm × Stm is a bisimulation when R(ρ, S1 , S2 ) implies: a â a â (1) if hρ, S1 i →B hρ′ , S1′ i then hρ, S2 i ⇒B hρ′ , S2′ i, for some hρ′ , S2′ i such that R(ρ′ , S1′ , S2′ ); (2) if hρ, S2 i →B hρ′ , S2′ i then hρ, S1 i ⇒B hρ′ , S1′ i, for some hρ′ , S1′ i such that R(ρ′ , S1′ , S2′ ). S1 is bisimilar to S2 for a given ρ ∈ Store, denoted by S1 ≈ρ S2 , if R(ρ, S1 , S2 ) for some bisimulation R.  τ τ̂ Let us remark that if hρ, S1 i → hρ′ , S1′ i then τ̂ = ǫ, so that hρ, S2 i ⇒ hρ, S2 i ≡ hρ, S2 i is allowed to be the matching (empty) transition sequence. It turns out that bisimilarity can be characterized through an abstraction of traces that observes store changes. By a negligible abuse of notation, the store changes function sc : Trace → Store∗ defined in Section 6 is applied to GP traces, so that sc : Trace ∪ TraceGP → Store∗ . In turn, given ρ ∈ Store, the function αρsc : ℘(TraceGP ) → ℘(Store∗ ) is then defined as follows: αρsc (X) , {sc(τ ) ∈ Store∗ | τ ∈ X, ∃S, τ ′. τ = hρ, Siτ ′ }. It is worth remarking that αρsc is a weaker abstraction than αsc defined in Section 6, that is, for any X, Y ∈ ℘(TraceGP ), αsc (X) = αsc (Y ) ⇒ αρsc (X) = αρsc (Y ) (while the converse does not hold in general). T HEOREM 10.6. For any S1 , S2 ∈ Stm, ρ ∈ Store, we have that S1 ≈ρ S2 iff αρsc (TGP JS1 K) = αρsc (TGP JS2 K). ACM Transactions on Programming Languages and Systems, Vol. V, No. N, Article A, Publication date: January YYYY. An Abstract Interpretation-based Model of Tracing Just-In-Time Compilation A:39 P ROOF. (⇒): We prove that if R(ρ, S1 , S2 ) holds for some bisimulation R then αρsc (TGP JS1 K) ⊆ αρsc (TGP JS2 K) (the reverse containment is symmetric), that is, if sc(τ ) ∈ Store∗ for some τ ∈ TGP JS1 K such that τ = hρ, S1 iτ ′ then there exists some ψ ∈ TGP JS2 K such that ψ = hρ, S2 iψ ′ and sc(τ ) = sc(ψ). Let us then consider τ ∈ TGP JS1 K such that τ = hρ, S1 iτ ′ . If τ ′ = ǫ then we pick hρ, S2 i ∈ TGP JS2 K so that sc(hρ, S1 i) = ρ = sc(hρ, S2 i). Otherwise, τ = hρ, S1 iτ ′ ∈ TGP JS1 K, with ǫ 6= τ ′ = τ ′′ hµ, Si. We prove by induction on |τ ′ | ≥ 1 that there exists ψ = hρ, S2 iψ ′′ hµ, T i ∈ TGP JS2 K such that sc(τ ) = sc(ψ) and R(µ, S, T ). a (|τ ′ | = 1): In this case, τ = hρ, S1 ihµ, Si ∈ TGP JS1 K, so that hρ, S1 i →B hµ, Si. Since, â by hypothesis, R(ρ, S1 , S2 ) holds, we have that hρ, S2 i ⇒B hµ, T i, for some T , and R(µ, S, T ). Let ψ ∈ TGP JS2 K be the trace corresponding to the sequence of transitions â â hρ, S2 i ⇒B hµ, T i. Then, by definition of ⇒B , we have that sc(τ ) = sc(ψ), and, by definition of bisimulation, R(µ, S, T ) holds. (|τ ′ | > 1): Here, τ ′ = τ ′′ hµ, Si and τ = hρ, S1 iτ ′ ∈ TGP JS1 K, with |τ ′′ | = |τ ′ | − 1 ≥ 1. Hence, τ ′′ = τ ′′′ hη, U i. By inductive hypothesis, there exists ψ = hρ, S2 iψ ′′ hη, V i ∈ TGP JS2 K such that sc(hρ, S1 iτ ′′′ hη, U i) = sc(hρ, S2 iψ ′′ hη, V i) and R(η, U, V ). Since a â hη, U i →B hµ, Si and R(η, U, V ) holds, we obtain that hη, V i ⇒B hµ, T i, for some T , and R(µ, S, T ) holds. Let hη, V i · · · hµ, T i be the sequence of states corresponding to â the sequence of transitions hη, V i ⇒B hµ, T i so that we pick hρ, S2 iψ ′′ hη, V i · · · hµ, T i ∈ â TGP JS2 K. The condition R(µ, S, T ) already holds. Moreover, by definition of ⇒B , we have that sc(hη, U ihµ, Si) = sc(hη, V i · · · hµ, T i), and therefore we obtain sc(τ ) = sc(hρ, S1 iτ ′′′ hη, U ihµ, Si) = sc(hµ, S2 iψ ′′ hη, V i · · · hµ, T i). (⇐): We first observe the following property (∗), which is a straight consequence of the fact that →B is a deterministic relation: If S ∈ Stm and σ, τ ∈ TJSK are such that σ0 = hµ, Si = τ0 and |τ | ≤ |σ| then there exists some ψ such that σ = τ ψ. Given ρ ∈ Store, we assume that αρsc (TGP JS1 K) = αρsc (TGP JS2 K) and we then define the following relation R: R , {(ρ, S1 , S2 )} ∪ {(µ, T1 , T2 ) | hρ, S1 i · · · hµ, T1 i ∈ TJS1 K, hρ, S2 i · · · hµ, T1 i ∈ TJS2 K, sc(hρ, S1 i · · · hµ, T1 i) = sc(hρ, S2 i · · · hµ, T1 i)}. We show that R is a bisimulation, so that R(ρ, S1 , S2 ) follows. a (case A) Assume that hρ, S1 i →B hρ′ , S1′ i. Then, since hρ, S1 ihρ′ , S1′ i ∈ TJS1 K and ρ ρ αsc (TGP JS1 K) = αsc (TGP JS2 K), we have that there exists τ = hρ, S2 i · · · ∈ TJS2 K such that sc(hρ, S1 ihρ′ , S1′ i) = sc(τ ). Hence, τ necessarily has the following shape: τ = hρ, S2 ihρ, U1 i · · · hρ, Un ihρ′ , V1 i · · · hρ′ , Vm i where n ≥ 0 (n = 0 means that hρ, U1 i · · · hρ, Un i is indeed the empty sequence) and m ≥ â 1. This therefore means that hρ, S2 i ⇒B hρ′ , Vm i, so that, by definition of R, R(ρ′ , S1′ , Vm ) holds. (case B) Assume now that R(µ, T1 , T2 ) holds because δ = hρ, S1 i · · · hµ, T1 i ∈ TJS1 K, a σ = hρ, S2 i · · · hµ, T2 i ∈ TJS2 K and sc(δ) = sc(σ). Hence, let us suppose that hµ, T1 i →B ′ ′ ′ ′ ρ ρ hµ , T1 i. Then, since δhµ , T1 i ∈ TJS1 K and αsc (TGP JS1 K) = αsc (TGP JS2 K), we have that there exists τ = hρ, S2 i · · · ∈ TJS2 K such that sc(δhµ′ , T1′ i) = sc(τ ). (case B1). If |τ | ≤ |σ| then, by the property (∗) above, σ = τ ψ, for some ψ. Hence, sc(τ ) = sc(δhµ′ , T1′ i) is a prefix of sc(σ) = sc(δ). Consequently, sc(δhµ′ , T1′ i) can be a prefix of sc(δ) only if sc(δhµ′ , T1′ i) = sc(δ), so that the action a is τ and τ µ′ = µ, that is, hµ, T1 i →B hµ, T1′ i. We thus consider the empty transition sequence ACM Transactions on Programming Languages and Systems, Vol. V, No. N, Article A, Publication date: January YYYY. A:40 S. Dissegna et al. (T1 ) hρ, (if B then (S while B do S)) Ki →T hρ, (while B do S)K, ǫ, S(while B do S)Ki if BJBKρ = true (T2 ) hρ, Kw , t, skip; Ki →T hρ, Kw , t(skip;), Ki (T3 ) hρ, Kw , t, x := E; Ki →T hρ[x/EJEKρ], Kw , t(x := E;), Ki ( hρ, Kw , t(bail B to (SK)), Ki if BJBKρ = false (T4 ) hρ, Kw , t, (if B then S)Ki →T hρ, K , t(bail ¬B to K), SKi if BJBKρ = true w   hρ, Kw , t(skip; ), (if B then (S while B do S)) Ki if Kw 6≡ (while B do S)K (T5 ) hρ, Kw , t, (while B do S)Ki →T  hρ, O(while B do t, ρ)Ki if Kw ≡ (while B do S)K (T6 ) hρ, Kw , t, Si →T hρ′ , S ′ i if Kw 6≡ S and hρ, Si →B hρ′ , S ′ i Fig. 7. Definition of the tracing relation →T . τ̂ hµ, T2 i ⇒ hµ, T2 i, so that from sc(δhµ, T1′ i) = sc(σ), by definition of R we obtain that R(µ, T1′ , T2 ) holds. (case B2). If |τ | > |σ| then, by (∗) above, τ = σψ, for some ψ, i.e., τ = σ · · · hµ′′ , T2′ i, for some µ′′ and T2′ . Since sc(hρ, S2 i · · · hµ, T2 i) = sc(hρ, S1 i · · · hµ, T1 i) and sc(hρ, S2 i · · · hµ, T2 i · · · hµ′′ , T2′ i) = sc(hρ, S1 i · · · hµ, T1 ihµ′ , T1′ i), we derive that a µ′′ = µ′ and hµ, T2 i ⇒ hµ′′ = µ′ , T2′ i. By definition of R, R(µ′ , T1′ , T2′ ) holds. This closes the proof. 10.4. Hot Paths Let us recall the set of rules that define the tracing transitions in Guo and Palsberg [2011] model. Let tStateGP , Store × Stm × Stm × Stm denote the set of states in trace recording mode, whose components are, respectively, the current store, the entry point of the recorded trace (this is always a while statement), the current trace (i.e., a sequence of commands) and the current program to be evaluated. In turn, StateeGP , StateGP ∪ tStateGP denotes the corresponding extended notion of state, which encompasses the trace recording mode. Then, the relation →T ⊆ StateeGP × StateeGP is defined by the clauses in Figure 7, where O : Stm × Store → Stm is a “sound” optimization function that depends on a given store. Correspondingly, the trace semantics TGP JSK ⊆ (StateeGP )+ of a program S ∈ Stm is naturally extended to the relation →B,T , →B ∪ →T ⊆ StateeGP × StateeGP . Let us notice that in Guo and Palsberg’s model of hot paths: (i) By clause (T1 ), trace recording is always triggered by an unfolded while loop, and the loop itself is not included in the hot path. (ii) By clause (T4 ), when we bail out of a hot path t through a bail command, we cannot anymore re-enter into t. (iii) By clause (T5 )—the second condition of this clause is called stitch rule in [Guo and Palsberg 2011]—the store used to optimize a hot path t is recorded at the end of the first loop iteration. This is a concrete store which is used by O to optimize the stitched hot path while B do t. (iv) Hot paths actually are 1-hot paths according to our definition, since, by clause (T1 ), once the first iteration of the traced while loop is terminated, trace recording necessarily discontinues. (v) There are no clauses for trace recording bail commands. Hence, when trying to trace a loop that already contains a nested hot path, by clause (T6 ), trace recording ACM Transactions on Programming Languages and Systems, Vol. V, No. N, Article A, Publication date: January YYYY. An Abstract Interpretation-based Model of Tracing Just-In-Time Compilation A:41 is aborted when a bail command is encountered. In other terms, in contrast to our approach described in Section 9, nested hot paths are not allowed. (vi) Observe that when tracing a loop while B do S whose body S does not contain branching commands, i.e. if or while statements, it turns out that the hot path t coincides with the body S, so that while B do t ≡ while B do S, namely, in this case the hot path transform does not change the subject while loop. In the following, we show how this hot path extraction model can be formalized within our trace-based approach. To this aim, we do not consider optimizations of hot paths, which is an orthogonal issue here, so that we assume that O performs no optimization, that is, O(while B do t, ρ) = while B do t. A sequence of commands t ∈ Stm is defined to be a GP hot path for a program Q ∈ Stm when we have the following transition sequence: hρ, Qi →∗B,T hρ′ , (while B do S)Ki →∗B,T hρ′′ , (while B do S)K, t, (while B do S)Ki. Since the operational semantics →B,T is given in continuation-style, without loss of generality, we assume that the program Q begins with a while statement, that is Q ≡ (while B do S)K. Guo and Palsberg’s hot loops can be modeled in our framework by exploiting a revised loop selection map loop GP : Trace → ℘(C+ ) defined as follows:  loop GP (hρ0 , C0 i · · · hρn , Cn i) , Ci Ci+1 · · · Cj | 0 ≤ i ≤ j < n, Ci ⋖ Cj , suc(Cj ) = lbl(Ci ), ∀k ∈ (i, j]. Ck 6∈ {Ci , cmpl(Ci )} . Thus, loop GP (τ ) contains sequences of commands without store. The map αGP hot : + GP ℘(Trace) → ℘(C ) then lifts loop GP to sets of traces as usual: αhot (T ) , ∪τ ∈T loop GP (τ ). Then, let us consider a GP hot path t as recorded by a transition sequence τ : τ , hρ, S0 ≡ (while B do S)Ki →B hρ, S1 ≡ (if B then (S while B do S)) Ki →T hρ, (while B do S)K, ǫ, S2 ≡ S(while B do S)Ki →T · · · →T hρ′ , (while B do S)K, t′ , Sn i →T hρ′′ , (while B do S)K, t, Sn+1 ≡ (while B do S)Ki (‡) where BJBKρ = true. Hence, the Si ’s occurring in τ are the current statements to be evaluated. With a negligible abuse of notation, we assume that τ ∈ TGP J(while B do S)KK, that is, the arrow symbols →B and →T are taken out of the sequence τ . By Lemma 10.3 (2), we therefore consider the corresponding execution trace C t (τ ) of the compiled program C((while B do S)K), where the state compile function C s in Figure 6, when applied to states in trace recording mode, is assumed to act on the current store and the program to be evaluated, that is, C s (hρ, Kw , t, Si) = C s (hρ, Si). We thus obtain: C t (τ ) , hρ, C0 ≡ l((while B do S)K) : skip → l((if B then (S while B do S)) K)i hρ, C1 ≡ l((if B then (S while B do S)) K) : B → l(S (while B do S)K)i hρ, C2 ≡ l(S(while B do S)K) : A2 → l(T )i ··· hρ′ , Cn ≡ l(Sn ) : An → l((while B do S) K)i hρ′′ , Cn+1 ≡ l((while B do S)K) : skip → l((if B then (S while B do S)) K)i. We therefore obtain a hot path hpt = C0 C1 · · · Cn ∈ loop GP (C t (τ )), i.e. hpt ∈ ι αGP hot (T JC((while B do S)K)K), where lbl(C0 ) = l((while B do S)K) = suc(Cn ). This is a consequence of the fact that for all k ∈ (0, n], Ck cannot be the entry command C0 ACM Transactions on Programming Languages and Systems, Vol. V, No. N, Article A, Publication date: January YYYY. A:42 S. Dissegna et al. or its complement command, because, by the stitch rule of clause (T5 ), Sn+1 is necessarily the first occurrence of (while B do S)) K as current program to be evaluated in the trace τ , so that, for any k ∈ (0, n], lbl(Ck ) 6= l((while B do S)K). We have thus shown that any GP hot path arising from a trace τ generates a corresponding hot path extracted by our selection map loop GP on the compiled trace C t (τ ): L EMMA 10.7. Let Qw ≡ (while B do S)K. If t is a GP hot path for Qw where τ ≡ hρ, Qw i →∗B,T hρ′ , Qw , t, Qw i is the transition sequence (‡) that records t, then there ι exists a hot path hpt = C0 C1 · · · Cn ∈ αGP hot (T JC(Qw )K) such that, for any i ∈ [0, n], lbl(Ci ) = l(Si ), and, in particular, lbl(C0 ) = l(Qw ) = suc(Cn ). Example 10.8. Let us consider the while statement Qw of the program in Example 2.1: Qw ≡ while (x ≤ 20) do (x := x + 1; (if (x%3 = 0) then x := x + 3; )) This program is already written in Guo and Palsberg language, so that Qw is a well formed statement in Stm. The tracing rules in Figure 7 yield the following trace t for Qw : t ≡ x := x + 1; bail (x%3 = 0) to (x := x + 3; Qw ). On the other hand, the compiled program C(Qw ) ∈ ℘(C) is as follows:  C(Qw ) = D0 ≡ lwhile : skip → lifwhile , D1 ≡ lifwhile : (x ≤ 20) → l1 , D1c ≡ lifwhile : ¬(x ≤ 20) → lǫ , D2 ≡ l1 : x := x + 1 → lif , D3 ≡ lif : (x%3 = 0) → l2 , D3c ≡ lif : ¬(x%3 = 0) → lwhile , D4 ≡ l2 : x := x + 3 → lwhile , D5 ≡ lǫ : skip → Ł , where labels have the following meaning: lwhile , l(Qw ) lifwhile , l(if (x ≤ 20) then (x := x + 1; (if (x%3 = 0) then x := x + 3; ) Qw )) l1 , l(x := x + 1; (if (x%3 = 0) then x := x + 3; ) Qw )) lif , l((if (x%3 = 0) then x := x + 3; ) Qw )) l2 , l(x := x + 3; Qw ). Hence, in correspondence with the trace t, we obtain the hot path hpt = D0 D1 D2 D3c ∈ ι αGP hot (T JC(Qw )K). In turn, this hot path hpt corresponds to the 2-hot path hp1 consisting of the analogous sequence of commands, which has been selected in Example 4.1. 10.5. GP Trace Extraction In the following, we conform to the notation used in Section 5 for our trace extraction transform. Let us consider a while program Qw ≡ (while B do S)K ∈ Stm and its compilation Pw , C(Qw ) ∈ ℘(C). Observe that, by Definition 10.1 of compilation C, a hot path C0 · · · Cn ∈ αGP hot (TJPw K) for the compiled program Pw always arises in correspondence with some while loop while B ′ do S ′ occurring in Qw and therefore has ACM Transactions on Programming Languages and Systems, Vol. V, No. N, Article A, Publication date: January YYYY. An Abstract Interpretation-based Model of Tracing Just-In-Time Compilation A:43 necessarily the following shape: C0 ≡ l((while B ′ do S ′ )J) : skip → l((if B ′ then (S ′ while B ′ do S ′ )) J) C1 ≡ l((if B ′ then (S ′ (while B ′ do S ′ ))) J) : B ′ → l(S ′ (while B ′ do S ′ ) J) C2 ≡ l(S ′ (while B ′ do S ′ ) J) : A2 → l(T3 ) ··· Cn ≡ l(Tn ) : An → l((while B ′ do S ′ )J) The GP hot path extraction scheme for Qw described by the rules in Figure 7 can be defined in our language by the following simple transform of Pw . Definition 10.9 (GP trace extraction transform). The GP trace extraction transGP form extr GP hp (Pw ) of Pw for the hot path hp = C0 C1 · · · Cn ∈ αhot (TJPw K) is defined as follows: (1) If for any i ∈ [2, n], cmpl(Ci ) 6∈ Pw then extr GP hp (Pw ) , Pw ; (2) Otherwise: extr GP hp (Pw ) , Pw ∪ {ℓi : act(Ci ) → ℓnext(i) | i ∈ [0, n]} ∪ {ℓi : ¬act(Ci ) → Lcnext(i) | i ∈ [0, n], cmpl(Ci ) ∈ Pw }. Clearly, extr GP hp (P ) remains a well-formed program. Also observe that the case (1) of Definition 10.9 means that the traced hot path hp does not contain conditional commands (except from the entry conditional C1 ) and therefore corresponds to point (vi) in Section 10.4. Example 10.10. Let us consider the programs Qw and C(Qw ) of Example 10.8 and the hot path hpt = D0 D1 D2 D3c ∈ αGP hot (TJC(Qw )K) which corresponds to the trace t ≡ x := x + 1; bail (x%3 = 0) to (x := x + 3; Qw ) of Qw . Here, the GP trace extraction of hpt , according to Definition 10.9, provides the following program transform:  extr GP hpt (C(Qw )) , D0 ≡ lwhile : skip → lifwhile , D1 ≡ lifwhile : (x ≤ 20) → l1 , D1c ≡ lifwhile : ¬(x ≤ 20) → lǫ , D2 ≡ l1 : x := x + 1 → lif , D3 ≡ lif : (x%3 = 0) → l2 , D3c ≡ lif : ¬(x%3 = 0) → lwhile , D4 ≡ l2 : x := x + 3 → lwhile , D5 ≡ lǫ : skip → Ł ∪  ℓ0 : skip → ℓ1 , ℓ1 : x ≤ 20 → ℓ2 , ℓ1 : ¬(x ≤ 20) → lǫ , ℓ2 : x := x + 1 → ℓ3 , ℓ3 : ¬(x%3 = 0) → ℓ0 , ℓ3 : (x%3 = 0) → l2 . On the other hand, the stitch rule (T5 ) transforms Qw into the following program Qt : while (x ≤ 20) do x := x + 1; bail (x%3 = 0) to (x := x + 3; Qw ) whose compilation yields the following program:  C(Qt ) = lwhilet : skip → lifwhilet , lifwhilet : (x ≤ 20) → l1t , lifwhilet : ¬(x ≤ 20) → lǫ , l1t : x := x + 1 → lbail , lbail : (x%3 = 0) → lbailtrue , lbail : ¬(x%3 = 0) → lwhilet , lwhile : skip → lifwhile , lifwhile : (x ≤ 20) → l1 , lifwhile : ¬(x ≤ 20) → lǫ , l1 : x := x + 1 → lif , lif : (x%3 = 0) → l2 , lif : ¬(x%3 = 0) → lwhile , lbailtrue : x := x + 3 → lwhile , lǫ : skip → Ł ACM Transactions on Programming Languages and Systems, Vol. V, No. N, Article A, Publication date: January YYYY. A:44 S. Dissegna et al. with the following new labels: lwhilet , l(while (x ≤ 20) t) lifwhilet , l(if (x ≤ 20) then (t (while (x ≤ 20) t))) l1t , l(t (while (x ≤ 20) t)) lbail , l((bail (x%3 = 0) to (x := x + 3; Qw ))(while (x ≤ 20) t)) while observe that lbailtrue , l(x := x + 3; Qw ) = l2 . It is then immediate to check that the programs C(Qt ) and extr GP hpt (C(Qw )) are equal up to the following label renaming of extr GP (C(Q )): w hpt {ℓ0 7→ lwhilet , ℓ1 7→ lifwhilet , ℓ2 7→ l1t , ℓ3 7→ lbail }. The equivalence of this GP trace extraction with the stitch of hot paths by Guo and Palsberg [2011] goes as follows. T HEOREM 10.11 (E QUIVALENCE WITH GP TRACE EXTRACTION ). Let t be a GP trace such that hρ, (while B do S)Ki →∗B,T hρ′ , (while B do S)K, t, (while B do S)Ki ι and let hpt ∈ αGP hot (T JC((while B do S)K)K) be the corresponding GP hot path as determined by Lemma 10.7. Then, C((while B do t)K) ∼ = extr GP hpt (C((while B do S)K)). P ROOF. Let the GP hot path t be recorded by the following transition sequence for hρ, (while B do S)Ki: hρ, S−2 ≡ (while B do S)Ki →B hρ, S−1 ≡ (if B then (S while B do S)) Ki →T [with BJBKρ = true] hρ0 , ρ, (while B do S)K, t0 ≡ ǫ, S0 ≡ S(while B do S)Ki →T hρ1 , (while B do S)K, t1 ≡ c1 , S1 i →T · · · →T hρn , (while B do S)K, tn ≡ tn−1 cn , Sn i →T hρn+1 , ρ′ , (while B do S)K, t ≡ tn cn+1 , Sn+1 ≡ (while B do S)Ki where n ≥ 0, so that the body S is assumed to be nonempty, i.e., S 6= ǫ (there is no loss of generality since for S = ǫ the result trivially holds). Hence, t = c1 ...cn cn+1 , for some commands ci ∈ Cmd, and the corresponding hot path hpt ≡ H−2 H−1 H0 ...Hn as determined by Lemma 10.7 is as follows: H−2 , l(S−2 ) : skip → l(S−1 ) H−1 , l(S−1 ) : B → l(S0 ) [because BJBKρ = true] H0 , l(S0 ) : A0 → l(S1 ) H1 , l(S1 ) : A1 → l(S2 ) ··· Hn , l(Sn ) : An → l(S−2 ) where the action Ai , with i ∈ [0, n], and the command ci+1 depend on the first command of the statement Si as follows (this range of cases will be later referred to as (∗)): (1) Si ≡ skip; J ⇒ Ai ≡ skip & ci+1 ≡ skip; & Si+1 ≡ J (2) Si ≡ x := E; J ⇒ Ai ≡ x := E & ci+1 ≡ x := E; & Si+1 ≡ J (3) Si ≡ (if B ′ then S ′ )J & BJB ′ Kρi = true ⇒ Ai ≡ B ′ & ci+1 ≡ bail ¬B ′ to J & Si+1 ≡ S ′ J ACM Transactions on Programming Languages and Systems, Vol. V, No. N, Article A, Publication date: January YYYY. An Abstract Interpretation-based Model of Tracing Just-In-Time Compilation A:45 (4) Si ≡ (if B ′ then S ′ )J & BJB ′ Kρi = false ⇒ Ai ≡ ¬B ′ & ci+1 ≡ bail B ′ to (S ′ J) & Si+1 ≡ J (5) Si ≡ (while B ′ do S ′ )J & (while B ′ do S ′ )J 6= (while B do S)K ⇒ Ai ≡ skip & ci+1 ≡ skip; & Si+1 ≡ (if B ′ then (S ′ (while B ′ do S ′ )))J If, for any i ∈ [0, n], Hi is not a conditional command then, by case (1) of Definition 10.9, we have that extr GP hpt (C((while B do S)K)) = C((while B do S)K). Also, for any i ∈ [0, n], Ai is either a skip or an assignment, so that ci+1 = Ai , and, in turn, t = S. Hence, (while B do t)K ≡ (while B do S)K, so that the thesis follows trivially. Thus, we assume that Hk , with k ∈ [0, n], is the first conditional command occuring in the sequence H0 ...Hn . Case (2) of Definition 10.9 applies, so that: extr GP hpt (C((while B do S)K)) = C((while B do S)K) ∪ {ℓ−2 : skip → ℓ−1 , ℓ−1 : B → ℓ0 , ℓ−1 : ¬B → l(K), ℓ0 : A0 → ℓ1 , ..., ℓn : An → ℓ−2 } ∪ {ℓi : ¬Ai → l(Snext(i) )c | i ∈ [0, n], Ai ∈ BExp}. Moreover, we have that: C((while B do S)K) =  l((while B do S)K) : skip → l((if B then (S (while B do S))) K), l((if B then (S (while B do S))) K) : B → l(S(while B do S)K), l((if B then (S (while B do S))) K) : ¬B → l(K) ∪ C(S(while B do S)K) ∪ C(K) C((while B do t)K) =  l((while B do t)K) : skip → l((if B then (t (while B do t))) K), l((if B then (t (while B do t))) K) : B → l(t(while B do t)K), l((if B then (t (while B do t))) K) : ¬B → l(K) ∪ C(t(while B do t)K) ∪ C(K) extr GP We first show that C((while B do t)K) ⊆/∼ hpt (C((while B do S)K)). We consider = the following label renaming: l((while B do t)K) 7→ ℓ−2 l((if B then (t (while B do t))) K) 7→ ℓ−1 l(t(while B do t)K) 7→ ℓ0 extr GP so that it remains to show that C(t(while B do t)K) ⊆/∼ hpt (C((while B do S)K)). = Since t = c1 t′ , with t′ = c2 ...cn+1 , let us analyze the five different cases for the first command c1 of t. (i) c1 ≡ x := E;. Thus, S0 ≡ x := E; T (while B do S)K, S1 ≡ T (while B do S)K, A0 ≡ x := E. In this case, C(t(while B do t)K) = {l(t(while B do t)K) : x := E → l(t′ (while B do t)K)} ∪ C(t′ (while B do t)K). Hence, it is enough to consider the relabeling l(t′ (while B do t)K) 7→ ℓ1 and to show extr GP that C(t′ (while B do t)K) ⊆/∼ hpt (C((while B do S)K)). = ACM Transactions on Programming Languages and Systems, Vol. V, No. N, Article A, Publication date: January YYYY. A:46 S. Dissegna et al. (ii) c1 ≡ skip; and S0 ≡ skip; T (while B do S)K. Thus, S1 ≡ T (while B do S)K, so that A0 ≡ skip. This case is analogous to the previous case (i). (iii) c1 ≡ skip; and S0 ≡ (while B ′ do S ′ )T (while B do S)K. Thus, S1 ≡ (if B ′ then (S ′ (while B ′ do S ′ )))T (while B do S)K and A0 ≡ skip. Here, we have that C(t(while B do t)K) = {l(t(while B do t)K) : skip → l(t′ (while B do t)K)} ∪ C(t′ (while B do t)K). Again, it is enough to consider the relabeling l(t′ (while B do t)K) 7→ ℓ1 and to show extr GP that C(t′ (while B do t)K) ⊆/∼ hpt (C((while B do S)K)). = ′ (iv) c1 ≡ bail ¬B to (T (while B do S)K), with S0 ≡ (if B ′ then S ′ )T (while B do S)K and BJB ′ Kρ0 = true, so that S1 ≡ S ′ T (while B do S)K and A0 ≡ B ′ . In this case: C(t(while B do t)K) = {l(t(while B do t)K) : ¬B ′ → l(T (while B do S)K), l(t(while B do t)K) : B ′ → l(t′ (while B do t)K)} ∪ C(T (while B do S)K) ∪ C(t′ (while B do t)K), C(S(while B do S)K) = {l(S(while B do S)K) : B ′ → l(S ′ T (while B do S)K), l(S(while B do S)K) : ¬B ′ → l(T (while B do S)K)} ∪ C(S ′ T (while B do S)K) ∪ C(T (while B do S)K). Hence, since l(t(while B do t)K) 7→ ℓ0 and A0 ≡ B ′ , it is enough to consider the relabeling l(t′ (while B do t)K) 7→ ℓ1 and to show that C(t′ (while B do t)K) ⊆/∼ = extr GP (C((while B do S)K)). hpt (v) c1 ≡ bail B ′ to (S ′ T (while B do S)K), with S0 ≡ (if B ′ then S ′ )T (while B do S)K and BJB ′ Kρ0 = false, so that S1 ≡ T (while B do S)K and A0 ≡ ¬B ′ . In this case: C(t(while B do t)K) = {l(t(while B do t)K) : B ′ → l(S ′ T (while B do S)K), l(t(while B do t)K) : ¬B ′ → l(t′ (while B do t)K)} ∪ C(S ′ T (while B do S)K) ∪ C(t′ (while B do t)K), while C(S(while B do S)K) is the same as in the previous point (iv). Hence, since l(t(while B do t)K) 7→ ℓ0 and A0 ≡ ¬B ′ , it is enough to consider the relabeling l(t′ (while B do t)K) 7→ ℓ1 and to show that C(t′ (while B do t)K) ⊆/∼ = extr GP hpt (C((while B do S)K)). Thus, in order to prove this containment, it remains to show that ′ extr GP C(t′ (while B do t)K) ⊆/∼ hpt (C((while B do S)K)). If t = ǫ then the con= GP tainment boils down to C((while B do t)K) ⊆/∼ extr hpt (C((while B do S)K)) which = is therefore proved. Otherwise, t′ = c2 t′′ , so that the containment can be inductively proved by using the same five cases (i)-(v) above. Let us now show the reverse containment, that is, extr GP hpt (C((while B do S)K)) ⊆/∼ = C((while B do t)K). For the trace t = c1 c2 ...cn+1 , we know by (∗) that each command ci either is in {skip; , x := E; } or is one of the two following bail commands (cf. cases (3) and (4) in (∗)): bail ¬B ′ to (T (while B do S)K), bail B ′ to (S ′ T (while B do S)K). Furthermore, at least a bail command occurs in t because there exists at least a conditional command Hk in hpt . Let ck , with k ∈ [1, n + 1], be the first bail command occurring in t. Thus, since the sequence c1 ...ck−1 consists of skip and assignment commands ACM Transactions on Programming Languages and Systems, Vol. V, No. N, Article A, Publication date: January YYYY. An Abstract Interpretation-based Model of Tracing Just-In-Time Compilation A:47 only, we have that C(t(while B do t)K) ⊇ C(ck ...cn+1 (while B do t)K). Hence, either C(ck ...cn+1 (while B do t)K) ⊇ C(T (while B do S)K) or C(ck ...cn+1 (while B do t)K) ⊇ C(T (while B do S)K). In both cases, we obtain that C(ck ...cn+1 (while B do t)K) ⊇ C((while B do S)K), so that C((while B do S)K) ⊆ C(t(while B do t)K) ⊆ C((while B do t)K). Thus, it remains to show that {ℓ−2 : skip → ℓ−1 , ℓ−1 : B → ℓ0 , ℓ−1 : ¬B → l(K)} ∪ {ℓi : Ai → ℓnext(i) | i ∈ [0, n]} ∪ {ℓi : ¬Ai → l(Snext(i) )c | i ∈ [0, n], Ai ∈ BExp} is contained in C(t(while B do t)K). We consider the following label renaming: ℓ−2 → 7 l((while B do t)K) ℓ−1 → 7 l((if B then (t (while B do t))) K) ℓ0 → 7 l(t(while B do t)K) so that it remains to check that for any i ∈ [0, n], the commands ℓi : Ai → ℓnext(i) and ℓi : ¬Ai → l(Snext(i) )c , when Ai ∈ BExp, are in C(t(while B do t)K). We analyze the possible five cases listed in (∗) for the action A0 : (i) A0 ≡ skip because S0 ≡ skip; T (while B do S)K. Here, t = skip; t′ . Hence, l(t(while B do t)K) : skip → l(t′ (while B do t)K) ∈ C(t(while B do t)K) and it is enough to use the relabeling ℓ1 7→ l(t′ (while B do t)K). (ii) A0 ≡ x := e because S0 ≡ x := E; T (while B do S)K, so that t ≡ x := E; t′ . Analogous to case (i). (iii) A0 ≡ skip because S0 ≡ (while B ′ do S ′ )T (while B do S)K. Here, t = skip; t′ . Here, again, l(t(while B do t)K) : skip → l(t′ (while B do t)K) ∈ C(t(while B do t)K), so that it is enough to use the relabeling ℓ1 7→ l(t′ (while B do t)K). (iv) A0 ≡ B ′ because S0 ≡ (if B ′ then S ′ )T (while B do S)K and BJB ′ Kρ0 = true. Thus, t = (bail ¬B ′ to (T (while B do S)K))t′ and S1 ≡ T (while B do S)K. Note that l(S1 )c = l(T (while B do S)K). Hence, l(t(while B do t)K) : ¬B ′ → l(T (while B do S)K) ∈ C(t(while B do t)K), l(t(while B do t)K) : B ′ → l(t′ (while B do t)K) ∈ C(t(while B do t)K). Once again, the relabeling ℓ1 7→ l(t′ (while B do t)K) allows us to obtain that ℓ0 : B ′ → ℓ1 and ℓ0 : ¬B ′ → l(T (while B do S)K) are in C(t(while B do t)K). (v) A0 ≡ ¬B ′ because S0 ≡ (if B ′ then S ′ )T (while B do S)K and BJB ′ Kρ0 = false. Here, t = (bail B ′ to (S ′ T (while B do S)K))t′ and S1 ≡ T (while B do S)K. Note that l(S1 )c = l(S ′ T (while B do S)K). Hence, l(t(while B do t)K) : B ′ → l(S ′ T (while B do S)K) ∈ C(t(while B do t)K), l(t(while B do t)K) : ¬B ′ → l(t′ (while B do t)K) ∈ C(t(while B do t)K). Thus, through the relabeling ℓ1 7→ l(t′ (while B do t)K) we obtain that ℓ0 : ¬B ′ → ℓ1 and ℓ0 : B ′ → l(S ′ T (while B do S)K) are in C(t(while B do t)K). This case analysis (i)-(v) for the action A0 can be iterated for all the other actions Ai , with i ∈ [1, n], and this allows us to close the proof. Finally, we can also state the correctness of the GP trace extraction transform for the store changes abstraction as follows. T HEOREM 10.12 (C ORRECTNESS OF GP TRACE EXTRACTION ). For any P ∈ GP Program, hp = C0 · · · Cn ∈ αGP hot (TJP K), we have that αsc (TJextr hp (P )K) = αsc (TJP K). ACM Transactions on Programming Languages and Systems, Vol. V, No. N, Article A, Publication date: January YYYY. A:48 S. Dissegna et al. The proof of Theorem 10.12 is omitted, since it is a conceptually straightforward adaptation of the proof technique for the analogous Theorem 6.2 on the correctness of trace extraction. Let us observe that since αsc is a stronger abstraction than αρsc and, by Theorem 10.6, we know that αρsc characterizes bisimilarity, we obtain the socalled Stitch lemma in [Guo and Palsberg 2011, Lemma 3.6] as a straight consequence ρ of Theorem 10.12: αρsc (TJextr GP hp (P )K) = αsc (TJP K). 11. CONCLUSION AND FURTHER WORK This article put forward a formal model of tracing JIT compilation which allows: (1) an easy definition of program hot paths—that is, most frequently executed program traces; (2) to prove the correctness of a hot path extraction transform of programs; (3) to prove the correctness of dynamic optimizations confined to hot paths, such as dynamic type specialization along a hot path. Our approach is based on two main ideas: the use of a standard trace semantics for modeling the behavior of programs and the use of abstract interpretation for defining the notion of hot path as an abstraction of the trace semantics and for proving the correctness of hot path extraction and optimization. We have shown that this framework is more flexible than Guo and Palsberg [2011] model of tracing JIT compilation, which relies on a notion of correctness based on operational program bisimulations, and allows to overcome some limitations of [Guo and Palsberg 2011] on selection and annotation of hot paths and on the correctness of optimizations such as dead store elimination. We expect that most optimizations employed by tracing JIT compilers can be formalized and proved correct using the proof methodology of our framework. We see a number of interesting avenues for further work on this topic. As a significant example of optimization implemented by a practical tracing compiler, it would be worth to cast in our model the allocation removal optimization for Python described by Bolz et al. [2011] in order to formally prove its correctness. Then, we think that our framework could be adapted in order to provide a model of whole-method just-in-time compilation, as used, e.g., by IonMonkey [Mozilla Foundation 2013], the current JIT compilation scheme in the Firefox JavaScript engine. Finally, the main ideas of our model could be useful to study and relate the foundational differences between traditional static vs dynamic tracing compilation. ACKNOWLEDGMENTS We are grateful to the anonymous referees for their helpful comments. REFERENCES K. Adams, J. Evans, B. Maher, G. Ottoni, A. Paroski, B. Simmers, E. Smith, and O. Yamauchi. 2014. The Hiphop virtual machine. In Proceedings of the 2014 ACM International Conference on Object Oriented Programming Systems Languages (OOPSLA 2014). ACM, New York, NY, USA, 777–790. DOI:http://dx.doi.org/10.1145/2660193.2660199 V. Bala, E. Duesterwald, and S. Banerjia. 2000. Dynamo: a transparent dynamic optimization system. In Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2000). ACM, New York, NY, USA, 1–12. DOI:http://dx.doi.org/10.1145/349299.349303 R. Barbuti, N. De Francesco, A. Santone, and G. Vaglini. 1999. Abstract interpretation of trace semantics for concurrent calculi. Inform. Process. Lett. 70, 2 (1999), 69–78. DOI:http://dx.doi.org/10.1016/S0020-0190(99)00042-3 S. Bauman, R. Bolz, C.F. Hirschfeld, V. Krilichev, T. Pape, J.G. Siek, and S. Tobin-Hochstadt. 2015. Pycket: A tracing JIT for a functional language. In Proceedings of the 20th ACM SIGPLAN International Conference on Functional Programming (ICFP 2015). ACM, New York, NY, USA, 22–34. DOI:http://dx.doi.org/10.1145/2784731.2784740 M. Bebenita, F. Brandner, M. Fahndrich, F. Logozzo, W. Schulte, N. Tillmann, and H. Venter. 2010. SPUR: a trace-based JIT compiler for CIL. In Proceedings of the ACM International Conference on Object Oriented ACM Transactions on Programming Languages and Systems, Vol. V, No. N, Article A, Publication date: January YYYY. An Abstract Interpretation-based Model of Tracing Just-In-Time Compilation A:49 Programming Systems Languages and Applications (OOPSLA 2010). ACM, New York, NY, USA, 708– 725. DOI:http://dx.doi.org/10.1145/1869459.1869517 I. Böhm, T.J.K. Edler von Koch, S.C. Kyle, B. Franke, and N. Topham. 2011. Generalized just-in-time trace compilation using a parallel task farm in a dynamic binary translator. In Proceedings of the 32nd ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2011). ACM, New York, NY, USA, 74–85. DOI:http://dx.doi.org/10.1145/1993498.1993508 C.F. Bolz, A. Cuni, M. Fijałkowski, M. Leuschel, S. Pedroni, and A. Rigo. 2011. Allocation removal by partial evaluation in a tracing JIT. In Proceedings of the 20th ACM SIGPLAN Workshop on Partial Evaluation and Program Manipulation (PEPM 2011). ACM, ACM, New York, NY, USA, 43–52. DOI:http://dx.doi.org/10.1145/1929501.1929508 C.F. Bolz, A. Cuni, M. Fijalkowski, and A. Rigo. 2009. Tracing the meta-level: PyPy’s tracing JIT compiler. In Proceedings of the 4th Workshop on the Implementation, Compilation, Optimization of ObjectOriented Languages and Programming Systems (ICOOOLPS 2009). ACM, New York, NY, USA, 18–25. DOI:http://dx.doi.org/10.1145/1565824.1565827 C. Colby and P. Lee. 1996. Trace-based program analysis. In Proceedings of the 23rd ACM SIGACTSIGPLAN Symposium on Principles of Programming Languages (POPL 1996). ACM, New York, NY, USA, 195–207. DOI:http://dx.doi.org/10.1145/237721.237776 P. Cousot. 1997. Constructive design of a hierarchy of semantics of a transition system by abstract interpretation (Extended Abstract). Electronic Notes in Theoretical Computer Science 6, 0 (1997), 77–102. DOI:http://dx.doi.org/10.1016/S1571-0661(05)80168-9 Proceedings of the 13th Annual Conference on Mathematical Foundations of Progamming Semantics (MFPS XIII). P. Cousot. 2002. Constructive design of a hierarchy of semantics of a transition system by abstract interpretation. Theoretical Computer Science 277, 1-2 (2002), 47–103. P. Cousot and R. Cousot. 1977. Abstract interpretation: a unified lattice model for static analysis of programs by construction or approximation of fixpoints. In Proceedings of the 4th ACM SIGACT-SIGPLAN Symposium on Principles of Programming Languages (POPL 1977). ACM, New York, NY, USA, 238–252. DOI:http://dx.doi.org/10.1145/512950.512973 P. Cousot and R. Cousot. 1979. Systematic design of program analysis frameworks. In Proceedings of the 6th ACM SIGACT-SIGPLAN Symposium on Principles of Programming Languages (POPL 1979). ACM, New York, NY, USA, 269–282. DOI:http://dx.doi.org/10.1145/567752.567778 P. Cousot and R. Cousot. 2002. Systematic design of program transformation frameworks by abstract interpretation. In Proceedings of the 29th ACM SIGACT-SIGPLAN Symposium on Principles of Programming Languages (POPL 2002). ACM, New York, NY, USA, 178–190. DOI:http://dx.doi.org/10.1145/503272.503290 S. Dissegna, F. Logozzo, and F. Ranzato. 2014. Tracing compilation by abstract interpretation. In Proceedings of the 41st ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL 2014). ACM, New York, NY, USA, 47–59. DOI:http://dx.doi.org/10.1145/2535838.2535866 Ecma International. 2015. Standard ECMA-262, ECMAScript 2015 Language Specification, 6th Edition. http://www.ecma-international.org/ecma-262/6.0. (2015). Facebook Inc. 2013. The HipHop Virtual Machine. (Oct. 2013). https://www.facebook.com/hhvm. A. Gal, B. Eich, M. Shaver, D. Anderson, D. Mandelin, M.R. Haghighat, B. Kaplan, G. Hoare, B. Zbarsky, J. Orendorff, J. Ruderman, E.W. Smith, R. Reitmaier, M. Bebenita, M. Chang, and M. Franz. 2009. Trace-based just-in-time type specialization for dynamic languages. In Proceedings of the 2009 ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2009). ACM, New York, NY, USA, 465–478. A. Gal, C.W. Probst, and M. Franz. 2006. HotPathVM: an effective JIT compiler for resource-constrained devices. In Proceedings of the 2nd International Conference on Virtual Execution Environments (VEE 2006). ACM, ACM, New York, NY, USA, 144–153. DOI:http://dx.doi.org/10.1145/1542476.1542528 Google Inc. 2010. A new crankshaft for V8. (Dec. 2010). The Chromium Blog. S. Guo and J. Palsberg. 2011. The essence of compiling with traces. In Proceedings of the 38th ACM SIGACTSIGPLAN Symposium on Principles of Programming Languages (POPL 2011). ACM, New York, NY, USA, 563–574. DOI:http://dx.doi.org/10.1145/1926385.1926450 M. Handjieva and S. Tzolovski. 1998. Refining static analyses by trace-based partitioning using control flow. In Proceedings of the 5th International Static Analysis Symposium (SAS 1998) (LNCS), Vol. 1503. Springer, Berlin, Germany, 200–214. DOI:http://dx.doi.org/10.1007/3-540-49727-7 12 C. Häubl and H. Mössenböck. 2011. Trace-based compilation for the Java HotSpot virtual machine. In Proceedings of the 9th International Conference on Principles and Practice of Programming in Java (PPPJ 2011). ACM, New York, NY, USA, 129–138. DOI:http://dx.doi.org/10.1145/2093157.2093176 ACM Transactions on Programming Languages and Systems, Vol. V, No. N, Article A, Publication date: January YYYY. A:50 S. Dissegna et al. C. Häubl, C. Wimmer, and H. Mössenböck. 2014. Trace transitioning and exception handling in a tracebased JIT compiler for Java. ACM Trans. Archit. Code Optim. 11, 1, Article 6 (Feb. 2014), 26 pages. DOI:http://dx.doi.org/10.1145/2579673 H. Inoue, H. Hayashizaki, Peng Wu, and T. Nakatani. 2011. A trace-based Java JIT compiler retrofitted from a method-based compiler. In 9th Annual IEEE/ACM International Symposium on Code Generation and Optimization (CGO 2011). IEEE Computer Society, Washington, DC, USA, 246–256. DOI:http://dx.doi.org/10.1109/CGO.2011.5764692 F. Logozzo. 2009. Class invariants as abstract interpretation of trace semantics. Computer Languages, Systems and Structures 35, 2 (2009), 100–142. DOI:http://dx.doi.org/10.1016/j.cl.2005.01.001 R. Milner. 1995. Communication and Concurrency. Prentice Hall, Englewood Cliffs, NJ. Mozilla Foundation. 2010. TraceMonkey. (Oct. 2010). MozillaWiki. Mozilla Foundation. 2013. IonMonkey. (May 2013). MozillaWiki. M. Pall. 2005. The LuaJIT Project. http://luajit.org. (2005). X. Rival. 2004. Symbolic transfer function-based approaches to certified compilation. In Proceedings of the 31st ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL ’04). ACM, New York, NY, USA, 1–13. DOI:http://dx.doi.org/10.1145/964001.964002 X. Rival and L. Mauborgne. 2007. The trace partitioning abstract domain. ACM Trans. Program. Lang. Syst. 29, 5, Article 26 (2007), 51 pages. DOI:http://dx.doi.org/10.1145/1275497.1275501 T. Schilling. 2013. Trace-based Just-In-Time Compilation for Lazy Functional Programming Languages. Ph.D. Dissertation. University of Kent, UK. D.A. Schmidt. 1998. Trace-based abstract interpretation of operational semantics. Lisp Symb. Comput. 10, 3 (1998), 237–271. DOI:http://dx.doi.org/10.1023/A:1007734417713 F. Spoto and T. Jensen. 2003. Class analyses as abstract interpretations of trace semantics. ACM Trans. Program. Lang. Syst. 25, 5 (2003), 578–630. DOI:http://dx.doi.org/10.1145/937563.937565 M.N. Wegman and F.K. Zadeck. 1991. Constant propagation with conditional branches. ACM Trans. Program. Lang. Syst. 13, 2 (1991), 181–210. DOI:http://dx.doi.org/10.1145/103135.103136 ACM Transactions on Programming Languages and Systems, Vol. V, No. N, Article A, Publication date: January YYYY.
6cs.PL
Safe Exploration in Continuous Action Spaces Gal Dalal 1 2 Krishnamurthy Dvijotham 2 Matej Vecerik 2 Todd Hester 2 Cosmin Paduraru 2 Yuval Tassa 2 arXiv:1801.08757v1 [cs.AI] 26 Jan 2018 Abstract We address the problem of deploying a reinforcement learning (RL) agent on a physical system such as a datacenter cooling unit or robot, where critical constraints must never be violated. We show how to exploit the typically smooth dynamics of these systems and enable RL algorithms to never violate constraints during learning. Our technique is to directly add to the policy a safety layer that analytically solves an action correction formulation per each state. The novelty of obtaining an elegant closed-form solution is attained due to a linearized model, learned on past trajectories consisting of arbitrary actions. This is to mimic the real-world circumstances where data logs were generated with a behavior policy that is implausible to describe mathematically; such cases render the known safety-aware offpolicy methods inapplicable. We demonstrate the efficacy of our approach on new representative physics-based environments, and prevail where reward shaping fails by maintaining zero constraint violations. 1. Introduction In the past two decades, RL has been mainly explored in toy environments (Sutton & Barto, 1998) and video games (Mnih et al., 2015), where real-world applications were limited to a few typical use-cases such as recommender systems (Shani et al., 2005). However, RL is recently also finding its path into industrial applications in the physical world; e.g., datacenter cooling (Evans & Gao, 2016), robotics (Gu et al., 2016), and autonomous vehicles (Sallab et al., 2017). In all these use-cases, safety is a crucial concern: unless safe operation is addressed thoroughly and ensured from the first moment of deployment, RL is deemed incompatible for them. In real-world applications such as the above, constraints are an integral part of the problem description, and never vio1 Technion, Israel Institute of Technology 2 Google DeepMind. Correspondence to: Gal Dalal <[email protected]>. lating them is often a strict necessity. Therefore, in this work, we define our goal to be maintaining zero-constraintviolations throughout the whole learning process. Note that accomplishing this goal for discrete action spaces is more straightforward than for continuous ones. For instance, one can pre-train constraint-violation classifiers on offline data for pruning unsafe actions. However, in our context, this goal becomes considerably more challenging due to the infinite number of candidate actions. Nevertheless, we indeed manage to accomplish this goal for continuous action spaces and show to never violate constraints throughout the whole learning process. Specifically, we tackle the problem of safe control in physical systems, where certain observable quantities are to be kept constrained. To illustrate, in the case of datacenter cooling, temperatures and pressures are to be kept below respective thresholds at all times; a robot must not exceed limits on angles and torques; and an autonomous vehicle must always maintain its distance from obstacles above some margin. In this work, we denote these quantities as safety signals. As these are physical quantities, we exploit their smoothness for avoiding unexpected, unsafe operation. Moreover, we deal with the common situation where offline logged data are available; it thus can be used to pretrain models for aiding safety from the initial RL deployment moments. Safe exploration, as depicted above, traditionally requires access to data generated with some known behavior policy upon which gradual safe updates are performed; see (Thomas, 2015) for a comprehensive study of such offpolicy methods. Such data are necessary because, unless assumed otherwise, actions in one state might have catastrophic consequences down the road. Hence, long-term behavior should be inferred in advance prior to deployment. In contrast, in this work, we eliminate the need for behavior-policy knowledge as we focus on physical systems, whose actions have relatively short-term consequences. Obviating behavior-policy knowledge is a key benefit in our work, as lack of such data is a challenging yet familiar real-world situation. It is rarely the case that past trajectories in complex systems were generated using a consistent behavior policy that can be mathematically described. Such systems are traditionally controlled by humans or sophisticated software whose logic is hard to por- Safe Exploration in Continuous Action Spaces tray. Hence, off-policy RL methods are deemed inapplicable in such situations. Contrarily, we show how singlestep transition data can be efficiently exploited for ensuring safety. To demonstrate our method’s independence of a behavior policy, in our experiments we generate our pretraining data with purely random actions. Our approach relies on one-time initial pre-training of a model that predicts the change in the safety signal over a single time step. This model’s strength stems from its simplicity: it is a first-order approximation with respect to the action, where its coefficients are the outputs of a state-fed neural network (NN). We then utilize this model in a safety layer that is composed directly on top the agent’s policy to correct the action if needed; i.e., after every policy query, it solves an optimization problem for finding the minimal change to the action such that the safety constraints are met. Thanks to the linearity with respect to actions, the solution can be derived analytically in closed-form and amounts to basic arithmetic operations. Thus, our safety layer is both differentiable and has a trivial three-line software implementation. Note that relating to our safety mechanism as a ‘safety layer’ is purely a semantical choice; it merely is a simple calculation that is not limited to the nowadays popular deep policy networks and can be applied to any continuous-control algorithm (not necessarily RL-based). 2. Related Work As this work focuses on control problems with continuous state and action spaces, we limit our comparison to the literature on safe RL in the context of policy optimization that attempts to maintain safety also during the learning process. Such an example is (Achiam et al., 2017), where constrained policy optimization was solved with a modified trust-region policy gradient. There, the algorithm’s update rule projected the policy to a safe feasibility set in each iteration. Under some policy regularity assumptions, it was shown to keep the policy within constraints in expectation. As such, it is unsuitable to our use-cases, where safety must be ensured for all visited states. Another recent work (Berkenkamp et al., 2017) described control-theoretic conditions under which safe operation can be guaranteed for a discretized deterministic control framework. An appropriate Lyapunov function was identified for policy attraction regions if certain Lipschitz continuity conditions hold. Though under the appropriate conditions safe exploration was guaranteed, knowledge on the specific system was required. Moreover, a NN may not be Lipschitz continuous with a reasonable coefficient. Lastly, very recent work (Pham et al., 2017) utilized an in-graph QP solver first introduced in (Amos & Kolter, 2017). It exhibited an approach similar in nature to the one we take: solve an optimization problem in the policy-level, for ensuring safety on a state-wise basis. However, two main differences are to be noticed. First, the solution there relied on an in-graph implementation of a full QP solver (Amos & Kolter, 2017), which runs an iterative interior-point algorithm with each forward propagation. This is both a challenge to implement (currently only a pytorch version is available), and computationally expensive. An additional difference from our work is that in (Pham et al., 2017) expert knowledge was required to explicitly hand-design the physical constraints of a robotic arm. Contrarily, in our method no such manual effort is needed; these dynamics are learned directly from data, while also being behavior-policy independent. To summarize, this work is the first, to our knowledge, to solve the problem of state-wise safety directly at the policy level, while also doing it in a data-driven fashion using arbitrary data logs. Moreover, it can be applied to any continuous-control algorithm; it is not restricted to a specific RL algorithm or any at all. 3. Definitions We consider a special case of constrained Markov decision processes (CMDP) (Altman, 1999), where observed safety signals should be kept bounded. First, let us denote by [K] + the set {1, . . . , K}, and by [x] the operation max{x, 0}, where x ∈ R. A CMDP is a tuple (S, A, P, R, γ, C), where S is a state space, A is an action space, P : S × A × S → [0, 1] is a transition kernel, R : S × A → R is a reward function, γ ∈ (0, 1) is a discount factor, and C = {ci : S × A → R | i ∈ [K]} is a set of immediate-constraint functions. Based on that, we also define a set of safety signals C¯ = {c̄i : S → R | i ∈ [K]}. These are per-state observations of the immediate-constraint values, which we introduce for later ease of notation. To illustrate, if c1 (s, a) is the temperature in a datacenter to be sensed after choosing a in s, c̄1 (s0 ) is the same temperature sensed in s0 after transitioning to it. In the type of systems tackled in this work, P is deterministic and determines f s.t. s0 = f (s, a). Thus, we have c̄i (s0 ) , ci (s, a). For a general non-deterministic transition kernel, c̄i (s0 ) can be defined as the expectation over s0 ∼ P (·|s, a). Lastly, let policy µ : S → A be a stationary mapping from states to actions. 4. State-wise Constrained Policy Optimization We study safe exploration in the context of policy optimization, where at each state, all safety signals c̄i (·) are upper bounded by corresponding constants Ci ∈ R: ∞ X max E[ γ t R(st , µθ (st ))] θ s.t. t=0 c̄i (st ) ≤ Ci ∀i ∈ [K] , where µθ is a parametrized policy. (1) Safe Exploration in Continuous Action Spaces We stress that our goal is to ensure state-wise constraints not only for the solution of (1), but also for its optimization process. This goal might be intractable in general since for an arbitrary MDP some actions can have a long-term effect in terms of possible state paths. However, for the types of physical systems we consider it is indeed plausible that safety constraints can be ensured by adjusting the action in a single (or few) time step(s). In the context of our realworld use-cases, cooling system dynamics are governed by factors such as the first-order heat-transfer differential equation (Goodwine, 2010), and the second-order Newton differential equation that governs the water mass transfer. The latter also governs the movement of a robotic arm or a vehicle on which one applies forces. In these types of control problems, it is feasible to satisfy state-wise constraints even in the presence of inertia given reasonable slack in the choice of Ci . We expand on this further and provide evidence in Section 7. 5. Linear Safety-Signal Model Figure 1. Each safety signal ci (s, a) is approximated with a linear model with respect to a, whose coefficients are features of s, extracted with a NN. fields, e.g. aircraft design (Liang & Sun, 2013). For a comprehensive study see (Enqvist, 2005). Given a policy-oblivious set of tuples D = {(sj , aj , s0j )}, we train g(s; wi ) by solving arg min wi Solving (1) is a difficult task, even for the types of systems listed above. A major contributor to this challenge is the RL agent’s intrinsic need to explore for finding new and improved actions. Without prior knowledge on its environment, an RL agent initialized with a random policy cannot ensure per-state constraint satisfaction during the initial training stages. This statement also holds when the reward is carefully shaped to penalize undesired states: for an RL agent to learn to avoid undesired behavior it will have to violate the constraints enough times for the negative effect to propagate in our dynamic programming scheme. In this work, we thus incorporate some basic form of prior knowledge, based on single-step dynamics. Single-step transition data in logs is rather common, and, as explained before, more realistic compared to also knowing behavior policies. We do not attempt to learn the full transition model, but solely the immediate-constraint functions ci (s, a). While it is attractive to simply approximate them with NNs that take (s, a) as inputs, we choose a more elegant approach that comes with significant advantages listed in Subsection 6.1. Namely, we perform the following linearization: X c̄i (s0 ) − (c̄i (s) + g(s; wi )> a) 2 , (2) (s,a,s0 )∈D where c̄i (s) is assumed to be included in s. In our experiments, to generate D we merely initialize the agent in a uniformly random location and let it perform uniformly random actions for multiple episodes. The episodes terminate when a time limit is reached or upon constraint violation. The latter corresponds to real-world mechanisms governing production systems: high-performance, efficient control is often backed up by an inefficient conservative policy; when unsafe operation flags are raised, a preemption mechanism is triggered and the conservative policy kicks in to ensure constraint satisfaction. Training g(s; wi ) on D is performed once per task as a pretraining phase that precedes the RL training. However, additional continual training of g(s; wi ) during RL training is also optional. Since in our experiments continual training showed no benefit compared to solely pre-training, we only show results of the latter. 6. Safety Layer via Analytical Optimization where wi are weights of a NN, g(s; wi ), that takes s as input and outputs a vector of the same dimension as a. This model is a first-order approximation to ci (s, a) with respect to a; i.e., an explicit representation of sensitivity of changes in the safety signal to the action using features of the state. See Fig. 1 for a visualization. We now show how to solve problem (1) using the policy gradient algorithm (Baxter & Bartlett, 2001) via a simple addition to the policy itself. We experiment with Deep Deterministic Policy Gradient (DDPG) (Lillicrap et al., 2015) whose policy network directly outputs actions and not their probabilities. However, our approach is not limited to it and can be added, as is, to probabilistic policy gradient or any other continuous-control algorithm. Remark 1. Linear approximations of non-linear physical systems prove accurate and are well accepted in many Denote by µθ (s) the deterministic action selected by the deep policy network. Then, on top of the policy network c̄i (s0 ) , ci (s, a) ≈ c̄i (s) + g(s; wi )> a, Safe Exploration in Continuous Action Spaces Original policy Safety layer Figure 2. A safety layer is composed on top of a deep policy network, solving an action correction optimization program with each forward-propagation. Our linearized safety-signal model allows a closed-form solution µ̃θ (s) = arg mina f (s, a, µ(s)) that reduces to a trivial linear projection. we compose an additional, last layer, whose role is to solve arg min 12 ka − µθ (s)k2 (3) a s.t. ci (s, a) ≤ Ci ∀i ∈ [K] . This layer, which we refer to as safety layer, perturbs the original action as little as possible in the Euclidean norm in order to satisfy the necessary constraints. Fig. 2 visualizes its relation to the policy network. To solve (3) we now substitute our linear model for ci (s, a), introduced in Section 5, and obtain the quadratic program a∗ = arg min 21 ka − µθ (s)k2 (4) a s.t. c̄i (s) + g(s; wi )> a ≤ Ci ∀i ∈ [K] . Moreover, for other systems with multiple intersecting constraints, a joint model can be learned. For instance, instead of treating distances from two walls as two constraints, the minimum between them can be treated as a single constraint. In rudimentary experiments, this method produced similar results to not using it, when we grouped two constraints into one, in the first and simplest task in Section 7. However, jointly modeling the dynamics of more than a few safety signals with a single g(·; ·) network is a topic requiring careful attention, which we leave for future work. We now provide the closed-form solution to (4). Proposition 1. Assume there exists a feasible solution to ∗ (4) denoted by (a∗ , {λ∗i }K i=1 ), where λi is the optimal Lagrange multiplier associated with the i-th constraint. Also, assume |{i|λ∗i > 0}| ≤ 1; i.e., at most one constraint is active. Then +  g(s; wi )> µθ (s) + c̄i (s) − Ci ∗ (5) λi = g(s; wi )> g(s; wi ) and a∗ = µθ (s) − λ∗i∗ g(s; wi∗ ), (6) where i∗ = arg maxi λ∗i . Proof. As the objective function and constraints in (4) are convex, a sufficient condition for optimality of a feasible solution (a∗ , {λ∗i }K i=1 ) is for it to satisfy the KKT conditions. The Lagrangian of (4) is L(a,λ) = Thanks to the positive-definite quadratic objective and linear constraints, we can now find the global solution to this convex problem. Generally, to solve it one can implement an in-graph iterative QP-solver such as in (Amos & Kolter, 2017). This would result in a method similar to the one in (Pham et al., 2017), but with the advantage that all the physical constraint model is learned directly from data instead of being hand-designed. Alternatively, if the number of active constraints is known to be bounded  by some m ≤ K, one can exhaustively iterate on all K m combinations of possibly active constraints and select the optimal feasible one; this would be reasonable for a small m. However, in this work, at the expense of one simplifying assumption, we gain the benefit of obtaining a closed-form analytical solution to (4) that has a trivial three-lines-ofcode software implementation. The assumption is that no more than a single constraint is active at a time. As demonstrated in our experiments, this is reasonable to assume when an agent navigates in a physical domain and avoids obstacles. As the distance from each obstacle is modeled as a separate constraint, only a single obstacle is the closest one at a time. Proximity to corners shows to pose no issues, as can be seen in the plots and videos in Section 7. 1 2 ka − µθ (s)k2 + K X  λi c̄i (s) + g(s; wi )> a − Ci ; i=1 and hence the KKT conditions at (a∗ , {λ∗i }K i=1 ) are ∇a L = a∗ − µθ (s) + K X λ∗i g(s; wi ) = 0, (7) i=1  λ∗i c̄i (s) + g(s; wi )> a∗ − Ci = 0 ∀i ∈ [K] . (8) First, consider the case where |{i|λ∗i > 0}| = 1, i.e., λ∗i∗ > 0. We then easily get (6) from (7). Next, from (8) we have that c̄i∗ (s)+g(s; wi∗ )> a∗ −Ci∗ = 0. Substituting (6) in the latter gives λ∗i∗ g(s; wi∗ )> g(s; wi∗ ) = g(s; wi∗ )> µθ (s) + c̄i∗ (s) − Ci∗ . This gives us (5) when i = i∗ . As for i ∈ [K] \ {i∗ }, the corresponding constraints are inactive since λ∗i = 0. Hence, c̄i (s) + g(s; wi )> a∗ − Ci < 0, making the fraction in (5) negative, which indeed results in a value of 0 due to the [·]+ operator and gives us (5) also when i ∈ [K] \ {i∗ }. To conclude the proof, consider the second case where λ∗i = 0 ∀i ∈ [K]. From (7) we have that a∗ = µθ (s). This gives us (6) since λ∗i∗ = 0. Lastly, (5) holds due to Safe Exploration in Continuous Action Spaces the same inactive constraints argument as above, this time uniformly ∀i ∈ [K]. The solution (6) is essentially a linear projection of the original action µθ (s) to the “safe” hyperplane with slope g(s; wi∗ ) and intercept c̄i∗ (s) − Ci∗ . In terms of implementation, it consists of a few primitive arithmetic operations: vector products followed by a ’max’ operation. The benefits of its simplicity are three-fold: i) it has a trivial, almost effortless software implementation; ii) its computational cost is negligible; and iii) it is differentiable (almost everywhere, as is ReLu). 6.1. An Alternative: Additional Loss Term To stress the prominence of our linear model in solving (3), we now briefly describe the drawbacks of an alternative likely choice we initially experimented with: a straightforward (s, a)-fed NN model for ci (s, a). In this case, an approximate solution to (3) can be obtained by penalizing the objective for constraint violations and solving the unconstrained surrogate  arg min a 1 2 ka 2 − µθ (s)k + K X + λi [ci (s, a) − Ci ]  , i=1 (9) where {λi > 0} are now hyper-parameters. Problem (9) can be solved numerically using gradient descent. However, even though from our experience this approach indeed works (corrects actions to safe ones), it is inferior to our analytic approach for several reasons: pre-trained safety layer to the policy network. As mentioned earlier, our RL algorithm of choice for the experiments is DDPG (Lillicrap et al., 2015). In this section we show that during training, DDPG never violates constraints and converges faster compared to without our addition. To mimic the physics-based use-cases described in this work, where continuous safety signals are observations of the state ought to be constrained, we set up appropriate simulation domains in Mujoco (Todorov et al., 2012). In these domains, an object is located in some feasible bounded region. Each of the constraints, therefore, lower bounds the object’s distance to each of the few boundaries. Though the lower bound on the distance is zero by the tasks’ definition, in practice we set it to be some small positive value to allow slack for avoidance actions in the presence of inertia. In all simulations, the episode immediately terminates in the case of a constraint violation. These conditions comply with the ones in our real-world examples: a datacenter cooling system’s maximal temperature set for the formulation and algorithm need not be the one originally defined by the datacetner operator; a lower, more conservative value can be set to allow for some slack. Episode termination corresponds to preemption, followed by a swap to some backup heuristic each time the conservative temperature cap is reached. We now introduce our two new Mujoco domains: Ball and Spaceship, consisting of two tasks each. The dynamics of Ball and Spaceship are governed by first and second order differential equations, respectively. As such, they are representative domains to the systems of interest in this paper. 7.1. Ball Domain 1. Running gradient descent with every policy query (i.e. forward propagation) requires sophisticated in-graph implementation and is computationally intensive. 2. Since the sensitivity of ci (s, a) varies for different entries in a, different orders of magnitude are observed in entries of the resulting gradient ∇a ci (s, a). This causes numerical instabilities and long convergence times, and requires careful stepsize selection. 3. Solutions to the non-convex (9) are local minima, which depend on non-reliable convergence of an iterative optimization algorithm, as opposed to the closedform global optimum we obtain for (4). 4. There are K hyper-parameters necessitating tuning. 7. Experiments Per each task introduced next, we run the initial pretraining phase described in Section 5. We construct D with 1000 random-action episodes per task. We then add our In the Ball domain, the goal is to bring a ball as close as possible to a changing target location, by directly setting the velocity of the ball every 4-th time-step (it is common for the operational frequency of a typical torque controller to be less than the environment’s one). Each episode lasts at most 30 seconds, during which the target is appearing in a new, uniformly random location every 2 seconds. Let us (d) now define the d-dimensional [a, b]-cube B[a,b] = {x|a ≤ xi ≤ b, i = 1, . . . , d}. The feasible region for the ball is (d) (d) B[0,1] , while for the target it is B[0.2,0.8] . If the ball steps (d) out of B[0,1] , the episode terminates. To allow some slack in maneuvering away from the boundaries, we set Ci in (3) so as to constrain the ball’s feasible region to effectively (d) be B[0.1,0.9] . This is for the safety layer to start correcting the actions once the ball steps out of the latter cube. Let the ball location, ball velocity and target location respectively be xB , vB , xT ∈ Rd . Then, s = (xB , vB , xT + d ), where d ∼ N (0, 0.05 · I d×d ); i.e., only a noisy estimate of the target is observed. The action a = vB ; i.e., it is Safe Exploration in Continuous Action Spaces Figure 3. Ball-1D (left) and Ball-3D (right) tasks. The goal is to keep the green ball as close as possible to the pink target ball by setting its velocity. The safe region is the [0, 1] interval in Ball-1D and the [0, 1] cube in Ball-3D; if the green ball steps out of it, the episode terminates. to set the velocity of the ball. Actions are taken every 4 time-steps and remain constant in between. The dynamics are governed by Newton’s laws, with a small amount of damping. The reward has a maximum of 1 when the ball is exactly at the target and quickly diminishes to 0  + away from it: R(s, a) = 1 − 10 · kxB − xT k22 . Lastly, γ = 0.99. Our experiments are conducted on two tasks: Ball-1D where d = 1, Ball-3D where d = 3. Images of the two can be found in Fig. 3. As the ball’s velocity is controlled directly, its dynamics are governed by a first-order differential equation. This domain thus represents phenomena such as heat transition and several known control tasks such as maintaining the speed of a rotating engine, whether it is a classic steam engine or cruise-control in modern vehicles (Sotomayor et al., 2006). Figure 4. Spaceship-Corridor (left) and Spaceship-Arena (right) tasks. The goal is to bring the green spaceship to to the pink rounded target by controlling its thrust engines. Touching the walls with the spaceship’s bow terminates the episode. when reaching the target and 0 elsewhere; and γ = 0.99. As in the Ball domain, a small gap away from each wall is incorporated in the choice of Ci in (3). This is for the safety layer to begin correcting the actions a few time-steps before the spaceship actually reaches a wall with its bow. For both tasks, this gap is 0.05, where, for comparison, the distance between the walls in Corridor task is 1. Since the control is via forces, the spaceship’s dynamics are governed by a second-order differential equation. This domain thus represents situations such as pumping masses of water for cooling, and actuating objects such as robotic arms. 7.3. Implementation Details 7.2. Spaceship Domain In the Spaceship domain, the goal is to bring a spaceship to a fixed target location by controlling its thrust engines. Hence, as opposed to setting velocities in the Ball domain, here we set the forces. Our first task for this domain is Spaceship-Corridor, where the safe region is bounded between two infinite parallel walls. Our second task, Spaceship-Arena, differs from the first in the shape of the safe region; it is bounded by four walls in a diamond form. Images of the two tasks are given in Fig. 4. Episodes terminate when one of the three events occur: the target is reached, the spaceship’s bow touches a wall, or the time limit is reached. Time limits are 15 seconds for Corridor and 45 seconds for Arena. Relating to the screenshots in Fig. 4, the spaceship’s initialization location is uniformly random in the lowest third part of the screen for Corridor, and the right-most third part of the screen for Arena. In this domain, the state is the spaceship’s location and velocities; the action a ∈ [−1, 1]2 actuates two thrust engines in forward/backward and right/left directions; the transitions are governed by the rules of physics where damping is applied; the reward is sparse: 1000 points are obtained Per each of the four tasks above, we pre-train the safetysignal model for each of the task’s constraints; i.e., we solve (2) for each i ∈ [K] using that task’s data-set D. In a hyper-parameter sweep, we witnessed that the ability to achieve our end-goal is relatively insensitive to the architecture of g(·; wi ) and a simple one suffices. Namely, for achieving zero-constraint-violations after plugging g(·; wi ) into the safety layer, a single-layered NN with 10 hidden neurons was adequate for all tasks. For training we use Adam optimizer (Kingma & Ba, 2014) with a batch size of 256. We also report that low validation errors for g(·; wi ) don’t necessarily correspond to a better safety layer; it is the exploratory nature of D that matters. Specifically, we witnessed the following counter-intuitive behavior: generating D with a policy that fixes a single randomly drawn action for each episode, as opposed to a random action in each step, yields better regression accuracy for g(·; wi ) but lesser safety layer performance. Based on a hyper-parameter sweep for DDPG, for the actor and critic we use two-hidden-layer NNs of respective sizes (100, 100) and (500, 500). The rest of the experiment parameters were taken to be as in (Lillicrap et al., 2015). Safe Exploration in Continuous Action Spaces Figure 5. Accumulated constraint violations (lower is better) throughout the training of DDPG+reward shaping, per each task. Plotted are medians with upper and lower quantiles of 10 seeds. The x-axis corresponds to different choice of M – the margin from limits in which reward penalty is incurred. The optimal choice of M is colored red. 7.4. Safety Layer versus Reward Shaping Before exhibiting the performance of our safety layer, we first relate to a natural alternative approach for ensuring safety: manipulate the agent to avoid undesired areas by artificially shaping the reward. This can be done by setting the reward to large negative values in subsets of the state-space. In our case, those areas are the neighborhood of the enclosing boundaries. Therefore, for comparison, we first ran a series of such reward shaping experiments on DDPG without the safety layer. We set the penalty to be on the same scale as the original reward: −1 in the Ball domain and −1000 in the spaceship domain. The margin from boundaries in which the shaping occurs is a parameter M which we cross-validated per each task. We experimented with values of M ∈ {0.08, 0.11, 0.14, 0.17, 0.2, 0.23}. Per each M , we ran DDPG, where each training episode is followed by an evaluation episode for which we count whether it terminated due to a constraint violation. Fig. 5 gives, per each M, the median with upper and lower quantiles of accumulated constraint violations of 10 seeds of DDPG runs. Per each task, we mark the best choice of M in red. Fig. 5 depicts the drawbacks of reward shaping for ensuring safety. The first fault is the failure to achieve our zeroconstraint-violations goal; all parameter choices resulted in significant portions of the episodes terminating due to violations. The second drawback is the difficulty of choosing the correct parameter. As seen in the figure, there is no clear trend for the dependence on M ; each task has a different ’best value’, and the plots have no structure. Next, we compare the performance of our safety layer to that of the best reward shaping choice, and to no reward shaping at all. Namely, we compare the following alternatives: DDPG, DDPG+reward shaping, and DDPG+safety layer. For reward shaping we use the same simulation re- sults of the best M (colored red in Fig. 5). The comparison outcomes are summarized in Fig. 6. Its top row gives the sum of discounted rewards per evaluation episode, and the bottom provides the number of constraint violations, accumulated over all evaluation episodes. The plots show medians along with upper and lower quantiles of 10 seeds. The most prominent insight from Fig. 6 is that the constraints were never violated with the safety layer. This is true for all 10 seeds of each of the four tasks. Secondly, the safety layer dramatically expedited convergence. For Spaceship, it is, in fact, the only algorithm that enabled convergence. In contrast, without the safety layer, a significant amount of episodes ended with a constraint violation and convergence was often not attained. This is due to the nature of our tasks: frequent episode terminations upon boundary crossing impede the learning process in our sparse reward environments. However, with the safety layer, these terminations never occur, allowing the agent to maneuver as if there were no boundaries. Next, the following domain-specific discussion is in order. In the Ball domain, since in the 1D task the target is always located in one of two possible directions, its reward is less sparse compared to 3D. This easy setup allowed DDPG to converge to a reasonable return value even without reward shaping or the safety layer; in 3D this happened only for the upper quantile of the seeds. In both tasks, an improvement was obtained with reward shaping. Nonetheless, DDPG+safety layer obtained the highest discounted return with much faster convergence. As for cumulative constraint violations, as DDPG converged slower than DDPG+reward shaping, it also stabilized later on a higher value. All the same, DDPG+safety layer accomplished our safety goal and maintained 0 accumulated constraint violations. Safe Exploration in Continuous Action Spaces Figure 6. Convergence and constraint violations of DDPG, DDPG+reward shaping, and DDPG+safety layer, per each task. Plotted are medians with upper and lower quantiles of 10 seeds. The top row shows the sum of discounted rewards, where the bottom gives the cumulative number of episodes terminated due to a constraint violation. As shown by the bottom blue curves, with the safety layer, constraints were never violated. In the Spaceship domain, the reward is obtained only once at the target, and the spaceship is re-initialized away from it with each constraint violation. This setup proves fatal for DDPG, which was not able to converge to any reasonable policy in both tasks. Surprisingly, reward shaping poses no improvement but rather has an adverse effect: it resulted in highly negative episodic returns. On the other hand, DDPG+safety layer converged extremely fast to a high-performing safe policy. This behavior stems from the closed-region type of tasks; exploring while straying away from the walls allowed the spaceship to quickly meet the target and then learn how to reach it. With regards to safety, DDPG+safety layer again prevailed where DDPG and DDPG+reward shaping failed, and maintained 0 accumulated constraint violations. 7.5. Videos To visualize the safety layer in action, we depict the intensity of its action correction via the magnitude of the dominant Lagrange multiplier λ∗i∗ as calculated in (5). We do so by coloring the Ball and Spaceship objects in varying shades of red. We share two videos of the colored agents showcasing the following. In Video 1, to track the learning process of an agent with the safety layer, we recorded several episodes during training in the Spaceship-Corridor task. These exhibit how the maneuvers produced by the safety layer to dodge the walls are gradually learned by the agent, as demonstrated by the less frequent coloring of the spaceship red. Video 1 is found in https://youtu.be/KgMvxVST-9U. In Video 2, per each task of the four, we show episodes of i) the first DDPG iteration (initialized with a random policy) with the safety layer off; ii) the same random initial policy but with the safety layer on; and iii) the final iteration of DDPG+safety layer, to demonstrate the task’s goal. Video 2 is found in https://youtu.be/yr6y4Mb1ktI. 8. Discussion In this work, we proposed a state-based action correction mechanism, which accomplishes the goal of zeroconstraint-violations in tasks where the agent is constrained to a confined region. This is in contrast with the standard reward shaping alternative, which has failed in achieving the above goal. The resulting gain is not only in maintaining safety but also in enhanced performance in terms of reward. This suggests our method promotes more efficient exploration – it guides the exploratory actions in the direction of feasible policies. Since our solution is stand-alone and applied directly at the policy level, it is independent of the RL algorithm used and can be plugged into any other continuous control algorithm. Throughout this work, we relate to a preemption mechanism implemented in real-world critical systems, which halts the RL agent in borderline situations and replaces it with a safe-operation heuristic. The latter runs until the sys- Safe Exploration in Continuous Action Spaces tem is back to being far from operation limits. This heuristic is expected to be conservative and less efficient than the RL agent; hence, the contribution of our work can also be interpreted as in reducing operational costs by minimizing the number of times such takeovers occur. Lastly, an advantage of our approach over off-policy methods, often considered in industry, is that one does not need to know the behavior policy used to generate existing data logs. This is thanks to our single-step model, which we train on trajectories generated with random actions. These trajectories are always within operating limits (due to episode termination when the limits are crossed) and are independent of any particular policy whose longterm behavior can be elevated. Nevertheless, they carry rich information due to their exploratory nature. It is thus intriguing to study in future work additional types of pretraining data that are typical to specific real-world domains. References Achiam, Joshua, Held, David, Tamar, Aviv, and Abbeel, Pieter. Constrained policy optimization. arXiv preprint arXiv:1705.10528, 2017. Altman, Eitan. Constrained Markov decision processes, volume 7. CRC Press, 1999. Amos, Brandon and Kolter, J Zico. Optnet: Differentiable optimization as a layer in neural networks. arXiv preprint arXiv:1703.00443, 2017. Baxter, Jonathan and Bartlett, Peter L. Infinite-horizon policy-gradient estimation. Journal of Artificial Intelligence Research, 15:319–350, 2001. Berkenkamp, Felix, Turchetta, Matteo, Schoellig, Angela P, and Krause, Andreas. Safe model-based reinforcement learning with stability guarantees. arXiv preprint arXiv:1705.08551, 2017. Enqvist, Martin. Linear models of nonlinear systems. 2005. Evans, Richard and Gao, Jim. Deepmind ai reduces google data centre cooling bill by 40%. DeepMind blog, 20, 2016. Goodwine, Bill. Engineering differential equations: theory and applications. Springer Science & Business Media, 2010. Gu, Shixiang, Holly, Ethan, Lillicrap, Timothy, and Levine, Sergey. Deep reinforcement learning for robotic manipulation with asynchronous off-policy updates. arXiv preprint arXiv:1610.00633, 2016. Kingma, Diederik and Ba, Jimmy. method for stochastic optimization. arXiv:1412.6980, 2014. Adam: A arXiv preprint Liang, Bin and Sun, Mao. Nonlinear flight dynamics and stability of hovering model insects. Journal of The Royal Society Interface, 10(85):20130269, 2013. Lillicrap, Timothy P, Hunt, Jonathan J, Pritzel, Alexander, Heess, Nicolas, Erez, Tom, Tassa, Yuval, Silver, David, and Wierstra, Daan. Continuous control with deep reinforcement learning. arXiv preprint arXiv:1509.02971, 2015. Mnih, Volodymyr, Kavukcuoglu, Koray, Silver, David, Rusu, Andrei A, Veness, Joel, Bellemare, Marc G, Graves, Alex, Riedmiller, Martin, Fidjeland, Andreas K, Ostrovski, Georg, et al. Human-level control through deep reinforcement learning. Nature, 518(7540):529– 533, 2015. Pham, Tu-Hoa, De Magistris, Giovanni, and Tachibana, Ryuki. Optlayer-practical constrained optimization for deep reinforcement learning in the real world. arXiv preprint arXiv:1709.07643, 2017. Sallab, Ahmad EL, Abdou, Mohammed, Perot, Etienne, and Yogamani, Senthil. Deep reinforcement learning framework for autonomous driving. Electronic Imaging, 2017(19):70–76, 2017. Shani, Guy, Heckerman, David, and Brafman, Ronen I. An mdp-based recommender system. Journal of Machine Learning Research, 6(Sep):1265–1295, 2005. Sotomayor, Jorge, Mello, Luis Fernando, and Braga, Denis de Carvalho. Stability and hopf bifurcation in the watt governor system. arXiv preprint math/0604177, 2006. Sutton, Richard S and Barto, Andrew G. Reinforcement learning: An introduction, volume 1. MIT press Cambridge, 1998. Thomas, Philip S. Safe reinforcement learning. 2015. Todorov, Emanuel, Erez, Tom, and Tassa, Yuval. Mujoco: A physics engine for model-based control. In Intelligent Robots and Systems (IROS), 2012 IEEE/RSJ International Conference on, pp. 5026–5033. IEEE, 2012.
2cs.AI
1 Global asymptotic stability of a PID control system with Coulomb friction arXiv:1609.09103v1 [cs.SY] 28 Sep 2016 Andrea Bisoffi, Mauro Da Lio, Andrew R. Teel and Luca Zaccarian Abstract—We propose a model for representing a point mass subject to Coulomb friction in feedback with a PID controller, based on a differential inclusion comprising all the possible magnitudes of static friction during the stick phase. For this model we study the set of all equilibria and we establish its global asymptotic stability using a discontinuous Lyapunov-like function, and a suitable LaSalle’s invariance principle. We finally use well-posedness of the proposed model to establish useful robustness results, including an ISS property from a suitable input in a perturbed context. Simulation results are also given to illustrate our statements. I. I NTRODUCTION F RICTION in mechanical systems has been investigated since the times of Leonardo da Vinci, Guillaume Amontons, Charles-Augustin de Coulomb and Arthur-Jules Morin. Their main findings acknowledge that, for a moving mass, the friction force is proportional to the normal force through a kinetic coefficient (Coulomb friction) and presents possibly a term proportional to the velocity (viscous friction), whereas at rest the friction force is bounded by the product of the normal force and a static coefficient, generally greater than the kinetic coefficient. Within the control community, the interest in the dynamical properties of friction had its peak in the 1990’s, and the control engineering reasons for this interest are lucidly argued in [18, §1]. These properties have been studied along a modeling direction, where we mention the Dahl model [10], the LuGre model [4], [8], the models by Bliman and Sorine [7] and the Leuven model [25]. The characteristics of all these models are also detailed in [11]. When a mass moves with steady velocity and the corresponding friction force is measured, there is a small interval of velocities near zero where the friction force decreases before increasing again due to viscous friction and this behaviour is given the name of Stribeck effect. Another experimental observation is the distinction between the two motion regimes of presliding and sliding. During presliding, the friction force is better described as a function of the (microsliding) displacement (see [20]), which is intuitively due Research supported in part by AFOSR grant FA9550-15-1-0155 and NSF grant ECCS-1508757, by the ANR project LimICoS contract number 12 BS03 005 01, and by grant OptHySYS funded by the University of Trento. A. Bisoffi and M. Da Lio are with Dipartimento di Ingegneria Industriale, University of Trento, Italy {andrea.bisoffi, mauro.dalio}@unitn.it A. R. Teel is with the Department of Electrical and Computer Engineering, University of California, Santa Barbara, CA 93106, USA [email protected] L. Zaccarian is with CNRS, LAAS, 7 avenue du Colonel Roche, F-31400 Toulouse, France and Université de Toulouse, 7 avenue du Colonel Roche, 31077 Toulouse cedex 4, France, and Dipartimento di Ingegneria Industriale, University of Trento, Italy [email protected] to the asperity junctions that build up between the surfaces and that behave like stiff springs [11]. After a critical value of displacement (and a break-away force) is reached, the sliding motion can begin. This property that the friction force is only position dependent is called rate independence [4], and is to be found in the Dahl model [18, §4.1], and in the models by Bliman and Sorine [18, §5.1]. In the latter ones, considering friction as depending only on the path allows using the theory of hysteresis operators [16], [27]. On the other hand, rate dependence holds for the LuGre model [8]. As a final remark, the LuGre model itself proved to be amenable to theoretical analysis, as [6] presents necessary and sufficient conditions for the passivity of its underlying operator from velocity to friction force. In this work, we propose to characterize Coulomb friction in terms of differential inclusions [5], and we apply this characterization to the case of a point mass under such a friction force and actuated by a proportional-integral-derivative (PID) controller. This problem is a classical one in the friction literature (together with the point mass on a moving belt) and we will be able to prove the global asymptotic stability of the attractor having zero velocity, zero position and a bounded integral error. The use of a set-valued map for the friction force can be seen as quite natural and is taken into consideration in [7], [19], [26]: in [26] it is applied to uncontrolled multi-degree-of-freedom mechanical systems, in [19] to a PD controlled 1 degree-of-freedom system. The combination of set-valued friction laws and Lyapunov tools is also the subject of [17, Chap. 5-6]. To the best of the authors’ knowledge, global asymptotic stability has not been proved so far. In particular, it was proved (see [1, Thm. 1] and the related works [2], [3]) that in our same setting there exists no stick-slip limit cycle (the so-called hunting phenomenon), which is the detrimental signature of a stiction greater than the Coulomb friction. As an overall achievement, Lyapunov tools applied to a differential-inclusion model enable proving global asymptotic stability of the largest set of equilibria. Additionally, the established properties and the regularity of our model imply robustness of asymptotic stability. This, in turn, allows us to prove an input-to-state stability (ISS) property for the perturbed dynamics, establishing that more general friction phenomena (including the Stribeck effect) cause a gradual deterioration of the response, in an ISS sense. We regard this work as a stepping stone to stiction larger than Coulomb and to its description through hybrid systems [13], and to proposing compensation schemes using hybrid friction laws. The paper is structured as follows. We present the proposed model and the main results in Section II. Then Section III 2 contains an illustration by simulation of the established properties. The end of the paper contains the Lyapunov-based proof, separated into the proof of global attractivity (Section IV) and of stability (Section V). Notation. The sign function is defined as: sign(x) := 1 if x > 0, sign(0) := 0, sign(x) := −1 if x < 0. The saturation function is defined as: sat(x) := sign(x) if |x| > 1, sat(x) := x if |x| ≤ 1. For c 6= 0, the  function x 7→ dzc (x) is defined as dzc (x) := x − c sat xc . |x| denotes the Euclidean norm of vector x. h·, ·i defines the scalar product between its two vector arguments. velocity v so = 0 mass m control action uPID friction force ff position s Fig. 1. Mass under the action of friction and controlled by a PID controller. II. P ROPOSED MODEL AND MAIN RESULT A. Derivation of the model Consider a point mass m described by position s and velocity v, as in Figure 1. The overall friction force ff acting on the mass comprises both Coulomb and viscous friction. Its classical description (see [2, Eq. (3)], or similarly [18, Eq. (5)]) is parametrized by a Coulomb friction constant f¯c > 0 and by the viscous friction constant αv > 0. The expression of ff reads  ¯  fc sign(v) + αv v, if v 6= 0 ff (fr , v) := fr , (1) if v = 0, |fr | < f¯c  ¯ fc sign(fr ), if v = 0, |fr | ≥ f¯c where fr is the resultant tangential force. The mass is actuated by the PID control uPID Z t ds(t) uPID (t) := −k̄p s(t) − k̄i s(τ )dτ − k̄d (2) dt 0 = −k̄p s(t) − k̄i ei (t) − k̄d v(t), where ei is defined to be the integral of the position error and is the state of the controller, satisfying ėi = s and ei (0) = 0. Using Newton’s law, we write the mechanical dynamics ṡ = v and mv̇ = uPID − ff (uPID , v). The convenient definitions k̄ f¯c −αv v k̄i v u := uPID m , (kp , kv , ki ) := ( mp , k̄d +α m , m ) and fc := m yield then ėi = s (3a) ṡ = v   u − fc v̇ = 0   u + fc (3b) if v > 0 or (v = 0, u ≥ fc ) if (v = 0, |u| < fc ) if v < 0 or (v = 0, u ≤ −fc ) u = −kp s − kv v − ki ei , where we used that uPID = m u for v = 0. (3c) Model (3) arises from a relatively intuitive description of the mechanical principles behind the model of Figure 1. Its discontinuous right hand side makes it hard to prove existence of solutions for any initial conditions, even though such a property can be shown to hold on a case-by-case basis. Moreover, it seems to be hard to use dynamics (3) for establishing some stability properties and certifying that the position s converges to zero. In this paper we use the monotone set-valued friction law [17, Eq. 5.36] for which existence of solutions is structurally guaranteed. Defining the overall state z := (ei , s, v), this is equivalent to applying the Filippov [12] or Krasovskii regularization to the discontinuous dynamics (3) and obtain     s 0  − fc 0 SGN(v) v ż ∈  (4a) −ki ei − kp s − kv v 1 where the function SGN is a set-valued map defined as ( sign(v), if v 6= 0 SGN(v) := (4b) [−1, 1], if v = 0. Note that model (4) recognizes that the Coulomb friction can be selected as any force in the set [−f¯c , f¯c ] when v is zero and has magnitude f¯c and direction opposite to v whenever v 6= 0. One may wonder whether any artificial solution is introduced by such an enriched description of the dynamics. (For (3) or (4), we consider a solution to be any locally absolutely continuous function x that satisfies respectively ẋ(t) = f (x(t)) or ẋ(t) ∈ F (x(t)) for almost all t in its domain.) The following result establishes uniqueness of the solutions to (4), which implies that the unique solution to (4) must necessarily be the unique solution to (3). Indeed, dynamics (3) allows for only some selections of v̇ compared to those allowed by (4), so that any solution to (3) is also a solution to (4). Lemma 1: For any initial condition z(0) ∈ R3 , system (4) has a unique solution defined for all t ≥ 0. Proof. Existence of solutions follows from [12, §7, Thm. 1] because the mapping in (4) is outer semicontinuous and locally bounded with nonempty compact convex values (see also [13, Prop. 6.10]). Completeness of maximal solutions follows from local existence and no finite escape times, as (4) can be regarded as a linear system forced by a bounded input. To prove uniqueness, consider two solutions z1 = (z1,ei , z1,s , z1,v ), z2 both starting at z0 and define δ(t) = (δei (t), δs (t), δv (t)) := z1 (t) − z2 (t), for all t ≥ 0. Then, δ(0) = 0 and, for almost all t ≥ 0, h0i  δ̇(t) ∈ Aδ δ(t)−fc 0 SGN(z1,v (t))−SGN(z1,v (t)−δv (t)) , 1 h 0 1 0 0 0 1 −ki −kp −kv i with Aδ := , whose maximum singular value is λδ . Therefore we can write for almost all t 2 d |δ(t)| dt 2 (3d) M (t) := = δ(t)T δ̇(t) ≤ λδ |δ(t)|2 + M (t) max δv (t)(f2 f1 ∈fc SGN(z1,v (t)) f2 ∈fc SGN(z1,v (t)−δv (t)) − f1 ). 3 Whether z1,v (t) and z1,v (t) − δv (t) are positive, zero or negative, by trivial inspection of all the cases it can be shown that M (t) ≤ 0 for all t ≥ 0. Therefore, 2 d |δ(t)| dt 2 ≤ λδ |δ(t)|2 for almost all t ≥ 0, and from standard comparison theorems δ(0) = 0 implies δ(t) = 0 for all t ≥ 0, that is, z1 (t) = z2 (t) for all t ≥ 0.  B. Main result The advantage in the use of the compact dynamics (4) is that we may adopt Lyapunov tools to study the asymptotic stability properties of the rest position under the following standard assumption (see, e.g., [1]). Assumption 1: The parameters in (3d) are such that ki > 0, kp > 0, kv kp > ki . According to the Routh stability test, Assumption 1 holds if and only if the origin of the dynamics in (4) with fc = 0 is globally exponentially stable. Under Assumption 1, one readily sees that all possible equilibria of dynamics (4) correspond to (ei , s, v) = (ēi , 0, 0) with |ēi | ≤ fkci , that is, whenever the mass is at rest at zero position and the size of the integral error ei is bounded by the specific threshold fkci . Any of these points is an equilibrium for (4) because in (4) a value can be selected from fc SGN(0) such that the (unique) solution maintains ż identically zero. Note that here we consider the problem of tracking a position setpoint so = 0, but this is trivially generalized to piecewise constant setpoints, thanks to the global nature of our results and a trivial change of coordinates. Denote then the set of these equilibria as    fc fc A := (ei , s, v) : s = 0, v = 0, ei ∈ − , . (5) ki ki Given the attractor A, we prove its global attractivity in Section IV and its stability in Section V. For the attractivity, we use a suitable discontinuous Lyapunov-like function and a nonsmooth version of LaSalle’s invariance principle [15, §4.2]. These tools are applicable to our scenario because of the desirable structural properties of the regularization in (4). Proposition 1: Under Assumption 1, the attractor A in (5) is 1) globally attractive and 2) Lyapunov stable for dynamics (4). Note that no smaller set could be proven to be globally attractive because A is a union of equilibria. Our main result in Theorem 1 establishes relevant robust stability properties of A for (4) in terms of the behavior of solutions to the perturbed dynamics1 ż ∈ coF̃ (z + ρ(z)B) + ρ(z)B, (6) where ρ : R3 → R≥0 is a suitable non-negative perturbation function satisfying z ∈ / A ⇒ ρ(z) > 0. In particular, by using the equivalences in [13, Chap. 7] (which apply because system (4) is well-posed from the regularity of F̃ 1 F̃ , B and co denote respectively the (set-valued) right-hand side of (4a), the closed unit ball and the closed convex hull of a set. [13, Thm 6.30] and A is compact), Proposition 1 (see [13, Thm. 7.21]) implies robust global KL asymptotic stability of A for (4), namely the existence of β0 ∈ KL such that all solutions to (6) satisfy |z(t)|A ≤ β0 (|z(0)|A , t) for all t ≥ 0, in addition to robust global uniform asymptotic stability of A for (4), namely the property that A is uniformly globally stable and attractive for (6) (see [13, Def. 3.6]). Theorem 1: Under Assumption 1, the attractor A in (5) is robustly globally KL asymptotically stable for dynamics (4) and robustly uniformly globally asymptotically stable. An interesting consequence of the robustness result established in Theorem 1 is the semiglobal practical robust asymptotic stability of attractor A established in [13, Thm 7.12 and Lemma 7.20]. A specific perturbation of interest arises when selecting a constant scalar ρv ∈ R and perturbing the friction effect as follows: i h0i h s ż ∈ −k e −kv s−k v − fc 0 SGNρv (v) (7) 1 ( i i p v [sign(v) − |ρv |, sign(v) + |ρv |], if |v| > |ρv | SGNρv (v) := [−1 − |ρv |, 1 + |ρv |], if |v| ≤ |ρv |. The general definition of the inflation of a set-valued mapping for SGN in (4b) is SGN(v + |ρv |B) + |ρv |B. This inflation coincides with SGNρv in (7), and in the special case ρv = 0, SGN0 clearly coincides with SGN. Corollary 1: Under Assumption 1, the attractor A in (5) is globally input-to-state stable for dynamics (7) from input ρv . Proof. The solutions h 0 i to (7) are a subset of the solutions to ż = Aδ z − fc 0 m, where Aδ was trivially defined in the 1 proof of Lemma 1 and is Hurwitz from Assumption 1, and m is a locally integrable signal that for the constant scalar ρv and for all t satisfies m(t) ≤ 1 + |ρv | because, for all t, SGNρv (v(t)) ≤ 1+|ρv |. From BIBO stability of exponentially stable linear systems, there exist positive c and λ such that all solutions satisfy |z(t)| ≤ ce−λt |z(0)| + c(1 + |ρv |). (8) 2 From the two distances |z|2A := s2 + v 2 + dzfc /ki (ei ) , |z|2 := s2 + v 2 + e2i , we have |z|A ≤ |z| and |z|2 ≤ 2 (by splitting into the cases |ei | ≥ fkci and 2|z|2A + 2 fkci √  |ei | < fkci ), which implies |z| ≤ 2 |z|A + fkci . These relationships between the two distances and (8) imply that there exist positive constants κ1 , κ2 , κ3 such that all solutions satisfy |z(t)|A ≤ |z(t)| ≤ ce−λt |z(0)| + c(1 + |ρv |) ≤ κ1 e−λt |z(0)|A + κ2 + κ3 |ρv |, ∀t ≥ 0. (9) Using Theorem 1 and the semiglobal practical robustness of KL asymptotic stability established in [13, Lemma 7.20], one can transform the δ- argument of [13, Lemma 7.20] into a class K function γ` by following similar steps to [15, Lemma 4.5]. Moreover, using a similar approach to [24, Thm. 2] relating the size of the initial condition and of the input, we obtain the following: |z(0)|A ≤ 1 δ` , |ρv | ≤ δ` ⇒ |z(t)|A ≤ β` (|z(0)|A , t) + γ` (|ρv |), ∀t ≥ 0, (10) 4 fc SGN(v) fc SGNρv (v) Stribeck III. I LLUSTRATION BY SIMULATION |ρv | v Fig. 2. Stribeck effect is included in the perturbation (7). TABLE I PARAMETERS AND EIGENVALUES FOR SIMULATIONS IN S ECTION III. Case kv (a) (b) kp ki Roots 3 4 −6.01, −0.19 ± i0.79 0.66 0.08 −0.8, −0.5, −0.2 6.4 1.5 for some suitable class KL and class K functions β` and γ` , and for a small enough scalar δ` > 0. Without loss of generality, consider now using in (10) a small enough δ` such that (2δ` )−1 ≥ κ2 +κ3 δ` . Introduce function T ? : R≥0 → R≥0 with T ? (s) := max{0, λ−1 log(2δ` κ1 s)}, which satisfies: κ1 e−λT ? (s) s + κ2 + κ3 δ` ≤ δ`−1 , ∀s ≥ 0. (11) Finally, we conclude the proof by establishing the following (global) ISS bound from ρv : |z(t)|A ≤ β(|z(0)|A , t) + γ(|ρv |), ∀z(0), ∀ρv , ∀t ≥ 0, (12) where functions β and γ of class KL and class K, respectively, are built starting from the following inequalities: ( κ1 e−λt s + κ2 + κ3 δ` , if s ≥ δ1` , t ≤ T ? (s) (13a) β(s, t) ≥ b(s, t), otherwise (13b)  b(s, t) := max β` (s, max{0, t − T ? (s)}) , κ1 e−λt s (13c)  γ(s) ≥ κ2 + κ3 s, if s ≥ δ` γ` (s), if s ≤ δ` . (13d) (13e) The effectiveness of selections (13) for establishing the ISS bound (12) can be verified case by case. Case 1 (|ρv | ≥ δ` ): use (9), (13d), and bound κ1 e−λt s in (13c)-(13b). Case 2 (|ρv | ≤ δ` and |z(0)|A ≤ δ`−1 ): use (10), (13e), and bound β` (s, max{0, t − T ? (s)}) in (13c)-(13b). Case 3 (|ρv | ≤ δ` and |z(0)|A ≥ δ`−1 ): for t ≤ T ? (|z(0)|A ) use (13a) and nonnegativity of γ, whereas for t ≥ T ? (|z(0)|A ) use |z(T ? (|z(0)|A ))|A ≤ δ` −1 (from (9) and (11)) and the semigroup property of solutions to fall again into case 2 above.  A consequence of Corollary 1 is that the Stribeck effect, which is known to lead to persistent oscillations (the so-called hunting phenomenon), produces solutions that are graceful degradations (in the ISS sense) of the asymptotically stable solutions to the unperturbed dynamics because small Stribeck deformations lead to graphs included in the graph of fc SGNρv (v), as shown in Figure 2. Before we prove our main result, we obtain solutions by simulation in order to illustrate the typical behaviour of (4) and the convergence to the attractor. Simulations capture for each initial condition the unique solution to (4) because of Lemma 1. When fc = 0, (4) reduces to a linear system with characteristic polynomial s3 + kv s2 + kp s + ki = 0. From Assumption 1, its roots have negative real part, but we do not assume anything about their specific locations in the complex plane. In [1, Lemmas L1 and L2], each of these possible locations needed examining as part of a proof relying on the algebraic expression of solutions. We will not need this in our subsequent proof, but we base our simulations on two representative cases, complex conjugate and three distinct real roots. The corresponding parameters kv , kp , ki and roots are listed in Table I and the value fc = 1 m/s2 is common to all simulations. First, we present the solutions to (4) for different sets of initial conditions (ēi , s̄, v̄) for the cases (a) and (b) in Table I, respectively in the left and right top plots of Figure 3. We use a heavier black line to point out a specific solution and the two different phases that are visible on it. In particular, there are time intervals when the mass is in motion (called slip phases in the friction literature) and others when the mass is at rest (called stick phases), which can be detected easily from the velocity being zero on a nonzero time interval. Whenever the mass is in a slip phase, the PID control acts in the direction of getting the mass closer to the position setpoint at zero. During a stick phase starting at ti , the mass is at rest (v = 0) and only the error integral builds up linearly in time as ei (t) = ei (ti ) + s(ti )(t − ti ) until the control action u is such to overcome the Coulomb friction, that is, |u| = | − ki ei − kp s| = fc . So, the closer the mass is to zero position (smaller s(ti )), the longer it takes the error to build up. This explains the ramps in the top of Figure 3, and their decreasing slope and increasing duration. Moreover, we notice that position and velocity converge to zero, but the error integral does not in general. For the case of complex conjugate roots (top, left), the error integral continues to oscillate and these oscillations enter asymptotically the set [−fc /ki , fc /ki ] as the position approaches zero. For the case of distinct real roots (top, right), after a stick phase the position and the velocity converge to zero only asymptotically, so that v remains always nonzero and in (4) ei can only approach the equilibria fc /ki or −fc /ki . As a consequence of the reasoning above (the smaller the position, the longer it takes to exit a stick phase), solutions converge asymptotically, but not exponentially. Second, we present in the left and right center plots of Figure 3 a phase portrait for the same solutions in the top plots. In these figures it is evident that solutions converge to the attractor in (5), as we postulate in item 1) of Proposition 1. In particular, the two different manners in which solutions converge to the attractor in the cases of complex conjugate or distinct real roots are evident here as well. In the left center plot, we can also appreciate the presence of a strip in the plane v = 0 expressed by equation −fc ≤ −ki ei − kp s ≤ fc (as in 5 20 1 ei (m s) ei (m s) 2 0 −1 −2 0 5 10 15 20 25 30 10 0 −10 −20 0 35 1 0 −1 −2 0 20 30 40 50 60 70 80 90 100 5 10 15 20 25 30 10 20 30 40 50 60 70 80 90 100 10 20 30 40 50 t (s) 60 70 80 90 100 0 −1 −2 0 35 2 0.4 1 0.2 v (m/s) v (m/s) 10 1 s (m) s (m) 2 0 −1 0 5 10 15 20 25 30 0 −0.2 −0.4 0 35 t (s) A 0.4 1 0.2 0.5 v (m/s) v (m/s) A 1.5 0 −0.5 −1 −1.5 0 −0.2 −0.4 −1.5 −1 −1 −0.5 −0.5 0 0 0.5 1 s (m) 1.5 2 0.5 −2 −1 0 1 s (m) 20 ei (m s) 0.12 25 0.1 20 0.08 V(x(t)) V(x(t)) 30 15 0.06 10 0.04 5 0.02 0 0 1 ei (m s) −20 −10 0 10 5 10 15 20 25 30 35 0 0 10 20 30 40 t 50 t 60 70 80 90 100 Fig. 3. Top: solutions to (4) for different initial conditions. Center: phase portraits for (4) for the same solutions. Bottom: Lyapunov-like function V in (18) evaluated along the same solutions. All the figures to the left (resp., right) refer to the PID parameters (a) (resp., (b)) in Table I. [21, Page 7]), that is, the region of the state space where stick is bound to occur. Third, we keep the same initial conditions and parameters and we anticipate the evolution along solutions of the Lyapunov-like function introduced in the next section (see (18)). In particular, this function is nonincreasing along solutions, it can be discontinuous (e.g., the left, bottom, violet curve at t = 0.123 s), and remains constant during stick (as pointed out by the same heavier black curves). A. Coordinate change and discontinuous LaSalle function For the following analysis we adopt a specific change of coordinates for (4), that is, φ := −ki ei − kp s, v := v.     σ̇ −ki v  σ − kp v ẋ := φ̇ ∈  φ − kv v − fc SGN(v) v̇      σ 0 0 −ki 0 = 1 0 −kp  φ −  0  SGN(v) v fc 0 1 −kv {z } | {z } | =:A IV. P ROOF OF P ROP. 1: GLOBAL ATTRACTIVITY σ := −ki s The change of coordinates is nonsingular thanks to Assumption 1 (ki , kp strictly positive) and it rewrites (4) as (14) (15) =:b = Ax − b SGN(v) =: F (x). In the new coordinates x, the attractor A in (16) can be expressed as A = {(σ, φ, v) : |φ| ≤ fc , σ = 0, v = 0}. (16) Among other things, the simple expression in (16) allows 6 writing explicitly the distance of a point x from A as 2 |x|2A := inf |x − y| = σ 2 + v 2 + dzfc (φ)2 . (17) y∈A where dzfc (φ) := φ − satfc (φ) is the symmetric scalar deadzone function returning zero when φ ∈ [−fc , fc ]. Indeed, (17) follows from separating the cases φ < −fc , |φ| ≤ fc , φ > fc and applying the definition given in (17). Based on the above observation, it is rather intuitive to introduce the following discontinuous Lyapunov-like function V (x) := =  T  kv σ ki v −1 min f ∈fc SGN(v)   −1 σ + min |φ − f |2 kp v f ∈fc SGN(v) (18a) h σ iT h σ i φ−f P φ−f v v where the matrix P is given by  kv ki P :=  0 −1  0 −1 1 0 . 0 kp (18b) Note that for v 6= 0 the minimization in (18a) becomes trivial because f can take only the value fc sign(v). It is emphasized that function V is discontinuous. For example, if we evaluate V along the sequence of points (σi , φi , vi ) = (0, 0, εi ) for εi ∈ (0, 1) converging to zero, V converges to fc2 , even though its value at zero is zero. Nevertheless, function V enjoys a number of useful properties established in the next lemma whose proof is given in Section IV-C below. Lemma 2: The Lyapunov-like function in (18) is lower semicontinuous (lsc) and enjoys the following properties: 1) V (x) = 0 for all x ∈ A and there exists c1 > 0 such that c1 |x|2A ≤ V (x) for all x ∈ R3 , 2) there exists c > 0 such that each solution x = (σ, φ, v) to (15) satisfies for all t2 ≥ t1 ≥ 0 Z t2 V (x(t2 )) − V (x(t1 )) ≤ −c v(t)2 dt. (19) t1 Remark 1: In [1] it is proven that if a solution is in a slip phase in the nonempty time interval (ti , ti+1 ) (namely, for all t ∈ (ti , ti+1 ), v(t) 6= 0) and the slip phase is preceded and followed by a stick phase (namely, there exist δ > 0 such that, for all t ∈ [ti − δ, ti ] ∪ [ti+1 , ti+1 + δ], v(t) = 0 and |φ(t)| ≤ fc ), then |σ(ti+1 )| < |σ(ti )|. (20) Instead of using the explicit form of solutions as [1, Lemma L2] depending on the nature of the eigenvalues of A, (20) is easily concluded from (19), the definition (18a), and |φ(ti )| ≤ fc , |φ(ti+1 )| ≤ fc . y B. Proof of item 1) of Proposition 1 (global attractivity) We can now prove the first item of Proposition 1 based on Lemma 2 and a generalized version for differential inclusions of the invariance principle [15, §4.2]. The following fact comes indeed from specializing the result in [23, Thm. 2.10] to our case, where the differential inclusion (4) has actually unique solutions defined for all nonnegative times (as established in Lemma 1). We also select G = R3 , U = R3 in the original result of [23]. Fact 1: [23] Let ` : R3 → R≥0 be lower semicontinuous 3 and such that `(x) ≥ 0, for all x ∈ R . If x is a complete R +∞ and bounded solution to (4) satisfying 0 `(x(t))dt < +∞, then x converges to the largest forward invariant subset M of Σ := {x ∈ R3 : `(x) = 0}. Proof of item 1) of Proposition 1 (global attractivity of A). The proof exploits Fact 1, where we take `(x) = v 2 . From Lemma 2, V (x(t)) ≤ V (x(0)) (item 2) and c1 |x(t)|2A ≤ V (x(t)) (item 1), so that c1 |x(t)|2A ≤ V (x(0)) and consequently all solutions to (15) are bounded (their completeness is established in Lemma 1). Apply (19) from 0 Rt to t, and obtain c 0 v 2 (τ )dτ ≤ V (x(0))−V (x(t)) ≤ V (x(0)) because ≥ 0 from Lemma 2, item 1. Then we have R t 2 V (x(t)) V (x(0)) , and if t → +∞ we get the required v (τ )dτ ≤ c 0 boundedness of the integral of `(x(·)). Then Fact 1 guarantees that the solution converges to the largest forward invariant subset M of Σ = {x : v = 0}. We claim that such a subset is A. Indeed, M ⊂ Σ implies v = 0 in M. Moreover, σ = 0 in M because each solution starting from v = 0 and σ 6= 0 causes a ramp of φ that eventually reaches |φ| > fc and drives v away from zero (therefore out of Σ). Finally, in M we must have |φ| ≤ fc otherwise v would become nonzero again. Therefore the largest forward invariant set M in Σ is the attractor A.  C. Proof of Lemma 2 To the end of proving Lemma 2, we note that model (15) and function (18) suggest that there are three relevant affine systems and smooth functions associated to the three cases in (3c) that are worth considering (and will be used in our proofs). They correspond to ξ˙ = f1 (ξ) := Aξ − b, h0 0 0i ξ˙ = f0 (ξ) := 1 0 0 ξ, ξ(0) = ξ1 , (21a) ξ(0) = ξ0 , (21b) ξ˙ = f−1 (ξ) := Aξ + b, ξ(0) = ξ−1 , (21c) 000 and, with the definition |ξ|2P := ξ T P ξ, h σ i2 hσi 2 h σ i2 V1 (ξ) := φ−fc , V0 (ξ) := 0 , V−1 (ξ) := φ+fc . 0 P v v P P (21d) Based on the description above, we can state the following claim relating solutions to (15) and V in (18) to (21). Its proof mostly relies on straightforward inspection of the various cases and is given in Appendix A. Claim 1: There exists c > 0 such that, for each initial condition (σ̄, φ̄, v̄), one can select k ∈ {−1, 0, 1} and T > 0 satisfying the following: 1) the unique solution ξ = (ξσ , ξφ , ξv ) to the k-th initial value problem among (21a)-(21c) with initial condition ξk = (σ̄, φ̄, v̄) coincides in [0, T ] with the unique solution to (15); 7 2) the solution ξ mentioned above satisfies for all t ∈ [0, T ] V (ξ(t)) = Vk (ξ(t)), d dt Vk (ξ(t)) t1 Building on Claim 1 and Fact 2 we can prove Lemma 2. Proof of Lemma 2. We show first that V is lower semicontinuous. Define the set-valued mapping h σ iT h σ i [ G(x) := g(σ, φ, v, f ), g(σ, φ, v, f ) := φ−f P φ−f , v v f ∈SGN(v) and consider the additional set-valued mapping (σ, φ, v) ⇒ H(σ, φ, v) := (σ, φ, v, fc SGN(v)). By the very definition of set-valued mapping, we can write G = g ◦ H (the composition of g and H), that is, (σ, φ, v) ⇒ g(σ, φ, v, fc SGN(v)) = G(x). Then, G is outer semicontinuous (osc) by [22, Proposition 5.52, item (b)] because both g and H are osc and H is locally bounded. Finally, by the definition of distance d(u, S) between a point u and a closed set S, we can write V (x) = d(0, G(x)). Then, V is lsc by [22, Proposition 5.11, item (a)] because G was proven to be osc. We prove now the properties of V item by hitem. i kv T ki −1 Item 1). There exists g > 0 such that [ σv ] [ σv ] ≥ −1 kp g(σ 2 + v 2 ) because the inner matrix is positive definite 2 by Assumption 1. Moreover, from (18a), min φ−f ≥ f ∈fc SGN(v) 2 min φ−f = dzfc (φ)2 . Therefore, (17) yields V (x) ≥ f ∈[−fc ,fc ] c1 |x|2A with fc ≤ −c|ξv (t)|2 . (22) Additionally, we restate a fact from [14] that is beneficial to proving Lemma 2. Specifically, we use [14, Theorem 9] together with the variant in [14, Section 5 (point a.)]. We also specialize the statement, using the fact that when the function g is integrable, the standard integral can replace the upper integral (as noted after [14, Definition 8]). The lower right Dini derivative D+ h of h is defined as D+ h(t) := . lim inf →0+ h(t+)−h(t)  Fact 2: [14] Given t2 > t1 ≥ 0, suppose that h satisfies lim inf τ →τ̄ h(τ ) ≥ h(τ̄ ) (i.e., h is lower semicontinuous) and that l is locally integrable in [t1 , t2 ]. If D+ h(τ ) ≤ l(τ ) for all τ ∈ [t1 , t2 ], then Z t2 l(τ )dτ. h(t2 ) − h(t1 ) ≤ c1 := min{g, 1}. Item 2). Equation (19) is a mere application of Fact 2 for h(·) = V (x(·)) and l(·) = −c(v(·))2 where x = (σ, φ, v) is a solution to (15). So, we need to check that the assumptions of Fact 2 are verified. We already established above that V is lsc. Solutions x to (15) are absolutely continuous functions by definition. Then, because the composition of a lower semicontinuous and a continuous function is lower semicontinuous (see [22, Exercise 1.40]), the Lyapunov-like function (18a) evaluated along the solutions of (15) is lsc. Since solutions are absolutely continuous, −cv 2 is locally integrable. Finally, it was proven in Claim 1, item 1 that for each initial condition, the unique solution to (15) coincides with the solution to one of the three affine systems in (21) (numbered k) on a finite time interval T . Moreover, from Claim 1, item 2 φ σ −fc v Fig. 4. R is the (closed) blue region in Lemma 3, R̂ is its complement. V coincides in [0, T ] with the function Vk in (22), which is differentiable, then V (x(t)) at t = 0 is at least differentiable from the right and the lower right Dini derivative coincides with the right derivative. In particular, we established in (22) that this right derivative is upper bounded by −cv 2 .  V. P ROOF OF P ROP. 1: STABILITY The Lyapunov-like function introduced in (18) of the previous section is unfortunately not enough to prove stability. Indeed, its discontinuity on the attractor A prevents us from obtaining a uniform continuous upper bound depending on the distance from A. However, a stability bound can be constructed through an auxiliary function defined as 2 V̂ (x) := 12 k1 σ 2 + 12 k2 dzfc (φ) + k3 |σ||v| + 12 k4 v 2 . (23) Function V̂ allows establishing bounds in the directions of discontinuity of V . In particular, we define the two subsets R := {x : v(φ − sign(v)fc ) ≥ 0} R̂ := R3 \R represented in Figure 4. The following holds. Lemma 3: For suitable positive scalars k1 , . . . , k4 in (23), there exist positive scalars c1 , c2 , ĉ1 , ĉ2 such that c1 |x|2A ≤ V (x) ≤ c2 |x|2A , ĉ1 |x|2A ◦ ≤ V̂ (x) ≤ V̂ (x) := ĉ2 |x|2A , ∀x ∈ R, hv, fi ≤ 0, max v∈∂ V̂ (x),f∈F (x) ∀x ∈ R̂, ∀x ∈ R̂, (24a) (24b) (24c) where ∂ V̂ (x) denotes the generalized gradient of V̂ at x (see [9, §1.2]) and F is the set-valued 2 map in (15). Proof. Note that min φ − f = dzfc (φ)2 whenever f ∈fc SGN(v) x ∈ R. Since P in (18b) is positive definite and V (x) = h σ iT h σ i dzfc (φ) P dzfc (φ) in R, positive c1 and c2 can be chosen v v to satisfy (24a), using the definition (17). (The lower bound in (24a) was already established for all x ∈ R3 in Lemma 2, item 1.) For positive k1 , . . . , k4 and k1 k4 > k32 , the inner   |σ|   |σ| T  k1 0 k3 1 |dz (φ)| |dzfc (φ)| 0 k 0 matrix in V̂ (x) = 2 is fc 2 |v| k3 0 k4 |v| positive definite and (24b) can be satisfied for the same reason. To prove (24c), we consider only the set R̂> := R̂∩{x : v > 0} because a parallel reasoning can be followed in R̂∩{x : v < 0}. For x ∈ R̂> , we have v > 0, φ < fc and (15) reduces to the differential equation σ̇ = −ki v =: fσ (x) φ̇ = σ − kp v =: fφ (x) v̇ = −kv v + φ − fc =: fv (x) ≤ −kv |v| − |dzfc (φ)|. (25a) 8 Consistently, the max in (24c) is to be checked only for the singleton f = (fσ (x), fφ (x), fv (x)) which F (x) reduces to for all x ∈ R̂> . Moreover,  2  d 1 dz (φ) = dzfc (φ), ∂ (|σ|) = SGN(σ), (25b) f c dφ 2 VI. C ONCLUSIONS AND FUTURE WORK In this work we characterized properties of a differential inclusion model of the feedback interconnection of a sliding mass with a PID controller under Coulomb friction. We proved global asymptotic stability of the largest set of closed-loop equilibria. Due to the regularity properties of the differential where ∂ (|σ|) denotes the generalized gradient of σ 7→ |σ|. We inclusion model, global asymptotic stability is intrinsically need then to find suitable positive constants k1 , . . . , k4 satisfy- robust. Additionally, taking as input the size of the inflation ing k1 k4 > k32 and such that V̂ ◦ (x) is negative semidefinite in of a perturbed model, the dynamics is input-to-state stable, R̂> . Since in R̂> we have v = |v| and dzfc (φ) = −|dzfc (φ)|, and this perturbation includes the well-known Stribeck effect. then we get maxζ∈∂|σ| (−ki k3 |v|2 ζ) = ki k3 |v|2 for all x ∈ Future work will address further the case of static friction force R̂> , which gives in turn: larger than the Coulomb one and will propose for that setting compensation schemes relying on the proposed LyapunovV̂ ◦ (x) ≤ [ki k3 |v|2− k4 kv |v|2 ]+[k2 σdzfc (φ)− k3 |σ||dzfc (φ)|] based proof. +[−k1 ki σv− k3 kv |v||σ|]+[k2 kp |v||dzfc (φ)|−k4 |v||dzfc (φ)|]. R EFERENCES Since k1 , . . . , k4 are positive by assumption, in [1] B. Armstrong and B. Amin, “PID control in the presence of static each pair in brackets the second term is negative friction: A comparison of algebraic and describing function analysis,” semidefinite and dominates the first (sign-indefinite or Automatica, vol. 32, no. 5, pp. 679–692, 1996.  ki [2] B. Armstrong-Hélouvry and B. Amin, “PID control in the presence of nonnegative) term as long as k3 > max kv k1 , k2 and  static friction,” Dept. of Electrical Engineering and Computer Science, k2 k4 > max kkvi k3 , kp k2 , k31 . With this selection, (24b) and University of Wisconsin – Milwaukee, Tech. Rep. EE-93–2, 1993. [3] ——, “PID control in the presence of static friction: exact and describing (24c) are simultaneously satisfied.  Proof of item 2) of Proposition 1 (stability). Based on the constants c1 , c2 , ĉ1 , ĉ2 introduced in Lemma 3, the following stability bound for each solution x to (15) q |x(t)|A ≤ cc21 ĉĉ21 |x(0)|A , ∀t ≥ 0 (26a) is proven by splitting the analysis in two cases. Case (i): x(t) ∈ / R, ∀t ≥ 0. Since R ∪ R̂ = R3 , x(t) ∈ R̂ for all t ≥ 0 and from (24c) V̂ ◦ (x(t)) ≤ 0, ∀t ≥ 0 ⇒ V̂ (x(t)) ≤ V̂ (x(0)), ∀t ≥ 0. [4] [5] [6] [7] [8] [9] [10] Using bound (24b) we obtain [11] ĉ1 |x(t)|2A ĉ2 |x(0)|2A , ≤ V̂ (x(t)) ≤ V̂ (x(0)) ≤ ∀t ≥ 0, p which implies (26a) because 1 ≤ c2 /c1 from (24a). Case (ii): ∃t1 ≥ 0 such that x(t1 ) ∈ R. Consider the smallest t1 ≥ 0 such that x(t1 ) ∈ R (the existence of such a smallest time follows from R being closed). Then, following the analysis of Case (i) for the (possibly empty) time interval [0, t1 ) and using continuity of solutions, we obtain ĉ1 |x(t)|2A ≤ ĉ2 |x(0)|2A , ∀t ∈ [0, t1 ]. [12] [13] [14] [15] [16] (26b) [17] At t1 we apply (24a) (because x(t1 ) ∈ R) and (26b) to obtain  V (x(t1 )) ≤ c2 ĉĉ21 |x(0)|2A . Finally, by the bounds in items 1 and 2 of Lemma 2, [18] c1 |x(t)|2A ≤ V (x(t)) ≤ V (x(t1 )) ≤ c2 ĉĉ21 |x(0)|2A , ∀t ≥ t1 . (26c) q Since cc21 ≥ 1, (26b) implies c1 |x(t)|2A ≤ c2 ĉĉ12 |x(0)|2A , ∀t ∈ [0, t1 ], which proves (26a) when combined with (26c).  [19] [20] [21] function analysis,” in American Control Conference, 1994, vol. 1. IEEE, 1994, pp. 597–601. K. J. Åström and C. Canudas-de-Wit, “Revisiting the LuGre friction model,” Control Systems, IEEE, vol. 28, no. 6, pp. 101–114, 2008. J. P. Aubin and A. Cellina, Differential Inclusions. Set-valued Maps and Viability Theory. Springer-Verlag, 1984. N. Barahanov and R. Ortega, “Necessary and sufficient conditions for passivity of the LuGre friction model,” IEEE Transactions on Automatic Control, vol. 45, no. 4, pp. 830–832, 2000. P.-A. Bliman and M. Sorine, “Easy-to-use realistic dry friction models for automatic control,” in Proceedings of 3rd European Control Conference, vol. 113, 1995, pp. 267–272. [Online]. Available: https://who.rocq.inria.fr/Pierre-Alexandre.Bliman/publis.htm C. Canudas-de-Wit, H. Olsson, K. J. Åström, and P. Lischinsky, “A new model for control of systems with friction,” IEEE Transactions on Automatic Control, vol. 40, no. 3, pp. 419–425, 1995. F. H. Clarke, Optimization and nonsmooth analysis. Siam, 1990, vol. 5. P. R. Dahl, “A solid friction model,” The Aerospace Corporation El Segundo CA, Tech. Rep., 1968. G. Ferretti, G. Magnani, and P. Rocco, “Single and multistate integral friction models,” IEEE Transactions on Automatic Control, vol. 49, no. 12, pp. 2292–2297, 2004. A. F. Filippov, Differential equations with discontinuous righthand sides: control systems. Kluwer Academic Publishers, 1988. R. Goebel, R. G. Sanfelice, and A. R. Teel, Hybrid Dynamical Systems: modeling, stability, and robustness. Princeton University Press, 2012. J. W. Hagood and B. S. Thomson, “Recovering a function from a Dini derivative,” The American Mathematical Monthly, vol. 113, no. 1, pp. 34–46, 2006. H. K. Khalil, Nonlinear Systems, 3rd ed. Prentice Hall, 2002. M. A. Krasnosel’skii and A. V. Pokrovskii, Systems with hysteresis. Springer-Verlag, 1989. R. I. Leine and N. Van de Wouw, Stability and convergence of mechanical systems with unilateral constraints. Springer Science & Business Media, 2007, vol. 36. H. Olsson, K. J. Åström, C. Canudas-de-Wit, M. Gäfvert, and P. Lischinsky, “Friction models and friction compensation,” European journal of control, vol. 4, no. 3, pp. 176–195, 1998. D. Putra, H. Nijmeijer, and N. van de Wouw, “Analysis of undercompensation and overcompensation of friction in 1 DOF mechanical systems,” Automatica, vol. 43, no. 8, pp. 1387–1394, 2007. E. Rabinowicz, “The nature of the static and kinetic coefficients of friction,” Journal of applied physics, vol. 22, no. 11, pp. 1373–1379, 1951. C. J. Radcliffe and S. C. Southward, “A property of stick-slip friction models which promotes limit cycle generation,” in American Control Conference, 1990. IEEE, 1990, pp. 1198–1205. 9 [22] R. T. Rockafellar and R. J.-B. Wets, Variational analysis. Springer Science & Business Media, 2009, vol. 317. [23] E. P. Ryan, “An integral invariance principle for differential inclusions with applications in adaptive control,” SIAM Journal on Control and Optimization, vol. 36, no. 3, pp. 960–980, 1998. [24] E. D. Sontag, “Further facts about input to state stabilization,” IEEE Transactions on Automatic Control, vol. 35, no. 4, pp. 473 – 476, 1990. [25] J. Swevers, F. Al-Bender, C. G. Ganseman, and T. Projogo, “An integrated friction model structure with improved presliding behavior for accurate friction compensation,” IEEE Transactions on Automatic Control, vol. 45, no. 4, pp. 675–686, 2000. [26] N. Van de Wouw and R. I. Leine, “Attractivity of equilibrium sets of systems with dry friction,” Nonlinear Dynamics, vol. 35, no. 1, pp. 19– 39, 2004. [27] A. Visintin, Differential models of hysteresis. Springer-Verlag Berlin Heidelberg, 1994, vol. 111. A PPENDIX A P ROOF OF C LAIM 1 Proof of Claim 1. The proof of the claim shows for each possible initial conditions that for a suitable k the solution to the affine system ξ˙ = fk (ξ) among (21a)-(21c) is also solution to (15) on the interval [0, T ]. By Lemma 1, this is also the unique solution to (15) on the same interval. The suitable k for each initial condition is listed in the next table. Case Possible initial condition (i) (ii) (iii) (iv) (v) (vi) (vii) (viii) (ix) (x) (xi) v̄ v̄ v̄ v̄ v̄ v̄ v̄ v̄ v̄ v̄ v̄ >0 = 0, φ̄ > fc = 0, φ̄ = fc , σ̄ > 0 = 0, φ̄ = fc , σ̄ = 0 = 0, φ̄ = fc , σ̄ < 0 = 0, |φ̄| < fc = 0, φ̄ = −fc , σ̄ > 0 = 0, φ̄ = −fc , σ̄ = 0 = 0, φ̄ = −fc , σ̄ < 0 = 0, φ̄ < −fc <0 k 1 1 1 0 0 0 0 0 −1 −1 −1 Define the components of the solution ξ as (ξσ , ξφ , ξv ). We first prove item 1) and the left equation in (21d), addressing only cases (i)-(v) as the remaining ones follow from parallel arguments. Case (i). We choose k = 1, that is, (21a). Because ξv (0) = v̄ > 0, there exists a finite time T such that for all t ∈ [0, T ] ξv (t) > 0. When the resulting solution ξ is substituted into (15), −fc SGN(ξv (t)) = {−fc } for all t ∈ [0, T ] so that ˙ = Aξ(t) − b, and this is for all t ∈ [0, T ] (15) becomes ξ(t) satisfied precisely because ξ arises from (21a) (k = 1). Then the solution ξ is also a solution to (15) for t ∈ [0, T ] because ˙ they have the same initial conditions and ξ(t) ∈ F (ξ(t)). V (ξ(t)) = V1 (ξ(t)) for all t ∈ [0, T ] because f = fc is the only possible selection in (18a) due to ξv (t) > 0 in [0, T ]. Case (ii). We prove that from (21a) (that is, k = 1) and initial conditions ξ(0) = (σ̄, φ̄, 0) with φ̄ > fc it is implied that there exist T > 0 such that for all t ∈ (0, T ], ξv (t) > 0. Then, as in Case (i), we can conclude that ξ is also a solution to (15). Indeed, the third state equation of (21a) reads ξ˙v = ξφ −kv ξv −fc with ξv (0) = 0, ξφ (0) = φ̄ > fc , so that ξ˙v (0) = ξφ (0)−fc > 0. Also here V (ξ(t)) = V1 (ξ(t)) because ξv (t) > 0 for all t ∈ (0, T ] and ξφ (0) > fc so that the minimizer in (18a) at t = 0 is also f = fc . Case (iii). We prove that from (21a) (k = 1) and initial conditions ξ(0) = (σ̄, fc , 0) with σ̄ > 0 it is implied that there exist T > 0 such that for all t ∈ (0, T ], ξv (t) > 0. Then, as in Case (i), we can conclude that ξ is also a solution to (15). Indeed, the second state equation of (21a) reads in this case ξ˙φ = ξσ − kp ξv and ξ˙φ (0) = ξσ (0) > 0, so that there exists T such that φ(t) > fc for all t ∈ (0, T ]. The third state equation of (21a) reads ξ˙v = ξφ − kv ξv − fc and is ξ˙v (0) = 0 when evaluated at time 0. Therefore, to show that ξv (t) > 0 for all t ∈ (0, T ], we need to differentiate the third equation and get ξ¨v (0) = σ̄ > 0 and by this we conclude that ξ˙v (t) > 0 in (0, T ] and then also ξv (t) > 0 in (0, T ]. A similar reasoning to the previous case shows that V (ξ(t)) = V1 (ξ(t)), for all t ∈ [0, T ]. Case (iv). By choosing k = 0, we can verify that the solution to (15) and (21b) is constant (specifically, an equilibrium). Then V (ξ(t)) = V0 (ξ(t)) for all t ∈ [0, +∞) because V (ξ(0)) = V0 (ξ(0)). Case (v). Here we have the explicit solution ξσ (t) = σ̄ < 0, ξφ (t) = fc + σ̄t, ξv (t) = 0, for the interval [0, T ] = [0, −2fc /σ̄]. This solution satisfies (15) because an appropriate selection of the value in SGN(0) obtains ξφ (t) − fc SGN(ξv (t)) = ξφ (t) − fc SGN(0) = {0} for all t ∈ [0, −2fc /σ̄], as in this interval |ξφ (t)| ≤ fc . In this case the minimizer in (18a) is f (t) = ξφ (t) for all t ∈ [0, T ], so that V (ξ(t)) = V0 (ξ(t)) for all t ∈ [0, T ]. Finally, c = 2(kv kp − ki ) > 0 (by Assumption 1) is such that the right inequality in (22) holds for each k ∈ {−1, 0, 1} regardless of the initial condition  and consideration.  case under    ξσ T ξσ d d ξφ −fc V1 (ξ(t)) = dt P ξφ −fc = For k = 1 write dt ξv    T ξv ξσ ξσ (Aξ − b)T P ξφ −fc + ξφ −fc P (Aξ − b) = −cξv2 , that ξv ξv satisfies (22) in the interval [0, T ]. Parallel computations hold for k = −1. For k = 0, V0 (ξ(t)) = kkvi ξv (t)2 so that kv d 2 ˙  dt V0 (ξ(t)) = 2 ki ξσ ξσ = 0 ≤ 0 = cξv (t) .
3cs.SY
Universal Protocols for Information Dissemination Using Emergent Signals Bartłomiej Dudek1 and Adrian Kosowski∗2 arXiv:1705.09798v3 [cs.DS] 29 Nov 2017 1 University of Wrocław, Poland 2 Inria Paris, France Abstract We consider a population of n agents which communicate with each other in a decentralized manner, through random pairwise interactions. One or more agents in the population may act as authoritative sources of information, and the objective of the remaining agents is to obtain information from or about these source agents. We study two basic tasks: broadcasting, in which the agents are to learn the bit-state of an authoritative source which is present in the population, and source detection, in which the agents are required to decide if at least one source agent is present in the population or not. We focus on designing protocols which meet two natural conditions: (1) universality, i.e., independence of population size, and (2) rapid convergence to a correct global state after a reconfiguration, such as a change in the state of a source agent. Our main positive result is to show that both of these constraints can be met. For both the broadcasting problem and the source detection problem, we obtain solutions with a convergence time of O(log2 n) rounds, w.h.p., from any starting configuration. The solution to broadcasting is exact, which means that all agents reach the state broadcast by the source, while the solution to source detection admits one-sided error on a ε-fraction of the population (which is unavoidable for this problem). Both protocols are easy to implement in practice and have a compact formulation. Our protocols exploit the properties of self-organizing oscillatory dynamics. On the hardness side, our main structural insight is to prove that any protocol which meets the constraints of universality and of rapid convergence after reconfiguration must display a form of non-stationary behavior (of which oscillatory dynamics are an example). We also observe that the periodicity of the oscillatory behavior of the protocol, when present, must necessarily depend on the number #X of source agents present in the population. For instance, our protocols inherently rely on the emergence of a signal passing through the population, whose period is Θ(log #nX ) rounds for most starting configurations. The design of clocks with tunable frequency may be of independent interest, notably in modeling biological networks. Key words: Gossiping, Epidemic processes, Oscillatory dynamics, Emergent phenomena, Population protocols, Broadcasting, Distributed clock synchronization. ∗ Corresponding Author. Email: [email protected] 1 Introduction Information-spreading protocols, and more broadly epidemic processes, appear in nature, social interactions between humans, as well as in man-made technology, such as computer networks. For some protocols we have a reasonable understanding of the extent to which the information has already spread, i.e., we can identify where the information is located at a given step of the process: we can intuitively say which nodes (or agents) are “informed” and which nodes are “uninformed”. This is the case for usual protocols in which uninformed agents become informed upon meeting a previously informed agent, cf. e.g. mechanisms of rumor spreading and opinion spreading models studied in the theory community [26, 29]). Arguably, most man-made networking protocols for information dissemination also belong to this category. By contrast, there exists a broad category of complex systems for which it is impossible to locate which agents have acquired some knowledge, and which are as yet devoid of it. In fact, the question of “where the information learned by the system is located” becomes somewhat fuzzy, as in the case of both biological and synthetic neural networks. In such a perspective, information (or knowledge) becomes a global property of the entire system, whereas the state of an individual agent represents in principle its activation, rather than whether it is informed or not. As such, knowledge has to be treated as an emergent property of the system, i.e., a global property not resulting directly from the local states of its agents. The convergence from an uninformed population to an informed population over time is far from monotonous. Even so, once some form of “signal” representing global knowledge has emerged, agents may try to read and copy this signal into their local state, thus each of them eventually also becomes informed. At a very informal conceptual level, we refer to this category of information-dissemination protocols as protocols with emergent behavior. At a more technical level, emergent protocols essentially need to rely on non-linear dynamical effects, which typically include oscillatory behavior, chaotic effects, or a combination of both. (This can be contrasted with simple epidemic protocols for informationspreading, in which nodes do not become deactivated.) This work exhibits a simple yet fundamental information-spreading scenario which can only be addressed efficiently using emergent protocols. Both the efficient operation of the designed protocols, and the need for non-stationary dynamical effects in any efficient protocol for the considered problems, can be formalized through rigorous theoretical analysis. Our goal in doing this is twofold: to better understand the need for emergent behavior in real-world information spreading, and to display the applicability of such protocols in man-made information spreading designs. For the latter, we describe an interpretation of information as a (quasi-)periodic signal, which can be both decoded from states of individual nodes, and encoded into them. 1.1 Problems and Model We consider a population of n identical agents, each of which may be in a constant number of possible states. Interactions between agents are pairwise and random. A fair scheduler picks a pair of interacting agents independently and uniformly at random in each step. The protocol definition is provided through a finite sequence of state transition rules, following the precise conventions of the randomized Population Protocol model [6, 8] or (equivalently) of Chemical Reaction Networks [21].1 The input to the problem is given by fixing the state of some subset of agents, to some state of the protocol, which is not available to any of the other agents. Intuitively, the agents whose state has been fixed are to be interpreted as authoritative sources of information, which is to be detected and disseminated through the network (i.e., as the rumor source node, broadcasting station, etc.). For example, the 1 The activation model is thus asynchronous. The same protocols may be deployed in a synchronous setting, with scheduler activations following, e.g., the independent random matching model (with only minor changes to the analysis) or the PULL model [29] (at the cost of significantly complicating details of the protocol formulation). 2 problem of spreading a bit of information through the system is formally defined below. Problem B IT B ROADCAST Input States: X1 , X2 . Promise: The population contains a non-zero number of agents in exactly one of the two input states {X1 , X2 }. Question: Decide if the input state present in the population is X1 or X2 . We can, e.g., consider that the transmitting station (or stations) choose whether to be in state X1 or X2 in a way external to the protocol, and thus transmit the “bit” value 1 or 2, respectively, through the network. Broadcasting a bit is one of the most fundamental networking primitives. The definition of the population protocol includes a partition of the set of states of the protocol into those corresponding to the possible answers to the problem. When the protocol is executed on the population, the output of each agent may be read at every step by checking, for each agent, whether its state belongs to the subset of an output state with a given answer (in this case, the answer of the agent will be the “bit” it has learned, i.e., 1 or 2). We will call a protocol exact if it eventually converges to a configuration, such that starting from this configuration all agents always provide the correct answer. We will say it operates with ε-error, for a given constant ε > 0, if starting from some step, at any given step of the protocol, at most an ε-fraction of the population holds the incorrect answer, with probability 1 − O(1/n). Time is measured in steps of the scheduler, with n time steps called a round, with the expected number of activations of each agent per round being a constant. Our objective is to design protocols which converge to the desired outcome rapidly. Specifically, a protocol is expected to converge in O(poly log n) rounds (i.e., in O(npoly log n) steps), with probability 1 − O(1/n), starting from any possible starting configuration of states in the population, conforming to the promise of the problem.2 Motivated by both applications and also a need for a better understanding of the broadcasting problem, we also consider a variant of the broadcasting problem in which no promise on the presence of the source is given. This problem, called D ETECTION, is formally defined below. Problem D ETECTION Input State: X. Question: Decide if at least one agent in state X is present in the population. Detection of the presence of a source is a task which is not easier than broadcasting a bit. Indeed, any detection protocol is readily converted into a broadcasting protocol for states {X1 , X2 } by identifying X = X1 and treating X2 as a dummy state which does not enter into any interactions (i.e., is effectively not visible in the network). Intuitively, the detection task in the considered setting is much harder: a source X may disappear from the network at any time, forcing other agents to spontaneously “unlearn” the outdated information about the presence of the source. This property is inherently linked to the application of the D ETECTION problem in suppressing false rumors or outdated information in social interactions. Specifically, it may happen that a certain part of a population find themselves in an informed state before the original rumor source is identified as a source of false information, a false rumor may be propagated accidentally because of an agent which previously changed state from “uninformed” to “informed” due to a fault or miscommunication, or the rumor may contain information which is no longer true. Similar challenges with outdated information and/or false-positive activations are faced in Chemical Reaction Networks, e.g. in DNA strand displacement models [5]. In that context, the 2 We adhere to this strong requirement for self-stabilizing (or self-organizing) behavior from any initial configuration in the design of our protocols. The presented impossibility results still hold under significantly weaker assumptions. 3 P ROBLEM : B IT B ROADCAST D ETECTION Non-stationarity property: (Applies to all fast O(1)-state protocols) no fixed points while source transmits random bits no fixed points while source is present New protocols with emergent signal: Convergence time: – No error (exact output) – One-sided ε-error universal, 74 states universal, 55 states O(log2 n) impossible O(log2 n) Other protocols with ω(1)-states: Clock-Sync (in synchronized round model) [11] Time-to-Live [5] detection problem has the intuitive interpretation of detecting if a given type of chemical or biological agent (e.g., a contaminant, cancer cell, or hormonal signal) is present in the population, and spreading this information among all agents. 1.2 Our Results In Section 3, we show that both the B IT B ROADCAST, and the D ETECTION problem can be solved with protocols which converge in O(log2 n) rounds to an outcome, with probability 1 − O(1/n), starting from any configuration of the system. The solution to B IT B ROADCAST guarantees a correct output. The solution to D ETECTION admits one-sided ε-error: in the absence of a source, all agents correctly identify it as absent, whereas when the source is present, at any moment of time after convergence the probability that at least (1 − ε)n agents correctly identify the source as present is at least 1 − O(1/n).3 Here, ε > 0 is a constant influencing the protocol design, which can be made arbitrarily small. The designed protocols rely on the same basic building block, namely, a protocol realizing oscillatory dynamics at a rate controlled by the number of present source states in the population. Thus, these protocols display non-stationary behavior. In Section 4, we show that such behavior is a necessary property in the following sense. We prove that in any protocol which solves D ETECTION in sub-polynomial time in n and which uses a constant number of states, the number of agents occupying some state has to undergo large changes: by a polynomially large factor in n during a time window of length proportional to the convergence time of the protocol. For the B IT B ROADCAST problem, we show that similar volatile behavior must appear in a synthetic setting in which a unique source is transmitting its bit as random noise (i.e., selecting its input state {X1 , X2 } uniformly at random in subsequent activations). We note that, informally speaking, our protocols rely on the emergence of a “signal” passing through the population, whose period is Θ(log #nX ) rounds when the number of source agents in state X is #X. In Section 5, we then discuss how the behavior of any oscillatory-type protocol controlled by the existence of #X has to depend on both n and #X. We prove that for any such protocol with rapid convergence, the cases of subpolynomial #X and #X = Θ(n) can be separated by looking at the portion of the configuration space regularly visited by the protocol. This, in particular, suggests the nature of the dependence of the oscillation period on the precise value of #X, and that the protocols we design with period Θ(log #nX ) are among the most natural solutions to the considered problems. The proofs of all theorems are deferred to the closing sections of the paper. 3 The existence of one-sided error is inherent to the D ETECTION problem in the asynchronous setting: indeed, if no agent of the population has not made any communication with the source over an extended period of time, it is impossible to tell for sure if the source has completely disappeared from the network, or if it is not being selected for interaction by the random scheduler. 4 1.3 Comparison to the State-of-the-Art Our work fits into lines of research on rumor spreading, opinion spreading, population protocols and other interaction models, and emergent systems. We provide a more comprehensive literature overview of some of these topics in Subsection 1.4. Other work on the problems. The B IT B ROADCAST problem has been previously considered by Boczkowski, Korman, and Natale in [11], in a self-stabilizing but synchronous (round-based) setting. A protocol solving their problem was presented, giving a stabilized solution in Õ(log n) time, using a number of states of agents which depends on population size, but exchanging messages of bit size O(1) (this assumption can be modeled in the population protocol framework as a restriction on the permitted rule set). In this sense, our result can be seen as providing improved results with respect to their approach, since it is applicable in an asynchronous setting and reduces the number of states to constant (the latter question was open [11]). We remark that their protocol has a more general application to the problem of deciding which of the sources X1 or X2 is represented by a larger number of agents, provided these two numbers are separated by a multiplicative constants. (Our approach could also be used in such a setting, but the required separation of agent numbers to ensure a correct output would have to be much larger: we can compare values if their logarithms are separated by a multiplicative constant.) The protocol of [11] involves a routine which allows the population to create a synchronized modulo clock, working in a synchronous setting. The period of this clock is independent of the input states of the protocol, which should be contrasted with the oscillators we work on in this paper, which encode the input into a signal (with a period depending on the number of agents in a given input state). The D ETECT problem was introduced in a work complementary to this paper [5]. Therein we look at applications of the confirmed rumor spreading problem in DNA computing, focusing on performance on protocols based on a time-to-live principle and on issues of fault tolerance in a real-world model with leaks. The protocols designed there require O(log n) states, and while self-stabilizing, do not display emergent behavior (in particular, agents can be categorized as “informed” and “uninformed”, the number of correctly informed agents tends to increase over time, while the corresponding continuous dynamical system stabilizes to a fixed point attractor). Originality of methods. The oscillatory dynamics we apply rely on an input-parameter-controlled oscillator. The uncontrolled version of the oscillator which we consider here is the length-3 cyclic oscillator of the cyclic type, known in population dynamics under the name of rock-paper-scissors (or RPS). This has been studied intensively in the physics and evolutionary dynamics literature (cf.e.g. [46] for a survey), while algorithmic studies are relatively scarce [15]. We remark that the uncontrolled cyclic oscillator with a longer (but O(1) length cycle) has been applied for clock/phase synchronization in self-stabilizing settings and very recently in the population protocol setting when resolving the leader election problem [25]. (The connection to oscillatory dynamics is not made explicit, and the longer cycle provides for a neater analysis, although it does not seem to be applicable to our parameter-controllable setting.) Whereas we are not aware of any studies of parameter-controlled oscillators in a protocol design setting (nor for that matter, of rigorous studies in other fields), we should note that such oscillators have frequently appeared in models of biological systems, most notably in biological networks and neuroendocrinology ( [27] for a survey). Indeed, some hormone release and control mechanisms (e.g., for controlling GnRH surges in vertebrates) appear to be following a similar pattern. To the best of our knowledge, no computational (i.e., interaction-protocol-based) explanation for these mechanisms has yet been proposed, and we hope that our work may provide, specifically on the D ETECT problem, may provide some insights in this direction. In terms of lower bounds, we rely on rather tedious coupling techniques for protocols allowing randomization, and many of the details are significantly different from lower-bound techniques found 5 in the population protocols literature. We remark that a recent line of work in this area [3, 21] provides a powerful set of tools for proving lower bounds on the number of states (typically Ω(log log n) states) for fast (typically polylogarithmic) population protocols for different problems, especially for the case of deterministic protocols. We were unable to leverage these results to prove our lower bound for the randomized scenario studied here, and believe our coupling analysis is complementary to their results. 1.4 Other Related Work Our work fits into the line of research on rumor spreading, population protocols, and related interaction models. Our work also touches on the issue of how distributed systems may spontaneously achieve some form of coordination with minimum agent capabilities. The basic work in this direction, starting with the seminal paper [32], focuses on synchronizing timers through asynchronous interprocess communication to allow processes to construct a total ordering of events. A separate interesting question concerns local clocks which, on their own, have some drift, and which need to synchronize in a network environment (cf. e.g. [35, 37], or [34] for a survey of open problems). Rumor spreading. Rumor spreading protocols are frequently studied in a synchronous setting. In a synchronous protocol, in each parallel round, each vertex independently at random activates a local rule, which allows it either to spread the rumor (if it is already informed), or possibly also to receive it (if it has not yet been informed, as is the case in the push-pull model). The standard push rumor spreading model assumes that each informed neighbor calls exactly one uninformed neighbor. In the basic scenario, corresponding to the complete interaction network, the number of parallel rounds for a single rumor source to inform all other nodes is given as log2 n + ln n + o(log n), with high probability [24, 42]. More general graph scenarios have been studied in [22] in the context of applications in broadcasting information in a network. Graph classes studied for the graph model include hypercubes [22], expanders [45], and other models of random graphs [23]. The push-pull model of rumor spreading is an important variation: whereas for complete networks the speedup due to the pull process is in the order of a multiplicative constant [29], the speed up turns out to be asymptotic, e.g., on preferential attachment graphs, where the rumor spreading time is reduced from Θ(log n) rounds in the push model to Θ(log n/ log log n) rounds in the push-pull model [18], as well as on other graphs with a non-uniform degree distribution. The push-pull model often also proves more amenable to theoretical analysis. We note that asynchronous rumor spreading on graphs, in models closer to our random scheduler, has also been considered in recent work [26, 40], with [26] pointing out the tight connections between the synchronous (particularly push-pull) and asynchronous models in general networks. Population protocols. Population protocols are a model which captures the way in which the complex behavior of systems (biological, sensor nets, etc.) emerges from the underlying local interactions of agents. The original model of Angluin et al. [6, 7] was motivated by applications in sensor mobility. Despite the limited computational capabilities of individual sensors, such protocols permit at least (depending on available extensions to the model) the computation of two important classes of functions: threshold predicates, which decide if the weighted average of types appearing in the population exceeds a certain value, and modulo remainders of similar weighted averages. The majority function, which belongs to the class of threshold functions, was shown to be stably computable for the complete interaction graph [6]; further results in the area of majority computation can be found in [7, 9, 10, 38]. A survey of applications and models of population protocols is provided in [9, 39]. An interesting line of research is related to studies of the algorithmic properties of dynamics of chemical reaction networks [21]. These are as powerful as population protocols, though some extensions of the chemical reaction model also allow the population size to change in time. Two very recent results in the population protocol model are 6 worthy of special attention. Alistarh, Aspnes, and Gelashvili [4] have resolved the question of the number of states required to solve the Majority problem on a complete network in polylogarithmic time as Θ(log n). For the equally notable task of Leader Election, the papers of Gasieniec and Stachowiak [25] (for the upper bound) together with the work of Alistarh, Aspnes, Eisenstat, Gelashvili, and Rivest [3] (for the lower bound) put the number of states required to resolve this question in polylogarithmic time as Θ(log log n). Both of these results rely on a notion of a self-organizing phase clock. Nonlinearity in interaction protocols. Linear dynamical systems, as well as many nonlinear protocols subjected to rigorous analytical study, have a relatively simple structure of point attractors and repellers in the phase space. The underlying continuous dynamics (in the limit of n → +∞) of many interaction protocols defined for complete graphs would fit into this category: basic models of randomized rumor spreading [42]; models of opinion propagation (e.g. [1, 14]); population protocols for problems such as majority and thresholds [6, 7]; all reducible Markov chain processes, such as random walks and randomized iterative load balancing schemes. Nonlinear dynamics with non-trivial limit orbits are fundamental to many areas of systems science, including the study of physical, chemical and biological systems, and to applications in control science. In general, population dynamics with interactions between pairs of agents are non-linear (representable as a set of quadratic difference equations) and have potentially complicated structure if the number of states is 3 or more. For example, the simple continuous Lotka-Volterra dynamics [36] gives rise to a number of discrete models, for example one representing interactions of the form A + B → A + A, over some pairs A, B of states in a population (cf. [46] for further generalizations of the framework or [15] for a rigorous analysis in the random scheduler model). The model describes transient stability in a setting in which several species are in a cyclic predator-prey relation. Cyclic protocols of the type have been consequently identified as a potential mechanism for describing and maintaining biodiversity, e.g., in bacterial colonies [30, 31]. Cycles of length 3, in which type A2 attacks type A1 , type A3 attacks type A2 , and type A1 attacks type A3 , form the basis of the basic oscillator, also used as the starting point for protocols in this work, which is referred to as the RPS (rock-paper-scissors) oscillator or simply the 3-cycle oscillator, which we discuss further in Section 6.1. This protocol has been given a lot of attention in the statistical physics literature. The original analytical estimation method applied to RPS was based on approximation with the Fokker-Planck equation [44]. A subsequent analysis of cyclic 3- and 4-species models using Khasminskii stochastic averaging can be found in [16], and a mean field approximation-based analysis of RPS is performed in [41]. In [15], we have performed a study of some algorithmic implications of RPS, showing that the protocol may be used to perform randomized choice in a population, promoting minority opinions, in Õ(n2 ) steps. All of these results provide a good qualitative understanding of the behavior of the basic cyclic protocols. We remark that the protocol used in this paper is directly inspired by the properties of RPS, as we discuss further on, but has a more complicated interaction structure (see Fig. 1). For protocols with convergence to a single point in the configuration space in the limit of large population size, a discussion of the limit behavior is provided in [12], who provide examples of protocols converging to limit points at coordinates corresponding to any algebraic numbers. We also remark that local interaction dynamics on arbitrary graphs (as opposed to the complete interaction graph) exhibit a much more complex structure of their limit behavior, even if the graph has periodic structure, e.g., that of a grid. Oscillatory behavior may be overlaid with spatial effects [46], or the system may have an attractor at a critical point, leading to simple dynamic processes displaying self-organized criticality (SOC, [43]). 7 2 2.1 Preliminaries: Building Blocks for Population Protocols Protocol Definition A randomized population protocol for a population of n agents is defined as a pair P = (Kn , Rn ), where Kn is the set of states and Rn is the set of interaction rules. The interaction graph is complete. We will simply write P = (K, R), when considering a protocol which is universal (i.e., defined in the same way for each value of n) or if the value of n is clear from the context. All the protocols we design are universal; our lower bounds also apply to some non-universal protocols. The set of rules R ⊆ K 4 × [0, 1] is given so that each rule j ∈ R is of the form j = (i1 (j), i2 (j), o1 (j), o2 (j), qj ), describing an interaction read as: “(i1 (j), i2 (j)) → (o1 (j), o2 (j))with probability qj ”. For all i1 , i2 ∈ {j ∈ R : (i1 (j), i2 (j)) = (i1 , i2 )} as the set of rules acting on the pair of states K, we define Ri1 ,i2 = P i1 , i2 , and impose that j∈Ri ,i qj ≤ 1. 1 2 For a state A ∈ K, we denote the number of agents in state AP as #A, and the concentration of state # # A as a = A/n, and likewise for a set of states A, we write A = A∈A #A. In any configuration of the system, each of the n agents from the population is in one of states from Kn . The protocol is executed by an asynchronous scheduler, which runs in steps. In every step the scheduler uniformly at random chooses from the population a pair of distinct agents to interact: the initiator and the receiver. If the initiator and receiver are in states i1 and i2 , respectively, then the protocol executes at most one rule from set protocol Ri1 ,i2 , selecting rule j ∈ Ri1 ,i2 with probability qj . If rule j is executed, the initiator then changes its state to o1 (j) and the receiver to o2 (j). The source has a special state, denoted X in the D ETECT problem, or one of two special states, denoted {X1 , X2 } in the B IT B ROADCAST problem, which is never modified by any rule. All protocols are presented in the randomized framework, however, the universal protocols considered here are amenable to a form of conversion into deterministic rules discussed in [3], which simulates randomness of rules by exploiting the inherent randomness of the scheduler in choosing interacting node pairs to distribute weakly dependent random bits around the system. All protocols designed in this work are initiator-preserving, which means that for any rule j ∈ R, we have o1 (j) = i1 (j) (i.e., have all rules of the form A + B → A + C, also more compactly written as A : B → C), which makes them relevant in a larger number of application. As an illustrative example, we remark that the basic rumor spreading (epidemic) model is initiator-preserving and given simply as 1 : 0 → 1. All protocols can also obviously be rewritten to act on unordered pairs of agents picked by the scheduler, rather than ordered pairs. 2.2 Protocol Composition Technique Our protocols will be built from simpler elements. Our basic building block is the input-controlled oscillatory protocol Po (see Fig. 1). We then use protocol Po as a component in the construction of other, more complex protocols, without disrupting the operation of the original protocol. Formally, we consider a protocol PB using state set B = {Bi : 1 ≤ i ≤ kb } and rule set RB , and a protocol extension PBC using a state set B × C = B × {Ci : 1 ≤ i ≤ kc }, where C is disjoint from B, and rule extension set RBC . Each rule extension defines for each pair of states from B × C (i.e., to each element of (B × C) × (B × C)) a probability distribution over elements of C × C. The composed protocol PB ◦ PBC is a population protocol with set of states B × C. Its rules are defined so that, for a selected pair of agents in states (Bi , Cj ) and (Bi0 , Cj 0 ), we obtain a pair of agents in states (Bi∗ , Cj ∗ ) and (Bi0∗ , Cj 0∗ ) according to a probability distribution defined so that: • Each pair Bi0∗ , Bi0∗ appears in the output states of the two agents with the same probability as it would in an execution of protocol PB on a pair of agents in states Bi and Bi0 . 8 • Each pair Ci0∗ , Ci0∗ appears in the output states of the two agents with the probability given by the definition of PBC . In the above, the pairs of agents activated by PB and PBC are not independent of each other. This is a crucial property in the composition of protocol Po when composing it with further blocks to solve the D ETECT problem. We denote by 1B the identity protocol which preserves agent states on set of states B. For a protocol P , we denote by P/2 a lazy version of a protocol P in which the rule activation of P occurs with probability 1/2, and with probability 1/2 the corresponding rule of the identity protocol is activated. Note that all asymptotic bounds on expected and w.h.p. convergence time obtained for any protocol P also apply to protocol P/2, in the regime of at least a logarithmic number of time steps. We also sometimes treat a protocol PBC extension as a protocol in itself, applied to the identity protocol 1B . The independently composed protocol PB + PBC is defined as an implementation of the composed protocol (PB ) ◦ (PC /2), realized with the additional constraint that in each step, either the rule of PB is performed with an identity rule extension, or the rule extension of PBC is performed on top of the identity protocol 1B . Such a definition is readily verified to be correct by a simple coupling argument, and allows us to analyze protocols PB and PBC , observing that the pairs (identities) of agents activated by the scheduler in the respective protocols are independent. All the composed protocols (and protocol extensions) we design are also initiator-preserving, i.e., Ci∗ = Ci and Bi∗ = Bi , with probability 1. In notation, rules omitted from the description of protocol extensions are implicit, occurring with probability 0 (where Cj ∗ 6= Cj ) or with the probability necessary for the normalization of the distribution to 1, where the state is preserved (where Cj ∗ = Cj ). As a matter of naming convention, we name the states in the separate state sets of the composed protocols with distinct letters of the alphabet, together with their designated subscripts and superscripts. The rumor source X is treated specially and uses a separate letter (and may be seen as a one state protocol without any rules, on top of which all other protocols are composed; in particular, its state is ? never modified). The six remaining states of protocol Po are named with the letters A? , as usual in its definition. Subsequent protocols will use different letters, e.g., M? and L? . 3 3.1 Overview of Protocol Designs Main Routine: Input-Controlled Oscillator Protocol Po We first describe the main routine which allows us to convert local input parameters (the existence of source into a form of global periodic signal on the population. This main building block is the construction of a 7-state protocol Po following oscillator dynamics, whose design we believe to be of independent interest. The complete design of protocol Po is shown in Fig. 1. The source state is denoted by X. Addi++ tionally, there are six states, called A+ i and Ai , for i ∈ {1, 2, 3}. The naming of states in the protocol is intended to maintain a direct connection with the RPS oscillator dynamics, which is defined by the ++ simple rule “Ai : Ai−1 7→ Ai , for i = 1, 2, 3”. In fact, we will retain the convention Ai = {A+ i , Ai } ++ + ++ and ai = a+ to be different flavors of the same species i + ai , and consider the two states Ai and Ai + Ai , referring to the respective superscripts as either lazy ( ) or aggressive (++ ). The protocol has the property that in the absence of X, it stops in a corner state of the phase space, in which only one of three possible states appears in the population, and otherwise regularly (every O(log n) steps) moves sufficiently far away from all corner states. An intuitive formalization of the basic properties of the protocol is given by the theorem below. Theorem 1. There exists a universal protocol Po with |K| = 7 states, including a distinguished source state X, which has the following properties. 9 (1) Interaction with an initiator from the same species makes receiver aggressive: ? Ai : ? Ai 7→ A++ i (2) Interaction with an initiator from a different species makes receiver lazy (case of no attack): ? Ai : ? Ai+1 7→ A+ i+1 (3) A lazy initiator has probability p of performing a successful attack on its prey: A+ i : ? Ai−1 ( A+ with probability p, i , 7→ + Ai−1 , otherwise. (4) An aggressive initiator has probability 2p of performing a successful attack on its prey: A++ i : ? Ai−1 ( A+ with probability 2p, i , 7→ + Ai−1 , otherwise. (5) The source converts any receiver into a lazy state of a uniformly random species: X: ? A?  +  A1 , with probability 1/3, 7→ A+ 2 , with probability 1/3,   + A3 , with probability 1/3. Figure 1: Rules of the basic oscillator protocol Po . The adopted notation for initiator-preserving rules is of the form A : B 7→ C, corresponding to transitions written as A + B → A + C in the notation of chemical reaction networks or (A, B) → (A, C) in the notation of population dynamics. All rules apply to i ∈ {1, 2, 3}, whereas a question mark ? in a superscript or subscript denotes a wildcard, matching any permitted combination of characters, which may be set independently for each agent. Probability p > 0 is any (sufficiently small) absolute constant. 1. For any starting configuration, in the absence of the source (#X = 0), the protocol always reaches a configuration such that: ++ ++ • all agents are in the same state: either A++ 1 , or A2 , or A3 ; • no further state transitions occur after this time. Such a configuration is reached in O(log n) rounds, with constant probability (and in O(log2 n) rounds with probability 1 − O(1/n)). 2. For any starting configuration, in the presence of the source (#X ≥ 1), we have with probability 1 − O(1/n): • for each state i ∈ K, there exists a time step in the next O(log #nX ) rounds when at least a constant fraction of all agents are in state i; • during the next O(log #nX ) rounds, at least a constant fraction of all agents change their state at least once. 10 The proof of the Theorem is provided in Section 6. The RPS dynamics provides the basic oscillator mechanism which is still largely retained in our scenario. Most of the difficulty lies in controlling its operation as a function of the presence or absence of the rumor source. We do this by applying two separate mechanisms. The presence of rumor source X shifts the oscillator towards an orbit closer to the central orbit (A1 , A2 , A3 ) = (1/3, 1/3, 1/3) through rule (5), which increases the value of potential φ := ln(a1 a2 a3 ), where ai = #Ai /n. Conversely, independent of the existence of rumor source X, a second mechanism is intended to reduce the value of potential φ. This mechanism exploits the difference between the aggressive and lazy flavors of the species. Following rule (1), an agent belonging to a species becomes more aggressive if it meets another from the same species, and subsequently attacks agents from its prey species with doubled probability following rule (4). This behavior somehow favors larger species, since they are expected to have (proportionally) more aggressive agents than the smaller species (in which pairwise interactions between agents of the same species are less frequent) — the fraction of agents in Ai which are aggressive would, in an idealized static scenario, be proportional to ai . (This is, in fact, often far from true due to the interactions between the different aspects of the dynamics). As a very loose intuition, the destabilizing behavior of the considered rule on the oscillator is resemblant of the effect an eccentrically fitted weight has on a rotating wheel, pulling the oscillator towards more external orbits (with smaller values of φ). The intuition for which the proposed dynamics works, and which we will formalize and prove rigorously in Section 6, can now be stated as follows: in the presence of rumor source X, the dynamics will converge to a form of orbit on which the two effects, the stabilizing and destabilizing one, eventually compensate each other (in a time-averaged sense). The period of a single rotation of the oscillator around such an orbit is between O(1) and O(log n), depending on the concentration of X. In the absence of X, the destabilizing rule will prevail, and the oscillator will quickly crash into a side of the triangle. For small values of #X > 0, the protocol can be very roughly (and non-rigorously) viewed as cyclic composition of three dominant rumor spreading processes over three sets of states A1 , A2 , A3 , one converting states A1 to A3 , the next from A3 to A2 , and the last from A2 to A1 , which spontaneously take over at moments of time separated by O(log n) parallel rounds. For other starting configurations, and especially for the case of #X = 0, the dynamics of the protocol, which has 5 free dimensions, is more involved to describe and analyze (see Section 6.4). We provide some further insights into the operation of the protocol in Section 7.1, notably formalizing the notion that an intuitively understood oscillation (going from a small number of agents in some state Ai , to a large number of agents in state Ai , and back again to a small number of agents in state Ai ) takes Θ(log #nX ) steps, with probability 1 − O(1/n). As such, protocol Po can be seen as converting local input #X into a global periodic signal with period Θ(log #nX ). What remains is allowing nodes to extract information from this periodic signal. Simulation timelines shown in Fig.9 in the Appendix illustrate the idea of operation of protocol Po and its composition with other protocols. 3.2 Protocols for B IT B ROADCAST A solution to B IT B ROADCAST is obtained starting with an independent composition of two copies of oscillator Po , called Po[1] and Po[2] , with states in one protocol denoted by subscript [1] and in the other by subscript [2]. The respective sources are thus written as X[1] and X[2] . In view of Theorem 1, in this composition Po[1] + Po[2] , under the promise of the B IT B ROADCAST problem, one of the oscillators will be running and the other will stop in a corner of its state space. Which of the oscillators is running can be identified by the presence of states A+ i [z], which will only appear for z ∈ {1, 2} corresponding to the operating oscillator. Moreover, by the same Theorem, every O(log n) rounds a constant number of agents of this oscillator will be in such a state A+ i [z], for any choice of i ∈ {1, 2, 3}. We can thus design the protocol extension Pb to detect this. This is given by the pair of additional output states {Y1 , Y2 } and the rule extension consisting of the two rules shown in Fig. 2. 11 (6a) Interaction with agent state A+ ?[1] sets agent output to Y1 : ++ (A+ ?[1] , A?[2] , Y? ) : (A??[1] , A??[2] , Y? )7→ Y1 (6a) Interaction with agent state A+ ?[2] sets agent output to Y2 : + (A++ ?[1] , A?[2] , Y? ) : (A??[1] , A??[2] , Y? )7→ Y2 Figure 2: Protocol extension Pb of protocol (Po[1] + Po[2] ), with additional states {Y1 , Y2 }. (5a-5b) Interaction with source X[1] alters corner configurations different from A1 : X[1] : A?3 7→ A+ 1 X[1] : A?2 7→ A+ 3 (5c-5d) Interaction with source X[2] alters corner configurations different from A2 : X[2] : A?1 7→ A+ 2 X[2] : A?3 7→ A+ 1 Figure 3: Protocol Po0 is obtained from the basic oscillator protocol Po by removing Rule (5) and replacing it by the two rules shown above. Theorem 2 (Protocol for B IT B ROADCAST). Protocol (Po[1] + Po[2] ) + Pb , having |K| = 74 states, including distinguished source states X[1] , X[2] converges to an exact solution of B IT B ROADCAST. This occurs in O(log2 n) parallel rounds, with probability 1 − O(1/n). In the output encoding, agent states of the form (·, ·, Yz ) represent answer “z”, for z ∈ {1, 2}. The protocol (Po[1] + Po[2] ) + Pb is not “silent”, i.e., it undergoes perpetual transitions of state, even once the output has been decided. As a side remark, we note that for the single-source broadcasting problem, or more generally for the case when the number of sources is small, max{#X[1] , #X[2] } = O(1), we can propose the following simpler silent protocol. We define protocol Po0 , by modifying protocol Po as follows. We remove from it Rule (5), and replace it by to the four rules shown in Fig. 3. The analysis of the modified protocol follows from the same arguments as those used to prove Theorem 1(1). In the regime of max{#X[1] , #X[2] } = O(1), the effect of the source does not influence the convergence of the process and each of the three possible corner configurations, with exclusively species {A1 , A2 , A3 }, is reached in O(log n) steps with constant probability. However, rules (5a)−(5d) enforce that the only stable configuration which will persist is the one in a corner corresponding to the identity of the source, i.e., A1 for source X[1] and A2 for source X[2] ; the source will restart the oscillator in all other cases. We thus obtain the following side result, for which we leave out the details of the proof. Observation 1. Protocol Po0 , having |K| = 6 + 2 = 8 states, including distinguished source states X[1] , X[2] converges to an exact solution of B IT B ROADCAST, eventually stopping with all agents in state 12 (6) Meeting an agent of a different type resets majority setting: ((X or A?j ), M? ) : ( M+1 , with probability 1/2 (A?i , M? ) 7→ , M−1 , with probability 1/2 for j 6= i. (7-10) Three-state majority protocol among agents of the same type: (7) : (A?i , M−1 ) : (A?i , M+1 )7→M0 , with probability r. (8) : (A?i , M+1 ) : (A?i , M+1 ) : (A?i , M−1 ) : (A?i , M−1 )7→M0 , (A?i , M0 ) 7→M+1 , (A?i , M0 ) 7→M−1 , with probability r. (9) : (10) : with probability r. with probability r. Figure 4: Protocol extension Pm of protocol Po , with additional states {M−1 , M0 , M+1 }. This protocol extension is applied through the composition (Po ◦ Pm ). Probability r > 0 is given by an absolute constant, depending explicitly on s and p, whose value is sufficiently small. ++ A++ 1 if source X[1] is present and stopping with all agents in state A2 if source X[2] is present, with no subsequent state transition. The stabilization occurs within O(log2 n) parallel rounds, with probability 1 − O(1/n), if max{#X[1] , #X[2] } = O(1), i.e., the broadcast originates from a constant number of sources. 3.3 Protocol for D ETECT The solution to problem D ETECT is more involved. It relies on two auxiliary extensions added on top of a single oscillator Po . The first, Pm , runs an instance of the 3-state majority protocol of Angluin et al. [7] within each species Ai of the oscillator. For this reason, the composition between Po and Pm has to be of the form Po ◦ Pm (i.e., it cannot be independent). The operation of this extension is shown in Fig. 5 and analyzed in Section 7.2. It relies crucially on an interplay of two parameters: the time Θ(log #nX ) taken by the oscillator to perform an orbit, and the time Ω(log #nX ) it takes for the majority protocol (which is reset by the oscillator in its every oscillation) to converge to a solution. When parameters are tuned so that the second time length is larger a constant number of times than the first, a constant proportion of the agents of the population are involved in the majority computation, i.e., both of the clashing states in the fight for dominance still include Ω(n) agents. In the absence of a source, shortly after the oscillator stops, one of these states takes over, and the other disappears. The above-described difference can be detected by the second, much simpler, extension Pl , designed in Fig. 5 and analyzed in Section 7.3. The number of “lights” switched on during the operation of the protocol will almost always be more than (1 − ε)n, where ε > 0 is a parameter controlled by the probability of lights spontaneously disengaging, and may be set to and arbitrarily small constant. Theorem 3 (Protocol for D ETECT). For any ε > 0, protocol (Po ◦ Pm ) + Pl , having |K| = 6 · 3 · 3 + 1 = 55 states, including a distinguished source state X, which solves the problem of spreading confirmed rumors as follows: 1. For any starting configuration, in the presence of the source (#X ≥ 1), after an initialization period of O(log n) rounds, at an arbitrary time step the number of agents in an output state corresponding to a “yes” answer is (1 − ε)n, with probability 1 − O(1/n). 13 (11) Light switch progresses from L−1 to L+1 in the presence of initiator M−1 : (A?? , M−1 , L? ) : (A?? , M? , L−1 ) 7→ L+1 (12) Light switch progresses from L+1 to Lon in the presence of initiator M+1 : (A?? , M+1 , L? ) : (A?? , M? , L+1 ) 7→ Lon (13) Light spontaneously turns off: (A?? , M? , L? ) : (A?? , M? , Lon ) 7→ L−1 , with probability q(ε). Figure 5: Protocol extension Pl of protocol (Po ◦ Pm ), with additional states {L−1 , L+1 , Lon }. This protocol extension is applied through the composition (Po ◦ Pm ) + Pl . Probability q(ε) > 0 is given by an absolute constant, depending explicitly on s, p, r, and ε, whose value is sufficiently small. 2. For any starting configuration, in the absence of the source (#X = 0), the system always reaches a configuration such that all agents are in output states corresponding to a “no” answer for all subsequent time steps. Such a configuration is reached in O(log2 n) rounds, with probability 1 − O(1/n). 4 Impossibility Results for Protocols without Non-Stationary Effects For convenience of notation, we identify a configuration of the population with a vector z = (z (1) , . . . , z (k) ) ∈ {0, 1, . . . , n}k = Z, where z (i) , for 1 ≤ i ≤ k, denotes the number of agents in the population having state i, and kzk1 = n. Our main lower bound may now be stated as follows. Theorem 4 (Fixed points preclude fast stabilization). Let ε1 > 0 be arbitrarily chosen, let P be any k-state protocol, and let z0 be a configuration of the system with at most nε0 agents in state X, where ε0 ∈ (0, ε1 ] is a constant depending only on k and ε1 . Let B be a subset of the state space around z0 such that the population of each state within B is within a factor of at most nε0 from that in z0 (for any (i) (i) z ∈ B, for all states i ∈ {1, . . . , k}, we have z0 /nε0 < z (i) ≤ nε0 max{1, z0 }). Suppose that in an execution of P starting from configuration z0 , with probability 1 − o(1), the configurations of the system in the next n2ε1 parallel rounds are confined to B. Then, an execution of P for n2ε0 parallel rounds, starting from a configuration in which state X has been removed from z0 , reaches a configuration in a O(n6ε1 )-neighborhood of B, with probability 1 − o(1). In the statement of the Theorem, for the sake of maintaining the size of the population, we interpret “removing state X from z0 ” as replacing the state of all agents in state X by some other state, chosen adversarially (in fact, this may be any state which has sufficiently many representatives in configuration z0 ). The O(n6ε1 )-neighborhood of B is understood in the sense of the 1-norm or, asymptotically equivalently, the total variation distance, reflecting configurations which can be converted into a configuration from B by flipping the states of O(n6ε1 ) agents. The proof of Theorem 4 is provided in Section 8. It proceeds by a coupling argument between a process starting from z0 and a perturbed process in which state X has been removed. The analysis differently treats rules and states which are seldom encountered during the execution of the protocol 14 from those that are encountered with polynomially higher probability (such a clear separation is only possible when k = O(poly log log n)). Eventually, the probability of success of the coupling reduces to a two-dimensional biased random walk scenario, in which the coordinates represent differences between the number of times particular rules have been executed in the two coupled processes. We have the following direct corollaries for the problems we are considering. For D ETECT, if B represents the set of configurations of the considered protocol, which are understood as the protocol giving the answer “#X > 0”, then our theorem says that, with probability 1 − o(1), the vast majority of agents will not “notice” that #X had been set to 0, even a polynomial number of steps after this has occurred, and thus cannot yield a correct solution. An essential element of the analysis is that it works only when state X is removed in the perturbed process. Thus, there is nothing to prevent the dynamics from stabilizing even to a single point in the case of X = 0, which is indeed the case for our protocol Pr . The argument for B IT B ROADCAST only applies to situations where the source agent is sending out white noise (independently random bits in successive interactions). Such a source can be interpreted as a pair of sources in states X1 and X2 in the population, each disclosing itself with probability 1/2 upon activation and staying silent otherwise. In the cases covered by the lower bound, the scenario in which the source X1 is completely suppressed cannot be distinguished from the scenario in which both X1 and X2 appear; likewise, the scenario in which the source X2 is completely suppressed cannot be distinguished from the scenario in which both X1 and X2 appear. By coupling all three processes, this would imply the indistinguishability of the all these configurations, including those with only source X1 and only source X2 , which would imply incorrect operation of the protocol. Whereas we use the language of discrete dynamics for precise statements, we informally remark that the protocols covered by the lower bound of Theorem 4 include those whose dynamics zt /n, described in the continuous limit (n → +∞), has only point attractors, repellers, and fixed points. In this sense, the use of oscillatory dynamics in our protocol seems inevitable. The impossibility result is stated in reference to protocols with a constant number of states, however, it may be extended to protocols with a non-constant number of states k, showing that such protocols require nexp[−O(poly(k))] time to reach a desirable output. (This time is larger than polylogarithmic up to some threshold value k = O(poly log log n).) The lower bound covers randomized protocols, including those in which rule probabilities depend on n (i.e., non-universal ones). 5 Input-Controlled Behavior of Protocols for D ETECT In this Section, we consider the periodicity of protocols for self-organizing oscillatory dynamics, in order to understand how the period of a phase clock must depend on the input parameters. We focus on the setting of the D ETECT problem, considering the value #X of the input parameter. In Section 3.1, we noted informally that the designed oscillatory protocol performs a complete rotation around the triangle in Θ(log n/#X) rounds. Here, we provide partial evidence that the periodicity of any oscillatory protocol depends both on the value of #X and n. We do this by bounding the portions of the configuration space in which a protocol solving D ETECT finds itself in most time steps, separating the cases of sub-polynomial #X (i.e., #X < nε0 , where ε > 0 is a constant dependent on the specific protocol), and the case of 0 #X = Θ(n). Any protocol on k states (not necessarily of oscillatory nature) can be viewed as a Markov chain in its k-dimensional configuration space [0, n]k , and as in Section 4 we identify a configuration with a vector z ∈ {0, 1, . . . , n}k = Z. The configuration at time step t is denoted z(t). In what follows, we will look at the equivalent space of log-configurations, given by the bijection: Z 3 z = (z (1) , . . . , z (k) ) 7→ (ln◦ z (1) , . . . , ln◦ z (k) ≡ ln◦ z ∈ {ln◦ 0, ln◦ 1, . . . , ln◦ n}k ), where ln◦ a = ln a for a > 0 and ln◦ a = −1 for a = 0. 15 For z0 ∈ Z, we will refer to the d-log-neighborhood of z0 as the set of points {z ∈ Z : | ln◦ z − ln◦ z0 | < d}. Notice first that the notion of a box in the statement of Theorem 4 is closely related to the set of points in the (ε0 ln n)-log-neighborhood of configuration z0 . It follows from the Theorem that any protocol for solving D ETECT within a polylogarithmic number of rounds T with probability 1 − o(1) must, in the case of 0 < #X < nε0 , starting from z0 at some time t0 , leave the (ε0 ln n)-log-neighborhood of z0 within T rounds with probability 1 − o(1). We obtain the following corollary. Proposition 1. Fix a universal protocol P which solves the D ETECT problem with ε-error in T = O(poly log n) rounds with probability 1 − o(1). Set 0 < #X < nε0 , where ε0 > 0 is a constant which depends only on the definition of protocol #X. Let t0 be an arbitrarily chosen moment of time after at least T rounds from the initialization of the protocol in any initial state. Then, within T rounds after time t0 , there is a moment of time t such that z(t) is not in the (ε0 log n)-neighborhood of z(t0 ), with probability 1 − o(1). The above Proposition suggests that oscillatory or quasi-oscillatory behavior at low concentrations of state X must be of length Ω(log n). By contrast, the following Proposition shows that in the case #X = Θ(n), the protocol remains tied to a constant-size log-neighborhood of its configuration space. Proposition 2. Fix a universal protocol P with set of states K which solves the D ETECT problem with ε-error in T = O(poly log n) rounds with probability 1 − o(1). Then, there exists a constant δ0 > 0, depending only on the design of protocol P , with the following property. Fix #X ∈ [cn, n/2], where 0 < c < 1/2 is an arbitrarily chosen constant. Let t be an arbitrarily chosen moment of time, after at least T rounds from the initialization of the protocol at an adversarially chosen initial configuration z(0), such that each coordinate z (i) (0) satisfies z (i) (0) = 0 or z (i) (0) > 1/(2|K|), for all i ∈ {1, . . . , |K|}. Then, Ω(1) with probability 1 − e−n , z(t) is in the δ0 -neighborhood of z(0). The proof of the Proposition is deferred to Section 9. Note that, in the regime of a constant-size log-neighborhood of configuration z(0), the discrete dynamics of the protocol adheres closely to the continuous-time version of its dynamics in the limit n → +∞. (See Section 6, and in particular Lemma 1, for a further discussion of this property). Since the latter is independent of n, any oscillatory behavior “inherited” from the continuous dynamic would have a period of O(1) rounds. We leave as open the question whether some form of behavior of a protocol with polylogarithmic (i.e., or more broadly, non-constant and subpolynomial) periodicity for D ETECT can be designed in the regime of #X = Θ(n) despite this obstacle. In particular, the authors believe that the existence of an input-controlled phase clock with a period of Θ(log n) for any #X > 0, and the absence of operation for #X = 0, is unlikely in the class of discrete dynamical systems given by the rules of population protocols. The remaining sections of the paper provide proofs of the Theorems from Sections 3, 4, and 5. 6 Analysis of Oscillator Dynamics Po This section is devoted to the proof of Theorem 1. 6.1 Preliminaries: Discrete vs. Continuous Dynamics Notation. For a configuration of a population protocol, we write z = (z (1) , . . . , z (k) ) to describe the number of agents in the k states of the protocol, and likewise use vector u = (u(1) , . . . , u(k) ) = z/n to describe their concentrations. The concentration of a state called A which is the iA -th state in vector u is equivalently written as a ≡ a(u) ≡ u(iA ) , depending on which notation is the easiest to use in a given transformation. 16 If vector u represents the current configuration of the protocol and u0 := u0 |u is the random variable describing the next configuration of the protocol after the execution of a single rule, we write ∆u := u0 − u. We also use the notation ∆ to functions of state u. Next, we define the continuous dynamics associated with the protocol by the following vector differential equation: du u̇ ≡ := nE(∆u) dt and likewise, for each coordinate, ȧ = nE(∆a) (we use the dot-notation and d/dt interchangeably for time differentials). This continuous description serves for the analysis only, and reflects the behavior of the protocol in the limit n → ∞.4 Warmup: the RPS oscillator. Our oscillatory dynamics may be seen as an extension of the rockpaper-scissors (RPS) protocol (see Related work). This is a protocol with three states A1 , A2 , A3 and three rules: Ai : Ai−1 7→ Ai with probability p, where p > 0 is an arbitrarily fixed constant, and the indices of states Ai are always 1, 2, or 3, and any other values should be treated as mod 3 in the given range. For i ∈ {1, 2, 3}, the change of concentration of agents of state Ai in the population in the given step can be expressed for the RPS protocol as:   +1/n, with probability pai−1 ai , 1 # ∆ai = · ∆ Ai = −1/n, with probability pai ai+1 , (1)  n  0, otherwise, Thus, the corresponding continuous dynamics for RPS is given as: ȧi = nE(∆ai ) = pai−1 ai − pai ai+1 , for i = 1, 2, 3. The orbit of motion for this dynamics in R3 is given by two constants of motion. First, a1 + a2 + a3 = 1 by normalization. Secondly, for any starting configuration with a strictly positive number of agents in each of the three states, the following function φ of the configuration: φ = ln(a1 a2 a3 ) (2) is easily verified to be constant over time φ̇ = 0, hence φ = ln(a1 a2 a3 ) = const < 0 (or more simply, a1 a2 a3 = const). Thus, for the continuous dynamics, the initial product of concentrations completely determines its perpetual orbit, which is obtained by intersecting the appropriate curve a1 a2 a3 = const with the plane a1 + a2 + a3 = 1. As a matter of convention, the plane a1 + a2 + a3 = 1 with conditions ai ≥ 0 is drawn as an equilateral triangle (we adopt this convention throughout the paper, for subsequent protocols). All of the orbits are concentric around the point (1/3, 1/3, 1/3), which is in itself a point orbit maximizing the value of φ = − ln 27. The discrete dynamics follows a path of motion which typically resembles random-walk-type perturbations around the path of motion, until eventually, after Õ(n2 ) steps it crashes into one of the sides of the triangle. Subsequently, if ai = 0, for some i = 1, 2, 3, then no rule can make ai increase. (If ai−1 > 0, in the next O(log n) steps, all remaining agents of Ai+1 will convert to Ai−1 , and there will be only agents from Ai−1 left.) Thus, the protocol will terminate in a corner of the state space. A further discussion of the RPS dynamics can be found in [15, 28]. 4 We note that some of our results rely on the stochasticity of the random scheduler model, and do not immediately generalize to the continuous case. 17 6.2 Proof Outline of Theorem 1 The rest of the section is devoted to the proof of Theorem 1. We start by noting some basic properties in Subsection 6.3, then prove the properties of the protocol for the case of X = 0 (Subsection 6.4, and finally analyze (the somewhat less involved) case of X > 0 (Subsection 6.5). For the case of X = 0, the proof is based on a repeated application of concentration inequalities for several potential functions (applicable in different portions of the 6-dimensional phase space). In two specific regions, in √ the O(1/ n)-neighborhood of the center of the (A1 , A2 , A3 )-triangle and very close to its sides, we rely on stochastic noise to “push” the trajectory away from the center of the triangle, and also to push it onto one of its sides. Fortunately, each of these stages takes O(log n) parallel rounds, with strictly positive probability. Overall, the O(log n) parallel rounds bound for the case of X = 0 is provided with constant probability; this translates into O(log n) parallel rounds in expectation, since subsequent executions of the process for O(log n) rounds have independently constant success probability, and the process has a geometrically decreasing tail over intervals of length O(log n). 6.3 Properties of the Oscillator In the following, we define s = a1 + a2 + a3 ∈ [0, 1]. Handling the case of s < 1 allows us not only to take care of the fact that a fraction of the population may be taken up by rumor source X, but also allows for easier composition of Po with other protocols (sharing the same population). We set p as a constant value independent of n, which is sufficiently small (e.g., p = s2 /1012 is a valid choice; we make no efforts in the proofs to optimize constants, but the protocol appears in simulations to work well with much larger values of p). We will occasionally omit an explanation of index i, which will then implicitly mean “for all i = 1, 2, 3”. We define amin := mini=1,2,3 ai and amax := maxi=1,2,3 ai . From the definition of the protocol one obtains the distribution of changes of the sizes of states in a step:  + ++ 1  +1/n, with probability 3 x(s − ai ) + pai ai−1 + 2pai ai−1 , ++ ∆ai = −1/n, with probability 23 xai + pai a+ i+1 + 2pai+1 ai ,   0, otherwise.  ++  +1/n, with probability ai (ai − ai ), ∆a++ = −1/n, with probability xa++ + (s − ai )a++ i i i ,   0, otherwise. ++ Taking the expectations of the above random variables, and recalling that ai = a+ i +ai , we obtain: ++ + ++ ȧi = x(s/3 − ai ) + pa+ i ai−1 + 2pai ai−1 − pai ai+1 − 2pai+1 ai ++ = x(s/3 − ai ) + pai−1 (ai + a++ i ) − pai (ai+1 + ai+1 ) ȧ++ i = −xa++ i + ai (ai − a++ i ) − (s − ai )a++ i = −xa++ i + (3) a2i − sa++ i . Moreover, we have by a simple transformation:   X  X ȧi  x X s ++ ai−1 φ̇ = = −9 +p ai −1 ai 3 ai ai 6.4 (4) (5) Stopping in O(n log n) Sequential Steps in the Absence of a Source Throughout this subsection we assume that x = 0. We consider first the case where ai 6= 0, for i = 1, 2, 3 (noting that as soon as ai = 0, we can easily predict the subsequent behavior of the oscillator, as was the case for the RPS dynamics). 18 The dynamics of Po is defined in such a way that that when x = 0 and in the absence of the rules of a2 the RPS oscillator, the value of a++ would be close to si . Consequently, we define κi , i = 1, 2, 3 as the i appropriate normalized corrective factor: κi = s a++ i − ai ai thus a++ = i ai (ai + κi ). s Note that as 0 ≤ a++ ≤ ai ≤ 1, thus −1 ≤ κi ≤ 1. Next, we introduce the following definitions: i δi = ai − ai−1 q δ = δ12 + δ22 + δ32 q κ = κ21 + κ22 + κ23 We also reuse potential φ from the original RPS oscillator. This time, it is no longer a constant of motion. By (5) and the definition of κi , for x = 0 we upper-bound φ̇ as:   p X ai−1 φ̇ = − 1) ai (ai + κi )( s ai   p X (ai + κi )(ai−1 − ai ) = s   X p 1X 2 = − (ai − ai−1 ) + κi (ai−1 − ai ) s 2   1 2 p − δ + κδ (6) ≤ s 2 The above change φ̇ of the potential is indeed negative when κ ≈ 0 (which is in accordance with our intention in designing the destabilizing rules for the oscillator). The functions δ, φ and κ are intricately dependent on each other. In general, we will try to show that δ and φ increase over time, while κ stays close to 0. This requires that we first introduce a number of auxiliary potentials based on these two functions. First, for x = 0, we can rewrite (4) as: ˙ = a2 − sa++ = −a κ . a++ i i i i i Next, introducing the definition of κi to (3), we obtain for x = 0: ++ ++ ++ ȧi = pai−1 (ai + a++ i ) − pai (ai+1 + ai+1 ) = pai (ai−1 − ai+1 ) + p(ai ai−1 − ai+1 ai ) =   1 1 = pai δi−1 + p ai (ai + κi )ai−1 − ai+1 (ai+1 + κi+1 )ai = s s  p = pai δi−1 + ai κi ai−1 − κi+1 ai+1 + (ai−1 ai − a2i+1 ) . s 19 From the above, an upper bound on |ȧi | follows directly using elementary transformations:  p |ȧi | ≤ pai |δi−1 | + ai |κi |ai−1 + |κi+1 |ai+1 + |ai−1 ai − a2i+1 | ≤ s  p ≤ pai δ + ai κ(ai−1 + ai+1 ) + |ai−1 ai − a2i+1 |) = s ai−1 + ai+1 p = pai δ + pai κ + ai |(ai−1 − ai+1 )ai − (ai+1 − ai )ai+1 | ≤ s s p ≤ pai (δ + κ) + ai (|ai−1 − ai+1 |ai + |ai+1 − ai |ai+1 ) ≤ s ai + ai+1 ≤ pai (δ + κ) + pai δ s ≤ pai (2δ + κ). We are now ready to estimate κ̇i for x = 0, using the definition of κi and the previously obtained formula for ȧ++ i :   ++  ai a++ ȧ++ i i = −sκi − s 2 + 1 ȧi − 2 ȧi − ȧi κ̇i = s ai ai ai  ++  a ȧi ȧi = −sκi − s i − ai − 2ȧi = −sκi − κi − 2ȧi . ai ai ai  Next from the bound on |ȧi |:  ȧi κ˙2i = 2κi κ̇i = 2 − sκ2i − κ2i − 2ȧi κi ai  | ȧ | i 2 κi + 2|ȧi ||κi | ≤ 2 − sκ2i + ai  2 ≤ 2 − sκi + p(2δ + κ)(κ2i + 2ai |κi |)  ≤ 2 − sκ2i + p(2δ + κ)(κ + 2κ) = −2sκ2i + p(12δκ + 6κ2 ). Next:  X 1 X ˙2 1  κi ≤ −2s κ2i + 3p(12δκ + 6κ2 ) ≤ 2κ 2κ  1 2 ≤ −2sκ + p(36δκ + 18κ2 ) = 2κ = (−s + 9p)κ + 18pδ ≤ s ≤ − κ + 18pδ, 2 κ̇ = where in the final transformation we took into account that p ≤ s/18. Now, we define the potential η for any configuration with all ai > 0 as:  η= s3 ln −φ 27 1/2 = − 3 X i=1 ai ln s/3 !1/2 . We remark that η is always well-defined when amin > 0, and that η ≥ 0. 20 (7) A3 t3 t1 t0 δ~O(n -1/2) t4 A1 t2 δ~s/12 t5 t7 t6 A2 Figure 6: Schematic illustration of order of phases in the proof of stabilization of protocol Po for X = 0. Overview of the proof. The proof for the case of X = 0 proceeds by following the trajectory of the discrete dynamics of Po , divided into a number of stages. We define a series of time steps t0 , t1 , . . . , t7 by conditions on the configuration met at time ti , and show that subject to these conditions holding, we have tj+1 ≤ tj + O(n log n) (we recall that here time is measured in steps), with at least constant probability. Overall, it follows that the configuration at time t7 , which corresponds to having reached a corner state, is reached from t0 , which is any initial configuration with X = 0, in O(n log n) time steps, with constant probability. The intermediate time steps may be schematically described as follows (see Fig. 6). For configurations which start close to the center of the triangle (δ ≤ s/12), we define a pair of potentials ψ (1) , ψ (2) , based on a linear combination of modified versions of η and κ. The dynamics will eventually escape from √ the area δ ≤ s/12; however, first it may potentially reach a very small area of radius O(1/ n) around the center of the triangle with κ ≈ 0 (Lemma 3, time t1 , reached in O(n log n) steps by a multiplicative drift analysis on potential ψ (2) < 0), pass through the vicinity of center of the triangle, escaping it with κ ≈ 0 (Lemma 4, time t2 , reached in O(n log n) steps with constant probability by a protocol-specific analysis of the scheduler noise, which with constant probability increases η without increasing κ too much), and eventually escapes completely to the area of δ > s/12 (Lemma 5, exponentially increasing value of potential ψ (1) > 0). In the area of δ > s/12, we define a new potential ψ based on φ and κ. This increases (Lemma 8, additive drift analysis on ψ with bounded variance) until a configuration at time t4 with a constant number of agents of some species Ai is reached. This configuration then evolves towards a configuration at time t5 at which some species has O(1) agents, and additionally its predator species is a constant part of the population (Lemma 9, direct analysis of the process combined with analysis of potential ψ and a geometric drift argument). Then, the species with O(1) agents is eliminated in O(n) steps with constant probability (t6 , Lemma 10), and finally one more species is eliminated in another O(n log n) steps (at time t7 , Lemma 11, straightforward analysis of the dynamics). At this point, the dynamics has reached a corner. Throughout the proof, we make sure to define boundary conditions on the analyzed cases to make sure that the process does not fall back to a previously considered case with probability 1 − o(1). ai Phase with δ ≤ s/12. We then have ai ∈ [3s/12, 5s/12] and s/3 ∈ [3/4, 5/4], for i = 1, 2, 3. In this range, we have:  2    2 1 ai ai ai 3 ai −1 < − 1 − ln < −1 . 3 s/3 s/3 s/3 4 s/3 21 Summing the above inequalities for i = 1, 2, 3 and noting that 3 1X 3 i=1  P3 ai i=1 ( s/3 − 1) = 0, we obtain: 2 2 3  ai 3 X ai 2 −1 <η < −1 . s/3 4 s/3 i=1 Next, we have: 2  2 X 3  3 X ai 3 3δ 2 −1 = (ai − s/3)2 = 2 . s/3 s s i=1 i=1 Combining the two above expressions gives the sought bound between η and δ as: δ 3δ <η< s 2s and equivalently δ ∈ ( 23 sη, sη). We have directly from (6) and from the relations between η and δ:   p 1 2 p 2 p ps p φ̇ ≥ δ − κδ = δ − κδ ≥ η − κ, η̇ = − 2η 2sη 2 4sη 2sη 9 2 (8) and from (7): s s κ̇ ≤ − κ + 18pδ ≤ − κ + 18ps η. (9) 2 2 Moving to the discrete-time model, it is advantageous to eliminate the discontinuity of partial derivatives of η and κ at points with η = 0 and κ = 0 respectively, which is a side-effect of the applied square root transformation in the respective definitions of η and κ. We define the auxiliary functions η ∗ and κ∗ by adding an appropriate corrective factor: r 1 η∗ = η2 + n r 1 κ∗ = κ2 + n and derive accordingly from (8) and (9):   1 p η ps ps p 2ps η−√ − κ ≥ η ∗ − κ∗ − √ η̇ ∗ = ∗ η̇ ≥ η 9 2 9 2 n 9 n   κ s 1 s s ∗ κ̇ = ∗ κ̇ ≤ − κ− √ + 18ps η ≤ − κ∗ + 18ps η ∗ + √ . κ 2 2 n n (10) (11) Let u be the 5-dimensional vector representing the current configuration of the system: u := the last element a++ is determined as a++ = 3 3 folklore application of Taylor’s theorem. + ++ + (1) (5) (a+ a++ 1 ,P 1 , a2 , a2 , a3 ) ≡ (u , . . . , u ); note that 5 (i) 5 s − i=1 u . The following lemma is obtained by a Lemma 1. Let f : R5 → R be a C 2 function in a sufficiently large neighborhood of u, with min1≤i≤5 u(i) ≥ ˙ 2/n. Then, |E∆f (u) − nf | ≤ 2 n2 maxku∗ −uk∞ ≤1/n Df (u∗ ), where Df (u∗ ) := max1≤i,j≤5 ∂f 2 (u∗ ) ∂u(i) ∂u(j) . In principle it is also correct to represent u as a vector of dimension 6, i.e., including a++ in u as a free dimension. 3 2 However, such a representation would lead to second-order partial derivatives ∂u(i)∂∂u(j) η ∗ (u) which are too large for our purposes. 5 22 Proof. Let u0 be the random variable representing the configuration of the system after its next transition from configuration u. Observe that in every non-idle step of execution of the protocol, exactly one agent changes its state, so ku0 − uk∞ ≤ 1/n. Applying Taylor approximation we have: X X  E(∆f ) = E(f (u0 )|u) − f (u) = (f (u0 ) − f (u)) Pr(u0 |u) = ∇f (u) · (u0 − u) + R2 (u, u0 ) Pr(u0 |u) = u0 = ∇f (u) · u0 X f˙ 1 (u0 − u) Pr(u0 |u) + R2 (u) = ∇f (u) · (u̇(1) , . . . , u̇(5) )T + R2 (u) = + R2 (u), n n 0 u (12) where ∇f (u) is the gradient of f at u, R2 (u, u0 ) ∈ R denotes the second-order Taylor remainder for function f expanded at point u along the vector towards point u0 , and R2 (u) ∈ R is subsequently an appropriately chosen value, satisfying: |R2 (u)| ≤ 1 n2 max ku∗ −uk∞ ≤1/n Df (u∗ ). The following lemma is obtained directly by computing and bounding all second order partial derivatives of functions η ∗ and κ∗ with respect to variables (u(1) , . . . , u(5) ). Lemma 2. There exists a constant c1 > 1 depending only on s, p, such that, for any configuration u with δ(u) ≤ s/12: √ • maxku∗ −uk∞ ≤1/n Dη∗ (u∗ ) < c1 n, √ • maxku∗ −uk∞ ≤1/n Dκ∗ (u∗ ) < c1 n. In view of the above lemmas, we obtain from (8) and (9), for an appropriately chosen constant c2 = 2c1 + s:    E∆η ∗ ≥ 1 ps η ∗ − p κ∗ − √c2 , when δ ≤ s/12, n  18 2 n  E∆κ∗ ≤ 1 − s κ∗ + 18ps η ∗ + √c2 , when δ ≤ s/12. n 3 n For j = 1, 2, we now define two linear combinations of functions η ∗ and κ∗ : ψ (j) = η ∗ − 3jp ∗ κ . s When δ ≤ s/12, we have:     1 ps ∗ p ∗ c2 3jp c2 1 ps ∗ jp ∗ 2c2 (j) ∗ 2 ∗ √ E∆ψ ≥ η − κ − √ + jpκ − 54jp η − ≥ η + κ −√ ≥ n 18 2 s n 24 2 n n n     ps 3jp ∗ 48c2 ps c3 ≥ η∗ + κ − √ ≥ |ψ (j) | − √ , 24n s 24n ps n n 48c2 ps s 72·54·2 . (j) We subsequently perform an analysis of ψt = ψ (j) (ut ), j = 1, 2, (2) (1) (1) (2) ∗ processes. We remark that ψt ≤ ψt , since ψt − ψt = 3p s κ ≥ 0. where we denoted c3 := and used the fact that p < treating them as stochastic Lemma 3. Let ut0 be an arbitrary starting configuration of the system. Then, with constant probability, (1) (2) 2c3 for some t1 = t0 + O(n log n), a configuration ut1 is reached such that ψt1 ≥ ψt1 ≥ − √ . n 23 (2) Proof. W.l.o.g. assume t0 = 0. We subsequently only analyze process ψt . Let t1 be the first time step (2) (2) (2) 2c3 . If t1 6= 0, then ψ0 < 0. Note that then ψt < 0 for all t ≤ t1 , from which it such that ψt1 > − √ n s follows by a straightforward calculation from the definition of ψ, κ, and η, that δt < 12 for all t ≤ t1 . ∗(2) We now define the filtered stochastic process ψt for t ≥ t1 . For all t ≥ 0, we then have: ∗(2) E(∆ψt ∗(2) Since 0 ≤ ψt gives: ∗(2) |ψt ∗(2) as ψt 6= 0) ≤ ∗(2) (2) := |ψt | for t < t1 , and put ∆ψt := 0 ps ∗(2) ψ . 48n t < 9 for all time steps, a direct application of multiplicative drift analysis (cf. [19]) Et1 ≤ 48n ps  √  9 n 1 + ln , 2c3 and the claim follows by Markov’s inequality. (j) 2c3 √ Lemma 4. Let ut1 be an arbitrary starting configuration of the system such that ψt1 ∈ [− √ , 4cn3 ], for n j = 1, 2. Then, with constant probability, for some t2 = t1 + O(n), a configuration ut2 is reached such (1) 4c3 that ψt2 ≥ √ . n (2) Proof. W.l.o.g. assume that t1 = 0 and suppose that initially ψ0 Then, from the lower and upper bounds on (1) ψ0 2c3 3p ∗ (1) (2) κ0 = ψ0 − ψ0 ≤ √ + s n 4c (1) (2) 3 η0∗ = 2ψ0 − ψ0 ≤ 2 √ + n and (2) ψ0 (1) ≤ ψ0 < 4c3 √ n (i.e., that t2 6= t1 ). we obtain the following bounds on κ0 and δ0 : 4c √ 3 =⇒ κ0 ≤ n 2c3 √ =⇒ η0 ≤ n 2c3 s √ , p n 10c3 10c s √ =⇒ δ0 < √ 3 . n n √ 3 s , s + 10c √ 3 s ] and a++ = It follows that, for i = 1, 2, 3, ai,0 ∈ [ 3s − 10c i,0 n 3 n ai,0 s (ai,0 +κi,0 ) √ 3 )( s − ∈ [( 31 − 10c 3 n √ 3 )( s + 10c √ 3 s + 2c√3 s )]. For the sake of clarity of notation, we will simply write + 10c 3 n n p n √ √ √ ai,0 = s/3 ± O(1/ n) and a++ = s/9 ± O(1/ n), hence also a+ i,0 i,0 = 2s/9 ± O(1/ n). We will consider now the sequence of exactly n transitions of the protocol, between time steps t = 0, 1, . . . , n. Pt−1 (2) c3 ps For all t we have E∆ψt ≥ − 24n 3/2 . Consider the Doob submartingale Yt = τ =0 Xt with increments (Xt ) given as: ( (2) c3 ps ∆ψt + 24n if Yt > − √c3n 3/2 , Xt = 0, otherwise, 10c √ 3s n − 2c√3 s ), ( 13 p n Noting that |Xt | ≤ n9 , an application of the Azuma inequality for submartingales to (Yn ) gives: Pr[Yn ≤ − √c3n ] ≤ exp [−c23 /162] (cf. e.g. [13][Thm. 16]). From here it follows directly that:  Pr ψn(2)  c3 c3 ps (2) > − √ + ψ0 − n ≥ 1 − exp [−c23 /162] > 1/2. n 24n3/2 (2) 2c3 Noting that ψ0 ≥ − √ , we have: n  Pr ψn(2)  2c3 ≥ −√ > 1/2. n (13) We now describe the execution of transitions in the protocol for times t = 0, 1, . . . , n − 1 through the following coupling. First, we select the sequence of pairs of agents chosen by the scheduler. Let V2+ 24 + (respectively, V1+ ) denote the subsets of the set of n agents, having initial states A+ 2 (resp., A1 ) at time 0, respectively, which are involved in exactly one transition in the considered time interval, acting in it as the initiator (resp., receiver). Let S ⊆ {0, 1, . . . , n − 1} denotes the subset of time steps at which the scheduler activates a transition involving an element of V2+ as the initiator and an element of V1+ as the receiver. The execution of the protocol is now given by: • Phase PA : Selecting the sequence of pairs of elements activated by the scheduler in time steps (0, 1, . . . , n − 1). This also defines set S. Executing the rules of the protocol in their usual order for time steps from set {0, 1, . . . , n − 1} \ S. • Phase PB : Executing the rules of the protocol for time steps from set S. Observe that since elements of pairs activated in time steps from S are activated only once throughout the n steps of the protocol, the above probabilistic coupling does not affect the distribution of outcomes. Directly from (13), we obtain through a standard bound on conditional probabilities that at least a (2) 2c3 constant fraction of choices made in phase PA leads to an outcome “ψn ≥ − √ ” with at least constant n probability during phase PB :     2c3 (2) (14) Pr PA : Pr ψn ≥ − √ PA > 1/4 ≥ 1/3. n + We now remark on the size of set S. The distribution of |S| depends only on a+ 2,0 , a1,0 , and the choices √ made by the random scheduler. We recall that a+ 2,0 = 2s/9 ± O(1/ n). Since the expected number of isolated edges in a random multigraph on n nodes (representing the set of agents) and n edges (representing the set of time steps) is (1 ± o(1))e−4 n, the number of such edges having the first endpoint in an + 4e−4 s2 agent in state A+ 2 and the second endpoint in an agent in state A1 is (1 ± o(1)) 81 n. A straightforward concentration analysis (using, e.g., the asymptotic correspondence between G(n, m) and G(n, p) random graph models and an application of Azuma’s inequality for functions of independent random −4 2 variables) shows that the bound |S| = (1 ± o(1)) 4e 81 s n holds with very high probability. In particular, we have: Pr[|S| > c4 n] = 1 − eΩ(−n) , (15) for some choice of constant c4 which depends only on s. Relations (14) and (15) provide all the necessary information about phase PA that we need. Subsequently, we will only analyse phase PB , conditioning on a fixed execution of phase PA such that the following event FA holds:   2c3 (2) Pr ψn ≥ − √ PA > 1/4 ∧ |S| > c4 n. (16) n We remark that, by a union bound over (14) and (15), Pr[FA ] ≥ 1/3 − eΩ(−n) > 1/4. In the remainder of our proof, our objective will be to show that:   4c3 Pr ψn(1) ≥ √ PA > c5 , n for some constant c5 > 0 depending only on s, p, for any choice of PA for which event FA holds. When this is shown, the claim of the lemma will follow directly, with a probability value given as at least c5 Pr[FA ] > c5 /4 by the law of total probability. We now proceed to analyze the random choices made during phase PB . Each of the considered |S| + interactions involves a pair of agents of the form (A+ 2 , A1 ), and describes the following transition: ( + (A+ + + 2 , A2 ), with probability p, (A2 , A1 ) → + (A+ 2 , A2 ), with probability 1 − p, 25 independently at random for each transition. The only state changes observed during this phase are from + A+ 1 to A2 , and we denote by B the number of such state changes. The value of random variable B completely describes the outcome of phase PB . We have EB = p|S|, and by a standard additive Chernoff bound:   √ (17) Pr |B − p|S|| ≤ 2 n PA ≥ 1 − 2e−4 > 7/8. √ √ Let B ⊆ [p|S| − 2 n,p|S| + 2 n] be the subset of the considered interval containing values of B such (1) 4c3 that ψn PA , B ∈ B ≥ √ . If Pr[B ∈ B|PA ] ≥ 1/8, then the claim follows directly. n √ √ Otherwise, it follows from (16) and (17) that there must exist a value b ∈ [p|S|−2 n, p|S|+2 n]\ B, such that:   2c3 ψn(2) PA , B = b ≥ − √ . n Given that:   4c 3 ψn(1) PA , B = b ≤ √ . n (2) (1) and recalling that ψn ≤ ψn , we obtain the following bound on ηn :    4c3 2c3 10c3 ηn∗ PA , B = b = 2ψn(1) − ψn(2) PA , B = b ≤ 2 √ + √ = √ . n n n (18) (2) We now consider lower bounds on the value of ψn , conditioned on PA , B = b+ (respectively, √ 3 s , b + 21c √ 3s ] PA , B = b− ), where b+ (resp., b− ) is a value arbitrarily fixed in the range b+ ∈ [b + 20c n n (resp., b− ∈ [b − 21c √ 3s , b n − 20c √ 3 s ]). n The executions of the protocol with B = b+ and B = b− differ + with respect to the execution with B = b in the number of executed transitions from a+ 1 to a2 by at least 20c √ 3 s . Recalling that δ2 = a2 − a1 , it follows that for some b0 ∈ {b+ , b− } we have after n steps: n   20c3 s δn PA , B = b0 ≥ |δ2,n | PA , B = b0 ≥ √ . n Subsequently, we will assume that b0 = b+ ; the case of b0 = b− is handled analogously. From the relation η > δ/s and (18) we have:  20c3  10c3 ηn∗ PA , B = b+ ≥ √ ≥ ηn∗ PA , B = b + √ . n n (19) When comparing the value of κ∗n in the two cases, B = b+ and B = b, it is convenient to consider √ κ∗ as the length of the vector (κ1 , κ2 , κ3 , 1/ n) in Euclidean space. For each of the coordinates κi , i = 1, 2, 3, we have:   40c3 κi,n PA , B = b+ − κi,n PA , B = b < √ , n hence:   120c3 κ∗n PA , B = b+ < κ∗n PA , B = b + √ . (20) n (1) Introducing (19) and (20) into the definition of ψn , we obtain directly:     10c 3p 120c3 2c 10c3 3p 120c3 4c 3 √ ≥ −√3 + √ > √3 , − ψn(1) PA , B = b+ > ψn(1) PA , B = b + √ − s n s n n n n n where we again used the fact that p is a sufficiently small constant w.r.t. s. We thus obtain:   4c 3 √ 3 s , b + 21c √ 3s ] > √ , ψn(1) PA , B ∈ [b + 20c n n n 26 where by the definition of random variable B as a sum of i.i.d. binary random variables and the choice √ 3 s , b + 21c √ 3 s ] holds with of value b in the direct vicinity of the expectation of B, the event B ∈ [b + 20c n n constant probability. The case of b0 = b− is handled analogously. (1) (2) Lemma 5. Let ut2 be an arbitrary starting configuration of the system such that max{ψt2 , ψt2 } = (1) 4c3 ψt2 ≥ √ . Then, with constant probability, for some t3 = t2 + O(n log n), a configuration ut3 is n reached such that δt3 > s/12. (1) Proof. We subsequently consider only the process ψt . We start by showing the following claim. (1) 4c3 Claim. Suppose ψ0 = A ≥ √ . Then, with probability at least 1 − exp [−A2 psn/46656], for n some time step t ≤ 72n ps (1) ≥ 2A, or δt > s/12. P Proof (of claim). Consider the Doob submartingale Yt = t−1 τ =0 Xt with increments (Xt ) given as: ( (1) A ∆ψt − psA 48n , if Yt > 2 or δt > s/12, Xt = 0, otherwise. the process reaches a value ψt Noting that |Xt | ≤ n9 , an application of the Azuma inequality for submartingales (cf. e.g. [13][Thm. 16]) to (YT ) with T = 72n ps gives: A Pr[YT ≤ − ] ≤ exp [−A2 psn/46656], 2 Moreover, assuming the barrier δt > s/12 was not reached, we have:   A psA psA 72n A (1) (1) ψT YT > − = ψ0 + T + YT > A + − = 2A, 2 48n 48n ps 2 which completes the proof of the claim. We now prove the lemma by iteratively applying the claim over successive intervals of time (τ0 , τ1 , . . .), (1) (1) such that τ0 = t2 and τi+1 is the first time step not before τi such that ψτi+1 ≥ 2ψτi or δτi+1 ≥ s/12. By the claim, we have:   72n Pr τi+1 − τi ≤ ≥ 1 − exp [−(ψτ(1) )2 psn/46656]. i ps Noting that c3 > 48/(ps) by definition, and that before the barrier δ > s/12 is reached, we have (1) 4c3 i √ 2i , we obtain: ψτi ≥ √ 2 ≥ ps192 n n   72n Pr τi+1 − τi ≤ > 1 − exp [−4i+1 ]. ps and further:  Pr τi+1  Y i i X  72n ≤ (i + 1) > 1 − exp [−4j+1 ] > 1 − exp [−4j+1 ] > 0.98. ps j=0 h In particular, putting i = log2 n, Pr τi ≤ δτi ≥ s/12 (since otherwise we would follows. j=0 i 72n log2 n > 0.98. Since for this value of i, we must have ps (1) have ψτi = ω(1), which is impossible), the claim of the lemma 27 Phase with δ > s/12. The second phase of convergence corresponds to configurations of the system which are sufficiently far from the center point (a1 , a2 , a3 ) = (s/3, s/3, s/3). Formally, we analyze a variant of potential φ (with an additive corrective factor proportional to κ2 ) to show that, starting from a configuration with δ > s/12, we will eliminate one of the three populations a1 , a2 , a3 in O(n log n) sequential steps with constant probability, without approaching the center point too closely (a value of δ = Ω(1) will be maintained throughout). For this part of the analysis, we define the considered potential as: ψ = η2 − 4p 2 s3 4p κ = ln − φ − 2 κ2 , 2 s 27 s (21) for any configuration u with amin > 0. We have directly from (6) and (7):   4p p 1 2 p 2 ψ̇ = −φ̇ − 2 2κκ̇ ≥ δ − κδ + 4κ − 144 κδ = s s 2 s   2    δ 1p 2 p 1 2 p δ + − 2κ + 1 − 144 κδ ≥ δ , = s 4 2 s 4s (22) where in the last transformation we took into account that p ≤ s/144. For the sake of technical precision in formulating the subsequent lemmas, we also consider the stochastic process ψt∗ , given as ψt∗ = ψ(ut ) for any t < td , where td is defined as the first time in the evolution of the system such that a configuration with amin,td < c6 /n is reached, where c6 = 313600/s ∗ is a constant depending only on s. For all t ≥ td , we define ψt∗ := ψt−1 + n1 . Lemma 6. In any configuration ut with δ ≥ s/20 we have: E∆ψt∗ ≥ 1 pδ 2 8 sn > ps 3600n . Proof. We have: 4p E∆(κ2 ) s2 Following the definition of φ in Eq. (2), we have by linearity of expectation:   X  X X ∆ai E∆φ = E ln(ai + ∆ai ) − ln ai = E ln 1 + . ai E∆ψ = −E∆φ − (23) Next, using the bound ln(1 + b) ≤ b which holds for b > −1, we have: X E ln(1 + X E∆ai X ȧi /n ∆ai )≤ = = φ̇/n ai ai ai from which it follows that: 1 φ̇ (24) n To analyze E∆(κ2 ), we apply a variant of Lemma 1. A direct application of the lemma is not sufficient due to the singularity related to the a−1 i term in the definition of κi ; however, this effect is compensated when we take into account that any change of the value of κ2i occurs in the considered protocol with probability at most proportional to ai . For the specific case of κ2i , for fixed i = 1, 2, 3, we consider ++ κ2i : R2 → R as a function of the restricted configuration ū = (a+ i , ai ), and we rewrite expression (12) as: X  E(∆κ2i ) = ∇f (u) · (u0 − u) + R2 (u, u0 ) Pr(u0 |u) ≤ E∆φ ≤ 0 0 ++ u0 =(a+ )6=u i ,ai ≤ κ˙2i 1 + 2 n n max ku∗ −uk∞ ≤1/n Dκ2 (u∗ ) X Pr(u0 |u) ≤ i 0 0 ++ u0 =(a+ )6=u i ,ai 28 κ˙2i 1 + 2 n n max ku∗ −uk∞ ≤1/n Dκ2 (u∗ )ai . i A straightforward computation from the definition of function κi shows that: max ku∗ −uk∞ ≤1/n It follows that E(∆κ2i ) Dκ2 (u∗ ) ≤ i 8s2 . a2i   κ˙2i ai 8s2 1 ˙2 8s2 ≤ κi + , + 2 2 = n n ai n ai n and so: E(∆κ2 ) ≤ 1 n  24s2 κ˙2 + amin n  . (25) Introducing (24) and (25) into (23), we obtain: 4p 1 1 4p E∆ψ = −E∆φ − 2 E∆(κ2 ) ≥ − φ̇ − s n n s2   392s p 2 p 2 δ − ≥ ≥ δ , 4sn amin n 8sn   1 24s2 96p = ψ̇ − 2 ≥ κ˙2 + amin n n n amin where in the second-to-last transformation we used (22), and in the last transformation we used the 2 relation a392s ≤ δ2 which holds when δ ≥ s/20 and amin ≥ c6 /n. min n ∗ The claim thus follows when ψt∗ = ψt and ψt+1 = ψt+1 , i.e., for t < td . For larger values of t, the ∗ claim follows trivially from the definition of ψt . The above Lemma is used to show that, starting from any configuration with δ > s/12, we quickly reach a configuration in which some species has a constant number of agents. Lemma 7. If δt ≥ s/20, we have: (i) |∆ψt∗ | ≤ c7 , (ii) Var(∆ψt∗ ) ≤ c8 n. where c7 > 0 and c8 > 0 are constants depending only on s. Moreover, in any configuration u with amin ≥ 2/n, we have: (iii) |∆ψ(u)| ≤ c7 namin . (iv) Var(∆ψ(u)) ≤ c8 . n2 amin Proof. We first consider the case of a configuration with amin ≥ 2/n. Using the definition of ψ (and within it, of φ and κ). Consider any transition from a configuration u to a subsequent configuration u0 and let S ⊆ {1, 2, 3} be defined as the set of indices of configurations changing between u and u0 + 0 ++ ++ 0 (S = {i : a+ i (u) 6= ai (u ) ∨ ai (u) 6= ai (u )}). We verify that there exists an absolute constant c7 > 0 such that: c7 |ψ(u0 ) − ψ(u)| ≤ ≤ c7 . n mini∈S ai Moreover, by the definition of the protocol a transition from u to u0 occurs with probability Pr(u0 |u) ≤ mini∈S ai . Since there is only a constant number of possible successor configurations ut+1 for ut (loosely bounding, not more than 36 ), it follows that:   ( 36 c7 b < n , for any b > 0 1 Pr |∆ψ(u)| > 7 b = 0, for b > nacmin . 29 The bounds on the variance of Var(∆ψ(u)) and that of ∆ψt∗ = ∆ψ(u) (for t < td ) with amin,t ≥ (c + 6 + 1)/n follow directly. The analysis of ∆ψt∗ when amin,t = c6 /n and t < td is performed analogously, noting that if the succeeding configuration u0 = ut+1 is such that amin (u0 ) < c6 /n, then ∆ψt∗ = n1 . Finally, for t ≥ td , the result holds trivially by the definition of ψt∗ . Lemma 8. Let ut3 be an arbitrary starting configuration of the system such that δt3 > s/12. Then, with probability 1 − O(1/n), for some t4 = t3 + O(n log n), a configuration ut4 is reached such that amin,t4 = c6 . Proof. W.l.o.g. assume that t3 = 0. First we remark that, by the relation between η and δ for δ ≤ s/12, a process starting with δ0 > s/12 satisfies: ψ0 = ψ0 = η02 − 4p 2 (s/12)2 12p 1 κ > − 2 > . s2 0 s2 s 150 Moreover, for any configuration u0 with δ(u0 ) ≤ s/20 we have: ψ(u0 ) = η 2 (u0 ) − s 2 ) 4p 2 ( 32 20 1 κ ≤ < . 2 2 s s 170 1 1 and as long as for all time steps t we have ψt ≥ 170 , the barrier condition Thus, initially ψ0 > 150 1 1 δt ≥ s/20 has not been violated. Moreover, for ψt ∈ [ 170 , 150 ], we have by Lemma 6 that E∆ψt ≥ 0. 1 Moreover, by Lemma 7 (iii) and the fact that δt < 144 which implies amin,t > s/4, we have that 4c7 |∆ψt | ≤ sn . It follows from a standard application of Azuma’s inequality for martingales (resembling the analysis of the hitting time of the random walk with step size O(1/n), from one endpoint of a path of length Θ(1) to the other) that:   1 Pr ∃t<n2 / ln n ψt < = O(1/n), 170 hence also throughout the first n2 / ln n steps of the process we have δ > s/18, with probability 1 − O(1/n). We Pare now ready to analyze the subsequent stages of the process, designing a Doob submartingale Yt = t−1 τ =0 Xt with time increments (Xt ) defined as: ( ps ∆ψt∗ − 3600 , if ψτ > 1/170 and amin,τ ≥ c6 for all τ ≤ t Xt = 0, otherwise. Using Lemma 7 (i) and (ii) and applying the Azuma-McDiarmid inequality6 in the bounded variance version (cf. e.g. [13][Thm. 18]) to Yt for tc = c3 n ln n, for some sufficiently large constant c > 0 depending only on s, we obtain: # " " # 4 ln2 n c c ln n = exp − = 1 − O(1/n). Pr[Yt ≤ −c2 ln n] ≤ exp − c 2 2c8 + 23 cc7 2t n8 + 2c7 c3 ln n ps If the event Xt = ∆ψt∗ − 3600 were to hold for all t < tc with c = 2·3600 and if Ytc > −c2 ln n, then ps ps we would have ψt∗c = ψ0∗ + Ytc + 3600 tc ≥ 0 − c2 ln n + 3c2 ln n = 2c2 ln n, which would mean that ψt∗c 6= ψtc , since ψ ≤ 3 ln n + O(1) by definition. If ψt∗c 6= ψtc , then t4 < tc , and the proof is complete. 6 If our objective in the proof of the lemma were to show a bound on t4 which holds with constant probability (which would be sufficient for our purposes later on), rather than a w.h.p. bound, then this specific step of the proof can also be performed using Markov’s inequality. In any case, we would need to make use of the bounded variance of ψt∗ in the proof of the next Lemma. 30 (Indeed, to reach a configuration with amin < c6 /n, the protocol has to pass through a configuration with amin = c6 /n, since the size of each population changes by at most 1 in each transition.) Otherwise, we must have that at least one of the following events holds: Ytc ≤ −c2 ln n, or ψτ ≤ 1/170 for some τ < tc , or amin,τ < c6 for some τ < tc . We have established that each of the first two of these events holds with probability O(1/n), whereas if the latter event holds, then t4 < tc . Thus, t4 < tc holds with probability 1 − O(1/n) by a union bound. Lemma 9. Let ut4 be a starting configuration of the system such that amin,t4 = c6 /n. Then, with constant probability, for some t5 = t4 +O(n log n), a configuration ut5 is reached such that aj,t5 ≤ c6 /n and aj+1,t5 > s/40, for some j ∈ {1, 2, 3}. Proof. W.l.o.g. assume that arg mini=1,2,3 ai,t4 = 2. If a3,t4 > s/40, then the claim follows immediately, putting t5 = t4 and j = 2. Otherwise, we will show that with constant probability, the system will evolve so that a2 will increase over time until within O(n log n) steps we will have a time step t5 with j = 3 (i.e., a3,t5 ≤ c6 /n and a1,t5 > s/40). In the considered case, w.l.o.g. assume t4 = 0. Next, let T = cn ln n for a sufficiently large constant 1 c; we choose as c := 2 log2 0.005ps for convenience in later analysis. Intuitively, in view of Lemmas 6 ∗ and 7, the potential ψT will be further increased in the next steps: the randompvariable (ψT∗√− ψ0∗ |u0 ) has an expected value of Θ(T /n) = Θ(log n), with a standard deviation of Θ( T /n) = Θ( log n). By an application of the Azuma-McDiarmid inequality for martingales with bounded variance similar to that in the proof of Lemma 8, we obtain the following result:7   pst T ∗ ∗ Pr ∀t≤T ψt ≥ ψ0 + −ε = 1 − n−Ω(1) , for any constant ε > 0. (26) 3600n n Observe that since a2,0 = c6 /n = O(1/n), we have ψ0∗ ≥ ln n − O(1). Taking this into account, for our purposes, a slightly weaker and simpler form of expression (26) will be more convenient:   Pr ∀t∈[0.5n log2 n,T ] ψt∗ ≥ (1 + 10−4 ps) ln n = 1 − o(1). (27) The proof of the lemma is completed by a more fine-grained analysis of the considered protocol. In the initial configuration t4 = 0, we have a2,0 = c6 /n (there are exactly c6 agents in state A2 ), and since t4 6= t5 , we have a3,0 < s/40. Consequently, a1,0 = s − s/40 − O(1/n) > 0.9s. Informally, since the prey of A2 (i.e., A1 ) is more than twice more numerous than its predator (i.e., A3 ), we should ++ observe the increase in the size of population of A2 , regardless of the activities (A+ i or Ai ) of the agents in the population. We consider the evolution of the system, finishing at the earliest time te when a2 (te ) > s/100. The following relations are readily shown (apply e.g. Lemma 14 with i = 2 and u = 0): 0.05ps a2 n 0.05ps < 0.05s, t < te ) ≤ − a3 . n E(∆a2,t |a3,t < 0.05s, t < te ) ≥ (28) E(∆a3,t |a3,t (29) From (29), taking into account that |∆ai,t | ≤ for martingales shows that: 1 n and a3,0 < s/40, an application of Azuma’s inequality Pr[∀t≤min{te ,T } a3,t < 0.05s] = 1 − o(1). (30) Taking into account the above, by a straightforward geometric growth analysis (compare e.g. proof of Lemma 5), we obtain from (28): Pr[te < T ] = 1 − o(1). (31) 7 Such an analysis can also be performed using Chebyshev’s inequality, obtaining a slightly weaker expression in the probability bound. 31 Moreover, since the speed of increase of a2 is bounded (even in the absence of predators) by that of a standard push rumor spreading process (formally, E(∆a2,t ) ≤ a2,t ), we have (compare e.g. [20]): Pr[te > 0.5n log2 n] = 1 − o(1). (32) Now, we observe that with constant probability, the size of population A2 does not decrease in the time interval [0, te ] below the value a2,0 = c6 /n, attained at the beginning of this interval:   Pr ∀t∈[0,te ] a2,t ≥ c6 /n = Ω(1). (33) Indeed, with constant probability the value a2,t is initially non-decreasing: with constant probability, in the first O(n) rounds each of the c6 = O(1) agents from A2 will be triggered by the scheduler O(1) times in total, and each interaction involving an agent from A2 will have this agent as the initiator, and an agent from the largest of the three populations, A1 , as the receiver (the prey). Thus, with constant probability, the number of agents in population A2 is increased to an arbitrary large constant (e.g., 1000c6 ). After this, we use the geometric growth property (28) to show that a2,t reaches the barrier a2,t > s/100 (at time te ) before the event a2,t < c6 /n occurs (cf. e.g. proof of Lemma 5, or standard analysis of variants of rumor-spreading processes in their initial phase [29]). When the event from bound (33) holds, at least one of the following events must also hold: (A) amin,t ≥ c6 /n, for all t ≤ te , (B) or there exists a time step t < te such that a1,t ≤ c6 /n, (C) or there exists a time step t < te such that a3,t ≤ c6 /n. To complete the proof, we will show that each of the events (A) and (B) holds with probability o(1). Indeed, then in view of (33), event (C) will necessarily hold with probability Ω(1). This means that, with probability Ω(1), there exists a time step t < te such that a3,t < c6 /n and a2,t < s/100 (since t < te ), and so also a1,t > s − s/100 − c6 /n > 0.98s > s/40; thus, the claim of the lemma will hold with t5 = t and j = 3. To show that event (B) holds with probability o(1), notice that a2,t < s/100 by definition of te , and moreover a3,t < 0.05s with probability 1 − o(1), hence the event a1,t < s − s/100 − 0.05s = 0.94s holds with probability o(1). To show that event (A) holds with probability o(1), notice that, substituting in (27) t = te , by a union bound over (27), (31) and (32) we obtain:   Pr ψt∗e ≥ (1 + 10−4 ps) ln n = 1 − o(1). This means that, with probability 1 − o(1), we have ψt∗e 6= ψte or ψte ≥ (1 + 10−4 ps) ln n. In the first case, event (A) cannot hold. In the second case, observe that a2,te = s/100 + O(1/n) by definition of P 1 te , so a1,te > s − s/100 − O(1/n) − c6 /n > 0.98s, and it follows that ψte = 3i=1 ln ai,t + O(1) = e −4 ln n + O(1). Since the condition ψte ≥ (1 + 10 ps) ln n is not fulfilled, event (A) can only hold with probability o(1). Lemma 10. Let ut5 be a starting configuration of the system such that aj,t5 ≤ c6 /n and aj+1,t5 > s/40, for some j ∈ {1, 2, 3}. Then, with constant probability, for some t6 = t5 + O(n), a configuration ut6 is reached such that amin,t6 = 0. Proof. We consider the pairs of interacting agents chosen by the scheduler in precisely the next n rounds after time t5 . Given that set Aj,t5 has constant size, and set Aj+1,t5 has linear size in n, it is straightforward to verify that with constant probability, the set of randomly chosen n pairs of agents has all of the following properties: 32 • Each agent from Aj,t5 belongs to exactly one pair picked by the scheduler, and is the receiver in this pair. • Each agent interacting in a pair with an agent from Aj,t5 belongs to exactly one pair. • Each agent interacting in a pair with an agent from Aj,t5 belongs to set Aj+1,t5 . Conditioned on such a choice of interacting pairs by the scheduler, the protocol changes the state of all agents from set Aj,t5 to state j + 1 with probability at least p|Aj,t5 | ≥ pc6 = Ω(1). State j is then effectively eliminated. In the absence of species j, the interaction between species j − 1 and j + 1 collapses to a lazy predator-prey process, with transitions of the form (Aj−1 , Aj+1 ) → (Aj−1 , Aj−1 ) associated with a constant transition probability. A w.h.p. bound on the time of elimination of species j + 1 follows immediately from the analysis of the push rumor spreading model, and we have the following Lemma. Lemma 11. Let ut6 be a starting configuration of the system such that aj,t6 = 0, for some j ∈ {1, 2, 3}. Then, with probability 1 − O(1/n), for some t7 = t6 + O(n log n), a configuration ut7 is reached such that for all t ≥ t7 , aj,t = aj+1,t = 0 and aj−1,t = s. After a further O(n log n) steps after time t7 , the final configuration of all agents in the oscillator’s population will be a++ j−1,t = s. 6.5 Operation of the Oscillator in the Presence of a Source In this section we prove properties of the oscillatory dynamics for the case #X > 0. It is possible to provide a detailed analysis of the limit trajectories of the dynamics in this case, as a function of the concentration of x. Here, for the sake of compactness we only show the minimal number of properties of the oscillator required for the proof of Theorem 1. When the given configuration is such that amin is sufficiently large, say amin > 0.02s, then both the subclaims of Theorem 1(2) hold for the considered configuration. (The first subclaim hold directly; the second subclaim follows by a straightforward concentration analysis of the number of agents changing state in protocol Po over the next 0.01sn steps, since we will always have amin ≥ 0.01s during the considered time interval.) Otherwise, the considered configuration is close to one of the sides of the triangle. We will show that in the next O(n log n) steps, with high probability, the protocol will either reach a configuration with amin > 0.02s, or will visit successive areas around the triangle, as illustrated in Fig. 7. The following Lemmas show that within each area, an exponential growth process occurs, which propagates the agent towards the next area. Lemma 12. If ai−1 < 0.8s and ai+1 < 0.05s, then ȧi−1 ≤ xs/3 − 0.05psai−1 . Proof. From the assumptions we have that ai > 0.15s. Starting from (3) we obtain: ++ ȧi−1 = x(s/3 − ai−1 ) + pai+1 (ai−1 + a++ i−1 ) − pai−1 (ai + ai ) ≤ xs/3 + 2pai−1 ai+1 − pai−1 ai ≤ xs/3 + pai−1 (2ai+1 − ai ) ≤ xs/3 + pai−1 (0.1s − 0.15s) = xs/3 − 0.05psai−1 33 A3 a2 = 0.05s a3 = 0.8s ta a1 = 0.25s A1 tb A2 ta0 Figure 7: Configurations considered in Lemmas 12 and 13 (descending dashed slope) and Lemmas 14 and 15 (ascending dashed slope) for i = 1 (dark red) and i = 2 (green). Unless the process leaves the shaded area towards the center o the triangle, the shape of the time trajectory is counter-clockwise around the triangle, w.h.p. From the above bound on expectation, the following Lemma follows directly by a standard concentration analysis. In what follows, we consider an execution in which the concentration x is strictly positive and bounded by a sufficiently small absolute constant (i.e., #X is at most a given constant fraction of the entire population), with the required upper bounds on x used in the proofs of lemmas given in their statements. This is a technical assumption, which allows us to simplify the proof structure. In particular, the assumption #X ≤ c12 n can be omitted in the statement of Theorem 1, and the claim of the theorem can even be proved for executions in which #X changes during the execution of the protocol, as long as the invariant #X > 0 is preserved over the considered interval of time. Lemma 13. Let uta be a starting configuration of the system such that ai−1,ta < 0.75s and ai+1,ta < 0.05s. Suppose x < 10−3 ps, starting from time ta . Then, for some tb ∈ [ta , ta + c9 n], where c9 is a Ω(1) constant depending only on p and s, with probability 1 − e−n ) , the system reaches a configuration utb such that exactly one of the following two conditions is fulfilled: • either amin,tb ≥ 0.02s, • or ai+1,tb < 0.05s and ai−1,tb < 0.02s. Proof. In the considered range of values of ai−1 , we have ai−1,ta < 0.75s and ai−1,t ≥ 0.02s, for all t until we leave the considered area at time tb . Taking into account that x < 10−3 ps, it follows from Lemma 12 that: E∆ai−1 ≤ 1 1 ps2 (xs/3 − 0.05psai−1 ) ≤ (x < 10−3 ps2 /3 − 10−3 ps2 ) < −0.0005 . n n n Taking into account that |∆ai−1 ≤ n1 |, it follows from a straightforward concentration analysis (cf. e.g. proof of Lemma 5 for a typical analysis of this type of exponential growth process) that a boundary of the considered area (either ai−1,t < 0.02s or amin,t > 0.02s) must be reached within O(n) steps with very high probability, as stated in the claim of the lemma. A similar analysis is performed for the next area. Lemma 14. If ai+1 < 0.25s and ai−1 < 0.05s then ȧi+1 ≥ xs/12 + 0.6psai+1 and ȧi−1 ≤ xs/3 − 0.2psai−1 . 34 Proof. From assumptions we have that ai > 0.7s. Starting from (3) we obtain: ++ ȧi+1 = x(s/3 − ai+1 ) + pai (ai+1 + a++ i+1 ) − pai+1 (ai−1 + ai−1 ) ≥ x(s/3 − ai+1 ) + pai+1 (ai − 2ai−1 ) ≥ x(s/3 − 0.25s) + pai+1 (0.7s − 2 · 0.05s) = xs/12 + 0.6psai+1 ++ ȧi−1 = x(s/3 − ai−1 ) + pai+1 (ai−1 + a++ i−1 ) − pai−1 (ai+1 + ai+1 ) ≤ xs/3 + pai−1 (2ai+1 − ai ) ≤ xs/3 + pai−1 (2 · 0.25s − 0.7s) = xs/3 − 0.2psai−1 . Again, a concentration result follows directly. Lemma 15. Let utb be a starting configuration of the system such that ai−1,tb < 0.02s and ai+1,tb < 1 0.02s. Suppose x < 0.02ps, starting from time tb . Then, for some ta0 ∈ [tb , tb +c10 n ln max{1/n,a ]⊆ i+1,t } b [tb , tb + c10 n ln n], where c10 is a constant depending only on p and s, with probability 1 − O(1/n3 ), the system reaches a configuration uta0 such that exactly one of the following two conditions is fulfilled: • either amin,ta0 ≥ 0.02s, • or ai−1,ta0 < 0.05s, ai+1,ta0 > 0.25s, and (consequently) ai,ta0 < 0.75s. Proof. We first show that, starting from time tb onward, the process ai−1,t satisfies ai−1,t < 0.05s for Ω(1) all t ∈ [tb , t∗ ] with probability 1 − e−n , where t∗ is defined as the minimum of time ta + c10 n ln n and the last time moment such that ai+1,t ≤ 0.25s holds for all t ∈ [tb , t∗ ]. By Lemma 14, we have for all t ∈ [tb , t∗ ] such that ai−1,t > 0.01s: E∆ai−1 = 1 1 1 0.01ps2 ȧi−1 ≤ (xs/3 − 0.2psai−1 ) < (0.02ps2 /3 − 0.02ps2 ) < − , n n n n where we took into account the assumption x < 0.02ps. The claim on ai−1,t < 0.05s follows from a standard concentration analysis, noting that |∆ai−1,t | ≤ n1 . In order to analyze the process ai+1,t , we apply a filter and consider the process a0i+1,t , starting at time tb , defined as follows. For as long as ai−1,t < 0.05s, we put a0i+1,t := ai+1,t , and starting from the first time t∗∗ when ai−1,t > 0.05s, we compute a0i+1,t+1 as the subsequent value of ai+1 after a simulation of a single step of the process for some state u with concentrations of types: x(u) = x, ai+1 (u) = a0i+1,t , ai−1 (u) = 0.05s, and ai (u) = s − ai−1 (u) − ai+1 (u). For a given time step t, let Rt denote the event that ∆a0i+1,t 6= 0. By the construction of protocol Po , which always requires at least one agent of type X or type Ai+1 to be involved in an interaction which creates or destroys an agent of type Ai+1 , we have: Pr[Rt ] ≤ x + 2a0i+1,t . Moreover, from Lemma 14 it follows that for a0i+1,t < 0.25s: E∆a0i+1,t ȧ0i+1,t 1 = ≥ (xs/12 + 0.6psa0i+1,t ). n n 35 Since ∆a0i+1,t |¬Rt = 0, we have: E∆a0i+1,t |Rt ≥ + 0.6psa0i+1,t ) ≥ Pr[Rt ] 1 n (xs/12 + 0.6psa0i+1,t ) 0.3ps ≥ , 0 x + 2ai+1,t n 1 n (xs/12 and moreover ∆a0i+1,t |Rt ∈ {− n1 , 0, n1 }. Analysis of this type of process is folklore (in the context of epidemic models with infection and recovery) but somewhat tedious; we sketch the argument for the sake of completeness. When considering only those steps for which event Rt holds, the considered process can be dominated by a lazy random walk on the line {0, n1 , 2,n , . . .}, with a constant bias towards its right endpoint. To facilitate analysis, we define points Qc = cbα ln ncn, for c = 0, 1, . . ., where constant α > 0 is subsequently suitably chosen, and for any point Qc to the right of the starting point of the walk (i.e, c > cmin where cmin is the smallest integer such that Qcmin +1 > ai+1,tb ) define sc as the number of steps of the walk until its first visit to sc . For a suitable choice of constants α and β > 0 sufficiently large, we have that for any c, with probability at least 1 − O(1/n2 ), sc+1 − sc ≤ β ln n, and moreover between its step sc and its step sc+1 , the walk is confined to the subpath (Qc−1 , Qc+1 ) of the considered path. Considering the original time t of our process a0i+1,t (including moments with ¬Rt ), let tc be the moment of time corresponding to the sc -th step of the walk. Conditioning on events which hold with probability 1 − O(1/n2 ), the value tc+1 − tc can be stochastically dominated by the sum of β ln n independent n geometrically distributed random variables, each with expected value O( max{1,(c−1) ln n} ). Let cmax be the largest positive integer such that Qcmax < 0.25s. Applying a union bound on the conditioning of all intervals tc+1 − tc , for c ≥ cmin and a concentration bound on the considered geometric random variables, we eventually obtain that with probability 1 − O(1/n3 ) the condition a0i+1,t is achieved for time: ! cX cX max max n t< (tc+1 − tc ) = O n + ln n = max{1, (c − 1) ln n} c=cmin c=cmin   1 O (n(ln n − ln max{1, ai+1,tb n} + 1)) = O n ln . max{1/n, ai+1,tb } Recalling that a0i+1,t = ai+1,t holds throughout the considered time interval with very high probability, the claim follows. An iterated application of Lemmas 13 and Lemmas 15 moves the process along time moments ta , tb , where time moment t0a is again be fed to Lemma 13, considering the succeeding value of i. After a threefold application of both Lemmas, the process has w.h.p. in O(n log n) steps either performed a complete rotation, passing through three moments of time designated as “ta ”, rotated by one third of a full circle, or has reached at some time t0 a point with amin,t0 ≥ 0.02s. In either case, the claim of Theorem 1(2) follows directly. t0a , . . ., 7 7.1 Analysis of Protocol for D ETECT Further Properties of the Oscillator We start by stating a slight generalization of Lemma 6, capturing the expected change of potential ψt∗ (given by (21)) for the case #X > 0, for configurations which are sufficiently far from both the center and the sides of the triangle. Lemma 16. In any configuration ut with 10−6 s2 ≤ amin ≤ 0.02s and x < c12 we have: E∆ψt ≥ where c12 > 0 is an absolute constant which depends only on s and p. 36 ps 7200n , Proof. We can condition the expectation of E∆ψt on the event Et , which holds if an agent in state X participates in the current interaction. Conditioned on ¬Et , the analysis corresponds directly to the computations performed for the case x = 0, where we remark that the assumptions of Lemma 6 are satisfied due to the assumed upper bound on amin . Thus: ps E∆ψt |¬Et > . 3600n Next, taking into account the lower bound on amin , by exactly the same argument as in Lemma 7(iii), we have |∆ψt | < c012 /n, for some choice of constant c012 > 0 which depends only on s and p. Obviously, E∆ψt |Et > −c012 /n, and since Pr[Et ] < 2x, by the law of total expectation: E∆ψt > (1 − 2x) ps c0 ps − 2x 12 > , 3600n n 7200n where the last inequality holds for any x < c12 , where c12 := 1 . 2(2c012 +1) Lemma 17. Suppose amin,t0 < 10−6 s4 at some time t0 . Then, there exists an absolute constant c13 > 0, Ω(1) c such that the following event holds with probability 1 − e−n ) : for all t ∈ [t0 , t0 + en 13 ], we have amin,t < 0.01s2 . 3 s Proof. Let ψ̂t ≡ ln 27 − ψt . Consider any t ≥ t0 such that amin,t < 10−6 s4 . Then, φt < ln amin,t < −6 4 ln(10 s ) and consequently: ψ̂t = φt + 4p 4p 2 κ ≤ ln(10−6 s4 ) + 4 ≤ ln(2 · 10−6 s4 ), s4 t s where we recall that κ2t ≤ 1 and the last inequality follows for p chosen to be sufficiently small (4p/s4 < ln 2). Further, note that if for some time t we have ψ̂t < ln(8 · 10−6 s4 ), then: φt = ψ̂t − 4p 2 κ < ln(8 · 10−6 s4 ), s4 t thus a1,t a2,t a3,t < 8 · 10−6 s4 , from which it follows that a2min,t < 16 · 10−6 s4 , and so amin,t < 0.01s2 . Thus, for ψ̂t < ln(8 · 10−6 s4 ), at least one of the following holds: • Either ψ̂t < ln(2 · 10−6 s4 ), • Or ψ̂t ≥ ln(2 · 10−6 s4 ), thus amin,t ≥ 10−6 s4 . Then, taking into account that amin,t < 0.01s2 , ps we have by Lemma 16: E∆ψ̂t < − 7200n . Taking into account the known properties of function ψt (Lemma 7), we have that starting from ψ̂t0 < c ln(2 · 10−6 s4 ), it takes time exponential in a polynomial of n (eΩ(n 13 ) , for some absolute constant c13 > 0) to break the potential barrier for ψ̂, i.e., to reach the first moment of time t1 such that ψ̂t1 ≥ Ω(1) ln(8 · 10−6 s4 ), with probability 1 − e−n ) , for some absolute constant c14 > 0. To complete the proof, recall that for any t < t1 , we have ψ̂t < ln(8 · 10−6 s4 ), and so as previously established, amin,t < 0.01s2 . For any execution of the oscillator protocol Po , we can now divide the axis of time into maximal time intervals of two types, which we call oscillatory and central. A central time interval continues for as long as the condition amin,t ≥ 10−6 s4 is fulfilled, and turns into an oscillatory interval as soon as this condition no longer holds. An oscillatory time interval continues for as long as the condition amin,t < 0.01s2 is fulfilled, and turns into an oscillatory interval as soon as this condition no longer holds. Lemma 17 implies that an oscillatory interval is of exponential length w.v.h.p. 37 Lemma 18. Suppose 0 < x < c12 . Let t0 be an arbitrary moment of time such that amin,t0 > 0. 1 Let T = Cn ln amin,t , for an arbitrarily fixed constant positive integer C = O(1). With probability 0 Ω(1) 1 − e−n , we have for all subsequent moments of time t ∈ [t0 , t0 + T ]: ln 1 max{ n1 , amin,t } ≤ 100C ln 1 . amin,t0 Proof. Without loss of generality assume t0 = 0. We can assume in the proof that amin,0 > n−0.01/C , otherwise the claim trivially holds. Thus, initially we have φ0 ≥ 3 ln amin,0 ≥ − 0.03 C ln n ≥ −0.03 ln n. We proceed to show that potential φ does not decrease much during the considered motion. We have at any time φ̇ ≥ −p, which follows directly from (5). Suppose at some time t we have φt ≥ −0.2 ln n. We note that amin,t ≥ eφt ≥ n−0.2 . Applying Lemma 1, we have under these assumptions: ! p 1 1 E∆φt ≥ − − O ≥− 2 2 n n n amin,t and moreover by the properties of the natural logarithm (cf. e.g. [15]): |∆φt k < 4 namin,t ≤ 4e−φt ≤ 4n−0.8 . n As usual, we apply a Doob martingale, with φ0t := φt until the first moment of time t such that φt < −0.2 ln n, and subsequently φ0t+1 := φ0t for larger t. We have E∆φt ≥ −n−1 and |∆φt k < 4n−0.8 . 1 Considering T = Cn ln amin,0 < Cn ln n steps of the process starting from time 0, by a standard Ω(1) application of Azuma’s inequality, we obtain that with probability 1−e−n φ0t − φ00 ≥ − , for all t ∈ [0, T ] we have: T 1 − n−0.2 ≥ −C ln − 1 ≥ −0.1 ln n. n amin,0 From the last inequality it follows that φ0t ≥ φ00 − 0.1 ln n ≥ −0.2 ln n for all t ∈ T , with probability Ω(1) 1 − e−n , and so φ0t = φt . We now rewrite the same bound for φt , using the relation φ ≥ 3 ln amin : φt ≥ φ0 − C ln 1 amin,0 − 1 ≥ 3 ln amin,0 − C ln 1 amin,0 − 1 ≥ −(C + 4) ln 1 amin,0 ≥ −100C ln 1 amin,0 . 1 Taking into account that − ln amin,t ≥ φt for amin,t 6= 0, we obtain the claim. Lemma 19. Suppose 0 < x < c12 . Fix type i ∈ {1, 2, 3}. Let t0 be any time such that amin,t0 < 10−6 s4 . Let t∗ > t be the first moment after t0 such that i is the most represented type, ai,t∗ = amax,t∗ . Let t∗∗ > t∗ be the first moment after t∗ such that i is the least represented type, ai,t∗∗ = amin,t∗∗ . 1 Then, with probability 1−O(1/n3 ), t∗∗ ≤ t0 +c11 n ln max{1/n,a , where c11 > 0 is an absolute i+1,t0 } constant depending only on s and p. Proof. From Lemma 17, we have that w.v.h.p. the protocol is in an oscillatory interval which will Ω(1) c last super polynomial time, i.e., with probability 1 − e−n ) : for all t ∈ [t0 , t0 + en 13 ], we have amin,t < 0.02s. Acting as in the previous subsection, we iteratively apply Lemma 13 and Lemma 15. After at most 6 applications of both Lemmas, the process has performed two complete rotations around the triangle, w.h.p., passing in particular through time moments t∗ where the designated type i was a maximal type and t∗∗ where type i was a minimal type. It remains to bound the time required to perform these iterations. We consider as an example a single application of Lemma 15 starting at a time tb and 38 1 ending at a time ta0 , where ta0 < tb + c10 n ln max{1/n,a i+1,t 1 Lemma 18 at time tb , we obtain ln amin,t a0 b } with probability 1 − O(1/n3 ). Applying 1 ≤ 100C ln amin,t , w.v.h.p. We use this bound for the next b application of Lemma 13, and so on. After a total of at most 12 applications, we eventually obtain a 1 bound of the form c11 ln amin,t on the length of the considered time interval, where the value of c11 is 0 computed as a function of C. 7.2 Protocol Extension Pm : Majority (s) The composition of the extension is specified in Fig. 4. In what follows, we denote Mi (s) (s) and mi := Mi /n, for s ∈ {−1, 0, +1}. := #(A?i , Ms ) Lemma 20. Suppose 0 < x < c12 . Let t0 be an arbitrarily chosen moment of time and let T > 0. For fixed i ∈ {1, 2, 3}, we have for all t ∈ [t0 , t0 + T ]: (+1) |mi,t with probability 1 − O(e−n 1/6 (−1) − mi,t | ≤ 2e4rT /n max{n−0.2 , ai,t0 }, ). (+1) (−1) Proof. W.l.o.g. assume t0 = 0 and i = 1. Denote A0 := #A1,0 , Dt := M1,t − M1,t , and Gt := Dt2 . As usual, we denote ∆Dt = Dt+1 − Dt and ∆Gt = Gt+1 − Gt . For the subsequent analysis, we choose to use the “squared potential” Gt to simplify considerations; this would be the usual potential of choice to analyze an unbiased random walk with a fair coin toss. First we remark that |D0 | ≤ A0 , so |G0 | ≤ A20 . Next, observe that since at most one agent changes its state in a single time step, we have |∆Dt | ≤ 2, and so: |∆Gt | ≤ (|Dt | + 2)2 − |Dt |2 ≤ 4(|Dt | + 1) ≤ 4n + 4. (34) We now upper bound the expectation E∆Gt . We condition this expectation on the disjoint set of events R6 , R7 , R8 , R9 , R10 , R0 , where Rr , for 6 ≤ r ≤ 10, corresponds to Rule (r) being executed in the current step, and R0 is the event that none of these rules is executed. We have the following: • If event R0 or R6 holds, then at least one of the following three situations occurs: (1) the values (+1) (−1) of M1 and M1 both remain unchanged at time t, (2) an agent changes state from type A1 to another type, or (3) an agent turns from another type into type A1 . In case (1), we have Dt+1 = Dt . In case (2), the probability that |Dt+1 | = |Dt | + 1 is not more than the probability that |Dt+1 | = |Dt | − 1, since by the construction of the protocol, the choice of the agent leaving the population is completely independent of its value Ms . In case (3), we have Pr[|Dt+1 | = |Dt | − 1] = Pr[|Dt+1 | = |Dt | + 1] = 1/2 by construction. In all cases, Pr[|Dt+1 | = |Dt | + 1] ≤ Pr[|Dt+1 | = |Dt | − 1]. We therefore have: E[∆Gt |R0 ∨ R6 ] ≤ ((|Dt | + 1)2 − |Dt |2 ) + ((|Dt | − 1)2 − |Dt |2 ) ≤ 2. • For events R7 and R8 , we have Dt+1 |R7 = Dt − 1 and Dt+1 |R8 = Dt + 1. Since events R7 and R8 hold with equal probability, it follows that: E[∆Gt |R7 ∨ R8 ] ≤ ((|Dt | + 1)2 − |Dt |2 ) + ((|Dt | − 1)2 − |Dt |2 ) ≤ 2. 39 • Finally, for events R9 and R10 , we have Dt+1 |R9 = Dt + 1 and Dt+1 |R10 = Dt − 1. Since (−1) (+1) Pr[R9 ] · M1 = Pr[R10 ] · M1 (+1) E[∆Gt |R9 ∨ R10 ] ≤ max{M1 (−1) , M1 } A1 (+1) min{M1 (−1) , M1 A1 } ((|Dt | + 1)2 − |Dt |2 )+ ((|Dt | − 1)2 − |Dt |2 ) ≤ 4|Dt |2 4Gt +2= + 2, A1 A1 where we assume in notation that A1 > 0. Applying the law of total expectation for ∆Gt over the set of events R0 ∨ R6 , R7 ∨ R8 , R9 ∨ R10 and noting that Pr[R9 ∧ A10 ] ≤ r An1 , we eventually obtain: Gt + 2. (35) n Inequalities (34) and (35) are sufficient to lower-bound the evolution of random variable Gt , which undergoes multiplicative drift with rate parameter 1 + 4r/n (up to lower order terms). Since known multiplicative drift lower bounds (cf.e.g. [17, 33]) do not appear to cover this case explicitly, we sketch the corresponding submartingale analysis (with slightly weaker parameters) for the sake of completeness. Consider any moment of time t such that Gt ≥ n1.6 . Define target value Gmax = (1+8r)Gt ≥ n1.6 . Consider the following filter, defining G0τ , τ ≥ 0 as the submartingale with G0τ = Gt+τ until the first moment of time at which Gt+τ < Gmax , and G0τ = G0τ +1 + 5r n Gmax for all subsequent moments of 5r 0 0 time. Note that E∆Gτ ≤ n Gmax by (35) and |∆Gτ | ≤ 4n + 4 ≤ 5n by (34) (where we conduct the entire analysis for n sufficiently large with respect to absolute constants of the algorithm). By Azuma’s inequality, we have for any τ > 0 and z > 0:   5r −z 2 0 0 Pr[Gτ > G0 + Gmax τ + z] ≤ exp . n 2τ (5n)2 E∆Gt ≤ 4r Next, choosing any τ ≤ n and z = rGmax ≥ rn1.6 and noting that: 5r Gmax τ + z ≤ Gt + 5rGmax + rGmax ≤ Gmax , n we rewrite the concentration equality as:   −(rn1.6 )2 0.19 0 Pr[Gτ > Gmax ] ≤ exp < e−n . 2τ (5n)2 G00 + Applying to the above a union bound over all τ ∈ [0, n], we obtain by another crude estimate: Pr[∀τ ∈[0,n] G0τ ≤ Gmax ] ≥ 1 − e−n 0.18 , from which it follows directly by the definition of G0τ that: 0.18 Pr[∀τ ∈[0,n] Gt+τ ≤ Gmax ] ≥ 1 − e−n . Thus, given that Gmax = (1 + 8r)Gt , the value of Gt increases by a factor of at most (1 + 8r) over n steps, with very high probability. Iterating the argument at most a logarithmic number of times and applying a union bound gives for arbitrary t: Gt ≤ (1 + 8r)t/n+1 max{n1.6 , A20 } ≤ 2e8rt/n max{n1.6 , A20 }, 1/6 with probability at least 1 − e−n , from which the claim of the lemma follows directly after taking the square root and normalizing by a factor of n. 40 (−1) (0) (+1) By considering the sizes of populations mi,t , mi,t , and mi,t (whose sum is ai,t ), we obtain the 1 following corollary of the above Lemma, applied for a suitably chosen value T = 0.001n ln ai,t . r 0 Lemma 21. Suppose 0 < x < c12 . Let t0 be an arbitrarily chosen moment of time with ai,t0 ≤ 0.02s2 . For fixed i ∈ {1, 2, 3}, we have for all t ∈ [t0 , t0 + 0.001n ln max{ 11,a } ]: r i,t0 n (+1) |mi,t with probability 1 − O(e−n 1/6 (−1) − mi,t | ≤ 0.1ai,t + 0.05s, ). (0) The above Lemma provides a crucial lower bound on the size of population mi . Lemma 22. Suppose 0 < x < c12 . Let t0 be an arbitrarily chosen moment of time with ai,t0 ≤ 0.02s2 . For fixed i ∈ {1, 2, 3}, we have for all t ∈ [t0 , t0 + 0.005n ln max{ 11,a } ] such that ai,t > 0.25s: r i,t0 n (+1) (−1) min{mi,t , mi,t } ≥ 0.001s3 , Ω(1) with probability 1 − e−n . Proof. Note first that by the conditions ai,t0 ≤ 0.02s2 < 0.1s < 0.25s < ai,t . Let t1 > t0 denote the last moment of time before t2 such that ai,t1 −1 < 0.1s and let t2 ≥ t1 + 0.15sn denote the first moment of time after t1 such that ai,t2 > 0.25s. We have t ≥ t2 + 0.05sn. (+1) (−1) We now consider the process mi,τ (exactly the same arguments may be applied for process mi,τ ). (+1) We have ∆mi,τ ≤ 1/n. The analysis is divided into two phases: (+1) • Phase 1: τ ∈ [t1 , t2 ) (thus ai,τ ∈ [0.1s, 0.25s]). Initially, mi,t1 ≥ 0. Suppose for some step (+1) τ we have mi,τ 0.25s) ≥ most < 0.02s. Rule (6) is executed with probability (ai,τ )(1 − ai,τ ) ≥ 0.1s(1 − 0.075s2 , (+1) 2rmi,τ (+1) whereas rule (8) or (9) which reduces mi,τ < 0.04rs < 0.01s2 . A computation of the expected value provides: (+1) (+1) E[∆mi,τ |(mi,τ < 0.02s)] > (+1) An application of Azuma’s inequality yields that mi,t2 probability 1 − e −nΩ(1) is executed with probability at > 0.06s2 . n 1 0.06s2 2 n (t2 − t1 ) > 0.004s3 , with . In case of failure, we consider the process no further. (+1) • Phase 2: τ ∈ [t2 , t) (thus ai,τ ≥ 0.1s). From Phase 1, we have that initially mi,t2 > 0.004s3 . (+1) Suppose for some step τ we have 0.001s3 < mi,τ < 0.01s. We consider two cases: – If ai,τ ≥ 0.25s, then by Lemma 21 we have: (+1) |mi,t (−1) − mi,t | ≤ 0.1ai,t + 0.05s, Ω(1) with probability 1−e−n . In case of failure we interrupt the analysis (this is an implicit ap(+1) plication of union bounds over successive steps τ ). Under the assumption mi,τ < 0.01sr, we conclude: (−1) (+1) mi,t ≤ 0.1ai,t + 0.05s + mi,t < 0.3ai,t , and hence: (−1) mi,t 1 (0) ≤ mi,t − 0.005s. 2 41 (36) (+1) Now, to compute the expected value ∆mi,τ , we remark that rule (6) does not decrease this (0) expected value since mi,τ . Moreover, in view of (36), the probability of executing rule (9) (−1) (which increases mi,t by 1/n) exceeds the probability of executing one of the rules (7) (−1) or (8) (which decrease mi,t (+1) by 1/n) by 0.005smi,τ r > 5 · 10− 6s4 r by the assumption (+1) 0.001s3 < mi,τ . We eventually obtain in this case: (+1) (+1) E[∆mi,τ |(0.001s3 < mi,τ (+1) – If ai,τ ≥ 0.25s, then assuming mi,τ the first phase to obtain: (+1) < 0.01s)] > 5 · 10− 6s4 r . n (37) < 0.01s, we can perform an analogous analysis as in (+1) E[∆mi,τ |(mi,τ < 0.01s)] > 0.06s2 , n which, in particular, also implies (37). (+1) (+1) We have thus shown that the expected change to mi,τ satisfies (37). Noting that initially mi,t2 > 0.004s3 = 0.001s3 + 0.003s3 , an application of Azuma’s inequality to an appropriate Doob (+1) martingale with (37) shows that the event mi,τ > 0.001s3 will hold for all remaining steps of Ω(1) the process τ , with probability 1 − e−n . Lemma 23. Let t be any moment of time with amin,t > 4r1/2 . For all i ∈ {1, 2, 3}, we have: (+1) min{mt with probability 1 − O(e−n Ω(1) (−1) , mt } ≥ r3/2 s ). Proof. Denote c = 4r1/2 . To show the claim, observe that necessarily for all τ ∈ [t − cn/2, t] we (+1) (−1) have amin,τ > c/2. We consider the change of value mτ over time (the argument for mτ follows (+1) (+1) symmetrically). Initially, we have mt−cn/2 ≥ 0, and at every step |∆mτ | ≤ 1/n. At any time τ such (+1) that mτ < s/4 we have the following cases: (+1) • Rule (6) is executed, which happens with probability at least a2min,τ > c2 /4. Since mτ conditioned on this event, the expected value of (+1) ∆mτ < s/4, is at least 1/4. • One of the rules (7)-(10) is executed, which occurs with probability at most r. (+1) • In all other cases, we have ∆mτ = 0. Noting that r = c2 /16, the claim follows from a standard application of Azuma’s inequality. Lemma 24. Suppose 0 < x < c12 . Let t ≥ 2c11 n log n be an arbitrary moment of time. Then, min{m+1,t , m−1,t } > c15 , with probability 1 − O(1/n), for some absolute constant c15 > 0 depending only on s, p, and r. 42 Proof. Assume w.l.o.g. t = 2c11 n ln n. Instead of analyzing the evolution of the real system, we consider an execution of a system which is coupled with it over the first t steps as follows. First, starting from time 0, we perform t steps of protocol Po (i.e., considering only rules (1)−(5) of its definition, and without setting values of the second component M? ). Next, we once again activate the pairs of elements which were activated in the first part of the coupling, in the same order, applying rules (6) − (10) of the protocol with the same outcome which they would have received in the original execution. Clearly, at time t the same configuration u(t) is reached by both the original and coupled execution. Consider first the execution of Po from time 0. If amin,0 < 10−6 s4 , then the execution is in an oscillatory interval at time 0, and will remain in it (amin < 0.02s2 ) until time t = c ln n with probability Ω(1) 1 − e−n . Then, for all τ ∈ [0, t] we assume that the claim of Lemma 19 holds with t0 = τ for all i ∈ {1, 2, 3}. By a crude union bound, this event holds with probability 1 − O(1/n); from now on we assume this is true. (Formally, to allow us to proceed, in the analysis we can say with implicitly couple the system with a different set of random choices to which the system switches in the low-probability event that the claim of Lemma 19 were not to hold for some t0 = τ for the original system.) Given that in the claim of Lemma 19 for t0 = 0 we have t∗∗ < t, and for t0 = t we have t∗ ≥ t, by the properties of the time intervals [t∗ , t∗∗ ] we observe that there must exist a time τ ∈ [0, t] and a type i ∈ {1, 2, 3} such that Ai is the least represented type at time τ and the most represented type at time t (amax,t = ai,t and amin,τ = ai,τ ), and moreover t ∈ [t∗ , t∗∗ ] in the claim of Lemma 19 with choice of t0 = τ . Since amax,t ≥ s/3, we now apply Lemma 22 with t0 = τ to obtain the claim, noting that amin,τ < 0.02s2 1 and moreover that t < τ + 0.005n ln max{ 11,a } , given that we have t < τ + c11 n ln max{1/n,a , r i+1,t } n i,t0 0 c1 1 where c11 is a constant depending only on s and p, and noting that we can choose r < 0.005 . It remains to consider the cases when the execution starts at time 0 with amin,0 ≥ 10−6 s4 . Then, if amin,t ≥ 10−6 s4 holds, the claim follows from Lemma 23 given that r is chosen so that 10−6 s4 > 4r1/2 . Otherwise, there must exist some last time t0 ≤ t such that amin,t0 ≥ 10−6 s4 . We apply Lemma 19 with t0 = t0 . If the obtained value t∗∗ satisfies t∗∗ < t, then we can apply an analogous analysis as in the case amin,0 < 10−6 s4 to obtain the claim. Otherwise, we have that t ≤ t∗∗ ≤ t + cn, where the value of constant c, depending only on s and p follows from Lemma 19. By an iterated application of Lemma 18, we obtain that amin,t ≥ c0 , where the value of constant c0 > 0, depending only on s and p, follows from the application of Lemma 18. Choosing r sufficiently small so that c0 > 4r1/2 , we complete the proof using Lemma 23. Finally, for the sake of completeness we state how the majority protocol stops in the case of #X = 0. Lemma 25. Suppose x = 0. Then, there exists a moment of time ts such that either m+1,t = 0 or m−1,t = 0 holds for all t > ts . Moreover, ts < c16 n log2 n with probability 1 − O(1/n), for some absolute constant c16 > 0 depending only on s, p, and r. Proof. By Theorem 1(1), there exists a moment of time t0 = O(n log2 n) such that the system reaches a corner configuration (cf. Lemma 11). W.l.o.g., assume that a1 = s and a2 = a3 = 0. At this point, in the majority protocol Rule (7) will never again be activated, whereas the execution of rules (8)-(11) follows precisely the classical majority scenario of Angluin et al. [7]. By a standard concentration analysis (see also [7]), one of the two species M+1 , M−1 will become extinct in O(n log2 n) steps with probability 1 − O(1/n). As a side remark on Lemma 25 that it is possible to initialize the system entirely with a state (Ai , M0 ) so that m+1,t = m−1,t = 0 holds throughout the process (even if the designed protocol will never enter such a configuration from most initial configurations). 43 7.3 Protocol Extension Pl : Detection with Lights To complete the proof of Theorem 3, we design a protocol extension Pd , such that D ETECTION is solved by the composition ((Po ◦ Pm ) + Pl ). Extension Pl , uses three states, {L−1 , L+1 , Lon }. We informally refer to states L as lights. The composition is given in Fig. 5. Informally, state L−1 means that the agent is “waiting for meeting M−1 ”, then after meeting M−1 it becomes L+1 , “waiting for M+1 ” and finally it becomes Lon . To analyze the operation of the protocol, consider first the case of x = 0. By Lemma 25, after O(n log2 n) steps, agents in at least one of the states {M+1 , M−1 } are permanently eliminated from the system. Thus, either rule (11) or rule (12) will never again be executed in the future. An agent 1 which is in state Lon will spontaneously move to another state following rule (13) within O( q(ε) n log n) 2 steps, with probability 1 − O(1/n ), and will never reenter such a state, since this would require the activation of both rule (11) and rule (12). By applying a union bound over all agents, we obtain that state Lon never again appears in the population after O(n log n) steps from the termination of the majority protocol, with probability 1 − O(1/n). Overall, all nodes reach a state having a different state than Lon after O(n log2 n) steps from the start of the process, with probability 1 − O(1/n), and all leave such a state eventually with certainty. In the presence of the source X, the analysis of the process can be coupled with a Markov chain on three states L−1 , L+1 , and Lon . In view of Lemma 24, transitions from state L−1 to L+1 and from state L+1 to to L−1 occur with at least constant probability (except for an O(1/n)-fraction of all time steps), this 3-state chain is readily shown to be rapidly mixing. For a choice of q(ε) > 0 depending only on s, p, r, ε sufficiently small, we can lower-bound the number of agents occupying state Lon by (1 − ε)n, with high probability. Under the natural decoding of states as “informed” (having component Lon ) or “uninformed” (having component L−1 or L+1 ), the proof of Theorem 3 is complete. We remark that it is also possible to design a related protocol in which exactly one state is recognized as “informed” and exactly one state is recognized as “uninformed”; we omit the details of the construction. 8 Proof of Impossibility Result This Section is devoted to the proof of Theorem 4. First, we restate some notation. We recall that the vector z = (z (1) , . . . , z (k) ) ∈ {0, 1, . . . , n}k = Z describes the number of agents having particular states, and kzk1 = n. In this section we will identify the set of states with {1, . . . , k} = [1, k]. It is now also more convenient for us to work with a scheduler which selects unordered (rather than ordered) pairs of interacting agents; we note that both models are completely equivalent in terms of computing power under a fair random scheduler, since selecting an ordered pair of agents can be seen as selecting an unordered pair, and then setting their orientation through a coin toss. Indexing with integers {1, 2, . . . , r} the set of all distinct rules of the protocol, where r ≤ k 4 , for a rule j ≡ “{i1 (j), i2 (j)} → {o1 (j), o2 (j)}00 , 1 ≤ j ≤ r, i1 (j), i2 (j), o1 (j), o2 (j) ∈ {1, . . . , k}, we will denote by qj , the probability (selected by the protocol designer) that rule j is executed as the next interaction rule once the scheduler has selected (i1 , i2 ) as the interacting pair, and by pj (z) the probability (i (j)) (i (j)) that j is the next rule chosen in configuration z (we have pj (z) = qj z 1 nz2 2 (1−O(1/n)), where the O(1/n) factor compensates the property of a scheduler which always selects a distinct pair of elements). For any configuration z0 ∈ Z, we define the d-box Bd (z0 ) around z0 as the set of all states z ∈ Z (i) (i) such that z0 /d ≤ z (i) ≤ d max{1, z0 }, for all 1 ≤ i ≤ k. We start the proof with the following property of boxes. Lemma 26. Fix k ∈ Z+ and let 0 < ε1 < 0.001 be arbitrarily fixed. There exists ε0 = ε0 (k, ε1 ), 0 < ε0 < ε1 , such that, for any interaction protocol P with k states and any configuration z0 ∈ Z, there 44 exists a value ε = ε(P, z0 ) ∈ [ε0 , ε1 ] such that, for any rule j of the protocol, 1 ≤ j ≤ r, exactly one of the following bounds holds: 1. (i) for all z ∈ Bnε0 (z0 ), pj (z) ≤ nε−1 , 2. (ii) for all z ∈ Bnε0 (z0 ), pj (z) ≥ n24ε−1 . and for any state i, 1 ≤ i ≤ k, exactly one of the following bounds holds: 1. (iii) for all z ∈ Bnε0 (z0 ), z (i) ≤ nε , 2. (iv) for all z ∈ Bnε0 (z0 ), z (i) ≥ n24ε . 4 Proof. Let k be fixed and let ε0 = 96−(k+k +f +1) ≤ 96−(k+r+f +1) , where f = log2 (1/ε1 ). Consider (i) the (multi)set M of real values M := {logn max{nε0 , z0 } : i ∈ {1, . . . , r}}∪{logn max{nε0 , npj (z0 )} : j ∈ {1, . . . , r}} ⊆ [0, 1]. Since |M | = k + r, by the pigeonhole principle, there must exist an interval Il = [96−l , 96−l+1 ), for some l ∈ {f, . . . , k + r + f }, such that Il ∩ M = ∅. Now, we set ε = 2 · 96−l > 96ε0 , we also have ε < 2 · 96−f < ε1 . We immediately obtain that for any state (i) (i) i, 1 ≤ i ≤ k, we either have z0 ≤ nε/2 or z0 ≥ n48ε . Recalling that for any z ∈ Bnε0 (z0 ), (i) (i) z0 /nε0 ≤ z (i) ≤ nε0 max{1, z0 }, claims (iii) and (iv) follow. (i (j)) (i (j)) To show claims (i) and (ii), notice that if rule j, j ∈ {1, . . . , r} is such that min{z0 1 , z0 2 } ≤ nε , then for all z ∈ Bnε0 (z0 ) we have min{z (i1 (j)) , z (i2 (j)) } ≤ nε (by (iii) and (iv)), and so pj (z) ≤ (i (j)) (i (j)) nε−1 by the properties of the random scheduler. Otherwise, we have min{z0 1 , z0 2 } ≥ n24ε , and 1 so 2n2ε0 ≤ pj (z0 )/pj (z) ≤ 2n2ε0 , where we recall that ε > 96ε0 . Since we have pj (z0 ) ≤ nε/2 or pj (z0 ) ≥ n48ε , claims (i) and (ii) follow. Given any k-state protocol P , we will arbitrarily choose a value of ε for which the claim of the above Lemma holds (e.g., the smallest possible such value of ε). Note that a similar analysis is also possible for protocols using a super-constant number of states in n, however, then the value of ε0 is dependent on 4 n; retracing the arguments in the proof, we can choose appropriately ε0 ≥ nexp[−O(k )] . (We make no effort to optimize the polynomial in k in the exponent.) In what follows, let z0 be a fixed configuration of the protocol (admitting a certain property which we will define later). We will then consider a rule j to be a low probability (LP) rule (writing j ∈ LP ) in box Bnε0 (z0 ) if it satisfies condition (i) of the Lemma, and a high probability (HP) rule in this box (writing j ∈ HP ) if it satisfies condition (ii). Note that LP ∪ HP = {1, . . . , r}. Likewise, for 1 ≤ i ≤ k, we will classify i as a low-representation (LR) state (writing i ∈ LR) in box Bnε0 (z0 ) if i satisfies condition (iii) of the Lemma, and a high representation (HR) state (writing i ∈ HR) in this box if i satisfies condition (iv). Note that LR ∪ HR = {1, . . . , k}. Moreover, we define a set of very high representation (VHR) states, V HR ⊆ HR, as the set of all i such that for all z 0 ∈ Bnε0 (z0 ), zi0 ≥ n1−8ε . Denoting HR0 = HR \ V HR, we have by the definition of a box that for all i0 ∈ HR0 , for all z 0 ∈ Bnε0 (z0 ): zi0 ≤ n1−8ε /O(n2ε0 ) < n1−6ε . From now on, we assume that configuration z0 admits the following property: for T = n1+2ε , an execution of the protocol starting from configuration z0 passes through a sequence of configurations zt , t = 1, 2, . . . , T , such that the configuration does not leave the box around z0 in any step with sufficiently large probability, lower-bounded by some absolute constant Π ∈ (0, 1]: Pr[∀t<T zt ∈ B ⊆ Bnε0 (z0 )] ≥ Π, (38) where B is an arbitrarily fixed subset of Bnε0 (z0 ). We now show that the above property has the following crucial implication: for an interacting pair involving selected high and very high representation states, a rule creating a low representation state can only be triggered with sufficiently small probability. Informally, it seldom happens that in the protocol a low representation state is created out of any high representation state. 45 Lemma 27. For a protocol having the property given by Eq. (38), for i1 ∈ HR and i2 ∈ V HR, let of the form {i1 , i2 } → {o1 , o2 }, taken over all o1 ∈ LR, o2 ∈ [1, r]. Then, R Pi1 ,i2 be the set of rules −14ε ). q = O(n j j∈Ri1 ,i2 P Proof. Suppose, by contradiction, that j∈Ri ,i qj > 3n−14ε . 1 2 Associate with process zt a random variable Jt ∈ {0, 1}, defined as follows. For all t < te , where te is the first moment of time such that zte ∈ / Bnε0 (z0 ), we put Jt = 1 if a rule from Ri1 ,i2 is used for the interaction made by the protocol in process zt at time t, and set Jt = 0 otherwise. For all t ≥ te , we set Jt to 1. We have E(Jt |z1 , . . . , zt ) ≥ 2n2ε−1 ; indeed, for t < te , it holds that: E(Jt |z1 , . . . , zt ) = Pr[Jt = 1|zt ] = X X pj (zt ) = j∈Ri1 ,i2 ≥ 3n−14ε j∈Ri1 ,i2 qj z (i1 (j)) z (i2 (j)) (1 − O(1/n)) ≥ n2 n24ε n1−8ε (1 − O(1/n)) > 2n2ε−1 . n2 By a simple stochastic domination argument, (Jt ) can be lower-bounded by a sequence of independent binomial trials with success probability n2ε−1 , hence by an application of a multiplicative Chernoff bound for T = n1+2ε : " T # " T # X X 1 Pr Jt > n4ε = Pr Jt > 2n2ε−1 T = 1 − o(1), 2 t=1 t=1 where the o(1) factor is exponentially small in n. We now show the following claim. Claim. With probability Π − o(1), the following event holds: zt ∈ B for all t ∈ [0, T ) and the total number of rule activations in the time interval [0, t) during which an agent changes state from a state in LR to a different state is at most O(kn3ε ). Proof (of claim). Acting similarly as before, we associate with process zt a random variable Lt ∈ {0, 1}, defined as follows. For all t < te , we put Lt = 1 if a rule acting on at least one agent in a state from LR is made by the protocol in process zt at time t, and set Lt = 0 otherwise. For all t ≥ te , we set Lt to a dummy variable set always to 0, i.a.r. We observe that: nε , n since |LR| ≤ k, and for t < te , zi < nε for any i ∈ LR, hence the scheduler selects an agent from a ε LR state into an interacting pair with probability at most 2k nn . Applying an analogous argument as in the case of random variable Lt , this time for the upper tail, we obtain: " T # " T # X X 3ε ε Pr Lt < 4kn = Pr Lt > 2 · 2kn T = 1 − o(1). E(Lt |z1 , . . . , zt ) ≤ 2k t=1 t=1 The claim follows directly. Now, by a union bound we obtain: " T # T X X Pr Jt > n4ε ∧ Lt < 4kn3ε = 1 − o(1). t=1 t=1 Taking into account that te > T holds with probability Π = Ω(1) by (38), we have by a union bound that with probability at least Π − o(1) = Ω(1), the holds: zt ∈ B for all t ∈ [0, T ], P PTfollowingPevent T T 4ε , and L < 4kn3ε . However then 4ε 3ε > knε , so there J > n J − L t t=1 t t=1 t t=1 t > n − kn (i) must exist at time T a state i ∈ LR such that zT > nε . This is a contradiction with zT ∈ B ⊆ Bnε0 (z0 ) by Lemma 26(iii). 46 In the rest of the proof, we consider the evolution of a protocol starting from configuration z0 and having property (38). We compare this evolution to the evolution of the same protocol, starting from a perturbed configuration z0∗ , such that: (C1) kz0 − z0∗ k1 ≤ nε . ∗(i) (C2) for all low representation states i ∈ LR, we have z0 (i) ≤ z0 . Intuitively, the perturbed state z0∗ may correspond to removing a small number of agents from z0 (and replacing them by high representation states for the sake of normalization), e.g., as in the case of the disappearance of a rumor source from a system which has already performed a rumor-spreading process. Our objective will be to show that, with probability at least Π − o(1), after T = n1+2ε the process ∗ zT is still not far from z0 , being constrained to a box in a similar way as process zt . To achieve this, we define a coupling between processes zt and zt∗ (knowing that process zt is constrained to a box around z0 with probability Π). Informally, the analysis proceeds as follows. We run the processes together for T = n1+2ε steps. In most steps, the 1-norm distance kzt − zt∗ k1 between the two processes remains unchanged, without exceeding O(n3ε ). Otherwise, exactly one of the two processes executes a rule (and the other pauses). With a frequency of roughly nε /n steps (i.e., roughly n3ε times in total during the process), an LP rule is executed which increases the distance between these two states. We think of this type of “error” as unfixable, contributing to the O(n3ε ) distance of the processes; however, such errors are relatively uncommon. With a higher frequency of roughly n3ε /n steps (i.e., roughly once every n1−3ε steps), a less serious “error” occurs, when some HP rule ι increases the distance between the two states. The rate of such errors is too high to leave them unfixed, and we have a time window of about n1−3ε steps to fix such an error (before the next such error occurs). We observe that since ι is an HP rule, which is activated with probability at least n24ε−1 , rule ι will still be activated frequently during this time window. The coupling of transitions of states zt and zt∗ is in this case performed so as to force the two processes to execute rule ι lazily, never at the same time. The number of executions of rule ι in the ensuing time window by each of the two processes follows the standard coupling pattern of a pair of lazy random walks on a line, initially located at distance 1, until their next meeting (cf. e.g. [2]). During this part of the coupling, we allow the distance kzt − zt∗ k1 to increase even up to n6ε (as a result of executions of rule ι), but the entire contribution to the distance related to rule ι is reduced to 0 before the next HP rule “error” occurs, with sufficiently high probability (in this case, with probability 1 − O(n−6ε ). Overall, the coupling is successful with probability Π − O(n−ε ). We remark that we use the bound on the number of states k to enforce a sufficiently large polynomial separation between the frequencies of LR states and HR states, and likewise for LP rules and HP rules. We also implicitly assume that k = no(1) , throughout the process. The analysis also works for a choice of k = O(log log n), with a sufficiently small hidden constant. The separation between LR/HR states and LP/HP rules is used in at least two places in the proof. First, it enforces that rules creating LR states from VHR states may appear in the definition of the protocol only with polynomially small probability ∗(i) (i) (Lemma 27), which helps to maintain over time the invariant zt ≤ zt , for all LR states. Secondly, we use the separation of LP/HP rules in the analysis of the coupling to show that a fixable “error” caused by a HP rule can be sufficiently quickly repaired, before new errors occur. In the formalization of the coupling, we make both processes zt and zt∗ lazy, i.e., add to each process an additional independent coin-toss at each step, and enforce that with probability 1/2 no rule is executed in a given step (i.e., the step is skipped by the protocol). We assume a random scheduler which picks uniformly a random pair of nodes at each step. Thus, if the scheduler picks a pair of agents in states {i1 , i2 }, and j is a rule acting on this pair of states, the probability that the interaction corresponding to rule j will be qj /2. (The laziness of the process here is a purely technical assumption for the analysis, and corresponds to using a measure of time which is scaled by a factor of 2 ± o(1) w.h.p.; this does not affect the asymptotic statement of the theorem.) 47 We will also find it convenient to apply an auxiliary notation for representing the evolution of a state. For process zt (resp., zt∗ , we define ρt (j) (resp. ρ∗t (j)), for all j ∈ [1, r], as the number of times rule j has been executed since time 0. Observe that the pair (z0 , (ρt (j) : j ∈ [1, t]) completely describes the evolution of a state (i.e., the order in which the rules were executed is irrelevant). Moreover, since each execution of a rule changes the states of at most 4 agents, we have: kzt − zt∗ k1 ≤4 r X |ρt (j) − ρ∗t (j)| + kz0 − j=1 z0∗ k1 ≤ +4 r X |ρt (j) − ρ∗t (j)| + nε . j=1 Definition of the coupling. 1. At each step t, we order the agents of configurations zt and zt∗ , so that al (t) denotes the type of the l-th agent in zt and a∗l (t) is the type of the l-th agent in zt∗ . The orderings are such that |{l : al (t) = a∗l (t)}| is maximized; in particular, for any state i such that z (i) (t) ≤ z ∗(i) (t) (respectively, z ∗(i) (t) ≤ z (i) (t)) we have that if for some l, al (t) = i (resp., a∗l (t) = i), then a∗l (t) = i (resp., al (t) = i). 2. The scheduler then picks a pair of distinct indices l1 , l2 ∈ {1, . . . , n} as the pair of interacting agents. 2.1. If al1 (t) = a∗l1 (t) and al2 (t) = a∗l2 (t), then the same rule j = j ∗ acting on the pair of states (al1 (t), al2 (t)) is chosen as the current interaction rule, with probability qj . 2.2. Otherwise, a pair of (clearly distinct) rules j and j ∗ are picked independently at random for zt and zt∗ from among the rules available for state pairs (al1 (t), al2 (t)) and (a∗l1 (t), a∗l2 (t)), with probabilities qj and qj ∗ , respectively. 3. The processes finally perform their coin tosses to decide which of the selected rules (j for zt and j ∗ for zt∗ ) will be applied in the current step. 3.1. If j = j ∗ and rule j has been executed exactly the same number of times in the history of the two processes (ρt (j) = ρ∗t (j)), then with probability 1/2 both of the processes execute rule j, and with probability 1/2 neither execute their rule. 3.2. If j 6= j ∗ , or if j = j ∗ and rule j has been executed a different number of times in the history of the two processes (ρt (j) 6= ρ∗t (j)), then exactly one of the two processes performs its chosen rule and the other process waits, with the process performing the rule being chosen as zt or zt∗ , with probability 1/2 each. The correctness of the coupling (i.e., that the marginals zt and zt∗ each correspond to a valid execution of the given protocol under a random scheduler) is immediate to verify. Lemma 28. Let zt be a process satisfying property (38), and let z0∗ satisfy conditions (C1) and (C2). Then, for T = n1+2ε , with probability Π − O(n−ε ) we have kzT∗ − zk1 = O(n6ε ), for some z ∈ B. Proof. To prove the claim, it suffices to show that with probability Π − O(n−ε ) the provided coupling succeeds, i.e., it maintains a sufficiently small difference zT (i) − zT∗ (i) for all states i, with zT ∈ B. In the analysis of the provided coupling, we will assume that the box condition zt ∈ B holds always throughout the process (otherwise, we assume the coupling does not succeed). To state this formally, we work with auxiliary processes z̄t and z̄t∗ , given as z̄t = zt and z̄t∗ = zt∗ for all t < te , where te is the first moment of time such that zt ∈ / Bnε0 (z0 ), and set to the dummy value z̄t = z̄t∗ = z0 for all t ≥ te . At the end of the process, we will thus have z̄T = zT and z̄T∗ = zT∗ with probability at least Π. In the following, we silently assume that t < te − 1 (in particular, that zt ∈ B and zt+1 ∈ B), and we will simply show 48 that the coupling of z̄t and z̄t∗ is successful with probability 1 − n−ε . The condition of t ≥ te − 1 is trivially handled. In addition to the box condition (which is now enforced) we try to maintain, with sufficiently high probability, throughout the first T steps of the process several invariants (all at a time), corresponding to the following events holding: ∗(i) • FD (t): for all states i ∈ LR, z̄t ∗(i) • FLR (t): for all states i ∈ LR, z̄t (i) ≤ z̄t . (LR domination condition) (i) ≤ z̄t ≤ nε . (LR state condition) • FLP (t): for all rules j ∈ LP , max{pj (z̄t ), pj (z̄t∗ )} ≤ 2nε−1 . (LP rule condition) (i) ∗(i) • FHR (t): for all states i ∈ HR, min{z̄t , z̄t } ≥ n24ε /2. (HR state condition) • FHP (t): for all rules j ∈ HP , min{pj (z̄t ), pj (z̄t∗ )} ≥ n24ε−1 /2. (HP rule condition) (i) ∗(i) • FHR0 (t): for all states i ∈ HR0 , max{z̄t , z̄t } ≤ 2n1−6ε . (HR’ state condition) • a family of possible events Sw,d (t), for some d ∈ {0, . . . , 4n3ε } and w ∈ {0, . . . , n6ε }, with specific events defined as follows: P – S0,d (t) holds if for all rules j ∈ HP we have ρt (j) = ρ∗t (j), and j∈LP |ρt (j)−ρ∗t (j)| = d. This implies, in particular, kz̄t∗ − z̄t k1 ≤ 4d + nε ≤ 5n3ε . (identical rate of HP execution) – Sw,d (t) for w > 0 holds if there exists a rule ι ∈ HP suchP that for all rules j ∈ HP \ {ι} ∗ ∗ we have ρt (j) = ρt (j), |ρt (ι) − ρt (ι)| = w, and moreover i∈LP |ρt (i) − ρ∗t (i)| = d. This implies, in particular, kz̄t∗ − z̄t k1 ≤ 4d + 4w + nε ≤ 5n6ε . (single HP execution difference) We will call the coupling successful if for all t ≤ T , all events F· (t) and some event Sw,d (t) holds, and we will say it is a failure otherwise. (We remark that condition FD (t) is implied by condition FLR (t), but we retain both for convenience in discussion.) The analysis of the coupled process is now the following. First, we remark that all of the given events F· (t) and event S0,0 (t) hold for t = 0. If the process meets condition S0,d at time t and all conditions F· (t), then we have the following: • With probability at least 1−O(n3ε−1 ), the coupling will follow clauses 2.1 and 3.1 of its definition, and the two processes z̄ and z̄ ∗ will execute the same rule j (or both pause). Hence, we continue to step t + 1 satisfying condition S0,d and all of the conditions F· (t + 1), making use of the box condition for process z̄t . (We note that, to show FLP (t), when considering the special case of a rule involving a state from LR, we can make use of FLR (t) and note that the activation probability of such a rule is bounded by 2nε−1 due to the nε bound on the population of a LR state). • With probability at most O(n3ε−1 ), the coupling will, however, select distinct rules, j for z̄t and j ∗ for z̄t∗ , and will select exactly one of them to execute, say j 0 ∈ {j, j ∗ }. – If j 0 ∈ LP , which happens in the current step of the process with probability at most 2nε−1 by FLP , then the event S0,d+1 (t + 1) will hold in the next step (provided d + 1 ≤ 4n3ε ; otherwise, if d + 1 > 4n3ε , we will say that the coupling has failed). – If j 0 ∈ HP , which happens in the coupling with probability O(n3ε−1 ) (as bounded due to clause 2.2), then the event S1,d (t + 1) will hold in the next step. The condition FD (t + 1) requires more careful consideration. Taking into account that FD (t) holds, we need to consider two cases: either j 0 = j and the rule applied to z̄t changed at least one of the two interacting states {i1 (j), i2 (j)}, say i1 (j) ∈ LR, so that z̄ i1 (j) (t) = z̄ ∗i1 (j) (t) and 49 failure failure failure O(n−2.9ε−1 ) S0,0 S1,0 S1,1 S0,4n3ε S0,d S0,1 O(n3ε−1 ) 1 − O(n3ε−1 ) failure Pr ≤ 1 S1,d failure S2,d failure Sw,d Π0t ≥ Π0t n24ε−1 4 failure O(n6ε−1 ) Sn6ε ,d failure Pr ≤ 1 Figure 8: Illustration of transitions between states Sw,d for the coupling in the lower bound proof. z̄ i1 (j) (t + 1) ≤ z̄ ∗i1 (j) (t + 1) − 1, or j 0 = j ∗ and the rule applied to z̄t∗ created a pair of states {o1 (j ∗ ), o2 (j ∗ )}, say o1 (j ∗ ) ∈ LR. In the first case, by the description of the ordering given in clause 1 of the definition of the coupling, the problem occurs only if one of the agents picked by the scheduler belongs to an LR state, and the other agent is at a position in which the states of z̄ and z̄ ∗ differ in the ordering of the agents; hence, the probability ε 3ε that the coupling fails at this step is at most O( knn·n ) ≤ O(n5ε−2 ). In the second case, 2 we likewise analyze the ordering of the agents considered by the scheduler, and note that the interacting agent, which belongs to the part of the ordering in which z̄t and z̄t∗ differ, must be in a HR state, since the agents in a LR state in z̄ ∗ are matched by their counterparts in z̄ (as noted in clause 1 of the discussion of the coupling). If the other interacting agent is in a state 3ε 1−6ε from LR ∪ HR0 , then such an event occurs with probability O( n ·kn ) ≤ O(n−2.9ε−1 ), n2 and we say that with this probability the coupling has failed. Finally, if the other interacting agent is in a state from V HR, then by Lemma 27, we have that the probability of picking a rule under which the coupling fails is at most O(n−14ε ), conditioned on the event j 6= j ∗ holding, hence overall the probability of failure is O(n−14ε n3ε−1 ) = O(n−11ε−1 ). Overall, we obtain that FD (t + 1) holds with probability O(n−2.9ε−1 ). Given FD (t + 1), S1,d(t+1) , and the box condition, the remaining conditions F· (t + 1) follow directly. Overall, we obtain that following a time t satisfying S0,d (t) and all conditions F· (t), we reach the following successor state (see Fig. 8): 50   S0,d (t + 1) ∧ F· (t + 1),      S0,d+1 (t + 1) ∧ F· (t + 1), S1,d (t + 1) ∧ F· (t + 1),       failure: with probability 1 − O(n3ε−1 ), with probability ≤ 2nε−1 , if d + 1 ≤ 4n3ε , 3ε−1 ), with ( probability O(n with probability O(n−2.9ε−1 ), if d + 1 ≤ 4n3ε , with some probability ≤ 1, otherwise. At this point, before proceeding further, we can provide some intuition on the meaning of the respective events S. The coupling process can be seen as a walk along the path (S0,d : d ≤ 4n3ε ), starting from state S0,0 , and at each step, either staying in the current state S0,d , moving on to the next state S0,d+1 , branching to a side branch S1,d (which we will analyze later), or failing. The process also fails if it reaches the endpoint of its path (d = 4n3ε ). Since the process is run for T = n1+2ε steps, the probability that failure will occur before the end of the path is reached is O(n−0.9ε ), and the probability of reaching the end of the path and failing is exponentially small in nε by a Chernoff bound (in expectation, the process will progress halfway along the path). Hence, we have that the process succeeds with probability 1 − O(n−0.9ε ), or otherwise may fail in a side branch S·,d . A side branch is entered with probability O(nε−1 ). To show that the coupling succeeds with the required probability, it suffices to show that we return from any state S1,d to state S0,d with probability at least 1 − O(n−6ε ); then, all (i.e., w.h.p. at most O(n1+2ε n3ε−1 ) = O(n5ε )) excursions into side branches during the process will succeed with probability 1 − O(n−ε ). Consider now an excursion into a side branch Sw,d (w ≥ 1) associated with a rule ι ∈ HP , which has been executed a different number of times in z̄t and z̄t∗ . Now, if the process meets condition Sw,d at time t and all conditions F· (t), then we have the following: • With probability at least 1 − O(n6ε−1 ), the coupling will follow clause 2.1 of its definition, selecting a single rule j. – If j 6= ι, then clause 3.1 will follow, and the two processes z̄ and z̄ ∗ will execute the same rule j (or both pause). Hence, at time t + 1, all of the conditions F· (t + 1) and condition Sw,d (t + 1) is satisfied. – Else, the event j = ι occurs. The probability of such an event is denoted πt ∈ [pι (z̄t ) − O(n6ε−1 ), pι (z̄t )] (due to the conditioning performed in the first clause of the coupling); since pι (z̄t ) ≥ n24ε−1 by the box condition for HP rules, it follows that 2πt ≥ n24ε−1 − O(n6ε−1 ) ≥ n24ε−1 /2. Now, following clause 3.2 of the coupling, depending on which of the two processes z̄t , z̄t∗ is chosen to execute the rule, with probability πt /2 =: πt0 the system moves to Sw−1,d (t + 1), and with probability πt0 the system moves to Sw+1,d (t + 1) (unless w + 1 > n6ε , in which case the coupling has failed). As before, given there was no failure, all conditions F· (t + 1) are readily verified to be satisfied in the new time step. • With probability at most O(n6ε−1 ), for simplicity of analysis we assume the coupling has failed. This time, for a time t satisfying Sw,d (t) distribution of successor states:   Sw−1,d (t + 1) ∧ F· (t + 1),      Sw+1,d (t + 1) ∧ F· (t + 1),  failure:       Sw,d (t + 1) ∧ F· (t + 1), for w ≥ 1 and all conditions F· (t), we obtain the following with probability exactly πt0 ≥ n24ε−1 /4, 0 6ε with ( probability exactly πt , if w + 1 ≤ n , with probability O(n6ε−1 ), if w + 1 ≤ n6ε , with some probability ≤ 1, otherwise, otherwise. 51 The picture here corresponds to a lazy random walk along the side line Sw,d for w ∈ [0, n6ε ], with an additional failure probability at each step. The walk starts at w = 1 and ends with a return to the primary line S0,d if the endpoint w = 0 is reached, or ends with failure if the other endpoint w ≥ n6ε =: wmax is reached. At each step, the walk is lazy (with probability of transition depending on the current step), but unbiased with respect to transitions to the left or to the right. Assuming that failure does not occur sooner, 1 2 ) = O(n12ε ) with probability 1 − O( wmax ) = 1 − O(n−6ε ) the walk will reach point w = 0 in O(wmax moves (transitions along the line), without reaching the other endpoint of the line sooner. Since a move is made in each step t with probability πt0 ≥ n24ε−1 /4, by a straightforward Chernoff bound, the number of steps spent on this line is given w.h.p. as at most O(n12ε /n24ε−1 ) = O(n1−12ε ). As the probability of failure in each of these steps is O(n6ε−1 ), the probability that the process fails during these steps is O(n−6ε ). Overall, by a union bound, we obtain that the process successfully returns to S0,d with probability 1 − O(n−6ε ) (and within O(n1−12ε ) steps). In view of the previous observations, we have that with probability 1 − O(n−ε ), all conditions F· and some condition Sw,d hold at time T . Thus, with probability Π − n−ε , process zT∗ is sufficiently close to B, i.e., there exists a point z ∈ B such that kzT∗ − zk1 = O(n6ε ). 9 Proof of Proposition 2 Proof. Fix protocol P with set of states K, in which the minimum positive probability of executing some rule is p. Let K 0 ⊆ K, K 0 3 X be any minimal subset of the set of states such that no evolution of protocol P starting in a configuration containing only states from set K 0 will ever contain an agent in a state outside K 0 . Denote κ = |K 0 | − 1. Consider an initialization of protocol P at time t0 = 0, at a configuration z(0) with x ∈ [c, 1/2] and with all other states from K 0 represented by the same number of agents, i.e., for each Q ∈ K 0 , we have q(0) = (1 − x)/κ. Let t ≥ kn be an arbitrarily chosen time step. Let t1 = t − (κ − 1)n. Fix Q1 ∈ K 0 \ {X} as any state such that q1 (t1 ) ≥ 1/2κ (we can, e.g., fix q1 as the state from K 0 \ {X} having the most agents at time t1 ). Observe that from the minimality of K 0 it follows that there must exist a sequence of states (Q1 , . . . , Qκ ), with {Q1 , . . . , Qκ = K 0 \ {X}, such that in the definition of protocol P , for all i ∈ {1, . . . , κ − 1}, some rule of protocol P creates at least one agent (i.e., either 1 or 2 agents) in state Qi+1 from an interaction of either the pair of agents in states (Qj , Qi ) or the pair of agents in states (Qi , Qj ), for some j ∈ {1, . . . , i}. (Indeed, if for some i there was no possibility of choosing Qi+1 in any way, then K 00 = {X, Q1 , . . . Qi } ⊆ K 0 would be closed under agent creation, contradicting the minimality of the choice of K 0 .) Now, we consider intervals of time steps [ts , ts+1 ], with ts = t1 + (s − 1)n for s > 1. We make the following claims: (1) Fix i ∈ {1, 2, . . . κ}. If qi (ts ) = Ω(1), then qi (t) ≥ 0.11qi (ts ) for all t ∈ [ts , ts+1 , with probaΩ bility 1 − e−n (1) . Indeed, in a sequence of n steps, the expected number of agents which do not participate in any interaction in the time interval [ts , ts+1 ] following the asynchronous scheduler n is ( n−2 n ) n > 0.13n, and thus the number of non-interacting agents is at least 0.12n, with probaΩ bility 1 − e−n (1) following standard concentration bounds for the number of isolated vertices in a random graph on n nodes with n edges. Since the choice of agents by the scheduler is independent of their state, and the probability for a uniformly random agent to be in state Qi at time ts is qi (ts ), a simple concentration bound shows that 0.11qi (ts )n having state Qi at time ts do not participate in any interaction in the interval [ts , ts+1 ]. (2) Fix i ∈ {1, 2, . . . κ − 1}. Denote mi = minj≤i qj (ti ). If mi = Ω(1), then qi+1 (ti+1 ) ≥ 0.01pm2i , Ω with probability 1 − e−n (1) . Indeed, consider the value j ≤ i such that the interaction (Qj , Qi ) or (Qi , Qj ) creates an agent in state Qi+1 . At any time t within the interval [ti , ti+1 ], we have by Ω Claim (1) that qj (t) ≥ 0.11mi and qi (t) ≥ 0.11mi , with probability 1 − e−n (1) . It follows that 52 an interaction creating a new agent in state Qi+1 is triggered with probability at least p(0.11mi )2 at each step. The number of agents in state Qi+1 at time step ti+1 may thus be dominated from below by the number of successes in a sequence of n Bernoulli trials with success probability p(0.11mi )2 , and the claim follows. By applying Claim (2) iteratively for i = {1, 2, . . . κ − 1}, where we note that m1 ≥ 1/2κ, we i Ω have qi+1 (ti+1 ) ≥ (0.01p/2κ)2 , with probability 1 − e−n (1) (through successive union bounds). i Then, applying Claim (1) up to time t = tκ−1 , we have qi+1 (tκ−1 ) ≥ 0.11κ−1−i−1 (0.01p/2κ)2 ≥ κ Ω (0.01p/2κ)2 , with probability 1 − e−n (1) . Applying once again a union bound, we have shown that κ Ω for all q ∈ K 0 , we have q(t) ≥ (0.01p/2κ)2 ≡ C0 , with probability 1 − e−n (1) . The claim of the lemma follows for a suitable choice of δ0 > 0. Acknowledgment. We sincerely thank Dan Alistarh and Przemek Uznański for inspiring discussions, and Lucas Boczkowski for many detailed comments which helped to improve this manuscript. References [1] M. A. Abdullah and M. Draief. Majority consensus on random graphs of a given degree sequence. CoRR, abs/1209.5025, 2012. [2] D. Aldous and J. A. Fill. Reversible markov chains and random walks on graphs, 2002. Unfinished monograph, recompiled 2014, available at http://www.stat.berkeley.edu/˜aldous/ RWG/book.html. [3] D. Alistarh, J. Aspnes, D. Eisenstat, R. Gelashvili, and R. L. Rivest. Time-space trade-offs in population protocols. In Proc. Twenty-Eighth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2017, Barcelona, Spain, pages 2560–2579, 2017. [4] D. Alistarh, J. Aspnes, and R. Gelashvili. Space-optimal majority in population protocols. (To appear, SODA 2018.) CoRR, abs/1704.04947, 2017. [5] D. Alistarh, B. Dudek, A. Kosowski, D. Soloveichik, and P. Uznanski. Robust detection in leakprone population protocols. In DNA, volume 10467 of Lecture Notes in Computer Science, pages 155–171. Springer, 2017. [6] D. Angluin, J. Aspnes, Z. Diamadi, M. J. Fischer, and R. Peralta. Computation in networks of passively mobile finite-state sensors. Distributed Computing, 18(4):235–253, 2006. [7] D. Angluin, J. Aspnes, and D. Eisenstat. A simple population protocol for fast robust approximate majority. Distributed Computing, 21(2):87–102, 2008. [8] D. Angluin, J. Aspnes, D. Eisenstat, and E. Ruppert. The computational power of population protocols. Distributed Computing, 20(4):279–304, 2007. [9] J. Aspnes and E. Ruppert. An introduction to population protocols. Bulletin of the EATCS, 93:98– 117, 2007. [10] L. Becchetti, A. E. F. Clementi, E. Natale, F. Pasquale, R. Silvestri, and L. Trevisan. Simple dynamics for majority consensus. CoRR, abs/1310.2858, 2013. [11] L. Boczkowski, A. Korman, and E. Natale. Minimizing message size in stochastic communication patterns: Fast self-stabilizing protocols with 3 bits. In Proc. Twenty-Eighth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2017, Barcelona, Spain, pages 2540–2559, 2017. 53 [12] O. Bournez, P. Fraigniaud, and X. Koegler. Computing with large populations using interactions. In MFCS, volume 7464 of Lecture Notes in Computer Science, pages 234–246. Springer, 2012. [13] F. R. K. Chung and L. Lu. Survey: Concentration inequalities and martingale inequalities: A survey. Internet Mathematics, 3(1):79–127, 2006. [14] C. Cooper, R. Elsässer, and T. Radzik. The power of two choices in distributed voting. In Proc. 41st International Colloquium on Automata, Languages, and Programming, ICALP 2014, Copenhagen, Denmark, Part II, pages 435–446, 2014. [15] J. Czyzowicz, L. Gasieniec, A. Kosowski, E. Kranakis, P. G. Spirakis, and P. Uznanski. On convergence and threshold properties of discrete Lotka-Volterra population protocols. In Proc. 42nd International Colloquium on Automata, Languages, and Programming, ICALP 2015, Kyoto, Japan, Part I, pages 393–405, 2015. [16] A. Dobrinevski and E. Frey. Extinction in neutrally stable stochastic Lotka-Volterra models. Phys. Rev. E, 85:051903, May 2012. [17] B. Doerr, C. Doerr, and T. Kötzing. The right mutation strength for multi-valued decision variables. In T. Friedrich, F. Neumann, and A. M. Sutton, editors, Proceedings of the 2016 on Genetic and Evolutionary Computation Conference, Denver, CO, USA, July 20 - 24, 2016, pages 1115–1122. ACM, 2016. [18] B. Doerr, M. Fouz, and T. Friedrich. Social networks spread rumors in sublogarithmic time. Electronic Notes in Discrete Mathematics, 38:303–308, 2011. [19] B. Doerr, D. Johannsen, and C. Winzen. Multiplicative drift analysis. CoRR, abs/1101.0776, 2011. [20] B. Doerr and M. Künnemann. Tight analysis of randomized rumor spreading in complete graphs. In 2014 Proc. Eleventh Workshop on Analytic Algorithmics and Combinatorics, ANALCO 2014, Portland, Oregon, USA, January 6, 2014, pages 82–91, 2014. [21] D. Doty. Timing in chemical reaction networks. In Proc. Twenty-Fifth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2014, Portland, Oregon, USA, January 5-7, 2014, pages 772–784, 2014. [22] U. Feige, D. Peleg, P. Raghavan, and E. Upfal. Randomized broadcast in networks. In Algorithms, International Symposium SIGAL ’90, Tokyo, Japan, 1990, pages 128–137, 1990. [23] N. Fountoulakis and K. Panagiotou. Rumor spreading on random regular graphs and expanders. Random Struct. Algorithms, 43(2):201–220, 2013. [24] A. M. Frieze and G. R. Grimmett. The shortest-path problem for graphs with random arc-lengths. Discrete Applied Mathematics, 10(1):57–77, 1985. [25] L. Gasieniec and G. Stachowiak. Fast space optimal leader election in population protocols. (To appear, SODA 2018.) CoRR, abs/1704.07649, 2017. [26] G. Giakkoupis, Y. Nazari, and P. Woelfel. How asynchrony affects rumor spreading time. In Proc. 2016 ACM Symposium on Principles of Distributed Computing, PODC 2016, Chicago, IL, USA, pages 185–194, 2016. [27] A. Goldbeter. Computational approaches to cellular rhythms. Nature, 420(6912):238–245, Nov. 2002. 54 [28] J. Hofbauer and K. Sigmund. Evolutionary Games and Population Dynamics. Cambridge University Press, 1998. [29] R. M. Karp, C. Schindelhauer, S. Shenker, and B. Vöcking. Randomized rumor spreading. In 41st Annual Symposium on Foundations of Computer Science, FOCS 2000, 12-14 November 2000, Redondo Beach, California, USA, pages 565–574, 2000. [30] B. Kerr, M. A. Riley, M. W. Feldman, and B. J. M. Bohannan. Local dispersal promotes biodiversity in a real-life game of rock-paper-scissors. Nature, 418(6894):171–174, Jul 2002. [31] B. C. Kirkup and M. A. Riley. Antibiotic-mediated antagonism leads to a bacterial game of rockpaper-scissors in vivo. Nature, 428(6981):412–414, Mar 2004. [32] L. Lamport. Time, clocks, and the ordering of events in a distributed system. Commun. ACM, 21(7):558–565, 1978. [33] P. K. Lehre and C. Witt. General drift analysis with tail bounds. CoRR, abs/1307.2559, 2013. [34] C. Lenzen, T. Locher, P. Sommer, and R. Wattenhofer. Clock synchronization: Open problems in theory and practice. In Proc. 36th Conference on Current Trends in Theory and Practice of Computer Science, SOFSEM 2010, Spindleruv Mlýn, Czech Republic, pages 61–70, 2010. [35] C. Lenzen, T. Locher, and R. Wattenhofer. Clock synchronization with bounded global and local skew. In 49th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2008, October 25-28, 2008, Philadelphia, PA, USA, pages 509–518, 2008. [36] A. J. Lotka. Contribution to the theory of periodic reactions. The Journal of Physical Chemistry, 14(3):271–274, 1909. [37] J. Lundelius and N. A. Lynch. A new fault-tolerant algorithm for clock synchronization. In Proc. Third Annual ACM Symposium on Principles of Distributed Computing, Vancouver, B. C., Canada, pages 75–88, 1984. [38] G. B. Mertzios, S. E. Nikoletseas, C. L. Raptopoulos, and P. G. Spirakis. Determining majority in networks with local interactions and very small local memory. Distributed Computing, 30(1):1–16, 2017. [39] O. Michail, I. Chatzigiannakis, and P. G. Spirakis. New Models for Population Protocols. Synthesis Lectures on Distributed Computing Theory. Morgan & Claypool Publishers, 2011. [40] K. Panagiotou and L. Speidel. abs/1608.01766, 2016. Asynchronous rumor spreading on random graphs. CoRR, [41] M. Parker and A. Kamenev. Extinction in the Lotka-Volterra model. Phys. Rev. E, 80:021129, 2009. [42] B. Pittel. On spreading a rumor. SIAM J. Appl. Math., 47(1):213–223, Mar. 1987. [43] V. B. Priezzhev, D. Dhar, A. Dhar, and S. Krishnamurthy. Eulerian walkers as a model of selforganized criticality. Phys. Rev. Lett., 77:5079–5082, Dec 1996. [44] T. Reichenbach, M. Mobilia, and E. Frey. Coexistence versus extinction in the stochastic cyclic Lotka-Volterra model. Phys. Rev. E, 74:051907, Nov 2006. [45] T. Sauerwald. On mixing and edge expansion properties in randomized broadcasting. Algorithmica, 56(1):51–88, 2010. [46] A. Szolnoki, M. Mobilia, L. Jiang, B. Szczesny, A. M. Rucklidge, and M. Perc. Cyclic dominance in evolutionary games: A review. CoRR, abs/1408.6828, 2014. 55 56 Figure 9: Illustration of concentration of various features as a function of time steps for a simulation of the protocol Po for n = 106 , p = 6 · 10−2 , q = 10−2 , r = 10−1 , s = 1 in various scenarios. Left column shows concentration of species A1 , A2 , A3 , middle one the majority layer and right one light. First row: initialization from a corner configuration (#X = 1, left panel), further dynamics of the protocol after rumor source is removed (#X = 0, middle panel), further dynamics of the protocol after rumor source is reinserted (#X = 1, right panel). Middle row: initialization from a configuration with A1 = A2 = A3 = 1/3 and #X = 0. Bottom row: as above, with #X = 1. The range of the horizontal time scale corresponds to 2500 parallel rounds of the protocol. APPENDIX: Simulation Examples for Oscillator Dynamics
8cs.DS
1 State measurement error-to-state stability results based on approximate discrete-time models arXiv:1803.08970v1 [cs.SY] 23 Mar 2018 A. J. Vallarella and H. Haimovich Abstract—Digital controller design for nonlinear systems may be complicated by the fact that an exact discrete-time plant model is not known. One existing approach employs approximate discrete-time models for stability analysis and control design, and ensures different types of closedloop stability properties based on the approximate model and on specific bounds on the mismatch between the exact and approximate models. Although existing conditions for practical stability exist, some of which consider the presence of process disturbances, input-to-state stability with respect to state-measurement errors and based on approximate discretetime models has not been addressed. In this paper, we thus extend existing results in two main directions: (a) we provide input-to-state stability (ISS)-related results where the input is the state measurement error and (b) our results allow for some specific varying-sampling-rate scenarios. We provide conditions to ensure semiglobal practical ISS, even under some specific forms of varying sampling rate. These conditions employ Lyapunov-like functions. We illustrate the application of our results on numerical examples, where we show that a bounded state-measurement error can cause a semiglobal practically stable system to diverge. Index Terms—Sampled-data; nonlinear systems; non-uniform sampling; input-to-state stability (ISS); approximate models; measurement errors. I. I NTRODUCTION Digital controller design for nonlinear systems can be substantially more complicated than for linear systems. One of the main obstacles to the design of adequate digital controllers for nonlinear (continuoustime) plants is that even if a continuous-time plant model is known, the corresponding exact discrete-time model, i.e. the model that describes the state evolution at the sampling instants, can be difficult or even impossible to obtain. This happens because the computation of the exact discrete-time model requires knowledge of the solution to a nonlinear differential equation. Interesting existing results address controller design based on an approximate discrete-time model of the plant and ensure the stabilization of the original continuous-time plant in a practical sense [1]–[4]. A general framework for stabilization of disturbance-free sampled-data nonlinear systems via approximate discrete-time models was developed in [1], [2] with further generalization for continuoustime plants with disturbances in [3]–[5] and for observer design in [6]. All of these approches are specifically suited to uniform-sampling, i.e. the sampling rate is constant during operation. In many sampled-data control systems, the use of a non-uniform sampling period is necessary, usually imposed by performance requirements of the plant, hardware limitations or network communication constraints. The occurrence of non-uniform sampling is typical of Networked Control Systems (NCSs). The main feature of NCSs is that the different system components exchange data over a communication network. Results for control design based on approximate discrete-time models also exist for different NCS scenarios. In [7], controller design for nonlinear NCSs with timevarying sampling periods, time-varying delays and packet dropouts is considered, based on approximate discrete-time models constructed The authors are with Centro Internacional Franco-Argentino de Ciencias de la Información y de Sistemas (CIFASIS), CONICET-UNR, Ocampo y Esmeralda, 2000 Rosario, Argentina. {vallarella,haimovich}@cifasis-conicet.gov.ar Work partially supported by ANPCyT grant PICT 2013-0852, Argentina. for nominal sampling period and delays. All of the results mentioned so far ensure practical stability properties for sufficiently small sampling periods, with ultimate bounds of decreasing size in correspondence with decreasing maximum sampling periods. Related but conceptually different results exist for dual- or multirate sampling, where some constraint exists on how fast measurements can be taken [8]–[10]. These results give closed-loop practical stability warranties and employ approximate discrete-time models in order to predict the state evolution at the control update instants, since new measurements may not be available at each of these instants. Specifically, [10] proposes a multi-rate sampled-data scheme to stabilize a NCS via output feedback using discrete-time approximations. The results of [10] as well as those of [7] give practical stability and robustness warranties for deviations about a nominal situation. Non-uniform sampling is also a feature of event-triggered control, where a triggering condition based on a continuous measurement of system variables (e.g. the system state) determines when the control action has to be updated [11], [12]. Strategies that also involve nonuniform sampling but require only sampled measurements are those of self-triggered control [12]–[14]. Self-triggered control computes both the control action and the next sampling instant at which the control action should be recomputed. In both event-triggered and selftriggered control, we may thus say that sampling is controller-driven, since the controller itself is in charge of computing the next sampling instant. The objective of this paper is to provide practical stability results based on approximate discrete-time models, and allowing some specific non-uniform sampling scenarios. Our results are, however, independent of the mechanism employed to vary the sampling rate. In this context, the main contribution of the current paper is to provide conditions on the approximate discrete-time plant model and the control law in order to ensure closed-loop semiglobal-practical input-to-state stability (see Section II-B for the precise definition), where the ‘input’ is the state measurement error. Our results are novel even for the uniform sampling case. The fact that state measurement errors be considered causes the analysis to become substantially different from that of disturbances affecting the plant dynamics (as in [3]). This is because if based on a perturbed state measurement, the control action will itself have some error, and this in turn will cause some intersample error additional to that introduced by the approximation in the discrete-time model. More specific differences between the given and existing results will be explained along the paper. The fact that some specific varying-sampling-rate scenarios be covered increases the applicability of our results. Related preliminary results dealing with closed-loop stability possibly under controller-driven sampling (without measurement errors) have been given in [15], [16]. The organization of this paper is as follows. This section ends with a brief summary of the notation employed throughout the paper. In Section II we state the problem and the required definitions and properties. Our main results are given in Section III. An illustrative example is provided in Section IV and concluding remarks are presented in Section V. The appendix contains the proofs of some intermediate technical points. 2 Notation: R, R≥0 , N and N0 denote the sets of real, nonnegative real, natural and nonnegative integer numbers, respectively. A function α : R≥0 → R≥0 is of class-K (we write α ∈ K) if it is strictly increasing, continuous and α(0) = 0. It is class-K∞ (α ∈ K∞ ) if in addition α(s) → ∞ as s → ∞. A function β : R≥0 × R≥0 → R≥0 is of class-KL (β ∈ KL) if β(·, t) ∈ K for all t ≥ 0, and β(s, ·) is strictly decreasing asymptotically to 0 for every s. We denote the identity function by id. We denote the Euclidean norm of a vector x ∈ Rn by |x|. Given a set X ⊂ Rn we denote its ǫ neighborhood as N (X , ǫ) := {x : inf y∈X |x − y| ≤ ǫ}. We denote an infinite sequence as {Ti } := {Ti }∞ i=0 . For any sequences {Ti } ⊂ R≥0 and m {e i } ⊂ R , and any γ ∈ K, we take the following conventions: P−1 i=0 Ti = 0 and γ(sup0≤i≤−1 |ei |) = 0. Given a real number T > 0 we denote by Φ(T ) := {{Ti } : {Ti } ⊂ (0, T )} the set of all sequences of real numbers in the open interval (0, T ). For a given sequence we denote the norm k{xi }k := supi≥0 |xi |. II. P RELIMINARIES A. Problem statement We consider the nonlinear continuous-time plant ẋ = f (x, u), x(0) = x0 , (1) where x(t) ∈ Rn , u(t) ∈ Rm are the state and control vectors respectively and f (0, 0) = 0. As in [1], the function f : Rn × Rm → Rn is assumed to be such that for each initial condition and constant control, there exists a unique solution on some interval [0, τ ) with 0 < τ ≤ ∞. We consider that state measurements become available at time instants tk , k ∈ N0 , that satisfy t0 = 0 and tk+1 = tk + Tk , where {Tk }∞ k=0 is the sequence of corresponding sampling periods. As opposed to the uniform sampling case where Tk = T for all k ∈ N0 , the sampling periods Tk may vary. We refer to this situation as Varying Sampling Rate (VSR). The control signal is assumed to be piecewise constant (i.e. zero-order hold is present) such that u(t) = u(tk ) =: uk for all t ∈ [tk , tk+1 ). We denote the state at the sampling instants by xk := x(tk ). The control action uk may depend on the state measurement x̂k = xk + ek , with ek the state measurement error, and also on the sampling period Tk , i.e. we have uk = U (x̂k , Tk ). The dependence of the control action at time tk , on the sampling period Tk = tk+1 − tk is possible in the following situations: (a) uniform sampling; (b) controller-driven sampling (such as self-triggered control [13], or others [17]). In the situation (a), the constant sampling period employed can be known before the controller is implemented. This is the setting in [2]–[4]. In (b), at each sampling instant tk , the controller may select the next sampling instant tk+1 and, thus, the current sampling period Tk . As a consequence, knowledge of Tk can be employed in order to compute the current control action uk . However, our results will be still valid in the particular case uk = Ū (x̂k ), where the control law does not explicitly depend on the sampling period. In addition, our results are independent of the way in which the sampling periods Tk may vary over time. Fig. 1 depicts the complete closed-loop system. The exact discrete-time model for a given nonlinear system is the discrete-time system whose state matches the state of the continuoustime system at every sampling instant. From (1), and given that the plant input u is held constant over each sampling interval, it is clear that the state value at the next sampling instant, namely xk+1 , will depend on the current state value xk , the current input value uk , and the sampling period Tk . Hence, a discrete-time model for the case of zero-order hold and VSR can be written as xk+1 = F e (xk , uk , Tk ), (2) uk u(t) ZOH x(t) SENSOR PLANT Tk x̂k=xk+ek CONTROLLER Fig. 1. Schematic diagram of the controlled plant where the superscript e stands for “exact”. Due to the fact that the solution to (1) does not necessarily exist for all future times, then the exact discrete-time model F e (·, ·, ·) may be not defined for every (x, u, T ) ∈ Rn × Rm × R≥0 . However, we assume that f in (1) has sufficient regularity so that for every pair of compact sets X ⊂ Rn and U ⊂ Rm , there exists some T ∗ > 0 so that F e (x, u, T ) is defined for every (x, u, T ) ∈ X × U × [0, T ∗ ). The exact model F e is in general very hard or even impossible to obtain and thus some type of approximation may be necessary for the design of a stabilizing controller. A superscript a will be used to denote an approximate model: xk+1 = F a (xk , uk , Tk ). (3) We will use ‘F ’ with no superscript to denote any discrete-time model (either exact or approximate). Under the feedback law uk = U (x̂k , Tk ) = U (xk + ek , Tk ), the closed-loop discrete-time model becomes xk+1 = F (xk , U (xk + ek , Tk ), Tk ) =: F̄ (xk , ek , Tk ), (4) where the measurement error ek (disturbance) is regarded as an input. Hence, given a control law/discrete-time model pair (U, F ), the quantity F̄ will denote the composition of F and U as shown in (4). Whenever required, we will write x(k, ξ, {ei }, {Ti }) to denote the solution of (4) at time k with initial condition ξ at k = 0, and corresponding to the measurement error and sampling period sequences {ei } and {Ti }. B. Stability properties for varying sampling rate Our objective is to provide conditions that ensure stability properties of the exact discrete-time closed-loop system under the varyingsampling-rate case. The following definition constitute a natural extension of the semiglobal practical ISS [3], [18], [19] property. Definition 2.1: The system (4) is said to be Semiglobal Practical ISS-VSR (SP-ISS-VSR) if there exist functions β ∈ KL and γ ∈ K∞ such that for every M > 0, E > 0 and R > 0 there exists T ⋆ > 0 such that the solutions of (4) satisfy !   k−1 X Ti + γ |xk | ≤ β |x0 |, sup |ei | + R, (5) i=0 0≤i≤k−1 for all1 k ∈ N0 , all {Ti } ∈ Φ(T ⋆ ), all |x0 | ≤ M and all k{ei }k ≤ E. The function F̄ is said to be SP-ISS-VSR if the system (4) defined by F̄ is SP-ISS-VSR. Remark 2.2: Note that the sequences of constant sampling periods {Ti } such that Ti = T > 0 for all i ∈ N0 are included in the set Φ(T ⋆ ) whenever T ⋆ > T . This implies that if any of the above properties holds for a certain system then the respective properties for the uniform sampling case also hold. 1 As explained under “Notation” in Section I, for k = 0 we interpret P−1 i=0 Ti = 0 and γ(sup0≤i≤−1 |ei |) = 0. 3 Remark 2.3: Setting k = 0 in (5), it follows that |x0 | ≤ β(|x0 |, 0) + R holds for every x0 ∈ Rn and every R > 0. As a consequence, any function β ∈ KL characterizing SP-ISS-VSR has the additional property that r ≤ β(r, 0) for all r ≥ 0. This property will be repeatedly employed for the proof of our results. Lemma 2.7: If (U, F a ) is MSEC with (U, F e ) then for each compact sets X ⊂ Rn and E ⊂ Rn , and constants L > 0 and η > 0, there exists T̃ > 0 such that, if {Ti }, {ei } and ξ satisfy for all k for which e The next definition, as appears in [6, Definition 1], ensures that the mismatch between the solutions of the exact and approximate systems over one sampling period is bounded by a value that depends on the sampling period, uniformly over states and inputs in compact sets. This bound tends to zero in a specific way as the sampling period becomes smaller. Definition 2.4: The function F a is said to be consistent with F e if for each compact set Ω ⊂ Rn × Rm , there exist ρ ∈ K and T0 > 0 such that, for all (x, u) ∈ Ω and all T ∈ [0, T0 ], (6) Definition 2.4 is similar to the definition of one-step consistency in [1, Defintion 1]. However, the main difference lies in the fact that Definition 2.4 is “open-loop” whereas Definition 1 of [1] involves the feedback law. In the current setting of imperfect state knowledge, consideration of the feedback law would be meaningless unless the state measurement error be also considered (cf. Defintion 2.6 below). The following lemma is a minor modification of Lemma 1 of [1] that gives sufficient conditions for the consistency of F a with F e , based on f and F a , and hence without requiring knowledge of F e . The required modification is due to the fact that in the current setting the feedback law cannot assume perfect knowledge of the state. The proof closely follows the proof of Lemma 1 of [1] but is given in the Appendix for completeness. Lemma 2.5: Suppose that i) F a is consistent with F Euler , where F Euler (x, u, T ) := x + T f (x, u), and ii) for every pair of compact sets X ⊂ Rn and U ⊂ Rm , there exist ρ ∈ K and M > 0 such that for all (x, u), (y, u) ∈ X × U, a) |f (y, u)| ≤ M , b) |f (y, u) − f (x, u)| ≤ ρ(|y − x|). a Then, F is consistent with F . The following definition extends the definition of multi-step consistency in [1] to the varying-sampling-rate scenario considered and to the case of state measurement errors. Definition 2.6: The pair (U, F a ) is said to be Multi-Step Error Consistent (MSEC) with (U, F e ) if, for each L > 0, η > 0 and compact sets X ⊂ Rn and E ⊂ Rn , there exist a function α : R≥0 × R≥0 → R≥0 and T ∗ > 0 such that (7) for all xe , xa ∈ X satisfying |xe − xa | ≤ δ, all e ∈ E , and P all T ∈ (0, T ∗ ), and for all {Ti } ∈ Φ(T ∗ ) and k ∈ N such that k−1 i=0 Ti ≤ L we have k z }| { α (0, {Ti }) := α(. . . α(α( 0, T0 ), T1 ), . . . , Tk−1 ) ≤ η. k i=0 ek ∈ E , (9) Ti ∈ [0, L], then, for these values of k The next lemma gives a sufficient condition for MSEC. This lemma can be regarded as the corresponding extension of [1, Lemma 3]. Lemma 2.8: If, for each compact sets X ⊂ Rn and E ⊂ Rn there exist ρ0 ∈ K, a nondecreasing function σ : R≥0 → R≥0 and T ∗ > 0 such that for all T ∈ (0, T ∗ ) and all x, y ∈ X , e ∈ E we have |F̄ e (x, e, T ) − F̄ a (y, e, T )| ≤ T ρ0 (T ) + (1 + T σ(T ))|x − y| (11) then, (U, F a ) is MSEC with (U, F e ). Proof: Let L > 0 and η > 0, and let X ⊂ Rn and E ⊂ Rn be compact sets. Define the compact set X˜ := N (X , η) and let X̃ and E generate ρ0 ∈ K, σ and T ∗ > 0. Select T̂ > 0 sufficiently small so that T̂ ≤ T ∗ and eσ(T̂ )L ρ0 (T̂ )L ≤ η. Define α(δ, T ) := T ρ0 (T ) + (1 + T σ(T ))δ. (12) Let x, y ∈ X be such that |x − y| ≤ δ, let e ∈ E , and T ∈ (0, T̂ ). From (11) and (12), then (7) is satisfied. Consider {Ti } ∈ Φ(T̂ ). Using (12), we may recursively define η0 := 0 and, for k ≥ 1, ηk := αk (0, {Ti }) = Tk−1 ρ0 (Tk−1 ) + (1 + Tk−1 σ(Tk−1 ))ηk−1 Recursively employing the latter formula, we may write, for k ≥ 1 P and such that k−1 i=0 Ti ≤ L, ηk = Tk−1 ρ0 (Tk−1 ) + k−2 X Tj ρ0 (Tj ) j=0 ≤ Tk−1 ρ0 (Tk−1 ) + k−2 X k−1 Y (1 + Ti σ(Ti )) i=j+1 Tj ρ0 (Tj )eσ(T̂ ) Pk−1 j+1 Ti j=0 ≤ Tk−1 ρ0 (Tk−1 ) + eσ(T̂ )L k−2 X Tj ρ0 (Tj ) j=0 e |F̄ e (xe , e, T ) − F̄ a (xa , e, T )| ≤ α(δ, T ) Pk−1 |∆xk | := |x (k, ξ, {ei }, {Ti }) − xa (k, ξ, {ei }, {Ti })| ≤ η. (10) C. Model consistency with non-ideal state measurements |F e (x, u, T ) − F a (x, u, T )| ≤ T ρ(T ). xa (k, ξ, {ei }, {Ti }) ∈ X , {Ti } ∈ Φ(T̃ ), (8) The next lemma constitutes the corresponding extension of [1, Lemma 2] and shows that under MSEC, the error between the approximate and exact solutions over a fixed time period is reduced by making the maximum sampling period smaller. The proof is given in the Appendix for the sake of completeness. ≤ eσ(T̂ )L k−1 X Tj ρ0 (Tj ) ≤ eσ(T̂ )L ρ0 (T̂ ) j=0 ≤ eσ(T̂ )L ρ0 (T̂ )L ≤ η, k−1 X Tj j=0 where we have used the facts that for every a > 0, 1 + a ≤ ea , and Ti < T̂ for every i ∈ N0 . This shows that (U, F a ) is MSEC with (U, F e ). For the sake of completeness, we next state the definition of locally uniformly bounded control law as in [3, Defintion II.4]. Definition 2.9: U (x, T ) is said to be locally uniformly bounded if for every M > 0 there exist T ∗ = T ∗ (M ) > 0 and C = C(M ) > 0 such that |U (x, T )| ≤ C for all |x| ≤ M and T ∈ (0, T ∗ ). Lemma 2.10 gives sufficient conditions for MSEC based on consistency (as per Definition 2.4) and properties of the control law and approximate model. Lemma 2.10: Suppose that i) F a is consistent with F e as per Definition 2.4. ii) U (x, T ) is locally uniformly bounded as per Definition 2.9. iii) For each compact sets X , E ⊂ Rn there exist a nondecreasing function σ : R≥0 → R≥0 and T1 > 0 such that for all x, z ∈ X , e ∈ E and T ∈ (0, T1 ) we have |F̄ a (x, e, T ) − F̄ a (z, e, T )| ≤ (1 + T σ(T ))|x − z|. (13) 4 Then, (U, F a ) is MSEC with (U, F e ). Proof: Let X ⊂ Rn and E ⊂ Rn be compact, and let M > 0 be such that |x + e| ≤ M for all x ∈ X and e ∈ E . From ii), there exist T ∗ (M ) > 0 and C(M ) > 0 such that |U (x + e, T )| ≤ C for all T ∈ (0, T ∗ ), x ∈ X and e ∈ E . Define C := {u ∈ Rm : |u| ≤ C} and Ω := X × C. From i), there exist ρ ∈ K and T0 > 0 such that |F e (x, U (x + e, T ), T ) − F a (x, U (x + e, T ), T )| ≤ T ρ(T ) (14) for all T ∈ (0, T2 ), x ∈ X and e ∈ E with T2 := min{T ∗ , T0 }. For all x, z ∈ X and e ∈ E we have |F e (x, U (x + e, T ), T ) − F a (z, U (z + e, T ), T )| ≤|F e (x, U (x + e, T ), T ) − F a (x, U (x + e, T ), T )| + |F a (x, U (x + e, T ), T ) − F a (z, U (z + e, T ), T )|. |F e (x, U (x + e, T ), T )−F a (z, U (z + e, T ), T )| (16) a hence (11) holds. By Lemma 2.8, then (U, F ) is MSEC with (U, F e ). In the next section, we give conditions on the approximate model and control law in order to establish the semiglobal practical ISS for the (exact) closed-loop system. III. M AIN R ESULTS In this section, we show that under MSEC, the SP-ISS-VSR property for the approximate model carries over to the exact model. Our first contribution is the following. Theorem 3.1: Suppose that (U, F a ) is MSEC with (U, F e ), and that the system xak+1 = F̄ a (xak , ek , Tk ) is SP-ISS-VSR. Then, the system xek+1 = F̄ e (xek , ek , Tk ) is SP-ISS-VSR. Proof: Let β ∈ KL and γ ∈ K∞ characterize the SP-ISS-VSR property of xak+1 = F̄ a (xak , ek , Tk ). Define γ̂(·) := β(2γ(·), 0) + γ(·). (17) Let M > 0, E > 0 and R > 0, and select η > 0 and Ra > 0 such that 6η ≤ M, β(6η, 0) + Ra < R/2, Ra < η. (18) Since xak+1 = F̄ a (xak , ek , Tk ) is SP-ISS-VSR, in correspondence with M̃ := M + γ(E), E and Ra , there exists T a > 0 such that for all k ∈ N0 , !   k−1 X a a |xk | ≤ β |x0 |, sup |ei | + Ra (19) Ti + γ i=0 0≤i≤k−1 |xa0 | a whenever ≤ M̃ and for all sequences {Ti } and {ei } such that {Ti } ∈ Φ(T ) and k{ei }k ≤ E. Define X̃ := {x ∈ Rn : |x| ≤ β(M̃ , 0) + γ(E) + Ra } (20) E := {e ∈ Rn : |e| ≤ E}. (21) Let L > 1 satisfy    β β M, 0 + γ(E) + Ra , L − 1 ≤ η. |xe (k,ξ, {ei }, {Ti })| ≤ |xa (k, ξ, {ei }, {Ti })| + |∆x0k,ξ | !   k−1 X ≤ β |ξ|, Ti + γ sup |ei | + Ra + η ≤β |ξ|, i=0 k−1 X (22) (23) 0≤i≤k−1 Ti i=0 ! + γ̂  sup 0≤i≤k−1  |ei | + R, (24) P for all k for which k−1 i=0 Ti ≤ L, where we have used the facts that γ ≤ γ̂ and η + Ra ≤ 6η + Ra ≤ β(6η, 0) + Ra < R/2 < R. For every k ∈ N0 , define ) ( r−1 X Ti ≤ L . (25) s(k) := max r ∈ N0 : r ≥ k + 1, i=k Note that s(k) ≥ k + 1 for all k ∈ N0 because L > 1 and Ti < 1 Ps(k)−1 for all i ∈ N0 . Also, i=k Ti > L − T ⋆ > L − 1 holds for all k ∈ N0 . We thus have   s(0)−1 X Ti  ≤ β(M, L − 1) β |ξ|, i=0 ≤ β(β(M, 0) + γ(E) + Ra , L − 1) ≤ η, (26) where we have used the fact M ≤ β(M, 0) and (22). Evaluating (23) at k = s(0), using (18) and (26), and defining xek := xe (k, ξ, {ei }, {Ti }) it follows that   ! s(0)−1 X e |xs(0) | ≤ β |ξ|, sup |ei | + Ra + η Ti  + γ 0≤i≤s(0)−1 i=0 ≤ γ (E) + 3η ≤ M̃ . (27) Claim 1: Suppose that |xer | ≤ γ(E) + 3η for some r ∈ N0 . Then, ≤ γ(E) + 3η and |xek | ≤ γ̂(E) + R for all r ≤ k ≤ s(r). Proof of Claim 1: Set xa0 = xer and consider xak+1 = F̄ a (xak , ek+r , Tk+r ) for all k ∈ N0 . For all r ≤ k ≤ s(r), we have |xes(r) | |xek | = |xe (k, ξ, {ei }, {Ti })| = |xe (k − r, xer , {ei+r }, {Ti+r })| ≤ |xak−r | + |∆xrk,xer |. (28) Since |xa0 | ≤ γ(E) + 3η ≤ M̃ , {ei } ⊂ E , {Ti } ∈ Φ(T ⋆ ) ⊂ Φ(T a ), and since F̄ a is SP-ISS-VSR, then for all k ∈ N0 we have !   k−1 X a a Ti+r + γ |xk | ≤ β |x0 |, sup |ei+r | + Ra 0≤i≤k−1 i=0 Take T̃ > 0 in correspondence with the tuple (X̃ , E , L, η), as per Lemma 2.7. We will show that β ∈ KL and γ̂ ∈ K∞ characterize the SP-ISS-VSR of xek+1 = F̄ e (xek , ek , Tk ), with T ⋆ := min{1, T a , T̃ }. Consider sequences {ei } ⊂ E and {Ti } ⊂ Φ(T ⋆ ). For every k, ℓ ∈ N0 and ξ ∈ Rn , define ∆xℓk,ξ := From (19) and (20) it follows that if |xa0 | ≤ M̃ , then xak ∈ X̃ for all k ∈ N0 . Consider an initial condition xe0 = xa0 = ξ such that |ξ| ≤ e M ≤ M̃ . Since (U, F a ) is MSEC 2.7 it Pk−1with (U, F ), by Lemma follows that for all k such that i=0 Ti ≤ L, we have |∆x0k,ξ | ≤ η. We thus have (15) Defining T̂ := min{T1 , T2 } and using (13) and (14) in (15), then ≤T ρ(T ) + (1 + T σ(T ))|x − z|, |xe (k − ℓ, ξ, {ei+ℓ }, {Ti+ℓ }) − xa (k − ℓ, ξ, {ei+ℓ }, {Ti+ℓ })|. ≤β γ(E) + 3η, k−1 X i=0 ≤β M̃ , k−1 X Ti+r i=0 ! Ti+r ! + γ(E) + Ra (29) + γ(E) + Ra . It thus follows that xak ∈ X̃ for all k ∈ N0 . By Lemma 2.7, we have |∆xrk,xer | ≤ η for all r ≤ k ≤ s(r). (30) 5 Combining the bounds obtained so far, we reach, for all r ≤ k ≤ s(r), ! k−1 X |xek | ≤ β M̃ , (31) Ti + γ (E) + 2η. i=r In particular at k = s(r), and taking into account that M̃ = M + γ(E) ≤ β(M, 0) + γ(E) + Ra , we obtain   s(r)−1 X e Ti  + γ (E) + 2η |xs(r) | ≤ β β(M, 0) + γ(E) + Ra , i=r ≤ γ (E) + 3η (32) P where we have used the fact that s(r)−1 Ti > L − 1 and (22). i=r From (28)–(30), we have, for all r ≤ k ≤ s(r), |xek | ≤ β(γ(E) + 3η, 0) + γ(E) + Ra + η ≤ γ̂(E) + β(6η, 0) + Ra + η (33) where we have used the fact that η < 6η < β(6η, 0) + Ra < R/2. This concludes the proof of the claim. ◦ Since from (27) we have |xes(0) | ≤ γ(E)+3η, iterative application of Claim 1 and the fact that s(k) ≥ k + 1 for all k ∈ N0 show that |xek | ≤ γ̂(E) + R for all k ≥ s(0). Combining the latter bound with (24), valid for 0 ≤ k ≤ s(0), it follows that ! k−1 X e Ti + γ̂(E) + R, ∀k ≥ 0. |xk | ≤ β |ξ|, (34) i=0 The proof concludes by noting that, by causality, the trajectory xek cannot depend on future values of ei , and hence E in (34) can be replaced by sup0≤i≤k−1 |ei |. Theorem 3.1 shows that the SP-ISS-VSR property for the exact closed-loop discrete-time model can be ensured under MSEC if the approximate closed-loop discrete-time model is SP-ISS-VSR. It would thus be useful to have checkable conditions in order to ensure that the approximate model is suitable. A set of conditions is given by Theorem 3.2, which states Lyapunov-based sufficient conditions for a discrete-time (closed-loop) model to be SP-ISSVSR. These conditions consist of specific boundedness and continuity requirements and a Lyapunov-type condition on the closed-loop model. Theorem 3.2 constitutes the main contribution of the current paper and its proof, which is highly nontrivial, consitutes our main technical result. Theorem 3.2: Suppose that i)–iv) are satisfied. i) There exists T̊ > 0 so that F̄ (0, 0, T ) = 0 for all T ∈ (0, T̊ ). ii) There exists T̂ > 0 such that for every ǫ > 0 there exists δ = δ(ǫ) > 0 such that |F̄ (x, e, T )| < ǫ whenever |x| ≤ δ, |e| ≤ δ and T ∈ (0, T̂ ). iii) For every M ≥ 0 and E ≥ 0, there exist C = C(M, E) > 0 and Ť = Ť (M, E) > 0, with C(·, ·) nondecreasing in each variable and Ť (·, ·) nonincreasing in each variable, such that |F̄ (x, e, T )| ≤ C for all |x| ≤ M , |e| ≤ E and T ∈ (0, Ť ). iv) There exist α1 , α2 , α3 ∈ K∞ and ρ ∈ K such that for every M ≥ R > 0 and E > 0 there exist T̃ = T̃ (M, E, R) > 0 and V : Rn → R≥0 such that α1 (|x|) ≤ V (x) ≤ α2 (|x|), ∀x ∈ Rn , and V (F̄ (x, e, T )) − V (x) ≤ −T α3 (|x|), ρ(|e|) + R ≤ |x| ≤ M, |e| ≤ E, (35) ∀(x, e, T ) satisfying T ∈ (0, T̃ ). i=0 0≤i≤k−1 Consider ρ ∈ K from iv). Define, ∀s ≥ 0, ∀r ≥ 0, X1 (s, r) := {x ∈ Rn : |x| ≤ ρ(s) + r} (38) E (s) := {e ∈ Rn : |e| ≤ s} n o T̄ (s, r) := min Ť (ρ(s) + s, s), Ť (ρ(r) + r, r), T̂ , T̊ S(s, r) := X1 (s, r) × E (s) × (0, T̄ (s, r)) (41) σ(s, r) := (42) sup |F̄ (x, e, T )|. (39) (40) (x,e,T )∈S(s,r) ≤ β(2γ(E), 0) + β(6η, 0) + γ(E) + Ra + η ≤ γ̂(E) + R, Then, the system (4) is SP-ISS-VSR. Proof: We aim to prove that there exist β ∈ KL and γ ∈ K∞ such that for all M0 > 0, E0 > 0 and R0 > 0 there exists T ⋆ > 0 such that for all {Ti } ∈ Φ(T ⋆ ), |x0 | ≤ M0 , k{ei }k ≤ E0 and k ∈ N0 , the solutions of (4) satisfy !   k−1 X Ti + γ |xk | ≤ β |x0 |, sup |ei | + R0 . (37) (36) From (38)–(39), we have X1 (0, 0) = {0} and E (0) = {0}. From assumptions i)–ii), then T̄ (0, 0) > 0 and σ(0, 0) = 0. Given that Ť (·, ·) is nonincreasing in each variable, note that Ť (ρ(s) + r, s) ≥ min{Ť (ρ(s) + s, s), Ť (ρ(r) + r, r)}, then T̄ (s, r) ≤ Ť (ρ(s) + r, s). Defining ζ(s) := σ(s, s), from (42) we have σ(s, r) ≤ ζ(s) + ζ(r). (43) Claim 2: There exists χ ∈ K∞ such that χ ≥ ζ. Proof of Claim2: Let ǫ > 0 and take δ = δ(ǫ) according to ii). Define δ̂ := min δ2 , ρ−1 ( δ2 ) (if 2δ ∈ / dom ρ−1 , just take δ̂ = δ/2). Then for all x ∈ X1 (δ̂, δ̂) and e ∈ E (δ̂) we have |x| ≤ δ and |e| ≤ δ/2. Given that |F̄ (x, e, T )| < ǫ for every |x| ≤ δ, |e| ≤ δ and T ∈ (0, T̂ ) this shows that lims→0+ ζ(s) = σ(0, 0) = 0. From iii), it follows that |F̄ (x, e, T )| ≤ C(s, s) for all |x| ≤ s, |e| ≤ s and T ∈ (0, Ť (s, s)) for every s ≥ 0. From (40)–(42) and the fact that C(·, ·) is nondecreasing in each variable, it follows that ζ(s) ≤ C(s, s) ≤ C(s̄, s̄) for all s ∈ [0, s̄] with s̄ > 0. Thus, ζ(s) < ∞ for every s ≥ 0. We have ζ : R≥0 → R≥0 , ζ(0) = 0, ζ is right-continuous at zero and, by (38)–(42), nondecreasing. Then, by Lemma 2.5 of [20], there exists χ ∈ K∞ such that χ ≥ ζ. ◦ Define η ∈ K∞ and η̃ ∈ K∞ via η := max{χ, id}, (44) η̃ := max{χ, ρ}. (45) σ(s, r) ≤ η̃(s) + η(r) ∀s ≥ 0, ∀r ≥ 0. (46) By (43) we have Consider M0 > 0, E0 > 0 and R0 > 0 given and α1 , α2 , α3 ∈ 1 K∞ from iv). Select E = E0 , R = η −1 ( 12 α−1 2 ( 3 α1 (R0 ))), −1 and M = α1 ◦ α2 max{R, M0 , η̃(E0 ) + η(R0 )} . From (35), it follows that M ≥ R. Also, R ≤ R0 follows because, from (35), 1 −1 1 α ( 3 α1 (r)) ≤ α−1 2 (α1 (r)) ≤ r for all r ≥ 0, and since η(r) ≥ r 2 2 from (44), then η −1 (r) ≤ r for all r ≥ 0. Let M, E, R with iv) generate T̃ > 0 and V : Rn → R≥0 such that (35) and (36) hold. Define T ⋆ = min{T̃ , T̄ (E, R)} and X2 (s, r) := {x : V (x) ≤ α2 (η̃(s) + η(r))}. (47) Let x ∈ X1 (s, r). Then, α2 (|x|) ≤ α2 (ρ(s) + r) ≤ α2 (η̃(s) + η(r)), and using (35), then V (x) ≤ α2 (η̃(s)+η(r)). Therefore, X1 (s, r) ⊂ X2 (s, r) for all s ≥ 0 and r ≥ 0. Let xk denote the solution to (4) corresponding to |x0 | ≤ M0 , k{ei }k ≤ E0 and {Ti } ∈ Φ(T ⋆ ). From (35) we have that α−1 2 (V (xk )) ≤ |xk |; using this in (36) then V (xk+1 ) − V (xk ) ≤ −Tk α3 (|xk |) ≤ −Tk α(V (xk )) if ρ(|ek |) + R ≤ |xk | ≤ M (48) 6 where α := α3 ◦ α−1 2 . Claim 3: If |x0 | ≤ M0 then |xk | ≤ M for all k ∈ N0 . Proof of Claim 3: From (35), |x0 | ≤ M0 implies that V (x0 ) ≤ α2 (M0 ) and |x0 | ≤ α−1 1 ◦ α2 (M0 ), and by definition of M , then |x0 | ≤ M . By induction, we will prove that V (xk ) ≤ α2 (max{M0 , η̃(E0 )+η(R0 )}) for all k ∈ N0 . Note that the assertion holds for k = 0. Suppose that V (xk ) ≤ α2 (max{M0 , η̃(E0 ) + η(R0 )}). Then, |xk | ≤ M . If xk ∈ / X1 (|ek |, R), then |xk | > ρ(|ek |) + R and from (48), then V (xk+1 ) ≤ V (xk ). If xk ∈ X1 (|ek |, R), from (42)–(43) and the definition of η̃ and η we have |xk+1 | ≤ η̃(|ek |) + η(R). Using (35), then V (xk+1 ) ≤ α2 (η̃(|ek |) + η(R)) ≤ α2 (η̃(E0 ) + η(R0 )), and hence the induction assumption holds for k + 1. Since V (xk ) ≤ α2 (max{M0 , η̃(E0 ) + η(R0 )}) implies that |xk | ≤ M , we have thus shown that |xk | ≤ M for all k ∈ N0 . ◦ Claim 4: If xℓ ∈ X2 (k{ei }k, R) for some ℓ ∈ N0 then xk remains in X2 (k{ei }k, R) for all k ≥ ℓ. Proof of Claim 4: Let xℓ ∈ X2 (k{ei }k, R). If xℓ ∈ / X1 (k{ei }k, R), then |xℓ | > ρ(k{ei }k) + R. Consequently, if xℓ ∈ X2 (k{ei }k, R) \ X1 (k{ei }k, R), from (48) it follows that and hence xℓ+1 ∈ X2 (k{ei }k, R). Next, consider that xℓ ∈ X1 (k{ei }k, R). From (42) and the definition of η̃ and η we have |xℓ+1 | ≤ η̃(k{ei }k) + η(R). Using (35) and recalling (47), then xℓ+1 ∈ X2 (k{ei }k, R). By induction, we have thus shown that if xℓ ∈ X2 (k{ei }k, R) for some ℓ ∈ N0 , then xk ∈ X2 (k{ei }k, R) for all k ≥ ℓ. ◦ P Define tk = k−1 T and the function i i=0 t − tk (V (xk+1 ) − V (xk )) Tk if t ∈ [tk , tk+1 ) , which depends on the initial condition x0 , on the sampling period sequence {Ti }, on the disturbance sequence {ei }, and on the given constants M0 , E0 , R0 (through the fact that V depends on the latter constants). Then, ẏ(t) = V (xk+1 ) − V (xk ) Tk ∀t ∈ (tk , tk+1 ) , ∀k ∈ N0 . (49) Note that y(tk ) = V (xk ), ∀k ∈ N0 . (51) = inf{tk : xk ∈ Hence (51) holds up to t = t where t does not X2 (k{ei }k, R)}. Note that the function α = α3 ◦ α−1 2 depend on any of the following quantities: x0 , {Ti }, {ei }, M0 , E0 , or R0 . Since α is positive definite, using Lemma 4.4 of [21], then there exists β1 ∈ KL such that, for all t ∈ [0, tk∗ ) we have k∗ V (x0 ), Ti i=0 !   + α2 η̃(k{ei }k) + η(R) . Using the fact that χ(a + b) ≤ χ(2a) + χ(2b) for every χ ∈ K and (35) then ! k−1 X α1 (|xk |) ≤ β1 α2 (|x0 |), Ti + α2 (2η̃(k{ei }k)) + α2 (2η(R)). i=0 Define β ∈ KL via β(s, τ ) := α−1 1 (3β1 (α2 (s), τ )) and γ ∈ K∞ via γ(s) := α−1 1 (3α2 (2η̃(s))). Recalling the definition of R then α−1 1 (3α2 (2η(R))) ≤ R0 , it follows that ! k−1 X |xk | ≤ β |x0 |, (53) Ti + γ(k{ei }k) + R0 i=0 for all k ∈ N0 , all {Ti } ∈ Φ(T ⋆ ), all |x0 | ≤ M0 and all k{ei }k ≤ E0 . We have thus established that (4) is SP-ISS-VSR. IV. E XAMPLES ẋ = x3 + u =: f (x, u) whose Euler (approximate) discrete-time model is  xk+1 = xk + Tk x3k + uk =: F a (xk , uk , Tk ). (54) (55) a This open-loop Euler model F is consistent (as per Definition 2.4) with the open-loop exact model F e . This can be established by means of Lemma 2.5 as follows. Since F a coincides with F Euler , then assumption i) of Lemma 2.5 holds; also, assumption ii) of Lemma 2.5 is easily shown to hold using f in (54). We will consider two of the feedback laws considered in [1]: U (xk , Tk ) = −xk − 3x3k , W (xk , Tk ) = −xk − x3k . (56) (57) In [1], both control laws were shown to achieve semiglobal-practical stabilization under zero-order hold and uniform sampling. Our aim here is to show that when state measurement errors are taken into consideration, the control law (56) achieves SP-ISS-VSR whereas (57) does not, not even under uniform sampling. (50) By Claim 3, for all |x0 | ≤ M0 and all tk such that xk ∈ / X2 (k{ei }k, R), (48) holds. Combining (48) with (49) it follows that for all t ∈ (tk , tk+1 ) ẏ(t) ≤ −α (y(tk )) ≤ −α (y(t)) . V (xk ) ≤ β1 k−1 X Consider the nonlinear continuous-time plant in Example 1 of [1]: V (xℓ+1 ) ≤ V (xℓ ) − Tℓ α(V (xℓ )) ≤ V (xℓ ) y(t) := V (xk )+ (52), then, for all k ∈ N0 , k∗ y(t) ≤ β1 (y(0), t) . By (50), for every k ∈ N0 such that xj ∈ / X2 (k{ei }k, R) for all 0 ≤ j ≤ k, we have that ! k−1 X V (xk ) ≤ β1 V (x0 ), Ti . (52) i=0 From Claim 4 and (47), if xj ∈ X2 (k{ei }k, R) then V (xj ) ≤ α2 (η̃(k{ei }k) + η(R)) for all k ≥ j. Combining the latter with A. SP-ISS-VSR Under the feedback law (56) and taking measurement errors into account so that uk = U (xk + ek , Tk ), the closed-loop approximate model is given by (4), with F̄ a (x, e, T ) = x − T [2x3 + 9ex2 + (9e2 + 1)x + 3e3 + e]. (58) We next prove that (U, F a ) is MSEC with (U, F e ) by means of Lemma 2.10. Assumption i) has been already established, whereas ii) is easily shown using (56). In order to establish iii), we use (58) to evaluate |F̄ a (x, e, T ) − F̄ a (z, e, T )| = |1 − T P (x, e, z)| |x − z| ≤ (1 + T |P (x, e, z)|)|x − z|, where P (x, e, z) denotes a multinomial in the indeterminates x, e, z, and we have used the fact that for every positive integer p, xp − z p = q(x, z) · (x − z) for some multinomial q(x, z). Consider compact sets X , E ⊂ R, and define the nonnegative constant σ̄ := sup(x,e,z)∈(X ,E,X ) |P (x, e, z)|. Then, (13) holds for all T > 0 with σ : R≥0 → R≥0 defined as σ(T ) := σ̄, and assumption iii) of Lemma 2.10 holds. By Lemma 2.10, (U, F a ) is MSEC with (U, F e ). 7 Next, we prove that xk+1 = F̄ a (xk , ek , Tk ) is SP-ISS-VSR. The continuity and boundedness assumptions i), ii) and iii) of Theorem 3.2, can be easily verified from (55), (56) and (58). To prove assumption iv) of Theorem 3.2, let α1 , α2 , α3 , ρ ∈ K∞ be defined via α1 (s) = α2 (s) = s2 , α3 (s) = 2.194s4 , and ρ(s) = 10s. Let M ≥ R > 0 and E > 0 be given and define V (x) = x2 . Note that V satisfies (35) and compute V (F̄ a (x, e, T )) − V (x) = h(x, e)T + g(x, e)T 2 , (59) h(x, e) = −2x[2x3 + 9ex2 + (9e2 + 1)x + (3e3 + e)], (60) g(x, e) = [2x3 + 9ex2 + (9e2 + 1)x + (3e3 + e)]2 . (61) 2 Define G := sup|x|≤M,|e|≤E g(x, e) and let T̃ = 1.8R . Expanding G h(x, e) and taking absolute values on sign indefinite terms, h(x, e) ≤ −4x4 − (18e2 + 2)x2 + 18|e||x|3 + (6|e|3 + 2|e|)|x| ≤ −4x4 − 2x2 + 18|e||x|3 + (6|e|3 + 2|e|)|x|. (62) Whenever ρ(|e|) ≤ |x|, it follows that |e| ≤ 0.1|x| and 4 2 4 A PPENDIX Proof of Lemma 2.5: Let Ω ⊂ Rn ×Rm be a given compact set. Let X1 ⊂ Rn and U ⊂ Rm be compact sets such that Ω ⊂ X1 × U, and define X := N (X1 , 1). Let ρ′ ∈ K and T0′ > 0 be given by Definition 2.4 in correspondence with Ω by the fact that F a is consistent with F Euler . Let hypothesis iia) generate ρ ∈ K and M > 0 in correspondence with X and U. Define T0 := min{T0′ , 1/M }. Let (x0 , u) ∈ Ω and let φu (t, x0 ) denote the (unique) solution to 3 h(x, e) ≤ −4x − 2x + 1.8x + (0.006|x| + 0.2|x|)|x| ≤ −2.194x4 − 1.8x2 . It thus follows that for ρ(|e|) + R ≤ |x| ≤ M and T ∈ (0, T̃ ), V (F̄ a (x, e, T )) − V (x) ≤ (−2.194x4 − 1.8x2 )T + GT 2  ≤ −T 2.194x4 + −1.8x2 + GT T ≤ −T α3 (|x|). V. C ONCLUSIONS We have given stability results for digital control design based on discrete-time approximate models under varying sampling rate (VSR) and in the presence of state measurement errors. We have extended the concept of semiglobal practical ISS (SP-ISS) to the VSR case (SP-ISS-VSR) and introduced the concept of multi-step error consistency (MSEC). We have shown that if the approximate closed-loop model is MSEC with the exact one, and if the control law renders the approximate model SP-ISS-VSR, then the same controller ensures SP-ISS-VSR of the exact discrete-time closedloop model. We have also given sufficient conditions for MSEC and derived Lyapunov-based conditions that guarantee SP-ISS-VSR of a discrete-time model. All of the given conditions are checkable without assuming knowledge of the exact discrete-time model. We have also illustrated application via numerical examples. (63) ẋ(t) = f (x(t), u), where u is constant, so that Therefore, assumption iv) of Theorem 3.2 also holds and the closedloop system xk+1 = F̄ a (xk , ek , Tk ) is SP-ISS-VSR. Theorem 3.1 then ensures that the exact closed-loop system is SP-ISS-VSR. Consider next the feedback law (57), which was also shown in [1] to achieve semiglobal practical stability under zero-order hold and uniform sampling. We next show that, under bounded state measurement errors and also uniform sampling, the true plant state may diverge. Under the feedback law (57), the closed-loop approximate model becomes 2 φu (t, x0 ) = x0 + Z t f (φu (s, x0 ), u)ds. 0 From hypothesis iia), then |φu (t, x0 ) − x0 | ≤ M t ≤ 1, and hence x(t) ∈ X , holds for all t ∈ [0, T0 ]. From hypothesis iib), it follows that for all T ∈ [0, T0 ], B. Practical stability but no SP-ISS-VSR a x(0) = x0 , 2 3 F̄ (x, e, T ) = x − T [3ex + (1 + 3e )x + e + e]. (64) Notice the absence of the cubic term in x within the square brackets in (64) as compared with (58). Consider the constant error sequence {ei } with ei = −1 for all i ∈ N0 . From (64), then F̄ a (x, −1, T ) = x + T [3x2 − 4x + 2]. The polynomial between square brackets satisfies 3x2 − 4x + 2 ≥ x for all x ≥ 1. Therefore, F̄ a (x, −1, T ) ≥ x(1 + T ) whenever x ≥ 1 and T > 0. For every T ⋆ > 0, consider the constant sequence {Ti } ∈ Φ(T ⋆ ) with Ti = T ⋆ /2 for all i ∈ N0 . It it thus clear that for the selected constant sequences {ei } and {Ti }, and for x0 ≥ 1, we have lim xa (k, x0 , {ei }, {Ti }) = ∞ k→∞ and hence the approximate closed-loop system xk+1 = F̄ a (xk , ek , Tk ) is not SP-ISS-VSR. However, the pair (W, F a ) is indeed MSEC with (W, F e ), as can be shown following identical steps to those in the previous example. Using Lemma 2.7, it can be shown that the exact closed-loop system cannot be SP-ISS-VSR, either. Z T 0 [f (φu (t, x0 ), u) − f (x0 , u)] dt Z T ≤ ρ(|φu (t, x0 ) − x0 |)dt ≤ T ρ(M T ). 0 RT Considering that F (x0 , u, T ) = x0 + 0 f (φu (t, x0 ), u)dt, that R T F Euler (x0 , u, T ) = x0 + 0 f (x0 , u)dt, and that F a is consistent with F Euler , then, for all T ∈ [0, T0 ], it follows that e |F e (x0 , u, T ) − F a (x0 , u, T )| ≤ |F Euler (x0 , u, T ) − F a (x0 , u, T )| + |F e (x0 , u, T ) − F Euler (x0 , u, T )| Z T [f (φu (t, x0 ), u) − f (x0 , u)] dt ≤ T ρ′ (T ) + 0 ≤ T ρ′ (T ) + T ρ(M T ) =: T ρ1 (T ) where ρ1 ∈ K. Thus, F e is consistent with F a . Proof of Lemma 2.7: Define X˜ := N (X , η). Since (U, F a ) is MSEC with (U, F e ), in correspondence with the tuple (X̃ , E , L, η) there exist α : R≥0 × R≥0 → R≥0 and T ∗ > 0 such that (7) and (8) hold according to Definition 2.6. Let T̃ := T ∗ and consider {Ti } ∈ Φ(T̃ ), {ei } ⊂ E , and ξ ∈ X . Note that (10) holds trivially for k = 0 because |∆x0 | = |ξ − ξ| = 0 ≤ η. Pk We proceed by induction Pj on k. Let k ≥ 0 be such that i=0 Ti ∈ [0, L]. Note then that i=0 Ti ∈ [0, L] for every 0 ≤ j ≤ k. Suppose also that xa (j, ξ, {ei }, {Ti }) ∈ X and that |∆xj | ≤ η, both for all 8 0 ≤ j ≤ k. Then, xe (j, ξ, {ei }, {Ti }) ∈ X̃ for all 0 ≤ j ≤ k. Consider ∆xk+1 . From (10), (4) and (7), we have   |∆xk+1 | = F̄ e xek , ek , Tk − F̄ a xak , ek , Tk ≤ α(|∆xk |, Tk ) ≤ αk+1 (|∆x0 |, {Ti }) = αk+1 (0, {Ti }) ≤ η. We have thus established the result by induction. R EFERENCES [1] D. Nešić, A. Teel, and P. Kokotović, “Sufficient conditions for stabilization of sampled-data nonlinear systems via discrete-time approximations,” Systems & Control Letters, vol. 38, no. 4-5, pp. 259–270, 1999. [2] D. Nešić and A. Teel, “A framework for stabilization of nonlinear sampled-data systems based on their approximate discrete-time models,” IEEE Trans. on Automatic Control, vol. 49, no. 7, pp. 1103–1122, 2004. [3] D. Nešić and D. S. Laila, “A note on input-to-state stabilization for nonlinear sampled-data systems,” IEEE Trans. on Automatic Control, vol. 47, no. 7, pp. 1153–1158, 2002. [4] D. Nešić and D. Angeli, “Integral versions of iss for sampled-data nonlinear systems via their approximate discrete-time models,” IEEE Trans. on Automatic Control, vol. 47, no. 12, pp. 2033–2037, 2002. [5] D. Nešić and D. S. Laila, “Input-to-state stabilization for nonlinear sampled-data systems via approximate discrete-time plant models,” in Proc. 40th IEEE Conf. on Dec. and Control, vol. 1, 2001, pp. 887–892. [6] M. Arcak and D. Nešić, “A framework for nonlinear sampled-data observer design via approximate discrete-time models and emulation,” Automatica, vol. 40, no. 11, pp. 1931–1938, 2004. [7] N. van de Wouw, D. Nešić, and W. Heemels, “A discrete-time framework for stability analysis of nonlinear networked control systems,” Automatica, vol. 48, no. 6, pp. 1144–1153, 2012. [8] I. G. Polushin and H. J. Marquez, “Multirate versions of sampled-data stabilization of nonlinear systems,” Automatica, vol. 40, no. 6, pp. 1035– 1041, 2004. [9] X. Liu, H. J. Marquez, and Y. Lin, “Input-to-state stabilization for nonlinear dual-rate sampled-data systems via approximate discrete-time model,” Automatica, vol. 44, no. 12, pp. 3157–3161, 2008. [10] H. Beikzadeh and H. J. Marquez, “Multirate output feedback control of nonlinear networked control systems,” Automatic Control, IEEE Transactions on, vol. 60, no. 7, pp. 1939–1944, 2015. [11] P. Tabuada, “Event-triggered real-time scheduling of control tasks,” IEEE Trans. on Automatic Control, vol. 52, no. 9, pp. 1680–1685, 2007. [12] W. P. M. H. Heemels, K. H. Johansson, and P. Tabuada, “An introduction to event-triggered and self-triggered control,” in 2012 IEEE 51st IEEE Conference on Decision and Control (CDC), 2012, pp. 3270–3285. [13] M. Velasco, J. Fuertes, and P. Marti, “The self-triggered task model for real-time control systems,” in Proc. 24th IEEE Real-Time Systems Symposium (RTSS), 2003, pp. 67–70. [14] A. Anta and P. Tabuada, “To sample or not to sample: Self-triggered control for nonlinear systems,” IEEE Transactions on Automatic Control, vol. 55, no. 9, pp. 2030–2042, 2010. [15] A. J. Vallarella, E. N. Osella, and H. Haimovich, “Stability results for control design based on approximate discrete-time models and under controller-driven sampling,” in 25 Congreso Argentino de Control Automático (AADECA), Buenos Aires, Argentina, 2016. [16] A. J. Vallarella, E. Osella, and H. Haimovich, “Equivalence between uniform- and varying-sampling stability properties for discrete-time exact and approximate models,” in XVII Workshop on Information Processing and Control (RPIC), Mar del Plata, Argentina, 2017. [17] H. Haimovich and E. Osella, “On controller-driven varying-samplingrate stabilization via Lie-algebraic solvability,” Nonlinear Analysis: Hybrid Systems, vol. 7, no. 1, pp. 28–38, February 2013. [18] E. D. Sontag, “Smooth stabilization implies coprime factorization,” IEEE Trans. on Automatic Control, vol. 34, pp. 435–443, 1989. [19] ——, “On the input-to-state stability property,” European Journal of Control, vol. 1, no. 1, pp. 24–36, 1995. [20] F. H. Clarke, Y. S. Ledyaev, and R. J. Stern, “Asymptotic stability and smooth lyapunov functions,” Journal of differential Equations, vol. 149, no. 1, pp. 69–114, 1998. [21] Y. Lin, E. D. Sontag, and Y. Wang, “A smooth converse Lyapunov theorem for robust stability,” SIAM J. Control Optim., vol. 34, no. 1, p. 124, 160 1996.
3cs.SY
A Productivity Checker for Logic Programming E. Komendantskaya1 and P. Johann2 and M.Schmidt3 1 Heriot-Watt University, Edinburgh, Scotland, UK Appalachian State University, Boone, NC, USA 3 University of Osnabrück, Osnabrück, Germany arXiv:1608.04415v3 [cs.PL] 19 Aug 2016 2 Abstract. Automated analysis of recursive derivations in logic programming is known to be a hard problem. Both termination and non-termination are undecidable problems in Turing-complete languages. However, some declarative languages offer a practical work-around for this problem, by making a clear distinction between whether a program is meant to be understood inductively or coinductively. For programs meant to be understood inductively, termination must be guaranteed, whereas for programs meant to be understood coinductively, productive nontermination (or “productivity”) must be ensured. In practice, such classification helps to better understand and implement some non-terminating computations. Logic programming was one of the first declarative languages to make this distinction: in the 1980’s, Lloyd and van Emden’s “computations at infinity” captured the big-step operational semantics of derivations that produce infinite terms as answers. In modern terms, computations at infinity describe “global productivity” of computations in logic programming. Most programming languages featuring coinduction also provide an observational, or small-step, notion of productivity as a computational counterpart to global productivity. This kind of productivity is ensured by checking that finite initial fragments of infinite computations can always be observed to produce finite portions of their infinite answer terms. In this paper we introduce a notion of observational productivity for logic programming as an algorithmic approximation of global productivity, give an effective procedure for semi-deciding observational productivity, and offer an implemented automated observational productivity checker for logic programs. Keywords: Logic programming, corecursion, coinduction, termination, productivity. 1 Introduction Induction is pervasive in programming and program verification. It arises in definitions of finite data (e.g., lists, trees, and other algebraic data types), in program semantics (e.g., of finite iteration and recursion), and proofs (e.g., of properties of finite data and processes). Coinduction, too, is important in these arenas, arising in definitions of infinite data (e.g., lazily defined infinite streams), in program semantics (e.g., of concurrency), and in proofs (e.g., of observational equivalence, or bisimulation, of potentially infinite processes). It is thus desirable to have good support for both induction and coinduction in systems for reasoning about programs. Given a logic program P and a term A, SLD-resolution provides a mechanism for automatically (and inductively) inferring that P ⊢ A holds, i.e., that P logically entails A. The “answer” for a program P and a query ? ← A is a substitution σ computed from P and A by SLD-resolution. Soundness of SLD-resolution ensures that P ⊢ σ(A) holds, so we also say that P computes σ(A). Example 1 (Inductive logic program). The program P1 codes the Peano numbers: 0. nat(0) ← 1. nat(s(X)) ← nat(X) To answer the question “Does P1 ⊢ nat(s(X)) hold?”, we represent it as the logic programming (LP) query ? ← nat(s(X)) and resolve it with P1 . It is standard in implementations of traditional LP to use a topmost clause selection strategy, which resolves goals against clauses in the order in which they appear in the program. Topmost clause selection gives the derivation nat(s(X)) → nat(X) → true for P1 and ? ← nat(s(X)), which computes the answer {X 7→ 0} in its last step. Since P1 computes nat(s(0)), one answer to our question is “Yes, provided X is 0.” While inductive properties of terminating computations are quite well understood [14], non-terminating LP computations are notoriously difficult to reason about, and can arise even for programs that are intended to be inductive: Example 2 (Coinductive meaning of inductive logic program). If P1′ is obtained by reversing the order of the clauses in the program P1 from Example 1, then the SLD-derivation for program P1′ and query ? ← nat(s(X)) does not terminate under standard topmost clause selection. Instead, it results in an attempt to compute the “answer” {X 7→ s(s(...))} by repeatedly resolving with Clause 1. Nevertheless, P1′ is still computationally meaningful, since it computes the first limit ordinal at infinity [14]. Some programs do not admit terminating computations under any selection strategy: Example 3 (Coinductive logic program). No derivation for the query ? ← stream(X) and the program P2 comprising the clause 0. stream(scons(0, Y)) ← stream(Y) terminates with an answer, be it success or otherwise. Nevertheless, P2 has computational meaning: it computes the infinite stream of 0s at infinity. The importance of developing sufficient infrastructure to support coinduction in automated proving has been argued across several communities; see, e.g., [13,17,21]. In LP, the ability to work with non-terminating and coinductive programs depends crucially on understanding the structural properties of non-terminating SLD-derivations. To illustrate, consider the non-terminating programs P3 , P4 , and P5 : Program Program definition For query ? ← p(X), computes the answer: P3 p(X) ← p(X) id P4 p(X) ← p(f(X)) id P5 p(f(X)) ← p(X) {X 7→ f(f...)} Programs P3 and P4 each loop without producing any substitutions at all; only P5 computes an infinite term at infinity. It is of course not a coincidence that only P5 resembles a (co)inductive data definition by pattern matching on a constructor, as is commonly used in functional programming. When an infinite SLD-derivation computes an infinite object, and this object can be successively approximated by applying to the initial query the substitutions computed at each step of the derivation, the derivation is said to be globally productive. The only derivation for program P5 and the query ? ← p(X) is globally productive since it approximates, in the sense just described, the infinite term p(f(f...)). In terminology of [14], it computes p(f(f...)) at infinity. Programs P2 and P1′ similarly give rise to globally productive derivations. But no derivations for P3 or P4 are globally productive. Since global productivity determines which non-terminating logic programs can be seen as defining coinductive data structures, we would like to identify exactly when a program is globally productive. But porting functional programming methods of ensuring productivity by static syntactic checks is hardly possible. Unlike pattern matching in functional programming, SLD-resolution is based on unification, which has very different operational properties — including termination and productivity properties — from pattern matching. For example, programs P1 , P1′ , P2 , and P5 are all terminating by termmatching SLD-resolution, i.e., resolution in which unifiers are restricted to matchers, as in term rewriting. We thus call this kind of derivations rewriting derivations. Example 4 (Coinductive program defining an irrational infinite term). The program P6 comprises the single clause 0. from(X, scons(X, Y)) ← from(s(X), Y) For P6 and the query ? ← from(0, Y), SLD-resolution computes at infinity the answer substitution {Y 7→ [0, s(0), s(s(0)), . . .]}. Here [t1 , t2 , . . .] abbreviates scons(t1 , scons(t2 , . . .)), and similarly in the remainder of this paper. This derivation depends crucially on unification since variables occurring in the two arguments to from in the clause head overlap. If we restrict to rewriting, then there are no successful derivations (terminating or nonterminating) for this choice of program and query. Example 4 shows that any analysis of global productivity must necessarily rely on specific properties of the operational semantics of LP, rather than on program syntax alone. It has been observed in [11,9] that one way to distinguish globally productive programs operationally is to identify those that admit infinite SLD-derivations, but for which rewriting derivations always terminate. We call this program property observational productivity. The programs P1 , P1′ , P2 , P5 , P6 are all observationally productive. The key observation underlying observational productivity is that terminating rewriting derivations can be viewed as points of finite observation in infinite derivations. Consider again program P6 and query ? ← from(0, Y) from Example 4. Drawing rewriting derivations vertically and unification-based resolution steps horizontally, we see that each unification substitution applied to the original query effectively observes a further fragment of the stream computed at infinity: {X7→[0,X′ ]} → from(0, X) {X′ 7→[s(0),X′′ ]} ′ from(0, [0, X ]) ′ from(s(0), X ) → . ′′ → ... from(0, [0, s(0), X ]) from(s(0), [s(0), X′′ ]) from(s(s(0)), X′′ ) If we compute unifiers only when rewriting derivations terminate, then the resulting derivations exhibit consumer-producer behaviour: rewriting steps consume structure (here, the constructor scons), and unification steps produce more structure (here, new sconses) for subsequent rewriting steps to consume. This style of interleaving matching and unification steps was called structural resolution (or S-resolution) in [9,12]. Model-theoretic properties of S-resolution relative to least and greatest Herbrand models of programs were studied in [12]. In this paper, we provide a suitable algorithm for semi-deciding observational productivity of logic programs, and present its implementation [19], see also Appendix B online. As exemplified above, observational productivity of a program P is in fact a conjunction of two properties of P : 1. universal observability: termination of all rewriting derivations, and 2. existential liveness: existence of at least one non-terminating S-resolution or SLDresolution derivation. While the former property is universal, the latter must be existential. For example, the program P1 defining the Peano numbers can have both inductive and coinductive meaning. When determining that a program is observationally productive, we must certify that the program actually does admit derivations that produce infinite data, i.e., that it actually can be seen as a coinductive definition. Our algorithm for semi-deciding observational productivity therefore combines two checks: 1. guardedness checks that semi-decide universal observability: if a program is guarded, then it is universally observable. (The converse is not true in general.) 2. liveness invariant checks ensuring that, if a program is guarded and exhibits an invariant in its consumption-production of constructors, then it is existentially live. This is the first work to develop productivity checks for LP. An alternative approach to coinduction in LP, known as CoLP [7,21], detects loops in derivations and closes them coinductively. However, loop detection was not intended as a tool for the study of productivity and, indeed, is insufficient for that purpose: programs P3 , P4 and P5 , of which only the latter is productive, are all treated similarly by CoLP, and all give coinductive proofs via its loop detection mechanism. Our approach also differs from the usual termination checking algorithms in termrewriting systems (TRS) [22,1,8] and LP [3,16,18,20,15]. Indeed, these algorithms focus on guaranteeing termination, rather than productivity, see Section 5. And although the notion of productivity has been studied in TRS [4,5], the actual technical analysis of productivity is rather different there because it considers infinitary properties of rewriting, whereas observational productivity relies on termination of rewriting. The rest of this paper is organised as follows. In Section 2 we introduce a contraction ordering on terms that extends the more common lexicographic ordering, and argue that this extension is needed for our productivity analysis. We also recall that static guardedness checks do not work for LP. In Section 3 we employ contraction orderings in dynamic guardedness checks and present a decidable property, called GC2, that characterises guardedness of a single rewriting derivation, and thus certifies existential observability. In Section 4 we employ GC2 to develop an algorithm, called GC3, that analyses consumer-producer invariants of S-resolution derivations to certify universal observability. For universally observable programs, these invariants also serve as liveness invariant checks. We also prove that GC3 indeed semi-decides observational productivity. In Section 5 we discuss related work and in Section 6 – implementation and applications of the productivity checker. In Section 7 we conclude the paper. 2 Contraction Orderings on Terms In this section, we will introduce the contraction ordering on first-order terms, on which our productivity checks will rely. We work with the standard definition of first-order logic programs. A signature Σ consists of a set F of function symbols f, g, . . . each equipped with an arity. Nullary (0-ary) function symbols are constants. We also assume a countable set Var of variables, and a set P of predicate symbols each equipped with an arity. We have the following standard definition for terms, formulae and Horn clauses: Definition 1 (Syntax of Horn clauses and programs). Terms T erm ::= V ar | F (T erm, ..., T erm) Atomic formulae (or atoms) At ::= P(T erm, ..., T erm) (Horn) clauses CH ::= At ← At, ..., At Logic programs P rog ::= CH, ..., CH In what follows, we will use letters A, B with subscripts to refer to elements of At. Given a program P , we assume all clauses are indexed by natural numbers starting from 0. When we need to refer to ith clause of program P , we will use notation P (i). To refer to the head of clause P (i), we will use notation head (P (i)). A substitution is a total function σ : Var → T erm. Substitutions are extended from variables to terms as usual: if t ∈ T erm and σ is a substitution, then the application σ(t) is a result of applying σ to all variables in t. A substitution σ is a unifier for t, u if σ(t) = σ(u), and is a matcher for t against u if σ(t) = u. A substitution σ is a most general unifier (mgu) for t and u if it is a unifier for t and u and is more general than any other such unifier. A most general matcher (mgm) σ for t against u is defined analogously. We can view every term and atom as a tree. Following standard definitions [2,14], such trees can be indexed by elements of a suitably defined tree language. Let N∗ be the set of all finite words (i.e., sequences) over the set N of natural numbers. A set L ⊆ N∗ is a (finitely branching) tree language if the following two conditions hold: (i) for all w ∈ N∗ and all i, j ∈ N, if wj ∈ L then w ∈ L and, for all i < j, wi ∈ L, and (ii) for all w ∈ L, the set of all i ∈ N such that wi ∈ L is finite. A tree language L is finite if it is a finite subset of N∗ , and infinite otherwise. Term trees (for terms and atoms) are defined as mappings from a tree language L to the given signature, see [2,14,9]. Informally speaking, every symbol occurring in a term or an atom receives an index from L. In what follows, we will work with term tree representation of all terms and atoms, and for brevity we will refer to all term trees simply as terms. We will use notation t(w) when we need to talk about the element of the term tree t indexed by a word w ∈ L. Note that leaf nodes are always given by variables or constants. Example 5. Given L = {ǫ, 0, 00, 01}, the atom stream(scons(0, Y)) can be seen as a term tree t given by the map t(ǫ) = stream, t(0) = scons, t(00) = 0, t(01) = Y. We can use such indexing to refer to subterms, and notation subterm(t, w) will refer to a subterm of term t starting at node w. In the above example, where t = stream(scons(0, Y)), subterm(t, 0) is scons(0, Y). Two most popular tools for termination analysis of declarative programs are lexicographic ordering and (recursive) path ordering of terms. Informally, the idea can be adopted to LP setting as follows. Suppose we have a clause A ← B1 , . . . , Bi , . . . , Bn . We may want to check whether each Bi sharing the predicate with A is “smaller”’ than A, since this guarantees that no infinite rewriting derivation is triggered by this clause. For lexicographic ordering we will write Bi <l A and for path ordering we will write Bi <p A. Using standard orderings to prove universal observability works well for program P2 , since stream(Y) <l stream(scons(0, Y)) and stream(Y) <p stream(scons(0, Y)), and so any rewriting derivation for P2 terminates. But universal observability of P6 from Example 4 cannot be shown by this method. Indeed, none of the four orderings from(X, scons(X, Y)) <l from(s(X), Y), from(s(X), Y) <l from(X, scons(X, Y)), from(X, scons(X, Y)) <p from(s(X), Y), and from(s(X), Y) <p from(X, scons(X, Y)) holds because the subterms pairwise disagree on the ordering. This situation is common for LP, where some arguments hold input data and some hold output data, so that some decrease while others increase in recursive calls. Nevertheless, P6 is universally observable, and we want to be able to infer this. Studying the S-resolution derivation for P6 in Section 1, we note that universal observability of P6 is guaranteed by contraction of from’s second argument. It is therefore sufficient to establish that terms get smaller in only one argument. This inspires our definition of a contraction ordering, which takes advantage of the tree representation of terms. Definition 2 (Contraction, recursive contraction). If t1 and t2 are terms, then t2 is a contraction of t1 (written t1 ⊲ t2 ) if there is a leaf node t2 (w) on a branch B in t2 , and there exists a branch B ′ in t1 that is identical to B up to node w, however, t1 (w) is not a leaf. If, in addition, subterm(t1 , w) contains the symbol given by t2 (w), then t2 is a recursive contraction of t1 . We distinguish variable contractions and constant contractions according as t2 (w) is a variable or constant, and call subterm(t1 , w) a reducing subterm for t1 ⊲ t2 at node w. We call subterm(t1 , w) a recursive, variable or constant reducing subterm if t1 ⊲ t2 is a recursive, variable or constant contraction, respectively. Example 6 (Contraction orderings). We have from(X, scons(X, Y)) ⊲ from(s(X), Y), as the leaf Y in the latter is “replaced” by the term scons(X, Y) in the former. Formally, scons(X, Y) is a recursive and variable reducing subterm. It can be used to certify termination of all rewriting derivations for P6 . Note that from(s(X), Y) ⊲ from(X, scons(X, Y)) also holds, with (recursive and variable) reducing subterm s(X). The fact that ⊲ is not well-founded makes reasoning about termination delicate. Nevertheless, contractions emerge as precisely the additional ingredient needed to formulate our productivity check for a sufficiently general and interesting class of logic programs. In general, static termination checking for LP suffers serious limitations; see, e.g., [3]. The following example illustrates this phenomenon. Example 7 (Contraction ordering on clause terms is insufficient for termination checks). The program P7 , that is not universally observable, is given by mutual recursion: 0. p(s(X1), X2, Y1, Y2) ← q(X2, X2, Y1, Y2) 1. q(X1, X2, s(Y1), Y2) ← p(X1, X2, Y2, Y2) No two terms from the same clause of P7 can be related by any contraction ordering because their head symbols differ. But recursion arises for P7 when a derivation calls its two clauses alternately, so we would like to examine rewriting derivations for queries, such as ? ← p(s(X1), X2, s(Y1), Y2) and ? ← p(s(X1), s(X2), s(Y1), s(Y2)), that exhibit its recursive nature. Unfortunately, such queries are not given directly by P7 ’s syntax, and so are not available for static program analysis. As static checking for contraction ordering in clauses is not sufficient, we will define dynamic checks in the next section. The idea is to build a rewriting tree for each clause, and check whether term trees featured in that derivation tree obey contraction ordering. 3 Rewriting Trees: Guardedness Checks for Rewriting Derivations To properly reason about rewriting derivations in LP, we need to take into account that i) in LP, unlike, e.g., in TRS, we have conjuncts of terms in the bodies of clauses, and ii) a logic program can have overlapping clauses, i.e., clauses whose heads unify. These two facts have been analysed in detail in the LP literature, usually using the notion of andor-trees and, where optimisation has been concerned, and-or-parallel trees. We carry on this tradition and consider a variant of and-or trees for derivations. However, the trees we consider are not formed by general SLD-resolution, but rather by term matching resolution. Rewriting trees are so named because each of their edges represents a term matching resolution step, i.e., a matching step as in term rewriting. Definition 3 (Rewriting tree). Let P be a logic program with n clauses, and A be an atomic formula. The rewriting tree for P and A is the possibly infinite tree T satisfying the following properties. – – – – – A is the root of T Each node in T is either an and-node or an or-node Each or-node is given by P (i), for some i ∈ {0, . . . , n} Each and-node is an atom seen as a term tree. For every and-node A′ occurring in T , if there exist exactly k > 0 distinct clauses P (j), . . . , P (m) in P (a clause P (i) has the form Bi ← B1i , . . . , Bni i for some ni ), such that A′ = θj (Bj ) = . . . = θm (Bm ), for mgms θj , . . . , θm , then A′ has exactly k children given by or-nodes P (j), . . . , P (m), such that, every or-node P (i) has ni children given by and-nodes θi (B1i ), . . . , θi (Bni i ). When constructing rewriting trees, we assume a suitable algorithm [9] for renaming free variables in clause bodies apart. Figure 1 gives examples of rewriting trees. An andsubtree of a rewriting tree (a subtree in which a derivation always pursues only one or-choice at a time) is a rewriting derivation, see [9] for a formal definition. Because mgms are unique up to variable renaming, given a program P and an atom A, rewriting tree T for P and A is unique. Following the same principle as with definition of term trees, we use suitably defined finitely-branching tree languages for indexing rewriting trees, see [9] for precise definitions. When we need to talk about a node of a rewriting tree T indexed by a word w ∈ L, we will use notation T (w). We can now formally define our notion of universal observability. Definition 4 (Universal observability). A program P is universally observable if, for every atom A, the rewriting tree for A and P is finite. Programs P1 , P1′ , P2 , P5 , P6 are universally observable, whereas programs P3 , P4 and P7 are not. An exact analysis of why P7 is not universally observable is given in Example 9. We can now apply the contraction ordering we defined in the previous section to analyse termination properties of rewriting trees. A suitable notion of guardedness can be defined by checking for loops in rewriting trees whose terms fail to decrease by any contraction ordering. But note that our notion of a loop is more general than that used in CoLP [7,21] since it does not require the looping terms to be unifiable. Definition 5 (Loop in a rewriting tree). Given a program P and an atom A the rewriting tree T for P and A contains a loop at nodes w and v, denoted loop(T, w, v), if w properly precedes v on some branch of T , T (w) and T (v) are and-nodes whose atoms have the same predicate, and parent or-nodes of T (w) and T (v) are given by the same clause P (i). Examples of loops in rewriting trees are given (underlined) in Figure 1. If T has a loop at nodes w and v, and if t is a recursive reducing subterm for T (w) ⊲ T (v), then loop(T, w, v) is guarded by (P (i), t), where P (i) is the clause that was resolved against to obtain T (w) and T (v). It is unguarded otherwise. A rewriting tree T is guarded if all of its loops are guarded, and is unguarded otherwise. We write GC2(T ) when T is guarded, and say that GC2(T ) holds. Example 8. In Figure 1, we have (underlined) loops in the third rewriting tree (for q(s(X′′ ), s(X′′ ), s(Y′ ), Y′′ ) and q(s(X′ ), s(X′′ ), Y′′ , Y′′ )) and the fourth rewriting tree (for q(s(X′′ ), s(X′′ ), s(Y′ ), s(Y′′ )) and q(s(X′′ ), s(X′′ ), s(Y′′ ), s(Y′′ ))). Neither is guarded. In the former case, there is a contraction on the third argument, but because s(Y′ ) and Y′′ do not share a variable, it is not recursive contraction. In the latter loop, there is no contraction at all. By Definition 5, each repetition of a clause and predicate in a branch of a rewriting tree triggers a check to see if the loop is guarded by some recursive reducing subterm. Proposition 1 (GC2 is decidable). GC2 is a decidable property of rewriting trees.4 The proof of Proposition 1 also establishes that every guarded rewriting tree is finite. The decidable guardedness property GC2 is a property of individual rewriting trees. But our goal is to decide guardedness universally, i.e., for all of a program’s rewriting trees. The next example shows that extrapolating from existential to universal guardedness is a difficult task. Example 9 (Existential guardedness does not imply universal guardedness). For program P7 , the rewriting trees constructed for the two clause heads p(s(X′ ), X′′ , Y′ , Y′′ ) and q(s(X′ ), X′′ , s(Y′ ), Y′′ ) are both guarded since neither contains any loops at all. Nevertheless, there is a rewriting tree for P7 (the last tree in Figure 1) that is unguarded and infinite. The third tree is not guarded (due to the unguarded loop), but it is finite. The example above shows that our initial idea of checking rewriting trees generated by clause heads is insufficient to detect all cases of nonterminating rewriting. Since a similar 4 All proofs are in an Appendix A supplied as supplementary material online. Corresponding pseudocode algorithms are given in Appendix B. Y ′ 7→s(Y ′ ) X ′′ 7→s(X ′′ ) → ′ ′′ ′ ′′ ′′ ′ ′′ p(s(X ), X , Y , Y ) p(s(X ), X , s(Y ), Y ) P7 (0) P7 (0) q(X′′ , X′′ , Y′ , Y′′ ) Y ′′ 7→s(Y ′′ ) → ′ → ′ ′′ ′′ ′ ′′ p(s(X ), s(X ), s(Y ), Y ) ′′ ′′ p(s(X1), s(X′′ ), s(Y′ ), s(Y′′ )) P7 (0) q(s(X ), s(X ), s(Y ), Y ) P7 (1) ′′ ′′ P7 (0) q(X′′ , X′′ , s(Y′ ), Y′′ ) ′′ ′ ′′ q(s(X ), s(X′′ ), s(Y′ ), s(Y′′ )) P7 (1) ′′ p(X , X , Y , Y ) ′′ ′′ P7 (1) ′′ ′′ ′′ ′′ p(s(X ), s(X ), Y , Y ) ′′ p(s(X ), s(X′′ ), s(Y′′ ), s(Y′′ )) P7 (0) ′′ ′′ P7 (0) q(s(X ), s(X ), Y , Y ) ′′ q(s(X ), s(X′′ ), s(Y′′ ), s(Y′′ )) P7 (1) ... Fig. 1. An initial fragment of the derivation tree (comprising four rewriting trees) for the program P7 of Example 7 and the atom p(s(X′ ), X′′ , Y′ , Y′′ ). Its third and fourth rewriting trees each contain an unguarded loop (underlined), so both are unguarded. The fourth tree is infinite. situation can obtain for any finite set of rewriting trees, universal observability, and hence observational productivity, of programs cannot be determined by guardedness of rewriting trees for program clauses alone. The next section addresses this problem. 4 Derivation Trees: Observational Productivity Checks The key idea of this section is, given a program P , to identify a finite set S of rewriting trees for P such that checking guardedness of all rewriting trees in S is sufficient for guaranteeing guardedness of all rewriting trees for P . One way to identify such sets will be to use the strategy of Example 9 and Figure 1: for every clause P (i) of P , to construct a rewriting tree for the head of P (i), and, if that tree is guarded, explore what kind of mgus the leaves of that tree generate, and see if applications of those mgus may give an unguarded tree. As Figure 1 shows, we may need to apply this method iteratively until we find a nonguarded rewriting tree. But we want the number of such iterations to be finite. This section presents a solution to this problem. We start with a formal definition of rewriting tree transitions, which we have seen already in Figure 1, see also Figure 2. Definition 6 (Rewriting tree transition). Let P be a program and T be a rewriting tree for P and an atom A. If T (w) is a leaf node of T given by an atom B, and B unifies with a clause P (i) via mgu σ, we define a tree Tw as follows: we apply σ to every and-node of T , and extend the branches where required, according to Definition 3. Computation of Tw from T is denoted T → Tw . The operation T → Tw is the tree transition for T and w. If a rewriting tree T is constructed for a program P and an atom A, a (finite or infinite) sequence T → T ′ → T ′′ → . . . of tree transitions is an S-resolution derivation for P and A. For a given rewriting tree T , several different S-resolution derivations are possible from T . This gives rise to the notion of a derivation tree. Definition 7 (Derivation tree, guarded derivation tree). Given a logic program P and an atom A, the derivation tree D for P and A is defined as follows: – The root of D is given by the rewriting tree for P and A. – For a rewriting tree T occurring as a node of D, if there exists a transition T → Tw , for some leaf node w in T , then the node T has a child given by Tw . A derivation tree is guarded if each of its nodes is a guarded rewriting tree, i.e., if GC2(T ) holds for each of its nodes T . Figure 1 shows an initial fragment of the derivation tree for P7 and p(s(X′ ), X′′ , Y′ , Y′′ ). Note that we now have three kinds of trees: term trees have signature symbols as nodes, rewriting trees have atoms (term trees) as nodes, and derivation trees have rewriting trees as nodes. For a given P and A, the derivation tree for P and A is unique up to renaming. We use our usual notation D(w) to refer to the node of D at index w ∈ L. Definition 8 (Existential liveness, observational productivity). Let P be a universally observable program and let A be an atom. An S-resolution derivation for P and A is live if it constitutes an infinite branch of the derivation tree for P and A. The program P is existentially live if there exists a live S-resolution derivation for P and some atom A. P is observationally productive if it is universally observable and existentially live. To show that observational productivity is semi-decidable, we first show that universal observability is semi-decidable by means of a finite (i.e., decidable) guardedness check. We started this section by motivating the need to construct a finite set S of rewriting trees checking guardedness of which will guarantee guardedness for any rewriting tree for the given program. Our first logical step is to use derivation trees built for clause heads as generators of such a set S. Due to the properties of mgu’s used in forming branches of derivation trees, derivation trees constructed for clause heads generate the set of most general rewriting trees. The next lemma exposes this fact: Lemma 1 (Guardedness of derivation trees implies universal observability). Given a program P , if derivation trees for P and each head (P (i)) are guarded, then P is universally observable. However, derivation trees are infinite, in general. So it still remains to define a method that extracts representative finite subtrees from such derivation trees; we call such subtrees observation subtrees. For this, we need only be able to detect an invariant property guaranteeing guardedness through tree transitions in the given derivation tree. To illustrate, let us check guardedness of the program P6 . As it consists of just one clause, we take the head of that clause as the goal atom, and start constructing the infinite derivation tree D for P6 and from(X, scons(X, Y)) as shown in Figure 2. The first rewriting tree in the derivation tree has no loops, so we cannot identify any invariants. We make a transition to the second rewriting tree which has one loop (underlined) involving the recursive reducing subterm [s(X), Y′ ]. This reducing subterm is our first candidate invariant, it is the pattern that is consumed from the root of the second rewriting tree to its leaf. We now need to check this pattern is added back, or produced, in the next tree transition. The next mgu involves substitution Y′ 7→ [s(s(X)), Y′′ ]. Because this derivation gradually computes an infinite irrational term (rational terms are terms that can be represented as trees that have a finite number of distinct subtrees), the two terms [s(X), Y′ ] and [s(s(X)), Y′′ ] we have identified are not unifiable. We need to be able to abstract away Y 7→[s(X),Y ′ ]} Y ′ 7→[s(s(X)),Y ′′ ] −→ Y ′′ 7→[s(s(s(X))),Y ′′ ] −→ ′ −→ fr(X, [X, Y]) fr(X, [X, s(X), Y ]) fr(X, [X, s(X), s(s(X)), Y ]) P6 (0) P6 (0) P6 (0) fr(s(X), Y) ′ fr(s(X), [s(X), Y ]) fr(s(X), [s(X), s(s(X)), Y′′ ]) P6 (0) P6 (0) ′ fr(s(s(X)), Y ) ... ′′ fr(s(s(X)), [s(s(X)), Y′′ ]) P6 (0) fr(s(s(s(X))), Y′′ ) Fig. 2. An initial fragment of the infinite derivation tree D for the program P6 from Example 4 and its clause head. It is also the observation subtree of D. We abbreviate scons by [, ], and from by fr. The guarded loops in each of its rewriting trees are underlined. from their current shape and identify a common pattern, which is [ , ]. By the properties of mgu’s used in transitions, such most general pattern can always be extracted from the clause head itself. Indeed, the subterm of the clause head from(X, scons(X, Y)) has the subterm [X, Y] that is exactly the pattern we look for. Thus, our current (coinductive) assumption is: given a rewriting tree T in the derivation tree D, [X, Y] will be consumed by rewriting steps from its root to its leaves, and exactly [X, Y] will be produced (i.e., added back) in the next tree transition. X and Y are seen as placeholders for some terms. Consumption is always finite (by the loop guardedness), and production is potentially infinite. We now need to check that this coinductive assumption will hold for the next rewriting tree of D. The third rewriting tree indeed has guarded loops with recursive reducing subterm [s(s(X)), Y′′ ], and the next mgu it gives rise to is Y′′ 7→ [s(s(s(X))), Y′′ ]. Again, to abstract away the common pattern, we look for a subterm in the clause head of P6 (0) that matches with both of these terms, it is the same subterm [X, Y]. Thus, our coinductive assumption holds again, and we conclude by coinduction that the same pattern will hold for any further rewriting tree in D. When implementing this reasoning, we take the observation subtree of D up to the third tree shown in Figure 2 as a sufficient set of rewriting trees to check guardedness of (otherwise infinite) D. The rest of this section generalises and formalises this approach. In the next definition, we introduce the notion of a clause projection to talk about the process of “abstracting away” a pattern from an mgu σ by matching it with a subterm t of a clause head. When t also matches with a recursive reducing subterm of a loop in a rewriting tree, we call t a coinductive invariant. Definition 9 (Clause projection and coinductive invariant). Let P be a program and A be an atom, and let D be a derivation tree for P and A in which a tree transition from T to T ′ is induced by an mgu σ of some P (k) and an atom B given by a leaf node T (u). The clause projection for T ′ , denoted π(T ′ ), is the set of all triples (P (k), t, v), where t is a subterm of head (P (k)) at position v, such that the following conditions hold: σ(B)⊲B with variable reducing subterm t′ , and t′ matches against t (i.e. t′ = σ ′ (t) for some σ ′ ). Additionally, the coinductive invariant at T ′ , denoted ci(T ′ ), is a subset of the clause projection for T ′ , satisfying the following condition. An element (P (k), t, v) ∈ π(T ′ ) is also in ci(T ′ ), if T contains a loop in the branch leading from T ’s root to T (u) that is guarded by (P (k), t′′ ) for some t′′ such that t′′ matches against t (t′′ = θ(t) for some θ). Given a program P , an atom ASand a derivation tree D for P and A, the clause projection set S for D is cproj(D) = T π(T ) and the coinductive invariant set for D is cinv(D) = T ci(T ), where these unions are taken over all rewriting trees T in D. Example 10 (Clause projections and coinductive invariants). Coming back to Figure 2, the mgu for the first transition is σ1 = {X′ 7→ s(X), Y 7→ scons(s(X), Y′)} (renaming of variables in P6 (0) with primes), that for the second is σ2 = {X′′ 7→ s(s(X)), Y′ 7→ scons(s(s(X)), Y′′)} (renaming of variables in P6 (0) with double primes), etc. Clause projections are given by π(T ) = {(P6 (0), scons(X, Y), 1)} for all trees T in this derivation, and thus cproj(D) is the finite set. Moreover, for the first rewriting tree T , ci(T ) = ∅, and ci(T ′ ) = {(P6 (0), scons(X, Y), 1)} for all trees T ′ except for the first one, so cinv(D) = {(P6 (0), scons(X, Y), 1)} is the finite set too. The clause projections for the derivation of Figure 1 are π(T ′ ) = π(T ′′′ ) = (P (1), s(Y1), 2), and π(T ′′ ) = (P (0), s(X1), 0), where T ′ , T ′′ , T ′′′ refer to the second, third and fourth rewriting tree of that derivation. All coinductive invariants for that derivation are empty, since none of these rewriting trees contain guarded loops. Generally, clause projection sets are finite, as the number of subterms in the clause heads of P is finite. This property is crucial for termination of our method: Proposition 2 (Finiteness of clause projection sets). Given a program P , an atom A, and a derivation tree D for P and A, the clause projection set cproj(D) is finite. In particular, this holds for derivation trees induced by clause heads. We terminate the construction of each branch of a derivation tree when we notice repeating coinductive invariant. A subtree we get as a result is an observation subtree. Formally, given a derivation tree D for a program P and an atom A, with a branch in which nodes D(w) and D(wv) are defined, if ci(D(w)) = ci(D(wv)) 6= ∅, then D has a guarded transition from D(w) to D(wv) (denoted D(w) =⇒ D(wv)). Every guarded transition thus identifies a repeated “consumer-producer” invariant in the derivation from D(w) to D(wv). This tells us that observation of this branch of D can be concluded. Imposing this condition on all branches of D gives us a general method to construct finite observation subtrees of potentially infinite derivation trees: Definition 10 (Observation subtree of a derivation tree). If D is a derivation tree for a program P and an atom A, the tree D′ is the observation subtree of D if 1) the roots of D and D′ are given by the rewriting tree for P and A, and 2) if w is a node in both D and D′ , then the rewriting trees in D and D′ at node w are the same and, for every child w′ of w in D, the rewriting tree of D′ at node w′ exists and is the same as the rewriting tree of D at w′ , unless either a) GC2 does not hold for D(w′ ), or b) there exists a v such that D(v) =⇒ D(w). In either case, D′ (w) is a leaf node. We say that D′ is unguarded if Condition 2a holds for at least one of D’s nodes, and that D′ is guarded otherwise. A branch in an observation subtree is thus truncated when it reaches an unguarded rewriting tree or its coinductive invariant repeats. The observation subtree of any derivation tree is unique. The following proposition and lemma prove the two most crucial properties of observation subtrees: that they are always finite, and that checking their guardedness is sufficient for establishing guardedness of the whole derivation trees. Proposition 3 (Finiteness of observation subtrees). If D is a derivation tree for a program P and an atom A then the observation subtree of D is finite. Lemma 2 (Guardedness of observation subtree implies guardedness of derivation tree). If the observation subtree for a derivation tree D is guarded, then D is guarded. Example 11 (Finite observation subtree of an infinite derivation tree). The initial fragment D′ of the infinite derivation tree D given by the three rewriting trees in Figure 2 is D’s observation subtree. The third rewriting tree T ′′ in D is the last node in the observation tree D′ because ci(T ′ ) = ci(T ′′ ) = {(P6 (0), scons(X, Y), 1)} = 6 ∅. Since D′ is guarded, Lemma 2 above ensures that the whole infinite derivation tree D is guarded. It now only remains to put the properties of the observation subtrees into practical use, and, given a program P , construct finite observation subtrees for each of its clauses. If none of these observation subtrees detects unguarded rewriting trees, we have guarantees that this program will never give rise to infinite rewriting trees. The next definition, lemmas and a theorem make this intuition precise. Definition 11 (Guarded clause, guarded program). Given a program P , its clause P (i) is guarded if the observation subtree for the derivation tree for P and the atom head (P (i)) is guarded, and P (i) is unguarded otherwise. A program P is guarded if each of its clauses P (i) is guarded, and unguarded otherwise. We write GC3(P (i)) to indicate that P (i) is guarded, and similarly for P . Lemma 3 uses Proposition 3 to show that GC3 is decidable. Lemma 3 (GC3 is decidable). GC3 is a decidable property of logic programs. Theorem 1 (Universal observability is semi-decidable). If GC3(P ) holds, then P is universally observable. Proof: If GC3(P ) holds, then the observation subtree for each P (i) is guarded. Thus, by Lemma 2, the derivation tree for each P (i) is guarded. But then, by Lemma 1, P is universally observable. Combining this with Lemma 3, we also obtain that universal observability is semi-decidable. The converse of Theorem 1 does not hold: the program comprising the clause p(a) ← p(X) is universally observable but not guarded, hence the above semi-decidability result. From our check for universal observability we obtain the desired check for existential liveness, and thus for observational productivity: Corollary 1 (Observational productivity is semi-decidable). Let P be a guarded logic program. If there exists a clause P (i) such that the derivation tree D for P and P (i) has an observation subtree D′ one of whose branches was truncated by Condition 2b of Definition 10, then P is existentially live. In this case, since P is also guarded and hence universally observable, P is observationally productive. 5 Related Work: Termination Checking in TRS and LP Because observational productivity is a combination of universal observability and existential liveness, and the former property amounts to termination of all rewriting trees, there is an intersection between this work and termination checking in TRS [22,1,8]. Termination checking via transformation of LP into TRS has been given in [20]. Here we consider termination of restricted form of SLD-resolution (given by rewriting derivations), therefore a much simpler method of translation of LP into TRS can be used for our purposes [6]: Given a logic program P and a clause P (i) = A ← B1 , . . . , Bn containing no existential variables, we define a rewrite rule A → fi (B1 , . . . , Bn ) for some fresh function symbol fi . Performing this translation for all clauses, we get a translation from P to a term-rewriting system TP . Rewriting derivations for P can be shown operationally equivalent to term-rewriting reductions for TP ; see [6] for a proof. Therefore, for logic programs containing no existential variables, any termination method from TRS may be applied to check universal observability (but not existential liveness). Algorithmically, our guardedness check compares directly with the method of dependency pairs due to Arts and Giesl [1,8]. Consider again TP obtained from a program P . The set R of dependency pairs contains, for each rewrite rule A → fi (B1 , . . . , Bn ) in TP , a pair (A, Bj ), j = 1, . . . , n; see [6]. The method of dependency pairs consists of checking whether there exists an infinite chain of dependency pairs (si , ti )i=1,2,3,... such that σi (ti ) →∗ σi+1 (si+1 ). If there is no such infinite chain, then TP is terminating. Again this translation from LP to dependency pairs in TRS is simpler than in [15], as rewriting derivations are a restricted form of SLD-resolution. Due to the restricted syntax of TP (compared to the general TRS syntax), generating the set of dependency pairs is equivalent to generating a set of rewriting trees for each clause of P and assuming σi = σi+1 (cf. our GC2). To find infinite chains, a dependency graph is defined, in which dependency pairs are nodes and arcs are defined whenever a substitution that allows a transition from one pair to another can be found. Finding such substitutions is the hardest part algorithmically. Note that every pair of neighboring and-nodes in a rewriting tree corresponds to a node in a dependency graph. Generating arcs in a dependency graph is equivalent to using our GC3 to find a representative set of substitutions. However, the way GC3 generates such substitutions via rewriting tree transitions differs completely from the methods approximating dependency graphs [1,22], and relies on the properties of S-resolution, rather than recursive path orderings. This is because GC3 additionally generates coinductive invariants for checking existential liveness of programs. Conceptually, observational productivity is a new property that does not amount to either termination or nontermination in LP or TRS. E.g. programs P3 and P4 are nonterminating (seen as LP or TRS), and P8 : p(X) ← q(Y ) is terminating (seen as LP and TRS) but none of them is productive. This is why the existing powerful tools (such as AProVE) and methods [1,8,15,20] that can check termination or nontermination in TRS or LP are not sufficient to serve as productivity checks. To check termination of rewriting trees, GC3 can be substituted by existing termination checkers for TRS, but none of the previous approaches can semi-decide existential liveness as GC3 does. 6 Implementation and Applications We implemented the observational productivity checker in parallel Go (golang.org) [19], which allows to experiment with parallelisation of proof search [10]. Loading a logic program P , one runs a command line to initialise the GC3 check. The algorithm then certifies whether or not the program is guarded (and hence universally observable). If that is the case, it also checks whether GC3 found valid coinductive invariants, i.e. whether P is existentially live and hence admits coinductive interpretations for some predicates. Appendix B (available in online version) gives further details. In the context of S-resolution [11,9], observational productivity of a program is a pre-condition for (coinductive) soundness of S-resolution derivations. This gives the first application for the productivity checker. But the notion of global productivity (as related to computations at infinity [14]) is a general property tracing its roots to the 1980s. A program is productive, if it admits SLD- or S-resolution derivations that compute (or produce) an infinite term at infinity. Thus the productivity checker has more general practical significance for Prolog. In this paper we further exposed its generality by showing that productivity can be seen as a general property of logic programs, rather than property of derivations in some special dialect of Prolog. Based on this observation, we identify three applications for productivity checks encompassing the S-resolution framework. (1) In the context of CoLP [7,21] or any other similar tool based on loop detection in SLD-derivations, one can run the observational productivity checker for a given program prior to running the usual interpreter of CoLP. If the program is certified as productive, all computations by CoLP for this program will be sound relative to the computations at infinity [14]. It gives a way to characterise a subset of theorems proven by CoLP that describe the process of production of infinite data. I.e., as explained in Introduction, CoLP will return answers for programs P3 , P4 and P5 . But if we know that only P5 is productive, we will know that only CoLP’s answers for P5 will correspond to production of infinite terms at infinity. (2) As our productivity checker also checks liveness of programs, it effectively identifies which predicates may be given coinductive semantics. This knowledge can be used to type predicates as inductive or coinductive. We can use these types to mark predicates in CoLP or any other coinductive dialect of logic programming, cf. Appendix B. (3) Observational productivity is also a guarantee that a sequence of mgus approximating the infinite answer can be constructed lazily even if the answer is irregular. E.g. our running example of program P6 is irrational and hence cannot be handled by CoLP’s loop detection. But even if we cannot form a closed-term answer for a query from(0, X), the productivity checker gives us a weaker but more general certificate that lazy approximation of our infinite answer is possible. These three groups of applications show that the presented productivity checker can be implemented and applied in any dialect of logic programming, irrespective of the fact that it initially arose from S-resolution research [11,9]. 7 Conclusions In this paper we have introduced an observational counterpart to the classical notion of global productivity of logic programs. Using the recently introduced formalism of Sresolution, we have defined observational productivity as a combination of two program properties, namely, universal observability and existential liveness. We have introduced an algorithm for semi-deciding observational productivity for any logic program. We did not impose any restrictions on the syntax of logic programs. In particular, our algorithm handles both existential variables and non-linear recursion. The algorithm relies on the observation that rewriting trees for productive and guarded programs must show term reduction relative to a contraction ordering from their roots to their leaves. But S-resolution derivations involving such trees can only proceed by adding term structure back in transitioning to new rewriting trees via mgus. This “producer/consumer” interaction can be formally traced by observing a derivation’s coinductive invariants: these record exactly the term patterns that both reduce in the loops of rewriting trees and are added back in transitions between these trees. References 1. T. Arts and J. Giesl. Termination of term rewriting using dependency pairs. TCS, 236(12):133 – 178, 2000. 2. B. Courcelle. Fundamental properties of infinite trees. TCS, 25:95–169, 1983. 3. D de Schreye and S. Decorte. Termination of logic programs: the never-ending story. Journal of Logic Programming, 19–20, Supplement 1:199–260, 1994. 4. J. Endrullis et al. Productivity of stream definitions. TCS, 411(4-5):765–782, 2010. 5. J. Endrullis et al. A coinductive framework for infinitary rewriting and equational reasoning. In RTA, pages 143–159, 2015. 6. P. Fu and E. Komendantskaya. Operational semantics of resolution and productivity in Horn clause logic. Formal Aspects of Computing, 2016. 7. G. Gupta et al. Coinductive logic programming and its applications. In ICLP, pages 27–44, 2007. 8. N.N. Hirokawa and A. Middeldorp. Dependency pairs revisited. In RTA, pages 249–268, 2004. 9. P. Johann et al. Structural resolution for logic programming. In Technical Communications of ICLP, 2015. 10. E. Komendantskaya et al. Exploiting parallelism in coalgebraic logic programming. ENTCS, (33):121–148, 2014. 11. E. Komendantskaya et al. Coalgebraic logic programming: from semantics to implementation. Journal of Logic and Computation, 26(2):745–783, 2016. 12. E. Komendantskaya and P. Johann. Structural resolution: a framework for coinductive proof search and proof construction in Horn clause logic. Submitted, 2015. 13. K. R.M. Leino and M. Moskal. Co-induction simply - automatic co-inductive proofs in a program verifier. In FM, pages 382–398, 2014. 14. J.W. Lloyd. Foundations of Logic Programming. Springer-Verlag, 2nd edition, 1988. 15. M.T. Nguyen et al. Termination analysis of logic programs based on dependency graphs. In LPOSTR 2007, pages 8–22, 2007. 16. F. Pfenning. Types in Logic Programming. The MIT Press, 1992. 17. A. Reynolds and J. Blanchette. A decision procedure for (co)datatypes in SMT solvers. In CADE, pages 197–213, 2015. 18. E. Rohwedder and F. Pfenning. Model and termination checking for higher-order logic programs. In ESOP, pages 296–310, 1996. 19. M. Schmidt. Productivity checker for LP, www.macs.hw.ac.uk/∼ek19/CoALP/, 2016. 20. P. Schneider-Kamp et al. Automated termination analysis for logic programs by term rewriting. In LOPSTR, pages 177–193, 2006. 21. L. Simon et al. Co-logic programming: Extending logic programming with coinduction. In ICALP, pages 472–483, 2007. 22. Terese. Term Rewriting Systems. Cambridge University Press, 2003. Appendix A. Proofs Proof of Proposition 1: GC2 is decidable Any rewriting tree T is either finite or infinite. If T is finite, then its guardedness is clearly decidable. So, we may, without loss of generality, assume T is infinite. If T is infinite then it must have an infinite branch B. We now show that an infinite branch B in T must necessarily contain an unguarded loop. Thus, whether T is finite or infinite, its guardedness is decidable. Assume B has only guarded loops, but it is infinite. Since the number of clauses and the number of function symbols in Σ are finite, B must contain an infinite number of loops. Consider one such infinite sequence q(t11 , ..., t1j ) → . . . → q(tk1 , ..., tkj ) → . . . → q(tl1 , ..., tlj ) → . . ., where q(t11 , ..., t1j ), q(tk1 , ..., tkj ), q(tl1 , ..., tlj ), ... are all atoms with the same predicate q obtained by rewriting using clause P (i). Because all loops in B are guarded, we have q(t11 , ..., t1j ) ⊲ q(tk1 , ..., tkj ), q(t11 , ..., t1j ) ⊲ q(tl1 , ..., tlj ),... But since q(t11 , ..., t1j ) is finite, there are only finitely many ways to construct a reducing subterm on it. Thus, there will be a point when some terms q(tm1 , ..., tmj ) and q(tn1 , ..., tnj ) in the infinite sequence in B have the same recursive reducing subterm t∗ relative to q(t11 , ..., t1j ). Now, there are two cases: i) q(t11 , ..., t1j )⊲q(tm1 , ..., tmj ) and q(t11 , ..., t1j )⊲q(tn1 , ..., tnj ) hold, but q(tm1 , ..., tmj ) ⊲ q(tn1 , ..., tnj ) does not, and ii) the negation of this case. – If q(t11 , ..., t1j )⊲q(tm1 ...tmj ) and q(t11 , ..., t1j )⊲q(tn1 , ..., tnj ) hold, but not q(tm1 , ..., tmj )⊲ q(tn1 , ..., tnj ), then q(tm1 , ..., tmj ) ⊲ q(tn1 , ..., tnj ) is an unguarded loop, which contradicts the assumption that all loops in B are guarded. – If the negation holds — i.e., if q(tm1 , ..., tmj ) ⊲ q(tn1 , ..., tnj ) holds or q(t11 , ..., t1j ) ⊲ q(tm1 , ..., tmj ) does not hold or q(t11 , ..., t1j )⊲q(tn1 , ..., tnj ) does not hold — then there are three cases. If either q(t11 , ..., t1j ) ⊲ q(tm1 , ..., tmj ) or q(t11 , ..., t1j ) ⊲ q(tn1 , ..., tnj ) does not hold, then the existence of this unguarded loop in B gives a contradiction. So we need only consider the case when q(t11 , ..., t1j ) ⊲ q(tm1 , ..., tmj ), q(t11 , ..., t1j ) ⊲ q(tn1 , ..., tnj ), and q(tm1 , ..., tmj ) ⊲ q(tn1 , ..., tnj ) are all guarded loops in B. Let t∗∗ be the recursive reducing subterm for the loop q(tm1 , ..., tmj ) ⊲ q(tn1 , ..., tnj ). Since the same recursive reducing subterm cannot be contracted twice along the same path from q(t11 , ..., t1j ), we must have that t∗ 6= t∗∗ and, moreover, contracting t∗∗ must somehow “restore” t∗ to q(t11 , ..., t1j ). And this means that t∗ and t∗∗ must be “independent”, in the sense of being on independent paths in q(t11 , ..., t1j ). But then there will be cycles of terms in B in which one argument of q decreases in one step and another independent one grows, and then the first argument grows while the other one decreases. So q(t11 , ..., tij ) will appear in the infinite branch infinitely many times (so definitely more than once!), and B will thus contain an unguarded loop in this case as well. This is again a contradiction. Proof of Lemma 1: Guardedness of derivation trees implies universal observability If P is not universally observable, then there exists an atom A such that the rewriting tree T for P and A is infinite. Moreover, A must match some clause head (P (i)) via a mgm θ, so in fact T is an infinite rewriting tree for P and θ(head (P (i))), with additional condition that θ is also applied to all atoms of this tree. Then, as in the proof of Proposition 1, there must exist an unguarded loop L on an infinite branch B of T . We claim that, if we construct a derivation tree Di for the program P and head (P (i)), then some rewriting tree in Di will contain an unguarded loop. Let us consider the construction of Di . If the first rewriting tree of Di , i.e. the tree T ′ for P and head (P (i)) does not itself contain an unguarded loop, then the branch in T ′ corresponding to B in T must have a leaf node T ′ (w) given by an atom that unifies with a clause P (k1 ) via mgu σ1 , say. Moreover, P (k1 ) is exactly the clause used to construct a node T (wi) of B in T via its mgm with T (w). Now, consider the rewriting tree transition determined by the mgu σ1 , i.e. consider T ′ → Tw′ . If the branch corresponding to B in Tw′ does not contain an unguarded loop, then it too must have a leaf node Tw′ (u) that unifies with P (k2 ) via mgu σ2 , say, and P (k2 ) is exactly the clause used to construct a node T (vj) of B in T via its mgm with T (v). And so on. After some finite number n of tree transitions, of “growing” the branch corresponding to B in T ′ by taking further mgu’s on its leaves, we must come to a rewriting tree T ∗ for P and the root atom σ(head (P (i))) in Di that contains an unguarded loop corresponding to L, and where σ = σn ◦ ... ◦ σ1 for the mgu’s σ1 , ..., σn involved in the tree transitions in Di . Indeed, since branches B of T and T ∗ are constructed using mgm’s with exactly the same clauses at each step, and since the mgu’s σ1 , ..., σn are all most general unifiers, we must have that σ is more general than θ, and thus T ∗ is a more general version of T , and so contains an unguarded loop that is a more general version of L. Proof of Proposition 3: Finiteness of observation subtrees Let D′ be the observation subtree of the derivation tree D for a program P and an atom A. If D is finite, then D′ will necessarily be finite, so we may, without loss of generality, suppose D is infinite. If there exists a rewriting tree in D that is unguarded, then, by Condition 2a of Definition 10, the branch of D on which that tree appears will end at that tree in D′ and will thus be finite. For D′ to be infinite, there must exist an infinite branch of D containing only guarded rewriting trees such that coinductive invariants computed in that branch never repeat. In fact, every infinite branch of D′ must satisfy these two conditions. Let T be any guarded rewriting tree on any infinite branch of D. We first note that the coinductive invariant ci(T ) must be non-empty. In addition, T must itself be finite. Indeed, if T were infinite then, by the completeness of breadth-first search, an unguarded rewriting tree would have to exist at some finite depth on T ’s branch of D. Then, by the argument of the preceding paragraph, T ’s branch of D would have to be finite. But this is not the case. So T must be a finite, guarded rewriting tree appearing on an infinite branch of D. Now, although D itself is infinite, Proposition 2 ensures that D’s coinductive invariant set still contains only finitely many clause projections, so any branch of D can add only finitely many distinct elements to D’s coinductive invariant set. In particular, the coinductive invariants for nodes on T ’s infinite branch of D must eventually all be equal. Moreover, since ci(T ) 6= ∅, these coinductive invariants must eventually all be non-empty. Thus Condition 2b of Definition 10 must eventually be satisfied and the branch of D′ corresponding to T ’s branch in D must thus be finite. Having argued that the branch of D′ corresponding to any infinite branch of D is finite, we have that D′ is itself finite. Proof of Lemma 2: Guardedness of observation subtree implies guardedness of derivation tree The proof proceeds by induction-coinduction. We assume the observation subtree D′ for D is guarded and inductively examine every branch B ′ of D′ . This is possible because the number of such branches and their lengths are all finite by Proposition 3. For any such B ′ , either no parent of any leaf in the last coinductive tree of B ′ can be resolved with any clause of P , or B ′ was terminated by Condition 2b of Definition 10. In the former case, the entire branch B ′ will also appear in D, and each rewriting tree on the corresponding branch B of D will be guarded. In the latter case, we can proceed coinductively. If B ′ was terminated because it contains a guarded transition T =⇒ T ′ for T = D(w) and T ′ = D(wv), then both T and T ′ were formed by resolving with some clause P (k). In this case, we apply the following coinductive argument. Coinductive Hypothesis (CH): The process of resolving with clause P (k) to produce a new guarded rewriting tree whose coinductive invariant has first component P (k) can be repeated infinitely many times in transition sequences originating from T . By computing that CH is again satisfied for T ′ , we can make the following Coinductive Conclusion (CC): For any tree T in any branch B containing B ′ , the process of resolving with clause P (k) to produce a new guarded rewriting tree whose coinductive invariant has first component P (k) can be repeated infinitely many times in transition sequences originating from T . So each of the rewriting trees in B must be guarded. Unfortunately, CC does not guarantee that no unguarded loop can possibly occur in D by resolving with other clauses in the sequence of transitions from T ′ that occur in B but not in B ′ . But if it is possible to compute a sequence of rewriting tree transitions in D from T ′ involving mgus θ1 , . . . , θn computed by resolving with clauses P (k1 ), . . . , P (kn ) that lead to an unguarded rewriting tree in B, then, by completeness of the breadth-first construction of the derivation tree D, there must be a a rewriting tree T ∗ occurring in the sequence of rewriting trees in B ′ from T to T ′ that leads to a sequence of rewriting tree transitions in another branch B ′′ of D involving exactly the same sequence P (k1 ), . . . , P (kn ) of clauses and mgus θ1′ , . . . , θn′ such that, for each i ∈ {1, ..., n}, θi′ = σi ◦ θi for some σi . This holds because rewriting tree transitions only lead to further instantiations of variables, and the rewriting tree T ∗ appears earlier on B than T ′ does, and hence is more general. But then an unguarded loop induced by the mgus θ1′ , . . . , θn′ obtained by resolving with P (k1 ), . . . , P (kn ) will be found in one of the branches of D′ to which T ∗ leads. By inducting on all branches of the observation subtree D′ of D, and coinductively terminating each, we conclude that if all branches of D′ are terminated by the above coinductive argument with no unguarded rewriting tree being found, then no unguarded loop can exist in any of the rewriting trees of D. Proof of Lemma 3: GC3 is decidable To decide guardedness of logic programs, we must let P be given and construct a set of derivation trees, one derivation tree for each clause head of P , i.e. every such Di is a derivation tree for P and head (P (i)). Moreover, we build these trees only until we construct the observation subtree Di′ for each Di . We next check whether or not each observation subtree Di′ is guarded. That is, we must check whether or not every rewriting tree in Di′ is guarded and whether or not condition 2.a of Definition 10 was used to construct Di′ . Since guardedness of rewriting trees is decidable by Proposition 1, and there are only finitely many rewriting trees in any observation tree Di′ , guardedness of all observation subtrees Di′ for this program is decidable. Since, by Lemma 2, guardedness of observation subtrees implies guardedness of derivation trees, guardedness of P is also decidable. Appendix B. Implementation of Observational Productivity Checks Algorithmic overview of observational productivity checking Definitions of contraction ordering, guarded rewriting trees, and observation subtrees translate naturally into algorithmic forms that give rise to the implementation of our observational productivity checks [19]. Below we give a high-level pseudocode representation of the formal definitions of this paper. Algorithm 1 below captures the essence of our check that GC3(P ) holds for a logic program P . It depends on the definition of the observation subtree (Definition 10), which in turn depends on two conditions: – finiteness of observation subtrees, as proven in Proposition 3, and – guardedness of every rewriting tree in a program’s observation subtree. These two conditions ensure termination of Algorithm 1, as expressed formally in Lemma 3. In the main body of this paper we have written GC2(T ) to indicate that a rewriting tree T is guarded. A pseudocode description of our check that GC2(T ) holds for a rewriting tree T is given in Algorithm 2. Termination of Algorithm 2 depends crucially on Proposition 1, i.e., on the fact that it is impossible to construct an infinite rewriting tree without finding unguarded loops. Algorithm 2 in turn relies on an algorithmic check that two terms are related via a contraction ordering, but we omit specifying this in pseudocode since it is entirely straightforward. Implementation Our observational productivity checker is implemented in Go (golang.org) as a command line program and is part of the general implementation of structural resolution and coalgebraic logic programming (CoALP) [19]. Go was chosen as implementation language because it provides easy primitives for parallelization, which has been explored Algorithm 1 Observational productivity check for a logic program Require: P – a logic program over signature Σ Require: LC – an empty list n = number of clauses in P for i = 0, . . . , n do if observation subtree D′ of the derivation tree D for P and head (P (i)) is unguarded then P (i) is not guarded. else P (i) is guarded. if D′ contains transition D(v) =⇒ D(w) with coinductive invariant c then LC := append(LC, c) end if end if end for if all P (i) are guarded then Result1 := “P is guarded” else Result1 := “P is not guarded” end if if LC is not empty then Result2 := “P is existentially live with LC” else Result2 := “P has finite derivations only” end if return (Result1, Result2) Algorithm 2 Guardedness check in a rewriting tree Require: T – the rewriting tree for a logic program P and an atom A for i = 0, . . . , depth(T ) do for nodes w1 , . . . wm at depth i do if a node wj forms a loop with some node v above it then if loop(T, v, wj ) is not guarded then return “T is not guarded” end if end if end for end for return “T is guarded” to optimize proof search [10]. To compile and install the productivity checker follow the instructions in the README file supplied in the program distribution available at [19]. CoALP can be used not only to check the productivity of logic programs, but to make queries to guarded such programs as well. The checker takes Prolog-style programs saved in text files as input. The format of programs corresponds exactly to that of Prolog. For example, program P6 is represented as from(X, scons(X, Y)) :- from(s(X), Y). Unlike Prolog, our checker does not support built-in predicates or arithmetic functions. To check a logic program for observational productivity, the path to the program file has to be given as the first parameter: guardcheck somefile.logic The above command initialises the GC3(P ) check for a given logic program P in somefile.logic, and, as GC3 involves computations of coinductive invariants, it simultaneously uses them to detect existential liveness, as detailed in Algorithm 1. Many example files and tests as well as the programs used in this paper can be found in the directory named “examples” in [19]. The output for the observationally productive program P6 is: Program is guarded. Program is existentially live with coinductive invariants: in clause 0 of "from": [{0 | scons(v3,v5) | [1]}] Note that the first 0 in [0 | scons(v3,v5) | [1]] points to the clause P6 (0), and would suggest that the predicate from in the head of this clause is a good candidate to be given coinductive semantics and hence coinductive typing. We believe that this general information can be used by CoLP or CoALP to determine typing for coinductive predicates in their programs. The output for the unguarded program P7 is: Program is not guarded. Goal q(s(v34),s(v34),s(v42),v36) results in unguarded loop in path [(p:0), (q:0), (p:0)]. A more complex example In this section, we consider a more challenging example of Sieve of Eratosthenes, known for its difficulty in the literature on coinductive definitions [7]. The following program P9 is an observationally productive reformulation of the original Sieve of Eratothsenes program from [7]: 0. prime(X) ← inflist(I), sieve(I, L), member(X, L) 1. sieve(cons(H, T), cons(H, R)) ← filter(H, T, F), sieve(F, R) 2. filter(H, cons(K, T), cons(K, T1)) ← mod(X, K, H), less(0, X), filter(H, T, T1) 3. filter(H, cons(K, T), T1) ← mod(0, K, H), filter(H, T, T1) 4. int(X, cons(X, Y)) ← int(s(X), Y, Z1) 5. inflist(I) ← int(s(s(0)), I) 6. member(X, cons(X, L)) ← 7. member(X, cons(Y, L)) ← member(X, L) 8. less(0, s(X)) ← 9. less(s(X), s(Y)) ← less(X, Y) The original program [7] does not use Prolog-style list notations and uses a structural representation of numbers, which we avoid. We also assume a suitable implementation of the modulo operator as the predicate mod above. If we run the observational productivity check on this program, we obtain the following output: Program is guarded. Program is existentially live with coinductive invariants: in clause 0 of "filter": [{0 | cons(v16,v17) | [1]} {0 | cons(v16,v18) | [2]}] in clause 1 of "filter": [{1 | cons(v24,v25) | [1]}] in clause 0 of "sieve": [{0 | cons(v10,v11) | [0]} {0 | cons(v10,v12) | [1]}] in clause 1 of "member": [{1 | cons(v37,v38) | [1]}] in clause 1 of "less": [{1 | s(v40) | [0]} {1 | s(v41) | [1]}] Above, four predicates have been identified as potentially having a coinductive semantics: filter, sieve, member and less. Generally, most inductive definitions admit coinductive interpretation, and predicates that we intuitively consider as inductive may be identified as potentially coinductive. This situation was analysed in Example 2. Among the four predicates, sieve, that admits only coinductive interpretation, was identified. We note that the original formulation of [7] is not observationally productive, since it does not possess universal observability property. If we run our checker on the formulation in [7], failure of observational productivity is detected and reported as follows: Program is not guarded. Goal comember(v136,v140) results in unguarded loop in path [(primes:0), (comember:0), (comember:0)]. As indicated by the checker output, the reason is that the following definition of comember used in [7] is not universally observable and hence is not guarded: 0. comember(X, L) ← drop(X, L, L1), comember(X, L1) 1. drop(H, cons(H, T), T) ← 2. drop(H, cons(H, T), T) ← drop(H, T, T1) Indeed, the definition of comember in Clause 0 above is not guarded by any constructors. In our reformulation as program P9 above, we use a guarded definition of member instead of the definitions of comember and drop used in [7]. The definition of member is guarded by the constructor cons in Clause 7. Thus, in the case of the Sieve of Eratothsenes, the transition from an unproductive to a productive coinductive definition was a simple matter of applying a program transformation that clearly preserves the intended coinductive meaning of the coinductive definition of seive in Clause 1.
6cs.PL
arXiv:1801.03160v2 [cs.AI] 21 Mar 2018 A Formalization of Kant’s Second Formulation of the Categorical Imperative Felix LINDNER a,1 Martin Mose BENTZEN b Group on the Foundations of Artificial Intelligence, Department of Computer Science, Albert-Ludwigs-Universität Freiburg, Germany b Management Engineering, Technical University of Denmark, Lyngby, Denmark a Research Abstract. We present a formalization and computational implementation of the second formulation of Kant’s categorical imperative. This ethical principle requires an agent to never treat someone merely as a means but always also as an end. Here we interpret this principle in terms of how persons are causally affected by actions. We introduce Kantian causal agency models in which moral patients, actions, goals, and causal influence are represented, and we show how to formalize several readings of Kant’s categorical imperative that correspond to Kant’s concept of strict and wide duties towards oneself and others. Stricter versions handle cases where an action directly causally affects oneself or others, whereas the wide version maximizes the number of persons being treated as an end. We discuss limitations of our formalization by pointing to one of Kant’s cases that the machinery cannot handle in a satisfying way. Keywords. Machine Ethics, Causal Networks, Categorical Imperative 1. Introduction It has been suggested that artificial agents, such as social robots and software bots, must be programmed in an ethical way in order to remain beneficial to human beings. One prominent ethical theory was proposed by Immanuel Kant [1]. Here, we propose a formalization and implementation of Kant’s ethics with the purpose of guiding artificial agents that are to function ethically. In particular, the system will be able to judge whether actions are ethically permissible according to Kant’s ethics. In order to accomplish this we focus on the second formulation of Kants categorical imperative. Kant proposed three formulations of the categorical imperative. We formalize and implement the second formulation and do not take a stance on the interrelation of Kant’s three formulations. The second formulation of Kant’s categorical imperative reads: Act in such a way that you treat humanity, whether in your own person or in the person of any other, never merely as a means to an end, but always at the same time as an end. (Kant, 1785) 1 Corresponding Author: Department of Computer Science, University of Freiburg, Georges-Köhler-Allee 52, D-79110 Freiburg, Germany; E-mail: [email protected]. We take it to be the core of the second formulation of the categorical imperative that all rational beings affected by our actions must be considered as part of the goal of the action. The paper is structured as follows: We first briefly review related work. Then, building upon our earlier work [2], we introduce an extension of Pearl-Halpern-style causal networks which we call Kantian causal agency models. These models serve as a formal apparatus to model the morally relevant aspects of situations. We then define an action’s permissibility due to the categorical imperative, while considering two readings of being treated as a means. To deal with Kant’s wider duties, we introduce an extra condition according to which an agent should maximize the number of persons being treated as an end. Finally, we briefly showcase the computational implementation of the categorical imperative within the HERA software library2 . 2. Related work In machine ethics, several ethical theories have been formalized and implemented, e.g., utilitarianism, see [3,4], the principle of double effect, see [5,6], pareto permissibility, see [2], and Asimov’s laws of robotics, see [7]. It has been suggested for some time that Kant’s ethics could be formalized and implemented computationally, see [8,9]. Powers [8] suggests three possible ways of formalizing Kant’s first formulation of the categorical imperative, through deontic logic, nonmonotonic logic, or belief revision. The first formulation of the categorical imperative states that you must be able to want that the subjective reasoning (or maxim) motivating your action becomes a universal law and as Kant claims that this in some cases is a purely formal matter, it should be possible to formalize it. However, Powers does not provide details of a formalization or a computational implementation, so the formalization of the first formulation in effect remains an open problem. The work presented here differs in that we focus on the second formulation of the categorical imperative and in that we present a precise formal representation and computational implementation of the formal theory. Rather than taking a starting point in one of the paradigms Powers suggests, we use formal semantics and causal agency modelling as this is fitting for the means-end reasoning central to the second formulation. Philosophically, our formalization is best seen as a rational reconstruction within this framework of what we take to be the central ideas of Kant’s second formulation. Ultimately, although we are sympathetic to Kant and sensitive to the original text, the goal of our work is not to get close to a correct interpretation of Kant, but to show that our interpretation of Kant’s ideas can contribute to the development of machine ethics. To meet this goal, our interpretation has to be detailed and explicit enough to provide a decision mechanism for the permissibility or not of specific actions in specific situations. 3. Kantian Causal Agency Models In order to formalize the second formulation of the categorical imperative, we assume some background theory. First, we assume that actions are performed by agents, and that 2 http://www.hera-project.com actions and their consequences can affect a set of moral patients, i.e. persons who must be considered ethically in a situation. The agent itself is also one of the moral patients. The agent has available a set of actions which will have consequences given background conditions. Some of the action’s consequences are the goals of the action. The actions and consequences that together cause my goal are the means of the action. Patients, who are affected by these means are treated as a means, and patients, who are affected by my goal are treated as an end. For example, I (agent) have the option available to press the light switch (action), and given that the light bulb is not broken (background condition), the light will go on (consequence), which leads to me being able to read my book (consequence). The last consequence was also my goal, and it affects me in a positive way. The action thus treats me as an end. Within this informally characterized framework, we can reformulate the second formulation of the categorical imperative as follows: Act in such a way, that whoever is treated as a means through your action (positively or negatively and including yourself), must also be treated as an end of your action. The purpose of what follows is to formalize these intuitions. As a first step, we now give the formal definition of the models we will be using in Definition 1. We call these models Kantian causal agency models to set them apart from the causal agency models we used in our earlier work [2], and which had no formal tools to consider moral patients affected by one’s actions. Definition 1 (Kantian Causal Agency Model) A Kantian causal agency model M is a tuple (A, B,C, F, G, P, K,W ), where A is the set of action variables, B is a set of background variables, C is a set of consequence variables, F is a set of modifiable boolean structural equations, G = (Goal1 , . . . , Goaln ) is a list of sets of variables (one for each action), P is a set of moral patients (includes a name for the agent itself), K is the ternary affect relation K ⊆ (A ∪ C) × P × {+, −}, and W is a set of interpretations (i.e., truth assignments) over A ∪ B. A (actions), B (background variables) and C (consequences) are finite sets of boolean variables with B and C possibly empty. W is a set of boolean interpretations of A ∪ B. Thus, the elements of W set the truth values of those variables that are determined externally, and thus specify the concrete situation. We require that all interpretations in W assign true to exactly one action a ∈ A. As a notational convention, by M, wa and M, wb we dinstinguish two situations that only differ in that in the first situation, action a is performed, and in the second situation, action b is performed. Causal influence is determined by the set F of boolean-valued structural equations. Each variable ci ∈ C is associated with the function fi ∈ F. This function will give ci its value under an interpretation w ∈ W . An interpretation w is extended to the consequence variables as follows: For a variable ci ∈ C, let {ci1 , . . . , cim−1 } be the variables of C \ {ci }, B = b1 , . . . , bk , and A = {a1 , . . . , an } the action variables. The assignment of truth values to consequences is determined by: w(ci ) = fi (w(a1 ), . . . , w(an ), w(b1 ), . . . , w(bk ), w(ci1 ), . . . , w(cim−1 )) To improve readability, we will use the notation c := φ to express that c is true if φ is true, where φ can be any boolean formula containing variables from A ∪ B ∪C and its negations. For instance, the boolean structural equations for the light-switch example will be written as F = {lightOn := press ∧ ¬bulbBroken, canReadBook := lightOn}. In the general setting, it may be unfeasible to extend an interpretation from the action variables to the rest of the variables, because it is possible that the value of some variable depends on the value of another variable, and the value of the latter variable depends on the value of the former. Dependence is defined in Definition 2. Definition 2 (Dependence) Let vi ∈ C, v j ∈ A ∪ B ∪ C be distinct variables. The variable vi depends on variable v j , if, for some vector of boolean values, fi (. . . , v j = 0, . . .) 6= fi (. . . , v j = 1, . . .). Following Halpern [10], we restrict causal agency models to acyclic models, i.e., models in which no two variables are mutually dependent on each other. First, note that the values of action variables in set A and the values of background variables in set B are determined externally by the interpretations in W . Thus, the truth values of action variables and background variables do not depend on any other variables. Additionally, we require that the transitive closure, ≺, of the dependence relation is a partial order on the set of variables: v1 ≺ v2 reads “v1 is causally modified by v2 ”. This enforces absence of cycles. In case of acyclic models, the values of all consequence variables can be determined unambiguously: First, there will be consequence variables only causally modified by action and/or background variables, and whose truth value can thus be determined by the values set by the interpretation. Call these consequence variables level one. On level two, there will be consequence variables causally modified by action variable, background variables, and level-one consequence variables, and so on [5,10]. Some of the definitions below will make use of causality. Thus, to take causation into account, Definition 3 defines the relation of y being a but-for cause of φ , see [10]. Definition 3 makes use of external interventions on models. An external interventions X consists of a set of literals (viz., action variables, consequence variables, background variables, and negations thereof). Applying an external intervention to a causal agency model results in a new causal agency model MX . The truth of a variable v ∈ A ∪ B ∪C in MX is determined in the following way: If v ∈ X, then v is true in MX , if ¬v ∈ X, then v is false in MX , and if neither v ∈ X nor ¬v ∈ X, then the truth of v is determined according to its structural equation in M. External interventions thus override structural equations of the variables occuring in X. Definition 3 (Actual But-For Cause) Let y be a literal and φ a formula. We say that y is an actual but-for cause of φ (notation: y φ ) in the situation the agent choses option wa in model M, if and only if M, wa |= y∧ φ and M{¬y} , wa |= ¬φ . The first condition requires that both the cause and the effect must be actual. The second condition requires that if y had not been the case, then φ would have not occurred. Thus, in the chosen situation, y was necessary to bring about φ . Sometimes it is convenient to be able to talk about causality in the logical language used to talk about the models. In accordance with Halpern’s [10] notation, we can define that y is a but-for cause of φ in model M, wa iff M, wa |= y ∧ φ ∧ [y ← ⊥]¬φ holds. This definition is equivalent to Definition 3. So, in the above light-switch example, we might want to determine if ¬bulbBroken is a cause of canReadBook. And indeed, if we consider the model M{bulbBroken}, w press , we can determine that canReadBook is false, written M{bulbBroken}, w press 6|= canReadBook. Consequently, we obtain M, w press |= [bulbBroken ← ⊤]¬canReadBook, i.e., under the intervention that sets bulbBroken true, canReadBook is false. The concept of but-for cause allows us to introduce the useful concept of direct consequences via Definition 4. Definition 4 (Direct Consequence) A consequence c ∈ C is a direct consequence of v ∈ A ∪ B ∪ C in the situation M, wa iff M, wa |= v c. Persons can be affected by actions or consequences either in a positive or in a negative way. To represent that some action or consequence affects a person positively or negatively, we introduce the notations ⊲+ and ⊲− , respectively. Thus, M, wa |= c ⊲+ p holds iff (a, c, +) ∈ K, and M, wa |= c ⊲− p holds iff (a, c, −) ∈ K. We use ⊲ in case the valence of affection is not relevant. This finalizes the exposition of the background theory. We will now consider how to make permissibility judgments about actions as defined in the context of Kantian causal agency models using the categorical imperative. 4. Categorical Imperative Defined The second formulation of the categorical imperative requires an agent to never treat someone merely as a means but always also as an end. Thus, to formalize under which conditions an action is permitted by the categorical imperative, we first define the concept of someone being treated as an end (Definition 5). We then proceed to formalize two possible readings of the concept of someone being treated as a means (Definition 6 and Definition 7). Definition 5 (Treated as an End) A patient p ∈ P is treated as an end by action a, written M, wa |= End(p), iff the following conditions hold: 1. Some goal g of a affects p positively.  W M, wa |= g Goal(g) ∧ g ⊲+ p . 2. None of the goals of a affect p negatively. V M, wa |= g (Goal(g) → ¬(g ⊲− p)) Thus, being treated as an end by some action means that some goal of the action affects one in a positive way. One could say that the agent of the action, by performing that action, considers those who benefit from his goal. Things are less clear regarding the concept ‘being treated as a means’. As a first step, we define two versions of the concept which we refer to as Reading 1 and Reading 2. Both readings make use of the causal consequences of actions. Reading 1 considers a person used as a means in case she is affected by some event that causally brings about some goal of the action. As a consequence, negative side effects are permitted. Consider, for instance, the classical trolley dilemma, where the agent has the choice to either pull the lever to lead the tram onto the second track killing one person, or refraining from pulling letting the tram kill five persons on the first track. Under Reading 1, in case of pulling, the one agent is not treated as a means. This reading is probably closest to what we informally mean by ‘being treated as a means’. Reading 2 requires that everybody affected by any direct consequence of the action is considered as a goal, hence, also the person on the second track. As a consequence, everyone treated as a means according to Reading 1 is also treated as a means according Reading 2, but Reading 2 may include additional patients. This reading is further from the everyday understanding of means-end reasoning, but is probably closer to what some people expect of a Kantian ethics. We consider it a feature of a formal framework that we are able to formalize such distinctions, but we leave it for the modeler to decide which one of the readings is more useful for a given application. Definition 6 (Treated as a Means, Reading 1) A patient p ∈ P is treated as a means by action a (according to Reading 1), written M, wa |= Means1 (p), iff there is some v ∈ A ∪C, such that v affects p, and  v is a cause of W W some goal g, i.e., M, wa |= v (a v ∧ v ⊲ p) ∧ g (v g ∧ Goal(g)) . Definition 7 (Treated as a Means, Reading 2) A patient p ∈ P is treated as a means by action a (according to Reading 2), written M, wa |= Means2 (p), iff there is some direct consequence v ∈ A ∪ C of a, such that v  W affects p, i.e., M, wa |= v a v ∧ v ⊲ p . Having defined both being treated as an end and being treated as a means, the permissibility of actions according to the second formulation of the categorical imperative can now be defined in Definition 8. The formulation requires that noone is merely used as a means, but always at the same time as an end. Definition 8 (Categorical Imperative) An action a is permitted according to the categorical imperative, iff for any p ∈ P, if p is treated as a means (according to Reading N) then p is treated as an end V M, wa |= p∈P (MeansN (p) → End(p)) There are thus two main reasons why an action is not permitted. Either a patient is treated as a means but is left out of consideration by the end of the action. Or, the action is done for an end that affects someone negatively. Note that the choice between Reading 1 and Reading 2 yields significant implications, as can be seen in the Trolley dilemma: According to Reading 1, pulling the lever is permissible, because the one person on the other track is not treated as a means, and therefore it is permissible to not consider her as an end. According to Reading 2, however, pulling the lever is impermissible, because the one person on the other track is treated as a means while she does not benefit from the goal (and is thus not treated as an end). Refraining from action is permitted by the categorical imperative according to both the readings of ‘being treated as a means’ (more about this issue below in the Section on wide duties). 5. Cases of Strict Duty We will now provide examples that highlight aspects of the definition of the categorical imperative. Although these do not prove it correct in any formal sense they can be used to discuss its appeal as an ethical principle as an explication of Kant’s ideas. First, we A = {suicide} A = {amputate} C = {dead} C = {survives} P = {Bob} P = {Bob} F = {dead := suicide} F = {survives := amputate} K = {(suicide, Bob, +)} K = {(amputate, Bob, −), G = (Goalsuicide = {dead}) (survives, Bob, +)} G = (Goalamputate = {survives}) (a) Model M1 (b) Model M1∗ Figure 1. Kantian Causal Agency Models yielding the impermissibility of Suicide (M1 ) and the permissibility of Amputation (M1∗ ). rephrase three cases that contain what Kant calls strict duties (and two of which Kant himself used to explain his ideas). 5.1. Example 1: Suicide Bob wants to commit suicide, because he feels so much pain he wants to be relieved from. This case can be modeled by a causal agency model M1 that contains one action variable suicide and a consequence variable dead, see Figure 1a. Death is the goal of the suicide action (as modeled by the set G), and the suicide affects Bob (as modeled by the set K). In this case, it does not make a difference whether the suicide action affects Bob positively or negatively. We assume that the suicide affects noone other than Bob, because Kant’s argument is not about the effect of suicide on other people but about the lack of respect of the person commiting suicide. The reason why Bob’s suicide is not permitted is that the person affected by the suicide, viz., Bob, does not benefit from the goal, because he is destroyed and thus cannot be affected positively by it. He is thus treated as a means to his own annihilation from which he receives no advancement. Therefore, the first condition of the categorical imperative (Definition 8) is violated according to both readings (1 and 2), because M1 , wsuicide |= Means{1,2} (Bob) holds but M1 , wsuicide |= End(Bob) does not. As noted above, we could say that the suicide affects Bob negatively, and the action would also be impermissible. The reason for the impermissibility of suicide also in this case is not due to the fact that Bob does something harmful towards himself. As Kant also remarks, other harmful actions would be allowed, e.g., risking your life or amputating a leg to survive. To see this, consider Figure 1b, where M1 has been be slightly modified to M1∗ : We rename suicide to amputate and dead to survives. Moreover, we add (amputate, Bob, −) to K. In this case, Bob is positively affected by the goal, and thus the act of amputation is permitted. The modified example also shows that in some cases, the categorical imperative is more permissive than the principle of double effect, which strictly speaking never allows negative means to an end (cf., [5]). A = {give f lowers} A = {give f lowers} C = {alice happy, celia happy} C = {alice happy, celia happy} P = {Bob, Alice,Celia} P = {Bob, Alice,Celia} F = {alice happy := give f lowers F = {alice happy := give f lowers celia happy := alice happy} celia happy := alice happy} K = {(alice happy, Alice, +), K = {(alice happy, Alice, +), (celia happy,Celia, +)} (celia happy,Celia, +)} G = (Goalgive f lowers = {celia happy }) (a) Model M2 G = (Goalgive f lowers = {celia happy, alice happy}) (b) Model M2∗ Figure 2. Kantian Causal Agency Models yielding the impermissibility of giving flowers to Alice to make Celia happy (M2 ) and the permissibility of doing so if making Celia happy is a goal as well (M2∗ ). 5.2. Example 2: Giving Flowers We consider the fact that an action can be judged as impermissible by the categorical imperative although noone is negatively affected a feature of the categorical imperative that inheres in no other moral principles formalized so far. The following example showcases another situation to highlight this feature: Bob gives Alice flowers in order to make Celia happy when she sees that Alice is thrilled about the flowers. Alice being happy is not part of the goal of Bob’s action. We model this case by considering the Kantian causal agency model M2 shown in Figure 2a. In the model M2 , the action give f lowers is not permitted according to the categorical imperative, because Bob is using Alice as a means to make Celia happy, but not considering her as part of the goal of the action. This action is immoral, even though the action has positive consquences for all, and no bad consequence are used to obtain a good one. Again, this example shows how the Kantian principle differs from other ethical principles such as utilitarianism and the principle of double effect, because these principles would permit the action. The model M2 can be extended to model M2∗ shown in Figure 2b. In model M2∗ , Bob’s action is permitted by the Kantian principle. The only thing in which M2∗ differs from M2 is that the variable alice happy is added to the set Goalgive f lowers . In this case, Alice is both treated as a means and treated as an end, which is permitted by the categorical imperative. The flower example demonstrates how demanding the categorical imperative is, because the principles requires that everybody affected by ones’ action must be treated as a goal: This includes the taxi driver that drives you to your destination, as well as the potential murderer you defend yourself against. In these examples, the ethical principle requires one to, e.g., have the taxi driver’s earning money among one’s goals, and the murderer’s not going to jail. A = {borrow} C = {bob keeps 100Dollar f orever} P = {Alice, Bob} F = {bob keeps 100Dollar f orever := borrow} K = {(borrow, Bob, +), (borrow, Alice, −), (bob keeps 100Dollar f orever, Bob, +), (bob keeps 100Dollar f orever, Alice, −)} G = (Goalborrow = {bob keeps 100Dollar f orever}) Figure 3. Model M3 for the case of Bob making a false promise to Alice. 5.3. Example 3: False Promise We return to a case mentioned by Kant himself. Consider that Bob makes a false promise to Alice. Bob borrows one 100 Dollars from Alice with the goal of keeping the money forever. He knows that it is an inevitable consequence of borrowing the money that he will never pay it back. Figure 3 shows the model of this situation, M3 . The action is impermissible, because Alice is treated as a means (by both Reading 1, Definition 6, and Reading 2, Definition 7) while she is not treated as an end. In this case, none of the two conditions for ‘being treated as an end’ (Definition 5) are met. 6. Cases of Wide Duty Examples 1, 2 and 3 are instances of what Kant calls necessary, strict, narrower duties to oneself and to others, and it seems obvious they involve using a person as a means. Kant also presents two other examples to which we now turn. These involve what Kant calls contingent, meritorious, or wider duties. His arguments for these appear more vague and at least from our perspective harder to handle. We now turn to wide duties and discuss, through an example, how actions that indirectly affect others by refraining from preventing harmful consequences could be handled, and we learn through another example where the limitations of our formalization attempt are. 6.1. Example 4: Not Helping Others Bob who has everything he needs, does not want to help Alice who is in need. Let us assume she is drowning and Bob is refraining from saving her live. Formally, the situation in the example can be represented with a causal agency model M4 that contains one background variable accident representing the circumstances that led to Alice being in dire straits, two action variables rescue and refrain and a consequence variable drown. Moreover, ¬drown is the goal of rescue. See Figure 4 for the specification of the model. A = {rescue, refrain} B = {accident} C = {drown} P = {Alice, Bob} F = {drown := accident ∧ ¬rescue} K = {(drown, Alice, −), (¬drown, Alice, +)} G = (Goalrescue = {¬drown}, Goalrefrain = 0) / Figure 4. Model M4 for the impermissibility of not helping others. According to the categorical imperative using Readings 1 and 2 of ‘being treated as a means’ both rescue and refrain are permitted. Bob is strictly speaking not using Alice as a means by going about his business. Kant gives us a clue of how to formalize an argument against refraining in that he says we have to make other people’s ends our own as far as possible. Kant writes that ‘For a positive harmony with humanity as an end in itself, what is required is that everyone positively tries to further the ends of others as far as he can.’ One way of understanding this is as an additional requirement on top of the categorical imperative of choosing an action whose goals affect most people positively. This understanding is captured in Definition 9. Definition 9 (Meritorious principle) Among actions permitted by the categorical imperative, choose one whose goals affect most patients positively. The meritorious principle thus goes beyond simply avoiding to treat others as means by acitvely helping them. As formulated here, the principle is compatible with the categorical imperative. In our example, it requires of the agent to choose saving Alice, because the goal advances her. There may be several actions advancing the same number of agents, in which case the agent can choose freely (or randomly) amongst them. One could also take Kant to imply a second condition to the meritorious principle, to prevent as many people being negatively affected by circumstances as possible. In the current example, both conditions would lead to the same result. 6.2. Unhandled Case: Not Using Your Talent As a final example, consider the following situation: Bob has the talent to become a great artist. However, he wonders whether it is permissible to just be lazy and enjoy life instead of working hard to improve himself. Strictly speaking Bob is not working to anyone’s disadvantage by being lazy and thus the definitions of ‘being treated as a means’ advanced above will not cover this example. As the goal of enjyoing life and the goal of making art both benefit Bob, the meritorious principle also cannot be used to make the distinction. What Kant says is that laziness could be consistent with the preservation of humanity but does not harmonize with its advancement. He also writes that a rational being necessarily wills that all his capacities are developed. However, it is not clear to us what consistutes the advancement of humanity beyond the sheer feeling of happiness. The example is further complicated by the fact that Kant says that this is a duty one has towards oneself, not others. Therefore, it would be inappropriate to solve this case by introducing others into the model that would benefit from Bob becoming an artist. In the current formalization, we have no means to represent the relevant aspects that render laziness impermissible and becoming an artist permissible for the right reasons. We thus take this example to showcase a limitation of our treatment of Kant’s ethics, and leave a formalization that could capture this last example for further research. 7. Implementation The formalization of Kant’s second formulation of the categorical imperative has been implemented within the Hybrid Ethical Reasoning Agent software library (short: HERA).3 The general goal of the HERA project is to provide theoretically well-founded and practically usable logic-based machine ethics tools for implementation in artificial agents, such as companion robots with moral competence [11]. The core of HERA consists of a model checker for (Kantian) causal agency models. Thus, the situations the agent can reason about are represented in terms of models, and ethical principles like the categorical imperative are implemented as (sets of) logical formulae. To showcase the use the categorical imperative from a Python program, Listing 1 reconsiders a representation of the suicide case. { " actions " : [ " suicide " ] , " background " : [ ] , " consequences " : [ " dead " ] , " patients " : [ " Bob " ] , " mechanisms " : { " dead " : " suicide " } , " affects " : { " suicide " : [ [ " Bob " , "+" ] ] , " dead " : [ ] } , " goals " : { " suicide " : [ " dead " ] } } Listing 1: A sample JSON encoding of the suicide case. The workflow for using HERA requires to first generate a causal agency model like the one in Listing 1. Given such a model, arbitrary logical formulae can be checked for being satisfied or not by this model. This way, the conditions of ethical principles like the Kantian categorical imperative as defined in Definition 8 can be checked for satisfication. To support the usage of the HERA library, the logical formulae to be checked for ethical principles already included in HERA are encapsulated into prepared classes. Listing 2 shows a sample interaction. The first three commands load the implementations of two syntactical entities of the logical language (the predicates Means and End), the 3 The HERA software is available from http://www.hera-project.com . It is fully implemented in Python and can be installed via the PyPI repository (package name: ethics). causal agency model from the semantics package, and the categorical imperative using Reading 1 of ‘being treated as a means’ from the principles package. The third command loads the suicide example and sets the external variable suicide to the value True. This way, the suicide action is chosen in the situation, and the truth values of the consequence variables can be evaluated the way explained in Section 3. In the concrete case, True will be assigned to the variable dead. The fourth command asks whether, in the resulting situation, Bob is used as a means according to Reading 1 (see Definition 6). The answer is True, because Bob is affected by the action (suicide) and the action is a but-for cause of Bob’s goal (dead). The fifth command asks if Bob is used as an end. This query returns False, because Bob is not affected by the goal (see Section Example 1: Suicide). All in all, the action is not permissible according to the categorical imperative, and the output of the last command is accordingly. from e t h i c s . l a n g u a g e import Means , End from e t h i c s . s e m a n t i c s import C a u s a l M o d e l a s cm from e t h i c s . p r i n c i p l e s import K a n t i a n H u m a n i t y P r i n c i p l e a s c i m = cm ( ” s u i c i d e . j s o n ” , { ” s u i c i d e ” : T r u e } ) m. m o d e l s ( Means ( ” Reading −1” , ” Bob ” ) ) output: True m. m o d e l s ( End ( ” Bob ” ) ) output: False m. e v a l u a t e ( c i ) output: False Listing 2: A sample interaction with the Python package ethics, which we develop and maintain as the standard implementation of HERA. 8. Conclusion We have shown proof of principle how Kant’s second formulation of the categorical imperative can be formalized and implemented computationally. The strict duties towards yourself and others are defined, given goals, structural equations, and the affects relation. To define permissibility according the categorical imerative, we have defined ‘being treated as an end’, and we formalized two readings of ‘being treated as a means’ that meet different intuitions about this concept. The formalization deals well with Kant’s own examples of strict duties. We were also able to partly deal with Kant’s wide duties by defining an additional condition that requires agents to maximize the number of persons being treated as an end. We envision that the theory will be used as a tool for the comparison of morally relevant aspects of different views on morally delicate cases, thus helping people to have moral discussions. Moreover, we aim at allowing automatic moral judgments in line with Kant in robots such as self-driving cars and care robots. Our future research will investigate whether and under which circumstances Kantian reasoning the way it is presented here is perceived as appropriate for social robots as compared to other types of moral reasoning. References [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] Kant, I. 1785. Grundlegung zur Metaphysik der Sitten. Lindner, F., Bentzen, M., and Nebel, B. 2017. The HERA approach to morally competent robots. In Proceedings of the 2017 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS). Horty, J. F. 2001. Agency and Deontic Logic. Oxford Uni- versity Press. Arkoudas, K.; Bringsjord, S.; and Bello, P. 2005. Toward ethical robots via mechanized deontic logic. Technical re- port, AAAI Fall Symposium on Machine Ethics, AAAI. Bentzen, M. 2016. The principle of double effect applied to ethical dilemmas of social robots. In Robophilosophy 2016/TRANSOR 2016: What Social Robots Can and Should Do. IOS Press. 268–279. Govindarajuli, N. S., and Bringsjord, S. 2017. On automat- ing the doctrine of double effect. In Proceedings of the Twenty-Sixth International Joint Conference on Artificial In- telligence (IJCAI). 4722–4730. Winfield, A. F.; Blum, C.; and Liu, W. 2014. Towards an ethical robot: internal models, consequences and ethical ac- tion selection. In Mistry, M.; Leonardis, A.; M.Witkowski; and Melhuish, C., eds., Advances in Autonomous Robotics Systems. Springer. 85–96. Powers, T. M. 2006. Prospects for a kantian machine. IEEE Intelligent Systems 21(4):46–51. Abney, K. 2012. Robotics, ethical theory, and metaethics: A guide for the perplexed. In Lina, P.; Abney, K.; and Bekey, G. A., eds., Robot Ethics: The Ethical and Social Implications of Robotics. MIT Press. 35–52. Halpern, J. Y. 2016. Actual Causality. The MIT press. Lindner, F., and Bentzen, M. 2017. The hybrid ethical reasoning agent IMMANUEL. In Proceedings of the Companion 2017 Conference on Human-Robot Interaction (HRI). 187–188.
2cs.AI
arXiv:1703.09611v1 [math.GR] 28 Mar 2017 Actions of automorphism groups of Lie groups S.G. Dani March 29, 2017 Introduction The aim of this article is to discuss the actions on a connected Lie group by subgroups of its automorphism group. The automorphism groups are themselves Lie groups (not necessarily connected) and the actions have, not surprisingly, played an important role in the study of various topics, including geometry, dynamics, ergodic theory, probability theory on Lie groups, etc. We begin in § 1 with results on the structure of the automorphism groups Aut(G), G a Lie group, generalities about their subgroups, connected components, etc.. The automorphism group of a connected Lie group can be realised as a linear group via association with the corresponding automorphism of the Lie algebra G of G, and § 2 is devoted to relating Aut(G) to algebraic subgroups, and more generally “almost algebraic” subgroups, of GL(G); in particular the connected component of the identity in Aut(G) turns out to be almost algebraic and this has found considerable use in the study of various topics discussed in the subsequent sections. In § 3 we discuss orbits of various subgroups of Aut(G) on G, and especially conditions for them to be dense in G. In § 4 we discuss invariant measures and various ergodic-theoretic aspects of the actions of subgroups of Aut(G) on G, and in § 5 some of the topics in topological dynamics in which various special features of Aut(G) play a role. The action of Aut(G) on G induces in a natural way an action on the space of probability measures on G and properties of this action have played an important role in various questions in probability theory on Lie groups, in terms of extending certain aspects of classical probability theory to the Lie group setting. These are discussed in § 6. While our main focus will be on automorphism groups of connected Lie groups, at various points along the way generalisations to the case of more general locally compact groups are mentioned with references to the relevant literature. 1 Contents . . . . 3 3 4 5 6 . . . . . . . . 7 8 8 9 10 10 11 12 13 . . . . . . . 13 14 15 16 17 18 19 20 . . . . . . 21 21 22 23 24 24 25 5 Some aspects of dynamics of Aut(G)-actions 5.1 Stabilisers of continuous actions . . . . . . . . . . . . . . . . . . . 26 26 1 Structure of the automorphism groups 1.1 Preliminaries . . . . . . . . . . . . . . 1.2 Subgroups of Aut(G) . . . . . . . . . . 1.3 Connected components of Aut(G) . . . 1.4 Locally isomorphic Lie groups . . . . . . . . . . . . . . . . . . . . . . . . . 2 Almost algebraic automorphism groups 2.1 A decomposition . . . . . . . . . . . . . . . . . 2.2 Almost algebraic subgroups of Aut(G) . . . . . 2.3 Groups with Aut(G) almost algebraic . . . . . . 2.4 Automorphisms preserving additional structure 2.5 Linearisation of the Aut(G) action on G . . . . 2.6 Embedding of G in a projective space . . . . . . 2.7 Embedding in a vector space . . . . . . . . . . . 2.8 Algebraicity of stabilizers . . . . . . . . . . . . . . . . . . . . . . . . . 3 Dense orbits 3.1 Aut(G)-actions with dense orbits . . . . . . . . . 3.2 Connected subgroups of Aut(G) with dense orbits 3.3 Automorphisms with dense orbits . . . . . . . . . 3.4 Zd -actions . . . . . . . . . . . . . . . . . . . . . . 3.5 Discrete groups with dense orbits . . . . . . . . . 3.6 Orbit structure of actions of some discrete groups 3.7 Aut(G)-actions with few orbits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Ergodic theory of actions of automorphism groups 4.1 Preliminaries . . . . . . . . . . . . . . . . . . . . . . 4.2 Finite invariant measures . . . . . . . . . . . . . . . . 4.3 Convolution powers of invariant measures . . . . . . . 4.4 Infinite invariant measures . . . . . . . . . . . . . . . 4.5 Quasi-invariant measure and ergodicity . . . . . . . . 4.6 Stabilisers of actions of Lie groups . . . . . . . . . . . 2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5.2 Anosov automorphisms . . . . . . . . . . . . . . . . . . . . . . . . 5.3 Distal actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5.4 Expansive actions . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Orbits on the space of probability measures 6.1 Preliminaries . . . . . . . . . . . . . . . . . . . 6.2 Factor compactness and concentration functions 6.3 Tortrat groups . . . . . . . . . . . . . . . . . . . 6.4 Convergence of types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . References 1 . . . . . . . . . . . . 27 28 29 29 29 30 31 32 33 Structure of the automorphism groups In this section we discuss various structural aspects of the automorphisms of connected Lie groups. 1.1 Preliminaries Let G be a connected Lie group and G be the Lie algebra of G. We denote by Aut(G) the group of all Lie automorphisms of G equipped with its usual topology, corresponding to uniform convergence on compact subsets (see [55] Ch. IX for some details). To each α ∈ Aut(G) there corresponds a Lie automorphism dα of G, the derivative of α. We may view Aut(G) in a natural way as a closed subgroup of GL(G), the group of nonsingular linear transformations of G, considered equipped with its usual topology. Consider the map d : Aut(G) → Aut(G), given by α 7→ dα, for all α ∈ Aut(G). As G is connected, dα uniquely determines α, and thus the map is injective. When G is simply connected the map is also surjective, by Ado’s theorem (cf. [53], Theorem 7.4.1). When G is not simply connected the map is in general not surjective; in this case G has the form G̃/Λ, where G̃ is the universal covering group of G and Λ is a discrete subgroup contained in the center of G̃, and the image of Aut(G) in Aut(G) consists of those elements for which the corresponding automorphism of Aut(G̃) leaves the subgroup Λ invariant (note that G may be viewed also, canonically, as the Lie algebra of G̃), and in particular it follows that it is a closed subgroup. This implies in turn that d as above is a topological isomorphism (see also [55], Ch. IX, Theorem 1.2). We shall view Aut(G) as a subgroup of Aut(G), and in turn GL(G), via the correspondence. 3 As a closed subgroup of GL(G), Aut(G) is Lie group, and in particular a locally compact group; it may be mentioned here that the question as to when the automorphism group of a general locally compact group is locally compact is analysed in [90]. We note that Aut(G) is a real algebraic subgroup of GL(G), namely the group of R-points of an algebraic subgroup of GL(G⊗C), defined over R. While Aut(G) is in general not a real algebraic subgroup (when viewed as a subgroup of GL(G) as above), various subgroups of Aut(G) being algebraic subgroups plays an important role in various results discussed in the sequel. 1.2 Subgroups of Aut(G) We introduce here certain special classes of automorphisms which play an important role in the discussion in the following sections. Let G be a connected Lie group. For any subgroup H of G let AutH (G) denote the subgroup of Aut(G) consisting of automorphisms leaving H invariant; viz. {τ ∈ Aut(G) | τ (H) = H}. A subgroup H for which AutH (G) = Aut(G) is called a characteristic subgroup of G. Clearly, for any Lie group G the center of G, the commutator subgroup [G, G], the (solvable) radical, the nilradical are some of the characteristic subgroups of G. Similarly, together with any characteristic subgroup, its closure, centraliser, normaliser etc. are characteristic subgroups. For each g ∈ G we get an automorphism σg of G defined by σg (x) = gxg −1 for all x ∈ G, called the inner automorphism corresponding to g. For a subgroup H of G we shall denote by Inn(H) the subgroup of Aut(G) defined by {σh | h ∈ H}. For any Lie subgroup H, Inn(H) is a Lie subgroup of Aut(G); it is a normal subgroup of Aut(G) when H is a characteristic subgroup. In particular Inn(G) is a normal Lie subgroup of Aut(G); the group Aut(G)/Inn(G) is known as the group of outer automorphisms of G. We note that Inn(G) may in general not be a closed subgroup of Aut(G); this is the case, for example, for the semidirect product of R with C2 with respect to the action under which t ∈ R acts by (z1 , z2 ) 7→ (eiαt z1 , eiβt z2 ) for all z1 , z2 ∈ C, with α, β fixed nonzero real numbers such that α/β is irrational. Let Z denote the center of G and ϕ : G → Z be a (continuous) homomorphism of G into Z. Let τ : G → G be defined by τ (x) = xϕ(x) for all x ∈ G. It is easy to see that τ ∈ Aut(G); we call it the shear automorphism, or more specifically isotropic shear automorphism (as in [20]), associated with ϕ. We note that for any continuous homomorphism ϕ as above the subgroup [G, G] is contained in the kernel of ϕ, and hence the associated shear automorphism τ fixes [G, G] pointwise. In particular, if [G, G] = G then there are no nontrivial shear automorphisms. The shear automorphisms form a closed normal abelian subgroup of Aut(G), say S. 4 We note that if A = {τ ∈ Aut(G) | τ (z) = z for all z ∈ Z} then Aut(G) is the semidirect product of A and S. If H is the subgroup of G containing [G, G] and such that H/[G, G] is the maximal compact subgroup of G/[G, G], then G/H is a vector group and the set of continuous homomorphisms ϕ of G into Z such that H ⊂ ker ϕ has the natural structure of a vector space, and in turn the same holds for the corresponding set of shear automorphisms; the dimension of the vector space equals the product of the dimensions of G/H and Z. When G/[G, G] is a vector group (viz. topologically isomorphic to Rn for some n) S is a connected algebraic subgroup of Aut(G). On the other hand, when G/[G, G] is compact then there are only countably many distinct continuous homomorphisms of G into Z, and hence only countably many shear automorphisms. For a connected semisimple Lie group G, Inn(G) is a subgroup of finite index in Aut(G); in the case of a simply connected Lie group this follows from the corresponding statement for the associated Lie algebra (cf. [53], Theorem 5.5.14), and the general case follows from the special case, since the inner automorphisms of the simply connected covering group factor to the original group G. On the other hand, for a connected nilpotent Lie group the group of outer automorphisms is always of positive dimension (see [58], Theorem 4). An example of a 3-step simply connected nilpotent Lie group G for which Aut(G) = Inn(G) · S, where S is the group of all shear automorphisms of G, is given in [26]; in particular Aut(G) is nilpotent in this case; a larger class of connected nilpotent Lie groups for which Aut(G) is nilpotent is also described in [26]. We recall here that the center of a connected Lie group G is contained in a connected abelian Lie subgroup of G (see [53], Theorem 14.2.8, or [55], Ch. 16, Theorem 1.2). In particular the center is a compactly generated abelian group and hence has a unique maximal compact subgroup; we shall denote it by C. Being a compact abelian Lie subgroup, C is in fact the cartesian product of a torus with a finite abelian group. As the unique maximal compact subgroup of G, C is Aut(G)invariant and hence we get a continuous homomorphism q : Aut(G) → Aut(C), by restriction of the automorphisms to C. Since the automorphism group of a compact abelian group is countable, it follows that Aut(G)/ ker q, where ker q is the kernel of q, is a countable group. 1.3 Connected components of Aut(G) As a closed subgroup of GL(G), Aut(G) is a Lie group with at most countably many connected components (see [54] for an extensions of this to not necessarily connected Lie groups). It is in general not connected; for Rn , n ≥ 1, the automorphism group, which is topologically isomorphic to GL(n, R), has two connected 5 components, while for the torus Tn (= Rn /Zn ), n ≥ 2, the automorphism group is in fact an infinite (countable) discrete group. We shall denote by Aut0 (G) the connected component of the identity in Aut(G); it is an open (and hence also closed) subgroup of Aut(G). We denote by c(G) the group of connected components, namely Aut(G)/Aut0 (G). For a connected semisimple Lie group, since Inn(G) is of finite index in Aut0 (G) (see § 1.2), Aut0 (G) = Inn(G). Also, for these groups the number of connected components is finite; the number is greater than one in many cases (see [57] and [71] for details on the group of connected components of Aut(G) for simply connected semisimple groups G; see also the recent paper [50] where splitting of Aut(G) into the connected component and the component group is discussed). We note that Aut0 (G) acts trivially on the unique maximal compact subgroup C of the center of G, and hence when the image of the homomorphism q : Aut(G) → Aut(C), as in § 1.2, is infinite, c(G) is infinite. When C as above is the circle group, Aut(C) is of order two, and the image of q has at most two elements, but nevertheless c(G) can be infinite. A natural instance of this can be seen in the following: Suppose G has a closed normal subgroup H such that G/H is a torus of positive dimension; then there is a unique minimal subgroup with the property and it is invariant under the action of Aut(G) and hence, modifying notation, we may assume H to be Aut(G)-invariant. Then we have (countably) infinitely many (continuous) homomorphisms ϕ : G/H → C and for each such ϕ we have an isotropic shear automorphism of G (see § 1.2). It can be seen that the shear automorphisms corresponding to distinct homomorphisms belong to distinct connected components of Aut(G), and hence Aut(G) has infinitely many connected components. Thus c(G) is infinite in this case also. The group c(G) is finite if and only if Aut(G) is “almost algebraic” as a subgroup of GL(G); see §2.2 for a discussion on conditions for Aut(G) to be almost algebraic. 1.4 Locally isomorphic Lie groups Any connected Lie group is locally isomorphic to a unique (upto Lie isomorphism) simply connected Lie group, namely its universal covering group. Now let G be a simply connected Lie group and Z be the center of G. Then all connected Lie groups locally isomorphic to G are of the form G/D, where D is a discrete subgroup of Z. Moreover, for two discrete subgroups D1 and D2 of Z the Lie groups G/D1 and G/D2 are Lie isomorphic if and only if there exists a τ ∈ Aut(G) such that τ (D1 ) = D2 . Thus the class of Lie groups (viewed up to isomorphism of Lie groups) locally isomorphic to a given connected Lie group G is in canonical 6 one-one correspondence with the orbits of the action of Aut(G) on the class of discrete subgroups of it center Z, under the action induced by the Aut(G)-action on Z, by restriction of the automorphisms to Z. For G = Rn , n ≥ 1, all connected Lie groups isomorphic to G are of the form Rm × Tn−m , with 0 ≤ m ≤ n, thus n + 1 of them altogether. For the group G of upper triangular n × n unipotent matrices (n ≥ 2), which is a simply connected nilpotent Lie group, the center is one-dimensional and all its nontrivial discrete subgroups are infinite cyclic subgroups that are images of one another under automorphisms of G; thus in this case there are only two non-isomorphic Lie groups locally isomorphic to G (including the simply connected one), independently of n. On the other hand there are simply connected nilpotent Lie groups G for which Aut(G) is a unipotent group (when viewed as a subgroup of Aut(G)) (see [26]); hence in this case the Aut(G)-action on the center has uncountably many distinct orbits, and therefore there are uncountably many mutually non-isomorphic connected Lie groups that are locally isomorphic to G. Now let G be a connected Lie group with discrete center, say Z. Then Z is finitely generated (see § 1.2) and hence Z has only countably many distinct subgroups. Considering the indices of the subgroups in Z it can also be seen that when Z is infinite there are infinitely many subgroups belonging to distinct orbits of the Aut(G)-action on the class of subgroups; thus in this case there are countably infinitely many connected Lie groups locally isomorphic to G. This applies in particular when G is the universal covering group of SL(2, R). When Z is finite the number of Lie groups locally isomorphic to G is finite, and at least equal to the number of prime divisors of the order of Z. For simple simply connected Lie groups the orbits of the Aut(G)-action on the class of subgroups of the center have been classified completely in [48]. 2 Almost algebraic automorphism groups Let G be a connected Lie group and G be the Lie algebra of G. Let GL(G) be realised as GL(n, R), where n is the dimension of G, via a (vector space) basis of G. For g ∈ GL(G) let gij , 1 ≤ i, j ≤ n, denote the matrix entries of g and let det g denote the determinant of g. A subgroup H of GL(G) being a real algebraic group is equivalent to the condition that it can be expressed as the set of zeros (solutions) of a set of polynomials in gij , 1 ≤ i, j ≤ n, and (det g)−1 as the variables; in the present instance, the field being R, it suffices to consider a single polynomial in place of the set of polynomials. We call a subgroup of GL(G) almost algebraic if it is of finite index in a real algebraic subgroup. A real algebraic subgroup is evidently a closed (Lie) subgroup 7 of GL(G), and since a connected Lie group admits no proper subgroups of finite index it follows that any almost algebraic subgroup is an open subgroup of a real algebraic subgroup, and in particular it is a closed subgroup of GL(G). It is known that any real algebraic subgroup has only finitely many connected components (see [10], Corollary 14.5, for a precise result on the number of components), and hence the same holds for any almost algebraic subgroup. 2.1 A decomposition Let G be a connected Lie group and G the Lie algebra of G. In what follows we view Aut(G) as a subgroup of Aut(G) and of GL(G), via the identification introduced earlier (§ 1.1). We recall that any connected Lie group admits a maximal torus (a subgroup topologically isomorphic to Tn = Rn /Zn for some n ≥ 0), and any two maximal tori are conjugate to each other in G (see [53], Corollary 14.1.4). Theorem 2.1. (cf. [19], [73]) Let G be a connected Lie group with Lie algebra G. Let T be a maximal torus in G. Then there exists a closed connected normal subgroup H of G such that the following conditions hold: i) Inn(H) is an almost algebraic subgroup of Aut(G), and ii) Aut(G) = Inn(H)AutT (G). The subgroup H chosen in the proof is in fact invariant under all τ ∈ Aut(G) and consequently Inn(H) is a normal subgroup of Aut(G). Since Inn(H)∩AutT (G) is trivial this further implies that Aut(G) is a semidirect product of the two subgroups. We may also mention here that the subgroup H as chosen in [19] contains [G, G], the commutator subgroup of G. When Inn(G) is an almost algebraic subgroup of Aut(G), H as in Theorem 2.1 can be chosen to be G itself; this applies in particular when G is an almost algebraic subgroup of GL(n, R) for some n ≥ 1. 2.2 Almost algebraic subgroups of Aut(G) In view of Theorem 2.1 Aut(G) is almost algebraic if and only if AutT (G) is almost algebraic for a (and hence any) maximal torus T in G. In this respect we recall the following specific results. Theorem 2.2. ([19], [88], [73]) Let G be a connected Lie group and G be the Lie algebra of G. Then the following statements hold. i) If the center of G does not contain a compact subgroup of positive dimension, then Aut(G) is an almost algebraic subgroup of GL(G). ii) Aut0 (G) is an almost algebraic subgroup of GL(G); 8 iii) if R is the solvable radical of G and T is a maximal torus in G then Aut(G) is almost algebraic if and only if the restrictions of all automorphisms from AutT (G) to T ∩ R form a finite group of automorphisms of T ∩ R; in particular, Aut(G) is almost algebraic if and only if Aut(R) is almost algebraic. Assertions (i) and (ii) above were deduced from Theorem 2.1 in [19]; (ii) was proved earlier by D. Wigner [88], and (iii) is due to W. H. Previts and S. T. Wu [73], where improved proofs were also given for (i) and (ii). We note in particular that, in the light of Theorem 2.2(ii), Inn(G) is contained in an almost algebraic subgroup of Aut(G), namely Aut0 (G). This turns out to be useful in various contexts on account of certain properties of actions of almost algebraic subgroups (see for example §§4.6 and 5.1). Let G be a connected Lie group. Let T be the unique maximal torus contained in the center of G. Then G/T is a connected Lie group whose center contains no nontrivial compact subgroup of positive dimension, and hence Aut(G/T ) is an almost algebraic subgroup of Aut(G′ ), where G′ is the Lie algebra of G/T . Each α ∈ Aut(G) induces an automorphism of Aut(G/T ), say ᾱ. If η : Aut(G) → Aut(G′ ) is the canonical quotient homomorphism, defined by η((α) = ᾱ for all α ∈ Aut(G), then the image of any almost algebraic subgroup of Aut(G) under η is almost algebraic (as the map is a restriction of a homomorphism of algebraic groups). In particular η(Aut0 (G)) is an almost algebraic subgroup. 2.3 Groups with Aut(G) almost algebraic For a class of connected Lie groups the following characterisation, incorporating a partial converse of Theorem 2.2(i) is proved in [11]; there the issue is considered for all Lie groups with finitely many connected components, but we shall restrict here to when G is connected; (the general case involves some technicalities in its formulation). Theorem 2.3. ([11]) Let G be a connected Lie group admitting a faithful finitedimensional representation. Then Aut(G) is almost algebraic if and only if the maximal torus contained in the center of G is of dimension at most one, and it is also the maximal torus in the radical of G. Let G be as in Theorem 2.3 and C be the maximal torus of the center of G and suppose that C is one-dimensional. In the context of the examples of Lie groups with Aut(G) having infinitely many distinct connected components discussed in §1.3 it may be noted that if C coincides with the maximal torus in the radical of G, then there does not exist a closed normal subgroup H such that G/H is a torus, as used in the argument there. 9 It could happen that Aut(G) may be almost algebraic (which in view of Theorem 2.2(ii) is equivalent to c(G) being finite), for a connected Lie group G (not admitting a faithful finite-dimensional representation) even if its center contains a torus of dimension exceeding 1 (in fact of any given dimension). An example of this was indicated in [19] (page 451) and has been discussed in detail in [73]. The main idea involved in the example is that Lie groups G can be constructed such that the central torus, though of higher dimension, is the product of onedimensional tori, each of which is invariant under a subgroup of finite index in Aut(G). It is not clear whether there could be situations, with c(G) finite, for which this may also fail, namely with no one-dimensional compact subgroups contained in the center and invariant under a subgroup of finite index in Aut(G). It is proved in [73] (Proposition 3.1), however that for a connected Lie group G of the form H × T, where H is a connected Lie group and T is the one-dimensional torus, Aut(G) has infinitely many connected components, and hence is not almost algebraic. 2.4 Automorphisms preserving additional structure When the Lie group has additional structure, the group of automorphisms preserving the structure would also be of interest. In this subsection we briefly recall some results in this respect. By a result of Hochschild and Mostow [56] if G is a connected complex affine algebraic group then the connected component of the identity in the group A of rational automorphisms of G is algebraic (with respect to a canonical structure arising from the associated Hoff algebra), and moreover A is itself algebraic if either the center of G is virtually unipotent (namely if it admits a subgroup of finite index consisting of unipotent elements) or the center of a (and hence any) maximal reductive subgroup of G is of dimension at most 1; the result may be compared with Theorem 2.2 for real Lie groups. It may be noted that the results of [56] are in the framework of automorphism groups of affine algebraic groups over an algebraically closed field of characteristic zero. Some further elaboration on the theme is provided by Dong Hoon Lee [67]. For the connected component of the group of complex analytic automorphisms of a faithfully representable complex analytic group, a result analogous to that of Hochschild and Mostow recalled above was proved by Chen and Wu [12]. 2.5 Linearisation of the Aut(G) action on G Under certain conditions, a connected Lie group can be realised as a subset of Rn , or the projective space Pn−1 , for some n ≥ 2, in such a way that the automorphisms 10 of G are restrictions of linear or, respectively, projective transformations. We call this linearisation of the Aut(G)-action on G. We next discuss various results in this respect. Let G be a connected Lie group. By an affine automorphism of G we mean a transformation of the form Tg ◦ τ where τ ∈ Aut(G), and Tg is a left translation by an element g in G, namely Tg (x) = gx for all x ∈ G. We denote by Aff(G) the group of all affine automorphisms. We identify G canonically as a subgroup of Aff(G), identifying g ∈ G with Tg as above. Then Aff(G) is a semidirect product of Aut(G) with G, with G as the normal subgroup, and we shall consider it equipped with the Cartesian product topology. We shall denote by Aff0 (G) the connected component of the identity in Aff(G). Let A and B be the Lie algebras of Aut(G) and Aff(G) respectively. Let Ad : Aff(G) → GL(B) be the adjoint representation of Aff(G). Let a be the dimensions of Aut(G) and V = ∧a B, the vector space of a-th exteriors over B. Let ρ : Aff(G) → GL(V ) be the representation arising as the a-th exterior power of Ad; we call ρ the linearising representation for G (for reasons that would become clear below). Let L be the vector subspace ∧a A of V = ∧a B; since a is the dimension of A, L is a one-dimensional subspace. Consider the (linear) action of Aff(G) on V via the representation ρ. Let P = P (V ) denote the corresponding projective space, consisting of all lines (onedimensional subspaces) in V , equipped with its usual topology. The Aff(G)-action on V induces an action of Aff(G) on P . We have the corresponding actions of Aut(G) and G by restriction of the action (G being viewed as the group of translations as above). 2.6 Embedding of G in a projective space Let p0 denote the point of P corresponding to the line L as above. Let S be the stabiliser of p0 under the action of G. Consider any g ∈ S. Then L is invariant under the action of g on V and this means that the subspace A is invariant under the action of g on B. In turn we get that Aut0 (G) is normalised by g in Aff(G), and since Aff0 (G) is a semidirect product of Aut0 (G) and G this implies that g is contained in the center of Aff0 (G). Conversely it is easy to see that every element of the center of Aff0 (G) fixes p0 . Thus S coincides with the center of Aff0 (G). We note also that S = {g ∈ G | τ (g) = g for all τ ∈ Aut0 (G)}. The orbit map g 7→ gp0 of G into P induces a canonical continuous bijection j of G/S onto its image in P , defined by j(gS) = gp0 for all g ∈ G. When S is trivial j defines a continuous embedding of G into P . We note that for any 11 τ ∈ Aut(G) and g ∈ G we have τ (g)p0 = τ gτ −1 p0 = τ gp0 = τ (gp0 ). Thus the map j is equivariant with respect to the actions of Aut(G) on G/S and P , viz. j(τ (gS)) = τ j(gS) for all g ∈ G and τ ∈ Aut(G). Thus when S is trivial the orbits of the Aut(G)-action on G/S are in one-one correspondence in a natural way with orbits of the Aut(G)-action on P that are contained in the image of G/S. Recall that Aut0 (G) is an almost algebraic subgroup of GL(G) (see Theorem 2.2(ii)). From this it can be deduced that the restriction of the representation ρ as above to Aut0 (G) is an algebraic representation, viz. restriction of an algebraic homomorphism of algebraic groups. Hence every orbit of Aut0 (G) on P is locally closed, namely open in its closure (see [72], Lemma 1.22, for instance). Thus the above argument shows the following. Theorem 2.4. Let G be a connected Lie group and S be the center of Aff0 (G). Then every orbit of the action of Aut0 (G) on G/S is locally closed (viz. open in its closure). The subgroup S, which is noted to be contained in the center of G, contains the maximal compact subgroup of the center. In particular if S is trivial then by Theorem 2.2(i) Aut0 (G) has finite index in Aut(G) and hence the above theorem implies that all orbits of Aut(G) on G are locally closed. We recall here that the condition of the orbits being locally closed is well studied in a wider context and is equivalent to a variety of other conditions of interest; see [44]; (see also [42] for a more general result). It represents in various ways the opposite extreme of the action being ergodic. 2.7 Embedding in a vector space In analogy with the embedding of G as a subset of P (modulo the subgroup S as above) we can also get an embedding of G in the vector space V as defined above, as follows. Let the notation be as above and let v0 be a nonzero point of L. We note that S as above is also the stabilizer of v0 under the G-action on V , since if g fixes v0 it fixes p0 , and if it fixes p0 then we have τ (g) = τ gτ −1 = g for all τ ∈ Aut0 (G) and hence it fixes v0 . As L is invariant under the action of Aut(G) we get a continuous homomorphism s : Aut(G) → R∗ such that for all τ ∈ Aut(G), τ (v0 ) = s(τ )v0 . For any g ∈ G and τ ∈ Aut(G) we have τ (g)v0 = (τ gτ −1 )v0 = τ g(τ −1 (v0 )) = s(τ −1 )τ gv0 . Consider the (linear) action of Aut0 (G) on V such that τ ∈ Aut0 (G) acts by v ∈ V 7→ s(τ −1 )τ v. Then the Aut0 (G)-orbits on G/S are in canonical correspondence with the orbits on V under this Aut0 (G)-action. Under this action also the orbits are locally closed, by algebraic group considerations. 12 2.8 Algebraicity of stabilizers Let G be a connected Lie group and ρ : Aff(G) → GL(V ) be the corresponding linearising representation as in §2.5. We recall that Aut0 (G) is an almost algebraic subgroup of GL(G), G being the Lie algebra of G, and that the restriction of ρ to Aut0 (G) is the restriction of a homomorphism of algebraic groups. In particular, for any v ∈ V the stabiliser {τ ∈ Aut0 (G) | τ (v) = v} is an almost algebraic subgroup of Aut0 (G) (algebraic subgroup if Aut0 (G) is algebraic). Let v0 be as in §2.7 and S, as before, be the center of Aff0 (G), which is the stabiliser of v0 under the action as in §2.7. Then by the preceding observation for all g ∈ G the subgroup {τ ∈ Aut0 (G) | τ (gS) = gS} is almost algebraic. In particular for a connected Lie group G such that the center of Aff0 (G) is trivial, for all g ∈ G the stabiliser {τ ∈ Aut0 (G) | τ (g) = g} of g under the action of Aut0 (G) is an almost algebraic subgroup; this holds in particular when the center of G is trivial. Let G be a connected Lie group and for g ∈ G let S(g) denote the stabiliser {τ ∈ Aut(G) | τ (g) = g}. It is shown in [41] that when G is a simply connected solvable Lie group, S(g) is an algebraic subgroup for all g ∈ G. In the general case it is shown that the connected component of the identity in S(g) is an almost algebraic subgroup for all g which are of the form exp ξ for some ξ in the Lie algebra of G, exp being the exponential map associated with G. It is noted that S(g) itself need not be an algebraic subgroup, as may be seen in the case when G is the universal covering group of SL(2, R) and g is one of the generators of the center of G (the latter is an infinite cyclic subgroup); in this case S(g) = Inn(G), and it is of index 2 in Aut(G), but not an algebraic subgroup. For elements z contained in the center of G it is proved in [47] (see also [19]) that the connected component of the identity in S(z) is an almost algebraic subgroup, and if G has no compact central subgroup of positive dimension then S(z) itself is almost algebraic. It is however not true that S(z) is almost algebraic whenever Aut(G) is almost algebraic; a counterexample in this respect may be found in [73] (p. 432). We note in particular that if A is the subgroup of Aut(G) consisting of all automorphisms which fix the center pointwise then the connected component of the identity in A is an almost algebraic subgroup, and if G has no compact central subgroup of positive dimension then A is almost algebraic. 3 Dense orbits It is well-known that an automorphism α of the n-dimensional torus Tn , n ≥ 2, admits dense orbits (and is ergodic with respect to the Haar measure; see §4 13 for a discussion on the ergodicity condition) when dα has no eigenvalue which is a root of unity. These automorphisms constitute some of the basic examples in ergodic theory and topological dynamics, and have been much studied for detailed properties from the point of view of the topics mentioned (see [14], [87], for instance; see also [79] and [22] for generalisations). In this section we discuss actions of subgroups of Aut(G) with a dense orbit on G. 3.1 Aut(G)-actions with dense orbits Let G be a connected abelian Lie group. Then it has the form Rm × Tn for some m, n ≥ 0 and in this case it is easy to see that the Aut(G)-action on G has dense orbits, except when (m, n) = (0, 1) (viz. when G is the circle group); if n = 0 the complement of 0 in Rm is a single orbit. If m ≥ 1 then the action of Aut0 (G) also has a dense orbit on G, as may be seen using the isotropic shear automorphisms (see §1.2) associated with homomorphisms of Rm into Tn . Next let G be a 2-step connected nilpotent Lie group, namely [G, G] is contained in the center of G. Let Z denote the center of G. Then G/Z is simply connected, and hence is Lie isomorphic to Rn for some n. The Aut(G)-action on G factors to an action on G/Z. Using shear automorphisms (see §1.2) it can be seen that the Aut(G)-action on G has a dense orbit on G if and only if the Aut(G)-action on G/Z has a dense orbit. The latter condition holds in particular if G is a free 2-step simply connected Lie group; it may be recalled that G is called a free 2-step nilpotent Lie group if its Lie algebra is of the form V ⊕ ∧2 V , with V a finite-dimensional vector space over R, and the Lie product is generated by the relations [u, v] = u ∧ v for all u, v ∈ V , and [u, v ∧ w] = 0 for all u, v, w ∈ V . When G is a free 2-step simply connected nilpotent Lie group the quotient G/Z as above corresponds to the vector space V and every nonsingular automorphism of V is the factor of a τ ∈ Aut(G), which leads to the observation as above. For a general simply connected 2-step nilpotent Lie group G the Lie algebra G of G can be expressed as (V ⊕ ∧2 V )/W , where V is the vector space G/Z (Z being the center of G) and W is a vector subspace of ∧2 V ; V ⊕ ∧2 V is the free 2-step nilpotent Lie algebra with the structure as above, and any vector subspace of ∧2 V is a Lie ideal in the Lie algebra (see [5], where the example is discussed in a different context). It is easy to see that in this case the image of Aut(G) in GL(V ), under the map associating to each automorphism its factor on V = G/Z, is the subgroup, say I(W ), consisting of g ∈ GL(V ) such that the corresponding exterior transformation ∧2 (g) of ∧2 V leaves the subspace W invariant. It can be seen that I(W ) has an open dense orbit on V for various choices of W , and in these cases by the argument as above Aut(G) has open dense orbit on G. For example, if e1 , . . . , en , n ≥ 2 is a linear basis of V , then this is readily seen to hold 14 if W is the subspace spanned by e1 ∧ e2 or, more generally, by sets of the form {e1 ∧ e2 , e3 ∧ e4 , . . . , e2k−1 ∧ e2k }, for n ≥ 2k. Along the lines of the above arguments it can be seen that for any k ≥ 2 if G is a free k-step simply connected Lie group then the action of Aut(G) on G has an open dense orbit. Also, given a simply connected k-step nilpotent Lie group H there exists simply connected k + 1-step nilpotent Lie group G such that H is Lie isomorphic to G/Z, where Z is the center of G, and every automorphism of H is a factor of an automorphism of G. Therefore using the examples as above one can also construct examples, for any k ≥ 2, of simply connected k-step nilpotent Lie groups such that the Aut(G)-action on G has an open dense orbit. In the converse direction we have the following. Theorem 3.1. Let G be a connected Lie group. Suppose that there exists g ∈ G such that the closure of the Aut(G)-orbit of g has positive Haar measure in G. Then G is a nilpotent Lie group. A weaker form of this, in which it was assumed that the orbit is dense in G, was proved in [23] (Theorem 2.1), but the same argument is readily seen to yield the stronger assertion as above. By a process of approximation, Theorem 2.1 in [23] was extended to all finite-dimensional connected locally compact groups, and in the same way one can also get that the assertion in Theorem 3.1 holds also for all finite-dimensional connected locally compact groups. A nilpotent Lie group G need not always have dense orbits under the action of Aut(G). Examples of 2-step simply connected nilpotent Lie groups with no dense orbits under the Aut(G)-action are exhibited in [26]. There are also examples in [26] of 3-step simply connected nilpotent Lie groups for which Aut(G) is a unipotent group, namely when Aut(G) is viewed a subgroup of GL(G) all its elements are unipotent linear transformation, and consequently all orbits of Aut(G) on G are closed, and hence lower dimensional, submanifolds of G. There has been a detailed study of groups in which Aut(G) has only finitely many, or countably many, orbits, in the broader context of locally compact groups, and also abstract groups. The results in this respect for connected Lie groups will be discussed in §3.7. 3.2 Connected subgroups of Aut(G) with dense orbits Theorem 3.1 implies in particular that there is no connected Lie group G for which Aut(G) has a one-parameter subgroup whose action on G has a dense orbit; by the theorem, a Lie group G with that property would be nilpotent and since it has to be noncompact, going to a quotient we get that for some n ≥ 1, 15 GL(n, R) has a one-parameter subgroup acting on Rn with a dense orbit, but simple considerations from linear algebra rule this out. On R2n viewed as Cn , n ≥ 2, we have linear actions of Cn−1 × C∗ , which have an open dense orbit: the action of (z1 , . . . , zn−1 , z), where z1 , . . . , zn−1 ∈ C and z ∈ C∗ , is defined on the P standard basis vectors {e1 , . . . , en } by ej 7→ zej n−1 for j = 1, . . . , n − 1 and en 7→ j=1 zj ej + zen . The same also holds for (outer) cartesian products of such actions, and in particular we have linear actions of C∗n on R2n , with dense orbits. Since for n ≥ 2 we can realise Rn+1 as a dense subgroup of C∗n , we get linear actions Rn+1 on R2n admitting dense (but not open) orbits; we note that in analogy with the above we can get linear actions of R∗n on Rn with open dense orbits, but they do not yield actions of Rn with dense orbits. It can be seen using the Jordan canonical form that there is no linear action of R2 admitting dense orbits, and hence there is no action of R2 on any Lie group admitting dense orbits, by an argument as above, using Theorem 3.1. On Rn , apart from GL(n, R), various proper subgroups act transitively on the complement of {0}; e.g. S · O(n, R) where S is the subgroup consisting of nonzero scalar matrices and O(n, R) is the orthogonal group, or the symplectic group Sp(n, R) for even n. Also if O(p, q) is the orthogonal group of a quadratic form of signature (p, q) on Rn , n = p + q then the action of S ·O(p, q), with S as above, on Rn has an open dense orbit (the complement consists of the set of zeros of the quadratic form, which is a proper algebraic subvariety of Rn ). Subgroups of GL(n, R) acting with an open dense orbit have been a subject of much interest in another context; Rn together with such a subgroup is called a pre-homogeneous vector space; the reader is referred to [63] for details. 3.3 Automorphisms with dense orbits Analysis of the issue of dense orbits was inspired by a question raised by P. R. Halmos in his classic book on Ergodic Theory ([51], page 29) as to whether a noncompact locally compact group can admit a (continuous) automorphism which is ergodic with respect to the Haar measure of the group, namely such that there is no measurable set invariant under the automorphism such that both the set and its complement have positive Haar measure (see § 4.1 for more on ergodicity). An automorphism as in Halmos’ question would have a dense orbit (assuming the group to be second countable), and in particular one may ask whether there exists an automorphism of a noncompact locally compact group with a dense orbit. This question was answered in the negative in a paper of R. Kaufman and M. Rajagopalan [62] and T. S. Wu [89] for connected locally compact groups, and N. Aoki [4] for a general locally compact group (see also [74] for some clarifications on the proof in [4]); it may also be mentioned here that the analogous question is 16 studied for affine automorphisms of locally compact groups (namely transformations which are composite of a continuous group automorphism with a translation by a group element) in [17] for connected groups, and in [61] in the generality of all locally compact groups. Though there are nonabelian compact groups admitting automorphisms with dense orbits, such as C Z where C is a compact nonabelian group, for which the shift automorphism has dense orbits, a compact connected Lie group admits such an automorphism only if it is a torus of dimension n ≥ 2. For a compact semisimple Lie group G, Inn(G) is a subgroup of finite index in Aut(G) and the orbits of Aut(G) on G are closed submanifolds of dimension less than that of G, and in particular not dense in G; a general compact connected Lie group has a simple Lie group as a factor and hence the preceding conclusion holds in this generality also. 3.4 Zd -actions The analogue of Halmos’ question for Zd -actions, namely the multi-parameter case with d ≥ 1, and more generally actions of abelian groups of automorphisms, was considered in [24], where the following is proved. Theorem 3.2. Let G be a connected Lie group. Suppose that there exists an abelian subgroup H of Aut(G) such that the H-action on G has a dense orbit. Then there exists a compact subgroup C contained in the center of G such that G/C is topologically isomorphic to Rn for some n ≥ 0; in particular G is a two-step nilpotent Lie group. If moreover the H-action leaves invariant the Haar measure on G then G is a torus. Recall that the n-dimensional torus Tn , where n ≥ 2, admits automorphisms with a dense orbit, and one can find such an automorphism contained in a subgroup A of Aut(Tn ) ≈ GL(n, Z) which is isomorphic to Zd for d ≤ n − 1. This gives examples of subgroups A of Aut(Tn ) isomorphic to Zd for d ≤ n − 1, acting with a dense orbit. Conversely every subgroup A of Aut(Tn ) isomorphic to Zd and acting with a dense orbit contains an (individual) automorphism which has a dense orbit; see [7]; see also [76] for analogous results in a more general setting of automorphisms of general compact abelian groups. It is easy to see that we have a Z2 -action on R with a dense orbit; the automorphisms defined respectively by multiplication by eα and −eβ , α, β > 0, generate such an action when α/β is irrational. More generally, G = Rn × Tm admits a Zd -action with a dense orbit if any only if m 6= 1 and d ≥ (n + 2)/2; see [24] for details. Examples of nonabelian two-step nilpotent Lie groups G admitting Z2 -actions with a dense orbit are given in [24]. 17 It may be mentioned here that Theorem 3.2 is extended in [38] to actions on general locally compact groups G, where it is concluded that under the analogous condition there exists a compact normal subgroup C such that the quotient G/C is a (finite) product of locally compact fields of characteristic zero. In line with the above it would be interesting to know about Lie groups admitting actions by nilpotent or, more generally, solvable groups of automorphisms with a dense orbit. 3.5 Discrete groups with dense orbits Consider a connected Lie group G with a Lie subgroup H of Aut(G) such that the H-action on G has an open dense orbit; e.g. Rn , n ≥ 1, and H = SL(n, R) – see §3.1 for more examples (recall also that such a G is nilpotent). Let g ∈ G be such that the H-orbit is open and dense in G. Let L be the stabiliser of g under the H-action, viz. L = {τ ∈ Aut(G) | τ (g) = g}. Then it is easy to see that for a subgroup Γ of H the Γ-action on G has a dense in G if and only if the L-action on H/Γ has a dense orbit; this phenomenon is known as “duality” - see for instance [6], [22] for some details). In certain situations, such as when Γ is a lattice in H (viz. H/Γ admits a finite measure invariant under the action of H on the left), the question of whether the action of a subgroup has dense orbits on H/Γ is amenable via techniques of ergodic theory. For G = Rn , n ≥ 2, we have Aut(G) ≈ GL(n, R), and there exist many discrete subgroups of the latter whose action on Rn admits dense orbits. Let H = SL(n, R) and Γ be a lattice in SL(n, R). We choose g as e1 where {e1 , . . . , en } is the coordinate basis of Rn and let L be its stabiliser. It is known that this subgroup acts ergodically on H/Γ and hence as noted above the Γ-action on Rn has a dense orbit. This applies in particular to the subgroup SL(n, Z), consisting of integral unimodular matrices, which is indeed a lattice in SL(n, R) (see [70], Ch. 7 or [75], Ch. 10). We shall discuss more about the orbits of these in the next section. There are also natural examples of discrete subgroups of SL(n, R) other than lattices which have dense orbits under the action on Rn . For example if n is even and Γ is a lattice in the symplectic group Sp(n, R) then it has dense orbits on Rn ; stronger statements analogous to those for lattices in SL(n, R) are possible but we shall not go into the details. There are also other examples, arising from hyperbolic geometry. Let Γ be the fundamental group of a surface of constant negative curvature whose associated geodesic flow is ergodic. Then Γ may be viewed canonically as a subgroup of PSL(2, R) = SL(2, R)/{±I}, where I denotes the identity matrix, and if Γ̃ is the lift of Γ in SL(2, R), then the action of Γ̃ on R2 has dense orbits; the action is ergodic with respect to the Lebesgue measure (see [6] for some details; see §4 for a discussion on ergodicity). Analogous examples 18 can also be constructed in higher dimensions. In place of Rn one may consider other nilpotent connected Lie groups G which admit an open dense orbit under the action of Aut(G). It would be interesting to know analogous results for discrete groups of automorphisms of other connected nilpotent Lie groups, which however does not seem to be considered in the literature. 3.6 Orbit structure of actions of some discrete groups In most of the cases considered in the earlier subsections where we conclude existence of a dense orbit, not all orbits may be dense, and in general there is no good description possible of the ones that are not dense. However in certain cases a more complete description is possible. Expressing Tn as Rn /Zn , Aut(Tn ) can be realised as GL(n, Z), the group of all n × n matrices with integer entries and determinant ±1. For v ∈ Rn whose coordinates with respect to the standard basis (generating Zn ) are rational the orbits under the Aut(Tn )-action are easily seen to be finite. It turns out, and not too hard to prove (see [30], for instance) that conversely for any v at least one of whose coordinates is irrational the Aut(Tn )-orbit is dense. For the case of Rn , n ≥ 1 we noted above that if Γ is a lattice in SL(n, R) then there exist dense orbits, by duality and ergodicity considerations. In fact in this case it is possible to describe the dense orbits precisely. If SL(n, R)/Γ is compact (viz. if Γ is a “uniform” lattice) then the orbit of every non-zero point in Rn is dense in Rn . When SL(n, R)/Γ is noncompact (but a lattice) the set of points whose orbits are not dense is contained in a union of countably many lines (one-dimensional vector subspaces) in Rn . In the case of SL(n, Z) the exceptional lines involved are precisely those passing through points in Rn with rational coordinates (see [35] for more general results in this direction). These results are consequences of the study of flows on homogeneous spaces which has been a much studied topic in the recent decades, thanks to the work of Marina Ratner on invariant measures of unipotent flows. We shall not go into details on the topic here; the interested reader is referred to the expository works [22] and [64] and other references there, for exploration of the topic. The result in the special case of SL(n, Z) recalled above was first proved in [15] (see also [34] for a strengthening in another direction). As in the case of the issues in the previous section, it would be interesting to know results analogous to the above for discrete groups of automorphisms of other nilpotent connected Lie groups. 19 3.7 Aut(G)-actions with few orbits Observe that when G = Rn , n ∈ N, Aut(G) is GL(n, R) and the action is transitive on the complement of the zero element. Thus the action of Aut(G) on G has only two orbits. The question as to when there can be only finitely many, or countably many, orbits has attracted attention, not only for Lie groups, but in the general context of locally compact groups; we shall indicate some of the results in that generality, giving references, but our focus shall be on Lie groups. Theorem 3.3. Let G be a locally compact group. Suppose that the action of Aut(G) on G has only countably many orbits. Then the connected component G0 of the identity in G is a simply connected nilpotent Lie group. Moreover, the number of Aut(G)-orbits in G0 is finite and one of them is an open orbit. The first statement in the theorem was proved in [84]. We note that for Lie groups it can be deduced from Theorem 3.1 (which is a generalised version of a theorem from [23]); since under the condition in the hypothesis at least one of the orbits has to be of positive measure Theorem 3.1 yields that the group is nilpotent, but on the other hand the condition also implies that there is no compact subgroup of positive dimension contained in the center, so G must in fact be a simply connected nilpotent Lie group. It is proved in [85] (Theorem 6.3) that under the condition in the hypothesis one of the orbits is open. Moreover, as G is a simply connected nilpotent Lie group, the Aut(G)-orbits are in canonical one-one correspondence with Aut(G)-orbits on G via the exponential map, where G is the Lie algebra of G, and the latter being an action of a real algebraic group, the cardinality of the orbits can be countable only if it is finite and one of the orbits is open. Now let G be a connected Lie group such that the Aut(G)-action on G has only finitely many orbits. Since the identity element is fixed, there are at least two orbits; the group is said to be homogeneous if there are only two orbits. The groups Rn , n ≥ 1, are homogeneous, and they are also readily seen to be the only connected abelian Lie groups for which the Aut(G)-action has only finitely many orbits. It turns out that Rn , n ≥ 1, are in fact the only connected locally compact groups that are homogeneous (see [82], Theorem 6.4); all (not necessarily connected) homogeneous locally compact groups have also been determined in [82]; K n , where K is the field of p-adic numbers, with p is a prime, or Q (with the discrete topology), and n ∈ N, are some of the other examples of homogeneous groups. A locally compact group is said to be almost homogeneous if the Aut(G)-action on G has 3 orbits. The class of groups with the property has been studied in [84] and [85]. An almost homogeneous Lie group is a Heisenberg group, namely a 20 group defined on V ⊕ Z, where V and Z are vector spaces, with the product defined by (v, x) · (w, y) = (v + w, x + y + 12 hv, wi), where h·, ·i is an alternating non-degenerate bilinear form over V with values in Z; (we note that here the group structure is viewed via identification with the corresponding Lie algebra, and the factor 12 is introduced so that hv, wi is the Lie bracket of v and w). Moreover, the pair of dimensions of the vector spaces V and Z are either of the form (2n, 1), (4n, 2), (4n, 3), with n ∈ N, or one of (3, 3), (6, 6), (7, 7), (8, 5), (8, 6) or (8, 7), and each of these pairs determines an almost homogeneous Heisenberg group. Automorphism groups of these Heisenberg groups have been discussed in [83]. It is easy to see that if G is a k-step simply connected nilpotent Lie group then the number of Aut(G)-orbits on G is at least k + 1. If G is one of the Heisenberg groups as above then for any r ≥ 1, the action of Aut(Gr ) on Gr has 2r + 1 orbits (cf. [85], Proposition 6.8). Thus there exist nilpotent Lie groups with arbitrarily large finite number of orbits under the action of the respective automorphism group. We refer the reader to [85], and other references there, for further details and also open problems on this theme, for general (not necessarily connected) locally compact groups. 4 Ergodic theory of actions of automorphism groups In this section we discuss various aspects of ergodic theory of actions on Lie groups by groups of automorphisms. 4.1 Preliminaries We begin by briefly recalling some definitions and conventions which will be followed throughout. By a measure we shall always mean a σ-finite measure. Given a measure space (X, M), an automorphism τ : X → X is said measurable if τ −1 (E) ∈ M for all E ∈ M; a measure µ on (X, M) is said to be invariant under a measurable automorphism τ if µ(τ −1 (E)) = µ(E) for all E ∈ M, and it is said to be quasi-invariant if, for E ∈ M, µ(τ −1 (E)) = 0 if and only if µ(E) = 0; a measure is said to be invariant or, respectively, quasi-invariant, under a group of measurable automorphisms if it has the property with respect to the action of each of the automorphisms from the group. A measure which is invariant or quasi-invariant with respect to an action is said to be ergodic with respect to the action if there are no two disjoint measurable subsets invariant under the action, each with positive measure. 21 Two measures on a measurable space X are said to be equivalent if they have the same sets of measure 0. It is easy to see that given a measure which is quasiinvariant under an action there exists a finite measure equivalent to it, which is also quasi-invariant; in particular, given an infinite invariant measure there exists a finite quasi-invariant measure equivalent to it (which may however not be invariant under the action). A measure µ on G is called a probability measure if µ(G) = 1. We denote by P (G) the space of probability measures on G. For actions of a locally compact second countable group every quasi-invariant probability measure can be “decomposed as a continuous sum” of ergodic quasi-invariant probability measures in a canonical way, and hence it suffices in many respects to understand the ergodic quasi-invariant measures (see, for instance, [70], Theorem 14.4.3). In our context the measure space structure will always be with respect to the Borel σ-algebra of the topological space in question. 4.2 Finite invariant measures When G is the torus Tn , n ≥ 2, the Haar measure is invariant under the action of Aut(G), which is an infinite discrete group. More generally, if G is a connected Lie group such that the center contains a torus of positive dimension, then the Haar measure of the maximal torus of the center, viewed canonically as a measure on G, is invariant under Aut(G), which can be a group with infinitely many connected components (see §2.2). It turns out however that when we restrict to almost algebraic subgroups of Aut(G) the situation is quite in contrast, as will be seen in Theorem 4.1 below. Let G be a connected Lie group. For µ ∈ P (G) we denote by supp µ the support of µ, namely the smallest closed subset of G whose complement is of µ-measure 0. Let I(µ) = {τ | µ is invariant under the action of τ }, and J(µ) = {τ ∈ Aut(G) | τ (g) = g for all g ∈ supp µ}. Then it can be seen that I(µ) and J(µ) are both closed subgroups of Aut(G) and J(µ) is a normal subgroup of I(µ). It turns out that when G has no compact subgroup of positive dimension contained in the center, the quotient I(µ)/J(µ) is compact. In fact we have the following. Theorem 4.1. (cf. [20]) Let G be a connected Lie group. Let A be an almost algebraic subgroup of Aut(G). Then for any µ ∈ P (G), (I(µ) ∩ A)/(J(µ) ∩ A) is compact. 22 Consider a connected Lie group G such that Aut(G) is almost algebraic (see Theorem 3.1) then I(µ)/J(µ) is compact and in turn for any x ∈ supp µ the I(µ)orbit of x in G is compact; thus supp µ can be expressed as a disjoint union of compact orbits of I(µ). We recall that if G is a compact Lie group then the Haar measure of G is a finite measure invariant under all automorphisms. On the other hand when G = Rn for some n ≥ 1, the only finite invariant measure is the point mass at 0 (see Corollary 4.2 below). The general situation is, in a sense, a mix of the two kinds of situations. From Theorem 4.1 one can deduce the following, by going modulo the maximal compact subgroup contained in the center and applying Theorem 3.1 on the quotient. Corollary 4.2. Let G be a connected Lie group and H be a subgroup of Aut(G). Let µ be a finite H-invariant measure on G. Then for any g ∈ supp µ the H-orbit of g is contained in a compact subset of G. In particular if H does not have an orbit other than that of the identity which is contained in a compact subset, then the point mass at the identity is the only H-invariant probability measure on G. For G = Rn , n ≥ 1, Therorem 4.1 implies in particular the following result, which was proved earlier in [18]. Theorem 4.3. For µ ∈ P (Rn ), I(µ) is an algebraic subgroup of Aut(Rn ) = GL(n, R). Analogous results are also proved in [18] for projective transformations. The approach involves the study of non-wandering points of the transformations, which has been discussed in further detail in [28]. 4.3 Convolution powers of invariant measures We recall here the following result concerning convolution powers of probability measures invariant under the action of a compact subgroup of positive dimension. For a probability measure µ and k ∈ N we denote by µk the k-fold convolution power of µ. Theorem 4.4. Let µ be a probability measure on Rn , n ≥ 1. Suppose that µ is invariant under the action of a compact connected subgroup K of Aut(G) = GL(n, R) of positive dimension. Then one of the following holds: i) µn is absolutely continuous with respect to the Lebesgue measure on Rn ; ii) there exists an affine subspace W of Rn such that µ(W ) > 0. 23 This is a variation of Theorem 3.2 in [29] whose proof can be read off from that of the latter; it can be seen that Condition (ii) above fails to hold if the Kaction has no nonzero fixed point and there is no proper vector subspace U with µ(U) > 0 (the subspace U can also be stipulated to be invariant), so under these assumptions µn is absolutely continuous with respect to the Lebesgue measure; this is the formulation of Theorem 3.2 in [29]. It would be interesting to have a suitable analogue of the above theorem for actions on a general connected Lie group G by compact subgroups of positive dimension in Aut(G), (with the Lebesgue measure replaced by the Haar measure of G). 4.4 Infinite invariant measures The Lebesgue measure on Rn is invariant under the action of a large subgroup of Aut(G) = GL(n, R), namely SL(n, R), the special linear group, but not the whole of Aut(G). On the other hand if G is a connected semisimple Lie group then Inn(G) is of finite index in Aut(G), and as G is unimodular it follows that the Haar measure is invariant under the action of Aut(G). In many Lie groups of common occurrence it is readily possible to determine whether the Haar measure is invariant under all automorphisms, but there does not seem to be any convenient criterion in the literature to test it. Let G be a connected Lie group and let S denote the subgroup which is the center of Aff0 (G), when G is viewed canonically as a subgroup of Aff(G) (see § 2.5). Recall that by Theorem 2.4 all orbits of Aut0 (G), and more generally of any almost algebraic subgroup A of Aut(G), on G/S are locally closed. By a theorem of Effros [42] this implies that for every measure on G which is quasi-invariant and ergodic under the action of an almost algebraic subgroup A of Aut(G), there exists an A-orbit O such that the complement of O has measure 0 (that is, the measure is “supported” on O, except that the latter is a locally closed subset which may not be closed); in particular this applies to any infinite measure invariant under the action of an almost algebraic subgroup A of Aut(G) as above. 4.5 Quasi-invariant measure and ergodicity We recall that for an action of a group on a locally compact second countable space, given an ergodic quasi-invariant measure µ, for almost all points in supp µ, the orbit is dense in supp µ. Together with the results on existence of dense orbits in § 3 this yields the following: Theorem 4.5. Let G be a connected Lie group and let λ be a Haar measure of 24 G. Then λ is quasi-invariant under the action of Aut(G). Moreover the following holds: i) if λ is ergodic with respect to the Aut(G)-action on G then G is a nilpotent Lie group. ii) if λ is ergodic under the action of an abelian subgroup of Aut(G) then G is a two-step nilpotent Lie group, with [G, G] compact. iii) if λ is ergodic under the action of some α ∈ Aut(G) then G is a torus. iv) if λ is ergodic under the action of an almost algebraic subgroup A of Aut(G) then the A-action on G/C, where C is the maximal compact subgroup of G, has an open dense orbit. The first three statements are straightforward consequences of results from § 3 on the existence of a dense orbit and the observation above. The last assertion follows from the fact that {ᾱ | α ∈ A} is an almost algebraic subgroup of Aut(G′ ), where G′ is the Lie algebra of G/C, and hence its orbits on G′ are locally closed; as G/C is a simply connected nilpotent Lie group the exponential map is a homeomorphism and hence the preceding conclusion implies that the A-orbits on G/C are locally closed, and in particular an orbit which is dense is also open in G/C. 4.6 Stabilisers of actions of Lie groups Let G be a connected Lie group and consider a (Borel-measurable) action of G on a standard Borel space X. By the stabiliser of a point x ∈ X we mean the subgroup {g ∈ G | gx = x}, and we denote it by Gx . Each Gx is a closed subgroup of G (see [86], Corollary 8.8). When the action is transitive, namely when the whole of X is a single orbit, then the stabilisers of any two points in X are conjugate to each other. One may wonder to what extent this generalises to a general ergodic action, with respect to a measure which is invariant or quasi-invariant under the action of G. In this respect the following is known from [25]; the results in [25] strengthen those from [45] in the case of Lie groups, while in [45] the issue of conjugacy of the stabilisers is considered in the wider framework of all locally compact groups. Theorem 4.6. Let G be a connected Lie group acting on a standard Borel space X. Let µ be a measure on X which is quasi-invariant and ergodic with respect to the action of G. Suppose also that for all x ∈ X the stabiliser Gx of x has only finitely many connected components. Then there exists a subset N of X with µ(N) = 0 such that for x, y ∈ X\N there exists α ∈ Aut0 (G) such that α(Gx ) = Gy ; in particular Gx and Gy are topologically isomorphic to each other. This is a variation of Corollary 5.2 in [25], where the ergodicity condition involved is formulated in terms of a σ-ideal of null sets, rather than a quasi25 invariant measure. Without the assumption of Gx having only finitely many connected components it is proved that for x, y in the complement of a null set N, the connected components of the identity in Gx and Gy are topologically isomorphic to each other ([25], Corollary 5.7). The proofs of these results are based on consideration of the action of Aut(G) on the space of all closed subgroups of G, the latter being equipped with the Fell topology, and the orbits or stabilisers Gx , x ∈ X, under the action. The argument depends on the fact Aut0 (G) is an almost algebraic subgroup of GL(G) containing Inn(G), G being the Lie algebra of G (see Theorem 2.2(ii)); the proof shows that automorphisms α as in the conclusion of the theorem may in fact be chosen to be from the smallest almost algebraic subgroup containing Inn(G), and in particular if Inn(G) is an almost algebraic subgroup of GL(G) then stabilisers of almost all points are conjugates to each other. Other conditions under which the stabilisers of almost all points may be concluded to be actually conjugate in G, and also examples for which it does not hold, are discussed in [25]. We shall not go into the details of these here. 5 Some aspects of dynamics of Aut(G)-actions In this section we discuss certain results on dynamics in which some features of the actions of Aut(G) on G described in earlier sections play a role. 5.1 Stabilisers of continuous actions Let G be a connected Lie group and consider a continuous action of G on a compact Hausdorff space X. Here we recall a topological analogue of Theorem 4.6. As before we denote by Gx the stabiliser of x under the action in question and we denote by G0x the connected component of the identity in Gx . We recall that an action is said to be minimal if there is no proper nonempty closed subset invariant under the action. The following is proved in [27], Proposition 3.1. Theorem 5.1. Let G be a connected Lie group acting continuously on a locally compact Hausdorff space X. Suppose that there exists x ∈ X such that the orbit of x is dense in X. Then there exists an open dense subset Y of X such that for all y ∈ Y there exists α ∈ Aut0 (G) such that α(G0x ) = G0y . If the action is minimal then G0x , x ∈ X, are Lie isomorphic to each other. Further conditions which ensure G0x , x ∈ X, being conjugate in G are discussed in [27]. The results of [27] generalise earlier results of C. C. Moore and G. Stuck proved for special classes of Lie groups (see [27] for details). 26 5.2 Anosov automorphisms Anosov diffeomorphisms have played an important role in the study of differentiable dynamical systems; we shall not go into much detail here on the issue – the reader is referred to Smale’s expository article [81] for a perspective on the topic. Hyperbolic automorphisms of tori Tn , n ≥ 2, namely automorphisms α such that dα has no eigenvalue (including complex) of absolute value 1, serve as the simplest examples of Anosov automorphisms. In [81] Smale described an example, due to A. Borel, of a non-toral compact nilmanifold admitting Anosov automorphisms; a nilmanifold is a homogeneous space of the form N/Γ where N is a simply connected nilpotent Lie group and Γ is discrete subgroup, and an Anosov automorphism of N/Γ is the quotient on N/Γ of an automorphism α of N such that α(Γ) = Γ and dα has no eigenvalue of absolute value 1. Such a system can have a nontrivial finite group of symmetries and factoring through them leads to some further examples on what are called infra-nilmanifolds, known as Anosov automorphisms of infra-nilmanifolds. Smale conjectured in [81] that all Anosov diffeomorphisms are topologically equivalent to Anosov automorphisms on infra-nilmanifolds. A broader class of Anosov automorphisms of nilmanifolds, which includes also the example of Borel referred to above, was introduced by L. Auslander and J. Scheuneman [5]. Their approach involves analysing Aut(N) for certain simply connected nilpotent Lie groups N to produce examples of Anosov automorphisms of compact homogeneous spaces of N/Γ for certain discrete subgroups Γ. In [16] the approach in [5] was extended using some results from the theory of algebraic groups and arithmetic subgroups, and some new examples of Anosov automorphisms were constructed. A large class of examples of Anosov automorphisms were constructed in [31] by associating nilpotent Lie groups to graphs and studying their automorphism group in relation to the graph. Study of the automorphism groups of nilpotent Lie groups has also been applied to construct examples of nilmanifolds that can not admit Anosov automorphisms (see [16] and [26]). Subsequently Anosov automorphisms of nilmanifolds have been constructed via other approaches; the reader is referred to [46] and [40] and various references cited there for further details. There has however been no characterisation of nilmanifolds admitting Anosov automorphisms, and it may be hoped that further study of the automorphism groups of nilpotent Lie groups may throw more light on the issue. 27 5.3 Distal actions An action of a group H on a topological space X is said to be distal if for any pair of distinct points x, y in X the closure of the H-orbit {(gx, gy) | g ∈ G} of (x, y) under the componentwise action of G on the cartesian product space X × X does not contain a point on the “diagonal”, namely of the form (z, z) for any z ∈ X. The action on a locally compact group G by a group H of automorphisms of G is distal if and only if under the H-action on G the closure the orbit of any nontrivial element g in G does not contain the identity element. Distality of actions is a classical topic, initiated by D. Hilbert, but the early studies were limited to actions on compact spaces. The question of distality of actions on Rn , n ≥ 1, by groups of linear transformations was initiated by C. C. Moore [69] and was strengthened by Conze and Guivarc’h [13]; see also H. Abels [1], where the results are extended to actions by affine transformations. It is proved that the action of a group H of linear automorphisms of Rn is distal if and only if the action of each h ∈ H (viz. of the cyclic subgroup generated by it) is distal, and that it holds if and only if all (possibly complex) eigenvalues of h are of absolute value 1 (see [13], [1]). It is proved in [2] that the action of a group H of automorphisms of a connected Lie group G is distal if and only if the associated action of H on the Lie algebra G of G is distal (to which the above characterisations would apply). For a subgroup H of GL(n, R), the H-action on Rn is distal if and only if the action of its algebraic hull (Zariski closure) in GL(n, R) is distal, and the action of an algebraic subgroup H of GL(n, R) on Rn is distal if and only if the unipotent elements in H form a closed subgroup U (which would necessarily be the unipotent radical) such that H/U is compact. (see [1], Corollaries 2.3 and 2.5). Via the above correspondence these results can be applied also to actions of groups of automorphisms of a general connected Lie group G. An action of a group H on a space X is called MOC (short for “minimal orbit closure”) if the closures of all orbits are minimal sets (viz. contain no proper nonempty invariant closed subsets). When X is compact, the MOC condition is equivalent to distality. For the action on a topological group G by a group of automorphisms MOC implies distality. The converse is known in various cases, including for actions on connected Lie groups G by groups of automorphisms (see [2]). The reader is also referred to [3], [80] and [78] for some generalisations of this as well as some of the other properties discussed above to more general locally compact groups). A connected Lie group G is said to be of type R if for all g ∈ G all (possibly complex) eigenvalues of Ad g are of absolute value 1. Thus in the light of the results noted above G is of type R if and only if the action of Inn(G) on G is 28 distal. This condition is also equivalent to G having polynomial growth, viz. for any compact neighbourhood V of the identity the Haar measure of V n grows at most polynomially in n; see [60] and also [49] and [68] for related general results. 5.4 Expansive actions A homeomorphism ϕ of a compact metric space (X, d) is said to be expansive if there exists ǫ > 0 such that for any pair of distinct points x, y there exists an integer n such that d(ϕn (x), ϕn (y)) > ǫ; the notion may also be defined in terms of a uniformity in place of a metric. An automorphism τ of a topological group G is expansive if there exists a neighbourhood V of the identity such that for any nontrivial element g in G there exists an integer n such that τ n (g) ∈ / V . More generally the action of a group Γ of automorphisms of a topological group G is said to be expansive if there exists a neighbourhood V of the identity in G such that for any nontrivial g in G there exists a γ ∈ Γ such that γ(g) ∈ / V. A compact connected topological group admits a group of automorphisms acting expansively only if it is abelian (cf. [65]) and finite dimensional (cf. [66]). For compact abelian groups the expansiveness condition on actions of automorphism groups has been extensively studied using techniques of commutative algebra (see [79] for details). If G is a connected Lie group with Lie algebra G, the action of a subgroup Γ of Aut(G) on G is expansive if and only if for the induced action of Γ on G, for any nonzero ξ ∈ G the Γ-orbit of ξ is unbounded in G (cf. [9], where the issue is also considered for semigroups of endomorphisms). It is also deduced in [9] that if Γ is a virtually nilpotent Lie group (viz. with a nilpotent subgroup of finite index) of Aut(G) whose action on G is expansive, then Γ contains an element acting expansively on G. 6 Orbits on the space of probability measures The action of Aut(G) on G, where G is a Lie group, induces an action of Aut(G) on the space of probability measures on G (see below for details). This action plays an important role in many contexts. This section is devoted to recalling various results about the action and their applications. 6.1 Preliminaries Let G be a connected Lie group and as before let P (G) denote the space of probability measures on G. We consider P (G) equipped with the weak∗ topology 29 with respect to the space of bounded continuous functions; we note that the topology is Rmetrizable, Rand a sequence {µj } in P (G) converges to µ ∈ P (G) if and only if G f dµj → G f dµ, as j → ∞, for all bounded continuous functions f on G. We recall that the action of Aut(G) on G induces an action on P (G), defined, for τ ∈ Aut(G) and µ ∈ P (G), by τ (µ)(E) = µ(τ −1 (E)) for all Borel subsets E of G. For λ, µ ∈ P (G), λ ∗ µ denotes the convolution product of λ and µ, and for any µ ∈ P (G) and k ∈ N we denote by µk the k-fold convolution product µ ∗ · · · ∗ µ. Behaviour of orbits of probability measures under actions of various subgroups is of considerable interest in various contexts. One of the issues is to understand conditions under which orbits of automorphism groups A ⊂ Aut(G) are locally closed, namely open in their closures. We recall here that by a result of Effros [42] this condition is equivalent to a variety of other “smoothness” conditions for the action, including that the orbits map being an open (quotient) map onto its image (the latter being considered with respect to the induced topology from P (G)). As before for a connected Lie group G we view Aut(G) as a subgroup of GL(G), where G is the Lie algebra of G, and a subgroup A of Aut(G) is said to be almost algebraic if it is an almost algebraic subgroup of GL(G) (see § 2). Theorem 6.1. (cf. [36], Theorem 3.3) Let G be a connected Lie group and A be an almost algebraic subgroup of Aut(G). Let C be the maximal compact subgroup contained in the center of G. Suppose that for any g ∈ G, {g −1 τ (g) | τ ∈ A} ∩ C is finite. Then for any µ ∈ P (G) the A-orbit {τ (µ) | τ ∈ A} is open in its closure in P (G). Moreover, if A consists of unipotent elements in GL(G) then the A-orbit is closed in P (G). The theorem implies in particular that when G has no compact subgroup of positive dimension contained in its center, for the action of any almost algebraic subgroup A of Aut(G) (which includes also the whole of Aut(G) in this case) the orbits of A are locally closed. 6.2 Factor compactness and concentration functions Let µ ∈ P (G). We denote by G(µ) the smallest closed subgroup of G containing supp µ, the support of µ, by N(µ) the normaliser of G(µ) in G and by Z(µ) the centraliser of supp µ, namely {g ∈ G | gx = xg for all x ∈ supp µ}. A λ ∈ P (G) is called a factor of µ if there exists ν ∈ P (G) such that µ = λ ∗ ν = ν ∗ λ. It is known that any factor of µ has its support contained in N(µ), more specifically in a coset of G(µ) contained in N(µ) (see [32], Proposition 1.1 for the first assertion; the second is an easy consequence of the first). 30 A question of interest, which is not yet understood in full generality, is whether given µ ∈ P (G) and a sequence {λj } of its factors there exists a sequence {zj } in Z(µ) such that {λj zj } is relatively compact in P (G) (in place of Z(µ) one may also allow in this respect the subgroup {g ∈ G | gµg −1 = µ}, which can be bigger, but the distinction turns out to be a rather technical issue, and we shall not concern ourselves with it here). It is known that given a sequence of −1 factors {λj } there exists a sequence {xj } in N(µ) such that {xj µx−1 j }, {xj µxj } and {xj λj } are relatively compact [32], [33], and it suffices to show that for such a sequence {xj } the sequence of cosets {xj Z(µ)} is relatively compact in G/Z(µ). It is known that this is true when G is an almost algebraic Lie group (and also under some weaker, somewhat technical, conditions) (see [32], [36]); the proofs however fall back on reducing the question to vector space situation and a more direct approach connecting the question to Theorem 6.1 would be desirable. A similar issue, or rather a more general one, arises in the study of the decay of concentration functions of µn as n → ∞, where one would like to know under what conditions a sequence of the form {xj µx−1 j } is relatively compact. We shall however not go into the details of the concept or the results about it here; a treatment of the topic in this perspective may be found in [21] and [39]; for a complete resolution of the problem itself, which however involves a somewhat different approach, the reader is referred to [59] and other references cited there. 6.3 Tortrat groups A locally compact group is called a Tortrat group if for any µ ∈ P (G) which is not idempotent (viz. such that µ2 6= µ) the closure of {gµg −1 | g ∈ G} in P (G) does not contain any idempotent measure. We note that the issue concerns the closure of the orbits of µ in P (G) under the action of the subgroup Inn(G); the latter being contained in Aut0 (G) which is an almost algebraic subgroup is useful in this respect. Recall (see § 5.3) that a connected Lie group is said to be type R if for all g ∈ G all eigenvalues of Adg are of absolute value 1. It was shown in [37] that for a Lie group the two properties are equivalent: Theorem 6.2. (cf. [37]) A connected Lie group is a Tortrat group if and only if it is of type R. The result implies also that a connected locally compact group is a Tortrat group if and only if it is of polynomial growth (see [37] for details and the related references). 31 6.4 Convergence of types Let {λj } and {µj } be two sequences in P (G) converging to λ and µ respectively. Suppose further that there exists a sequence {τj } in Aut(G) such that τj (λj ) = µj for all j. A question, arising in various contexts in the theory of probability measures on groups, is under what (further) conditions on λ and µ can we conclude that there exists a τ ∈ Aut(G) such that τ (λ) = µ; the reader can readily convince herself/himself that further conditions are indeed called for. When there exists a τ as above we say that convergence of types holds. Though the term “type of a measure” does not seem to make an appearance in literature freely, implicit in the terminology above is the idea that {τ (µ) | τ ∈ Aut(G)} constitutes the “type of µ”, or that µ and τ (µ) are of the same type for any τ ∈ Aut(G), and the question is if you have pair of sequences of measures with the corresponding measures of the same type, converging to a pair of measures, under what conditions can we conclude the limits to be of the same type. We now recall some results in this respect; for reasons of simplicity of exposition we shall not strive for full generality (see [20] for more details). As in § 2 let Aff(G) be the group of affine automorphisms, and let ρ : Aff(G) → GL(V ) be the linearising representation (see §2.5); recall that ρ is defined over V = ∧a B, where B is the Lie algebra of Aff(G) and a is the dimension of Aut(G). We say that µ ∈ P (G) is ρ-full if there does not exist any proper subspace U of V that is invariant under ρ(g) for all g ∈ supp µ; though this condition is rather technical, as it involves the linearising representation, it is shown in [20] that for various classes of groups it holds under simpler conditions; for instance if G is an almost algebraic subgroup of GL(n, R) then the condition holds for any µ for which supp µ is not contained in a proper almost algebraic subgroup of G. The following is a result which is midway between the rather technical Theorem 1.5 and the specialised result in Theorem 1.6 from [20], whose proof can be read off from the proof of Theorem 1.6. Theorem 6.3. Let G be a connected Lie group. Let {λj } and {µj } be sequences in P (G) converging to λ and µ respectively. Suppose that there exists a sequence {τj } in Aut0 (G) such that µj = τj (λj ) for all j and that λ and µ are ρ-full. Then there exist sequences {θj } and {σj } in Aut(G) such that {θj } is contained in a compact subset of Aut(G), {σj } are isotropic shear automorphisms, and τj = θj σj for all j. If moreover supp λ is not contained in any proper closed normal subgroup M of G such that G/M is a vector space of positive dimension, then {σj } is also relatively compact. We note that when {τj } as in the theorem is concluded to be relatively compact, convergence of types holds (for the given sequences); with the notation as 32 in the theorem, if τ is an accumulation point of {τj } then τ (λ) = µ. In the light of the conclusion of the theorem it remains mainly to understand the asymptotic behaviour under sequences of shear automorphisms. A special case of interest is when {λj } are all equal, say λ. For this case we recall also the following result, for shear automorphisms, proved in [29] (Theorem 4.3 there); the result played an important role in the proof of the main theorem there concerning embeddability in a continuous one-parameter semigroup, for a class of infinitely divisible probability measures; we shall not go into the details of these concepts here. It may be noted that one of the conditions in the hypothesis is as in statement (i) of Theorem 4.4. Theorem 6.4. Let G be a connected Lie group and T be a torus contained in the center of G. Let H be a closed normal subgroup of G such that G/H is topologically isomorphic to Rn for some n ≥ 1. Let W = G/H and θ : G → W be the canonical quotient homomorphism. Let λ ∈ P (G) be such that θ(µ)n is absolutely continuous with respect to the Lebesgue measure on W . Let {ϕj } be a sequence of homomorphisms of W into T and for all j let τj ∈ Aut(G) be the shear automorphism of G corresponding to ϕj . Suppose that the sequence {τj (λ)} converges to a measure of the form τ (λ) for some τ ∈ Aut(G) fixing T pointwise. Then there exists a sequence {σj } in Aut(G) such that σj (µ) = µ and {τj σj } is relatively compact. References [1] Herbert Abels, Distal affine transformation groups, J. Reine Angew. Math. 299/300 (1978), 294 - 300. [2] Herbert Abels, Distal automorphism groups of Lie groups, J. Reine Angew. Math. 329 (1981), 82 - 87. [3] Herbert Abels, Which groups act distally? Ergodic Theory Dynam. Systems 3 (1983), no. 2, 167 - 185. [4] Nobuo Aoki, Dense orbits of automorphisms and compactness of groups, Topology Appl. 20 (1985), no. 1, 1 - 15. [5] Louis Auslander and John Scheuneman, On certain automorphisms of nilpotent Lie groups, 1970 Global Analysis (Proc. Sympos. Pure Math., Vol. XIV, Berkeley, Calif., 1968) pp. 9 - 15, Amer. Math. Soc., Providence, R.I., USA. [6] M. Bachir Bekka and Matthias Mayer, Ergodic theory and topological dynamics of group actions on homogeneous spaces, London Mathematical Society Lecture Note Series, 269. Cambridge University Press, Cambridge, 2000. x+200 pp. 33 [7] Daniel Berend, Ergodic semigroups of epimorphisms, Trans. Amer. Math. Soc. 289 (1985), no. 1, 393 - 407. [8] Vitaly Bergelson and Alexander Gorodnik, Ergodicity and mixing of noncommuting epimorphisms, Proc. Lond. Math. Soc. (3) 95 (2007), no. 2, 329 - 359. [9] Siddhartha Bhattacharya, Expansiveness of algebraic actions on connected groups, Trans. Amer. Math. Soc. 356 (2004), no. 12, 4687 - 4700 [10] A. Borel and J. Tits, Groupes réductifs, Inst. Hautes Études Sci. Publ. Math. No. 27 (1965), 55 - 150. [11] P. B. Chen and T.S. Wu, On the component group of the automorphism group of a Lie group, J. Austral. Math. Soc. Ser. A 57 (1994), no. 3, 365 - 385. [12] P. B. Chen and T.S. Wu, Automorphism groups of complex analytic groups, Tamkang J. Math. 33 (2002), no. 3, 259 - 264. [13] J.-P. Conze and Yves Guivarc’h, Remarques sur la distalité dans les espaces vectoriels, C. R. Acad. Sci. Paris Sér. A 278 (1974), 1083 - 1086. [14] I. P. Cornfeld, S. V. Fomin and Ya. G. Sinai, Ergodic theory, Grundlehren der Mathematischen Wissenschaften [Fundamental Principles of Mathematical Sciences], 245, Springer-Verlag, New York, 1982, x+486 pp. [15] J. S. Dani, Density properties of orbits under discrete groups, J. Indian Math. Soc. (N.S.) 39 (1975), 189 - 217 (1976). [16] S. G. Dani, Nilmanifolds with Anosov automorphism, J. London Math. Soc. (2) 18 (1978), 553 - 559. [17] S. G. Dani, Dense orbits of affine automorphisms and compactness of groups, J. London Math. Soc. (2) 25 (1982), 241 - 245. [18] S. G. Dani, On ergodic quasi-invariant measures of group automorphism, Israel J. Math. 43 (1982), 62 - 74. [19] S. G. Dani, On automorphism groups of connected Lie groups, Manuscripta Math. 74 (1992), 445 - 452. [20] S. G. Dani, Invariance groups and convergence of types of measures on Lie groups, Math. Proc. Cambridge Philos. Soc. 112 (1992), 91 - 108. [21] S. G. Dani, Scattering of products of random matrices, In: Analysis, geometry and probability, 33 - 53, Texts Read. Math., 10, Hindustan Book Agency, Delhi, 1996. [22] S. G. Dani, Dynamical systems on homogeneous spaces, In: Dynamical systems, ergodic theory and applications, Edited and with a preface by Ya. G. Sinai, Encyclopaedia of Mathematical Sciences, 100, Mathematical Physics, I. Springer-Verlag, Berlin, 2000. xii+459 pp. 34 [23] S. G. Dani, On automorphism groups acting ergodically on connected locally compact groups, Ergodic theory and harmonic analysis (Mumbai, 1999), Sankhya, Ser. A 62 (2000), 360 - 366. [24] S. G. Dani, On ergodic Zd -actions on Lie groups by automorphisms, Israel J. Math. 126 (2001), 327 - 344. [25] S. G. Dani, On conjugacy classes of closed subgroups and stabilizers of Borel actions of Lie groups, Ergodic Theory Dynam. Systems 22 (2002), 1697 - 1714. [26] S. G. Dani, Some two-step and three-step nilpotent Lie groups with small automorphism groups. Trans. Amer. Math. Soc. 355 (2003), 1491 - 1503. [27] S. G. Dani, On stabilizers of continuous actions of Lie groups, In: Algebraic groups and arithmetic, 555 - 567, Tata Institute of Fundamental Research, Mumbai, 2004. [28] S. G. Dani, Dynamical properties of linear and projective transformations and their applications, Indian J. Pure Appl. Math. 35 (2004), 1365 - 1394. [29] S. G. Dani, Yves Guivarc’h and Riddhi Shah, On the embeddability of certain infinitely divisible probability measures on Lie groups), Math. Z. 272 (2012), no. 1-2, 361 - 379. [30] S. G. Dani and M. Keane, Ergodic invariant measures for actions of SL(2, Z), Ann. Inst. H. Poincaré Sect. B (N.S.) 15 (1979), no. 1, 79 - 84. [31] S. G. Dani, and Meera G. Mainkar, Anosov automorphisms on compact nilmanifolds associated with graphs, Trans. Amer. Math. Soc. 357 (2005), no. 6, 2235 2251. [32] S. G. Dani and M. McCrudden, Factors, roots and embeddability of measures on Lie groups, Math. Z. 199 (1988), no. 3, 369 - 385. [33] S. G. Dani and M. McCrudden, Convolution roots and embeddings of probability measures on Lie groups, Adv. Math. 209 (2007), 198 - 211. [34] S. G. Dani and Arnaldo Nogueira, On SL(n, Z)+ -orbits on Rn and positive integral solutions of linear inequalities, J. Number Theory 129 (2009), no. 10, 2526 - 2529. [35] S. G. Dani, and S. Raghavan, Orbits of Euclidean frames under discrete linear groups. Israel J. Math. 36 (1980), no. 3-4, 300 - 320. [36] S. G. Dani, and C.R.E. Raja, Asymptotics of measures under group automorphisms and an application to factor sets, In: Lie groups and ergodic theory (Mumbai, 1996), 59 - 73, Tata Inst. Fund. Res. Stud. Math. 14, Tata Institute of Fundamental Research, Bombay, 1998. [37] S. G. Dani and C.R.E. Raja, A note on Tortrat groups, J. Theoret. Probab., 11 (1998), 571 - 576. 35 [38] S. G. Dani, Nimish A. Shah, and George A. Willis, Locally compact groups with dense orbits under Zd -actions by automorphisms, Ergodic Theory Dynam. Systems 26 (2006), 1443 - 1465. [39] S. G. Dani, and Riddhi Shah, Collapsible probability measures and concentration functions on Lie groups, Math. Proc. Cambridge Philos. Soc. 122 (1997), no. 1, 105 - 113. [40] Karel Dekimpe and Kelly Verheyen, Constructing infra-nilmanifolds admitting an Anosov diffeomorphism, Adv. Math. 228 (2011), no. 6, 3300 - 3319. [41] Dragomir Z. Djoković, Exponential map and automorphism group of a connected Lie group, Amer. J. Math. 99 (1977), no. 5, 973 - 984. [42] Edward G. Effros, Transformation groups and C ∗ -algebras. Ann. of Math. (2) 81 1965, 38 - 55. [43] Manfred Einsiedler and Thomas Ward, Ergodic theory with a view towards number theory, Graduate Texts in Mathematics, 259. Springer-Verlag, London, 2011. xviii+481 pp. [44] J. Glimm, Locally compact transformation groups, Trans. Amer. Math. Soc. 101 (1961), 124 - 138. [45] Valentin Ya. Golodets and Sergey D. Sinel’shchikov, On the conjugacy and isomorphism problems for stabilizers of Lie group actions, Ergodic Theory Dynam. Systems 19 (1999), no. 2, 391 - 411. [46] V. V. Gorbatsevich, On algebraic Anosov diffeomorphisms on nilmanifolds (Russian), Sibirsk. Mat. Zh. 45 (2004), 995 - 1021; translation in Siberian Math. J. 45 (2004), 821 - 839. [47] Morikuni Goto, Standard Cartan subalgebras and the automorphism group of a Lie group, Bull. Inst. Math. Acad. Sinica 8 (1980), no. 2-3, part 1, 251 - 261. [48] Morikuni Goto and Edward T. Kobayashi, On the subgroups of the centers of simply connected simple Lie groups – Classification of simple Lie groups in the large, Osaka J. Math. 6 (1969), 251 - 281. [49] Yves Guivarc’h, Croissance polynomiale et priodes des fonctions harmoniques, Bull. Soc. Math. France 101 (1973), 333 - 379. [50] Hasan Gündogan, The component group of the automorphism group of a simple Lie algebra and the splitting of the corresponding short exact sequence, J. Lie Theory 20 (2010), no. 4, 709 - 737. [51] P. R. Halmos, Lectures on ergodic theory, Chelsea Publishing Co., New York 1960, vii+101 pp. 36 [52] Sigurdur Helgason, Differential geometry, Lie groups, and symmetric spaces, Corrected reprint of the 1978 original, Graduate Studies in Mathematics 34, American Mathematical Society, Providence, RI, 2001. xxvi+641 pp. [53] Joachim Hilgert and Karl-Hermann Neeb, Structure and geometry of Lie groups. Springer Monographs in Mathematics. Springer, New York, 2012. x+744 pp. [54] G. Hochschild, The automorphism group of a Lie group, Trans. Amer. Math. Soc. 72, (1952), 209 - 216. [55] G. Hochschild, The structure of Lie groups. Holden-Day, Inc., San FranciscoLondon-Amsterdam, 1965, ix+230 pp. [56] G. Hochschild and G.D. Mostow, Automorphisms of affine algebraic groups, J. Algebra 13 (1969), 535 - 543. [57] N. Jacobson, Structure and automorphisms of semisimple Lie groups in the large, Ann. of Math. (2) 40, (1939), 755 - 763. [58] N. Jacobson, A note on automorphisms and derivations of Lie algebras, Proc. Amer. Math. Soc. 6, (1955), 281 - 283. [59] Wojciech Jaworski, On shifted convolution powers and concentration functions in locally compact groups, In: Probability on algebraic structures (Gainesville, FL, 1999), 23 - 41, Contemp. Math., 261, Amer. Math. Soc., Providence, RI, 2000. [60] J. W. Jenkins, Growth of connected locally compact groups. J. Functional Analysis 12 (1973), 113 - 127. [61] Tatsuro Kasuga, Affine endomorphisms with a dense orbit, Proc. Amer. Math. Soc. 95 (1985), no. 4, 659 - 661. [62] R. Kaufman and M. Rajagopalan, On automorphisms of a locally compact group, Michigan Math. J. 13 (1966), 373 - 374. [63] Tatsuo Kimura, Introduction to prehomogeneous vector spaces, Translated from the 1998 Japanese original by Makoto Nagura and Tsuyoshi Niitani and revised by the author, Translations of Mathematical Monographs, 215. American Mathematical Society, Providence, RI, 2003. xxii+288 pp. [64] Dmitry Kleinbock, Nimish Shah and Alexander Starkov, Dynamics of subgroup actions on homogeneous spaces of Lie groups and applications to number theory, Handbook of dynamical systems, Vol. 1A, 813 - 930, North-Holland, Amsterdam, 2002. [65] Ping-fun Lam, On expansive transformation groups, Trans. Amer. Math. Soc. 150 (1970), 131 - 138. 37 [66] Wayne Lawton, The structure of compact connected groups which admit an expansive automorphism, In: Recent advances in topological dynamics (Proc. Conf., Yale Univ., New Haven, Conn., 1972; in honor of Gustav Arnold Hedlund), pp. 182 - 196. Lecture Notes in Math., Vol. 318, Springer, Berlin, 1973. [67] Dong Hoon Lee, On the group of automorphisms of affine algebraic groups, Trans. Amer. Math. Soc. 237 (1978), 145 - 152. [68] Viktor Losert, On the structure of groups with polynomial growth. Math. Z. 195 (1987), no. 1, 109 - 117. [69] Calvin C. Moore, Distal affine transformation groups, Amer. J. Math. 90 (1968), 733 - 751. [70] Dave Witte Morris, Introduction to arithmetic groups, Deductive Press, 2015. xii+475 pp. [71] Shingo Murakami, On the automorphisms of a real semi-simple Lie algebra, J. Math. Soc. Japan 4, (1952), 103 - 133; Supplements and corrections, J. Math. Soc. Japan 5, (1953). 105 - 112. [72] Gopal Prasad, Lattices in semisimple groups over local fields, Studies in algebra and number theory, pp. 285 - 356, Adv. in Math. Suppl. Stud., 6, Academic Press, New York-London, 1979. [73] W. H. Previts and S.T. Wu, On the group of automorphisms of an analytic group, Bull. Austral. Math. Soc. 64 (2001), 423 - 433. [74] W. H. Previts and T.S. Wu, Dense orbits and compactness of groups, Bull. Austral. Math. Soc. 68 (2003), no. 1, 155 - 159. [75] M. S. Raghunathan, Discrete subgroups of Lie groups. Ergebnisse der Mathematik und ihrer Grenzgebiete, Band 68. Springer-Verlag, New York-Heidelberg, 1972. ix+227 pp. [76] C. R. E. Raja, On the existence of ergodic automorphisms in ergodic Zd -actions on compact groups, Ergodic Theory Dynam. Systems 30 (2010), 1803 - 1816. [77] C. R. E. Raja and Riddhi Shah, Distal actions and shifted convolution property, Israel J. Math. 177 (2010), 391 - 412. [78] C. R. E. Raja and Riddhi Shah, Some properties of distal actions of locally compact groups, preprint. [79] Klaus Schmidt, Dynamical systems of algebraic origin, [2011 reprint of the 1995 original], Modern Birkhuser Classics. Birkhuser/Springer Basel AG, Basel, 1995, xviii+310 pp. 38 [80] Riddhi Shah, Orbits of distal actions on locally compact groups, J. Lie Theory 22 (2012), 587 - 599. [81] S. Smale, Differentiable dynamical systems, Bull. Amer. Math. Soc. 73 (1967), 747 - 817. [82] Markus Stroppel, Homogeneous locally compact groups, J. Algebra 199 (1998), 528 - 543. [83] Markus Stroppel, Homogeneous symplectic maps and almost homogeneous Heisenberg groups, Forum Math. 11 (1999), 659 - 672. [84] Markus Stroppel, Locally compact groups with many automorphisms, J. Group Theory 4 (2001), 427 - 455. [85] Markus Stroppel, Locally compact groups with few orbits under automorphisms, Proceedings of the 16th Summer Conference on General Topology and its Applications (New York), Topology Proc. 26 (2001/02), 819 - 842. [86] V. S. Varadarajan, Geometry of quantum theory. Second edition. Springer-Verlag, New York, 1985. xviii+412 pp. [87] Peter Walters, An introduction to ergodic theory, Graduate Texts in Mathematics, 79. Springer-Verlag, New York-Berlin, 1982, ix+250 pp. [88] D. Wigner, On the automorphism group of a Lie group. Proc. Amer. Math. Soc. 45 (1974), 140 - 143; Erratum: Proc. Amer. Math. Soc. 60 (1976), 376. [89] T. S. Wu, Continuous automorphisms on locally compact groups, Math. Z. 96 (1967), 256 - 258. [90] Ta Sun Wu, On the automorphism group of a connected locally compact topological group. Proc. Edinburgh Math. Soc. (2) 35 (1992), no. 2, 285 - 294. S.G. Dani Department of Mathematics Indian Institute of Technology Bombay Powai, Mumbai 400005 India E-mail: [email protected] 39
4math.GR
March 23, 2018 GAUSSIAN ELIMINATION IN SYMPLECTIC AND ORTHOGONAL GROUPS SUSHIL BHUNIA, AYAN MAHALANOBIS, PRALHAD SHINDE AND ANUPAM SINGH IISER Pune, Dr. Homi Bhabha Road, Pashan, Pune 411008, INDIA. A BSTRACT. This paper studies algorithms similar to the Gaussian elimination algorithm in symplectic and orthogonal groups. We discuss two applications of this algorithm. One computes the spinor norm and the other computes the double coset decomposition with respect to Siegel maximal parabolic subgroup. arXiv:1504.03794v3 [math.GR] 15 Sep 2017 1. I NTRODUCTION Gaussian elimination is a very old theme in Mathematics. It appeared in print as chapter eight in a Chinese mathematical text called, “The nine chapters of the mathematical art”. It is believed, a part of that book was written as early as 150 BCE. For a historical perspective on Gaussian elimination, we refer to a nice work by Grcar [9]. In this paper, we work with Chevalley generators [4, §11.3]. Chevalley generators for the special linear group are elementary transvections. Transvections of the special linear groups have many interesting applications. Hildebrand [12] showed that random walk based on transvections become close to the uniform distribution fast. Chevalley generators for other classical groups are known for a very long time. However, its use in rowcolumn operations in symplectic and orthogonal groups is new. We develop row-column operations, very similar to the Gaussian elimination algorithm for special linear groups. We call our algorithms Gaussian elimination in symplectic and orthogonal groups respectively. Similar algorithm for unitary groups [13] is available. From our algorithm, one can compute the spinor norm easily, see Section 6. Murray and RoneyDougal [15] studied computing spinor norm earlier. Our algorithm can also be used to compute the double coset decomposition corresponding to the Siegel maximal parabolic subgroup, see Section 7. 2. E XISTING WORK We report on some existing work that are relevant to this paper. In computational group theory, Gaussian elimination algorithms are seen as a subprocess of the constructive group recognition project. In this case, a group G is defined by a set of generators hXi = G, the problem is to write g ∈ G as a word in X. Brooksbank [3, Section 5] presents an idea similar to that in our algorithm. His main interest lies in constructive group recognition, writing g as a word in X. He is not particularly interested in developing a Gaussian elimination algorithm. In a Gaussian elimination algorithm two important components are: elementary matrices and elementary operations. Brooksbank’s elementary matrices are the output of a probabilistic Las Vegas algorithm. So, it is difficult to judge, if he has the same elementary matrices as ours. He does not define elementary operations. He uses a low dimensional oracle to solve the word problem. Our algorithm is more straightforward and works directly with elementary matrices. It seems that his methods could be modified to produce a Gaussian elimination algorithm in all classical groups in finite fields of all characteristics. However, his treatment depends on the primitive element ρ of F× q and on expressing Fq as a finite dimensional vector space over F p – the prime subfield. This suggests that his algorithm would only work for finite fields. E-mail address: [email protected], [email protected], [email protected], [email protected]. 2010 Mathematics Subject Classification. 11E57, 15A21. Key words and phrases. Symplectic group, orthogonal groups, Gaussian elimination, spinor norm. This work is supported by a SERB research grant. 1 Costi [8] develops an algorithm similar to ours using standard generators. These standard generators are defined using a primitive element ω of the finite field. When one uses the primitive element of the finite field, then to work with an arbitrary field element, one needs to solve the discrete logarithm problem in ω. Discrete logarithm problem in finite fields are hard to solve. There is no known polynomial time algorithm to solve them. This makes programs using the standard generators slower. In the Magma implementation that we talk about later, for small fields, the field elements are represented by Zech logarithm. So, there is no need to compute the discrete logarithm. However, one needs to compute various powers of ω and ω −1 in Costi’s algorithm. This is the main reason behind Costi’s algorithm to be slower than ours. Furthermore, Costi’s algorithms are recursive. Moreover, Costi’s algorithm cannot be extended to infinite fields because of its use of a primitive element. Cohen, Murray and Taylor [7] proposed a generalized algorithm using the row-column operations, using a representation of Chevalley groups. The key idea there was to bring down an element to a maximal parabolic subgroup and repeat the process inductively. Here we use the natural matrix representation of these groups. Thus our algorithm is more direct and works with matrices explicitly and effectively. A novelty of our algorithm is that we do not need to assume that the Chevalley generators generate the group under consideration. Thus our algorithm proves independently the fact that these groups are generated by elementary matrices. 3. M AIN R ESULT Algorithms that we develop in this paper work only for a given bilinear form (or quadratic form) β (see Equations 4.1- 4.5). Though in our algorithm, we work with only one bilinear form (or quadratic form) β , given by a fixed basis, with a suitable change of basis matrix our algorithm works on any equivalent bilinear forms (or quadratic forms). Our algorithm work well on fields of all characteristics for symplectic and orthogonal groups. Another way to look at this paper, we have an algorithmic proof of this well-known theorem. For definitions of elementary matrices, one can look ahead to Section 5. Theorem A. Let k be a field. For d ≥ 4 or l ≥ 2 following holds: (A ) Every element of the orthogonal group O(d, k) can be written as a product of elementary matrices and a diagonal matrix. Furthermore, the diagonal matrix is of the form diag(1, . . . , 1, λ , 1, . . . , 1, λ −1 ) λ ∈ k× for O+ (2l, k) diag(ϑ , 1, . . . , 1, λ , 1, . . . , 1, λ −1 ) λ ∈ k× and ϑ = ±1 for O(2l + 1, k) diag(1, 1, 1, . . . , λ , 1, . . . , λ −1 ) | {z } | {z } (l−1) λ ∈ k× for O− (2l, k). (l−1) (B) Every element of the symplectic group Sp(2l, k) can be written as a product of elementary matrices. This theorem has a surprising corollary. It follows that: Corollary B. Let char(k) be odd. In a split orthogonal group O+ (d, k), the image of λ in k× /k×2 is the spinor norm. Furthermore, the spinor norm can also be computed using our algorithm for the twisted orthogonal group in odd characteristics, see Section 6.1. Corollary C. Let k be a perfect field of characteristics 2. Every element of the orthogonal group O(2l +1, k) can be written as the product of elementary matrices. We have an efficient algorithm to compute the spinor norm. Since the commutator subgroup of the orthogonal group is the kernel of the spinor norm restricted to special orthogonal group, the above corollary is a membership test for the commutator subgroup in the orthogonal group. In other words, an element g in the special orthogonal group belongs to the commutator subgroup if and only if the λ it produces in the Gaussian elimination algorithm is a square in the field, see Equation 4.6. 2 The bilinear form that we use and the generators that we define have its roots in the abstract root system of a semisimple Lie algebra and Chevalley groups defined by Chevalley and Steinberg [6, 16]. However we assume no knowledge of Lie theory or Chevalley groups in this paper. 4. O RTHOGONAL AND S YMPLECTIC G ROUPS We begin with a brief introduction to orthogonal and symplectic groups. We follow Carter [4], Taylor [17] and Grove [10] in our introduction. In this section, we fix some notations which will be used throughout this paper. We denote the transpose of a matrix X by TX. As usual, tei, j denote the matrix unit with t in the (i, j) place and 0 everywhere else. Let V be a vector space of dimension d over a field k. We write the dimension of V as d where d = 2l + 1 or d = 2l and l ≥ 1. Let β : V × V → k be a bilinear form. By fixing a basis of V we can associate a matrix to β . We shall abuse the notation slightly and denote the matrix of the bilinear form by β itself. Thus β (x, y) = Txβ y where x, y are column vectors. We will work with non-degenerate bilinear forms, which implies, det β 6= 0. A symmetric or skew-symmetric bilinear form β satisfies β = Tβ or β = −Tβ respectively. In even order, for characteristic 2, the symmetric and skew-symmetric forms are the same. By fixing a basis for V , we identify GL(V ) with GL(d, k) and treat orthogonal groups and symplectic groups as subgroups of the matrix group GL(d, k). Definition 4.1 (Symplectic Group). A square matrix X of size d is called symplectic if TXβ X = β where β is skew-symmetric. The set of symplectic matrices form the symplectic group. In this paper, we deal with the symplectic group defined by the bilinear form defined by Equation 4.1. So any mention of symplectic group means this one particular symplectic group, unless stated otherwise. Up to equivalence, there is an unique non-degenerate skew-symmetric (or alternating) bilinear form over a field k. Furthermore a non-degenerate skew-symmetric (or alternating) bilinear form exists only in even dimension. Fix a basis of V as {e1 , . . . , el , e−1 , . . . , e−l } so that the matrix β is:   0 Il (4.1) β= . −Il 0 The symplectic group with this β is denoted by Sp(2l, k). Definition 4.2. Let Q is a quadratic form. The orthogonal group associated with Q is defined as: O(d, Q) := {X ∈ GL(V ) | Q(X(v)) = Q(v) for all v ∈ V }. As the quadratic form is defined in a slightly different way in case of even characteristics we describe the orthogonal groups for odd and even characteristics separately. 4.1. Orthogonal groups for char(k)6= 2. Recall that one can easily recover the bilinear form from the quadratic form Q by the formula: 1 B(x, y) = {Q(x + y) − Q(x) − Q(y)} 2 and it is easy to see that a matrix X satisfies TXβ X = β if and only if Q(X(x)) = Q(x) for all x ∈ V . We work with a particular non-degenerate quadratic form Q, however when the characteristics of k is not 2 this corresponds to β being non-degenerate. Let k be a field of odd characteristic. We work with the following non-degenerate bilinear forms: Fix a basis {e0 , e1 , . . . , el , e−1 , . . . , e−l } for odd dimension and {e1 , . . . , el , e−1 , . . . , e−l } for even dimension so that the matrix β is:    2 0 0      0 0 Il  when d = 2l + 1 (4.2) β=  0 Il  0   0 Il   when d = 2l.  Il 0 3 For the twisted form, we fix a basis {e1 , e−1 , e2 , . . . , el , e−2 , . . . , e−l } so that the matrix β is:   β0 0 0 0 Il−1  , (4.3) β =0 0 Il−1 0   1 0 where β0 = and ε is a fixed non-square in k. 0 ε Note that if k(= Fq ) is a finite field of odd characteristic. If d is odd then there is only one orthogonal group up to conjugation [10, Page 79] and thus we can fix β as above. However, up to conjugation there are two different orthogonal groups [10, Page 79] in even dimension d = 2l. For orthogonal group with even dimension we fix β as above. Thus, we cover all finite orthogonal groups over a field of odd characteristics. 4.2. Orthogonal groups for char(k) = 2. Assume that char(k)=2, in this case the quadratic form is defined in a slightly different way. A quadratic form Q is defined as follows: Q(λ x + µy) = λ 2 Q(x) + µ 2 Q(y) + λ µB(x, y) for all x, y ∈ V , λ , µ ∈ k, and B a symmetric bilinear form on V which is called the associated bilinear form of Q. Let k be a field of even characteristics. We work with following non-degenerate quadratic forms [4, Page 10]. Fix a basis {e0 , e1 , . . . , el , e−1 , . . . , e−l } for odd dimension and {e1 , . . . , el , e−1 , . . . , e−l } for even dimension so that the quadratic forms and their associated bilinear forms are as follows:    0 0 0      x02 + x1 x−1 + . . . + xl x−l , with associated form 0 0 Il  , when d = 2l + 1 (4.4) Q(x) =  0 Il  0   0 Il   with associated form , when d = 2l.  x1 x−1 + . . . + xl x−l , Il 0 For the twisted form, we fix a basis {e1 , e−1 , e2 , . . . , el , e−2 , . . . , e−l } so that the quadratic form and its associated bilinear form is as follows:   β0 0 0 2 0 Il−1  , (4.5) Q(x) = α(x12 + x−1 ) + x1 x−1 + . . . + xl x−l , with the associated form  0 0 Il−1 0   0 1 2 where αt + t + α is irreducible in k[x] and β0 = . 1 0 Note that if k is a perfect field of even characteristics. It is well known that if dim(V ) = 2l + 1 then there is only one non-degenerate quadratic form upto equivalence. However, in case of dim(V ) = 2l there are two quadratic forms upto equivalence. Thus, we cover all orthogonal groups over a perfect field of even characteristics. Let Q be a non-degenerate quadratic form defined as above. For a fixed basis, we note that any isometry g satisfying Q(g(v)) = Q(v) for all v ∈ V also satisfies Tgβ g = β . However the converse is not true. We denote othogonal groups associated with Q by O(2l + 1, k), O+ (2l, k) and O− (2l, k) respectively. Let k be a field of odd characteristics. We denote by Ω(d, k) the commutator subgroup of the orthogonal group O(d, k) which is equal to the commutator subgroup of SO(d, k). There is a well known exact sequence (4.6) 2 1 −→ Ω(d, k) −→ SO(d, k) −→ k× /k× −→ 1 Θ m where Θ is the spinor norm. The spinor norm is defined as Θ(g) = ∏ Q(vi ) where g = ρv1 · · · ρvm is written i=1 as a product of reflections. 4 5. S OLVING THE WORD PROBLEM IN G In computational group theory, one is always looking for algorithms that solve the word problem. When G is a special linear group, one has a well-known algorithm to solve the word problem – the Gaussian elimination. One observes that the effect of multiplying an element of the special linear group by an elementary matrix (also known as elementary transvection) from left or right is either a row or a column operation respectively. Using this algorithm one can start with any matrix g ∈ SL(l + 1, k) and get to the identity matrix thus writing g as a product of elementary matrices [1, Proposition 6.2]. One of the objective of this paper is to discuss a similar algorithm for orthogonal and symplectic groups, with a set of generators that we will call elementary matrices in their respective groups. We first describe the elementary matrices and the row-column operations for the respective groups. These row-column operations are nothing but multiplication by elementary matrices from left and right respectively. Here elementary matrices used are nothing but Chevalley generators which follows from the theory of Chevalley groups. The basic idea of the algorithm is to use the fact that multiplying any orthogonal matrix by any one of the generators enables us to perform row or column operations. The relation Tgβ g = β gives us some compact relations among the blocks of g which can be used to make the algorithm more faster. To make the algorithm simple we will write the algorithm for O(2l + 1, k), O+ (2l, k) and O− (2l, k) separately. 5.1. Groups in which Gaussian elimination works. • Symplectic groups: Since all non-degenerate skew-symmetric bilinear forms are equivalent [10, Corollary 2.12], we have a Gaussian elimination algorithm for all symplectic groups over an arbitrary field. • Orthogonal groups: – Since non-degenerate symmetric bilinear forms over a finite field of odd characteristics are classified [10, Page 79] according to the β ( see Equations 4.2 & 4.3), we have a Gaussian elimination algorithm for all orthogonal groups over a finite field of odd characteristics. – Since non-degenerate quadratic forms over a perfect field of even characteristics can be classified [4, Page 10] according to quadratic forms Q(x) defined in Equations 4.4 & 4.5, we have a Gaussian elimination algorithm for all orthogonal groups over a perfect field of even characteristics. – Furthermore, we have Gaussian elimination algorithm for orthogonal groups that are given by the above bilinear forms or quadratic forms over arbitrary fields. This algorithm also works for bilinear or quadratic forms that are equivalent to the above forms. 5.2. Gaussian elimination for matrices of even size – orthogonal group O+ (d, k) and symplectic groups. Recall that the bilinear forms β are the following:   0 Il • For symplectic group, Sp(d, k), d = 2l and β = . −I 0 l   0 Il + • For orthogonal group, O (d, k), d = 2l and β = . Il 0 T Note that any isometry g satisfying the quadratic form Q also  satisfy  gβ g = β . The main reason our A B algorithm works is the following: Recall that a matrix g = , where A, B,C & D are matrices of C D size l, is orthogonal or symplectic if Tgβ g = β for the respective β . After some usual calculations, for orthogonal group it becomes T    CA + TAC TCB + TAD 0 Il (5.1) TDA + TBC TDB + TBD = I l 0 The above equation implies among other things, TCA + TAC = 0. This implies that TAC is skew-symmetric. In an almost identical way one can show, if g is symplectic, TAC is symmetric. The working principle of our algorithm is simple – use the symmetry of TAC. The problem is, for arbitrary A and C, it is not easy 5 to use this symmetry. In our case we were able to reduce A to a diagonal matrix and then it is relatively straightforward to use this symmetry. We will explain the algorithm in details later. First of all, let us describe the elementary matrices and the row-column operations for orthogonal and symplectic groups. The genesis of these elementary matrices lie in the Chevalley basis of simple Lie algebras. We won’t go into details of Chevalley’s theory in this paper. Furthermore, we don’t need to, the algorithm that we produce will show that these elementary matrices are generators for the respective groups. Next we present the elementary matrices for the respective groups and then the row-column operations in a tabular form. 5.2.1. Elementary matrices (Chevalley generators) for orthogonal group O+ (d, k) of even size. Following the theory of root system in a simple Lie algebra, we index rows by 1, 2, . . . , l, −1, −2, . . . , −l. For t ∈ k, the elementary matrices are defined as follows: TABLE 1. Elementary matrices for O+ (2l, k) char(k) both Elementary matrices xi, j (t) I + t(ei, j − e− j,−i ), i 6= j xi,− j (t) I + t(ei,− j − e j,−i ), i< j x−i, j (t) I + t(e−i, j − e− j,i ), i< j wi I − ei,i − e−i,−i + ei,−i + e−i,i 1 ≤ i ≤ l Let us note the effect of multiplying g by elementary matrices. We write g ∈ O+ (2l, k)   A B as g = , C D where A, B,C & D are l × l matrices. TABLE 2. The row-column operations for O+ (2l, k) Row operations ER1 ith 7→ ith + t jth row and − jth 7→ − jth − t(−i)th row ER2 ith 7→ ith + t(− j)th row and jth 7→ jth − t(−i)th row ER3 −ith 7→ −ith − t jth row and − jth 7→ − jth + tith row wi Interchange ith and (−i)th row Column operations EC1 jth 7→ jth + tith column and −ith 7→ −ith − t(− j)th column EC2 −ith 7→ −ith − t jth column and − jth 7→ − jth + tith column th EC3 j 7→ jth + t(−i)th column and ith 7→ ith − t(− j)th column Interchange ith and (−i)th column 5.2.2. Elementary matrices (Chevalley generators) for symplectic groups. For t ∈ k, the elementary matrices are defined as follows: TABLE 3. Elementary matrices for Sp(2l, k) char(k) both xi, j (t) xi,− j (t) x−i, j (t) xi,−i (t) x−i,i (t) Elementary matrices I + t(ei, j − e− j,−i ), i 6= j I + t(ei,− j − e j,−i ), i< j I + t(e−i, j − e− j,i ), i< j I + tei,−i , 1≤i≤l I + te−i,i , 1≤i≤l 6   A B Let us note the effect of multiplying g by elementary matrices. We write g ∈ Sp(2l, k) as g = , C D where A, B,C & D are l × l matrices. TABLE 4. The row-column operations for symplectic groups Row operations Column operations th th th ER1 7→ i + t j row and EC1 j 7→ jth + tith column and th th th − j 7→ − j + t(−i) row −ith 7→ −ith + t(− j)th column ER2 ith 7→ ith + t(− j)th row and EC2 −ith 7→ −ith + t jth column and jth 7→ jth + t(−i)th row − jth 7→ − jth + tith column ER3 −ith 7→ −ith + t jth row and EC3 jth 7→ jth + t(−i)th column and th th th − j 7→ − j + ti row ith 7→ ith + t(− j)th column ER1a ith 7→ ith + t(−i)th row EC1a −ith 7→ −ith + tith column ER2a −ith 7→ −ith + tith row EC2a ith 7→ ith + t(−i)th column wi Interchange ith and (−i)th rows Interchange ith and (−i)th columns th with a sign change in the i row. with a sign change in the ith column. ith 5.2.3. Gaussian elimination for Sp(2l, k) and O+ (2l, k). Step 1: Use ER1 and EC1 to make A into a diagonal matrix. This makes A into a diagonal matrix and changes other matrices A, B, C and D. For sake of notational convenience we keep calling these changed matrix as A, B, C and D as well. Step 2: There are two possibilities. One, the diagonal matrix A is of full rank and two, the diagonal matrix A is of rank r less than l. This is clearly identifiable by looking for zeros in the diagonal of A. Step 3: Make r rows of C, corresponding to the non-zero entries in the diagonal of A zero by using ER3. If r = l, we have C a zero matrix. If not let us assume that ith row is zero in A. Then we interchange the ith row with the −ith row in g. We do this for all zero rows in A. The new C is a zero matrix. We claim that the new A must have a full rank. This follows from Equation 5.1; in particular TCB + TAD = I . If C is zero matrix then A is invertible. Now make A a diagonal matrix by using l   1 0 ··· 0 0 1 · · · 0   Step 1. Then one can make A a matrix of the form   ... ... . . . ...  where λ is a non-zero scalar 0 0 ··· λ using ER1 [1, Proposition 6.2]. Once A is diagonal and C a zero matrix the equation TCB + TAD = Il makes D a diagonal matrix of full rank. Step 4: Use ER2 to make B a zero matrix. The matrix g becomes a diagonal matrix of the form   1 0 ··· 0   0 1 · · · 0  A 0 . . .  where A is of the form  .. .. . . ... . 0 A−1 0 0 ··· λ Step 5: (only for symplectic groups) Reduce the λ to 1 using Lemma 5.1. Lemma 5.1. For Sp(2l, k), the element diag(1, . . . , 1, λ , 1, . . . , 1, λ −1 ) is a product of elementary matrices. Proof. Observe that (I + tel,−l )(I − t −1 e−l,l )(I + tel,−l ) = I − el,l − e−l,−l + tel,−l − t −1 e−l,l and denote it by wl (λ ) and then the diagonal element is wl (λ )wl (−1). • Remark 5.2. As we saw in the above algorithm, we will have to interchange ith and −ith rows for i = 1, 2, . . . , l. This can be done by premultiplying with a suitable matrix. 7 Let I be the 2l × 2l identity matrix over k. To swap ith and −ith row in O+ (2l, k), swap ith and −ith rows in the matrix I. We will call this matrix wi . It is easy to see that this matrix wi is in O+ (2l, k) and is of determinant −1. Premultiplying with wi does the row interchange we are looking for. th In the case of symplectic group Sp(2l, k), we again swap two rows i and −ith rows in I. However we do a sign change in the ith row and call it wi . Simple computation with our chosen β shows that the above matrices are in O+ (2l, k) and Sp(2l, k) respectively. However there is one difference between orthogonal and symplectic groups. In symplectic group, wi can be generated by elementary matrices because wi = xi,−i (1)x−i,i (−1)xi,−i (1). In the case of orthogonal groups that is not the case. This is clear, the elementary matrices come from the Chevalley generators and those generates Ω the commutator of the orthogonal group. All matrices in Ω have determinant 1. However wi has determinant −1. So we must add wi as a elementary matrix for O+ (2l, k). Remark 5.3. This algorithm proves, every element in the symplectic group is of determinant 1. Note, the elementary matrices for the symplectic group is of determinant 1, and we have an algorithm to write any element as product of elementary matrices. So this proves that the determinant is 1. Remark 5.4. This algorithm proves, if X is an element of an symplectic group then so is TX. The argument is similar to above, here we note that the transpose of an elementary matrix in symplectic groups is an elementary matrix. 5.3. Gaussian elimination for matrices of odd size – the odd-orthogonal group. In this case, matrices are of odd size and there is only one family of group to consider, it is the odd orthogonal group O(2l + 1, k). This group will be referred to as the odd-orthogonal group. 5.4. Elementary Matrices (Chevalley generators) for O(2l + 1, k). Following the theory of Lie algebra, we index rows by 0, 1, . . . , l, −1, . . . , −l. These elementary matrices are listed in Table 5. TABLE 5. Elementary matrices for O(2l + 1, k) char(k) both odd even Elementary matrices xi, j (t) I + t(ei, j − e− j,−i ), xi,− j (t) I + t(ei,− j − e j,−i ), x−i, j (t) I + t(e−i, j − e− j,i ), xi,0 (t) I + t(2ei,0 − e0,−i ) − t 2 ei,−i x0,i (t) I + t(−2e−i,0 + e0,i ) − t 2 e−i,i xi,0 (t) I + te0,−i + t 2 ei,−i x0,i (t) I + te0,i + t 2 e−i,i i 6= j i< j i< j 1≤i≤l 1≤i≤l 1≤i≤l 1≤i≤l Elementary matrices for the odd-orthogonal group in even characteristics differs from that of odd characteristics. In above table we made that distinction and listed them separately in different rows according to the characteristics of k. If char(k) even, we can construct the elements wi , which interchanges the ith row with −ith row as follows wi = (I + e0,i + e−i,i )(I + e0,−i + ei,−i )(I + e0,i + e−i,i ) = I + ei,i + e−i,−i + ei,−i + e−i,i . Otherwise, we can construct wi , which interchanges the ith row with −ith with a sign change in ith , −ith and 0th row in odd-orthogonal group as follows: wi = x0,i (−1)xi,0 (1)x0,i (−1) = I − 2e0,0 − ei,i − e−i,−i − ei,−i − e−i,i . The Gaussian elimination algorithm for O(2l + 1, k) follows the earlier algorithm for symplectic and evenorthogonal group closely, except that we need to take care of the zero row and the zero column. We write α X Y an element g ∈ O(2l + 1, k) as g = E A B  where A, B,C & D are l × l matrices, X and Y are 1 × l F C D 8   2 0 0 matrices, E and F are l × 1 matrices, α ∈ k and β = 0 0 Il . Then from the condition Tgβ g = β we 0 Il 0 get the following equations. 2TXX + TAC + TCA = 0 2α TX + TAF + TCE = 0 2αY + TED + TFB = 0 2TXY + TAD + TCB = Il (5.2) (5.3) (5.4) (5.5) Let us note the effect of multiplying g by elementary matrices. TABLE 6. The row-column operations for O(2l + 1, k) ER1 (both) ER2 (both) ER3 (both) ER4 (odd) ER5 (odd) ER6 (even) ER7 (even) wi (odd) Row operations 7→ ith + t jth row and − jth 7→ − jth − t(−i)th row ith 7→ ith + t(− j)th row and jth 7→ jth − t(−i)th row −ith 7→ −ith − t jth row and − jth 7→ − jth + tith row 0th 7→ 0th − t(−i)th row and ith 7→ ith + 2t0th − t 2 (−i)th row 0th 7→ 0th + tith row and th (−i) 7→ (−i)th − 2t0th − t 2 ith row 0th 7→ 0th + t(−i)th row and ith 7→ ith + t 2 (−i)th row 0th 7→ 0th + tith row and (−i)th 7→ (−i)th + t 2 ith row Interchange ith and (−i)th rows with a sign change in ith , −ith and 0th rows ith EC1 (both) EC2 (both) EC3 (both) EC4 (odd) EC5 (odd) EC6 Column operations 7→ jth + tith column and −ith 7→ −ith − t(− j)th column −ith 7→ −ith − t jth column and − jth 7→ − jth + tith column jth 7→ jth + t(−i)th column and ith 7→ ith − t(− j)th column 0th 7→ 0th + 2tith column and (−i)th 7→ (−i)th − t0th − t 2 ith column 0th 7→ 0th − 2t(−i)th column and ith 7→ ith + t0th − t 2 (−i)th column (−i)th 7→ (−i)th + t0th + t 2 ith column jth (even) EC7 ith 7→ ith + t0th + t 2 (−i)th column (even) wi (odd) wi Interchange ith and (−i)th column with a sign change in ith , −ith and 0th columns wi (even) Interchange ith and (−i)th row (even) Interchange ith and (−i)th column 5.5. Gaussian elimination for O(2l + 1, k). Step 1: Use ER1 and EC1 to make A into a diagonal matrix but in the process it changes other matrices A, B,C, D, E, F, X, and Y . For the sake of notational convenience, we keep calling these changed matrices as A, B,C, D, E, F, X, and Y as well. Step 2: Now there will be two cases depending on the rank r of matrix A. The rank of A can be easily determined using the number of non-zero diagonal entries. Use ER3 and non-zero diagonal entries of A to make corresponding r rows of C zero. (1) If r = l then C becomes zero matrix. (2) If r < l then interchange all zero rows of A with corresponding rows of C using wi so that the new C becomes a zero matrix. Once C becomes zero, note that Relation 5.2 if char(k) is odd or Relation Q(g(v)) = Q(v) if char(k) is even guarantees that X becomes zero. Relation 5.5 guarantees that A has full rank l which also 9 makes D a diagonal with full rank l. Thus Relation 5.3 shows that F becomes zero as well. Then   1 0 ··· 0 0 1 · · · 0   use Step 1 to reduce A =   ... ... . . . ... . 0 0 ··· λ Step 3: Now if char(k) is even then Relation 5.4 guarantees that E becomes zero as well. If char(k) is odd then use ER4 to make E a zero matrix. Step 4: Use ER2 to make B a zero matrix. For char(k) even the relation Q(g(v)) = Q(v) guarantees that Y is a zero matrix and for char(k) odd Relation 5.4 implies that Y becomes zero.   ±1 0 0 Thus the matrix g reduces to  0 A 0 , where A = diag(1, · · · , 1, λ ) and D = diag(1, · · · , 1, λ −1 ). 0 0 D Proof of Corollary C. Let k be a perfect filed of characteristics 2. Note that we can write the diagonal matrix diag(1, · · · , 1, λ , 1, · · · , 1, λ −1 ) as a product of elementary matrices as follows: diag(1, · · · , 1, λ , 1, · · · , 1, λ −1 ) = xl,−l (t)x−l,l (−t −1 )xl,−l (t), where t2 = λ . • and hence we can reduce the matrix g to identity. 5.6. Elementary matrices (Chevalley generators) for twisted orthogonal groups O− (2l, k). In this section, we describe row-column operations for twisted Chevalley groups. Thesegroups are also known as  A0 X Y the Steinberg groups. An element g ∈ O− (2l, k) is denoted g =  E A B , where A, B,C & D are F C D (l − 1) × (l − 1) matrices, X and Y are 2 × (l − 1) matrices, E and F are (l − 1) × 2 matrices and A0 is a 2 × 2 matrix. In the Gaussian elimination algorithm that we discuss, we reduce X,Y, E&F to zero and A and D to diagonal matrices. However, unlike the previous cases we were unable to reduce A0 to an identity matrix. However, for odd characteristics we were able to reduce A0 to a two-parameter subgroup. Furthermore, our algorithm provides for the spinor norm as before. Let us go ahead and talk about the output of the algorithm.  Inthe output we will have a 2 × 2 block (also 1 0 called A0 ) which will satisfy TA0 β0 A0 = β0 , where β0 = for odd characteristics, as defined earlier. 0 ε   a b Then A0 is a orthogonal group given by the bilinear form β0 . Now if we write A0 = , then we get c d the following equation: a2 + c2 ε = 1 ab + cdε = 1 b2 + d 2 ε = ε Considering the fact that det(A0 ) = ±1, one more equation ac − bd = ±1 and this leads to two cases either a = d and b = cε or a = −d and b = −cε. Recall  that, since  ε is not a square, d 6= 0. Then if c = 0, then ±1 0 there are four choices for A0 and these are A0 = . 0 ±1 To summarize, in the output of the algorithm A0 will have either of the six forms     t −sε t sε (5.6) or where t 2 + s2 ε = 1 s t s −t   ±1 0 (5.7) or . 0 ±1 There are now two ways to describe the algorithm, one is to leave A0 as it is in the output of the algorithm and the other is to include these matrices as generators. For the purpose of uniform exposition we choose 10 the later and included the following two generators x1 (t, s) = I + (t − 1)e1,1 − (t + 1)e−1,−1 + s(e−1,1 + εe1,−1 ); t 2 + εs2 = 1 x2 = I − 2e−1,−1 in the list of elementary generatorsin Table  7. In the case of even characteristics no such reduction is t p possible and we included the matrix in the list of generators with the condition that the determinant r s is 1. The elementary matrices for O− (2l, k) depends on characteristics of k. We describe them separately in the following table. Let α be an Arf-invariant, 2 ≤ i, j ≤ l and t ∈ K, ξ ∈ k∗ . TABLE 7. Elementary matrices for O− (2l, k) char(k) both odd even Elementary matrices xi, j (t) I + t(ei, j − e− j,−i ), i 6= j xi,− j (t) I + t(ei,− j − e j,−i ), i< j x−i, j (t) I + t(e−i, j − e− j,i ), i< j wi I − ei,i − e−i,−i + ei,−i + e−i,i 2≤i≤l xi,1 (t) I + t(e1,i − 2e−i,1 ) − t 2 e−i,i 2≤i≤l 2 x1,i (t) I + t(−e1,−i + 2ei,1 ) − t ei,−i 2≤i≤l xi,−1 (t) I + t(e−1,i − 2εe−i,−1 ) − εt 2 e−i,i 2≤i≤l 2 x−1,i (t) I + t(−e−1,−i + 2εei,−1 ) − εt ei,−i 2≤i≤l 2 x1 (t, s) I + (t − 1)e1,1 − (t + 1)e−1,−1 + s(e−1,1 + εe1,−1 ), t + εs2 = 1 x2 I − 2e−1,−1 x1,−i (t) I + te1,−i + tei,−1 + αt 2 ei,−i 2≤i≤l 2 x−1,−i (t) I + te−1,−i + tei,1 + αt ei,−i 2≤i≤l xA0 I + (t − 1)e1,1 + (s − 1)e−1,−1 + pe1,−1 + re−1,1 , ts + pr = 1. Let us note the effect of multiplying g by elementary matrices. Elementary matrices for the twisted orthogonal group in even characteristics differs from that of odd characteristics so in the following table (Table 8 & 9) we made that distinction and listed them separately in different row according to the characteristics of k. TABLE 8. The row operations for O− (2l, k) ER1(both) ER2 (both) ER3(both) ER4(odd) ER5(odd) ER6(odd) ER7(odd) ER8 (even) ER9(even) wi (both) Row operations row and and − jth 7→ − jth − t(−i)th row th th i 7→ i + t(− j)th row and jth 7→ jth − t(−i)th row −ith 7→ −ith − t jth row and − jth 7→ − jth + tith row 1st 7→ 1st − t(−i)th row and ith 7→ ith + 2t1st − t 2 (−i)th row 1st 7→ 1st + tith row and (−i)th 7→ (−i)th − 2t1st − t 2 ith row (−1)th 7→ (−1)th − t(−i)th row and ith 7→ ith + 2εt(−1)th − εt 2 (−i)th row (−1)th 7→ (−1)th + tith row and (−i)th 7→ (−i)th − 2εt(−1)th − εt 2 ith row 1st 7→ 1st + t(−i)th row and ith 7→ ith + t(−1)th + αt 2 (−i)th row (−1)th 7→ (−1)th + t(−i)th row and ith 7→ ith + t1st + αt 2 (−i)th row Interchange ith and (−i)th row ith 7 ith + t jth → 11 TABLE 9. The column operations for O− (2l, k) EC1(both) EC2(both) EC3(both) EC4(odd) EC5(odd) EC6 (odd) EC7 (odd) EC8 (even) EC9(even) wi (both) Column operations 7→ column and −ith 7→ −ith − t(− j)th column th th −i 7→ −i − t jth column and − jth 7→ − jth + tith column jth 7→ jth + t(−i)th column and ith 7→ ith − t(− j)th column 1st 7→ 1st + 2tith column and (−i)th 7→ (−i)th − t1st − t 2 ith column 1st 7→ 1st − 2t(−i)th column and ith 7→ ith + t1st − t 2 (−i)th column (−1)th 7→ (−1)th + (2εt)ith column and (−i)th 7→ (−i)th − t(−1)th − εt 2 ith column (−1)th 7→ (−1)th − 2εt(−i)th column and ith 7→ ith + t(−1)th − εt 2 (−i)th column (−1)th 7→ (−1)th + tith column and (−i)th 7→ (−i)th + t1st + αt 2 ith column 1st 7→ 1st + tith column and (−i)th 7→ (−i)th + t(−1)th + αt 2 ith column Interchange ith and (−i)th column jth jth + tith Note that any isometry g satisfying the quadratic form Q also satisfy Tgβ g = β . The main reason the following algorithm works is the closed condition Tgβ g = β which gives the following relations: T (5.8) A0 β0 A0 + TFE + TEF = β0 , (5.9) T (5.10) T A0 β0 X + TFA + TEC = 0, A0 β0Y + TFB + TED = 0, (5.11) T (5.12) T Xβ0 X + TCA + TAC = 0, Xβ0Y + TCB + TAD = Il−1 . 5.7. The Gaussian elimination algorithm for O− (2l, k). Step 1: Use ER1 and EC1 to make A into a diagonal matrix but in the process it changes other matrices A0 , A, B,C, D, E, F, X, and Y . For sake of notational convenience, we keep calling these changed matrices as A0 , A, B,C, D, E, F, X, and Y as well. Step 2: Now there will be two cases depending on the rank r of the matrix A. The rank of A can be easily determined by the number of non-zero diagonal entries. Step 3: Use ER3 and non-zero diagonal entries of A to make corresponding r rows of C zero. If r = l − 1 then C becomes zero matrix. If r < l − 1 then interchange all zero rows of A with corresponding rows of C using wi so that the new C becomes a zero matrix. Once C becomes zero one can note that the relation TXβ0 X + TCA + TAC = 0 if char(k) is odd or the relation Q(g(v)) = Q(v) and the fact that αt 2 + t + α is irreducible when char(k) is even guarantees that X becomes zero (see Lemma 5.7). Then the relation TA0 β0 X + TFA + TEC = 0 shows that F becomes zero as well and the relation TXβ0Y + TCB + TAD = Il−1 guarantees that A has full rank l − 1 which also makes D a diagonal with full rank l − 1. Now we diagonalize A again to the form   1 0 ··· 0 0 1 · · · 0  . . .   .. .. . . ...  as in Step 1. 0 0 ··· λ Step 4: Use EC4 and EC6 when char(k) is odd or use EC8 and EC9 when char(k) is even to make E zero. Note that the relation TA0 β0 A0 + TFE + TEF = β0 shows that A0 is invertible. Thus the relation T A β Y + T FB + T ED = 0 guarantees that Y becomes zero. 0 0 12  A0 0 0 Step 5: Use ER2 to make B a zero matrix. Thus the matrix g reduces to: g =  0 A 0 , where 0 0 D −1 A = diag(1, 1, · · · , 1, λ ) and D = diag(1, 1, · · · , 1, λ ). Now if char(k) is odd then go to step 6 otherwise go to step 7.   t −εs T Step 6: Using the relation A0 β0 A0 = β0 it is easy to check that A0 has the form or s t   t εs . If the determinant of A0 is −1, multiply g by x2 to get new g of the above form such that s −t   I2 0 0 A0 has determinant 1. Now using the elementary matrix x1 (t, s) we can reduce g to  0 A 0 , 0 0 D where A and D are as above.   I2 0 0 Step 7: Using elementary matrix xA0 we can reduce g to  0 A 0 , where A = diag(1, 1, · · · , 1, λ ) 0 0 D −1 and D = diag(1, 1, · · · , 1, λ ).   A0 X Y Lemma 5.5. Let k be a field of characteristics 2 and let g =  E A B , where A = diag(1, 1, · · · , 1, λ ), F 0 D − be an element of O (2l, k) then X = 0.  Proof. Let {e1 , e−1 , e2 , · · · , el , e−2 , · · · , e−l } be the standard basis of the vector space V . Recall that for a column vector x = (x1 , x−1 , x2 , · · · , xl , x−2 , · · · , x−l )t the action of the quadratic form Q is given by Q(x) = 2 )+x x 2 α(x12 + x−1 over k[t]. By definition, for any g ∈ 1 −1 + . . . + xl x−l , where αt + t + α is irreducible   x · · · x 11 1(l−1) − O (2l, k) we have Q(g(x)) = Q(x) for all x ∈ V . Let X = be a 2 × (l − 1) matrix. Comx21 · · · x2(l−1) 2 + x2 ) + x x = 0. If x = 0 then we puting Q(g(ei )) = Q(ei ) for all 2 ≤ i ≤ l, we can see that α(x1i 1i 2i 2i 2i can see that x1i = 0. Suppose x2i 6= 0 for some i then we rewrite the equation by dividing it by x2i as α( xx1i2i )2 + xx2i1i + α = 0, which is a contradiction to the fact that αt 2 + t + α is irreducible over k[t]. Thus, x2i = 0 for all 2 ≤ i ≤ l and hence X = 0. • 5.8. Time-complexity of the above algorithm. We establish that the worst case time-complexity of the above algorithm is O(l 3 ). We mostly count the number of field multiplications. Step 1 We make A a diagonal matrix by row-column operations. That has complexity O(l 3 ). Step 2 In making both C and B zero-matrix we multiply two rows by a field element and additions. In the worst case, it has to be done O(l) times and done O(l 2 ) many times. So the complexity is O(l 3 ). Step 3 In odd-orthogonal group and twisted orthogonal group we clear X,Y, E, F, this clearly has complexity O(l 2 ) Step 4 has only a few steps that is independent of l. Then clearly, the time-complexity of our algorithm is O(l 3 ). 6. C OMPUTING SPINOR NORM FOR ORTHOGONAL GROUPS In this section, we show how we can use our Gaussian elimination algorithm to compute the spinor norm for orthogonal groups. Throughout this section we assume that the field k is of odd characteristics. The classical way to define spinor norm is via Clifford algebras [10, Chapters 8 & 9]. Spinor norm is a group 2 homomorphism Θ : O(d, k) → k× /k× , restriction of which to SO(d, k) gives Ω(d, k) as kernel. However, in practice, it is difficult to use that definition to compute the spinor norm. Wall [18], Zassenhaus [19] and Hahn [11] developed a theory to compute the spinor norm. For our exposition, we follow [17, Chapter 11]. 13 Let g be an element of the orthogonal group. Let g̃ = I − g and Vg = g̃(V ) and V g = ker(g̃). Using β we define Wall’s bilinear form [ , ]g on Vg as follows: [u, v]g = β (u, y), where, v = g̃(y). This bilinear form satisfies following properties: (1) [u, v]g + [v, u]g = β (u, v) and [u, u]g = Q(u) for all u, v ∈ Vg . (2) g is an isometry on Vg with respect to [ , ]g . (3) [v, u]g = −[u, gv] for all u, v ∈ Vg . (4) [ , ]g is non-degenerate. Then the spinor norm is Θ(g) = disc(Vg , [ , ]g ) if g 6= I extended to I by defining Θ(I) = 1. An element g is called regular if Vg is non-degenerate subspace of V with respect to the form β . Hahn [11, Proposition 2.1] proved that for a regular element g the spinor norm is Θ(g) = det(g̃|Vg )disc(Vg ). This gives, Proposition 6.1. (1) For a reflection ρv , Θ(ρv ) = Q(v). (2) Θ(−1) = disc(V, β ). (3) For a unipotent element g the spinor norm is trivial, i.e., Θ(g) = 1. Murray and Roney-Dougal [15] used the formula of Hahn to compute spinor norm. However, we show (Corollary B) that the Gaussian elimination algorithm we developed in Section 5 ouptuts the spinor norm. We compute the spinor norm for elements in twisted orthogonal group separately. First we observe the following: Lemma 6.2. For the group O+ (d, k), d ≥ 4, (1) Θ(xi, j (t)) = Θ(x−i, j (t)) = Θ(xi,− j (t)) = 1. Furthermore, in odd case we also have Θ(xi,0 (t)) = 1 = Θ(x0,i (t)). (2) Θ(wl ) = 1. (3) Θ(diag(1, . . . , 1, λ , 1, . . . , 1, λ −1 )) = λ . Proof. We use Proposition 6.1. The first claim follows from the fact that all elementary matrices are unipotent. The element wl = ρ(el +e−l ) is a reflection thus Θ(wl ) = Q(el + e−l ) = 1. For the third part we note that diag(1, . . . , 1, λ , 1, . . . , 1, λ −1 ) = ρ(el +e−l ) ρ(el +λ e−l ) and hence the spinor • norm Θ(diag(1, . . . , 1, λ , 1, . . . , 1, λ −1 )) = Θ(ρ(el +λ e−l ) ) = Q(el + λ e−l ) = λ . Lemma 6.3. The spinor norm of elementary matrices in O− (d, K) are: (1) Θ(xi, j (t)) = Θ(x−i, j (t)) = Θ(xi,− j (t)) = 1̄. (2) Θ(wi ) = 1̄. (3) Θ(diag(1, 1, 1, ..., 1, λ , 1, ..., 1, λ −1 )) = λ̄ , Θ(diag(1, −1, 1, ..., 1, λ , 1, ..., 1, λ −1 )) = ελ , Θ(diag(−1, 1, 1, ..., 1, λ , 1, ..., 1, λ −1 )) = λ̄ , Θ(diag(−1, −1, 1, ..., 1, λ , 1, ..., 1, λ −1 )) = ελ . (4) Θ(x1 (t, s)) = 2(1 − t) whenever t 6= 1. (5) Θ(x2 ) = ε Proof: The first one follows from previous proposition as all elementary matrices are unipotent. The element wi = ρei +e−i is a reflection thus Θ(wi ) = Q(ei + e−i ) = 1̄. For the third part we note that diag(1, 1, 1, ..., 1, λ , 1, ..., 1, λ −1 ) = ρel +e−l ρel +λ e−l and hence, Θ(diag(1, 1, 1, ..., 1, λ , 1, ..., 1, λ −1 )) = Θ(ρel +e−l )Θ(ρel +λ e−l ) Θ(diag(1, 1, 1, ..., 1, λ , 1, ..., 1, λ −1 )) = Q(el + λ e−l ) Θ(diag(1, 1, 1, ..., 1, λ , 1, ..., 1, λ −1 )) = λ̄ . 14 Observe that diag(1, −1, 1, ..., 1, λ , 1, ..., 1, λ −1 ) = diag(1, −1, 1, ..., 1, λ , 1, ..., 1, λ −1 )ρe−1 diag(−1, 1, 1, ..., 1, λ , 1, ..., 1, λ −1 ) = diag(1, −1, 1, ..., 1, λ , 1, ..., 1, λ −1 )ρe1 implies that Θ(diag(1, −1, 1, ..., 1, λ , 1, ..., 1, λ −1 )) = ελ , Θ(diag(−1, 1, 1, ..., 1, λ , 1, ..., 1, λ −1 )) = λ . Similarly we can see that diag(−1, −1, 1, ..., 1, λ , 1, ..., 1, λ −1 )) = diag(1, −1, 1, ..., 1, λ , 1, ..., 1, λ −1 )ρe1 implies that Θ(diag(−1, −1, 1, ..., 1, λ , 1, ..., 1, λ −1 )) = ελ . For the fourth part we observe that x1 (t, s) = ρ(t−1)e1 +se−1 and hence Θ(x1 (t, s)) = Q(ρ(t−1)e1 +se−1 ) = (t − 1)2 + εs2 = 2(1 − t) as t 2 + εs2 = 1. Note that x2 = ρe−1 and Θ(ρe−1 ) = ε̄ implies that Θ(x2 ) = ε. Proof of Corollary B. Let g ∈ O+ (d, k). From Theorem A, we write g as a product of elementary matrices and a diagonal matrix diag(1, . . . , 1, λ , 1, . . . , 1, λ −1 ) and hence we can find the spinor norm of g. • 6.1. Computing the spinor norm inO− (d, k). Before moving to Step 6 of the algorithm, look 0 . If  at A t −sε 1 0 det(A0 ) = 1, it is of the form where s 6= 0. Furthermore, if s = 0 then it is of the form or s t 0 1   −1 0 the spinor norm then can be computed from the lemma above. If the determinant is −1, then A0 0 −1 is x2 times one of the previous matrices. So the spinor norm can be computed because it is multiplicative. 7. D OUBLE COSET DECOMPOSITION FOR S IEGEL MAXIMAL PARABOLIC In this section, we compute the double coset decomposition with respect to Siegel maximal parabolic subgroup using our algorithm. Let P be the Siegel maximal parabolic of G where G is either split orthogonal group O(d, k) or Sp(2l, k), where char(k) is odd. In Lie theory, a parabolic is obtained by fixing a subset of simple roots [4, Section 8.3]. Siegel maximal parabolic corresponds to the subset consisting of all but the last simple root. Geometrically, a parabolic subgroup is obtained as fixed subgroup of a totally isotropic flag [14, Proposition 12.13]. The Siegel maximal parabolic is the fixed subgroup of following isotropic flag (with the basis in Section 4): {0} ⊂ {e1 , . . . , el } ⊂ V.     α 0 Y A B Thus P is of the form E A B  in O(2l + 1, k) and in Sp(2l, k) and O(2l, k). 0 D F 0 D F The problem is to get the double coset decomposition P\G/P. That is, we want to write G = PωP as b ω∈W b is a finite subset of G. Equivalently, given g ∈ G we need an algorithm to determine disjoint union where W b the unique ω ∈ W such that g ∈ PωP. If G is connected with Weyl group W and suppose WP is the Weyl group corresponding to P then [5, Proposition 2.8.1] P\G/P ←→ WP \W /WP . b as follows: We need a slight variation of this as the orthogonal group is not connected. We define W b = {ω0 = I, ωi = w1 · · · wi | 1 ≤ i ≤ l} W 15 where wi were defined earlier for each class of groups. Theorem 7.1. Let P be the Siegel maximal parabolic subgroup in G, where G is either O(d, k) or Sp(d, k). b the set Let g ∈ G. Then there is an efficient algorithm to determine ω such that g ∈ PωP. Furthermore, W of all ω is a finite set of l + 1 elements where d = 2l or 2l + 1. Proof. In this proof we proceed with a similar but slightly different Gaussian elimination algorithm. Recall     α X Y A B whenever g belongs to Sp(2l, k) or O(2l, k) or g = E A B whenever g belongs to that g = C D F C D O(2l + 1, k). In our algorithm, we made A into a diagonal matrix. Instead of that, we can use elementary matrices ER1 and EC1 to make C into a diagonal matrix and then do the row interchange to make A into a diagonal matrix and C a zero matrix. If we do that, we note that elementary matrices E1 and E2 are in P. The proof is just keeping track of elements of P in this Gaussian elimination   algorithm. The step 1 in the A B algorithm says that there are elements p1 , p2 ∈ P such that p1 gp2 = C1 D1 where C1 is a diagonal matrix 1 1 with m non-zero entries. Clearly m = 0 if and only if g ∈ P. In that case g is in the double coset Pω0 P = P. Now suppose m ≥ 1. Then inStep 2 we  multiply by E2 to make the first m rows of A1 zero, i.e., there is a à B̃ 1 where first m rows of Ã1 are zero. After this we interchange rows i p3 ∈ P such that p3 p1 gp2 = 1 C1 D1   B2 ∈ P. with −i for 1 ≤ i ≤ m which makes C1 zero, i.e., multiplying by ωm we get ωm p3 p1 gp2 = A02 D 2 Thus g ∈ Pωm P. For O(2l + 1, k) we note that the elementary matrices E1, E2 and E4a are in P. Rest of the proof is similar to the earlier case and follows by carefully keeping track of elementary matrices used in our algorithm in Section 5. • 8. C ONCLUSIONS Now some implementation results, we implemented our algorithm in magma [2]. We found our implementation to be fast and stable. In magma, Costi and C. Schneider installed a function ClassicalRewriteNatural. It is the row-column operation developed by Costi [8] in natural representation. We tested the time taken by our algorithm and the one taken by the Magma function. To do this test, we followed Costi [8, Table 6.1] as closely as possible. Two kind of simulations were done. In one case, we fixed the size of the field at 710 and varied the size of the matrix from 20 to 60. To time both these algorithms for any particular input, we took one thousand random samples from the group and run the algorithm for each one of them. Then the final time was the average of this one thousand random repetitions. The times were tabulated and presented below. In the other case, we kept the size of the matrix fixed at 20 and we varied the size of the field, keeping the characteristic fixed at 7. In many cases the magma computation for the function ClassicalRewriteNatural will not stop in a reasonable amount of time or will give an error and not finish computing. In those cases, though our algorithm worked perfectly, we were unable to get adequate data to plot and are represented by gaps in the graph drawn. Here also the times are the average of one thousand random repetitions. It seems F IGURE 1. Some simulations comparing our algorithm with the one inbuilt in Magma for even-order orthogonal groups that our algorithms perform better than that of Costi’s on all fronts. 16 F IGURE 2. Some simulations comparing our algorithm with the one inbuilt in Magma for symplectic groups R EFERENCES 1. J.L. Alperin and Rowen B. Bell, Groups and representations, Springer, 1995. 2. Wieb Bosma, John Cannon, and Catherine Playoust, The Magma algebra system. I. The user language, J. Symbolic Comput. 24 (1997), no. 3-4, 235–265, Computational algebra and number theory (London, 1993). 3. Peter Brooksbank, Constructive recognition of classical groups in their natural representation, Journal of Symbolic Computation 35 (2003), 195–239. 4. Roger Carter, Simple groups of Lie type, Pure and Applied Mathematics, vol. 28, John Wiley & Sons, 1972. , Finite groups of Lie type, John Wiley & Sons, 1993. 5. 6. C. Chevalley, Sur certains groupes simples, Tohoku Math. J. 7 (1955), no. 2, 14–66. 7. Arjeh M. Cohen, Scott H. Murray, and D. E. Taylor, Computing in groups of Lie type, Mathematics of computation 73 (2003), no. 247, 1477–1498. 8. Elliot Costi, Constructive membership testing in classical groups, Ph.D. thesis, Queen Mary, Univ. of London, 2009. 9. Joseph F. Grcar, Mathematicians of Gaussian elimination, Notices of the AMS 58 (2011), no. 6, 782–792. 10. Larry C. Grove, Classical groups and geometric algebra, vol. 39, American Mathematical Society, Graduate Studies in Mathematics, 2002. 11. Alexander J. Hahn, Unipotent elements and the spinor norms of Wall and Zassenhaus, Arch. Math. (Basel) 32 (1979), no. 2, 114–122. 12. Martin Hildebrand, Generating random elements in SLn (Fq ) by random transvections, Journal of algebraic combinatorics 1 (1992), 133–150. 13. Ayan Mahalanobis and Anupam Singh, Gaussian elimination in unitary groups with an application to cryptography, Journal of Algebra Combinatorics Discrete Structures and Applications 4 (2017), no. 3, 247–260. 14. Gunter Malle and Donna Testerman, Linear algebraic groups and finite groups of lie type, Cambridge University Press, 2011. 15. Scott H. Murray and Colva M. Roney-Dougal, Constructive homomorphisms for classical groups, Journal of Symbolic Computation 46 (2011), 371–384. 16. Robert Steinberg, Lectures on Chevalley groups. notes prepared by John Faulkner and Robert Wilson, Yale University, 1968. 17. Donald E. Taylor, The geometry of the classical groups, Heldermann Verlag, 1992. 18. G. E. Wall, The structure of a unitary factor group, Inst. Hautes Études Sci. Publ. Math (1959), no. 1, 23 pp. 19. Hans Zassenhaus, On the spinor norm, Arch. Math. (1962), no. 13, 434–451. 17
4math.GR
arXiv:1606.03256v3 [math.CO] 23 Feb 2017 Combinatorial Results Implied by Many Zero Divisors in a Group Ring Fedor Petrov February 24, 2017 Abstract It has been recently proved [2, 3] that for a group G = Gn0 , where G0 6= {1, −1}m is a fixed finite Abelian group and n is large, any subset A without 3-terms progressions (triples x, y, z of different elements with xy = z 2 ) contains at most |G|1−c elements, where c > 0 is a constant depending only on G0 . This is known to be false when G is, say, large cyclic group, see current records in [7]. The aim of this note is to show that algebraic property which corresponds to this difference is the following: in the first case a group algebra F[G] contains a subspace X with low codimension such that X 3 = 0. We discuss which bounds are obtained for finite Abelian p-groups and matrix p-groups: Heisenberg group over Fp and unitriangular group over Fp . All bounds are of the form |G|1−c with some c > 0. Also we show how the method works for further generalizations by Kleinberg–Sawin–Speyer and Ellenberg. Let CN denote a cyclic group of order N in multiplicative notation. Denote κN = minx>0 x−(N −1)/3 (1 + x + · · · + xN −1 ). The number of points in {0, 1, . . . , N − 1}n with sum of coordinates at most n(N − 1)/3 grows as (cN + o(1))n for large n. In a recent paper [2] Ernie Croot, Vsevolod Lev, and Peter Pach proved by a clever combination of polynomial method (in spirit of Alon’s Combinatorial Nullstellensatz [1]), linear algebraic dimension reasoning and law of large numbers that any subset A of a group G = C4n containing more than κn4 elements, has three distinct elements a, b, c for which ab = c2 (they used another formula for the same constant κ4 = 3.61 . . . , but I prefer this unified formula, which appears also below in Theorem 4). It have been soon observed that their method, being slightly modified (and even simplified! They started from combinatorially harder, “ramified” problem), works for other groups, like Cpn for prime p [3], where we may get the same type bound κnp for 3-progression-free sets. It also works for other combinatorial problems of the same spirit, like Sunflower problems of Erdös–Szemeredi and Erdös – Rado [4]. Robert Kleinberg, Will Sawin and David Speyer [9] observed that [3] actually contains the bound for tri-colored sum-free sets (see the definition below). Important feature of this generalization is that the constant κp in this question is proved to be sharp (the proof was finished independently by Sergey Norin and 1 Luce Pebody [10, 11]). Next, Jordan Ellenberg proposed further generalization proving that the sumset of any two sets may be covered by sumsets of small subsets. It is natural that polynomial method works well for the groups which are contained either in additive or multiplicative group of a field. For more general groups sometimes it may be successfully replaced by considering generating functions in group rings, historically this approach appeared even earlier than Combinatorial Nullstellensatz: John E. Olson [6] used it for computing Davenport constant of finite Abelian p-groups. 1 Example: Cauchy–Davenport Theorem For illustrating a parallelism between Combinatorial Nullstellensatz method and group rings method, we give two proofs of the Cauchy–Davenport theorem, which is convenient to formulate as follows: If A, B, C are non-empty subsets of a cyclic group G = Cp of prime order p and |A| + |B| + |C| = p + 2, then ABC := {abc|a ∈ A, b ∈ B, c ∈ C} = G. 1) Polynomial proof (see [1], where this proof is expressed bit differently). We identify Cp with an additive group of Fp . Assume that some element h does not belong to A+B +C. Then a polynomial ϕh (x, y, z) = (x + y + z − h)p−1 − 1 takes zero values on A × B × C. Let u, v, w be Fp -valued functions on A, B, C to be specified later. Consider the following sum X u(x)v(y)h(z)ϕh (x, y, z) = 0. x∈A,y∈B,z∈C Now change order of summation: sum up by monomials of ϕh (x, y, z). For each monomial xα y β z γ we have X X X X u(x)v(y)h(z)xα y β z γ = u(x)xα · v(y)y β · w(z)z γ . (1) x∈A,y∈B,z∈C x∈A y∈B z∈C Now we are ready to say what we require from functions u, v, w. Assume that ( X 0, if α 6 |A| − 2 u(x)xα = 1, if α = |A| − 1, x∈A analogous conditions for β and γ. Such functions do exist: linear systems to their values have Vandermonde matrices, thus non-degenerated. Then for any monomial xα y β z γ in ϕh either α = |A| − 1, β = |B| − 1, γ = |C| − 1 or there is zero multiple in right hand side (p−1)! of (1). But ϕh has this monomial with non-zero coefficient (|A|−1)!(|B|−1)!(|C|−1)! . Thus total sum is not equal to 0, a contradiction. 2) Group ring proof. Now we use a multiplicative notation for G = Cp , fix a generator g0 in Cp and denote τ = g0 − 1, we have τ p = 0. The ring Fp [G] is filtrated by the powers of its augmentation ideal Aug (G) = τ · Fp [G]. uct Let u, v, w be Fp -valued functions on A, B, C respectively. Consider the following prod! ! ! X X X u(a)a v(b)b w(c)c a∈A b∈B c∈C in Fp [G]. Our goal is to find functions u, v, w so that this product has all non-zero coefficients, this clearly implies ABC = G. Assume that the first multiple, being expressed in powers of τ , has coefficient 1 of τ |A|−1 and coefficients 0 of τ i for i = 0, . . . , |A| − 2. Analogous conditions are imposed on two other multiples. Then our product equals τ p−1 = p−1 X (−1)i g0p−1−i , i=0 all coefficients are non-zero as desired. It remains to understand why we may choose function, say, u satisfying these conditions. Some conceptual argument should exist, but in any case we may denote A = {(τ + 1)α1 , . . . , (τ + 1)α|A| }, where 0 6 α1 < · · · < α|A| 6 p −1, then finding appropriate coefficients u(a) is solving a linear system. A matrix of this system  αi has entries j , 1 6 i 6 |A|, 0 6 j 6 |A| − 1. It is non-degenerated as a generalized Vandermonde type matrix. These two proofs look like the same thing said on different languages. But if we change the problem a bit, say, consider restricted product sets {abc|a ∈ A, b ∈ B, c ∈ C, a 6= b} (Erdös–Heilbronn problem), then the first proof generalizes easily (we should replace polynomial to (x − y)((x + y + z − h)p−1 − 1)). And what about the second? On the other hand, what are “polynomial” analogues of group rings proofs for groups not embeddable  to fields? In some important cases the modular properties of binomial polynomials nx do work (see [13]), but what in general? This parallelism is still unclear for me. Now we explain a group ring version of Croot–Lev–Pach ideas. For making the exposition self-contained and comparing two technologies easier for a reader we also include the polynomial proof for the bounds in the groups Fnp . 2 Linear algebraic lemma and polynomial approach We start with a simple linear algebraic Lemma 1. Let F be a field, A be a finite set of size |A| = d. Denote by FA the ddimensional space of functions f : A → F. Let X1 , . . . .Xk be linear subspaces of FA . Denote by ti = codim Xi = d − dim Xi their codimensions. Consider the space Y ⊂ FA spanned by functions of the form f1 . . . fk , fi ∈ Xi . Then 1) codim Y 6 t1 + . . . tk ; 2) if X1 = · · · = Xk , then codim Y 6 t1 ; 3) in general,P if Z1 , . . . , Zr are the all pairwise distinct subspaces in the family {X1 , . . . , Xk }, then codim Y 6 ri=1 codim Zi ; P 4) further, in notations of p.3), if a∈A f (a) = 0 for all f ∈ Y , then we have (P codim Zi , if r > 2 d6 2t1 , if r = 1. Proof. (Idea of this proof is suggested by the answer given by Ilya Bogdanov on a similar question on Mathoverflow [5]). By Gauss elimination process we may find a basis {v1 , . . . , vd−t1 } of the space X1 and elements p1 , . . . , pd−t1 in A so that vi (pj ) = δi,j is Kronecker delta. The claim 2) already k follows: functions v1k , . . . , vd−t are linearly independent. 1 +1 Take f1 = v1 + · · · + vd−t1 . For a linear operator L: v → f1 v on FA we have dim L(X2 ) = dim X2 − dim Ker L|X2 > dim X2 − dim Ker L > d − t2 − t1 , this proves claim 1) for k = 2. General k case follows by straightforward induction. Claim 3) directly follows from the claims 1) and 2). Now we prove Claim 4). Without loss of generality X1 = . . . Xℓ and Xj 6= X1 for j > ℓ. Denote ℓ̃ = min(k − 1, ℓ). Then by Claim 2) the functions of the form f1 . . . fℓ̃ span a subspace of codimension at most t1 and by PClaim 3) the functions of the form fℓ̃+1 . . . fk span a subspace of codimension at most codim Zi − δ · t1 , where δ = 1 if r < k and A δ = 0 if r = k. These two subspaces of F are mutually orthogonal with respect to a usual P bilinear form hf, gi = a∈A f (a)g(a), thus sum of their codimensions is at least d. Before formulating the group rings approach we present the polynomial argument which allows to get exponential bounds for progression-free subsets in the additive group of Fnp for odd prime power p. It is essentially the same as Ellenberg–Gijswijt proof [3] and is based on the ideas of Croot–Lev–Pach [2]. n n Let TP ti ∈ Lnp \ Ti 1 , . . . , Tk be subsets of Lp := {0, 1, . . . , p − 1} such that whenever P we have ti ∈ / Lnp , i.e., there exists a coordinate j P ∈ {1, . . . , n} such that i tij > p. A natural example is provided by Ti = {(x1 , . . . , xn ) : xi 6 (p − 1)n/k}. Now assume that A ⊂ Fnp is a subset such that if n1P g1 + · · · + nk gk = 0 for gi ∈ A, then g1 = · · · = gk , where ni are integers coprime to p and ni = 0. Consider the subspaces X1 , . . . , Xk of FA (the space of functions on A): Xi = {f : p P Q λi λ λ ai for a = (a1 , . . . , an ), a∈A f (a)a = 0} for all λ ∈ Ti . Here we naturally denote a = λ = (λ1 , . . . , λn ). Clearly codim Xi 6 |Ti |. Assume that fi ∈ Xi . Let F (x1 , x2 , . . . , xk ) be any polynomial of kn variables (xi has n coordinates xi1 , . . . , xin ) such that total degree of F in variables x1j , x2j , . . . , xkj does not exceed p − 1 for all j = 1, . . . , n. Then X f1 (a1 ) . . . fk (ak )F (a1 , . . . , ak ) = 0 ai ∈A Q whenever fi ∈ Xi . This is clear for any monomial aλi i of F : the sum factorizes and there exists a zero factor , since λj ∈ Tj for some j: this is exactly what we require from Ti ’s and F . Apply this to the polynomial F (x1 , . . . , xk ) = n Y 1−( k X ! ni xij )p−1 . i=1 j=1 We get 0= X f1 (a1 ) . . . fk (ak )F (a1 , . . . , ak ) = ai ∈A X f1 (a) . . . fk (a), a∈A theP last identity follows from the assumption that P A does not contain non-trivial solutions of ni ai = 0. Now Lemma implies that |A| 6 ti , and even better estimates hold if some Ti ’s coincide. In P particular, for k = 3 and arithmetic progressions taking T1 = T2 = T3 = {(x1 , . . . , xn ) : xi 6 (p − 1)n/3} we get |A| 6 2|T1 |. 3 Group rings approach Now let G be a finite group (not Pnecessary Abelian), n1 , . . . , nk (where k > 2) be non-zero integers which sum up to 0 = ni . Assume that all ni are coprime to |G|. Let a subset A ⊂ G be so that the equation g1n1 . . . gknk = 1, gi ∈ A, holds only for g1 = · · · = gk . Arithmetic progressions of length 3 correspond to the case k = 3, n1 = n2 = 1, n3 = −2. It is probably more natural to call a solution of g1 g2−1g3 g2−1 = 1 “an arithmetic progression” in non-Abelian setting, but, alas, I do not know how to modify the argument for such equations. Assume that for some field F we managed to find subspaces X1 , . . . , Xk of a group algebra F[G] satisfying X1 . . . Xk = 0, i.e., u1 . . . uk = 0 for ui ∈ Xi . Denote ti = codim Xi . General fact is the following Theorem 1. Call two indices i, j ∈ {1, . . . , k} equivalent if Xi = Xj and ni = nj . If I is a maximal system of mutually non-equivalent indices, then (P if |I| ≥ 2 i∈I ti |A| 6 2t1 if |I| = 1. P In particular, we always have |A| 6 ti . Proof. For g ∈ G, u ∈ F[G], let [g]u denote a coefficient of g in u. Denote Ar = {ar , a ∈ A} for r = 1, 2, . . . . Then |Ar | = |A| if r and |G| are coprime. Let further Wi denote the span of Ani in F[G], we have dim Wi = |A|. Finally denote Li = Xi ∩ Wi , we have dim Xi + dim Wi − |G| = |A| − ti . Consider functions f1 , . . . , fk on A such that P Li > dim ni f (a)a ∈ Li . Then a∈A i ! ! ! X X X X fk (a)ank = 0, f1 (a) . . . fk (a) = [1] f2 (a)an2 · . . . · f1 (a)an1 · a∈A a∈A a∈A a∈A first equality follows from our assumption on A. It remains to use Claim 4 of Lemma. Remark. If k = 2, then even A = G satisfies the condition of the Theorem. So, what we actually get in this case is that if X1 X2 = 0 for two subspaces of F[G], then codim X1 + codim X2 > |G| (that is, the result is about group rings, not about combinatorics). But already for 3 multiples for some groups there exist subspaces X1 , X2 , X3 of low codimension (low means o(|G|) or sometimes even O(|G|c), c < 1) such that X1 X2 X3 = 0. 4 Kleinberg–Sawin–Speyer refinement The set A ⊂ G without arithmetic progressions of length 3 produces a set of triples {(xa , ya , za ) := (a, a, a−2 ), a ∈ A} ⊂ G3 such that xa yb zc = 1 if and only if a = b = c. Following [9] we call such a set of ordered triples a “tri-colored product-free sets”. Analogously we may defined k-colored product-free sets of k-tuples. Note that the above proof for the sets without arithmetic progressions allows to show the following Theorem 2. Assume that the subspaces X1 , X2 , . . . , Xk of a group P algebra F[G] satisfy X1 . . . Xk = 0. A k-colored product free sets may contain at most ti k-tuples, where ti = codim Xi . We remark that for k = 3 we get the estimate 3codim X (where X 3 = 0, X ⊂ F[G]), for the tri-colored product-free sets, but 2codim X for the sets without non-trivial solutions of xy = z 2 (provided that |G| is odd.) This improvement comes from the coincidence of two spaces of functions in the latter case. What is remarkable is that the estimate we get on this way for tri-colored sum-free subsets of Fnp is asymptotically tight (in logarithmic scale), this follows from the results of [9] and [10, 11]. It would be nice to get the tightness for other groups. Let me formulate it as a conjecture: Conjecture. Consider all k-tuples of subspaces X1 , . . . , Xk of F[G] such that X1 . . . Xk = 0. Take a minimal value Mk (G) of the sum of their codimensions. Here the minimum is taken over the choice of the field also. Then, for large |G|, the maximal cardinality of a k-colored product-free subset of G is Mk (G) · |G|o(1) . This may seem to strong: At first, we actually use in the proof only that [1]X1 . . . Xk = 0, not X1 . . . Xk = 0. But I do not know whether it allows to improve the bound. At second, the minimizing over F looks somehow strange. Possibly, we should start from the case of p-groups and the group rings over Fp . 5 Ellenberg’s refinement In [12] the following nice further generalization is proved: for any sets A, B in the additive group of Fnp there exist subsets A1 ⊂ B, B1 ⊂ B for which A+ B ⊂ (A1 + B) ∪(A+ B1) and |A1 | + |B1 | 6 M. Here M is the [3] and [9] bound: three times the number of monomials in n variables of degree at most n(p − 1)/3. For an arbitrary group we get the following: Theorem 3. Let G be a finite group, and X0 , X1 , . . . , Xk be linear subspaces of the group algebra F[G] such that X0 X1 · . . . · Xk = 0. Denote ti = codim Xi . Let A1 , . . . , Ak be arbitrary subsets of G. Then there exist subsets Bi ⊂ Ai , i = 1, . . . , k, and C ⊂ G such that |C| 6 t0 , |Bi | 6 ti for all i = 1, . . . , k, and A1 A2 · . . . · Ak ⊂ C ∪ B1 A2 · . . . · Ak ∪ A1 B2 · . . . · Ak ∪ . . . ∪ A1 A2 · . . . · Ak−1 Bk . Moreover, we may additionally require that Bi = Bj (1 6 i < j 6 k) whenever simultaneously Xi = Xj and Ai = Aj . Following [12] and [8] (Ellenberg uses the cited result of Roy Meshulam; we do not, but the concept of lexicographic leaders of multi-linear forms is still important for us.) Let F be a field, A be a linearly ordered finite set of size |A| = d. Denote by FA the d-dimensional space of functions f : A → F. For non-zero element z ∈ FA we define the leader ℓ(z) and the outsider out(z) as the minimal, corr. maximal, a ∈ A such that z(a) 6= 0. Lemma 2. Let W ⊂ FA be a linear subspace. Then there are exactly dim X different leaders of elements of W (and, of course, as many different outsiders). Proof. Gauss elimination. Proof of Theorem 3. Consider the linear space W of F-valued functions f on A1 × A2 × . . . × Ak such that f (a1 , . . . , ak ) = ϕ(a1 . . . ak ) for a certain function ϕ on G. We introduce arbitrary linear orderings on all Ai ’s, it produces a lexicographic ordering on A1 × . . . × Ak , hence we may define the leaders of non-zero elements of W . What we actually prove is that all but at most t0 of these leaders may be covered by the sets B1 × A2 × . . . × Ak , A1 × B2 × . . . × Bk , . . . , A1 × A2 × . . . × Ak−1 × Bk for certain subsets Bi ⊂ Ai , |Bi | 6 ti . The claim of Theorem immediately follows. P Consider the linear subspace W0 ⊂ W defined by the condition that ϕ(g)g −1 ∈ X0 . The codimension of W0 in W does not exceed t0 , thus by Lemma 2 all but at most t0 leaders of the elements of W are the leaders of the elements of W0 . By Lemma 2 for all i = 1, . . . , k there exist subsets Bi ⊂ Ai , |Bi | 6 ti such that the outsiders of the different functions from FAi ∩ Xi take all the possible values from Ai \ Bi (here FAi is a subspace of F[G] spanned by the elements of Ai ⊂ G ⊂ F[G].) We prove that for this choice of the subsets Bi the sets B1 ×A2 ×. . .×Ak , A1 ×B2 ×. . .×Bk , . . . , A1 ×A2 ×. . .×Ak−1 ×Bk cover the leaders of all the elements of W0 . Assume the contrary. Then there exists a non-zero P element of W0 defined by a function ϕ, ϕ(g)g −1 ∈ X0 , such that the leader (c1 , . . . , ck ) of a function ϕ(a1 . . . ak ) on A1 × . . . × Ak satisfies ci ∈ / Bi for all i = 1, . . . , k. Thus there exist the elements ηi ∈ FAi ∩ Xi with outsiders out(ηi ) = ci . Look at the constant term of the product X  [1] ϕ(g)g −1 · η1 · η2 · . . . · ηk = 0. It equals X ai ∈Ai ϕ((a1 . . . ak )−1 )[a1 ]η1 [a2 ]η2 . . . [ak ]ηk , and by the lexicographic reasoning the onliest non-zero summand is ϕ((c1 . . . ck )−1 )[c1 ]η1 [c2 ]η2 . . . [ck ]ηk 6= 0, a contradiction. Note that Theorem 1 follows from Theorem 3 in many cases (for example, for 3progressions), but there are cases when the estimate of Theorem 1 is bit better (for example, if n1 = n2 , n3 = n4 , X1 = X2 , X3 = X4 we get |A| 6 t1 + t2 using Theorem 1 , but 2t1 + t2 using Theorem 3. 6 Abelian p-groups Q Let p be a prime. Let G = ni=1 CNi be a finite Abelian p-group with n generators g1 , . . . , gn , gi generates CNi , each Ni is a power of p. How to choose zero-product subspaces codimension in Fp [G]? Group algebra Q withmlow i Fp [G] is generated by the products P (1 − gi ) , where mi ∈ {0, 1, . . . , Ni − 1}. Let η1 , . . . , ηk be positive reals such that ηi = 1 (usually the choice ηi = 1/k is optimal). Fix also positive parameters λ1 , . . . , λn . Let Xi , i = 1, . . . , k, be a subspace generated by monomials for which   n X mj − ηi > 0 λj Nj − 1 j=1 Any product f1 . . . fk for fi ∈ Xi has some 1 − gj in a power strictly greater than Nj − 1, but (1 − gj )Nj = 0. In order to estimate the codimension ti of Xi we may use Chernoff bound (which is essentially tight for large n by Cramer theorem). Take η1 = · · · = ηk = 1/k, then X1 = · · · = Xk , t1 = · · · = tk := t. If ξj are random variablesP uniformly distributed in the set Nj1−1 {0, 1, . . . , Nj − 1}, then t/|G| is the probability that j λj (ξj − k1 ) 6 0. If this inequality holds, for any x ∈ (0, 1) we have P x λj ξj > x(λ1 +···+λn )/k . For N > 2 denote SN (x) := N −1 1 X j/(N −1) 1 x = Exξ , ξ uniformly distributed on {0, 1, . . . , N − 1} N j=0 N −1 Then Chebyshev inequality implies that t/|G| 6 n Y j=1 x−λj /k SNj (xλj ). Now we fix the value of x and parameters λ1 , . . . , λn so that this rewrites as t/|G| 6 n Y j=1 min x−1/k SNj (x). x∈(0,1] In particular, for k = 3, where we denoted above N · minx∈(0,1] x−1/k SN (x) = κN , we get the following Q Theorem 4. If all Ni are powers of the Q same odd prime p, then the size of a set A ⊂ CNi without 3-term progressions is at most i κNi . We have S2 (x) > S3 (x) > S4 (x) > . . . for any positive x 6= 1 (this may be proved by Karamata majorization inequality or, most likely, somehow differently), limn Sn (x) = (x − 1)/ log x. Thus the sequence aN (k) = minx∈(0,1] x−1/k SN (x) decreases with N. For example, if k = 3, it varies from a2 (3) = 0.9449 . . . to a∞ (3) = 0.8414 . . . . It means that increasing Nj makes our bound for t/|G| better. Say, for C9n we get exponentially better bounds on |A| than for 3n copies of C3n (onto which we could partition C9n in order to get some exponential bound): if k = 3, improvement is t/|G| 6 0.872n compared to t/|G| 6 0.919n . We may also rephrase the original result by Croot, Lev and Pach for G = C4 n and solutions of the equation xyz −2 = 1 with mutually different x, y, z in the same spirit (and get the same bound as they get). The difference with the situation considered above is that exponent 2 is not coprime with |G|, so A2 is in general situation much less than A, and we do not count x2 = y 2 , x 6= y, as a non-trivial solution. This is handled by a partition onto classes modulo G2 and writing such products for a, b, c in the same class, as Croot, Lev and Pach do. This does not work as easy for, say, C8 , since the kernel and image of the homomorphism g → g 2 no longer coincide. I suppose that Theorem 4 should hold also for general 2-groups. Another proofs for Abelian p-groups are proposed by Will Sawin and Eric Naslund (they use divisibility of binomial coefficients) and by David Speyer (Witt vectors), see the explanation in [13]. 7 Matrix groups Heisenberg group G = Hn−1 (Fp ) of order p2n−1 consists of (n + 1) × (n + 1) matrices (aij )06i,j6n over Fp satisfying conditions aii = 1; aij = 0 unless i = j or i = 0 or j = n:   1 a01 . . . . . . a0n a0n 0 1 0 0 . . . a1n    0 0 1 0 . . . a2n  .   .. .. .. . . . . ..  . . . . . .  0 0 0 ....... 1 It is generated by the elements g1 , . . . , gn−1 , h1 , . . . , hn−1 , s where gi = id+e0,i , hi = id+ei,n , s = id + e0,n , where id denotes identity matrix, ei,j denote matrix units. They satisfy relations gi hj = hi gj unless i = j, gi hi = shi gi , s commutes with all gi and hi . βn−1 α1 αn−1 We may uniquely write each element in the form sγ hβ1 1 . . . hn−1 g1 . . . gn−1 , 0 6 γ, βi , αi 6 p p − 1. Denote Fp [G] elements: z = s − 1, yi = hi − 1, xi = gi − 1. Then z = yip = xpi = 0. βn−1 α1 αn−1 Elements of the form z γ y1β1 . . . yn−1 x1 . . . xn−1 are called reduced. reduced elements for which 0 6 γ, βi , αi 6 p − 1 form a basis of the group ring. Our relations rewrite as xi yi = yi xi + zyi xi + z + zxi + zyi . Define a degree of an arbitrary word (sequence) in the alphabet {z, x1 , . . . , xn−1 , y1 , . . . , yn−1} as twice number of z’s plus number of all other letters. Key lemma is that any word of degree D > 2n(p − 1) equals 0 being evaluated as a group ring element. Indeed, replacing xi yi = yi xi + zyi xi + z + zxi + zyi and using other commutativity relations we may reduce each word to a sum of reduced words of the same or greater degree. Any such a word equals 0 provided that its degree exceeds 2n(p − 1). Now define a subspace X of Fp [G] formed by reduced monomials of degree strictly greater than 2n(p − 1)/k. We have X k = 0 and dimension of X is exponentially small for large n (if k > 3) by essentially the same reasons as in previous section. The group G = UT (n, Fp ), |G| = pn(n−1)/2 , of upper unitriangular n × n-matrices over Fp may be treated similarly. Namely, we may choose generators gij = id + eij , i < j in G; each element of G has unique representation as a product of these generators taken in inverse lexicographic order and in powers at most p − 1 α α α n−1,n n−2,n gn−1,n gn−2,n . . . g1,21,2 , 0 6 αi,j 6 p − 1. gij and gkl commute unless j = k or i = l. In this case we have relations gij gjl = gjl gij gil . Denote xij = gij − 1 in a group ring Fp [G], we have xpij = 0 and there is a basis in Fp [G] formed by the elements α α α n−1,n n−2,n xn−1,n xn−2,n . . . x1,21,2 , 0 6 αi,j 6 p − 1. Define a degree of any word in alphabet {xij }’s as a sum of (j − i) over all used letters (multiplicity counted of course). If i < j < l we have (1 + xij )(1 + xjl ) = (1 + xjl )(1 + xij )(1 + xil ), thus xij xjl = xjl xij + xil + xij xil + xjl xil + xjl xij xil . Using these relations we may reduce each word to a sum of reduced words of the same or greater degree. It remains to define define a subspace X of Fp [G] formed by reduced monomials of degree at strictly P greater than (p − 1)( i<j (j − i))/k = (p − 1)(n3 − n)/(6k). Using Chernoff bound we get an estimate for the maximum of A of order |G|1−c with some c > 0 depending on p, but bounded from both sides. I suppose that the huge subspaces with zero cube must exist in the group rings of all finite groups with small exponent. Specific conjecture: for any N there exists λ < 1 such that any group G in which g N = 1 for all g ∈ G, the group algebra K[G] has a subspace with zero cube of codimension at most |G|λ. Here K may depend on G, I guess that K = Fp for some prime divisor p of N should work. Even if true, this does not cover the upper unitriangular matrices case, so possibly something even better (what?) holds. 8 Acknowledgments I am grateful to Vsevolod Lev, Jordan Ellenberg, Ilya Bogdanov, Ilya Shkredov, Roman Karasev, Roman Mikhailov, Cosmin Pohoata, Alexander Efimovich Zalesskii and Anatoly Moiseevich Vershik for fruitful discussions. References [1] Noga Alon. Combinatorial Nullstellensatz, Combin. Probab. Comput. 8 (1999), 7–29. [2] Ernie Croot, Vsevolod Lev, and Peter Pach. Progression-free sets in Zn4 are exponentially small. Ann. of Math. 185 (2017), no. 1, 331–337. [3] Jordan Ellenberg and Dion Gijswijt. On large subsets of Fq n with no three-term arithmetic progression. Ann. of Math. 185 (2017), no. 1, 339–343 [4] Eric Naslund. Upper Bounds for Sunflower-Free Sets in Znd . URL:https://goo.gl/Tc5V6I [5] Ilya Bogdanov, the answer to Mathoverflow question. URL: http://mathoverflow.net/questions/239222/vector-with-many-non-zero-coordinates [6] John E. Olson. A Combinatorial Problem on Finite Abelian Groups I, Journal of Number Theory, 1(1) (1969), 8–10. [7] Kevin O’Bryant. Sets of integers that do not contain long arithmetic progressions. Electronic Journal of Combinatorics 18 (1) (2011). URL:http://www.combinatorics.org/ojs/index.php/eljc/article/download/v18i1p59/pdf [8] Roy Meshulam..On the maximal rank in a subspace of matrices. The Quarterly Journal of Mathematics 36 (1985), no. 2, 225–229. [9] Robert Kleinberg, Will Sawin, David Speyer. The Growth Rate of Tri-Colored SumFree Sets, arXiv preprint arXiv:1607.00047 (2016). [10] Sergey Norin. A distribution on triples with maximum entropy marginal, arXiv preprint arXiv:1608.00243 (2016). [11] Luke Pebody. Proof of a Conjecture of Kleinberg-Sawin-Speyer, arXiv preprint arXiv:1608.05740 (2016). [12] Jordan Ellenberg. Sumsets as unions of sumsets of subsets, arXiv preprint arXiv:1612.01929 (2016). [13] David Speyer, blog post. URL:https://sbseminar.wordpress.com/2016/07/08/boundsfor-sum-free-sets-in-prime-power-cyclic-groups-three-ways/
4math.GR
arXiv:1708.03372v1 [math.ST] 10 Aug 2017 Optimal Prediction for Additive Function-on-Function Regression Matthew Reimherr∗ and Bharath Sriperumbudur Bahaeddine Taoufik Pennsylvania State University Lynchburg College Abstract As with classic statistics, functional regression models are invaluable in the analysis of functional data. While there are now extensive tools with accompanying theory available for linear models, there is still a great deal of work to be done concerning nonlinear models for functional data. In this work we consider the Additive Function-on-Function Regression model, a type of nonlinear model that uses an additive relationship between the functional outcome and functional covariate. We present an estimation methodology built upon Reproducing Kernel Hilbert Spaces, and establish optimal rates of convergence for our estimates in terms of prediction error. We also discuss computational challenges that arise with such complex models, developing a representer theorem for our estimate as well as a more practical and computationally efficient approximation. Simulations and an application to Cumulative Intraday Returns around the 2008 financial crisis are also provided. 1 Introduction Functional data analysis (FDA) concerns the statistical analysis of data where one of the variables of interest is a function. FDA has seen rapidly increasing interest over the last few decades and has successfully been applied to a variety of fields, including economics, finance, the geosciences, and the health sciences. One of the most fundamental tools in statistics is linear regression, as such, it has been a major area of research in FDA. While the literature is too vast to cover here, we refer readers to Ramsay and Silverman (2006); Ramsay et al. (2009); Horváth and Kokoszka (2012); Kokoszka and Reimherr (2017), which provide introductions to FDA, as well as Morris (2015), which provides a broad overview of methods for functional linear regression. ∗ Corresponding author: Matthew Reimherr, 411 [email protected] 1 Thomas Building, University Park, PA 16802, A major challenge of functional regression is handling functional predictors. At least conceptually, a functional predictor means having a large number (theoretically infinite) of predictors that are all highly correlated. To handle such a setting, certain regularity conditions are imposed to make the problem tractable. Most of these conditions are directly or indirectly related to the smoothness of the parameter being estimated. However, the convergence rates of the resulting estimators then depend heavily on these assumptions, and the rates are not parametric when the predictor is infinite dimensional. One of the most well studied models in FDA is the functional linear model. Commonly, one distinguishes between function-on-scalar, scalar-on-function, and function-on-function regression when discussing such models, with first term denoting the type of response and the second term denoting the type of covariate. The convergence rates for function-on-scalar regression are usually much faster than for the scalar-on-function or function-on-function. Methodological, theoretical, and computational issues related to functional linear models are now well understood. More recently, there has been a growing interest in developing nonlinear regression models. While it is natural to begin examining nonlinear models after establishing the framework for linear ones, there is also a practical need for such models. Functional data may exhibit complicated temporal dynamics, which may exhibit nonlinear patterns and are not well modeled assuming linearity; Fan et al. (2015) examine this issue deeply. Nonlinear regression methods for FDA have received a fair amount of attention for the scalaron-function setting, while function-on-function regression models, where the relationship between the response and covariates is believed to be nonlinear, have received considerably less attention. Concerning nonlinear scalar-on-function regression, James and Silverman (2005) introduced a functional single index model, where the outcome is related to a linear functional of the predictor through a nonlinear transformation. This work would later be extended in Fan et al. (2015), allowing for a potentially high-dimensional number of a functional predictors. Preda (2007) explored fitting a fully nonlinear model using reproducing kernel Hilbert spaces (RKHS). In contrast, Müller et al. (2013) simplified the form of the nonlinear relationship by introducing the functional additive model, which combines ideas from functional linear models and scalar additive models Hastie and Tibshirani (1990). Optimal convergence rates for the functional additive model were then established by Wang and Ruppert (2015), which generalized the work of Cai and Yuan (2012) in the linear case. An alternative to the functional additive model was given in Zhu et al. (2014) who first expressed the functional predictor using functional principal components analysis, FPCA, and 2 then built an additive model between the outcome and scores. Moving to function-on-function regression, Lian (2007) extended the work of Preda (2007) to functional outcomes, which was then also considered in Kadri et al. (2010). Most relevant to the present paper is the work of Scheipl et al. (2015) who extended the work of Müller et al. (2013) by introducing an additive model for function-on-function regression. They used a general trivariate tensor product basis approach for estimation, which allowed them to rely on GAM from the MGCV package in R to carry out the computation, as is implemented in the Refund package. Ma and Zhu (2016), examining the same model, considered a binning estimation technique combined with FPCA. In addition, they were able to prove convergence of their estimators, but made no mention of optimality while also needing a great deal of assumptions which are challenging to interpret. Another estimation technique was examined in Kim et al. (2017), which was similar to the trivariate tensor product approach of Scheipl et al. (2015), but two of the bases are explicitly assumed to be orthogonal B-splines, while the third comes from an FPCA expansion. However, as with Scheipl et al. (2015), no theoretical justification is provided. Lastly, in very recent work, Sun et al. (2017) considered the case of using an RKHS framework to estimate a function-on-function linear model. Extending the work the Cai and Yuan (2012), they were able to establish the optimality of their procedure. Our work can viewed as extending this work to nonlinear relationships via a functionon-function additive model. The goal of this work is to develop a penalized regression framework based on Reproducing Kernel Hilbert Spaces, RKHS, for fitting the additive function-on-function regression model, AFFR Scheipl et al. (2015). A major contribution of this work is to provide optimal convergence rates of our estimators in terms of prediction error, and that this rate is the same as for the scalar outcome setting Wang and Ruppert (2015). We also discuss computational aspects of our approach, as the RKHS structure allows for a fairly efficient computation as compared to the trivariate tensor product bases that have been used previously. Background and the model are introduced in Section 2. Computation is discussed in Section 3, while theory is presented in Section 4. We conclude with a numeric study consisting of simulations and an application to financial data. 2 Model and Background We assume that we observe i.i.d pairs {(Xi (t), Yi (t)) : i = 1, . . . , n, t ∈ [0, 1]}. The functions could be observed on other intervals, but as long as they are closed and bounded, then they can 3 always be rescaled to be [0, 1], thus it is common in FDA to work on the unit interval. Both the outcome, Yi (t), and Xi (t) are assumed to be completely observed functions, a practice sometimes referred to as dense functional data analysis Kokoszka and Reimherr (2017); practically this means that the curve reconstruction contributes a comparatively small amount of uncertainty to the final parameter estimates. The additive function-on-function regression model is defined as Z 1 g(t, s, Xi (s)) ds + εi (t). Yi (t) = 0 We assume that the functions Xi , εi , and Yi are elements of L2 [0, 1], which is a real separable Hilbert space. The trivariate function, g(t, s, x) is assumed to be an element of an RKHS, denoted K. Recall that an RKHS is a Hilbert space that possesses the reproducing property, namely, we assume that K is a Hilbert space of functions from [0, 1] × [0, 1] × R → R, and that there exists a kernel function k(t, s, x, t0 , s0 , x0 ) = kt,s,x (t0 , s0 , x0 ) that satisfies f (t, s, x) = hkt,s,x , f iK , for any f ∈ K. There is a one-to-one correspondence between K and k, thus choosing the kernel function completely determines the resulting RKHS. The functions in K inherit properties from k, in particular, one can choose k so that the functions in K possess some number of derivatives, or satisfy some boundary conditions. In addition, many Sobolev spaces, which are commonly used to enforce smoothness conditions, are also RKHS’s. We refer an interested reader to Berlinet and Thomas-Agnan (2011) for further details. We propose to estimate g by minimizing the following penalized objective: (1) RSSλ (g) = n Z X i=1 0 1 2 1 Z Yi (t) − g(t, s, Xi (s)) ds 0 dt + λkgk2K , i.e., ĝ = arg inf RSSλ (g), g∈K where λ > 0. As we will see in the next section, an explicit solution to this minimization problem exists due to the reproducing property. However, we will also discuss using FPCA to help reduce the computational burden. 4 3 Computation One of the benefits of using RKHS methods is that one can often get an exact solution to the corresponding minimization problem such as the one in (1), due to the representer theorem Kimeldorf and Wahba (1971). This also turns out to be the case here, however, later on we will discuss using a slightly modified version that still works well and is easier to compute. The expression we derive is quite a bit simpler than the analogs derived in Cai and Yuan (2012); Wang and Ruppert (2015); Sun et al. (2017); this is partly due to our use of functional principal components, which simplify the expression and also provide an avenue for reducing the computational complexity of the problem, and also due to our use of the RKHS norm penalty when fitting the model (where as others used a more general penalty term). Using the reproducing property we have hkt,s,Xi (s) , giK = g(t, s, Xi (s)) for i = 1, 2, ..., n. We then have that  Z Z 1 Z 1 (2) g(t, s, Xi (s))ds = hg, kt,s,Xi (s) iK ds = g, 0 0 0 1  , kt,s,Xi (s) ds K which is justified by the integrability constraints inherent in Assumption 1(iii ), discussed in the next section. Let v̂1 , v̂2 , ..., v̂n denote the empirical functional principal components, EFPC’s, of Y1 , Y2 , ..., Yn . Then, assuming the Yi have been centered, it is a basic fact of PCA that span{v̂1 , . . . , v̂n } = span{Y1 , . . . , Yn }. Recall that it is also a basic fact from linear algebra that the v̂1 , v̂2 , ..., v̂n can be completed to form a full orthonormal basis (all of the additional functions will have an empirical eigenvalue of 0). We then apply Parseval’s identity to obtain  Z 1Z 1  2 2 Z 1 n X ∞  n Z 1 X X hYi , v̂j i − g, kt,s,X(s) v̂j (t)dtds . Yi (t) − g(t, s, Xi (s))ds dt = i=1 0 0 0 i=1 j=1 Define the subspace (of K) Z 1 Z H1 = span 0 0 K 1  k ((w, x, y); (t, s, Xi (s))) v̂j (t)dtds, i = 1, 2, ..., n, j ≥ 1 , 0 as well as its orthogonal compliment H1⊥ . The space K can be decomposed into the direct sum: K = H1 ⊕ H1⊥ , which means that we can write any function g ∈ K as g = g1 + g1⊥ , with g1 ∈ H1 and g1⊥ ∈ H1⊥ . Using this decomposition we have that, for j ≤ n,  Z 1Z 1   Z 1Z 1  (3) g, kt,s,Xi (s) v̂j (t)dtds = g1 , kt,s,Xi (s) v̂j (t)dtds . 0 0 0 K 5 0 K Since kgk2K = kg1 k2K + kg1⊥ k2K , it follows from (1) and (3) that ĝ ∈ H1 and has the form ĝ(t, s, x) = n X n X Z 1Z 1 αij 0 i=1 j=1  k (t, s, x); (t0 , s0 , Xi (s0 )) v̂j (t0 )dt0 ds0 , 0 i.e., the sum over j terminates at n instead of tending to infinity. Note that this same expression would hold if we replaced the {vj (t)} with {Yj (t)} (since they span the same space), however, it would not hold for an arbitrary basis. We use the FPCs for computational reasons as we discuss at the end of the section. To compute the estimate, ĝ, we need only compute the coefficients {αij }. As usual, the coefficients αij can be computed via a type of ridge regression. Note that   Z 1Z 1 kt,s,Xi (s) v̂j (t)dtds ĝ, 0 = = 0 n X n X i0 =1 j 0 =1 n X n X K 1Z 1Z 1Z 1 Z α i0 j 0 0 0 0 0 1Z 1Z 1Z 1 Z α i0 j 0 0 i0 =1 j 0 =1 0 0 hkt,s,Xi0 (s) , kt0 ,s0 ,Xi (s0 ) iK v̂j 0 (t)v̂j (t0 )dtdsdt0 ds0 k(t, s, Xi0 (s); t0 , s0 , Xi (s0 ))v̂j 0 (t)v̂j (t0 )dtdsdt0 ds0 . 0 Define Z 1Z 1Z 1Z 1 Aiji0 j 0 = 0 0 0 k(t, s, Xi0 (s); t0 , s0 , Xi (s0 ))v̂j 0 (t)v̂j (t0 )dtdsdt0 ds0 . 0 Turning to the norm in the penalty we can use the same arguments to show that kĝk2K = hĝ, ĝiK = X αij Aiji0 j 0 αi0 j 0 . iji0 j 0 Thus the minimization problem can be phrased as  2 n X n X X X Yij − Aiji0 j 0 αi0 j 0  + λ αij Aiji0 j 0 αi0 j 0 . i=1 j=1 i0 j 0 iji0 j 0 We now vectorize the problem by stacking the columns of Yij and αij , denoted as YV and αV . We also turn the array Aiji0 j 0 into a matrix AV , by collapsing the corresponding dimensions. We can then phrase the minimization problem as (YV − AV αV )> (YV − AV αV ) + λα> V AV αV . Thus, the final estimate can be expressed as −1 α̂V = (A> V AV + λAV ) AV YV . Note that we are estimating n2 parameters and inverting an n2 × n2 matrix. Thus for computational convenience, it is often useful to truncate the EFPCs at some value J < n. However, 6 even without truncating this approach still has the potential to lead to significantly less parameters than the basis methods of Scheipl et al. (2015), where the number of parameters to estimate is m3 with m being the number of basis functions used in their tensor product basis. In contrast, our approach yields only n2 parameters, and combined with an FPCA, this can be reduced to nJ with relatively little loss in practical predictive performance. There is also the possibility of using an eigen-expansion on k to reduce the computational complexity even further Parodi and Reimherr (2017), though we don’t purse that here. 4 Asymptotic Theory In this section, we demonstrate that the excess risk, <n (defined below), of our estimator converges to zero at the optimal rate. Optimal convergence of <n , for scalar-on-function linear regression was established by Cai and Yuan (2012), while optimal convergence for the continuously additive scalar-on-function regression model was established in Wang and Ruppert (2015). In both cases an RKHS estimation framework was used. Because our model involves a functional response, the form of the excess risk <n is different and requires some serious mathematical extensions over previous works. However, we will show that the convergence rate for our model is the same as the one found in Wang and Ruppert (2015). We begin by defining the excess risk, <n . Let Xn+1 (t) be new predictor which is distributed as, but independent of (Xi (t))ni=1 . We let E∗ denote the expected value, conditioned on the data {(Yi , Xi ) : 1 ≤ i ≤ n}. Then the excess risk is defined as Z 1 Z 1  <n = E∗ (ĝ(t, s, Xn+1 (s)) − g(t, s, Xn+1 (s)))2 dtds . 0 0 Note that <n is still a random variable as it is a function of the data. Intuitively, this quantity can be thought of as prediction error, namely, for a future observation, how far away is our prediction from the optimal one where the true g is known. For ease of exposition, we present all of assumptions below, even the ones discussed previously. Assumption 1. We make the following assumptions. (i ) The observations {Yi (t), Xi (t)} are assumed to satisfy Z Yi (t) = g(t, s, Xi (s)) ds + εi (t) 7 where {Xi } and {εi } are independent of each other and iid across i = 1, . . . , n. (ii ) Denote by Lk the integral operator with k as its kernel: Z (Lk f )(t, s, x) := k(t, s, x; t0 , s0 , x0 )f (t0 , s0 , x0 ) dt0 ds0 dx0 . The kernel, k, which also defines the RKHS, K, is assumed to be symmetric, positive definite, and square integrable. (iii ) Assume that there exists a constant c > 0 such that for any f ∈ K and t ∈ [0, 1] we have Z E 4 1 f (t, s, X(s)) ds " Z ≤c E 0 1/2 (iv ) Let Lk 1/2 −1/2 kt,s,x := Lk 1 2 #2 f (t, s, X(s)) ds < ∞. 0 denote a square–root of L (which exists due to Assumption 1(ii )) and define kt,s,x . Define the operator, C, as Z Z Z  1/2 1/2 0 C(f ) = E kt,s,Xi (s) hkt,s0 ,Xi (s0 ) , f iL2 dsds dt . Assume that the eigenvalues {ρk : k ≥ 1} of C satisfy ρk  k −2r for some constant r > 1/2. (v ) There exists a constant M > 0 such that, for all t ∈ [0, 1] and i = 1, . . . , M E(2i (t)) ≤ M < ∞. (vi ) The function g lies in Ω, which we assume is a closed bounded ball in K. We are now in a position to state our main result. 2r Theorem 1. If Assumption 1 holds and the penalty parameter, λ, is chosen such that λ  n− 2r+1 then we have that   −2r lim lim sup P <n ≥ An− 2r+1 = 0. A→∞ n→∞ g∈Ω Before interpreting this result, let us discuss each of the assumptions individually. Assumption 1(i ) explicitly defines the model we are considering. Assumption 1(ii ) ensures that the kernel has a spectral decomposition via Mercer’s theorem, which will be used extensively. Assumption 1(iii ) is fairly typical in these sorts of asymptotics, assuming that the fourth moment is bounded by a constant times the square of the second. Assumption 1(iv ) introduces a central quantity that is used extensively in the proofs. While not immediately obvious, this assumption basically states how “smooth” or “regular” the function g is, as g must lie in K, whose kernel contributes to C. In such results it is common for X to contribute to the asymptotic behavior as the prediction error 8 1/2 depends on the complexity of the X. Note that kt,s,x is a well defined quantity and it is easy to show via the reproducing property that it is an element of L2 ([0, 1]2 × R). The operator C does depend on the choice of the square-root K 1/2 (which is not a unique choice), however its eigenvalues do not. Assumption 1(v ) simply assumes that the point-wise variance of the errors is bounded, while the last assumption requires that the true function lie in a ball in K, which is used to control the bias of the estimate. The rate given in Theorem 1 is the same as was found in the scalar outcome case in Wang and Ruppert (2015), thus we know that this is the minimax rate of convergence. In our case, as well as in Wang and Ruppert (2015) and Cai and Yuan (2012), it is the interaction between the covariance of X and the kernel k which determines the optimal rate. The proof is quite extensive and given in the appendix. The idea of the proof is to rephrase the estimate using operator notation instead of the representation theorem. The difference between the estimate and truth is then split into a bias/variance decomposition. Bounding the bias turns out to be relatively straight forward. Bounding the variance is done by decomposing it into five more manageable pieces, and then bounding each of them separately. Our task is complicated by the fact that the errors and response are now functions, where as in both Wang and Ruppert (2015) and Cai and Yuan (2012) they were scalars. This requires extending many of the lemmas to this new setting, as well as using some completely new arguments to get the necessary bounds in place. 5 Simulation Study Here we investigate the prediction performance of AFFR. We compare it with a linear model estimated in one of two ways. The first way will be denoted as LM R (Reduced linear model) and LM F (Non-reduced linear model), where both use FPCA to reduce the dimension of the predictors, but LM R also reduces the dimension of the outcome, while LM F does not. To implement our approach we relied heavily on the TensorA package van den Boogaart (2007) in R, which allowed us to carryout various tensor products very quickly. We consider three different settings for g(t, s, x) one linear and two nonlinear forms: (a) Model (a): g(t, s, x) = tsx, (b) Model (b): g(t, s, x) = t + s + x2 , (c) Model (c): g(t, s, x) = tsx2 + x4 . 9 In all settings, the predictors Xi (t) and errors i (t) are taken to be iid Gaussian processes with mean 0 and the following covariance function from the Matérn family: ! ! √ √ 5|t − s| 5|t − s|2 5|t − s| C(t, s) = 1 + , + exp − ρ 3ρ2 ρ where ρ = 1/4. For the RKHS we utilized the Gaussian kernel h i  0 0 0 −δ (x−x )2 +(y−y )2 +(z−z )2 k (x, y, z), (x , y , z ) = e ,  0 0 0 where δ is the tuning parameter of the Gaussian kernel. We will examine the sensitivity of our approach to this parameter in Table 2. All of the curves (Xi (t), Yi (t), and εi (t)) were simulated on a M = 50 equispaced grid between 0 and 1. The data is approximated by a B-spline of K = 100 basis functions, using the fda package. We denote by JX and JY the number of principal components of Xi and Yi . To evaluate the different approaches, we used 1000 repetitions of every scenario. In each case we generate 150 curves to fit the different models and then generated another 150 curves to evaluate out-of-sample prediction error. The metric for determining prediction performance we denote as RPE, for relative prediction error. This metric denotes the improvement of the predictions over just using the mean. An RPE of 0 means that the model shows no improvement over just using the mean, while an RPE of 1 means the predictions are perfect. More precisely, we first compute the Mean Squared Prediction error as: M SP E = n X kYi − Ybi k2L2 , i=1 where Ybi is a predicted value using one of the three discussed models or simply the mean. The RPE is then defined as RP E = M SP Emean − M SP E , M SP Emean where M SP Emean denotes the MSPE using a mean only model. Note that even in the mean only model, all parameters are estimated on the initial 150 curves and prediction is then evaluated on the second 150. Therefore, it is actually possible to have a numerically negative RPE if an approach isn’t predicting any better than just using the mean. The RPEs of LM R and LM F for the three models (a), (b), and (c) are summarized in Table 1. For both models, we took JX = 3, which explained over 85% of the variability of the predictors and for LM R we took JY = 3 PCs for the outcome as well. The RPEs for our approach with 10 δ = {2−3 , 2−2 , 2−1 , 1, 2} and JY = 3, 6, 9 are summarized in Table 2. An initial look at the tables confirms much of what one would expect. When the true model is linear, the two linear approaches work best, resulting in about half the RPE of AFFR. However, when moving to the two nonlinear models, the AFFR approach does substantially better. This increased performance is seen for any choice of JY and δ. Furthermore, the prediction performance seems relatively robust to the choice of JY and δ. In the case of JY this is not so surprising as over 90% of the variability of the Yi is explained by the first three FPCs. In contrast, there is some sensitivity to the choice of δ, but it is relatively weak given how much we are changing δ in each row. In our application section we set δ using a type of median, but one could also refit the model with a few different δ and choose the one with the best prediction performance. Given how consistent the AFFR predictions are, trying a few δ appears to be satisfactory, and large grid searches can be avoided. Model (a) Model (b) Model (c) LM R 0.045 0.030 0.060 LM F 0.045 0.029 0.060 Table 1: Relative prediction errors, RPE, for the two linear models. For both, the number of FPCs for the predictor is JX = 3. LMR also reduces the dimension of the outcome with JY = 3 FPCs. Model (a) Model (b) Model (c) JY = 3 JY = 6 JY = 9 JY = 3 JY = 6 JY = 9 JY = 3 JY = 6 JY = 9 δ = 2−3 0.025 0.026 0.026 0.379 0.379 0.379 0.840 0.840 0.845 2−2 0.024 0.025 0.025 0.370 0.370 0.370 0.816 0.804 0.815 δ = 2−1 0.023 0.024 0.023 0.360 0.361 0.361 0.847 0.831 0.830 20 0.022 0.023 0.021 0.346 0.347 0.347 0.83 0.83 0.83 δ = 21 0.020 0.021 0.019 0.328 0.328 0.400 0.808 0.808 0.790 P EV 90.45% 99.12% 99.88% 90.82% 99.10% 99.84% 91.25% 99.22% 99.87% δ= δ= Table 2: Relative prediction error, RPE, for AFFR with different kernel parameter values, δ. In every case the penalty parameter, λ, is chosen using cross-validation. PEV indicates the proportion of explained variance of Y for the corresponding number of FPCs, JY . 6 Application to Cumulative Intraday Data We conclude with an illustration of our approach applied to real data. Cumulative Intra-Day Returns (CIDR’s) consist of daily stock prices that are normalized to start at zero at the beginning 11 of each trading day. FDA methods have been useful in analyzing such data Gabrys et al. (2010); Kokoszka and Reimherr (2013); Horváth et al. (2014), given the density at which stock prices can be observed. Let Pi (tj ) denote the price of a stock on day i and time of day tj . The CIDRs are then defined as Ri (tj ) = 100 [ln Pi (tj ) − ln Pi (t1 )] , i = 1, ..., n, j = 1, ..., M. The CIDRs are observed each minute throughout the trading day. This corresponds to M = 390 minutes (9:30 am-4:00 pm EST) of trading time for each trading day of the New York Stock Exchange, NYSE. In this application study, we deal with the CIDR’s of two of the most important US market indexes: Standard & Poor’s 500 Index (S&P 500) and the Dow Jones Industrial Average (DJ). Also, we consider two individual stocks: General Electric Company (GE) and International Business Machines Corporation (IBM). The study period of the data consists of three periods in relation to the 2007–2008 financial crisis, denoted as Before (06/13/2006-04/10/2007), During (11/01/2007-07/28/2008), and After (01/04/2010-10/1/2010). These periods each contain 270 calendar days. We investigate the performance of the market indexes, S&P 500 and DJ, in predicting GE and IBM for the three periods. Understanding such relationships is imperative for developing financial portfolios as many strategies consist of balancing buying/shorting certain stocks with buying/shorting market indices Nicholas (2000). We fit three different models; the first is our discussed model, AFFR, while the other two are linear models. The first linear model uses an FPCA on both the outcome and predictor (5 PCs for both) and then fits a multivariate linear model, while the second linear model only uses FPCA on the predictor (5 PCs) Kokoszka and Reimherr (2017). To evaluate the prediction performance for each period we split each period into 3 equal folds and use a type K-fold cross-validation. The model is fit on two folds, while prediction is then evaluated on the third. We use the Gaussian kernel from Section 5 and the smoothing parameter selected via Generalized Cross-Validation. Prediction performance is then averaged over the 3 folds. To provide a more readily interpretable metric for prediction performance, we use the same RPE metric given in Section 5, which denotes the relative performance of a model with respect to a mean only model. A value of 1 means perfect prediction, while a value of 0 indicates that the model is doing no better than just using the mean. The results are summarized in Table 3. As we can see, all models perform better, during and after the crisis. This suggests that the behavior of the market had not returned to its pre-crisis characteristics. Looking at Figure 1, we 12 can clearly see that the volatility increases during and after the financial crises. This suggests that the overall “market” effect on the stocks is stronger during periods of high-volatility. When comparing the three different models, the linear models do nearly the same, which is to be expected since 5 PCs explains over 90% of the variability of the stocks. The AFFR model is not too far behind, but does noticeably worse in every setting. This suggests that the relationship between the discussed stocks and the indices is approximately linear; if there are any nonlinear relationships then they are either very minor deviations from linearity or are not well captured by an additive structure. Period Before During After Model AFFR LMR LMF AFFR LMR LMF AFFR LMR LMF GE on DJ 0.081 0.249 0.247 0.429 0.537 0.536 0.354 0.474 0.474 GE on SP 0.078 0.199 0.198 0.322 0.479 0.479 0.398 0.465 0.465 IBM on DJ 0.024 0.249 0.248 0.416 0.551 0.550 0.293 0.454 0.454 IBM on SP 0.034 0.194 0.193 0.249 0.435 0.434 0.248 0.399 0.399 Table 3: Prediction performance of three models: AFFR (our model), LMR (linear model with PCA in both the outcome and predictor), and LMF (linear model with PCA on the predictor only). The top row corresponds to predicting GE based on DJ, the second corresponds to prediction GE from SP, and so on. Each number denotes the relative increase in out-of-sample prediction performance over a mean only model, with 100% denoting perfect prediction and 0% denoting no increase over just using the mean. A A.1 Proof of Theorem 1 Excess Risk We begin by expressing the excess risk in an alternative form. Recall that k(t, s, x; t0 , s0 , x0 ) is the kernel function used to define the RKHS, K. This kernel can be viewed as the kernel of an integral operator, Lk , which maps L2 ([0, 1]2 × R) → K ⊂ L2 ([0, 1]2 × R). In particular Z Z Z (Lk f )(t, s, x) = k(t, s, x; t0 , s0 , x0 )f (t0 , s0 , x0 ) dt0 ds0 dx0 . From here on, for simplicity, we will denote L2 ([0, 1]2 × R) as simply L2 . By Assumption 1, Lk is a positive definite, compact operator, which is also self-adjoint in the sense that hf, Lk gi = hLk f, gi, 13 Figure 1: Plots of the intraday cumulative returns for the Dow Jones Index (top) and General Electric (bottom) before (left), during (middle), and after (right) the 2008 financial crisis. 1/2 for any f and g in L2 . We can therefore define a square-root of Lk , denoted as Lk −1 that satisfies 1 f1 ∈ K ⇐⇒ Lk 2 f1 ∈ L2 and Lk2 f2 ∈ K ⇐⇒ f2 ∈ L2 . −1/2 Note that if Lk has a nontrivial null space, then Lk can still be well defined since assuming f ∈ K means that f is orthogonal to the null space of L. Recall that one can also move between the K and L2 inner product as follows −1/2 hf, giK = hLk −1/2 f, Lk giL2 = hf, L−1 k giL2 . We refer the interested reader to Kennedy and Sadeghi (2013) for more details. Let ĝ denote our estimate of the true function, g. We then define the following 1 −1 2 kt,s,X(s) = Lk 2 kt,s,X(s) , −1 −1 h = Lk 2 g and ĥ = Lk 2 ĝ. Using the reproducing property, we have that 1 1 2 g(t, s, X(s)) = hkt,s,X(s) , hiL2 2 and ĝ(t, s, X(s)) = hkt,s,X(s) , ĥiL2 . Now define the random operator, T : L2 → L2 as 1/2 1/2 Tt,s,s0 = kt,s,Xn+1 (s) ⊗ kt,s0 ,Xn+1 (s0 ) , where ⊗ denotes the tensor product, and the resulting object is interpreted as an operator: 1/2 1/2 Tt,s,s0 (f ) = kt,s,Xn+1 (s) hkt,s0 ,Xn+1 (s0 ) , f iL2 . 14 We also define a second operator, which integrates out t, s, and s0 , and takes an expectation over Xn+1 : Z (4) 1Z 1Z 1 C=E 0  Tt,s,s0 dsds dt . 0 0 0 Note that C is a symmetric, positive definite, compact operator, and thus has a spectral decomposition C= (5) ∞ X ρk (φk ⊗ φk ), k=1 where ρk ≥ 0 and φk ∈ L2 are, respectively, the eigenvalues and eigenfunctions of C. This decomposition will be used later on. As we said before, denote by E∗ the expected value conditioned on the data (X1 , Y1 ), ..., (Xn , Yn ). The excess risk can be written as 2 Z 1 Z 1 [ĝ(t, s, Xn+1 (s)) − g(t, s, Xn+1 (s)))] ds dt <n = E∗ 0 ∗ Z 0 1 Z 1  hkt,s,Xn+1 (s) , ĥλ iL2 − hkt,s,Xn+1 (s) , hiL2 =E 0 ∗ Z 0 1 Z 1 0 ∗ Z 1Z 0 1Z 1 =E 0 = E∗ Z 0 0 0 1Z 1Z 1 0 2 ds dt 2 1 2 hkt,s,Xn+1 (s) , ĥλ − hiL2 ds =E  1 2 1 2 dt 1 1 0 2 2 hkt,s,X , ĥ − hiL2 hkt,s 0 ,X 0 , ĥ − hiL2 dsds dt n+1 (s) n+1 (s ) hTt,s,s0 (ĥ − h), ĥ − hiL2 dsds0 dt 0 = hC(ĥ − h), ĥ − hiL2 = kĥ − hk2C . Thus, the excess risk can be expressed as sort of a weighted L2 norm, where the operator C defines the weights, which is composed of the kernel and the distribution of Xn+1 . A.2 Re-expressing the Estimator In this section we define an alternative form for the estimator ĝ, which was given in Section 3. In particular, instead of using the reproducing property, we will write down the estimator using operators. To do this, we will take derivatives of RSSλ (g) with respect to g. Since these are functions, we mean the Fréchet derivative or strong derivative. Note that RSSλ (g) is a convex differentiable functional over K. However, so that we are working with L2 instead of K, we use 15 ] λ (h) := RSSλ (L1/2 h), where h = L−1/2 g: RSS k k ] λ (h) = RSS n Z X i=1 1 1 Z Yi (t) − 0 0 1/2 hh, kt,s,Xi (s) iL2 ds 2 dt + λkhk2L2 . ] λ (h) is a convex differentiable functional over L2 . Thus, when taking the derivative, we Now RSS are using the topology of L2 not K. ] λ (h) we first focus on the penalty, which is easier. We have that To take the derivative of RSS ∂ khk2L2 = 2h. ∂h ] λ (h) we first define the empirical quantities Turning to the first term in RSS 1/2 1/2 Ti;t,s,s0 = kt,s,Xi (s) ⊗ kt,s0 ,Xi (s0 ) and n (6) 1X Cn = n 1Z 1Z 1 Z i=1 0 0 Ti;t,s,s0 dsds0 dt. 0 Now we can apply a chain rule to obtain " n Z  2 # Z 1 ∂ 1X 1 1/2 Yi (t) − hh, kt,s,Xi (s) iL2 ds dt ∂h n 0 i=1 0 n Z Z 1 2X 1 1 2 =− Yi (t)kt,s,X dsdt + 2Cn h. i (s) n 0 0 i=1 For notational simplicity, define n Γk1/2 ,Y 1X = n i=1 Z 0 1Z 1 0 1 2 dsdt. Yi (t)kt,s,X i (s) So, we finally have that ∂ ] RSS λ (h) = −2Γk1/2 ,Y + 2Cn h + 2λh, ∂h which yields the estimate (7) ĥ = (Cn + λI)−1 Γk1/2 ,Y , where I is the identity operator. 16 A.3 Proof of Theorem 1 - Controlling Bias Using Assumption 1 we can express Z 1/2 hkt,s,Xi (s) , hiL2 + εi (t). Yi (t) = and we therefore have that Γk1/2 ,Y = Cn (h) + fn where n 1X fn = n Z 1Z 1 0 i=1 0 1 2 dsdt. i (t)kt,s,X i (s) This implies that ĥ from (7) can be expressed as ĥ = (Cn + λI)−1 Cn (h) + (Cn + λI)−1 fn . We introduce an intermediate quantity, hλ , which is given by hλ = (C + λI)−1 C(h), where C is defined in (4). The difference between hλ and h represents the bias of the estimator ĥ. Balancing this quantity with the variance, discussed in the next section, is called the bias-variance trade off a common term in nonparametric smoothing. Inherently, the idea is that to achieve an optimal ĥ we have to balance both the bias and variance so that neither one is overly large. Using the eigenfunctions of C as a basis, we can write h= ∞ X ak φk . k=1 Since C and C + I have the same eigenfunctions, it follows that we can express C + λI = ∞ X −1 (λ + ρk )(φk ⊗ φk ) =⇒ (C + λI) = k=1 ∞ X (λ + ρk )−1 (φk ⊗ φk ). k=1 So we have that hλ can be expressed as hλ = (C + λI)−1 C(h) = ∞ X ak ρk φk . λ + ρk k=1 So the difference, hλ − h can be written as (8) hλ − h = − ∞ X λak φk . λ + ρk k=1 17 The bias is therefore given by khλ − hk2C = ∞ ∞ X X λ2 a2k ρk ρk ρk 2 ≤ λ max . a2k = λ2 khk2L2 max 2 2 k≥1 (λ + ρk ) k≥1 (λ + ρk )2 (λ + ρk ) k=1 k=1 It is easy to verify that the maximum of F (x) = x/(λ + x)2 is achieved at x = λ with the maximum value being 1 4λ . We can therefore bound the bias as khλ − hk2C ≤ λkhk2L2 . 4 In the statement of Theorem 1 we assume that λ  n2r/(2r+1) , which implies that the bias is of the 2r order n− 2r+1 O(1). We will show in the next section that the variance of our estimate achieves the same order. A.4 Proof of Theorem 1 - Controlling Variability Controlling the variability of the estimates, kĥ − hλ kC follows similar arguments as controlling the bias. However, there are many more terms which must be analyzed separately. In particular, we decompose ĥ − hλ into five separate components: ĥ − hλ = T1 + T2 + T3 + T4 + T5 , (9) where the Ti terms are given by T1 = (C + λI)−1 C(hλ − h), T2 = λ(C + λI)−2 C(h), T3 = −(C + λI)−1 fn , T4 = (C + λI)−1 (Cn − C)(hλ − h), T5 = (C + λI)−1 (C − Cn )(hλ − ĥ). While a bit tedious, it only requires linear algebra and repeated calls to the definitions of ĥ and hλ to verify (9), we thus omit the details here. We now develop bounds for each term, kTi kC , separately. For the first four, it turns out to be convenient to bound kC ν Ti kL2 for 0 < ν ≤ 1/2, as these bounds will be needed for the final term T5 . Notice that when ν = 1/2 we have kC ν Ti kL2 = kTi kC . 1. Using the eigenfunctions of C to express hλ − h as in (8), we get that ∞ X λak ρk φk . T1 = − (λ + ρk )2 k=1 18 We then have that kC ν T1 k2L2 = ∞ 2(1+ν) X λ2 a2 ρ k k (λ + ρk )4 k=1 2(1+ν) ≤ λ2 max k≥1 ρk khk2L2 . (λ + ρk )4 Again, it is a basic calculus exercise to show that 2(1+ν)  1+ν 2(1+ν) λ ρ 1−ν (1 − ν)2(1−ν) (1 + ν)2(1+ν) 1 max k ≤ = .   4 k≥1 (λ + ρk )4 16 λ2−2ν λ + λ 1+ν 1−ν We thus have the bound kC ν T1 k2L2 ≤ cλ2ν khk2L2 , (10) where c is a constant that depends only on ν. 2. Using the same arguments as in the previous step, we have that (11) kC ν T2 k2L2 = ∞ 2(1+ν) X λ2 a2 ρ k k k=1 (λ + ρk )4 ≤ λ2 max k≥1 ∞ 2(1+ν) X ρk a2k ≤ cλ2ν khk2L2 . (λ + ρk )4 k=1 3. Turning to T3 , we apply Lemma 1 with 0 < ν ≤ 1/2 to obtain kC ν T3 k2L2 = kC ν (C + λI)−1 fn kL2 = 1 nλ1−2ν+1/2r Op (1), 1 where r is defined as in Assumption 1. By the statement of Theorem 1 it follows that nλ1+ 2r tends to a nonzero constant, meaning that 1 (12) nλ 1 1−2ν+ 2r  λ2ν → 0, since λ → 0. Thus we have that kC ν T3 kL2 = Op (λν ). 4. To bound T4 we first fix a second value ν > ν2 > 0 that satisfies 2r(1−2ν2 ) > 1, or equivalently ν2 < (2r −1)/4r, as well as 4r(2ν2 +2ν) > 1, which is possible as long as r > 1/2 (Assumption 1). We now apply a basic operator inequality kC ν T4 kL2 = kC ν (C + λI)−1 (Cn − C)(hλ − h)kL2 ≤ kC ν (C + λI)−1 (Cn − C)C −ν2 kop kC ν2 (hλ − h)kL2 . and then apply Lemmas 3 and 4 to obtain  −1   1 ν 2 1−2ν+ 2r (13) kC T4 kL2 ≤ Op nλ Op λ2ν2 = 1 nλ 1 1−2ν+ 2r op (1) , since ν2 > 0 and λ → 0. Using (12) we conclude that kC ν T4 kL2 = Op (λν ). 19 5. The last term is the most involved to bound and the reason why the previous four bounds involved C ν Ti . We begin by expressing 1 kT5 kC = kC 2 (C + λI)−1 (C − Cn )(hλ − ĥ)kL2 1 ≤ kC 2 (C + λI)−1 (C − Cn )C −ν kop kC ν (hλ − ĥ)kL2 . Here ν > 0 is chosen to satisfy 2r(1 − 2ν) > 1. Applying Lemma 3, we have that kT5 k2C ≤ 1 Op (1)kC ν (h − ĥ)k2L2 . nλ1/2r We have now, in some sense, looped back and are dealing with the term h − ĥ. Using (9) we have (14) kC ν (h − ĥ)kL2 ≤ kC ν T1 kL2 + kC ν T2 kL2 + kC ν T3 kL2 + kC ν T4 kL2 + kC ν T5 kL2 . The first four terms we already have bounds for, so we need only focus on the last, which again, has looped back to our original term. We now apply Lemma 2 to obtain kC ν T5 k2L2 = kC ν (C + λI)−1 (C − Cn )(h − ĥ)k2L2 ≤ 1 nλ 1 1−2ν+ 2r kC ν (h − ĥ)k2L2 . Combining the above with (14) we have that   1 ν ≤ kC ν T1 kL2 + kC ν T2 kL2 + kC ν T3 kL2 + kC ν T4 kL2 . kC (h − ĥ)kL2 1 − 1 1−2ν+ 2r nλ Using (12) it thus follows that kC ν (h − ĥ)kL2 = Op (1)(kC ν T1 kL2 + kC ν T2 kL2 + kC ν T3 kL2 + kC ν T4 kL2 ), and applying steps 1-4 we get that kC ν (h − ĥ)kL2 = Op (λν ) = op (1), and we finally have that kT5 kC = 1 1 nλ 2r op (1). We can now combine Steps 1-4, taking ν = 1/2, with step 5 to finally conclude that 2r <2n = kĥ − hk2C = λ2 Op (1) = n− 2r+1 Op (1). Combined with the results of Section A.3, this concludes the proof. 20 A.5 Auxiliary Lemmas Here we state four lemmas which are generalizations of ones used in Cai and Yuan (2012) and Wang and Ruppert (2015). Lemma 1. If Assumption 1 holds then for any 0 ≤ ν ≤ ν kC (C + λI) −1 fn kL2 = Op  1 2 nλ 1 1−2ν+ 2r − 1  2 . Lemma 2. Let Assumption 1 hold. Then for any ν > 0 such that 2r(1 − 2ν) > 1, we have that −1 ν kC (C + λI) (Cn − C)C −ν kop = Op  nλ 1 1−2ν+ 2r − 1  2 , where k.kop represents the usual operator norm i.e., kAkop = suph:khkL2 =1 kAhk. Lemma 3. Let Assumption 1 hold and fix 0 < ν < ν2 to be any two values that satisfy 2r(1−2ν) > 1 and 4r(ν2 + ν) > 1, then we have that −1 ν2 kC (C + λI) (Cn − C)C −ν kop = Op  nλ 1 1−2ν2 + 2r − 1  2 . Lemma 4. (Lemma 1, Cai and Yuan (2012)) For any 0 < ν < 1, kC ν (hλ − h)kL2 ≤ (1 − ν)1−ν ν ν λν khkL2 . Lemma 5. Fix ν > 0 and ν2 > 0 such that 4r(ν2 +ν) > 1. If there exist constants 0 < c1 < c2 < ∞ such that c1 k −2r < sk < c2 k −2r , then there exist constants c3 , c4 > 0 depending only on c1 , c2 such that −1 c4 λ 2r −1+2ν2 ≤ ∞ X j=1 2 +2ν s2ν j (λ + sj )1+2ν −1 ≤ c3 (1 + λ 2r −1+2ν2 ). Proof of Lemma 1 Recall that n fn = 1X n i=1 Z 0 1Z 1 0 1 2 i (t)kt,s,X dsdt. i (s) Using Parseval’s identity we have that kC ν (C + λI)−1 fn k2L2 = ∞ X k=1 21 ρ2ν k hfn , φk i2 . (λ + ρk )2 Taking expected values yields ∞ ν E kC (C + λI) −1 fn k2L2 ρ2ν 1X k = E n (λ + ρk )2 1Z 1 Z 0 k=1 0 2 1 2 (t)hkt,s,X(s) , φk iL2 dsdt . By Jensen’s inequality we have 1Z 1 Z 0 0 2 1 2 (t)hkt,s,X(s) , φk iL2 dsdt Z 1 Z 1 ≤ (t)hkt,s,X(s) , φk iL2 ds 0 Z 2 1 2 1Z 0 1Z 1 = 0 0 0 1 dt 1 ∗ 2 2 2 (t)hkt,s,X(s) , φk iL2 hkt,s ∗ ,X(s∗ ) , φk iL2 dsds dt. Using the assumed independence between  and X, as well as the assumption that E(2 (t)) ≤ M , where M is a constant, we obtain Z 1Z 1 E 0 0 2 1 2 (t)hkt,s,X(s) , φk iL2 dsdt 1Z 1Z 1 Z ≤ME 0 0 0  hkt,s,X(s) , φk iL2 hkt,s∗ ,X(s∗ ) , φk iL2 dsds dt 1 2 1 2 ∗ = M hC(φk ), φk i = M ρk . Since 0 ≤ ν ≤ 1 2 and both ρk and λ are positive, we can obtain the bound −1 ν E kC (C + λI) fn k2L2 ∞ ∞ ρ2ν+1 M X ρ2ν+1 M X k k ≤ ≤ . n (λ + ρk )2 nλ1−2ν (λ + ρk )1+2ν k=1 k=1 Now we apply Lemma 5 with ν2 = 1/2 to obtain E kC ν (C + λI)−1 fn k2L2 ≤ c∗ 1 nλ1−2ν+ 2r , where c∗ is a constant. An application of Markov’s inequality completes the proof. Proof of Lemma 2 By definition kC ν (C + λI)−1 (Cn − C)C −ν k2op = sup f :kf kL2 =1 kC ν (C + λI)−1 (Cn − C)C −ν f k2L2 . Fix f ∈ L2 such that kf kL2 = 1. We can expand f as f= ∞ X fk φk , k=1 By Parseval’s identity we have ν −1 kC (C + λI) (Cn − C)C −ν 2 fk = ∞ X j=1 " ∞ ρνj X fk ρ−ν k h(Cn − C)φk , φj iL2 ρj + λ 22 k=1 #2 . Applying the Cauchy-Schwartz inequality and using the fact that kf kL2 = 1 we have that !1/2 ∞ ∞ X X −ν −2ν 2 fk ρk h(Cn − C)φk , φj iL2 ≤ . ρk h(Cn − C)φk , φj iL2 k=1 k=1 So we can bound the operator norm as kC ν (C + λI)−1 (Cn − C)C −ν k2op ≤ ∞ X ∞ 2ν X ρ−2ν k ρj hφj , (Cn − C)φk i2L2 . (λ + ρj )2 k=1 j=1 Applying Jensen’s equality we get that 1  1  2 2 ∞ X ∞ ∞ X ∞ −2ν 2ν −2ν 2ν X X ρk ρj ρk ρj 2  2    hφj , (Cn − C)φk iL2 Ehφj , (Cn − C)φk iL2 E ≤ . (λ + ρj )2 (λ + ρj )2 k=1 j=1 k=1 j=1 Using the definition of Cn from (6) we have that Z 1 Z 1 Z 1 1 2 1 1 2 2 ∗ 2 2 Ehφj , (Cn − C)φk iL2 ≤ Ehφj , Cn φk iL2 = E hkt,s,X(s) , φj ihkt,s∗ ,X(s∗ ) , φk idsds dt . n 0 0 0 Note the first inequality follows from the fact that C is the mean of Cn and thus replacing C above with any other quantity cannot decrease it (since it is minimized when using C). One can show this using basic calculus arguments over Hilbert spaces, thus we omit the details here. By applying Cauchy-Schwartz inequality and Fubini’s theorem we have Ehφj , (Cn − C)φk i2L2 "Z Z #! 2 # "Z 1 Z 1 1 2 1 1 1 1 2 hkt,s,X(s) hkt2∗ ,s∗ ,X(s∗ ) , φk ids∗ dt∗ , φj ids dt ≤ E n 0 0 0 0 "Z 2 Z 1 1 2 # Z Z 1 1 1 1 1 2 E hkt,s,X(s) , φj ids hkt2∗ ,s∗ ,X(s∗ ) , φk ids∗ dtdt∗ . = n 0 0 0 0 Using Cauchy-Schwartz inequality again Ehφj , (Cn − C)φk i2L2 Z 1 1 Z 1 1 4 4 Z Z 1 1 1 1 1 ∗ 2 2 ≤ E2 hkt,s,X(s) , φj ids E 2 hkt∗ ,s∗ ,X(s∗ ) , φk ids dtdt∗ . n 0 0 0 0 Note that we can move to the K inner product to obtain: 1 1/2 1/2 2 , φk iL2 = hkt,s,X(s) , Lk φk iK = (Lk φk )(t, s, X(s)) hkt,s,X(s) and L1/2 φk is a function in K, thus we can apply Assumption 1.4 to obtain "Z Z # 2 # "Z 1 Z 1 1 2 1 1 1 c 2 Ehφj , (Cn − C)φk i2L2 ≤ E hkt,s,X(s) , φj ids dt E hkt2∗ ,s∗ ,X(s∗ ) , φk ids∗ dt∗ . n 0 0 0 0 23 It is easy to see that "Z 1 Z 1 E 0 0 2 1 2 hkt,s,X(s) , φj ids # dt = ρj . Now we obtain Ehφj , (Cn − C)φk i2L2 ≤ cn−1 ρj ρk . Therefore, 1  1  2 2 1−2ν 1+2ν ∞ X ∞ ∞ X ∞ 2ν X X ρ ρ ρ−2ν ρ c j j k k  . hφj , (Cn − C)φk iL2  ≤  E (λ + ρj )2 n (λ + ρj )2 k=1 j=1 k=1 j=1 Note that ∞ X ∞ X ρ1+2ν ρ1−2ν j k k=1 j=1 (λ + ρj )2 = ∞ X ρ1−2ν k k=1 ∞ X ρ1+2ν j j=1 (λ + ρj )2 . Since 2r(1 − 2ν) > 1 and ρk < c2 k −2r we have ∞ X ≤ c2 ρ1−2ν k ∞ X k −2r(1−2ν) = c∗∗ < ∞. k=1 k=1 Finally, by applying Lemma 5 with ν2 = 1/2 we obtain 1 1 E kC ν (C + λI)−1 (Cn − C)C −ν kop ≤ γ(nλ1−2ν+ 2r )− 2 , An application of Markov’s inequality completes the proof. Proof of Lemma 3 Recall that kC ν2 (C + λI)−1 (Cn − C)C −ν k2op = sup h:khkL2 =1 kC ν2 (C + λI)−1 (Cn − C)C −ν hk2L2 . Note that C ν2 (C + λI)−1 = ∞ X ρνj 2 j=1 ρj + λ (φj ⊗ φj ), and recall that from the proof of Lemma 2, (Cn − C)C −ν h= ∞ X k=1 24 ak ρ−ν k (Cn − C)φk . Therefore −1 ν2 C (C + λI) (Cn − C)C −ν h= ∞ X ρνj 2 ρj + λ j=1 h ∞ X ak ρ−ν k (Cn − C)φk , φj iL2 φj . k=1 By Parseval’s identity we obtain kC ν2 (C + λI)−1 (Cn − C)C −ν k2op = ∞ X ρνj 2 " j=1 ρj + λ h ∞ X #2 ak ρ−ν k (Cn − C)φk , φj iL2 k=1 By Cauchy-Schwartz inequality and using the same steps in the proof of Lemma 2, we have ν2 kC (C + λI) −1 (Cn − C)C −ν k2op ≤ 2ν2 ∞ X ∞ X ρ−2ν k ρj k=1 j=1 (λ + ρj )2 hφj , (Cn − C)φk i2L2 . Using the same arguments in the proof of Lemma 2, we obtain  1  1 2 2 2ν2 1−2ν 1+2ν2 ∞ X ∞ ∞ X ∞ X X ρ ρ−2ν ρ ρ c j j k k  . E hφj , (Cn − C)φk iL2  ≤  (λ + ρj )2 n (λ + ρj )2 k=1 j=1 k=1 j=1 Note that ∞ X ∞ 2 X ρ1−2ν ρ1+2ν j k (λ + ρj )2 k=1 j=1 = ∞ X ρ1−2ν k ∞ 2 X ρ1+2ν j j=1 k=1 (λ + ρj )2 . 1 Note that the condition 2r(1 − 2ν) > 1 implies ν < 12 − 2r < 12 . We therefore have   λ + ρj 2ν−1 ≤ 1. ρj It follows that ∞ X ∞ 2 X ρ1+2ν ρ1−2ν j k (λ + ρj )2 k=1 j=1 ≤ ∞ X ρk1−2ν ∞ X j=1 k=1 2 ρ2ν+2ν j (λ + ρj )2ν+1 . Recall that ∞ X ρ1−2ν k k=1 ≤ c2 ∞ X k −2r(1−2ν) = c∗∗ < ∞. k=1 Therefore  −1 ν2 E kC (C + λI) (Cn − C)C −ν kop ≤  ∞ cc∗∗ X n j=1 1 2 2 ρ2ν+2ν j (λ + ρj )2ν+1  . By applying Lemma 5 we have that 1 1 1 E kC 2 (C + λI)−1 (Cn − C)C −ν kop ≤ β(nλ 2r +1−2ν2 )− 2 , where β is a constant. An application of the Markov inequality completes the proof. 25 A.6 Proof of Lemma 5 Using the same arguments as in Cai and Yuan (2012), we get that ∞ X j=1 2 +2ν s2ν j (λ + sj )1+2ν = ≤ ∞ X j=1 ∞ X j=1 s1+2ν j (λ + sj )1+2ν sj2ν2 −1 c1+2ν k −2r(1+2ν) −2r(2ν2 −1) 1 k (λ + c2 k −2r )1+2ν = c1+2ν 1 ∞ X j=1 ≤ c1+2ν 1 = c1+2ν 1 k −2r(2ν2 −1) (λk 2r + c2 )1+2ν ! x−2r(2ν2 −1) dx (λx2r + c2 )1+2ν 1 ! Z ∞ −2r(2ν2 −1) y 1 + λ2ν2 −1−1/2r dy . 2r 1+2ν c2 λ1/2r (y + c2 ) 1 + c2 Z ∞ For the integral to be finite, it is enough if 2r(2ν2 + 2ν) ≥ 1 + δ, for some δ > 0, as the integrand will go to zero faster than y −(1+δ) . The argument for the lower bound follows the same arguments. 26 References A. Berlinet and C. Thomas-Agnan. Reproducing Kernel Hilbert spaces in Probability and Statistics. Springer Science & Business Media, 2011. T. T. Cai and M. Yuan. Minimax and adaptive prediction for functional linear regression. Journal of the American Statistical Association, 107(499):1201–1216, 2012. Y. Fan, G. M. James, and P. Radchenko. Functional additive regression. The Annals of Statistics, 43(5):2296–2325, 2015. R. Gabrys, L. Horváth, and P. Kokoszka. Tests for error correlation in the functional linear model. Journal of the American Statistical Association, 105(491):1113–1125, 2010. T. Hastie and R. Tibshirani. Generalized additive models. Wiley Online Library, 1990. L. Horváth and P. Kokoszka. Inference for functional data with applications, volume 200. Springer, 2012. L. Horváth, P. Kokoszka, and G. Rice. Testing stationarity of functional time series. Journal of Econometrics, 179(1):66–82, 2014. G. M. James and B. W. Silverman. Functional adaptive model estimation. Journal of the American Statistical Association, 100(470):565–576, 2005. H. Kadri, E. Duflos, P. Preux, S. Canu, and M. Davy. In Y. W. Teh and M. Titterington, editors, Proceedings of the Thirteenth International Conference on Artificial Intelligence and Statistics, volume 9 of Proceedings of Machine Learning Research, pages 374–380, 2010. R. A. Kennedy and P. Sadeghi. Hilbert Space Methods in Signal Processing. Cambridge University Press, 2013. J. S. Kim, A.-M. Staicu, A. Maity, R. J. Carroll, and D. Ruppert. Additive function-on-function regression. Journal of Computational and Graphical Statistics, (Accepted), 2017. G. S. Kimeldorf and G. Wahba. Some results on Tchebycheffian spline functions. Journal of Mathematical Analysis and Applications, 33:82–95, 1971. P. Kokoszka and M. Reimherr. Predictability of shapes of intraday price curves. The Econometrics Journal, 16(3):285–308, 2013. 27 P. Kokoszka and M. Reimherr. Introduction to Functional Data Analysis. CRC Press, 2017. H. Lian. Nonlinear functional models for functional responses in reproducing kernel Hilbert spaces. Canadian Journal of Statistics, 35(4):597–606, 2007. H. Ma and Z. Zhu. Continuously dynamic additive models for functional data. Journal of Multivariate Analysis, 150:1–13, 2016. J. S. Morris. Functional regression. Annual Review of Statistics and Its Application, 2:321–359, 2015. H.-G. Müller, Y. Wu, and F. Yao. Continuously additive models for nonlinear functional regression. Biometrika, pages 607–622, 2013. J. G. Nicholas. Market neutral investing. Bloomberg Press Princeton, NJ, 2000. A. Parodi and M. Reimherr. FLAME: Simultaneous variable selection and smoothing for functionon-scalar regression. Technical report, Pennsylvania State University, 2017. C. Preda. Regression models for functional data by reproducing kernel Hilbert spaces methods. Journal of Statistical Planning and Inference, 137(3):829–840, 2007. J. O. Ramsay and B. Silverman. Functional data analysis. Wiley Online Library, 2006. J. O. Ramsay, G. Hooker, and S. Graves. Functional Data Analysis with R and MATLAB. Springer Science & Business Media, 2009. F. Scheipl, A.-M. Staicu, and S. Greven. Functional additive mixed models. Journal of Computational and Graphical Statistics, 24(2):477–501, 2015. X. Sun, P. Du, X. Wang, and P. Ma. Optimal penalized function-on-function regression under a reproducing kernel Hilbert space framework. Journal of the American Statistical Association, page Accepted, 2017. K. G. van den Boogaart. tensorA: Advanced tensors arithmetic with named indices. R package version 0.31, URL http://CRAN. R-project. org/package= tensorA, 2007. X. Wang and D. Ruppert. Optimal prediction in an additive functional model. Statistica Sinica, 25:567–589, 2015. 28 H. Zhu, F. Yao, and H. H. Zhang. Structured functional additive regression in reproducing kernel Hilbert spaces. Journal of the Royal Statistical Society: Series B (Statistical Methodology), 76 (3):581–603, 2014. 29
10math.ST
Positioning via Direct Localization in C-RAN Systems Seongah Jeong1, Osvaldo Simeone2 , Alexander Haimovich2, Joonhyuk Kang3,* arXiv:1511.07637v3 [cs.IT] 18 May 2017 1 School of Engineering and Applied Sciences (SEAS), Harvard university, 29 Oxford street, Cambridge, MA 02138, USA 2 Department of Electrical & Computer Engineering, New Jersey Institute of Technology (NJIT), Newark, NJ 07102, USA 3 Department of Electrical Engineering, Korea Advanced Institute of Science and Technology (KAIST), 291, Daehak-ro, Yuseong-gu, Daejeon 34141, Korea * [email protected] Abstract: Cloud Radio Access Network (C-RAN) is a prominent architecture for 5G wireless cellular system that is based on the centralization of baseband processing for multiple distributed radio units (RUs) at a control unit (CU). In this work, it is proposed to leverage the C-RAN architecture to enable the implementation of direct localization of the position of mobile devices from the received signals at distributed RUs. With ideal connections between the CU and the RUs, direct localization is known to outperform traditional indirect localization, whereby the location of a source is estimated from intermediary parameters estimated at the RUs. However, in a C-RAN system with capacity limited fronthaul links, the advantage of direct localization may be offset by the distortion caused by the quantization of the received signal at the RUs. In this paper, the performance of direct localization is studied by accounting for the effect of fronthaul quantization with or without dithering. An approximate Maximum Likelihood (ML) localization is developed. Then, the Cramér-Rao Bound (CRB) on the squared position error (SPE) of direct localization with quantized observations is derived. Finally, the performance of indirect localization and direct localization with or without dithering is compared via numerical results. 1. Introduction Positioning of radio frequency (RF) sources by nodes of a wireless network is currently an active research area due to its relevance in Global Positioning System (GPS)-denied environments, such as military applications, indoors localization, disaster response, emergency relief, surveillance and tactical systems [1]-[12]. The importance of the topic is attested by the recent Federal Communications Commission (FCC) specification for indoor positioning accuracy [13] and by the inclusion of various localization techniques in the Long Term Evolution (LTE) standard [14]. The traditional 1 approach to source localization has been indirect, or two-step, localization. Accordingly, a set of distributed base stations (BSs) estimates position-related parameters, such as time of arrival (TOA) [1]-[5], [7], time difference of arrival (TDOA) [1], [3], angle of arrival (AOA) [1], [4], [6]-[11] or received signal strength (RSS) [4], [12]. The estimated parameters are then transmitted to a control unit (CU) that determines the source’s position. For instance, in LTE, positioning is based on TDOA in the uplink, which is referred to as uplink TDOA (UTDOA) [14]. Cloud radio access network (C-RAN), a cloud-based network architecture, has emerged as a leading technology for 5G and beyond [15]. In C-RANs, BSs are connected to a CU by means of so called fronthaul links, as shown in Fig. 1. The fronthaul links carry sampled and quantized baseband signals to and from the CU. Thanks to the fronthaul links, the CU can carry out all baseband processing on behalf of the connected BSs. Since the BSs implement only radio functionalities, they are typically referred to as radio units (RUs). C-RANs hence enable the joint processing at the CU of the signals received by the RUs, making it possible to implement direct, or one-step, localization [1], [3], [7]-[11], whereby the source’s position is determined directly from the received signals at the RUs. The concept of direct localization was first introduced by Wax and Kailath [10] in the 1980s. However, it was only recently that efficient algorithms were proposed for its implementation [1]. With ideal fronthaul links, direct localization can generally outperform indirect localization [1], [7]-[9]. However, in a C-RAN, due to the limited capacity of the fronthaul links, the baseband signals received by the RUs are quantized prior to transmission to the CU. In this work, we study the performance of direct localization by accounting for the distortion caused by fronthaul quantization. While in [1], [7]-[11], direct localization in C-RAN systems was studied by assuming ideal compression within an information-theoretic framework, here we consider a more practical 2 scenario in which the RUs perform scalar quantization as in state-of-the-art C-RAN systems. In particular, in considered C-RAN systems, fronthaul transmission is based on scalar quantization that allows for an arbitrary additive dither. Dithering, that is the addition of a random offset, known at the receiver, prior to quantization, is known to provide potential gains over conventional quantization [16], [17]. In the context of distributed detection, as for the C-RAN systems at hand, the performance gain of dithering can be ascribed to the capability to effectively enhance the resolution of the observation at the CU. To see this, consider the case in which each RU has a one-bit threshold quantizer per quadrature component. The use of independent random dithering at the RUs allows each RU to effectively use a different, and randomly selected, threshold for quantization, hence improving the resolution of the effective quantizer between the RUs and the CU. The main contributions of this paper are summarized as follows. • To the best of our knowledge, this is the first work in the literature, except our prior work [3], to analyze direct localization in C-RAN with limited capacity links. Unlike the informationtheoretic analysis of [3], here we assume practical fronthaul processing based on scalar quantization, enabling also dithering. • We derive an approximate Maximum Likelihood (ML) solution for direct localization in CRAN system. • We derive the Cramér-Rao Bound (CRB) on the accuracy of direct localization by taking into account the impact of quantization. The analysis allows us to analytically quantify the performance loss caused by the fronthaul quantization. We also show that for asymptotically large fronthaul capacity, that CRB tends to that of direct localization from unquantized received signals. 3 • The performances of the proposed direct localization schemes with and without dithering are compared with direct and indirect localization via ideal fronthaul links as well as with the relevant CRBs in C-RAN systems, via numerical results. In the following, after introducing the system and signal models, we shortly overview indirect localization in Section 2. Novel direct localization schemes based on approximate ML are proposed for the C-RAN system in Section 3, and the analytical performance of direct localization via CRB is derived in Section 4. Numerical examples and concluding remarks are presented in Section 5 and Section 6, respectively. 2. System, Signal Models and Preliminaries In this section, we describe system and signal models, and review indirect localization. 2.1. System Model We consider the C-RAN system illustrated in Fig. 1, which consists of a single active source, Nr distributed RUs and a CU. The RUs may consist of different types of infrastructure nodes such as macro/femto/pico base stations, relay stations or distributed antennas, and the source may be a mobile device. Each RU is equipped with an M-element antenna array, while the source is a single-antenna node. The set of RUs, denoted as Nr = {1, . . . , Nr }, is located within a D × D square area, and all the RUs are assumed to be synchronous (e.g., via GPS). The source is located at a position p = [x y]T , which is known a priori to lie in a given region A contained within overall square region. Each RU j ∈ Nr is located at a position p j = [xj yj ]T , and the positions of all RUs are assumed to be known to the CU. The distance and angle between the source and RU j are defined as dj (pp) = kpp − p j k,   y − yj −1 φj (pp) = tan , x − xj 4 (1a) (1b) D đ đ A p [ x y ]T D đ M đ pj [ x j y j ]T Bj đ Control unit (CU) : Radio unit (RU) : Source : Fronthaul Fig. 1. Illustration of the considered C-RAN system used for localization. respectively. We assume far-field conditions, namely that the array aperture is much smaller than the distance dj (pp). The RUs are connected to the CU via finite-capacity fronthaul links, and the CU aims at locating the source based on quantized data transmitted from the RUs to the CU over the fronthaul links. Specifically, each RU j sends a message at a rate of Bj bps/Hz to the CU, where the normalization is with respect to the bandwidth of the signal transmitted by the source, as we will further discuss below. Note that the fronthaul links can be either wireless, e.g., a microwave link, or wired, e.g., a coaxial cable or a fiber optics link. 2.2. Signal Model The source transmits a scaled version of a baseband waveform s(t) with unit energy and single sided bandwidth W Hz at an unknown time t0 . The waveform s(t) is known to the CU and it may represent a training or synchronization signal. During the observation time T , the M × 1 received 5 signal vector at the RU j ∈ Nr is hence expressed as r j (t) = bj α j (pp)s(t − τj (pp) − t0 ) + z j (t), 0 ≤ t ≤ T, (2) where bj is an unknown complex scalar coefficient whose average power E[|bj |2 ] is only available at the CU and that describes the channel attenuation from the source to RU j; α j (pp) is the antenna array response of RU j, which, assuming a uniform linear antenna array (ULA) at each RU, is given √ by α j (pp) = 1/ M[1 e−i2π∆A cos φj (pp)/λ · · · e−i2π(M −1)∆A cos φj (pp)/λ ]T , with the wavelength of the signal λ and the antenna separation ∆A ; τj (pp) is the propagation delay along the path between the source and RU j, which depends on the source’s position as τj (pp) = dj (pp)/c, with the propagation speed c; and z j (t) represents the contribution of noise and interference whose components are assumed to a zero-mean, white, complex Gaussian stochastic process with power σj2 . We assume that the source moves slowly enough and that the observation time T is sufficiently long so that the inequality T ≫ maxj∈Nr τj (pp) + t0 is satisfied. After sampling at Nyquist rate, the discrete-time received signal (2) is given as r j [n] , r j (nTs ) = bj α j (pp)sj [n] + z j [n], 0 ≤ n ≤ Ns − 1, (3) where Ts = 1/2W is the sampling period; Ns = ⌈T /Ts ⌉ is the number of time samples; and the sampled versions of the signal and the noise are denoted sj [n] , s(nTs − τj (pp) − t0 ) and z j [n] , z j (nTs ), respectively. Taking the discrete Fourier transform (DFT) of the discrete signal (3), the received signal is expressed in the frequency domain as R j (k) = bj α j (pp)S(k)e−iwk (τj (pp)+t0 ) + Z j (k), 0 ≤ k ≤ Ns − 1, (4) where wk = 2πk/(Ns Ts ); and R j (k), S(k) and Z j (k) indicate the DFT coefficients of the respective time-domain signals r j [n], s(nTs ), and z j [n]. Given the assumptions above, we have the 6 equality PNs −1 k=0 |S(k)|2 = 1, and the DFT coefficients of the noise Z j (k) are uncorrelated and have the power σj2 , for 0 ≤ k ≤ Ns − 1. We observe that, in (4), the information about the source’s location is embedded in two ways in the received signal, namely in time delay τj (pp) and in the array response α j (pp). The RUs quantize and forward the received signals in (4) to the CU for positioning under the fronthaul constraint. As a practical solution, prescribed, e.g., by the CPRI standard [19], we assume that each RU applies the same uniform quantizer for all frequencies and antennas. To evaluate the localization accuracy, we adopt the SPE [2], [3], [18]   ρ = E kp̂p − p k2 , (5) as the performance criterion of interest, where p̂p is the estimated source’s position. 2.3. Indirect Localization in C-RAN In the conventional, indirect localization method, each RU j estimates the parameters τj (pp) + t0 and φj (pp), which are referred to as TOA and AOA measurements, respectively. Subsequently, these estimates are sent to the CU, which locates the source, for example, by maximum likelihood based on TOA and AOA estimates, where the dependence on the unknown parameter t0 can be eliminated. Note that, under fronthaul capacity constraints, the TOA and AOA measurements at RU j should be quantized prior to transmission to the CU. Nevertheless, assuming that the number of samples Ns is large enough, the number of bits Ns Bj available for quantization of the estimates is large enough to make the corresponding distortion due to quantization negligible. 3. Direct Localization in C-RAN Here, we derive an approximate ML solution for direct localization in C-RAN system with limited fronthaul links, for which a practical fronthaul processing is considered based on scalar quantiza7 tion with dithering. The approximation is taken so as to account for the effect of scalar quantization and for the optimal solution of the likelihood function, whose details are discussed as follows. With direct localization, the position of the source is estimated directly from the signals at the RUs [1], [3], [7]-[9]. Due to the fronthaul capacity limitation of the C-RAN system, we assume that each RU j sends the quantized version of the received signal R j (k) in (4) to the CU over limited-capacity fronthaul links with Bj bits per sample. The CU performs localization based on the quantized signals. Specifically, as discussed below, we adopt a standard uniform dithered quantization [16], [17], where the dither is known to the CU. The addition of a dither signal is known to potentially improve the accuracy of a quantized signal as discussed in Section 1. Scalar quantization at RU j operates on the dithered signal R j (k) + D j (k), (6) where D j (k) is a dither signal, independent of the received signal R j (k). Quantization uses Bj /2M bits, or equivalently Lj = 2Bj /2M quantization levels, for either the real or imaginary parts of the dithered signal (6) at any of the M received antennas. The dynamic range [−Rjmax , Rjmax ] of the quantizer applied at each RU j is fixed, and may be based on preliminary Monte Carlo experiments aimed at guaranteeing that the peak-to-peak interval includes the received signals Rj (k)} with high probability, when considering a given random distribution of the source, and {R of the channel coefficients, as well as the distribution of the noise (see also Section 5). Each real R j (k) in the set of and imaginary entry of the dithered signal (6) is quantized to the closest value R̂ representation points {−Rjmax + (l − 1)∆j } for l = 1, . . . , Lj , where ∆j = 2Rjmax /(Lj − 1) is the step size of the quantizer. We take the dithers D j (k) to be independent and uniformly distributed in the interval [−∆j /Ij , ∆j /Ij ], where Ij is a parameter that can be chosen to minimize the SPE (5). 8 Rj (k)} of the dithered received signal, i.e., of {R Rj (k)+ The CU recovers the quantized versions {R̂ D j (k)}, from all RU j ∈ Nr . Then, it subtracts the dither to obtain Rj (k) = R̂ Rj (k) − D j (k). R̃ (7) Rj (k)} Differently from [1], [7]-[9], the estimator under consideration is applied to the signals {R̃ Rj (k)} due to the limited fronthaul capacity. We are in (7), rather than to the received signals {R Rj (k)} interested in approximating the ML estimate of the position p based on the received signal {R̃ in (7). To this end, we account for the effect of quantization as an additive Gaussian noise term, as in Rj (k) = R j (k) + Q j (k), R̃ (8) where Q j (k) represents the quantization noise whose components have the zero-mean Gaussian 2 distribution with the variance σq,j (k). In this way, from (4), the effective Gaussian noise on the Rj (k)} of RU j is given by Z j (k) + Q j (k), whose entries are distributed i.i.d. as observation {R̃ 2 zero-mean complex Gaussian variables with variance γj2 (k) = σj2 (k) + σq,j (k). With reference to (7), an approximate ML estimate of the unknown parameters ({bj }, t0 , p ) is hence obtained by solving the problem minimize Nr X Cj (bj , t0 , p ), (9) j=1 with Cj (bj , t0 , p ) = N s −1 X k=0 1 Rj (k) − bj α j (pp)S(k)e−iwk (τj (pp)+t0 ) R̃ 2 γj (k) 2 (10) over the position p , the transmit time t0 and the channel attenuation parameters {bj }. 2 2 To evaluate the power of the quantization noise σq,j (k), and hence γj2 (k) = σj2 (k) + σq,j (k), as a function of the fronthaul capacity Bj , we leverage arguments from rate-distortion theory [20]. 9 Note that this provides an approximation of the effect of quantization since scalar quantization is adopted here, as opposed to the vector quantization with arbitrarily large blocks that is assumed in 2 rate-distortion theory. This approximation allows us to compute σq,j (k) as the value that guarantees the equality [21, eq. (10.11)] Rj (k)]m ; [R̃ Rj (k)]m ) = I([R Bj , M (11) Rj (k)]m ; [R̃ Rj (k)]m ) is the mutual information between the input of the quantizer and its where I([R Rj (k)]m to be distributed output, after subtraction of the dither. In order to evaluate (11), we take [R as CN (0, E[|bj |2 ]|S(k)|2 + σj2 ), hence treating the parameter bj as complex Gaussian with zero mean and power E[|bj |2 ], i.e., Rayleigh fading. The net effect of these choices is that the weights 1/γj2 (k) in (10) are given by γj2 (k) = σj2 + Rj (k)]m |2 ] E[|[R 2 Bj M −1 = σj2 + E[|bj |2 ]|S(k)|2 + σj2 2 Bj M . (12) −1 As per (12), the weight given to each RU j in (10) increases with the capacity Bj of its fronthaul link. The minimization (9) is first solved over the amplitude parameter bj for fixed (t0 , p ), yielding b∗j (t0 , p ) = argmin bj = = Nr X Cj (bj , t0 , p ) j=1 1  γ H γ S j (t0 , p ) ⊗ α j (pp) R̃ Rj , S̄ 2 γ S j (t0 , p ) S̄ 1 γ S j (t0 , p ) S̄ α j (pp)k2 kα  γ H γ p Rj , S R̃ 2 S̄ j (t0 , p ) ⊗ α j (p ) (13) γ γ Rj = S j (t0 , p ) = [S(0)e−iw0 (τj (pp)+t0 ) /γj (0) · · · S(Ns − 1)e−iwNs −1 (τj (pp)+t0 ) /γj (Ns − 1)]T ; R̃ where S̄ T T Rj (0)/γj (0) · · · R̃ Rj (Ns − 1)/γj (Ns − 1)]T ; and the last equality can be obtained by recalling that [R̃ α j (pp)k2 = 1 for j ∈ Nr . By substituting (13) in (10) and simplifying the notation as we have kα γ γ S j k2 = kS̄ S j (t0 , p )k2 = kS̄ PNs −1 k=0 |S(k)|2 /γj2 (k), we obtain that the minimization (9) is equivalent 10 to the problem maximize C̃(t0 , p ), (14) with Nr s −1 iw (τj (p X p) NX αH e k p)+t0 ) S ∗ (k) j (p p R(k) C̃(t0 , ) = R̃ γ 2 γ (k) S S̄ j j j=1 k=0 = = S H U (pp) z H (t0 )S Nr X 2 2 (15a) (15b) 2 V j (pp) , z H (t0 )V (15c) j=1 γ u1 (pp)/kS̄ S1k where z (t0 ) = [1 e−iw1 t0 · · · e−iwNs −1 t0 ]T ; S = diag{S(0), . . . , S(Ns −1)}; and U (pp) = [u γ p)R̃ Rj (0)/γj2 (0) S Nr k], with u j (pp) = [eiw0 τj (pp) α H · · · u Nr (pp)/kS̄ j (p p)R̃ R j (Ns −1) · · · eiwNs −1 τj (pp)α H j (p /γj2 (Ns − 1)]T ; and V j (pp) is the jth column of V (pp) = S H U (pp). Since the vector z (t0 ) in (15c) has the structure of a column of a Ns -point Discrete Fourier Transform (DFT), the evaluation of (15c) for different potential value of t0 can be computed by means of Fast Fourier Transform (FFT), allowing us to efficiently estimate t0 in the following way [1], [7]. Define a grid of possible values for t0 as {0, 1, . . . , qt0 Ns − 1}Ts /(qt0 Ns ), where qt0 is an integer that determines the resolution of the estimate of t0 . Apply the qt0 Ns -point FFT matrix F to F ]k,n = e−i2π(k−1)(n−1)/(qt0 Ns ) for 1 ≤ k, n ≤ qt0 Ns , with each column V j (pp) for j ∈ Nr , where [F A]k,n defining the (k, n)th element of matrix A . Note that, when qt0 ≥ 2, each vector V j (pp) is [A padded with trailing zeros to length qt0 Ns . Then, the maximization (14) can be carried out jointly over t0 and p , yielding the position estimate p ∗ , by solving the following problem  "N #  r   X F V j (pp)|2 p ∗ = argmax max |F , p 1≤k≤qt0 Ns  j=1 (16) k where [aa]k is the kth element of vector a ; and | · | represents the entry-wise absolute value of its argument. 11 In summary, the proposed solution is referred to an approximate ML because (i) the effect of scalar quantization in approximated by a Gaussian noise term in (8), whose variance is obtained by means of rate-distortion arguments; (ii) the optimization over t0 is obtained by means of the grid search described above. 4. CRB for Direct Localization In this section, we derive the CRB [18] on the SPE (5) for the direct localization. The CRB in the presence of dithering generally depends on the distribution of the dither and its calculation appears to be intractable. Nevertheless, in the high SNR regime, where the CRB becomes tight, the impact of dithering is less pronounced. For these reasons, we concentrate here on the derivation of the CRB for standard quantization without dithering. The CRB provides a lower bound on the SPE (5) as  ρ ≥ tr J −1 (pp) , (17) where J (pp) is the Equivalent Fisher Information Matrix (EFIM) [2], [3] for the estimation of the source’s position p . To elaborate, we denote the uniform quantization function at RU j as Qj (x) = {l|qj,l−1(∆j ) < x ≤ qj,l (∆j ); l = {1, . . . , Lj }}, where qj,l (∆j ) = −Rjmax + (l − 0.5)∆j is the lth quantization threshold for the RU j with qj,0 = −∞ and qj,Lj = ∞. The signal S = {S(k)} is known to the CU, and we also assume that the transmit time t0 is known in order to obtain a lower bound on the SPE. The probability of the quantized signals available at the CU for a given unknown parameter ℑ T vector θ = [ppT bT1 · · · bTNr ]T with bj = [bℜ j bj ] is then given as R; θ ) = P (R̂ M Nr NY s −1 Y Y Lj Y Y ζ Rj (k)]m )−l) R ζj (k)]m ); θ j )δ(Qj ([R Pj,l (Qj ([R , j=1 k=0 m=1 ζ∈{ℜ,ℑ} l=1 12 (18) T T T T Rj (Ns − 1)]T ; δ(·) is the Kronecker-delta funcRj = [R̂ Rj (0) · · · R̂ RNr ]T with R̂ R = [R̂ R1 · · · R̂ where R̂ Rζj (k)]m ); θ j ) is the probability that tion, i.e., δ(0) = 1 and δ(x) = 0 for x 6= 0; and Pj,l (Qj ([R Rℜ Rℑ either the real or imaginary part of the received signal, [R j (k)]m or [R j (k)]m , for the mth antenna Rζj (k)]m ) = l, at the RU j takes on a specific value l among the Lj quantization levels, i.e., Qj ([R given as Rζj (k)]m ); θ j ) Pj,l(Qj ([R =Φ ζ qj,l (∆j ) − fj,k,m (θθ j ) √ σj / 2 ! −Φ ζ qj,l−1(∆j ) − fj,k,m (θθ j ) √ σj / 2 ! , (19) with ζ being the parameter to indicate the real and imaginary part of the signal as ζ ∈ {ℜ, ℑ} and θ j = [ppT b Tj ]T . In (19), Φ(·) is the complementary cumulative distribution function of the standard Gaussian distribution Φ(x) = Rx 2 /2 e−t −∞ √ / 2πdt, and we have defined the noiseless received α j (pp)]m S(k)e−iwk (τj (pp)+t0 ) . signal (see (4)) as fj,k,m(θθ j ) = bj [α R; θ ), and the FIM J (θθ ) for the unknown The log-likelihood function is given by L(θθ ) = ln P (R̂ T θ )] [18]. The CRB in (17) can be then parameter vector θ can be written as J (θθ ) = −ER̂ R [∇θ ∇θ L(θ obtained from the EFIM for the location p , which is given as J (pp) = X − Y Z −1Y T , (20) J (θθ )](1:2,1:2) ; Y = [J J (θθ )](1:2,3:2Nr +2) ; and Z = [J J (θθ )](3:2Nr +2,3:2Nr +2) , with [A A](a:b,c:d) where X = [J being the sub-matrix of A corresponding to from the ath to the bth rows and from the cth to the dth columns. In Appendix 9.1, we calculate these matrices as X = P Nr T j=1 U j Ψ j U j ; Y = V Ψ 1V T , . . . , V ΨNr V T }, where V = [002 02 I 2 ]; U j = U 1Ψ1V T · · · U Nr ΨNr V T ]; and Z = diag{V [U [cos φj (pp)/c − sin φj (pp)/dj (pp) 0 T2 ; sin φj (pp)/c cos φj (pp)/dj (pp) 0 T2 ]; and the matrix Ψ j repre- 13 sents the FIM of RU j with respect to θ̃θ j = [τj (pp) φj (pp) b Tj ]T and is defined as Ψj ]p,q = [Ψ 2  ζ ζ ζ ζ X Γj,k,m,l − Γj,k,m,l−1 ∇[θ̃θ j ]p fj,k,m(θθ j )∇T[θ̃θ j ]q fj,k,m(θθ j ) Rζj (k)]m ); θ j ) πσj2 Pj,l (Qj ([R k,m,ζ,l , (21) for 1 ≤ p, q ≤ 4, with being zero if the corresponding parameters are orthogonal, − ζ θ j )) (θ (qj,l (∆j )−fj,k,m σ2 j Γζj,k,m,l = e 2 , (22) and the required derivatives ℜ ∇τj (pp) fj,k,m (θθ j ) = Re{−iwk fj,k,m(θθ j )} ℑ ∇τj (pp) fj,k,m (θθ j ) = Im{−iwk fj,k,m(θθ j )}   i2π∆A sin φj (pp)(m − 1)fj,k,m(θθ j ) ℜ ∇φj (pp) fj,k,m(θθ j ) = Re λ   p i2π∆A sin φj (p )(m − 1)fj,k,m(θθ j ) ℑ ∇φj (pp) fj,k,m(θθ j ) = Im λ ℜ ∇bℜj fj,k,m (θθ j ) = Re{[αj (pp)]m S(k)e−iwk (τj (pp+t0 )) } ℑ ∇bℜj fj,k,m (θθ j ) = Im{[αj (pp)]m S(k)e−iwk (τj (pp+t0 )) } ℜ ∇bℑj fj,k,m (θθ j ) = −Im{[αj (pp)]m (k)e−iwk (τj (pp+t0 )) } ℑ ∇bℑj fj,k,m (θθ j ) = Re{[αj (pp)]m S(k)e−iwk (τj (pp+t0 )) }. (23) It is noted that the CRB in (17) with the EFIM in (20) is increased by the presence of quantization as compared to the CRB of direct localization with unquantized signals derived in [8], [9], which is defined with the same EFIM J (pp) in (20) except for the different FIM Ψ j of each RU j calculated with the nonzero elements for the non-orthogonal parameters as Ψj ]p,q = [Ψ X 2 ζ ∇ f ζ (θθ )∇T[θ̃θ j ]q fj,k,m (θθ j ). 2 [θ̃θ j ]p j,k,m j σ j k,m,ζ (24) We can compare the FIM Ψ j of RU j for quantized signals in (21) and for unquantized signals 14 in (24) that appear in the EFIM J (pp), in the low SNR regime, where the power of channel noise is much larger than that of the desired signal, i.e., σj ≫ |fj,k,m(θθ j )|. For this purpose, we assume that all the RUs have the same fronthaul capacity constraints Bj = B and that the channel noise power satisfies σj2 = σ 2 for j ∈ Nr . Thus, we use the same uniform quantization with L = 2B/2M quantization levels and quantization threshold {ql (∆)} for all RUs, for 1 ≤ l ≤ L. Then, the FIM Ψ j of RU j in (21) for quantized case can be approximated as Ψj ]p,q = LQ [Ψ X 2 ζ ζ (θθ )∇T[θ̃θ j ]q fj,k,m ∇[θ̃θ j ]p fj,k,m (θθ ), 2 σ k,m,ζ (25) where, by comparison to (24) in the unquantized case, the factor LQ can be interpreted as the quantization loss of the CRB for quantized signals and is defined as  2 2 q 2 (∆) q (∆) − l 2 − l−12 e σ −e σ L 1 X     ≤ 1. LQ = ql−1 (∆) 2π l=1 Φ ql (∆) √ √ − Φ σ/ 2 σ/ 2 (26) The factor LQ results in a decrease on the Fisher Information at each RU j due to the operation over quantized signals, and we have that, from (20), the EFIM J (pp) of quantized case is equivalent to LQ times that of unquantized case. By the expression (17) of the CRB, it can be seen that LQ directly evaluates the ratio between the CRBs of unquantized and quantized cases at low SNR, so we can approximately write LQ ≈ CRBUQ , CRBQ (27) where CRBUQ and CRBQ are the actual CRBs of direct localization in unquantized and quantized cases with the EFIM J (pp) being given by (24) and (21), respectively. The approximation (27) will be validated via numerical results in the next section. As a final remark, it is noted that, when the fronthaul capacity Bj for j ∈ Nr becomes arbitrarily large, namely the step size of quantizer ∆j goes to zero and the quantization level Lj approaches 15 to infinity, the CRB for quantized and unquantized signal models, CRBUQ and CRBQ , can be seen to coincide. This can be proved by the fact that the FIM Ψ j of each RU j ∈ Nr in (21) approaches to (24), as Bj turns to infinity (see Appendix 9.2). 5. Numerical Results In this section, we evaluate the performance of direct localization with the aim of assessing the impact of quantization. For the indirect localization, as discussed in Section 2.3, the source is located by ML based on TOA and AOA estimates both of which are obtained by means of the multiple signal classification (MUSIC) algorithm [5], [6], as in [8], but other super-resolution techniques are also possible. We consider a network with Nr = 4 RUs placed at the vertices of a square area with side of length D = 4 km, while the source is uniformly and randomly located within a 3 × 3 km2 area of A centered in the entire region. Each RU is assumed to be equipped with an M = 8 element ULA with antenna separation ∆A = λ/2. The sampled waveform is √ s(n) = sinc(t/Ts )/ Ns |t=nTs with bandwidth W = 1/(2Ts ) = 200 kHz as in GSM, so that the sampling period is Ts = 2.5 µs, and each location estimation is based on Ns = 8 samples. We assume that the channel coefficients bj are independent and Rician, with Rician factor K = 20 dB. Also, we assume sensors with equal noise variance. The dynamic range of the uniform quantizer applied at each RU j to all antennas is set based on Monte Carlo experiments guaranteeing that the received signals are included in the peak-to-peak interval with the probability of 95% given conditions. We impose the fronthaul capacity constraints as B1 = B2 = B3 = B and B4 = 2B, and we set qt0 = 1 in the direct localization scheme for estimating t0 (see Section 3). We evaluate qP N the root mean squared (RMS) error as performance metric defined as n=1 ρn /N, where ρn = kp̂pn − p k2 with N being the number of experiments and p̂pn being the estimated source location 16 65 Indirect (Ideal) Direct (Ideal) Direct (w/o Dithering) Direct (w/ Dithering) Direct, CRB (Ideal) Direct, CRB (w/o Dithering) 60 RMS error (m) 55 50 45 40 35 30 25 2 3 4 5 6 7 B/M (bps/Hz/antenna) 8 9 10 Fig. 2. RMS error versus fronthaul capacity B/M bps/Hz/antenna for SNR (per antenna) = 0 dB (Nr = 4, M = 8, Ns = 8 and Ts = 2.5 µs). of the nth experiments. For reference, we also present the performance of direct localization with ideal fronthaul links and the CRBs for quantized and unquantized signals derived in Section 4. Fig. 2 and Fig. 3 show the RMS error versus the fronthaul capacity constraint B/M (bps/Hz /antenna) when SNR per antenna is 0 dB and 5 dB, respectively. First, we observe that, when the SNR is sufficiently large, as in Fig. 3 (SNR= 5 dB), indirect localization may outperform direct localization if the fronthaul capacity is small enough. This is due to the distortion caused by fronthaul quantization when the quantization is coarse. Note that this is not the case at lower SNR, where at SNR= 0 dB, the signal degradation due to the additive noise overwhelms the loss due to quantization. Furthermore, as long as the fronthaul capacity is large enough, as expected, direct localization has the potential to significantly outperform indirect localization, with additional marginal gains achievable via dithering. Also, the gain of dithering is more relevant at lower fronthaul capacity. For instance, for SNR= 0 dB, the gain of dithering (reduction in localization 17 28 26 Indirect (Ideal) Direct (Ideal) Direct (w/o Dithering) Direct (w/ Dithering) Direct, CRB (Ideal) Direct, CRB (w/o Dithering) RMS error (m) 24 22 20 18 16 2 3 4 5 6 7 B/M (bps/Hz/antenna) 8 9 10 Fig. 3. RMS error versus fronthaul capacity B/M bps/Hz/antenna for SNR (per antenna) = 5 dB (Nr = 4, M = 8, Ns = 8 and Ts = 2.5 µs). RMS) increases from 8.5% at B/M = 4 to 13.3% at B/M = 2. Finally, the CRB, as well as the performance with ideal fronthaul, is approached by the direct scheme as the fronthaul capacity and the SNR increase. Next, we turn to the evaluation of the performance loss of direct localization due to quantization by means of the analysis in Section 4. Specifically, we compare the quantization loss LQ in (26) to the actual ratio between the CRBs of the unquantized and quantized cases, i.e., CRBUQ /CRBQ , obtained by numerical simulations using the same parameters as discussed above, except that we impose an equal fronthaul capacity constraint Bj = B, and use the same uniform quantizer for all RU j ∈ Nr . Fig. 4 shows the discussed ratio between CRBs versus SNR per antenna for B/M = 4 bps/Hz/antenna. It is seen that, the factor LQ provides a close approximation of the actual performance loss, as expected in (27), not only in the low-SNR regime in which it was derived. In 18 0.86 0.84 Actual Ratio LQ 0.82 CRBUQ/CRBQ 0.8 0.78 0.76 0.74 0.72 0.7 0.68 0.66 −5 −3 0 SNR (dB) 3 5 Fig. 4. Ratio between CRBs for unquantized and quantized observations versus SNR (per antenna) (dB) for B/M = 4 bps/Hz/antenna (Nr = 4, M = 8, Ns = 8 and Ts = 2.5 µs). particular, the analytical loss (26) properly quantifies the quantization loss due to quantization, which becomes significant at the higher SNR. 6. Concluding Remarks The C-RAN architecture, with its centralized baseband processing at a control unit (CU), enables the implementation of direct, or one-step, localization. While direct localization outperforms the traditional indirect, or two-step, localization in the presence of ideal connections between the CU and the radio units (RUs), this may not be the case in the C-RAN due to the distortion caused by quantization on the fronthaul links. In this paper, we have studied the performance of direct and indirect localization in the C-RAN by means of the calculation of the CRB as well as quantization effect on the localization accuracy via analytical and numerical results. Interesting open problems concern the study of the optimal scalar quantization design for the RUs to maximize the localization accuracy. 19 7. Acknowledgments This work has been supported by the National GNSS Research Center program of Defense Acquisition Program Administration and Agency for Defense Development. 8. References [1] Weiss, A. J.: ’Direct position determination of narrowband radio frequency transmitters’, IEEE Signal Processing Letters, 2004, 11, (5), pp. 513–516 [2] Jeong, S., Simeone, O., Haimovich, A., et al.: ’Beamforming design for joint localization and data transmission in distributed antenna system’, IEEE Transactions on Vehicular Technology, 2015, 64, (1), pp. 62–76 [3] Jeong, S., Simeone, O., Haimovich, A., et al.: ’Optimal fronthaul quantization for cloud radio positioning’, IEEE Transactions on Vehicular Technology, 2015, PP, (99), pp. 1–7 [4] Gezici, S., Tian, Z., Giannakis, G. B., et al.: ’Localization via ultra-wideband radios: a look at positioning aspects for future sensor networks’, IEEE Signal Processing Magazine, 2005, 22, (4), pp. 70–84 [5] Li, X., Pahlavan, K.: ’Super-resolution TOA estimation with diversity for indoor geolocation’, IEEE Transactions on Wireless Communications, 2004, 3, (1), pp. 224–234 [6] Schmidt, R. O.: ’Multiple emitter location and signal parameter estimation’, IEEE Transactions on Antennas and Propagation, 1986, 34, (3), pp. 276–280 [7] Bar-Shalom, O., Weiss. A. J.: ’Transponder-aided single platform geolocation’, IEEE Transactions on Signal Processing, 2013, 61, (5), pp. 1239–1248 20 [8] Weiss, A. J., Amar, A.: ’Direct position determination of multiple radio signals’, Eurasip Journal Applied Signal Processing, 2005, 2005, (1), pp. 37–49 [9] Amar, A., Weiss, A. J.: ’Direct position determination in the presence of model errors –known waveforms’, Digital Signal Processing, 2006, 16, (1), pp. 52–83 [10] Wax, M., Kailath, T.: ’Optimum localization of multiple sources by passive arrays’, IEEE Transactions on Acoustics, Speech and Signal Processing, 1983, 31, (5), pp. 1210–1217 [11] Wax, M., Kailath, T.: ’Decentralized processing in sensor arrays’, IEEE Transactions on Acoustics, Speech, and Signal Processing, 1985, 33, (5), pp. 1123–1129 [12] Niu, R., Varshney, P. K.: ’Target location estimation in sensor networks with quantized data’, IEEE Transactions on Signal Processing, 2006, 54, (12), pp. 4519–4528 [13] Hateld, D. N., ’A report on technical and operational issues impacting the provision of wireless enhanced 911 services’ (Federal Communications Commission, Washington, D.C., 2002), pp. 1– 54. Available at http://www.emergentcomm.com/documents/Supporting Documents/hatfield report1.pdf, [14] 3GPP TS 36.455, ’E-UTRA: LTE positioning protocol A (LPPa) v12.2.0’, 2015 [15] Chen, K., Duan, R., ’C-RAN: The road towards green RAN’ (China Mobile Research Institute, White Paper v2.5, 2011), http://labs.chinamobile.com/cran/wp-content/uploads/CRAN white paper v2 5 EN.pdf, pp. 1–48 [16] Schuchman, L.: ’Dither signals and their effect on quantization noise’, IEEE Transactions on Communication Technology, 1964, 12, (4), pp. 162–165 [17] Gray, R. M., Stockham, T. G.: ’Dithered quantizers’, IEEE Transactions on Information Theory, 1993, 39, (3), pp. 805–812 21 [18] Kay, S. M.: ’Fundamentals of signal processing-estimation theory’ (Prentice Hall, NJ, 1993) [19] CPRI: ’CPRI specification v6.1’ (2014), http://www.cpri.info/jp/spec.html [20] Cover, T. M., Thomas, J. A.: ’Element of information theory’ (John Wiley & Sons, NJ, 2006) [21] Zhang, F.: ’The Schur complement and its applications’ (Springer, NY, 2005), vol. 4. [22] Zhang, H., Shen, Y., Chai, L., et al.: ’State dimension reduction and analysis of quantized estimation systems’, Signal Processing, 2014, 105, pp. 363–375 [23] Olver, F. W. J.: ’NIST handbook of mathematical functions’ (Cambridge University Press, NY, 2010) 9. Appendix 9.1. Calculation of EFIM for Direct Localization based on Quantized Signals In this appendix, we calculate the EFIM J (pp) of direct localization in (20). Similar to [2], [3], T T since the source is localizable, the mapping of θ = [ppT b T1 · · · b TNr ]T to θ̃θ = [θ̃θ 1 · · · θ̃θ Nr ]T with T T , where θ̃θ j = [τj (pp) φj (pp) b Tj ]T is a bijection. Then, we can have the relationship J (θθ ) = T J (θ̃θ )T T θ )], T = ∂θ̃θ /∂θθ = [U U 1 · · · U Nr ; V 1 · · · V Nr ] is the Jacobian matrix; and J (θ̃θ ) = −ER̂ R [∇θ̃θ ∇θ̃θ L(θ V j ]2(j−1)+1:2j,3:4 = I 2 . with U j defined in (20) and V j ∈ ℜ2Nr ×4 having all zeros except for [V Ψ1 , . . . , Ψ Nr }, and using the relationship Referring [12], J (θ̃θ ) can be calculated as J (θ̃θ ) = diag{Ψ J (θθ ) = T J (θ̃θ )T T T , J (θθ ) can be written as J (θθ ) = [X X Y ; Y T Z ], where X , Y and Z are given in (20). Finally, by applying the Schur complement (see, e.g., [21]), we can have the EFIM J (pp) in (20). 22 9.2. Proof of Asymptotic Convergence of CRB for Large Fronthaul Capacity Here, we show that the matrix Ψ j (21) that appears in the CRB for quantized observations approaches the counterpart quantity (24) for the case with unquantized observations as the fronthaul capacity Bj for j ∈ Nr goes to infinity. This allows us to conclude, as desired, that the CRB with quantized observations tends to the CRB with unlimited fronthaul as Bj tends to infinity. To this end, we first prove the limit 2  ζ ζ X Γj,k,m,l − Γj,k,m,l−1 Lj lim ∆j →0,Lj →∞ l=1 Rζj (k)]m ); θ j ) Pj,l (Qj ([R → 2π, (28) for ∀j, k, m, ζ. For simplicity of the notation, we will omit the subscript k, m and superscript ζ in the following. The proof is similar to the proof of Theorem 2 in Section 4.2 of [22]. Denote ζ ˜ j,l = q̃j,l − q̃j,l−1. Also, we define the probability density function q̃j,l = qj,l (∆j ) − fj,k,m (θθ j ), and ∆ of the standard normal distribution as φ(x) = e−x 2 /2 √ ˜ j,l → 0 when ∆j → 0, / 2π. Noting that ∆ we can calculate the limit (28) as   2   q̃j,l−1 q̃j,l Lj 2π φ √ √ − φ X σ / 2 σ / 2  j   j  lim q̃ q̃ ˜ j,l ∆j,l →0,Lj →∞ √ Φ σ /√2 − Φ σ j,l−1 l=1 j j/ 2         q̃  ˜ j,l 2  ˜ j,l −1 q̃j,l −∆ q̃j,l −∆ q̃j,l j,l ∞ √ √ √ √ − φ − Φ φ Φ X ˜ j,l ∆ σj / 2 σj / 2 σj / 2 σj / 2    √ = lim 2π  ˜ j,l ˜ j,l ∆ ∆ ˜ j,l →∞ ∆ σ / 2 √ √ j l=1 σj / 2 σj / 2 2  −1  ∞ X ˜ j,l ∆ d   d Φ(t)  √ lim 2π  φ(t) = q̃j,l q̃j,l ˜ j,l →∞ dt dt ∆ σ / 2 √ √ j t= t= l=1 σj / ∞ X 2 2 σj / 2 q̃ 2 − j,l σ2 j ˜ j,l ∆ q̃j,l √ √ e ˜ j,l →∞ ∆ σ / 2 σ / 2 j j l=1 2 2 q̃j,l Z √  − 2 dq̃j,l q̃j,l √ √ e σj = 2π σj / 2 σj / 2 R Z √ r2 = 2πr 2 e− 2 dr → 2π. = lim √ 2π  (29) R 23 √ The last equation can be obtained by denoting r = q̃j,l /(σj / 2) and by an Euler integral of Gamma function R R lim r 2 e−r ∆j →0,Lj →∞ 2 /2 √ / 2πdr = 1 [23]. Given the limit (28), we now have that the limit  ζ ζ X X Γj,k,m,l − Γj,k,m,l−1 Lj k,m,ζ l=1 2 ζ ζ (θθ j )∇T[θ̃θ ] fj,k,m ∇[θ̃θ j ]p fj,k,m (θθ j ) j q Rζj (k)]m ); θ j ) πσj2 Pj,l (Qj ([R = X 2 ζ ∇ f ζ (θθ )∇T[θ̃θ j ]q fj,k,m (θθ j ) 2 [θ̃θ j ]p j,k,m j σ k,m,ζ j (30) holds, which concludes the proof since (30) shows that the EFIM for the case with quantized observations tends to that of the case with unquantized observations, as the fronthaul capacity Bj for j ∈ Nr goes to infinity. 24
7cs.IT
RANK-WIDTH: ALGORITHMIC AND STRUCTURAL RESULTS SANG-IL OUM arXiv:1601.03800v2 [math.CO] 27 Jul 2016 Abstract. Rank-width is a width parameter of graphs describing whether it is possible to decompose a graph into a tree-like structure by ‘simple’ cuts. This survey aims to summarize known algorithmic and structural results on rank-width of graphs. 1. Introduction Rank-width was introduced by Oum and Seymour [71]. Roughly speaking, the rank-width of a graph is the minimum integer k such that the graph can be decomposed into a tree-like structure by recursively splitting its vertex set so that each cut induces a matrix of rank at most k. The precise definition will be presented in the next section. Tree-width is a better known and well-studied width parameter of graphs introduced by Robertson and Seymour [74]. Tree-width has been very successful for deep theoretical study of graph minor structures as well as algorithmic applications. In particular, many NP-hard problems can be solved efficiently if the input graph belongs to a class of graphs of bounded tree-width. However, graphs of bounded tree-width have bounded average degree and therefore the application of tree-width is mostly limited to ‘sparse’ graph classes. Clique-width [23, 25] aims to extend tree-width by allowing more ‘dense’ graphs to have small clique-width. There are many efficient algorithms based on dynamic programming assuming that a clique-width decomposition is given, see [42]. However, there is no known polynomial-time algorithm to determine whether the clique-width of an input graph is at most k for fixed k ≥ 4. (There is a polynomial-time algorithm to decide clique-width at most 3 by Corneil et al. [19].) Rank-width solves this dilemma in some way; there is a polynomial-time algorithm to decide whether the rank-width of an input graph is at most k for each fixed k. In addition, for each graph of rank-width k and clique-width c, the inequality k ≤ c ≤ 2k+1 − 1 holds [71] and therefore a class of graphs has bounded clique-width if and only if it has bounded rank-width. Furthermore a rank-decomposition of width k can be translated into a clique-width decomposition of width at most 2k+1 − 1 [71] so that we can use known algorithms for graphs of bounded clique-width. Thus, if we could extend theorems on tree-width to rank-width, then it becomes useful for some dense graphs. Moreover there is a correspondence between branch-width of binary matroids and rank-width of bipartite graphs in terms of vertex-minors and Date: July 28, 2016. Supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Science, ICT & Future Planning (2011-0011653). 1 2 SANG-IL OUM pivot-minors, discussed in [63]. This correspondence allows us to apply the matroid theory to prove statements on rank-width, for instance in [26]. In 2008, the author with Hliněný, Seese, and Gottlob wrote a survey [42] on various width parameters including rank-width. Our (incomplete) survey aims to supplement that by focusing on algorithmic problems of finding rank-width and structural aspects related to rank-width. 2. Definitions and equivalent width parameters All graphs in this survey are assumed to be simple, meaning that they have no parallel edges and no loops. We focus on finite undirected graphs in this article, though Kanté and Rao [52] worked on rank-width of directed graphs and edgecolored graphs and Courcelle [21] extended rank-width and linear rank-width to countable graphs. In later sections, we discuss and use relations to matroids and branch-width. For the definition of matroids, please refer to the book of Oxley [73]. Robertson and Seymour [77] introduced the notion of branch-width for both graphs and matroids. Key concepts of binary matroids related to rank-width can be found in [63]. 2.1. Rank-width. In order to define rank-width, we first need a measure to describe the complexity of a cut, which we call the cut-rank function ρG . For a graph G and a subset X of the vertex set V (G) of G, let us define ρG (X) to be the rank of a |X| × |V (G) − X| 0-1 matrix AX over the binary field where the entry of AX on the i-th row and j-th column is 1 if and only if the i-th vertex in X is adjacent to the j-th vertex in V (G) − X. (If X = ∅ or X = V (G), then ρG (X)  = 0.)  Note that 1 1 0 this matrix is over the binary field; thus, for instance, the rank of 0 1 1 is equal 1 0 1 to 2, as 1 + 1 = 0. The cut-rank function satisfies the following inequalities. (1) (2) ρG (X) = ρG (V (G) − X) for all X ⊆ V (G), ρG (X) + ρG (Y ) ≥ ρG (X ∪ Y ) + ρG (X ∩ Y ) for all X, Y ⊆ V (G). The inequality (2) is called the submodular inequality. A tree is subcubic if every node has degree 1 or 3. A rank-decomposition of a graph G is a pair (T, L) of a subcubic tree T with at least two nodes and a bijection L from V (G) to the set of all leaves of T . For each edge e of T , T − e induces a partition (Ae , Be ) of the leaves of T and we say that the width of e is ρG (L−1 (Ae )). By (1), the choice of Ae , Be does not change the width of e. The width of a rank-decomposition (T, L) is the maximum width of edges in T . The rank-width of a graph G, denoted by rw(G), is the minimum width over all rank-decompositions of G. (If G has less than two vertices, then G has no rankdecompositions; in this case we say that G has rank-width 0.) 2.2. Linear rank-width. Let us define a linearized variant of rank-width as follows. A linear layout of an n-vertex graph G is a permutation v1 , v2 , . . . , vn of the vertices n−1 of G. The width of a linear layout is mini=1 ρG ({v1 , v2 , . . . , vi }). The linear rankwidth of a graph G, denoted by lrw(G), is the minimum width over all linear layouts of G. (If G has less than two vertices, then we say the linear rank-width of G is 0.) An alternative way to define the linear rank-width is to define a linear rankdecomposition (T, L) to be a rank-decomposition such that T is a caterpillar and then define linear rank-width as the minimum width over all linear rank-decompositions. RANK-WIDTH: ALGORITHMIC AND STRUCTURAL RESULTS 3 (A caterpillar is a tree having a path such that every leaf of the tree is either in the path or adjacent to a vertex in the path.) This immediately implies that the rank-width is always less than or equal to the linear rank-width. 2.3. Equivalent width parameters. Let us write cw(G) to denote the cliquewidth, introduced in [23, 25]. As we recall in Section 1, a class of graphs has bounded rank-width if and only if it has bounded clique-width by the following inequality. Theorem 2.1 (Oum and Seymour [71]). rw(G) ≤ cw(G) ≤ 2rw(G)+1 − 1. One can also prove, by the same idea, that linear clique-width of a graph G is at least lrw(G) and at most 2lrw(G) + 1. The inequalities in Theorem 2.1 are essentially tight: • The n × n grid has rank-width n − 1, shown by Jelı́nek [45] and clique-width n + 1, shown by Golumbic and Rotics [36]. • For every k, there exists a graph G such that its rank-width is at most k + 1 and the clique-width is at least 2⌊k/2⌋−1 . This is due to a theorem by Corneil and Rotics [20], that constructs a graph of tree-width k whose clique-width is at least 2⌊k/2⌋−1 . Oum [66] showed that a graph of tree-width k has rankwidth at most k + 1. We may say that clique-width and rank-width are equivalent in the sense that one is bounded if and only if the other is bounded. There are a few other width parameters of graphs that are equivalent to rank-width. We list them below. • NLC-width was introduced by Wanke [81] and is convenient to design an algorithm based on dynamic programming on graphs of bounded cliquewidth or rank-width. Let us write nlc(G) to denote the NLC-width of G. Johansson [48, 49] proved that cw(G) ≤ nlc(G) ≤ 2 cw(G). It can be easily shown that rw(G) ≤ nlc(G) ≤ 2rw(G) . • Boolean-width, denoted by boolw(G), was introduced by Bui-Xuan, Telle, and Vatshelle [16]. They showed that log2 cw(G) ≤ boolw(G) ≤ cw(G) and rw(G)2 + O(rw(G)). 4 In addition, they showed that for each k, there exist graphs G and H such that the rw(G) ≥ k and boolw(G) ≤ 2 log2 k + 4 and rw(H) = k and boolw(H) ≥ (k + 1)/6. It is not yet known [16] whether rw(G)2 can be reduced to O(rw(G)) in the above inequality in general. The definition of boolean-width is a slight variation of rank-width, only changing the cut-rank function into an alternative function called the booleandimension. For a graph G and a subset A of vertices of G, let U(A) be the set of all subsets of V (G) − A that can be represented as N(X) − A for some X ⊆ A, where N(X) is the set of all vertices in V (G) − X that are adjacent to a vertex in X. Then the boolean-dimension of A is defined to be log2 |U(A)|. It turns out that |U(A)| = |U(V (G) − A)| (see [54]) and log2 rw(G) ≤ boolw(G) ≤ 4 SANG-IL OUM therefore the boolean-dimension is symmetric. However, it is not necessarily integer-valued. • One may consider defining rank-width over a different field other than the binary field GF (2) by changing the definition of cut-rank function. For a field F, let us say that F-rank-width of a graph G, denoted by rwF (G), is the obtained width parameter from rank-width by changing the cut-rank function to evaluate the rank of a 0-1 matrix over F instead of the binary field. The proof of Oum and Seymour [71] can be extended easily to F-rankwidth to prove rwF (G) ≤ cw(G) ≤ 2rwF (G)+1 − 1. Thus rank-width and F-rank-width are equivalent. Furthermore Oum, Sæther, and Vatshelle [70] observed that if F is the field of all rational numbers (or more generally, F is a field of characteristic 0 or 2), then one can enhance the above inequality by showing rw(G) ≤ rwF (G) ≤ cw(G) ≤ 2rw(G)+1 − 1. Most of other width parameters mentioned above do not have a direct algorithm to find a corresponding decomposition and therefore we simply employ algorithms on finding rank-decompositions and convert them. But F-rank-width is similar to rank-width in the sense that one can use the theorem of Oum and Seymour [71] to design its own fixed-parameter approximation algorithm. This was used to design a faster algorithm for certain vertex partitioning problems [70]. When Kanté and Rao [52] extended rank-width to directed graphs and edge-colored graphs, they use the idea of F-rank-width. 3. Discovering Rank-width and linear rank-width We skip the discussion on algorithms on graphs of small rank-width, except the important meta theorem of Courcelle, Makowsky, and Rotics [24]. Their meta theorem states the following. Theorem 3.1 (Courcelle, Makowsky, and Rotics [24]). Let k be a fixed constant. For every closed monadic second-order formula of the first kind on graphs, there is a O(n3 )-time algorithm to determine whether the input graph of rank-width at most k satisfies the formula. Here, the monadic second-order formula of the first kind on graphs are logic formulas which allow ∃, ∀, ¬, ∧, ∨, ∈, (, ), true, and adj with first-order variables each representing a vertex and set variables each representing a set of vertices, where adj(x, y) is true if two vertices x and y are adjacent. If such a formula has no free variable, then it is called closed. We refer the readers to the previous survey [42]. We would like to mention that Grohe and Schweitzer [37] announced a polynomial-time algorithm to check whether two graphs are isomorphic when the input graphs have bounded rank-width. We often talk about fixed-parameter tractable (FPT) algorithms. This means that for a parameter k, the running time of the algorithm is at most f (k)nc for some c where n is the length of the input. For more about parametrized complexity, please see the following books [30, 27]. For us, the parameter is usually the rank-width of the input graph. A fixed-parameter tractable algorithm is thought to be better RANK-WIDTH: ALGORITHMIC AND STRUCTURAL RESULTS 5 than XP algorithms, that is an algorithm whose running time is bounded above by f (k)ng(k) . 3.1. Hardness. Computing rank-width is NP-hard, as mentioned in [64]. This can be deduced easily from the following three known facts. (1) Oum [63] showed that the branch-width of a binary matroid is equal to the rank-width of its fundamental graph plus one. Note that every cycle matroid is binary. (2) Hicks and McMurray Jr. [38] and independently Mazoit and Thomassé [60] showed that if a graph G is not a forest, then the branch-width of the cycle matroid M(G) is equal to the branch-width of G. (3) Seymour and Thomas [80] proved that computing branch-width of graphs is NP-hard. It is also NP-hard to compute linear rank-width. This is implied by the following facts. (1) Kashyap [53] proved that it is NP-hard to compute the path-width of a binary matroid given by its representation. (2) By Oum [63], it is straightforward to deduce that the path-width of a binary matroid is equal to the linear rank-width of its fundamental graph plus one. 3.2. Computing rank-width. Oum and Seymour [72] presented a generic XP algorithm for symmetric submodular integer-valued functions. Their algorithm implies that in time O(n8k+12 log n) we can find a rank-decomposition of width at most k, if it exists, for an input n-vertex graph. But we definitely prefer to remove k in the exponent of n. Courcelle and Oum [26] constructed a fixed-parameter tractable algorithm to decide, for fixed k, whether the rank-width is at most k, in time O(g(k)n3). However their algorithm does not provide a rank-decomposition of width at most k directly, because their algorithm uses forbidden vertex-minors, which we discuss in the next section. This problem was solved later. Hliněný and Oum [41] devised an algorithm to find a rank-decomposition of width at most k if it exists, for an input n-vertex graph in time O(g(k)n3). Here g(k) is a huge function. The proof uses the correspondence between branch-width of binary matroids and rank-width of graphs and still uses a huge list of forbidden minors in matroids. For bipartite circle graphs, one can compute rank-width in polynomial time. This is due to the following results. • Seymour and Thomas [80] proved that branch-width of planar graphs can be computed in polynomial time. • Hicks and McMurray Jr. [38] and independently Mazoit and Thomassé [60] showed that if a graph G is not a forest, then the branch-width of the cycle matroid M(G) is equal to the branch-width of G. • Oum [63] showed that the branch-width of a binary matroid is equal to the rank-width of its fundamental graph plus one. Note that every cycle matroid is binary. • De Fraysseix [28] proved that a graph is a bipartite circle graph if and only if it is a fundamental graph of the cycle matroid of a planar graph. It would be interesting to extend the class of graphs on which rank-width can be computed exactly. 6 SANG-IL OUM Question 1. Can we compute rank-width of circle graphs in polynomial time? 3.3. Fixed-parameter approximations. For many algorithmic applications, we restrict our input graph to have bounded rank-width. Most of such algorithms assume that the input graph is given with a rank-decomposition of small width and for such algorithms, it is usually enough to have an efficient algorithm that outputs a rank-decomposition of width at most f (k) for some function f or confirms that the rank-width of the input graph is larger than k. The first such algorithm was devised by Oum and Seymour [71] with f (k) = 3k +1 and the running time O(8k n9 log n), where n is the number of the vertices in the input graph. It was later improved by Oum [64] with f (k) = 3k + 1 and the running time O(8k n4 ). This allows us to compute rank-width within a constant factor in polynomial time when the input graph is known to have rank-width at most c log n for some constant c. In the same paper, Oum [64] presented another algorithm with f (k) = 3k − 1 whose running time is O(g(k) n3) for some huge function g(k). Question 2. Does there exist an algorithm with a function f (k) and a constant c that finds a rank-decomposition of width at most f (k) or confirms that the rank-width of the n-vertex input graph is larger than k, in time O(ck n3 )? One may hope to find a faster approximation algorithm for rank-width. For tree-width, Bodlaender, Drange, Dregi, Fomin, Lokshtanov, and Pilipczuk [7] presented an algorithm that, for an n-vertex input graph and an integer k, finds a tree-decomposition of width at most 5k + 4 or confirms that the tree-width is larger than k in time 2O(k) n. However, for rank-width, it seems quite non-trivial to reduce n3 into nc for some c < 3. This may be justified by the observation that one needs to compute the rank of matrices and computing a rank of a low-rank matrix may be one of the bottlenecks. There are some algorithms computing rank faster [17] but it is not clear whether those algorithms can be applied to answer the following question. Question 3. Does there exist an algorithm with functions f (k), g(k) and a constant c < 3 that finds a rank-decomposition of width at most f (k) or confirms that the rank-width of the n-vertex input graph is larger than k, in time O(g(k)nc)? 3.4. Computing linear rank-width. Let us turn our attention to linear rankwidth. Nagamochi [61] presented a simple generic XP algorithm analogous to Oum and Seymour [72] for path-width. His algorithm implies that we can find a linear rank-decomposition of width at most k by calling the algorithm to minimize submodular functions [62, 43, 44, 79] at most O(n2k+4 ) times, where n is the number of vertices of the input graph. In fact, for the linear rank-width, one can use a direct combinatorial algorithm in [64] to avoid using the generic algorithm to minimize submodular functions and improve its running time. Until recently there was no known algorithm that, in time O(g(k)nc ), finds a linear rank-decomposition of width at most k or confirms that a graph has linear rank-width larger than k for an input n-vertex graph. By the well-quasi-ordering property to be discussed in Subsection 4.6, there exists an algorithm that decides in time O(g(k)nc) whether the input n-vertex graph has linear rank-width at most k, but such an algorithm would not easily produce a linear rank-decomposition of small width. Hliněný [39] claimed that one can use the self-reduction technique [32] RANK-WIDTH: ALGORITHMIC AND STRUCTURAL RESULTS 7 to convert a decision algorithm for linear rank-width at most k into a construction algorithm. Recently, Jeong, Kim, and Oum [46] devised a direct algorithm for graphs of rankwidth at most k that runs in time O(g(k)ℓ n3 ) to output a linear rank-decomposition of width at most ℓ or confirm that the linear rank-width is larger than ℓ. Now observe the following inequality shown by Kwon [55] (also in Adler, Kanté, and Kwon [4]). Theorem 3.2 (Kwon [55]; Adler, Kanté, and Kwon [4]). Let G be an n-vertex graph. Then lrw(G) ≤ rw(G)⌊log2 n⌋. Thus ℓ ≤ k⌊log2 n⌋ and so we can conclude the following. Theorem 3.3 (Jeong, Kim, and Oum [46]). For each fixed integer k, there is a polynomial-time (XP) algorithm to compute the linear rank-width of an input graph of rank-width at most k. However, it is not known whether there is a fixed-parameter tractable algorithm to compute linear rank-width of a graph of rank-width k. Theorem 3.3 generalizes the polynomial-time algorithm of Adler, Kanté, and Kwon [4] that computes the linear rank-width of graphs of rank-width at most 1. 3.5. Exact algorithms. Though the number of rank-decompositions of an n-vertex graph is a superexponential function, we can still determine the rank-width of an n-vertex graph in time O(2n poly(n)) where poly(n) is some polynomial in n, shown by Oum [67]. This algorithm can find an optimal rank-decomposition as well. Question 4. Is it possible to compute rank-width of an n-vertex graph in time O(cn ) for some c < 2? It is easy to compute the linear rank-width of an n-vertex graph in time O(2n poly(n)) by dynamic programming [8]. All algorithms mentioned so far in this subsection use exponential space. 3.6. Software. Krause implemented a simple dynamic programming algorithm to compute the rank-width of a graph.1 This software is now included in the open source mathematics software package called SAGE; see the manual.2 Friedmanský wrote the Master thesis [35] about implementing the exact exponentialtime algorithm of Oum [67]. Bui-Xuan, Raymond, and Trébuchet [15] implemented, in SAGE, the algorithm of Oum [64] that either outputs a rank-decomposition of width at most 3k + 1 or confirms that rank-width is larger than k in time O(n4 ) for an input n-vertex graph. 3.7. Other results. Lee, Lee, and Oum [57] showed that asymptotically almost surely the Erdős-Rényi random graph G(n, p) has rank-width ⌈n/3⌉ − O(1) if p is a constant between 0 and 1. Furthermore, if n1 ≪ p ≤ 12 , then the rank-width is ⌈ n3 ⌉ − o(n), and if p = c/n and c > 1, then rank-width is at least rn for some r = r(c). 1http://pholia.tdi.informatik.uni-frankfurt.de/ ~philipp/software/rw.shtml http://www.sagemath.org/doc/reference/graphs/sage/graphs/graph_decompositions/rankwidth.html 2 8 SANG-IL OUM 4. Structural aspects As tree-width is closely related to graph minors, rank-width is related to vertexminors and pivot-minors, observed in [63]. We first review the definition of pivotminors and vertex-minors and then discuss various theorems, mostly motivated by the theory of tree-width and graph minors. 4.1. Vertex-minors and pivot-minors. For a graph G and its vertex v, G ∗ v is the graph such that V (G ∗ v) = V (G) and two vertices x, y are adjacent in G ∗ v if and only if (i) both x and y are neighbors of v in G and x is non-adjacent to y, or (ii) x is adjacent to y and v is non-adjacent to at least one of x and y. Such an operation is called the local complementation at v. Clearly G ∗ v ∗ v = G. Two graphs are locally equivalent if one is obtained from another by a sequence of local complementations. We say that a graph H is a vertex-minor of a graph G if H is an induced subgraph of a graph locally equivalent to G. Local complementation is a useful tool to study rank-width of graphs, because local complementation preserves the cut-rank function, thus preserving rank-width and linear rank-width [63]. This implies that if H is a vertex-minor of G, then the rank-width of H is less than or equal to the rank-width of G and the linear rank-width of H is less than or equal to the linear rank-width of G. Pivot-minors are restricted version of vertex-minors. For an edge uv, we define G ∧ uv = G ∗ u ∗ v ∗ u. This operation is called a pivot. Two graphs are pivot equivalent if one is obtained from another by a sequence of pivots. A graph H is a pivot-minor of a graph G if H is an induced subgraph of a graph pivot equivalent to G. There is a close relation between the pivot operation and the operation of switching a base in a binary matroid, which motivates the study of pivot-minors. Every pivot-minor of a graph G is also a vertex-minor of G but not vice versa. Vertex-minors of graphs can be seen as minors of isotropic systems, a concept introduced by Bouchet [11, 14, 10]. Similarly pivot-minors of graphs can be seen as minors of binary delta-matroids, also introduced by Bouchet [9, 12]. 4.2. Relation to tree-width and branch-width. Let G be a graph whose treewidth is k. Kanté [50] showed that rank-width of G is at most 4k + 2 by showing how to convert a tree-decomposition into a rank-decomposition constructively. This inequality was improved by Oum [66], who showed that rank-width is at most k + 1. In fact, the following are shown. The incidence graph I(G) of a graph G is the graph obtained from G by subdividing each edge exactly once. Theorem 4.1 (Oum [66]). Let G be a graph of branch-width k. Then the incidence graph I(G) of G has rank-width k or k − 1, unless k = 0. The converse does not hold; the complete graph Kn has tree-width n − 1 and rank-width 1 if n ≥ 2. We remark that Courcelle [22] proved that if G is a graph of tree-width k, then its incidence graph I(G) has clique-width at most 2k + 4. Since G is a vertex-minor of I(G), we deduce that the rank-width of G is less than or equal to the branch-width of G, unless G has branch-width 0. This inequality can be generalized to an arbitrary field. Theorem 4.2 (Oum, Sæther, Vatshelle [70]). For every field F and a graph G, rwF (G) is less than or equal to branch-width of G, unless G has branch-width 0. RANK-WIDTH: ALGORITHMIC AND STRUCTURAL RESULTS 9 The line graph L(G) of a simple graph G is a vertex-minor of the incidence graph I(G), obtained by applying local complementations at vertices of G in I(G). This implies that the rank-width of L(G) is less than or equal to the rank-width of I(G). The following theorem proves that they are very close to each other. Theorem 4.3 (Oum [68]). Let G be a simple graph of branch-width k. Then the line graph of G has rank-width k, k − 1, or k − 2. Surprisingly, Adler and Kanté [2] showed that for trees, linear rank-width is equal to path-width. Another relation to tree-width was discovered by Kwon and Oum [56]. They have shown that graphs of small rank-width are precisely pivot-minors of graphs of small tree-width. Theorem 4.4 (Kwon and Oum [56]). (1) Every graph of rank-width k is a pivotminor of a graph of tree-width at most 2k. (2) Every graph of linear rank-width k is a pivot-minor of a graph of path-width at most k + 1. Hliněný, Kwon, Obdržálek, and Ordyniak [40] found an analogue of Theorem 4.4 to relate tree-depth and shrub-depth of graphs by vertex-minors. Fomin, Oum, and Thilikos [33] showed that when graphs are planar, or H-minorfree, then having bounded tree-width is equivalent to having bounded rank-width. This is already proven in Courcelle and Olariu [25] without explicit bounds because they use logical tools. For instance, in [33], it is shown that the tree-width of a planar graph G is at most 72 rw(G) − 2, and if a graph G has no Kr minor with r > 2, then its tree-width is at most 2O(r log log r) rw(G). The last bound on tree-width can be improved to 2O(r) rw(G) by using a recent result of Lee and Oum [58]. 4.3. Chromatic number. A class I of graphs is χ-bounded if there exists a function f such that χ(G) ≤ f (ω(G)) for all graphs G ∈ I. Here, ω(G) is the maximum size of a clique in G and χ(G) is the chromatic number of G. Dvořák and Král’ [31] proved that the class of graphs of rank-width at most k is χ-bounded as follows. Theorem 4.5 (Dvořák and Král’ [31]). There exists a function f : Z × Z → Z such that for every graph G of rank-width at most k, χ(G) ≤ f (ω(G), k). More generally, Geelen (see [31, 18]) conjectured that for each fixed graph H, the class of graphs with no H vertex-minor is χ-bounded. This conjecture has been verified when H is the wheel graph on 6 vertices [31] and a fan graph [18]. 4.4. Duality. As rank-width is an instance of branch-width of some symmetric submodular function, we can use a theory developed for symmetric submodular functions by [77, 72, 5, 59, 29]. In particular, one can use the concept called a tangle to verify that a graph has large rank-width. For a graph G, a ρG -tangle of order k is a set T of subsets of V (G) satisfying the following three axioms. (T1) For A ⊆ V (G), if ρG (A) < k, then either A ∈ T or V (G) − A ∈ T . (T2) If A, B, C ∈ T , then A ∪ B ∪ C 6= V (G). (T3) For all v ∈ V (G), V (G) − {v} ∈ /T. A theorem of Robertson and Seymour [77] implies the following. 10 SANG-IL OUM Theorem 4.6 (Robertson and Seymour [77]). For an integer k, a graph G has a ρG -tangle of order k if and only if its rank-width is at least k. A similar concept can be defined for linear rank-width. A ρG -obstacle of order k is a set O of subsets of V (G) satisfying the following three axioms. (B1) For all A ∈ O, ρG (A) < k. (B2) If X ⊆ Y ∈ O and ρG (X) < k, then X ∈ O. (B3) If A ∪ B ∪ C = V (G), A ∩ B = ∅, ρG (A) < k, ρG (B) < k and |C| ≤ 1, then exactly one of A and B is in O. The following theorem is implied by Fomin and Thilikos [34, Theorem 3]. Theorem 4.7 (Fomin and Thilikos [34]). For an integer k, a graph G has a ρG obstacle of order k if and only if its linear rank-width is at least k. 4.5. Large rank-width. Robertson and Seymour [75] proved that every graph with sufficiently large tree-width contains a large grid graph as a minor. An analogous conjecture was made in [68] as follows. Question 5. Is it true that for each fixed bipartite circle graph H, every graph G with sufficiently large rank-width contains a pivot-minor isomorphic to H? This has been confirmed when G is a line graph, a bipartite graph, or a circle graph, see [68]. Adler, Kanté and Kwon [3] proved that for each tree T , every distance-hereditary graph with sufficiently large linear rank-width contains a vertex-minor isomorphic to T . It would be interesting to determine whether every graph of sufficiently large linear rank-width contains a vertex-minor isomorphic to a fixed tree T . 4.6. Well-quasi-ordering. A pair (Q, ) of a set Q and a relation  on Q is a quasi-order if (1) x  x for all x ∈ Q and (2) x  z if x  y and y  z. A quasi-order (Q, ) is a well-quasi-order if every infinite sequence q1 , q2 , . . . of Q has a pair qi , qj (i < j) such that qi  qj . We say that Q is well-quasi-ordered by the relation . Motivated by the celebrated graph minor theorem by Robertson and Seymour [78] and its special case on tree-width [76], Oum [65] proved that graphs of bounded rank-width are well-quasi-ordered under taking pivot-minors as follows. Theorem 4.8 (Oum [65]). For all positive integers k, every infinite sequence G1 , G2 , . . . of graphs of rank-width at most k admits a pair Gi , Gj (i < j) such that Gi is isomorphic to a pivot-minor of Gj . Theorem 4.8 has been generalized to skew-symmetric or symmetric matrices over a fixed finite field (Oum [69]) and σ-symmetric matrices over a fixed finite field (Kanté [51]). Courcelle and Oum [26] constructed a modulo-2 counting monadic second-order logic formula to decide whether a fixed graph H is isomorphic to a vertex-minor of an input graph. This can be combined with the meta-theorem of Courcelle, Makowsky, and Rotics [24] to deduce the following. RANK-WIDTH: ALGORITHMIC AND STRUCTURAL RESULTS 11 Theorem 4.9 (Courcelle and Oum [26]). Let I be a set of graphs closed under taking vertex-minors. If I has bounded rank-width, then there exists an algorithm that decides whether an input n-vertex graph is in I in time O(n3 ). We remark that a positive answer to the following question would imply the graph minor theorem of Robertson and Seymour. Question 6. Are graphs well-quasi-ordered under taking pivot-minors? In other words, does every infinite sequence G1 , G2 , . . . of graphs admit a pair Gi , Gj (i < j) such that Gi is isomorphic to a pivot-minor of Gj ? We would also like to have an algorithm to detect pivot-minors and vertex-minors of a graph. Question 7. For a fixed graph H, can we decide in polynomial time whether an input graph has a pivot-minor (or a vertex-minor) isomorphic to H? 4.7. Forbidden vertex-minors. By Theorem 4.8, we can easily deduce that there exists a finite set Fk of graphs such that a graph G has rank-width at most k if and only if Fk contains no vertex-minor of G, because otherwise there will be an infinite anti-chain of vertex-minor-minimal graphs having rank-width k + 1. However, the well-quasi-ordering theorem does not provide an upper bound on |Fk |. Oum [63] showed that pivot-minor-minimal graphs of rank-width k + 1 have at most (6k+1 − 1)/5 vertices. This gives an explicit upper bound on |Fk | as well as a constructive enumeration algorithm for graphs in Fk . For k = 1, F1 is known. Oum [63] showed that graphs of rank-width at most 1 are precisely distance-hereditary graphs; a graph G is distance-hereditary if in every connected induced subgraph, a shortest path between two vertices is also a shortest path in G [6]. (This also proves that distance-hereditary graphs have clique-width at most 3 as an easy consequence of Theorem 2.1, which was initially proved by Golumbic and Rotics [36].) A theorem of Bouchet [10, 13] implies that a graph G has rank-width at most 1 if and only if C5 (the cycle graph of length 5) is not isomorphic to a vertex-minor of G. A similar argument can be used to show that a graph G has rank-width at most 1 if and only if neither C5 nor C6 is isomorphic to a pivot-minor of G. For the linear rank-width, we can still use Theorem 4.8 to deduce that there exists a finite set Lk of graphs such that a graph G has linear rank-width at most k if and only if Lk contains no vertex-minor of G. Unlike the situation in rank-width, so far no upper bound on the size of graphs in Lk is known. Adler, Farley, and Proskurowski [1] determined L1 as a set of three particular graphs. Jeong, Kwon, k and Oum [47] proved that |Lk | ≥ 3Ω(3 ) . Adler, Kanté and Kwon [3] presented an algorithm to construct, for each k, a finite set L′k of distance-hereditary graphs of k linear rank-width k + 1 such that |L′k | ≤ 3O(3 ) , every proper vertex-minor of a graph in L′k has linear rank-width at most k, and every distance-hereditary graph of linear rank-width k + 1 contains at least one graph in L′k . Acknowledgments. The author would like to thank Mamadou M. Kanté, Eun Jung Kim, O-joung Kwon, and Jisu Jeong for their helpful comments on an early draft of this paper. The author would also like to thank anonymous referees for their helpful suggestions. 12 SANG-IL OUM References [1] I. Adler, A. M. Farley, and A. Proskurowski. Obstructions for linear rankwidth at most 1. Discrete Appl. Math., 168:3–13, 2014. [2] I. Adler and M. M. Kanté. Linear rank-width and linear clique-width of trees. Theoret. Comput. Sci., 589:87–98, 2015. [3] I. Adler, M. M. Kanté, and O. Kwon. Linear rank-width of distance-hereditary graphs II. Vertex-minor obstructions. arXiv:1508.04718, 2015. [4] I. Adler, M. M. Kanté, and O. Kwon. Linear rank-width of distance-hereditary graphs I. A polynomial-time algorithm. Algorithmica, 2016. doi:10.1007/s00453-016-0164-5. [5] O. Amini, F. Mazoit, N. Nisse, and S. Thomassé. Submodular partition functions. Discrete Appl. Math., 309(20):6000–6008, 2009. [6] H.-J. Bandelt and H. M. Mulder. Distance-hereditary graphs. J. Combin. Theory Ser. B, 41(2):182–208, 1986. [7] H. L. Bodlaender, P. G. Drange, M. S. Dregi, F. V. Fomin, D. Lokshtanov, and M. Pilipczuk. A ck n 5-approximation algorithm for treewidth. SIAM J. Comput., 45(2):317–378, 2016. [8] H. L. Bodlaender, F. V. Fomin, A. M. C. A. Koster, D. Kratsch, and D. M. Thilikos. A note on exact algorithms for vertex ordering problems on graphs. Theory Comput. Syst., 50(3):420– 432, 2012. [9] A. Bouchet. Greedy algorithm and symmetric matroids. Math. Programming, 38(2):147–159, 1987. [10] A. Bouchet. Isotropic systems. European J. Combin., 8(3):231–244, 1987. [11] A. Bouchet. Graphic presentations of isotropic systems. J. Combin. Theory Ser. B, 45(1):58– 76, 1988. [12] A. Bouchet. Representability of ∆-matroids. In Combinatorics (Eger, 1987), volume 52 of Colloq. Math. Soc. János Bolyai, pages 167–182. North-Holland, Amsterdam, 1988. [13] A. Bouchet. Transforming trees by successive local complementations. J. Graph Theory, 12(2):195–207, 1988. [14] A. Bouchet. Connectivity of isotropic systems. In Combinatorial Mathematics: Proceedings of the Third International Conference (New York, 1985), volume 555 of Ann. New York Acad. Sci., pages 81–93, New York, 1989. New York Acad. Sci. [15] B.-M. Bui-Xuan, J.-F. Raymont, and P. Trébuchet. Implantation des algorithmes oum-seymour et oum. A slide of a talk at JGA2011. http://www.mimuw.edu.pl/~jr348692/files/2011-11-17_diapos_jga.pdf, 2011. [16] B.-M. Bui-Xuan, J. A. Telle, and M. Vatshelle. Boolean-width of graphs. Theoret. Comput. Sci., 412(39):5187–5204, 2011. [17] H. Y. Cheung, T. C. Kwok, and L. C. Lau. Fast matrix rank algorithms and applications. J. ACM, 60(5):Art. 31, 25, 2013. [18] I. Choi, O.-j. Kwon, and S. Oum. Coloring graphs without fan vertex-minors and graphs without cycle pivot-minors. arXiv:1512.03481, 2015. [19] D. G. Corneil, M. Habib, J.-M. Lanlignel, B. Reed, and U. Rotics. Polynomial-time recognition of clique-width ≤ 3 graphs. Discrete Appl. Math., 160(6):834–865, 2012. [20] D. G. Corneil and U. Rotics. On the relationship between clique-width and treewidth. SIAM J. Comput., 34(4):825–847 (electronic), 2005. [21] B. Courcelle. Clique-width and edge contraction. Inform. Process. Lett., 114(1-2):42–44, 2014. [22] B. Courcelle. Clique-width and tree-width of sparse graphs. manuscript, 2015. [23] B. Courcelle, J. Engelfriet, and G. Rozenberg. Handle-rewriting hypergraph grammars. J. Comput. System Sci., 46(2):218–270, 1993. [24] B. Courcelle, J. A. Makowsky, and U. Rotics. Linear time solvable optimization problems on graphs of bounded clique-width. Theory Comput. Syst., 33(2):125–150, 2000. [25] B. Courcelle and S. Olariu. Upper bounds to the clique width of graphs. Discrete Appl. Math., 101(1-3):77–114, 2000. [26] B. Courcelle and S. Oum. Vertex-minors, monadic second-order logic, and a conjecture by Seese. J. Combin. Theory Ser. B, 97(1):91–126, 2007. [27] M. Cygan, F. V. Fomin, L. Kowalik, D. Lokshtanov, D. Marx, M. Pilipczuk, M. Pilipczuk, and S. Saurabh. Parameterized algorithms. Springer, Cham, 2015. RANK-WIDTH: ALGORITHMIC AND STRUCTURAL RESULTS 13 [28] H. de Fraysseix. Local complementation and interlacement graphs. Discrete Math., 33(1):29– 35, 1981. [29] R. Diestel and S. Oum. Unifying duality theorem for width parameters in graphs and matroids. I. Weak and strong duality. arXiv:1406.3797, 2014. [30] R. G. Downey and M. R. Fellows. Fundamentals of Parameterized Complexity. Springer, 2013. [31] Z. Dvořák and D. Král’. Classes of graphs with small rank decompositions are χ-bounded. European J. Combin., 33(4):679–683, 2012. [32] M. R. Fellows and M. A. Langston. Fast self-reduction algorithms for combinatorial problems of VLSI design. In VLSI algorithms and architectures (Corfu, 1988), volume 319 of Lecture Notes in Comput. Sci., pages 278–287. Springer, New York, 1988. [33] F. V. Fomin, S. Oum, and D. M. Thilikos. Rank-width and tree-width of H-minor-free graphs. European J. Combin., 31(7):1617–1628, 2010. [34] F. V. Fomin and D. M. Thilikos. On the monotonicity of games generated by symmetric submodular functions. Discrete Appl. Math., 131(2):323–335, 2003. [35] M. Friedmanský. Implementation and optimization of a graph algorithm for computing rankwidth. Master’s thesis, Masarykova Univerzita, 2011. [36] M. C. Golumbic and U. Rotics. On the clique-width of some perfect graph classes. Internat. J. Found. Comput. Sci., 11(3):423–443, 2000. Selected papers from the Workshop on Theoretical Aspects of Computer Science (WG 99), Part 1 (Ascona). [37] M. Grohe and P. Schweitzer. Isomorphism testing for graphs of bounded rank width. arXiv:1505.03737. Presented at FOCS 2015, 2015. [38] I. V. Hicks and N. B. McMurray Jr. The branchwidth of graphs and their cycle matroids. J. Combin. Theory Ser. B, 97(5):681–692, 2007. [39] P. Hliněný. Simpler self-reduction algorithm for matroid path-width. arXiv:1605.09520, 2016. [40] P. Hliněný, O.-j. Kwon, J. Obdržálek, and S. Ordyniak. Tree-depth and vertex-minors. European J. Combin., 56:46–56, 2016. [41] P. Hliněný and S. Oum. Finding branch-decompositions and rank-decompositions. SIAM J. Comput., 38(3):1012–1032, 2008. [42] P. Hliněný, S. Oum, D. Seese, and G. Gottlob. Width parameters beyond tree-width and their applications. The Computer Journal, 51(3):326–362, 2008. [43] S. Iwata. A faster scaling algorithm for minimizing submodular functions. SIAM J. Comput., 32(4):833–840 (electronic), 2003. [44] S. Iwata, L. Fleischer, and S. Fujishige. A combinatorial strongly polynomial algorithm for minimizing submodular functions. Journal of the ACM (JACM), 48(4):761–777, 2001. [45] V. Jelı́nek. The rank-width of the square grid. Discrete Appl. Math., 158(7):841–850, 2010. [46] J. Jeong, E. J. Kim, and S. Oum. The “art of trellis decoding” is fixed-parameter tractable. arXiv:1507.02184. Presented at SODA2016, 2016. [47] J. Jeong, O.-j. Kwon, and S. Oum. Excluded vertex-minors for graphs of linear rank-width at most k. European J. Combin., 41:242–257, 2014. [48] Ö. Johansson. Clique-decomposition, NLC-decomposition, and modular decomposition— relationships and results for random graphs. In Proceedings of the Twenty-ninth Southeastern International Conference on Combinatorics, Graph Theory and Computing (Boca Raton, FL, 1998), volume 132, pages 39–60, 1998. [49] Ö. Johansson. Graph decomposition using node labels. PhD thesis, Royal Institute of Technology, 2001. [50] M. M. Kanté. Vertex-minor reductions can simulate edge contractions. Discrete Appl. Math., 155(17):2328–2340, 2007. [51] M. M. Kanté. Well-quasi-ordering of matrices under Schur complement and applications to directed graphs. European J. Combin., 33(8):1820–1841, 2012. [52] M. M. Kanté and M. Rao. The rank-width of edge-coloured graphs. Theory Comput. Syst., 52(4):599–644, 2013. [53] N. Kashyap. Matroid pathwidth and code trellis complexity. SIAM Journal on Discrete Mathematics, 22(1):256–272, 2008. [54] K. H. Kim. Boolean matrix theory and applications, volume 70 of Monographs and Textbooks in Pure and Applied Mathematics. Marcel Dekker, Inc., New York, 1982. With a foreword by Gian-Carlo Rota. 14 SANG-IL OUM [55] O.-j. Kwon. On the structural and algorithmic properties of linear rank-width. PhD thesis, KAIST, 2015. [56] O.-j. Kwon and S. Oum. Graphs of small rank-width are pivot-minors of graphs of small tree-width. Discrete Appl. Math., 168:108–118, 2014. [57] C. Lee, J. Lee, and S. Oum. Rank-width of random graphs. J. Graph Theory, 70(3):339–347, July/August 2012. [58] C. Lee and S. Oum. Number of cliques in graphs with a forbidden subdivision. SIAM J. Discrete Math., 29(4):1999–2005, 2015. [59] L. Lyaudet, F. Mazoit, and S. Thomassé. Partitions versus sets: a case of duality. European J. Combin., 31(3):681–687, 2010. [60] F. Mazoit and S. Thomassé. Branchwidth of graphic matroids. In A. Hilton and J. Talbot, editors, Surveys in Combinatorics 2007, volume 346 of London Math. Soc. Lecture Note Ser., pages 275–286. Cambridge Univ. Press, Cambridge, 2007. [61] H. Nagamochi. Linear layouts in submodular systems. In K.-M. Chao, T.-s. Hsu, and D.T. Lee, editors, ISAAC ’12, volume 7676 of Lecture Notes in Comput. Sci., pages 475–484. Springer Berlin Heidelberg, 2012. [62] J. B. Orlin. A faster strongly polynomial time algorithm for submodular function minimization. Math. Program., 118(2, Ser. A):237–251, 2009. [63] S. Oum. Rank-width and vertex-minors. J. Combin. Theory Ser. B, 95(1):79–100, 2005. [64] S. Oum. Approximating rank-width and clique-width quickly. ACM Trans. Algorithms, 5(1):Art. 10, 20, 2008. [65] S. Oum. Rank-width and well-quasi-ordering. SIAM J. Discrete Math., 22(2):666–682, 2008. [66] S. Oum. Rank-width is less than or equal to branch-width. J. Graph Theory, 57(3):239–244, 2008. [67] S. Oum. Computing rank-width exactly. Inform. Process. Lett., 109(13):745–748, 2009. [68] S. Oum. Excluding a bipartite circle graph from line graphs. J. Graph Theory, 60(3):183–203, 2009. [69] S. Oum. Rank-width and well-quasi-ordering of skew-symmetric or symmetric matrices. Linear Algebra Appl., 436(7):2008–2036, 2012. [70] S. Oum, S. H. Sæther, and M. Vatshelle. Faster algorithms for vertex partitioning problems parameterized by clique-width. Theoret. Comput. Sci., 535:16–24, 2014. [71] S. Oum and P. Seymour. Approximating clique-width and branch-width. J. Combin. Theory Ser. B, 96(4):514–528, 2006. [72] S. Oum and P. Seymour. Testing branch-width. J. Combin. Theory Ser. B, 97(3):385–393, 2007. [73] J. G. Oxley. Matroid theory. Oxford University Press, New York, 1992. [74] N. Robertson and P. Seymour. Graph minors. II. Algorithmic aspects of tree-width. J. Algorithms, 7(3):309–322, 1986. [75] N. Robertson and P. Seymour. Graph minors. V. Excluding a planar graph. J. Combin. Theory Ser. B, 41(1):92–114, 1986. [76] N. Robertson and P. Seymour. Graph minors. IV. Tree-width and well-quasi-ordering. J. Combin. Theory Ser. B, 48(2):227–254, 1990. [77] N. Robertson and P. Seymour. Graph minors. X. Obstructions to tree-decomposition. J. Combin. Theory Ser. B, 52(2):153–190, 1991. [78] N. Robertson and P. Seymour. Graph minors. XX. Wagner’s conjecture. J. Combin. Theory Ser. B, 92(2):325–357, 2004. [79] A. Schrijver. A combinatorial algorithm minimizing submodular functions in strongly polynomial time. J. Combin. Theory Ser. B, 80(2):346–355, 2000. [80] P. Seymour and R. Thomas. Call routing and the ratcatcher. Combinatorica, 14(2):217–241, 1994. [81] E. Wanke. k-NLC graphs and polynomial algorithms. Discrete Appl. Math., 54(2-3):251–266, 1994. Department of Mathematical Sciences, KAIST, Daejeon, South Korea E-mail address: [email protected]
8cs.DS
12th International Conference on CFD in Oil & Gas, Metallurgical and Process Industries SINTEF, Trondheim, NORWAY May 30th - June 1st, 2017 CFD 2017 IMPLEMENTATION, DEMONSTRATION AND VALIDATION OF A USER-DEFINED WALL FUNCTION FOR DIRECT PRECIPITATION FOULING IN ANSYS FLUENT Sverre G. JOHNSEN1∗ , Tiina M. PÄÄKKÖNEN2 , Stein T. JOHANSEN13 , Riitta L. KEISKI2 , Bernd WITTGENS1 1 SINTEF 2 University 3 NTNU, Materials and Chemistry, NO-7465 Trondheim, NORWAY of Oulu, Environmental and Chemical Engineering, FI-90014 Oulu, FINLAND Dept. of Energy and Process Engineering, NO-7491 Trondheim, NORWAY ∗ E-mail: [email protected] arXiv:1706.01453v1 [cs.CE] 2 Jun 2017 ABSTRACT In a previous paper (Johnsen et al., 2015) and presentation (Johnsen et al., 2016), we developed and demonstrated a generic modelling framework for the modelling of direct precipitation fouling from multi-component fluid mixtures that become super-saturated at the wall. The modelling concept involves the 1-dimensional transport of the fluid species through the turbulent boundary layer close to the wall. The governing equations include the Reynolds-averaged (RANS) advection-diffusion equations for each fluid species, and the axial momentum and energy equations for the fluid mixture. The driving force for the diffusive transport is the local gradient in the species’ chemical potential. Adsorption mechanisms are not modelled per se, but the time-scale of adsorption is reflected in the choice of Dirichlet boundary conditions for the depositing species, at the fluid-solid interface. In this paper, the modelling framework is implemented as a userdefined function (UDF) for the CFD software ANSYS Fluent, to act as a wall boundary condition for mass-transfer to the wall. The subgrid, 1-dimensional formulation of the model reduces the computational cost associated with resolving the fine length-scales at which the boundary-layer mass transfer is determined, and allows for efficient modelling of industry-scale heat exchangers suffering from fouling. The current paper describes the modelling framework, and demonstrates and validates its applicability in a simplified 2D heat exchanger geometry (experimental and detailed CFD modelling data by Pääkkönen et al. (2012, 2016)). By tuning the diffusivity, only, good agreement with the experimental data and the detailed CFD model was obtained, in terms of area-averaged deposition rates. Keywords: CFD, Heat Exchangers, Mass transfer, Multiscale, UDF, Wall function, Fouling . NOMENCLATURE Greek Symbols ∂y+ ≡ ∂/∂y+ Dimensionless derivative in the wall-normal direction, [−]. κ = 0.42 von Kármán constant, [−]. µ Dynamic viscosity, [Pas]. ρf Fluid mixture mass density, [kg/m3 ]. τw Wall shear stress, [Pa]. Latin Symbols cP Specific heat capacity, [J/kgK]. C Concentration, [kg/m3 ]. Ea Activation energy, [J/mol]. g Gravity vector, [m/s2 ]. Specific sensible enthalpy, [J/kg]. Deposition rate, [kg/m2 s]. Mass flux vector, [kg/m2s].  Pre-exponential factor, m4/kgs2 .   Surface integration rate constant, m4/kgs2 . Thermal conductivity, [W/mK]. Number of species, [−]. Pressure, [Pa]. Prandtl number, [−]. Wall heat flux, [W/m2 ]. R Universal gas constant, [8.3144598J/Kmol]. Sc Schmidt number, [−]. T p Absolute temperature, [K[. uτ ≡ τw/ρ f ,w Shear velocity, [m/s]. u f ,x Fluid velocity parallel to the wall, [m/s]. uf Mass-averaged advective fluid velocity vector, [m/s]. x Cartesian coordinate, parallel to the wall, [m]. X Mass fraction, [kg/kg]. y Cartesian coordinate, normal to the wall, [m]. z Mole fraction, [mol/mol]. hsens jdep j k0 kr0 k N P Pr qw Sub/superscripts + Dimensionless variable. a, b, c Curve-fit parameters. bulk Value in the bulk. d Diffusive. f Property of the fluid mixture. i Species index. I Solid-fluid interface. in Value at inlet. reg Regression value. Sat Saturation value. t Turbulent. w Value at the wall. INTRODUCTION Fouling of solid surfaces and heat exchanger surfaces in particular, is a common and much studied problem in most process industries, as reflected in the review paper by MüllerSteinhagen (2011). Fouling is defined as the unwanted accumulation of solid (or semi-solid) material on solid surfaces. A similar phenomenon is the desired accumulation of solids e.g. in chemical vapor deposition (Krishnan et al., 1994; Kleijn et al., 1989). A common and costly problem in many industrial applications is the direct precipitation of super saturated fluids on heat exchanger surfaces. Typical examples S. G. Johnsen, T. M. Pääkkönen, S. T. Johansen, R. L. Keiski, B. Wittgens are found in e.g. the high-temperature off-gas from waste incineration, metal production, or in power plants, where efficient heat recovery is key to sustainable production, and where a combination of direct precipitation and deposition of e.g. solid metal oxides is a major showstopper. Similar issues can be found in almost all process industries, and in the current work we study the deposition of a low-solubility salt (calcium carbonate, CaCO3 ) from liquid water. By precipitation, we understand all types of phase transitions from a fluid to a relatively denser phase, e.g. gas → liquid (condensation), gas → solid (sublimation), liquid → solid (solidification). For some materials, the precipitate may have a crystalline structure (crystallization)(e.g. CaCO3 ). In our modelling work, fouling due to mass deposition from a fluid phase is grouped into two different classes; 1) particulate fouling, where particles carried by the fluid phase penetrate through the laminar boundary layer and stick to the wall (e.g. precipitates, dust, or soot particles) (Johansen, 1991; Johnsen and Johansen, 2009); and 2) direct precipitation where the fluid is super-saturated close to the wall and a phase-transition occurs at the wall (current paper). The direct precipitation on solid surfaces is due to the molecular diffusion through the stagnant boundary layer close to the wall. This is a complex physical process where the diffusion flux of each species is coupled to the diffusion fluxes and thermodynamic/chemical properties of all the species present. Commonly, a combination of 1 and 2 takes place. Fouling can only occur if the adhesive forces between the foulant and the wall are strong enough to overcome the flow-induced shear forces at the wall. In previous papers, we developed frameworks for the mathematical modelling of particle deposition and re-entrainment (Johansen, 1991; Johnsen and Johansen, 2009) and direct precipitation (Johnsen et al., 2015). In presentations (Johnsen et al., 2010, 2016), it was demonstrated how these models could be employed as wall boundary conditions (mass sinks) for CFD models. Pääkkönen et al. (2016) compared CFD simulations with experimental results with respect to CaCO3 deposition in a lab-scale heat exchanger setup. In the current paper we apply the wall function approach published in (Johnsen et al., 2015), in a coarse grid CFD model, and test it against the detailed CFD modelling results and experimental data obtained by Pääkkönen et al. (2012, 2016). EXPERIMENTAL SETUP The modelling results are validated against experimental data from crystallization fouling on a heated surface. The experimental setup includes a flow-loop with a test-section (a rectangular flow channel), with ohmically heated test surfaces. In the present work, we investigate the case where the wall heat flux was a constant qw = 52.5kW/m2 . A waterbased test liquid, supersaturated with respect to CaCO3 , is circulated from a mixing tank and is filtered before entering the test section (average inlet velocities ranging from u f ,x,in = 0.2 − 0.4m/s and temperature of Tin = 303K), where CaCO3 precipitates and deposits on the heated test surface. The growth of the fouling layer is monitored by measuring the temperature at the test surface. The decreased overall heat transfer coefficient due to the fouling layer (fouling resistance) will cause the test-section surface temperature to increase. Details of the experimental setup, procedure and results were described by Pääkkönen et al. (2012). Center Cross‐ section (a) (b) Figure 1: Computational geometry and fine-mesh (a), for two-step fouling model (Pääkkönen et al., 2016), and coarse mesh (b), for fouling wall function model. MODEL DESCRIPTION In the present paper, CFD is used to model experiments performed in the aforementioned experimental setup. Two different modelling approaches are employed; 1) Two-step fouling model (Pääkkönen et al., 2016); and 2) Fouling wall function for direct precipitation fouling (Johnsen et al., 2015, 2016). These two differ fundamentally in the way they approach the problem. Model 1 relies on a detailed CFD mesh close to the wall in order to be able to model the boundary layer phenomena correctly, and employs the traditional twostep approach (see e.g. (Mullin, 2001)) to model the deposition rate. Model 2, on the other hand, relies on a relatively coarse mesh, where the cell centers of the cells residing at the wall are in the log-layer. This approach employs a subgrid model to calculate the deposition rates from a set of simplified governing equations. For more details, see descriptions below as well as mentioned references. The main objective of the current paper is to shed light on the applicability of the wall function approach, since the successful application of such a method would be an essential step towards the costefficient modelling of many industry scale applications. USER-DEFINED WALL FUNCTION FOR DIRECT PRECIPITATION FOULING IN ANSYS FLUENT/ CFD 2017 Geometry and Computational Mesh Figure 1 presents the 2D geometry used in the CFD simulations. The figure shows a 2D-representation of the liquidfilled gap between two parallel, vertical heat transfer surfaces. The liquid enters from the top and exits through the bottom. For more details about the experimental set-up, refer to Pääkkönen et al. (2012). Two different meshes were applied for the two different modelling approaches described below; namely a fine mesh, as shown in Figure 1a (Pääkkönen et al., 2016), and a coarse mesh as shown in Figure 1b. The coarse mesh was used with the wall function model (Johnsen et al., 2015) whereas the fine mesh was used with the two-step model (Pääkkönen et al., 2016). With the fine mesh, the y+ value at the surface is about 0.08, and the total number of cells is 76000. In the coarse mesh, the y+ value at the wall is between 20 (for the u f ,x,in = 0.2m/s case) and 36 (for the u f ,x,in = 0.4m/s case), and the total number of cells is 276. In addition, the wall function utilizes a 1-dimensional, logarithmic subgrid consisting of 300 computational nodes, the first node at a walldistance equal to 1/10000th of the distance to the cell center in the coarse CFD mesh (∼ 2.34 · 10−7 m). Model Fluid The test liquid in the experiments was a mixture of various salts dissolved in water. Refer to (Pääkkönen et al., 2015) for details. In the current modelling work it was assumed that the test fluid was a pure calcium carbonate, CaCO3 , solution in water. Thus, the mixture was considered as a dilute, electrically quasi-neutral ideal mixture with no chemical reactions. In the present paper, the CaCO3 mass-fraction of 4.197 · 10−4 kg/kg was used for the test fluid entering the model geometry. Temperature-dependent fluid properties (mass density, viscosity, diffusivity) were modelled in accordance with Table 2 in (Pääkkönen et al., 2015). Fouling Models Traditionally mass deposition at the wall surface, in crystallization fouling, is modelled based on a two-step approach. In the two-step modelling approach, the fouling process consists of 1) transport from the bulk to the vicinity of the wall, and 2) surface integration (i.e. adsorption onto the fouling layer). The species transport to the vicinity of the crystalfluid interface, is based on the difference between the bulk and interface concentrations. The mass transfer coefficient is typically estimated from empirical correlations. At the surface, the integration of the species into the crystal body is modelled as a pseudo chemical reaction driven by the difference between the interface and saturation concentrations. When the two steps are combined, the interfacial concentration, which is often unknown, cancels out of the model. The two-step approach has been used as a stand-alone model (Bansal et al., 2008; Helalizadeha et al., 2005; Augustin and Bohnet, 1995) as well as part of a CFD model (Mwaba et al., 2006; Brahim et al., 2003). Two-step fouling model Pääkkönen et al. (2016) implemented the two-step model into CFD by utilizing the ability of CFD to model the transport of species to the vicinity of the surface, and thus provide the interfacial concentration difference between the surface and the fluid. To account for the wall shear-stress dependency of the adhesion probability seen in experiments (Pääkkönen et al., 2015), a time scaling factor was included in the model to scale the fluid residence time at the wall. The mass deposition rate to the surface, based on the twostep approach, including the effect of the residence time (Pääkkönen et al., 2015) can be expressed as jdep = β    1 βρ f u2τ + (Cb −CSat ) − 2 kr0 µ f  s  2 βρ f u2τ 1 βρ f u2τ + 0 (Cb −CSat ) . (1) − 4 kr0 µ f kr µ f From the experiments, it was determined that the fouling process was controlled by surface integration (Pääkkönen et al., 2012). Thus, Eq. (1) reduces to jdep = kr0 (Cb −CSat )2 µf , ρ f u2τ (2) where the rate constant for the surface integration can be determined from kr0 = k0 exp (−Ea/R T ) . (3) The pre-exponential factor k0 = 1.62 · 1022 m4/kgs2 , and the activation energy Ea = 148kJ/mol were determined from the experiments, for the surface integration controlled fouling process (Pääkkönen et al., 2015). The two-step fouling model was implemented into CFD as mass and momentum sink terms. Fouling wall function The core idea of the fouling wall function approach is to formulate the species transport equations on one-dimensional form by applying appropriate approximations and simplifications in the turbulent boundary layer. Next, the simplified governing equations are solved on a local subgrid for each grid cell residing at the wall, to obtain the cell-specific deposition mass flux. Thus, the calculated species mass fluxes, at the wall, can be used as mass sinks in the CFD grid cells next to the wall. The set of steady-state governing equations consists of the Advection-Diffusion equation (ADE) for each species, ∇ · (ρ f Xi u f ) + ∇ · j d,i = 0 , (4) the fluid mixture momentum and energy equations, ∇ · (ρ f u f u f ) = −∇ ∇P + ∇ τ + ρ f g , (5) ! ∇ · (ρ f hsens, f u f ) = ∇ (k f ∇ T ) − ∇ ∑ j i,d hsens,i , (6) i and the restriction that the mass- and mole-fractions must sum to unity, (7) ∑ Xi = ∑ zi = 1 . i i Introducing turbulence, dimensionless variables and appropriate simplifications, the simplified governing equations are obtained:   + ν + =0 (8) ∂y+ t ρ+f ∂y+ Xi + ∂y+ jd,i,y Sct gives the mass-fraction profiles; ∂y+ u+f ,x = 1// µ+ + µt+  (9) S. G. Johnsen, T. M. Pääkkönen, S. T. Johansen, R. L. Keiski, B. Wittgens No. of cells across channel Inlet velocity 0 . 2 m/s 0 . 4 m/s 4 30 49 6 20 36 8 15 25 10 11 20 gives the dimensionless axial fluid mixture velocity profile; and i h + + + ∂y+ T + = 0 ∂y+ K(0) T + K(1) (10) gives the dimensionless temperature profile.   N  + + + ≡ k+f ,c + k+f ,t ∂y+ ln c+ K(0) P − Prw ∑ i,d,y cP,i , (11) i=1 and + K(1) ≡ k+f + k+f ,t + k+f ,c (12) express the dimensionless groups in Eq. (10). For more details, refer to (Johnsen et al., 2015). Due to the assumed weak effect of thermophoresis (due to small temperature gradients) and the lack of good estimates of the thermophoretic diffusivity, only diffusiophoresis (concentration gradient diffusion) was considered in the current work. Furthermore, it was assumed that the model fluid could be treated as a dilute, ideal mixture. This reduces the Maxwell-Stefan diffusion model to the Fickian diffusion model. The mixture mass density and viscosity was modelled in accordance with (Pääkkönen et al., 2015), while constant mixture thermal conductivity and specific heat capacity 0.6637W/m2 of and 4182J/kgK , respectively, were used. The turbulent Schmidt number was set to 1. The MaxwellStefan binary diffusivity was tuned so that the area averaged deposition rate matched that of the experiments, for the u f ,x,in = 0.2m/s data-point, and was kept constant for the other inlet velocities. This resulted in a Fickian diffusivity of 3.64 · 10−5 m2/s. CFD Models CFD modelling was performed using the ANSYS FLUENT 16.2 CFD software. Turbulence is modelled with the standard k − ε turbulence model. In the fine-mesh CFD model, the Enhanced Wall Treatment is employed to resolve the near wall region in the fine mesh model. Temperature dependent fluid properties were implemented via user-defined functions (UDFs) in accordance with (Pääkkönen et al., 2015). The fouling models were also implemented via UDFs and hooked into ANSYS Fluent via the adjust function hook. Due to the low deposition rates observed, it was expected that the mass transfer to the wall would have a very small effect on the bulk conditions in the coarse mesh. Thus, the fouling wall function was not utilized as a mass source, but was run on a frozen flow field. Coarse-Mesh Velocity Wall Function The fouling wall function was designed to work on grids where the grid cells residing on the wall are in the log-layer. The main reason for this is that its bulk boundary conditions were chosen to be valid for fully developed turbulent flow. In the current experimental set-up, however, due to the low Reynolds numbers, such a stringent requirement of the wall 20 Dimensionless Velocity Parallel to the Wall, [‐] Table 1: Wall y+ values at the centre cross-section, for selected coarse grids with uniform node spacing, for inlet velocities 0.2 and 0.4m/s . Ashrafian, 2007 Fine‐Mesh Coarse‐Mesh Fouling Wall Function ‐ Subgrid Model 18 16 14 12 0.4m/s 10 0.2m/s 8 6 4 2 0 0.1 1 10 100 1000 Dimensionless Distance to the Wall, y+, [‐] Figure 2: Comparison of dimensionless velocities as functions of dimensionless wall distance at the center cross-section (isothermal conditions), for the coarse- (circles) and finemesh (solid lines) CFD models, the fouling wall function subgrid model (dashed, black line), and theoretical velocity profile (Ashrafian and Johansen, 2007) (dotted, black line). y+ left us with very coarse meshes. In Table 1, the approximate wall y+ value at the center cross-section (see Figure 1) is shown for various coarse meshes where the node spacing is constant across the channel. In order to predict the wall shear stress and general velocity profile accurately, on the coarse mesh, the wall function proposed by Ashrafian and Johansen (2007), was employed;    11.4 arctan y+ , y+ ≤ y+ ∗ 11.4   u+f ,x (y+ ) = , (13) + > y+  1 ln 1+κy++ + u+ (y+ ), y ∗ ∗ f ,x κ 1+κy ∗ with the dimensionless turbulent kinematic viscosity ( νt+ = y+ 11.4 κy+ 2 y+ ≤ y+ ∗ , y+ > y+ ∗ (14) where dimensionless velocity is defined as u+f ,x = u f ,x /uτ , dimensionless wall distance is defined as y+ = uτ y/ν , y+ ∗ = 51.98, and κ = 0.42 is the von Kármán constant. A sensitivity study was done to investigate how the coarse meshes performed against the fine-mesh CFD model and the Ashrafian-Johansen wall function. It was determined that the mesh with 6 cells across the channel reproduced the finemesh velocity and temperature profiles quite well and at the same time gave an acceptable wall y+ value. In Figure 2, it is shown how the fine-mesh and coarse-mesh CFD models perform against the profile published by Ashrafian and Johansen (2007) under isothermal conditions (no heating), in terms of dimensionless variables. The deviations at high y+ values are due to the effect of the opposing channel wall and the relatively low Reynolds numbers investigated. For the coarse-mesh CFD model, the fouling wall function subgrid model is included for validation of the subgrid velocity profile. In Figure 3a, the coarse and fine-mesh axial velocity profiles at the center cross-section are compared, and in Figure 3b, the temperature profiles are compared. It can be seen that generally, the axial velocity was underpredicted, in the coarse-mesh CFD model, whereas the temperature was overpredicted. USER-DEFINED WALL FUNCTION FOR DIRECT PRECIPITATION FOULING IN ANSYS FLUENT/ CFD 2017 355 0.45 Coarse‐Mesh CFD Model Fine‐Mesh CFD Model Coarse‐Mesh CFD Model Fine‐Mesh CFD Model 350 345 0.35 0.4m/s 340 0.30 Temperature, [K] Velocity Parallel to the Wall, [m/s] 0.40 0.25 0.20 0.2m/s 0.15 335 330 325 320 315 0.10 0.2m/s 310 0.05 305 0.4m/s 300 0.00 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 0 1 2 3 4 5 6 7 8 9 Distance to Heated Wall, [mm] Distance to Heated Wall, [mm] (a) (b) Figure 3: Comparison of parallel-to-wall flow velocity profiles (a) and temperature profiles (b) at the center duct cross-section (x = 100mm), for coarse and fine-mesh CFD models, for wall heat flux of 52.5kW /m2 and inlet velocities 0.2m/s and 0.4m/s . Boundary Conditions for the Fouling Wall Function The fouling wall function requires boundary conditions for temperature and species mass-fractions at the wall as well as axial velocity, temperature and species mass-fractions in the bulk. The bulk values as well as the wall temperature are taken directly from the CFD model via the inbuilt macro library in ANSYS Fluent, and utilized as Dirichlet boundary conditions in the subgrid model. The species-specific massfraction boundary conditions at the wall, however, require special attention. First, the type of boundary condition depends on whether the species is depositing or not; second, they depend on which diffusive transport mechanisms are dominating close to the wall (Johnsen et al., 2017). E.g., consider the case where diffusion due to mass-fraction gradients (diffusiophoresis) is the sole transport mechanism close to the wall. For the non-depositing species, the massfraction gradient at the wall must be zero to ensure zero deposition flux, and we employ the Neuman BC for the ADE, at the wall. For the depositing species, however, we do not have a priori knowledge of the deposition flux, so we cannot use the mass-fraction gradient as a BC. We have to use the Dirichlet BC. That is, we need to specify the mass-fractions of the depositing species, at the wall. The mass-fractions at the wall (interface mass-fractions) are consequences of the balance between transport through the turbulent boundary layer and the species integration into the crystal lattice. Therefore, it is a function of e.g. temperature, temperature gradient, composition, composition gradients, wall shear stress, crystal properties, etc. Thus, the interface mass-fraction is not just a fixed boundary condition, but is in fact part of the solution itself. If the kinetics of the surface reaction are known, it is possible to estimate the interface mass-fractions. Then, an iterative procedure can be employed to find the interface mass-fraction that ensures that the transport rate through the boundary layer and the integration rate into the crystal are identical (Johnsen et al., 2017). Lacking accurate predictions of the surface reaction rates, the current wall function model employed interface concentrations obtained from the fine-mesh CFD model (see Figure 4). These concentrations are dependent on both wall temperature and inlet velocity (wall shear stress). By curve fitting the Logistic function, a XI,reg = , (15) 1 + (Tw /b )c Table 2: Curve fit polynomial coefficients for velocity dependence of interface mass-fractions (Eqs. 16-18). a 0 1 2 3 b c 0.251 654 342.436 409.600 1.284 76 26.6133 −2179.69 −3.577 31 −112.872 4968.05 3.414 71 to the fine-mesh CFD data, we obtained good representations of the interface mass-fractions for each inlet velocity case. The inlet velocity-dependent fitting parameters, a, b, and c, are shown in Figure 5, and could be accurately described in terms of 3rd and 2nd order polynomials; a = a0 + a1 u f ,x,in + a2 u2f ,x,in + a3 u3f ,x,in , b = c = b0 + b1 u f ,x,in + b2 u2f ,x,in , c0 + c1 u f ,x,in + c2 u2f ,x,in . (16) (17) (18) The coefficients are given in Table 2. Employing Eq. (15) with coefficients given by Eqs. 16-18, we got a good, general representation of the CFD-data (see black circles in Figure 5). Figure 6 shows the temperature dependence of the calculated interface mass-fraction (Eq. (15)), for selected inlet velocity cases. It is seen that the interface mass-fraction drops from close to the bulk value to zero, at a certain threshold temperature, which appears to be dependent on the inlet velocity. In reality, this is a consequence of the complex interplay between mass deposition rate, interface mass-fraction, wall temperature, and wall shear stress. We will be content, however, to consider this as an inlet velocity dependent feature. At temperatures below the threshold, the deposition regime is interface controlled, whereas at higher temperatures it is diffusion controlled. Pääkkönen et al. (2012) concluded that the fouling regime was interface controlled, in these experiments, since the over-all deposition rate is not increasing for increasing flow-velocities, as would be expected for a mass transfer controlled fouling regime. However, various segments of the heated wall may be in different fouling regimes depending on the local flow conditions and wall temperature, as indicated in Figure 7. In general, the higher the difference between the bulk and interface mass-fractions, the higher CaCO3 Mass‐Fractions @ Heated Wall, [10‐4 kg/kg] S. G. Johnsen, T. M. Pääkkönen, S. T. Johansen, R. L. Keiski, B. Wittgens 4.5 Ux,in=0.4 m/s 4.0 3.5 3.0 2.5 2.0 1.5 1.0 Fine‐Mesh CFD Data Curve‐Fitted Data 0.5 0.0 0 20 40 60 80 100 120 140 160 180 200 Position Along Streamwise Direction of Heated Wall, [mm] Figure 4: Comparison of fine-mesh CFD (black circles) and bestfit (red lines) CaCO3 mass-fractions at the wall plotted against the axial position along the heated wall, for selected inlet velocities. 400 0.42 300 250 0.41 200 0.40 150 a b c Polynomial trend‐lines 0.40 0.39 0.20 0.25 0.30 0.35 100 50 Curve‐Fit Parameter Values (b,c) Curve‐Fit Parameter Values (a) 350 0.41 0 0.40 Inlet Velocity, [m/s] CaCO3 Mass‐Fractions @ Heated Wall, [10‐4 kg/kg] Figure 5: Curve-fit parameters a, b, and c (see Eq. (15)) plotted as functions of inlet velocity, along with best-fit polynomial trend-lines (see Eqs. 16-18 and Table 2). 4.5 Inlet Bulk Mass‐frac. 4.0 3.5 3.0 2.5 2.0 1.5 1.0 Figure 7: Wall temperature vs. position along the heated wall, for the u f ,x,in = 0.333m/s case, for the fine-mesh model (red), coarse-mesh model (solid black), and adjusted coarse-mesh wall-temperature (−6.5K) (dashed black). The relationship between the wall temperature and the interface mass-fraction is shown by the white curve. The contour plot in the background corresponds to the interface mass-fraction values at given wall temperatures (dark gray corresponds to low XI , and light gray corresponds to high XI ) and links the modelled, local wall temperatures with an expected local interface mass-fraction. prone to overpredict the wall temperature, as was discussed above (see Figure 3b), there is a risk that the interface massfraction is severely underpredicted if the true wall temperature is lower than, but close to the threshold temperature. To reduce the risk of overprediction of deposition rates, a fixed 6.5K was subtracted from the wall temperature when calculating the interface mass-fraction from Eq. (15). Figure 7 shows that a greater part of the overpredicted wall temperature curve (solid black) is in the low interface mass-fraction region (dark gray area) than the fine-mesh model wall temperature curve (red). Hence, a greater part of the wall will have low interface mass-fraction in the coarse-mesh model than in the fine-mesh model. The corrected wall temperature curve (dashed black), however, is more similar to the finemesh model temperature curve. Furthermore, interface massfractions below the saturation mass-fraction indicate that the fluid is undersaturated at the crystal surface. Physically this means that deposition is unfavorable with respect to minimizing the Gibbs free energy, thus no deposition will take place (Johnsen et al., 2017). Therefore, the Dirichlet boundary condition for the CaCO3 was set to 0.5 XI,CaCO3 = max (XI,reg , XSat ) . 0.0 320 325 330 335 340 345 350 355 360 Wall Temperature, [K] Figure 6: Comparison of temperature dependency of CaCO3 bulk (red line), saturation (dashed red line), and interface (calculated for various inlet velocities, from Eq. (15): black= 0.4m/s, light gray= 0.2m/s) mass-fractions, at the wall. the deposition rate (mind that at interface mass-fractions below the metastable equilibrium mass-fraction, fouling might not take place at all). Thus, the deposition rate at locations with wall temperatures above the threshold can be expected to dominate. Since the coarse-mesh CFD model is (19) RESULTS AND DISCUSSION The ambition in the current work was to demonstrate the applicability of a previously developed fouling wall function framework (Johnsen et al., 2015), in practice. To approach this objective, its implementation, as a user-defined function in ANSYS Fluent 16.2, was employed to demonstrate how it performs against a more traditional two-step fouling modelling approach (Pääkkönen et al., 2016), in the context of a well-controlled laboratory experiment (Pääkkönen et al., 2012). The main motivation for developing the fouling wall function was to eliminate the need to resolve the turbulent boundary layer and enable efficient fouling modelling in industry scale USER-DEFINED WALL FUNCTION FOR DIRECT PRECIPITATION FOULING IN ANSYS FLUENT/ CFD 2017 7 Position Along Streamwise Direction of Heated Wall, [mm] 6 0 1E‐03 Fine-Mesh Std. K-epsilon Coarse-Mesh Wall Function Model 5 Local Mass eposition Rate, [kg/m2s] Mass deposition rate [10-6 kg/m2s] Experiments 4 3 2 1 0 0.20 0.25 0.30 0.35 50 100 150 200 Fine‐Mesh Model Coarse‐Mesh Model 1E‐04 1E‐05 0.2m/s 1E‐06 1E‐07 0.267m/s 0.333m/s 0.4m/s 1E‐08 0.40 Inlet Velocity, [m/s] Figure 8: Comparison of the area averaged mass deposition rates from the fine-mesh two-step model and the coarse-mesh fouling wall function model with the experimental data. CFD simulations. Hence, the modelling framework relies on relatively high wall y+ values in the CFD cells residing at the wall. This proved to be challenging in the employment of the above cited experimental and simulation data, for comparison. Due to the low Reynolds numbers encountered in the data from Pääkkönen et al., it was necessary to confide in a very coarse CFD mesh as basis for the fouling wall function modelling (see Figure 1). The mass deposition rates predicted by the fouling wall function are depending directly on the wall function boundary conditions; • wall mass-fractions for the depositing species, • bulk and wall temperatures, • bulk velocity parallel to the wall, where bulk refers to the center of the CFD grid cells residing at the wall. Thus, accurate prediction of the deposition rates rely heavily on the accurate CFD modelling of these quantities. By utilizing the wall function published by Ashrafian and Johansen (2007), we managed to reproduce the fine-mesh CFD model velocity and temperature profiles fairly well, qualitatively. However, the quantitative discrepancy turned out to be the major source of error in the fouling wall function modelling results. In Figure 2, it can be seen how the dimensionless velocity profiles are comparable in the absence of heating, and in Figure 3 it can be seen how dimensional velocity and temperature profiles are comparable under constant heating of 52.5kW /m2 . The effect on the velocity profiles, by turning on/off heating was minimal. Since thermophoresis was neglected in the current work, the role of the temperature was to provide the temperature dependent fluid properties (mass density, viscosity, and saturation mass-fraction), and interface mass-fraction for the depositing species. Although the inaccurate prediction of any of these will affect the predicted mass deposition rate to some extent, it seemed that the effect of the inaccurate prediction of the interface mass-fraction was the most severe. As was indicated in figures 6 and 7, even modest errors in the local wall temperature could result in a severely miss-represented interface mass-fraction. Since the mass deposition rate is expected to scale approximately linearly with the difference between the bulk and interface mass-fractions, the mass deposition rate can be off by an order of magnitude by just a slight overprediction of the wall temperature, as seen in Figure 6. To avoid underpredicting the interface mass-fraction due to overprediction of the wall temperature, the temperature was 1E‐09 Figure 9: Comparison of the local mass deposition rates calculated by the fine-mesh two-step model (lines) and the coarsemesh fouling wall function model (circles), at selected inlet velocities. subtracted a fixed 6.5K when calculating the interface massfractions (see Figure 7). Figure 8 presents a comparison between the experimental data, the fine-mesh two-step fouling model data, and the data obtained from the coarse-mesh fouling wall function model. In the absence of reliable measurements/calculations of the diffusivity, it was treated as a calibration parameter, for the fouling wall function. The fouling wall function data were thus obtained with a tuned diffusivity of 3.64 · 10−5 m2/s, reproducing the u f ,x,in = 0.2m/s experimental data point. The same, constant diffusivity was used in all grid cells along the wall, for all the inlet velocity cases. Despite the issues with predicting the required boundary conditions for the fouling wall function model accurately, the modelling results compared very well with the results from the fine-mesh two-step fouling modelling and the experimental data, in terms of the area averaged mass deposition rate. In Figure 9, the local deposition rates are compared for the fine-mesh two-step model and the coarse-mesh fouling wall function model. It can be seen that even if the area-averaged values compared well, the local values differs significantly. The mismatch seems primarily to be due to • inaccurate prediction of interface mass-fraction; • inaccurate prediction of wall temperature in the coarse mesh; • inaccurate prediction of bulk velocity in the coarse mesh. The most crucial improvement to the fouling wall function model would be to get accurate interface mass-fractions. An in-depth study of these effects are left to future investigations. In the meantime, we are content to summarize that the fouling wall function approach performed very well in a scenario, slightly outside the design specifications of the modelling framework, with respect to the Reynolds number. The model fluid used in the current paper is a coarse simplification of the actual fluid employed in the cited experiments. The real fluid was a salt-water solution involving a multitude of chemically reacting ions and molecules. This is reflected by the fact that the content of dissolved CaCO3 in the model fluid, is much higher than the saturation concentration. Thus, the modelled CaCO3 may be seen as a pseudo-component representing e.g. the true CaCO3 fraction in addition to Ca2+ , CO2− 3 and possibly other species. In the present case, at relatively low concentrations, this simplification seems to be justified in both modelling approaches S. G. Johnsen, T. M. Pääkkönen, S. T. Johansen, R. L. Keiski, B. Wittgens employed. However, this may be part of the explanation of the local difference between deposition rates resulting from the two modelling methods. The present demonstration case indicates that in industryscale applications, where very fine meshes are infeasible, the wall function approach may provide a means to do physically detailed simulations of complex fluids, in complex geometries, at reasonable computational cost. In particular, if it can be assumed that the deposition rates are so small that they do not affect the flow field significantly, the savings in computational cost will be great. Then, the fouling wall function can be run on a frozen flow-field, and sensitivity studies or optimization studies on e.g. diffusivities, wall surface properties, etc., that does not affect the macro scale flow-fields can be performed without the need to update the frozen flow-field. Establishing the frozen flow-field on the coarse mesh, without the fouling wall function activated is very efficient due to the low number of computational cells needed. Then, running multiple fouling scenarios can be done on that flow-field just by changing input parameters to the fouling wall function and running one single CFD iteration, for each fouling scenario, with the fouling wall function activated. CONCLUSION Two different CFD modelling approaches were compared with experimental data on mass deposition rates in an experimental heat exchanger set-up. The two CFD strategies resolved the fine length-scales determining the mass transfer through the turbulent boundary layer, in two different ways: 1) the refinement was done in the 2D CFD mesh, resulting in a relatively high number of grid cells and a wall y+ of ca. 0.08; and 2) the refinement was taken into account in a wall function utilizing a 1-dimensional subgrid, allowing for a coarse CFD mesh with wall y+ of about 30. The fine-mesh CFD model utilized a traditional two-step modelling approach for the mass deposition modelling, complemented with the fluid residence-time at the wall, whereas the coarse-mesh CFD model wall function solved the coupled Advection-Diffusion, momentum and energy equations on a local subgrid to estimate the mass deposition rates. The coarse-mesh model performed very well compared to the fine-mesh model and experimental data, with respect to area average deposition rates. Significant mismatch was observed, however, in the local deposition rates. The lacking accuracy in the coarse-mesh model was mainly due to the challenges in predicting interface mass-fractions, wall temperatures and bulk velocities, on the very coarse mesh. The over-all good performance of the coarse-mesh model gives strong support to the idea that the wall function approach may provide a means to do physically detailed simulations of complex fluids, in complex, industry-scale geometries, at a reasonable computational cost. ACKNOWLEDGEMENTS This work was funded by the Research Council of Norway and The Norwegian Ferroalloy Producers Research Association, through the SCORE project (Wittgens, 2013). Sverre expresses his gratitude towards the University of Oulu, Environmental and Chemical Engineering, FINLAND, for hosting him and his family during August 2016. REFERENCES ASHRAFIAN, A. and JOHANSEN, S.T. (2007). “Wall boundary conditions for rough walls”. Progress in Computational Fluid Dynamics, 7(2-4), 230–236. AUGUSTIN, W. and BOHNET, M. (1995). “Influence of the ratio of free hydrogen ions on crystallization fouling”. Chemical Engineering and Processing: Process Intensification, 34(2), 79–85. BANSAL, B., CHEN, X.D. and MÜLLERSTEINHAGEN, H. (2008). “Analysis of ’classical’ deposition rate law for crystallisation fouling”. Chem. Eng. Process.: Process Intensification, 47, 1201–1210. BRAHIM, F., AUGUSTIN, W. and BOHNET, M. (2003). “Numerical simulation of the fouling process”. International Journal of Thermal Sciences, 42(3), 323 – 334. HELALIZADEHA, A., MÜLLER-STEINHAGEN, H. and JAMIALAHMADIA, M. (2005). “Mathematical modelling ofmix ed salt precipitation during convective heat transfer and sub-cooled flowboiling”. Chemical Engineering Science. JOHANSEN, S.T. (1991). “The deposition of particles on vertical walls”. International Journal of Multiphase Flow, 17(3), 355–376. JOHNSEN, S.G. and JOHANSEN, S.T. (2009). “Deposition modelling from multi-phase dispersed flow - a boundary layer wall function approach”. Heat Exchanger Fouling and Cleaning VIII - 2009. JOHNSEN, S.G., ÅBERG, M. and JOHANSEN, S.T. (2010). “Implementation and demonstration of a boundary condition wall function for industrial scale particulate fouling cfd modeling”. ICMF 2010 7th International Conference on Multiphase Flow, Tampa, Florida, USA. JOHNSEN, S.G., JOHANSEN, S.T. and WITTGENS, B. (2015). “A wall-function approach for direct precipitation/crystallization fouling in cfd modelling”. Heat Exchanger Fouling and Cleaning XI - 2015. JOHNSEN, S.G., JOHANSEN, S.T. and WITTGENS, B. (2016). “Implementation and demonstration of a boundary condition wall function for direct precipitation fouling cfd modelling”. ICMF 2016 9th International Conference on Multiphase Flow, Firenze, Italy. JOHNSEN, S.G., PÄÄKKÖNEN, T.M., ANDERSSON, S., JOHANSEN, S.T. and WITTGENS, B. (2017). “On the wall boundary conditions for species-specific mass conservation equations in mathematical modelling of direct precipitation fouling from supersaturated, multi-component fluid mixtures”. arXiv:1703.01448 [physics.flu-dyn]. KLEIJN, C.R., VAN DER MEER, T.H. and HOOGENDOORN, C.J. (1989). “A mathematical model for lpcvd in a single wafer reactor”. Journal of The Electrochemical Society, 136(11), 3423–3433. KRISHNAN, A., NING, Z. and PRZEKWAS, A. (1994). “A computational model for chemical vapor deposition processes in industrial reactors”. 4th InterSociety Conference on Thermal Phenomena in Electronic Systems (I-THERM), 222–236. MÜLLER-STEINHAGEN, H. (2011). “Heat transfer fouling: 50 years after the kern and seaton model”. Heat Transfer Engineering, 32(1), 1–13. MULLIN, J.W. (2001). Crystallization. ButterworthHeinemann. MWABA, M.G., GOLRIZ, M.R. and GU, J. (2006). “A semi-empirical correlation for crystallization fouling on heat exchange surfaces”. Applied Thermal Engineering, 26(4), 440–447. PÄÄKKÖNEN, T.M., RIIHIMÄKI, M., SIMONSON, C.J., MUURINEN, E. and KEISKI, R.L. (2012). “Crystallization fouling of CaCO3 - analysis of experimental thermal USER-DEFINED WALL FUNCTION FOR DIRECT PRECIPITATION FOULING IN ANSYS FLUENT/ CFD 2017 resistance and its uncertainty”. International Journal of Heat and Mass Transfer, 55(23-24), 6927 – 6937. PÄÄKKÖNEN, T.M., RIIHIMÄKI, M., SIMONSON, C.J., MUURINEN, E. and KEISKI, R.L. (2015). “Modeling CaCO3 crystallization fouling on a heat exchanger surface definition of fouling layer properties and model parameters”. International Journal of Heat and Mass Transfer, 83, 84–98. PÄÄKKÖNEN, T.M., OJANIEMI, U., PÄTTIKANGAS, T., MANNINEN, M., MUURINEN, E., KEISKI, R.L. and SIMONSON, C.J. (2016). “CFD modelling of CaCO3 crystallization fouling on heat transfer surfaces”. International Journal of Heat and Mass Transfer, 97, 618 – 630. WITTGENS, B. (2013). “Score - staged combustion for energy recovery in ferroalloy industry”. http://www.sintef.no/en/projects/score-staged-combustionfor-energy-recovery-in-fer/.
5cs.CE
arXiv:1502.06286v1 [cs.PL] 22 Feb 2015 StarL: Towards a Unified Framework for Programming, Simulating and Verifying Distributed Robotic Systems ABSTRACT We developed StarL as a framework for programming, simulating, and verifying distributed systems that interacts with physical processes. StarL framework has (a) a collection of distributed primitives for coordination, such as mutual exclusion, registration and geocast that can be used to build sophisticated applications, (b) theory libraries for verifying StarL applications in the PVS theorem prover, and (c) an execution environment that can be used to deploy the applications on hardware or to execute them in a discrete event simulator. The primitives have (i) abstract, nondeterministic specifications in terms of invariants, and assume-guarantee style progress properties, (ii) implementations in Java/Android that always satisfy the invariants and attempt progress using best effort strategies. The PVS theories specify the invariant and progress properties of the primitives, and have to be appropriately instantiated and composed with the application’s state machine to prove properties about the application. We have built two execution environments: one for deploying applications on Android/iRobot Create platform and a second one for simulating large instantiations of the applications in a discrete even simulator. The capabilities are illustrated with a StarL application for vehicle to vehicle coordination in a automatic intersection that uses primitives for point-to-point motion, mutual exclusion, and registration. 1. INTRODUCTION Programs that monitor and control physical processes over a network are becoming common in robotics [22, 36, 39], smart homes [11], and flexible manufacturing [24]. An execution of such a program (consider, for example, a robotic swarm [36]) is not determined by the underlying computing stack alone, but it also depends on the physical and the network environment. Therefore, to support useful formal reasoning about these types of programs the semantic framework should account for the nondeterminism arising from concurrency, message delays, failures, and the uncertainties Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]. Copyright 20XX ACM X-XXXXX-XX-X/XX/XX ...$15.00. in the physical world. In swarm robotics, for instance, there is a big gap between the semantics of the models used for proving theorems and the real environment in which the systems run. The former is typically a synchronous network without message delays, collision-free physics, etc., while actual implementations use ad hoc strategies for dealing with message losses, noise, and obstacle avoidance, etc. We are developing the StarL framework [1] to bridge this gap by providing a nondeterministic programming abstraction that is sufficiently detailed for proving theorems about reliability and performance of the system, and yet does not overwhelm the application developers. The core of StarL is a collection of primitives—mutual exclusion, point-to-point motion, leader election, geocast, set-agreement, and many more—that are useful for building distributed robotic applications (StarL applications). Each primitive has a hardwareindependent, abstract, and nondeterministic specification and an open source implementation in Java. The motionrelated primitives also have platform specific implementations. StarL applications running on robots are written in Java and use these primitives to accomplish sophisticated coordination tasks. Example StarL applications we have built include a distributed search in which a collection of robots coordinate to find tagets in a building, a light painting application in which a given diagram’s outline is painted collaboratively by a collection of robots, and a traffic intersection coordination protocol (see Section 3). The primitives not only allow us to develop verifiable code for distributed robotics, but offer easy code reuse and maintenance. The second component of StarL is the StarL PVS library of theories modeling the abstract specifications of the primitives in the language of the PVS theorem prover [30]. These specifications are nondeterministic and have two parts. The first part asserts an invariant property of the primitive and the second part asserts an assume-guarantee style progress property [16]. For example, an abstract specification of the mutual exclusion primitive is parameterized by a set of identifiers for participating processes, and the identity of the critical section(s). The specification states (a) no two participating processes occupy the critical section simultaneously (invariant), and (b) that if there exists a time bound within which acquired critical sections are released (assumption) then there exists a time bound within which any requesting process gains access to the critical section. In this paper, we show how the PVS theorem prover can be used to develop theories and to verify key invariant properties of StarL applications using the above mentioned primitive theories and OVERVIEW OF STARL This work builds up on the work of Zimmerman’s master’s thesis [40, 13]. We concretize the concept of primitives, build the connection to PVS, and develop several new applications. Hardware Layers 2. StarL Portable Layers their nondeterministic specifications1 . The third component of StarL is a collection of StarL execution environments that can be used to deploy the applications on actual hardware or in a simulator. We have built two execution environments for StarL: one for deploying Applications on our Android/iRobot platform and a second one for simulating large instances of the applications in a discrete even simulator. To our knowledge, StarL is the first framework that enables the creation of verified software for distributed robotic systems. We provide an overview of StarL in Section 2. Then we illustrate application development in StarL with one detailed example in Section 3. The PVS translation and verification of this application in Section 3.3. Section 4 describes some of the other StarL primitives. Section 5 describes the execution environments and the simulator. Finally, we discuss related work in Section 6 and conclude in Section 7. StarL Application StarL Primitives Messaging Interface Motion Interface Communication Protocol Motion Automation Communication Drivers Motor Drivers Communication Channel Hardware Chassis Application Layer Interface Layer Sensors Interface Logic Layer Position & Sensor Data Processing Platform Layer Sensor/GPS Drivers Hardware Layer Localization & Sensors Figure 1: StarL Architecture. 1 2 3 4 5 6 7 8 mc = M otionControl(...); mc.do_move(t, A); while (¬mc.motionf lag && ¬mc.f ailed) // wait if (mc.motionf lag) { // reached } Primitives. Deterministic abstractions are easier to program than nondeterministic ones. Programs for a distributed robotic system, however, have to deal with nondeterminism from communication, dynamics, and failures. We make the choice of exposing these nondeterminisms to the programmer through the StarL primitives. We ameliorate the loss of determinism by making the primitives uniform in the following way: The StarL architecture defines a special set of write-one, readmany objects that are stored in a part of the heap called the global variable holder (gvh) for each participating process. A StarL program interacts with a primitive by invoking a set of StarL functions that access these StarL objects in gvh. For example, the StarL M utex primitive implements a distributed mutual exclusion algorithm that allows fixed set of processes PList to access an object in a mutually exclusive fashion. A StarL application uses this primitive as follows: 1 2 3 4 5 6 7 8 9 mux = M utex(id, PList); //exclusive with PList mux.do_mutex(myreq); while (¬mux.crit && ¬mux.f ailed) // wait if (mux.crit) { // use mux.release(myreq); } The variables mux.crit and mux.f ailed in process i’s gvh are written by the mutual exclusion algorithm to indicate that i does or does not have access to the requested set myreq, or whether the mutex algorithm has failed. Similarly, the StarL M otionControl primitive implements a path planning and motion control primitive that interfaces with the low-level motors and actuators and enables the robot running the process to move towards a target t while avoiding a region A. An application uses this primitive as follows: 1 Progress properties are verified by composing assumptions and guarantees but this will be the topic of a future paper. The variables mc.motionf lag and mc.f ailed in process i’s gvh are updated by the motion control algorithm to indicate to the application if i has arrived at the target or whether the motion control has failed. Verification. Each primitive not only has a Java implementation but also has formal specifications that state their key invariants and assume-guarantee style progress properties. These properties are written in the language of the PVS theorem prover [31]. In Section 3.5, we describe how these primitive theories are composed with the specification of the application to create complete PVS theories that can then be verified using the PVS prover. In this paper, we focus on the invariant properties which are proved inductively using the Timed Automaton Library for PVS [3, 5]. The progress properties involve compositional assume-guarantee proofs that are commonly used in the proof of self-stabilizing algorithms [12] and will be the subject of a future paper. Architecture. A robot interacts with the physical environment through sensors and motors. It also interacts with other robots through the communication channels. All of these constitute the execution environment of a StarL application and are organized into five layers as shown in Figure 1. The bottom two layers are hardware platform specific and the top three layers are portable (see Section for more details). For deploying StarL Applications on our Android/iRobot platform, the platform layer implements the functions for controlling motion of the iRobot Create robots, wireless communication, and for reading data from the OptiTrack indoor positioning system. For simulating the applications, the platform layer is simulated using models of robot motion and communication channels. The logic layer wraps the low level methods into high level methods that will be provided to construct the interface layer. The interface layer consti- D ZONE (A0) A ZONE (B1) A ZONE (A1) A B D ZONE (B0) D ZONE (C0) C D A ZONE (D1) A ZONE (C1) D ZONE (D0) Figure 2: The four-way automatic intersection. tutes the global variable holder (gvh) and the various StarL functions to pass data in and out of rest of the stack. It is an organized collection of all underlying StarL functionality. Through the interface layer, applications may access each part of the framework. The top layer is the application layer. This includes StarL primitives (Section 4) as well as the StarL applications. The StarL primitives are constructed using methods from the interface layer. The StarL application uses both interface layer methods and StarL primitives to accomplish more complicated tasks. 3. AUTOMATIC INTERSECTION We discuss the key facets of StarL with an automatic intersection application. Automatic intersection protocols that exploit vehicle to vehicle (V2V) communication have been proposed at various levels of detail in the context of smart cities and autonomous cars [14, 18]. We use a toy version of this application to illustrate improvements in programmability and verifiability with StarL. Automatic intersection layout. Consider a four-way, double-lane, intersection that will be navigated by autonomous robotic vehicles through communication (see Figure 2). Each vehicle arrives at one of the arrival zones A0 , B0 , C0 , D0 with a designated departure zone A1 , B1 , C1 , D1 . It coordinates with the other vehicle according to a intersection coordination protocol (ICP) and proceeds to move through a sequence of critical zones A, B , C , D following certain right-hand traffic rules (e.g., no backing or U-turns). For example, a vehicle with source destination pair (A0 , D1 ) will have the path A0 , A, C , D, D1 . The requirements from the system are: (a) (traffic safety) No two vehicles occupy the same critical zone at the same time. (b) (traffic progress) There exists a time-bound within which every approaching vehicle departs. We would also like the protocol to permit concurrent safe traversals. For examples, vehicles with paths A0 , A, A1 and D0 , D, B , B1 should not block each other. 3.1 Intersection Coordination using StarL A protocol for intersection works as follows: the participating vehicles agree on the set of participants, then they request access to the sequence of zones needed for traversal in the intersection from the set of agreed-upon participants; once they have access to the entire sequence, they start traversing; when a zone is crossed it is released. For the sake of simplicity, in this presentation we assume that processes do not fail and robots do not get stuck. Figure 3 shows the code for implementing this ICP using StarL primitives and Figure 4 shows the actual Java implementation. Each vehicle participating in the coordination runs an instance of this protocol with the same identifier xid that uniquely identifies the intersection. For the process at vehicle i, the local variable plist i is a list of identifiers of participating process initialized to the emptylist. The local variable myseq i is a list of zones; it is initialized to the sequence of zones that i must traverse to go from its current position (mypos) to its destination. Here, mypos is a StarL variable in the gvh storing the position of the vehicle and is updated by the location sensors. This protocol uses two StarL primitives called Registration and M utex. More details about these primitives, their interfaces, and the conditional guarantees they provide are described in Section 4. In brief, Registration allows a set of processes in a neighborhood to agree on a subset that contains participating processes; M utex allows mutually exclusive access to one or a set of shared resources. reg and mux are instances of these primitives with the identifier xid . Finally, the loc variable, of the enumerated type, is initialized to the value S0. The protocol waits in a loop until loc becomes S0. If loc is S0 then the do register() function is invoked to start the registration process and loc is set to reg_wait. If and when the registration process returns successfully, the StarL variable reg.rList is set to a non-null value. From reg_wait, the process moves to mutex_wait only if registration completes (reg.rList nonempty) and in that case the list is copied to local variable plist and do mutex is invoked to obtain exclusive access to the sequence of zones mid (myseqi ) (except the first and the last) from the processes in plist. If and when the mutex process returns successfully, the StarL variable mux.crit is set to true. From mutex_wait, the process moves to move_wait only if mutex returns successfully (mux.crit true) and in that case do move is invoked which sends from plist a sequence of points to M otioncontrol. In move_wait, when the vehicle traverses the zone plist[1 ] and reaches plist[2 ], the zone plist[1 ] is removed from the list and release(plist[1]) is called to release that zone to the mutual exclusion. When the vehicle i reaches its destination zone, the loc is changed to S1. 3.2 Java Implementation of ICP Figure 4 shows a fragments of Java implementation of ICP that highlights the usage of the M utex and M otioncontrol primitives. Line 1 in Figure 4 (corresponds to line 5 in Figure 3) enumerates the program locations. Line 4 (corresponds to Line 1 in Figure 3) creates the variable plist to store the list of vehicles that will be returned from in the Registration primitive. Then it creates a variable (myseq) to hold the list of wanted zones. It is initialized by computing the sequence of critical zones plus the departure zone the vehicle needs to go through this intersection. Line 6 (line 3) creates a instance of the registration primitive in the gvh using the intersection ID. Similarly, a instance of the mutual 1 2 3 4 5 plist: List[PIDS] := {}; myseq: List[Zones] := path(mypos,dest) reg = Registration(xid); mux = M utex(xid); loc enum {S0,reg_wait,mutex_wait,move_wait,S1} := S0 private enum Location { S_0, REGISTER_WAIT, MUTEX_S, MUTEX_WAIT, MOVE_WAIT, S_1, DONE, ... }; LinkedList<ItemPosition> plist; LinkedList<ItemPosition> myseq = getMyseq(); RegPrim Reg = new Registration(gvh,I_ID); MutexPrim Mutex = new M_Mutex(gvh, I_ID); 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 while (state != done) switch case state S0: loc = reg_wait; reg.do_register(); reg_wait: if reg.rlist != null then state = mutex_wait; plist = reg.rList; mux.do_mutex(mid(myseq), plist); mutex_wait: if mux.crit = myseq then state = move_wait; do_move(plist) move_wait: if pos ∈ seq[2] then mux.release(seq[1]); myseq = tail(myseq); if myseq = [dest] then state := S1 S1: //done 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 Figure 3: General Algorithm. 23 24 exclusion primitive is created in the gvh in the next line. When access is granted by Mutex (line 23), it sends the motion command do move and changes loc to move wait. The the Java code, gvh.plat.moat refers to the motion automation that controls the movements of the robot. The vehicle stops when it has either reached the neighborhood of the destination or failed. In this application, since we want to ensure safety, the program is interrupted if collision is detected. Therefore, the vehicle stops if and only if it has reached the neighborhood of the destination (line 28, (line 16)). Then, line 29, (line 17) releases(release) the previous critical zone. Line 34,(line 18) moves (do move) to the next critical zone in myseq. Additionally, location is changed to to S 1 if there are no more zone in myseq. Line 42 waits until the vehicle has reached the neighborhood of the departure zone, then the last critical zone is released and the unRegister method is called. Line 46 freezes the robot, preventing any more motion command to be executed. Line 53 makes the execution of the while loop wait so that the states are updated once roughly every 100 milliseconds. 25 26 27 28 29 30 31 32 33 34 @Override public List<Object> callStarL() { while(location != DONE) { switch(location) { // implementation of some locations not shown case REGISTER_WAIT: if(Reg.getList() != null){ plist=Reg.getList(); Mutex.do_mutex(myseq,plist); location = Location.MUTEX_WAIT; } break; case MUTEX_WAIT: if(Mutex.od_mutex()){ gvh.plat.moat.doMove(currentDestination); location = Location.MOVE_WAIT; } break; case MOVE_WAIT:{ if(!gvh.plat.moat.inMotion) Mutex.release(CSname(preDestination)); preDestination = new ItemPosition(currentDestination); myseq.remove() if(!myseq.isEmpty()){ currentDestination = (ItemPosition)myseq.peek(); gvh.plat.moat.doMove(currentDestination); }; else{ location = Location.S_1; } 35 36 37 38 } break; case S_1: if(!gvh.plat.moat.inMotion) { Mutex.release(CSname(preDestination)); Reg.unRegister(); preDestination = null; gvh.plat.moat.motion_stop(); location = Location.DONE; } break; case DONE: break; } sleep(100); } 39 40 41 42 43 44 45 46 47 48 49 50 3.3 StarL PVS Library The StarL application code and the primitives can be translated to the PVS theorem prover’s language of high order logic, for rigorously proving safety and progress properties with appropriate environmental assumptions. Figure 5 shows the key part of the PVS theory specifying a system running the ICP application. It defines the semantics of the system in terms of a timed automaton [19]. Although the pseudo code of Figure 3 and its Java implementation Figure 4 are for an individual processes, this PVS theory (together with its supporting and importing theories) specify the behavior of the entire system with arbitrarily number of asynchronously evolving processes. 3.4 Overview of the PVS Theories The theory uses the TAME library [4, 6] for modeling timed automata in PVS. The body of the theory defines the states, the start states, the actions, and the transitions of the automaton—a special action dt models the passage of time. By importing the time machine theory with these parameters (Line 2), the generic timed automaton theory 51 52 53 54 55 } Figure 4: ICP Java Implementation. is instantiated and that gives the instances of the relevant definitions and theorems (e.g., the notion of reachable states, invariants, and inductive proof rules) for this model. The interface and the implementation of each StarL primitive is defined in separate parameterized PVS theories such as Mutex decls and Registration decls. The Traffic decls theory imports appropriate instances of these theories. In order to define a timed automaton that is the composition of several primitives (Mutex and Registration), in this paper we develop an approach for compositional modeling of timed automata in PVS. For the sake of brevity, the theory presented here excludes the registration process and we drop the parts related to timing behavior. Line 6 defines the state components of this automaton. time loc and myseq variables correspond to the variables with the same name in Figure 3. However, notice that here they are arrays indexed by the process (PID), i.e., they model the location and the sequence of zones for all the processes in the system. The variable timer is a global clock used to prove time-bound properties2 The timer move variable is a stopwatch that tracks, for each vehicle, the duration of physically traversing zones. The state component mux is the state of the imported Mutual exclusion primitive. The action datatype defines the names and types of all the state transition. The enabled (a, s) predicate defines whether the action a can occur in state s and the trans function function defines the post-state of a occurring at s. dt models the progress of real time; do mutex (i, Z) models the ith process requesting the set of zones Z; od mutex (i, Z) models successful completion, i.e., the mutual exclusion primitive granting i access to Z; and release(i, Z) models process i crossing a zone and releasing it to the mutual exclusion primitive. Note the enabling condition for completing Mutex (od mutex , Line 22): it is a conjunction of a condition from the ICP and a condition from Mutex; this captures composition of the two automata. Similarly in Lines 31-32, the transition function for the two actions are combining the transitions of ICP and Mutex. 2 Traffic decls : THEORY BEGIN IMPORTING Mutex decls[PIDS,Zones ] 4 sd: array[PIDS → (Valid sd?) ] 6 states: TYPE = [# loc: array[PIDS → Locations ], myseq: array[PIDS → ZoneList ], timer move: array[PIDS → nonnegreal ], timer: nonnegreal, mux: Mutex decls.states # ] 8 10 actions: DATATYPE BEGIN dt(delta t:nonnegreal): dt? do mutex(i:PIDS,RS:Zoneset): do mutex? od mutex(i:PIDS,RS:Zoneset): od mutex? release(i:PIDS,RS:Zoneset):release? END actions 12 14 16 18 enabled(a:actions, s:states):bool = CASES a OF dt(delta t): ... do mutex(i,RS): loc(i,s) = S0 AND RS = list2set(Path(sd(i))), od mutex(i,RS): loc(i,s) = mutex wait AND Mutex decls.enabled(od mutex(i,RS),mux(s)), release(i,RS): loc(i,s) = move wait AND RS = car(myseq(i,s)) AND (NOT myseq(i,s) = null) ENDCASES 20 22 24 26 trans(a:actions, s:states):states = CASES a OF dt(delta t): s WITH ... do mutex(i,RL): s WITH [loc:= loc(s) WITH [(i):= mutex wait ], mux:= mutex decls.trans(do mutex(i,RL),mux(s)) ], od mutex(i,RL): s WITH [loc:= loc(s) WITH [(i):= move wait ], mux:= mutex decls.trans(od mutex(i,RL),mux(s)) ], release(i,RL): IF myseq(i,s) = null THEN s WITH [loc:= loc(s) WITH [(i):= S1 ] ]ELSE s WITH [myseq:= myseq(s) WITH [(i):= cdr(myseq(i,s)) ], timer move := timer move(s) WITH [(i):= 0 ], mux:= Mutex decls.trans(release(i,RL),mux(s)) ] ENDIF ENDCASES 28 30 3.5 Proving Theorems about ICP The above PVS theory defines a timed automaton model and its semantics for a system with an arbitrary number of processes executing the ICP which in turn involves those processes participating in the M utex primitive. We give a sketch of the key invariants that are used to prove safety of ICP using the PVS theorem prover. The Mutex primitive is not presented in detail in this paper. It involves a set of processes and has a key component critset : [PIDS → Zoneset] that records the (possibly empty) set of zones that each process has exclusive access to. Its key invariant property is stated in Line 2 of Figure 6. It asserts that at any reachable state s of the Mutex primitive, for any pair of processes i and j, crit set(i, s) ∩ crit set(j , s) = ∅. The next inductive invariant (Line 8) states what we found to be the key property needed for proving safety of ICP: it asserts that for any process j, (a) if j is in S0, then myseq(j, s) is the list of zones from its current position to the destination, (b) if j is in mutex wait, then myseq(j, s) is same as the list in (a) and it has requested to M utex exclusive access to all the elements in this list, and (c) if j is in move wait, (i.e., M utex has completed and j is moving), then myseq(j, s) is a subset of crit set(j, s). Using this invariant, the main safety invariant (Line 10) is proved: it states that for any two processes that are moving, the occupy different zones. 4. STARL PRIMITIVES StarL currently includes the implementation of the following primitives: path planning, distributed path planning, geocast, leader election, registration, mutual exclusion, barrier synchronization. In this section, we enumerate the interfaces and specifications for some of them. Some of the specifications involve timing properties that are stated with respect to certain intervals defined over realtime. These intervals are defined using constants d, d1 , d2 , 2 The details of timing analysis will be presented in a future paper. 32 34 36 38 40 42 44 IMPORTING time machine[states,actions,enabled,trans,start ] END Traffic decls Figure 5: PVS theory for (part of) ICP. etc. The role of these constants play in verification are different from the role in implementation. For verifying StarL applications, these constants appear as existentially quantified parameters in the lemma statements (see Line 14). We assume that certain progress making events happen within some time bound, e.g., delivery of messages, to prove existence of time bounds of other events such as traversal through intersection. In the actual implementation of the primitives, the progress time bounds may be violated, but they still provide a guideline tuning best-effort strategies. 4.1 Motion Control The M otioncontrol primitive allows the application to direct the robot towards a specific target point while avoiding a bad region. Both the target and the region are specified in the current coordinate system. The motion completes successfully if the robot reaches a neighborhood of the target while avoiding the bad region and this is indicated to the program. The interface includes: (a) htarget, avoidi variable pair in the gvh that stores the target and the bad region, (b) gotopoint function is invoked to set target and avoid, 2 4 6 8 10 Inv mux safety(s):bool = FORALL (i,j): NOT (i = j) IMPLIES disjoint?(crit set(i,s),crit set(j,s)) lemma mux safety: LEMMA FORALL (s): reachable(s) ⇒ Inv mux safety(s); Inv list crit(s):bool = FORALL (j): (loc(j,s) = move wait IMPLIES subset?(list2set(myseq(j,s)),crit set(j,s))) AND (loc(j,s) = mutex wait IMPLIES list2set(myseq(j,s))= req set(j,s) AND myseq(j,s) = Path(sd(j))) AND (loc(j,s) = S0 IMPLIES myseq(j,s) = Path(sd(j))) lemma list crit: LEMMA FORALL (s): reachable(s) ⇒ Inv list crit(s); Inv safety(s):bool = FORALL (i,j): NOT (i = j) AND loc(i,s) = loc move wait AND loc(j,s) = move wait IMPLIES (NOT (car(myseq(j,s)) = car(myseq(i,s))) OR myseq(j,s) = null OR myseq(i,s) = null) lemma safety: LEMMA FORALL (s): reachable(s) ⇒ Inv safety(s); 12 14 16 % Progress lemmas lemma move entry: LEMMA FORALL (s): FORALL (i): EXISTS (d1 :nonnegreal): reachable(s) AND timer(s) > = d1 IMPLIES loc(i,s) = loc move wait; lemmap rogress: LEMMA FORALL (s): FORALL (i): EXISTS (d2 :nonnegreal): reachable(s) AND timer(s) > = d2 IMPLIES loc(i,s) = loc s1; Figure 6: PVS theory with key ICP invariants. (c) motionf lag is a boolean variable that is set to done when the motion completes successfully, and it is set to fail to indicate that the lower-level motion controller cannot move the robot to the target. The following properties summarize the specification of Motion control. (a) (safety) The position of the robot is always outside the region in avoid. (b) (progress) If motionf lag is set to true then the position of the robot is locates near target. The motion control primitive is implemented using lowerlevel control and path planning algorithms. More details about implementations are provided in Section 5.2. 4.2 Geocast and Broadcast The Geocast primitive allows a process to send a message m to all other processes/robots in its’ neighborhood A; here A is defined by distance, and d is a timing parameter. The following properties specify the behavior of the geocast primitive. The interface includes (a) do geocast(m, A, d) function to start geocast of message m over area A with timing parameter d (explained below), (b) hGcastf lagi is a variable in the gvh that indicates that the geocast has completed. The following properties summarize the properties of the primitive. If a message m is send through geocast at time t0 then the following hold: (a) (exclusion) Any process continuously located outside A during the time interval [t0 , t0 + d] will not deliver m. (b) (inclusion) Any process located within A during the time [t0 , t0 + d] will receive m within d time of the geocast. For a robot moving in or out of A during the geocast period, the message may or may not be delivered; but a robot outside A is guaranteed not to receive the message. The implementation of geocast over a wireless network involves details like tagging the message with the location of the originating process before sending, resending messages in the absence of acknowledgments, and dropping the messages based on the receiver’s location. Of course, (b) can only be guaranteed under additional assumptions about messages being delivered in a timely fashion. BCast(m, d) or broadcast is a special geocast in which the A defines the entire network. The second condition then requires that all process that are non-faulty over the interval [t0 , t0 + d] receive the message. 4.3 Registration The Register primitive solves a set-valued distributed consensus problem for a set of processes to agree on the identity of the participants. If registration completes successfully, then the agreed upon set contains a process’s identifier if and only if it is a participating process. The interface includes: (a) Register function for creating a register object, (b) do register function for starting registration, (c) hrList, tsi pair stores in the gvh; rList is the agreed set and ts is the time-stamp for when the computation finishes; otherwise rList stores a null value. The following properties summarize the nondeterministic specification of the Register primitive. (a) (agreement) For any two processes i and j with agreement timestamps (ts) within d of each other, the corresponding rList’s are identical. (b) (soundness) For any process i, i is contained in rList with time stamp ts only if i invoked do register at most d1 time before t. (c) (progress) For any process i, if i invokes do register then within at most d2 time registration completes with i, that is, rList contains i. The Register is implemented using the Geocast primitive. To support multiple registered lists inside an application, each registration object is invoked with an identifier. A registered process may unregister from the list and this essentially restarts a registration process among the remaining processes. The rList value can be updated with a new time stamp and in the interim it may be null . 4.4 Leader Election The Election primitive elects a leader and conveys the leader’s identity to set of participating processes. If the election fails then the participating processes learn about this as well. The interface includes: (a) Election function for creating an election object; it takes the list of participants as a parameter, (b) do election function starts the election, (c) hLeaderi stores the identity of the leader in the gvh,null if the election is in progress, and fail if the election fails. The following properties summarize the nondeterministic specification of the Election primitive. (a) (agreement) For any two processes i and j that start election within d time of each other, if Leader is not null or fail for either of the two processes, then Leader has identical value for both. (b) (soundness) For any process i, Leader = i only if i invoked do election at most d1 time before t. (c) (progress) For any process i, if i invokes do election then within at most d2 time election completes successfully, that is, Leader equals a valid identifier. Currently, one of the implementations of leader election is based on randomized ballot creation and a second implementation is based on a version of the Bully algorithm [9]. 4.5 Mutual Exclusion The M utex primitive allows a fixed set of processes to access an object (or a set of objects)in a mutually exclusive fashion. If a process requests multiple objects, then it gains access to all of them at the same time, but it may release them one at a time. The interface includes: (a) M utex function for creating an mutual exclusion object for a list of participating processes and a list of critical sections. (b) do election is invoked to request a set of critical sections, (c) crit stores in gvh a boolean value indicating whether access to all the requested critical sections have been granted to this process. The following properties summarize the specification of the Mutex primitive. (a) (safety): For any two processes, the set of critical sections they have access to are disjoint. (b) (progress): if there exists a time bound d1 within which critical sections are released then there exists a time bound d2 within which any requesting process gains access to its critical section(s). (c) (non-interference): If no process holds the critical sections being requested by i, then i gains access with time d3 (d3  d2 ). The intersection coordination protocol described in Section 3 uses the Mutex primitive. Currently, mutual exclusion is implemented using a modification of Ricart & Agrawala’s algorithm [9]. In summary, all the primitives provide a same type of abstraction to the programmer: an set of invariant properties that restrict what the nondeterministic environment can do, and a set of assume-guarantee style progress property. The primitives are invoked by calling the interface functions, and progress can be detected by reading the appropriate variables in the gvh. 5. EXECUTION ENVIRONMENTS In order to run a StarL application on a hardware platform or inside a simulation environment, it has to be connected with an execution environment. We have developed two execution environments: (1) for running applications on a collection of Android smart phones that control iRobot Create robots and (2) for simulating the applications in a discrete event simulation environment. Recall, the execution environment define the lowest two layers of Figure 1 (platform and physical layers), and the rest of the software stack is portable. 5.1 Deploying Applications on HW Platforms For deploying StarL Applications on our Android/iRobot platform, the platform layer implements the functions for controlling motion of the iRobot Create robots, wireless communication, and for reading data from the OptiTrack indoor positioning system. The sensor data and the location data from the positioning system are processed, filtered, through the different layers and are recorded in currentlocation variables in the gvh. When the application calls the do move() in the M otioncontrol, a motion controller is started that decides when and what command to send to robot while making use of positioning data and sensor data and updating motionf lag in the gvh. When the controller decides that the robot has to go straight or arc, the platform layer issues the appropriate wheel speed command to the iRobot Create chassis. The motion interface also provides underlying motion automation. For example, one can specify a robot’s type so that the robot can behave differently when it collides with an object. There are implementations of stop on collision, back away from collision point, discover objects around the initial collision point. The message interface provides basic send and receive functions over a Wi-Fi network using our built in protocols. These low-level functions are used to build the Geocast primitive. 5.2 Simulating Applications The same StarL code can also be simulated in a discrete event simulator that we have built. This is useful for testing applications on many virtual robots and without a hardware platform. resume here. The simulator features a custom implementation of the platform layer which directs motion, message, and trace commands into a coordinating thread referred to as the simulation engine. The simulator can execute an arbitrary number of copies of a StarL application code to run and interact simultaneously through simulated messages and robotic platforms. The StarL simulator allows a developer to run an application under a broad range of conditions and with any number of participating robots. A visualizer displays the current position of each agent and can be extended to display additional application specific information. Even we could now produce a simulation environment same to the real robotic platform, the challenges robots face are realistic. A large set of simulating parameters can be tuned. Message delays, message loss rate, obstacles in the physical environment, robots crash failures and even adversary robots are among the tunable simulation parameters. Creating the simulation in StarL is simple. Using our simulation template, one need to specify the application (fig- Figure 9: The light painting simulation. Figure 7: A snapshot of the ICP simulation. Figure 8: A simulation of the distributed search application. ure 4) to simulate along with some simulation parameters. For example, one can simulate ICP with 4 robots, 100 milliseconds average message delay, the obstacles in the physical environment, shown in figure reffig:sim1. One can also customize the visualizer to display some extra application specific information, such as the state of the robots. 5.3 The ICP Application Screen shot for simulating ICP general solution using four robots is shown in figure 7. Robot 2 starts in B0, and intends to turn left. Robot 1 starts in D0 and intends to go straight. Robot 0, starting at C0, and robot 3, starting in A0, both intend to turn right. The dotted lines are intended zone sequence. Robot 1 and robot 2 are in the intersection concurrently since their set of critical zones are disjoint. 5.4 Other Applications There are four other demo applications in StarL, including Race App, Maze App, Distributed Search App, Light Painting App. Each of them demonstrates some aspects of the StarL primitives. In Race App, there is a sequence of destination points. Every robot picks the same destination point and tries to reach it before any other robot does. When robots collide with each other, they stop and turn until they are facing away from each other. When a robot reaches one destination point, it announces that through Broadcast so that every robots starts to race to the next destination point. This application demonstrates how to make use of the motion and communication interface. In Maze App, robots are put into a Maze like environment, which contains obstacles shown to robots and obstacles hidden to robots. The robot’s goal is to navigate through the maze thus reaching the destination point. The robot uses the path planning primitive to find a possible path to the destination. When the robot’s bump sensor detects an unseen obstacle, the robot updates its’ obstacle map and recalculates path to the destination. This application demonstrates the path planning primitive as well as different built-in motion automation. In Distributed Search App, a group of robots search a house to find an item. They first start the leader election primitive to elect a leader. Then the leader assigns rooms to each robot. Each robot goes to its assigned rooms and searches for the item. If the item is found, the robot announces it’s finding to the group. A simulation screen shot is shown in figurer̃effig:sim2. The item to be found is at the top right corner shown in a blue circle. Thin gray lines are robots’ movement traces. The first three robots have entered their assigned room and started searching, the pink robot is moving towards it’s assigned room at the bottom right corner. The yellow robot is still waiting for its assignment from the leader. In Light Painting App, a simple diagram is given to a group of robots. The robots will try to plan their path to paint the lines in the diagram, with one or more colors. This application makes use of the distributed path planning primitive. A simulation for drawing a cube is shown in figurer̃effig:sim3. The red tube is the distributed path planning reach tube for each robot. The painted lines are shown in green. On the left, the robots started to paint; on the right, the robots have finished the painting. 6. RELATED WORK Robotic systems and theory. There is a large body of theoretical work spanning control theory, computer science, and robotics that deals with development of distributed algorithms for flocking, coverage, and formation control for robotic swarms [10, 38, 33, 28, 25, 8, 35]. The safety and convergence properties of algorithms are typically analyzed by hand (as opposed to verified with a computer), under various simplifying assumptions. Control theorists and roboticists typically capture the details of the dynamics of the robots and abstract away the communication delays and issues arising from asynchrony, while the computer scientists make the complementary assumptions. In the last ten years, these algorithms have been used to create spectacular robotic systems [36, 26] and demonstrations [29, 23] for SLAM, flocking, collaborative search, and even construction. In building these systems, each group uses its own specific, and often proprietary hardware and software architecture to implement the algorithms, with limited scope for reuse and no support for formal reasoning. In fact, currently there are no frameworks or tools supporting modular design, implementation, and formal verification of distributed robotic systems. Programming languages. Currently robotic systems are programmed using standard programming languages like C, C++, and Python. It is also common to design low-level controllers using MATLAB/Simulink and then automatically generate C-code. The Robot Operating System (ROS) [34] provides a popular set of libraries for building applications. It provides device drivers, message-passing and other low-level libraries for interfacing with sensors and actuators, and therefore, it could be used to build the lower layers in a StarL application. Several synchronous programming languages like Lustre [15], Esterel [7], Signal [21], and the Time-triggered framework [37] have been developed over the past two decades. These languages are not only used in practice for signal processing, automotive, aerospace, and manufacturing applications, but they also provide strong formal semantics and support for verification. However, they all provide a deterministic programming abstraction and in one way or another we found them to be too restrictive for distributed robotic systems that work in highly dynamic environments. Formal verification for distributed systems. There is a large body of work on formal models for distributed systems or communicating state machines. A very general framework with limited verification support through PVS is the hybrid I/O automaton framework [19, 27]. Differential dynamic logic [32] with the related Keymera theorem prover is another well-developed framework. There are several less expressive models that have been developed for completely automatic verification under the umbrella of parameterized verification (see, for example, [2, 20, 17] and the references therein). 7. CONCLUSIONS We presented what is to our knowledge a design of the first programming framework for distributed robotic systems that also supports simulations and rigorous verification. Since a robotic system is essentially an open system with many sources of nondeterminism, our primitives sacrifice determinism in the programming abstraction and instead provide a uniform way of interacting with physical environment, communication channels and other programs. The proposed StarL framework also provides theory libraries for verifying StarL applications in the PVS theorem prover, and two execution environments: one that is used to deploy the applications on smart phones that control robots, and the other for running discrete event simulations with many participating robots. The capabilities are illustrated with a StarL application for vehicle to vehicle coordination in a automatic intersection that uses StarL primitives for pointto-point motion, mutual exclusion, and registration. The future directions of research include expansion of the StarL-PVS library further to include failure models and to support the verification of progress properties. Another direction is to develop a compiler for generating both the PVS theories (Figure 5) and the Java implementation (Figure 4) from the StarL programs (Figure 3). Acknowledgments We thank Adam Zimmerman for developing and documenting an earlier version of StarL development for his masters thesis research and Nitin Vaidya for several valuable discussions. This work is sponsored in part by the National Science Foundation. 8. REFERENCES [1] The StarL framework, February 2015. Available for download from https://github.com/lin187/StarL_LCTES. [2] P. A. Abdulla and B. Jonsson. Verifying networks of timed processes. In Tools and Algorithms for the Construction and Analysis of Systems, pages 298–312. Springer, 1998. [3] M. Archer. TAME: PVS Strategies for special purpose theorem proving. Annals of Mathematics and Artificial Intelligence, 29(1/4), February 2001. [4] M. Archer, C. Heitmeyer, and S. Sims. TAME: A PVS interface to simplify proofs for automata models. In Proceedings of UITP ’98, July 1998. [5] M. Archer, H. Lim, N. Lynch, S. Mitra, and S. Umeno. Specifying and proving properties of timed I/O automata in the TIOA toolkit. In In Fourth ACM-IEEE International Conference on Formal Methods and Models for Codesign (MEMOCODE’06). IEEE, 2006. [6] M. Archer, H. Lim, N. Lynch, S. Mitra, and S. Umeno. Specifying and proving properties of timed I/O automata using Tempo. Design Automation for Embedded Systems, 2008. [7] G. Berry and L. Cosserat. The esterel synchronous programming language and its mathematical semantics. In Seminar on Concurrency, Carnegie-Mellon University, pages 389–448, London, UK, UK, 1985. Springer-Verlag. [8] J. Cortes, , S. Martinez, T. Karatas, and F. Bullo. Coverage control for mobile sensing networks. IEEE Transactions on Robotics and Automation, 20(2):243–255, 2004. [9] G. Coulouris, J. Dollimore, T. Kindberg, and G. Blair. Distributed Systems: Concepts and Design. Addison-Wesley Publishing Company, USA, 5th edition, 2011. [10] X. Défago and A. Konagaya. Circle formation for oblivious anonymous mobile robots with no common sense of orientation. In Proc. 2nd Int’l Workshop on Principles of Mobile Computing (POMC’02), pages 97–104, Toulouse, France, October 2002. ACM. [11] C. Dixon, R. Mahajan, S. Agarwal, A. Brush, B. Lee, S. Saroiu, and P. Bahl. An operating system for the home. In NSDI. USENIX, April 2012. [12] S. Dolev. Self-stabilization. MIT Press, Cambridge, MA, USA, 2000. [13] P. S. Duggirala, T. T. Johnson, A. Zimmerman, and S. Mitra. Static and dynamic analysis of timed distributed traces. In RTSS, pages 173–182, 2012. [14] M. R. Hafner, D. Cunningham, L. Caminiti, and D. D. Vecchio. Cooperative collision avoidance at intersections: Algorithms and experiments. IEEE Transactions on Intelligent Transportation Systems, 14(3):1162–1175, 2013. [15] N. Halbwachs, P. Caspi, P. Raymond, and D. Pilaud. The synchronous dataflow programming language lustre. In Proceedings of the IEEE, pages 1305–1320, 1991. [16] T. A. Henzinger, S. Qadeer, and S. K. Rajamani. Decomposing refinement proofs using assume-guarantee reasoning. In Proceedings of the 2000 IEEE/ACM International Conference on Computer-aided Design, ICCAD ’00, pages 245–253, Piscataway, NJ, USA, 2000. IEEE Press. [17] T. Johnson and S. Mitra. Parameterized verification of distributed cyber-physical systems:an aircraft landing protocol case study. In ACM/IEEE Third International Conference on Cyber-Physical Systems, April 2012, Beijing, China, 2012. [18] T. Johnson, S. Mitra, and K. Manamcheri. Safe and stabilizing distributed cellular flows. In Proceedings of IEEE Internaitonal Conference on Distributed Computing Systems (ICDCS 2010), 2010. [19] D. K. Kaynar, N. Lynch, R. Segala, and F. Vaandrager. The Theory of Timed I/O Automata. Synthesis Lectures on Computer Science. Morgan Claypool, November 2005. Also available as Technical Report MIT-LCS-TR-917. [20] P. Krcál and W. Yi. Communicating timed automata: The more synchronous, the more difficult to verify. In Computer Aided Verification, 18th International Conference, CAV, volume 4144 of Lecture Notes in Computer Science, pages 249–262. Springer, 2006. [21] P. Le Guernic, A. Benveniste, P. Bournai, and T. Gautier. Signal–a data flow-oriented language for signal processing. Acoustics, Speech and Signal Processing, IEEE Transactions on, 34(2):362–374, 1986. [22] Q. Lindsey, D. Mellinger, and V. Kumar. Construction with quadrotor teams. Auton. Robots, 33(3):323–336, 2012. [23] Q. Lindsey, D. Mellinger, and V. Kumar. Construction with quadrotor teams. Autonomous Robots, 33(3):323–336, 2012. [24] M. R. Lucas and D. M. Tilbury. A study of current logic design practices in the automotive manufacturing industry. Int. J. Hum.-Comput. Stud., 59(5):725–753, 2003. [25] M. Mesbahi and M. Egerstedt. Graph-theoretic Methods in Multiagent Networks. Princeton University Press. [26] N. Michael, D. Mellinger, Q. Lindsey, and V. Kumar. The grasp multiple micro-uav testbed. Robotics & Automation Magazine, IEEE, 17(3):56–65, 2010. [27] S. Mitra. A Verification Framework for Hybrid Systems. PhD thesis, Massachusetts Institute of Technology, Cambridge, MA 02139, September 2007. [28] R. Olfati-Saber, J. Fax, and R. Murray. Consensus and cooperation in networked multi-agent systems. Proceedings of the IEEE, 95(1):215–233, January 2007. [29] R. Oung and R. DâĂŹAndrea. The distributed flight array. Mechatronics, 21(6):908–917, 2011. [30] S. Owre, S. Rajan, J. Rushby, N. Shankar, and M. Srivas. PVS: Combining specification, proof checking, and model checking. In R. Alur and T. A. Henzinger, editors, Computer-Aided Verification, CAV ’96, number 1102 in LNCS, pages 411–414, New Brunswick, NJ, July/August 1996. Springer-Verlag. [31] S. Owre, N. Shankar, J. M. Rushby, and D. W. J. Stringer-Calvert. PVS Language Reference. Computer Science Laboratory, SRI International, Menlo Park, CA, Sept. 1999. [32] A. Platzer. Differential logic for reasoning about hybrid systems. In A. Bemporad, A. Bicchi, and G. C. Buttazzo, editors, HSCC, volume 4416 of Lecture Notes in Computer Science, pages 746–749. Springer, 2007. [33] G. Prencipe. Corda: Distributed coordination of a set of autonomous mobile robots. In ERSADS, pages 185–190, May 2001 2001. [34] M. Quigley, K. Conley, B. P. Gerkey, J. Faust, T. Foote, J. Leibs, R. Wheeler, and A. Y. Ng. Ros: an open-source robot operating system. In ICRA Workshop on Open Source Software, 2009. [35] M. Schwager, J. McLurkin, and D. Rus. Distributed coverage control with sensory feedback for networked robots. In Robotics: Science and Systems, Philadelphia, Pennsylvania, August 2006. The MIT Press. [36] C. Steiner. Bot in the delivery:kiva systems. Forbes Magazine, March 2009. http://www.forbes.com/ forbes/2009/0316/040_bot_time_saves_nine.html. [37] W. Steiner and B. Dutertre. Automated formal verification of the TTEthernet synchronization quality. In NASA Formal Methods - Third International Symposium, NFM, volume 6617 of Lecture Notes in Computer Science, pages 375–390. Springer, 2011. [38] I. Suzuki and M. Yamashita. Distributed autonomous mobile robots: Formation of geometric patterns. SIAM Journal of computing, 28(4):1347–1363, 1999. [39] M. Turpin, K. Mohta, N. Michael, and V. Kumar. Goal assignment and trajectory planning for large teams of interchangeable robots. Auton. Robots, 37(4):401–415, 2014. [40] A. Zimmerman. Starl for programming reliable robotic networks. Master’s thesis, University of Illinois at Urbana-Champaign, 2013.
6cs.PL
Are Clouds Ready to Accelerate Ad hoc Financial Simulations? arXiv:1412.4556v1 [cs.DC] 15 Dec 2014 Blesson Varghese and Adam Barker School of Computer Science, University of St Andrews, UK Email: {varghese, adam.barker}@st-andrews.ac.uk Abstract—Applications employed in the financial services industry to capture and estimate a variety of risk metrics are underpinned by stochastic simulations which are data, memory and computationally intensive. Many of these simulations are routinely performed on production-based computing systems. Ad hoc simulations in addition to routine simulations are required to obtain up-to-date views of risk metrics. Such simulations are currently not performed as they cannot be accommodated on production clusters, which are typically over committed resources. Scalable, on-demand and pay-as-you go Virtual Machines (VMs) offered by the cloud are a potential platform to satisfy the data, memory and computational constraints of the simulation. However, “Are clouds ready to accelerate ad hoc financial simulations?” The research reported in this paper aims to experimentally verify this question by developing and deploying an important financial simulation, referred to as ‘Aggregate Risk Analysis’ on the cloud. Parallel techniques to improve efficiency and performance of the simulations are explored. Challenges such as accommodating large input data on limited memory VMs and rapidly processing data for real-time use are surmounted. The key result of this investigation is that Aggregate Risk Analysis can be accommodated on cloud VMs. Acceleration of up to 24x using multiple hardware accelerators over the implementation on a single accelerator, 6x over a multiple core implementation and approximately 60x over a baseline implementation was achieved on the cloud. However, computational time is wasted for every dollar spent on the cloud due to poor acceleration over multiple virtual cores. Interestingly, private VMs can offer better performance than public VMs on comparable underlying hardware. Keywords-cloud computing; heterogeneous computing; Aggregate Risk Analysis; financial risk; risk simulation I. I NTRODUCTION Financial applications in the risk industry are underpinned by large-scale stochastic simulations which are data, memory and computationally intensive [1]. These simulations are run on a weekly, monthly or quarterly basis on production systems such as commodity clusters to generate risk metrics including Probable Maximum Loss (PML) [2] and Tail Value-at-Risk (TVaR) [3] due to catastrophic events such as earthquakes, hurricanes and floods. The results obtained from these simulations are then interpreted by actuaries for key decision making and planning a financial year. The simulations that run on a routine basis are sufficient if the risk metrics do not have to be updated before their next run. Consider a simulation that takes into account the fluctuation of one parameter, for example, currency, on a weekly basis. The simulation is performed on a weekly basis to update the risk metrics. However, this is not the case in real-time scenarios where risk metrics will need to be obtained on an ad hoc basis before the next routine run. For example, consider real-time online pricing when an underwriter needs to close a deal with a client over the telephone. Production systems are not the right type of infrastructure for simulating on an ad hoc basis since they are firstly optimised to run routine simulations and accommodate data of known sizes, and secondly, over committed and at best fully utilised resources with no scope to satisfy the data, memory and computational requirements of ad hoc simulations. Consequentially, even if ad hoc simulations are performed on production clusters they tend to be slow. One solution to this problem would be to use dedicated systems for ad hoc simulations. However, this is not always possible since there is an additional investment on top of the maintenance costs of production clusters. An alternative solution to reduce the cost of investment is by using hardware accelerators as coprocessors in heterogeneous clusters [4], [5]. Though computation can be accelerated to suit ad hoc simulations the memory and data requirements cannot be always satisfied. Hardware accelerators have limited memory and thereby cannot handle large data in memory. Cloud computing infrastructure has the potential to address the above challenges. Maintenance costs can be eliminated and resources can be scaled on-demand, which can satisfy the requirements of ad hoc risk simulations [6], [7]. In this paper, the research question, “Are clouds ready to accelerate ad hoc financial simulations?” is explored. One application, namely Aggregate Risk Analysis, widely employed in the risk industry is developed and deployed on the cloud. Parallel techniques to accelerate the analysis and techniques to efficiently accommodate data and handle memory on cloud VMs are investigated. The experimental studies on the cloud indicate that the application achieves up to a 60x acceleration on VMs with hardware accelerators but with poor acceleration due to wasted computational time per dollar spent. Nevertheless the cloud can accommodate financial simulations. The remainder of this paper is organised as follows. Section II considers research related to risk applications. Section III presents Aggregate Risk Analysis. Section IV presents an experimental study of sequential and parallel implementations on cloud VMs. This paper concludes in Section V by considering future work. II. R ELATED W ORK The domain of computational finance and risk addresses problems related to achieving fast computations, surmounting challenges of data management and efficiently handling memory of computing systems. Therefore, this domain is dependent on the advances in high-performance computing. Research of financial applications on production-based computing systems have progressed from small scale clusters [8], [9] to large supercomputers [10], [11], and the typical problem addressed is achieving fast computations. These applications are hosted either on in-house clusters or on supercomputing infrastructures to which the owners of the application have access. A number of financial applications are being migrated from small clusters to be hosted on multiple core processors and many core coprocessor which are available at a low budget [12]. For example, research related to financial applications exploiting the Cell BE processor [13] [14], FPGAs [15] [16] and GPUs [17], [18], [19], [20]. In all the above research, the need for speeding up financial applications are presented and is achieved. However, ad hoc analytics in financial risk is important which is now possible with the availability of scalable on-demand VMs provided by cloud computing and the development of big data techniques. Given that the cloud is a potential high-performance computing platform to address big data problems it is now ripe to explore risk applications in the cloud context [21]. There is limited research exploring the feasibility of accelerating and accommodating financial simulations for ad hoc analysis on the clouds. The research reported in this paper is motivated towards this end. III. AGGREGATE R ISK A NALYSIS ON THE C LOUD Financial applications are underpinned by large-scale simulations which are both data, memory and computationally intensive. One such simulation is a Monte-Carlo like simulation performed on a portfolio of risk held by a reinsurer, referred to as Aggregate Risk Analysis [22], [23], [24]. This simulation provides actuaries and decision makers with millions of alternate views of catastrophic events, such as earthquakes, that can occur and the order in which they can occur in a year for portfolio risk management and realtime pricing. Millions of trials are simulated, with each trial comprising a set of possible future earthquake events and the probable loss for each trial is estimated. Although Aggregate Risk Analysis is an embarrassingly parallel problem, there are significant challenges in achieving efficient parallelism. One major challenge is sharing large input data between the processing cores constrained by limited memory bandwidth. Further, the challenge of accommodating input data in limited memory hardware is constrained by the complex memory architecture of accelerating hardware such as GPUs. Large and small sized data along with metadata are required for performing Aggregate Risk Analysis. The large data required is the Year Event Table, denoted as Y ET , which contains the occurrence of earthquake events for a year. The YET is obtained from a catalogue of possible future earthquakes that is generated using earthquake models. The frequency and the physical characteristic of the potential earthquake, and the damage the earthquake will cause are estimated by the hazard and vulnerability modules respectively of the earthquake model. The YET provides a million distinct views of potential earthquakes that can occur in a year. Each record in a YET is called a Trial, denoted as Ti , which represents a possible sequence of event occurrences for any given year. The sequence of events is defined by a set of tuples containing the ID of an event and the time-stamp of its occurrence in a trial, Ti = {(Ei,1 , ti,1 ), . . . , (Ei,k , ti,k )}. The set is ordered by ascending time-stamp values. A typical YET may comprise one million trials, and each trial may have one thousand event time-stamp pairs. The YET is represented as Y ET = {Ti = {(Ei,1 , ti,1 ), . . . , (Ei,k , ti,k )}}, where i = 1, 2, . . . and k = 1, 2, . . . , 800, . . . , 1500. The small data required for Aggregate Risk Analysis is the Event Loss Tables, denoted as ELT , which represents the collection of specific events and their corresponding losses. Each record in an ELT is denoted using EventLoss pairs ELi = {Ei , li } and a set of financial terms associated with the ELT FT 1 = (FT 11 , FT 12 , . . . ). A typical Aggregate Risk Analysis may comprise ten thousand ELTs, each containing tens of thousands of event losses with exceptions even up to a few million event losses. The ELTs is represented as  ELT = ELi FT 1 = {Ei , li }, = (FT 11 , FT 12 , . . . )  where i = 1, 2, . . . , 10, 000, . . . , 30, 000. The metadata is defined as a Portfolio, denoted as P F , which contains a group of Programs, denoted as P represented as P F = {P1 , P2 , · · · , Pn }, with n = 1, 2, . . . , 10. Each Program in turn covers a set of Layers, denoted as L, that cover a collection of ELTs under a set of financial terms of the Layer. A single layer Li is composed of the set of ELTs E = {ELT1 , ELT2 , . . . , ELTj }, and two set of Layer Terms, denoted as FT 2 = (FT 21 , FT 22 ) and FT 3 = (FT 31 , FT 32 ). A typical Layer covers approximately three to thirty individual ELTs. The Layer can be represented as   = {ELT1 , ELT2 , . . . , ELTj },   E FT 2 = (FT 21 , FT 22 ), L=   FT 3 = (FT 31 , FT 32 ) where j = 1, 2, 3, . . . , 30. The algorithm (line no. 1-17 shown in Algorithm 1) for aggregate analysis has two stages. In the first stage, data is loaded into local memory what is referred to as the preprocessing stage in this paper. In this stage Y ET , ELT and P F , are loaded into memory. Algorithm 1: Aggregate Risk Analysis Input : Y ET , ELT , P F Output: Y LT 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 for each Program, P , in P F do for each Layer, L, in P do for each Trial, T , in Y ET do for each Event, E, in T do for each ELT covered by L do Lookup E in the ELT and find corresponding loss, lE Apply Financial Terms FT 1 to lE lT ← lT + lE end Apply Financial Terms FT 2 to lT Apply Financial Terms FT 3 to lT end end end end Populate Y LT using lT In the second stage, the four step simulation executed for each Layer and for each trial in the YET is performed as shown below and the resulting Year Loss Table (Y LT ) is produced. In the first step shown in line no. 6 in which each event of a trial its corresponding event loss in the set of ELTs associated with the Layer is determined. In the second step shown in line nos. 7-9, secondary uncertainty is applied to each loss value of the Event-Loss pair extracted from an ELT. A set of contractual financial terms are then applied to the benefit of the layer. For this the losses for a specific event’s net of financial terms I are accumulated across all ELTs into a single event loss shown in line no. 9. In the third step in line no. 11 the event loss for each event occurrence in the trial, combined across all ELTs associated with the layer, is subject to occurrence terms. In the fourth step in line no. 12 aggregate terms are applied. The financial terms FT 2 and FT 3 applied on the loss values combined across all ELTs associated with the layer are Occurrence and Aggregate terms. Two occurrence terms, namely (i) Occurrence Retention, denoted as FT 21 , which is the retention or deductible of the insured for an individual occurrence loss, and (ii) Occurrence Limit, denoted as FT 21 , which is the limit or coverage the insurer will pay for occurrence losses in excess of the retention are applied. Occurrence terms are applicable to individual event occurrences independent of any other occurrences in the trial. The occurrence terms capture specific contractual properties of ’eXcess of Loss’ [25] treaties as they apply to individual event occurrences only. The event losses net of occurrence terms are then accumulated into a single aggregate loss for the given trial. The occurrence terms are applied as lT = min(max(lT − F T 21 ), FT 22 ). Two aggregate terms, namely (i) Aggregate Retention, denoted as FT 31 , which is the retention or deductible of the insured for an annual cumulative loss, and (ii) Aggregate Limit, denoted as FT 32 , which is the limit or coverage the insurer will pay for annual cumulative losses in excess of the aggregate retention are applied. Aggregate terms are applied to the trial’s aggregate loss for a layer. Unlike occurrence terms, aggregate terms are applied to the cumulative sum of occurrence losses within a trial and thus the result depends on the sequence of prior events in the trial. This behaviour captures contractual properties as they apply to multiple event occurrences. The aggregate loss net of the aggregate terms is referred to as the trial loss or the year loss. The aggregate terms are applied as lT = min(max(lT − F T 31 ), FT 32 ). The analysis generates loss values associated with each trial of the YET which populates the Year Loss Table (YLT). Important risk metrics such as the Probable Maximum Loss (PML) and the Tail Value-at-Risk (TVaR) which are used for both internal risk management and reporting to financial regulators and rating agencies can be derived from the output of the analysis. Furthermore, these metrics flow into a final stage of the risk analytics pipeline, namely Enterprise Risk Management, where liability, asset, and other forms of risks are combined and correlated to generate an enterprise wide view of risk. Additional functions can be used to generate reports that will aid actuaries and decision makers, for example, reports presenting Return Period Losses (RPL). The simulations can also be extended for providing vital information required for disaster recovery and management. IV. E XPERIMENTAL S TUDIES In this section, the cloud computing platform investigated for implementing sequential and parallel Aggregate Risk Analysis is presented. The data structures chosen for representing the input and intermediate data to address memory bottlenecks and optimisations to improve the performance of the analysis are considered. An empirical study of the analysis both sequentially and in parallel on (single and multiple core) CPU and (single and multiple) GPU VMs on the cloud are presented. A. Platform Aggregate risk analysis was performed on public VMs available from the Amazon Elastic Compute Cloud (EC2)1 and on private VMs. Table I shows the underlying hardware and specifications of the VMs used for this research. The VMs offered by Amazon are referred to as instances. Five types of instances are offered by Amazon, namely the (i) general purpose, (ii) memory optimised, (iii) cluster compute, (iv) storage optimised, and (v) GPU instances are used for the analysis. Only instances with at least 15 GB of RAM are used (this is a requirement for the analysis). The general purpose instances employed are the m1 and m3 instances, namely m1.xlarge, m3.xlarge and m3.2xlarge. The m1 instance is a VM of Intel(R) Xeon(R) CPU E5-2650 and m3 instances are VMs abstracted over Intel(R) Xeon(R) CPU E5-2670. Each virtual CPU (vCPU) of the m3 instances is a hardware hyperthread on the underlying processor. The memory optimised instances employed are the m2 and cr1 instances, namely m2.xlarge, m2.2xlarge, m2.4xlarge and cr1.8xlarge. The m2 instances are VMs of Intel(R) Xeon(R) CPU E5-2665 and the cr1 instance abstracts Intel(R) Xeon(R) CPU E5-2670. Each virtual CPU (vCPU) of the cr1 instance is a hardware hyperthread on the underlying processor. The compute optimised instance employed are the cc1 and cc2 instances, namely cc1.4xlarge and cc2.8xlarge. Both cc1 and cc2 instances are abstraction of Intel(R) Xeon(R) CPU X5570. Each virtual CPU (vCPU) of the cc2 instance is a hardware hyperthread on the underlying processor. The storage optimised instance employed are the hi1 and hs1 instances, namely hi1.4xlarge and hs1.8xlarge. The hi1 instance abstracts Intel(R) Xeon(R) CPU E5620 and hs4 is a VM over the Intel(R) Xeon(R) CPU E5-2650. The GPU instance employed is cg1.4xlarge backed by two Intel(R) Xeon(R) CPU X5570 and two NVIDIA Tesla M2050 GPUs. Each GPU consists 448 processor cores and 3 GB of total global memory yielding 2.625 GB of user available memory and a memory bandwidth of 148.4 GB/sec. Two private VMs vm1 and vm2 are employed. vm1 is backed by Intel(R) Xeon(R) E5-2620 which is relatively old hardware when compared to the underlying processor for Amazon instances. vm2 is backed by Intel(R) Xeon(R) E52665 similar to the underlying CPU on the m2 instances. vm2 is also supported by the same GPU on the Amazon 1 http://aws.amazon.com/ec2/ Instance Type No. of Memory Processor Type Vir(GiB) tual CPUs (VCPU) Amazon cloud VMs m1.xlarge 4 15.0 Intel Xeon E5-2650 m2.xlarge 2 17.1 Intel Xeon E5-2665 m2.2xlarge 4 34.2 Intel Xeon E5-2665 m2.4xlarge 8 68.4 Intel Xeon E5-2665 m3.xlarge 4 15.0 Intel Xeon E5-2670 m3.2xlarge 8 30.0 Intel Xeon E5-2670 cr1.4xlarge 32 244.0 Intel Xeon E5-2670 cc1.4xlarge 16 23.0 Intel Xeon X5570 cc2.8xlarge 32 60.5 Intel Xeon X5570 hi1.4xlarge 16 60.5 Intel Xeon E5620 hs1.4xlarge 16 117.0 Intel Xeon E5-2650 16 22.5 Intel Xeon X5570 cg1.4xlarge 448 3.0 NVIDIA Tesla M2050 Private VMs vm1 12 128.0 Intel Xeon E5-2620 16 64.0 Intel Xeon E5-2665 vm2 448 3.0 NVIDIA Tesla M2050 Clock Speed (GHz) 2.00 2.40 2.40 2.40 2.60 2.60 2.60 2.93 2.93 2.40 2.00 2.93 0.575 2.00 2.40 0.575 Table I: VMs employed for Aggregate Risk Analysis GPU instance. The vCPUs of both VMs are hardware hyperthreads on the underlying processor and the Xen hypervisor is used. The Ubuntu 13.10 cloud image is used on all VMs. Sequential and parallel versions of Aggregate Risk Analysis were implemented. C++ was used for the sequential implementation, OpenMP was used in the parallel implementation on multiple core instances, and CUDA was used for the sequential and parallel implementations on GPU instances. On the CPU instances, both versions were compiled using the GNU Compiler Collection g++ 4.6 and optimised using ‘-O3’; the parallel implementation required -fopenmp during compilation for including the OpenMP directive. The NVIDIA CUDA Compiler (nvcc 5.0) was used for compiling on the GPU instances. Message Passing Interface (MPI) was employed and added nearly 10% to the execution times and was also found to lower the efficiency of the VMs; hence those results are not presented. However, for a multiple GPU instance a combination of MPI to communicate between the instances, OpenMP for exploiting parallelism of the virtual cores on each instance and CUDA programming for exploiting the GPU were employed. B. Implementation on the Cloud In all the implementations each trial in the YET is executed using a single thread. All data required for the analysis is available as an Amazon Elastic Block Storage (EBS)2 volume which is attached onto an instance. Nearly fifteen hours of continuous data transfer was required to the EBS volume. 2 http://aws.amazon.com/ebs/ (a) Time taken on VMs (b) Time taken when number of Trials are varied on the fastest public and private VMs Figure 1: Sequential performance of Aggregate Risk Analysis on VMs One important factor for obtaining good performance in the Aggregate Risk Analysis algorithm is the selection of a data structure for representing ELTs. The ELTs function as dictionaries with key-value pairs requiring fast random key lookup. A sparse representation of ELTs covered by a Layer using direct access tables was implemented. Although fast lookups are obtained a sparse representation is at the expense of high memory utilisation. If a YET consists of 1,000,000 events and an ELT consists of 10,000 event-loss pairs, then the direct access table would contain 1,000,000 event entries of which 990,000 events would have zero loss values. Considering that one Layer would cover fifteen ELTs in a typical analysis, 15 million event-loss pairs need to be generated in the memory of the instance of which 14,850,000 events have zero loss values. Nevertheless a direct access table was employed in all implementations. Alternate compact representations were not chosen for the following reasons: (i) A search operation is required to find an event-loss pair in a compact representation. Sequential and binary search require O(n) and O(log(n)) memory accesses respectively to locate an eventloss pair. Even if a constant-time space-efficient hashing scheme requiring a constant number of memory accesses is adopted there is considerable implementation and run- time performance complexity. This overhead will be high on GPUs with complex memory hierarchies consisting of global and shared memories. (ii) To perform aggregate analysis on a YET of one million trials, each trial comprising one thousand events, and for a layer covering fifteen ELTs, there are fifteen billion event-loss pairs. Direct access tables, although require large memory space, allow for the least number of memory accesses as each lookup in an ELT requires only one memory access per search operation. Two data structure implementations of the ELTs were considered. In the first implementation, each ELT is an independent table, and therefore, in a read cycle, each thread independently looks up its events from the ELTs. All threads within a block access the same ELT. By contrast, in the second implementation, the ELTs are combined as a single table. Consequently, the threads then use the shared memory to load entire rows of the combined ELTs at a time. The latter implementation performs poorly compared to the former since for the threads to collectively load from the combined ELT each thread must first write which event it requires. This results in additional memory overheads. On the CPU instance offering multiple virtual cores the entire data required for the analysis is processed in memory. The GPU implementation uses the GPU’s global memory to store all of the required data structures. The parallel implementation on the GPU requires high memory transactions and leads to inefficient performance on the GPU platform. To surmount this challenge shared memory can be utilised over global memory. The algorithm is optimised in the following four ways. Firstly, by chunking, which refers to processing a block of events of fixed size (or chunk size) for the efficient use of shared memory. Chunking is more beneficial in the GPU implementation than in the CPU implementations. In the case of the GPU implementation looking up events in a trial and applying financial terms to losses at the Event and Layer level are chunked. Further, the financial and layer terms are stored in the streaming multi-processor’s constant memory. If the intermediate losses are represented in global memory, then while applying the financial terms at the Event and Layer level would require the global memory to be accessed and updated adding considerable memory overheads. The memory overhead is minimised by chunking when (i) the financial terms are applied, and (ii) reading events in a trial from the YET. Chunking reduces the number of global memory update and global read operations. Moreover, the benefits of data striding can also be used to improve speedup. Secondly, the implementation are optimised by loop unrolling, which refers to the replication of blocks of code included within for loops by the compiler to reduce the number of iterations performed by the for loop. This is done using the pragma directive. Thirdly, the implementations on the CPU and GPU are optimised by using single precision operations when possible. Read operations are faster using float variables as they are only half the size of a double variable. The performance of single precision operations tend to be approximately twice as fast as double precision operations. Fourthly, in the case of the GPU a further optimisation can be achieved by migrating data from both shared and global memory to the kernel registry. The kernel registry has the lowest latency compared to all other forms of memory available in the GPU architecture. C. Empirical Analysis The results obtained from the experimental studies are presented in this section. All data required for the analysis is stored as an EBS volume and attached onto the instances considered in Table I. Figure 1 to Figure 4 are results obtained on CPU instances; the multi-core architecture of the instances are exploited in the parallel implementation. Figure 5 and Figure 6 are results obtained on the GPU instance; both single and multiple GPUs are exploited in the parallel implementation. In all experiments, the analysis uses as input a YET comprising one million trials, with each trial consisting of one thousand catastrophic events, and one Portfolio with one Program comprising one Layer covering sixteen ELTs. The input parameters are realistic and were chosen based on industry-wide practices. 1) Results from CPU instances: Figure 1a shows the graph plotted for the time taken for sequentially performing aggregate risk analysis on all instances shown in Table I. Under the general purpose instances, the m1 is the slowest for performing the analysis requiring 565 seconds; the m3 instance is over 37% faster than the m1 instance. The memory optimised instance cr1 is the fastest for performing the analysis requiring 295 seconds which is 37% faster than the memory optimised m2 instances. The difference in the performance obtained on storage optimised instances is just over 20%. Cluster instances cc1 and cc2 perform comparably to the cg1 instance. The fastest sequential CPU performance on the cloud requires less than five minutes which is nearly 50% fastest than the slowest sequential performance on the cloud. Private VMs vm1 and vm2 have surprisingly good performance. vm1 takes only 340 seconds which is nearly 40% faster than m1 instances. The vm2 VM completes the analysis in 288 seconds which is over 2% faster than the best performance on Amazon. Figure 1b shows the both the increase in the total time taken for the fastest sequential analysis on the cloud when the number of trials are varied between two hundred thousand and one million trials. The parallel implementation of the analysis on the CPU requires multiple threads to be executed on the instance which can be done in two ways. Firstly, by executing a single thread per virtual core, and secondly, by executing multiple threads per core. Figure 2 shows the graphs obtained from the parallel implementation of the analysis when one thread is executed per virtual core on the instance. The graphs are organised based on the number of virtual cores on the instance. The instance with two virtual cores obtains nearly a 96% efficiency when two threads are employed (Figure 2a). Instances with four virtual cores obtain upto 87.5% efficiency (Figure 2b). The two instances with eight virtual cores have an average efficiency of over 70% (Figure 2c). The storage optimised, cc1 and cg1 instances with sixteen cores each exhibit very little speedup and efficiency for more than eight cores (Figure 2d). Surprisingly, there is no hardware acceleration obtained which is expected. Beyond eight cores it would seem that the cost of hardware and the use of virtualised hardware on the sixteen core VMs do not benefit the analysis. Another reason is that as the number of cores are increased the bandwidth to access memory is not equally increased which is a limiting factor. Similarly, in the case of thirty two core instances no acceleration is obtained beyond sixteen cores (Figure 2e). The fastest parallel execution on the CPU is obtained on the cluster compute instance cc2.8xlarge taking 27 seconds with a speedup of nearly 11x over the fastest sequential implementation. The performance of cr1.8xlarge is second to the cc2 instance requring 40 seconds when multiple threads are employed though it performs the sequential analysis the fastest. The private VMs again outperform the public instances (Figure 2f). vm1 takes 44 seconds achieving a speedup of 7.5x over its sequential performance and vm2 takes 22 seconds achieving a speedup of 13x over its sequential performance. Figure 3 shows the graphs obtained from the parallel implementation of the analysis when multiple threads are executed on the instances. In all cases, multiple threads per Amazon core do not provide any acceleration for the analysis. Increasing the number of threads per core results in an increase in the communication cost between threads. The private VMs vm1 and vm2 achieve a speedup of 9% and 5% respectively when multiple threads are employed per virtual core. Figure 4a shows the graph plotted for the best time taken for performing parallel aggregate risk analysis on all instances shown in Table I. Under the general purpose instances, though the m1 instance is the slowest for performing the sequential analysis and for parallel analysis the m2.xlarge is the slowest requiring 240 seconds. Virtual core acceleration is achieved on the m1 instance which is over 1.5x faster than m2.xlarge. The m3.2xlarge is nearly 2 times faster than m3.xlarge and m1.xlarge. The cluster instance cc2 followed by cr1 are the fastest requiring 27 seconds and 40 seconds respectively. Hence (a) Two virtual core public instance (b) Four virtual core public instances (c) Eight virtual core public instances (d) Sixteen virtual core public instances (e) Thirty two virtual core public instances (f) Private VMs Figure 2: Parallel execution (single thread per virtual core) of Aggregate Risk Analysis on public (a) to (e) and private (f) VMs (a) Two virtual core public instance (b) Four virtual core public instances (c) Eight virtual core public instances (d) Sixteen virtual core public instances (e) Thirty two virtual core public instances (f) Private VMs Figure 3: Parallel execution (multiple threads per virtual core) of Aggregate Risk Analysis on public (a) to (e) and private (f) VMs (a) Time taken on VMs (b) Time taken when number of Trials are varied on the fastest public and private VMs Figure 4: Parallel execution of Aggregate Risk Analysis on public and private VMs upto a 21x speedup is obtained for parallel analysis by exploiting the multi-core architecture over the sequential analysis and upto a 9x speedup over the slowest parallel analysis. Again, private VMs outperform public instances. The best performance of of vm2 is 21 seconds using multiple threads which is 22% faster than the best performance achieved by the cc2 instance. Similarly, vm1 takes 38 seconds for the analysis on multiple threads which is 5% faster than the second best performance by cr1 instances on public instances. Figure 4b shows the increase in the total time taken for the fastest parallel analysis on the cloud when the number of trials are varied between two hundred thousand and one million trials. 2) Results from GPU instance: Single and multiple GPU instances (cg1.4xlarge) are considered for risk analysis on the cloud. CUDA provides an abstraction over the streaming multi-processors of the GPU, referred to as a CUDA block. Unlike the parallel implementations on the CPU instance an additional parameter that needs to be considered in the GPU implementations is the number of threads executed per CUDA block. To represent 1,000,000 trials of the analysis on the GPU instance consider each trial Figure 5: Execution of Aggregate Risk Analysis on a single GPU on public and private VMs is executed on one thread. If 128 threads are executed on one streaming multi-processor there will be approximately 7813 blocks which need to be executed on 14 streaming multiprocessors; each streaming multi-processor will therefore need to execute 558 blocks. All threads executed on a streaming multi-processor share fixed allocations of shared and constant memory. Therefore, there is a trade-off for optimal performance; each thread can access larger amounts of shared and constant memory if there are fewer threads per block, but then the global memory will required to be accessed more resulting in increased global memory overheads. Figure 5 shows the time taken for parallel risk analysis on a single GPU instance when the number of threads per CUDA block are varied between 1 and 512. At least 16 threads per block are required to achieve performance comparable to the best parallel implementation which is noted on cc2.8xlarge instance. To exploit the full potential of hardware acceleration offered by GPUs at least 64 threads are required. An improvement in the performance is observed with 256 threads per block beyond which performance starts to diminish. The best time for performing the analysis on a single GPU is 19.93 seconds which is around 15x faster than the best sequential performance on the CPU, nearly 1.4x faster than the best multiple core performance on the CPU, and over 6x faster than the sequential performance on a GPU. On the private VM vm2 takes only 16.86 seconds. This is nearly 16% faster than the GPU on the public instance. The performance of the analysis on multiple GPU instances is shown in Figure 6a. In the multiple GPU implementation the workload for the analysis is decomposed and made available to the multiple instances that employ GPUs. Each CPU thread schedules the workload on the GPUs. Time taken for the analysis on four Amazon GPU instances is 5.024 seconds which is approximately 3.97 times faster than employing a single GPU with close to 97% efficiency. Compared to the sequential implementation on a single GPU (a) Performance of multiple GPUs (b) Performance on four GPUs for varying threads per block Figure 6: Aggregate Risk Analysis on public and private VMs with multiple GPUs a speedup of over 24x is achieved when multiple GPU instances are used. On the other hand vm2 takes only 4.238 seconds which is 16% faster than the multiple GPUs on the public instance. Figure 6b shows the performance of the analysis on four GPUs when the number of threads per block is varied from 16 to 64. Experiments could not be pursued beyond 64 threads per block due to the limitation on the block size the shared memory can use. The best performance of 5.024 seconds on the public VM and 4.2375 seconds on the private VM is achieved when the number of threads per block is 32; the block size is the same as the WARP size of the GPU, therefore, an entire block of threads can be swapped when high latency operations occur. Increasing the number of threads per block does not improve the performance since there is shared memory overflow. D. Summary The experimental studies indicate that the public clouds are a suitable platform for accommodating risk simulations. The data, memory and computational requirements can be met on the cloud VMs. Risk simulation can be accelerated on the public cloud although the simulations do not scale well over the virtual cores of the instances; for example, for thirty two core instances no acceleration is achieved beyond sixteen cores. This results in wasted computational time per dollar spent on the simulation. Hence, maximum performance cannot be achieved thereby not fully exploiting the potential of the public cloud. Nevertheless, a 60x speedup is achieved on public instances over a baseline implementation. Interestingly, the private VMs are faster than the public instances. For example, the sequential CPU implementation, parallel CPU implementation and the parallel GPU implementation on private VMs are up to 40%, 22% and 16% faster than the best performance achieved on public instances. V. C ONCLUSIONS The cloud is a potential platform for performing ad hoc risk simulations important to financial applications. Scalable and on-demand resources of the cloud are attractive for running ad hoc simulations and for meeting their data, memory and computational requirements. The research reported in this paper was motivated towards experimentally verifying whether clouds are ready to accelerate financial simulations. A typical application employed in the financial industry, namely Aggregate Risk Analysis, was developed and deployed on a variety of cloud VMs. The implementation exploited parallelism to accelerate the application and efficient management of data and memory to accommodate the application on the cloud. The experimental results indicate that the application can be accommodated to run on the cloud and an acceleration of up to 60x over a baseline implementation can be obtained with hardware accelerators on the cloud. Nevertheless, there is poor efficiency in the acceleration achieved highlighting the inability to harness the full potential of all available compute cores resulting in wasted computational performance. It is noted that the private VMs perform better than the public VMs. Migrating financial applications onto the cloud is viable since the cloud provides a suitable platform to accommodate the computational, data and memory demands of ad hoc simulations. This is of significant benefit to the financial industry as well as its associated industries since the scalability and availability of resources on an on-demand basis reduce maintenance costs. However, while acceleration was achieved for the simulation, in our experience it could not be run most efficiently on the public cloud since there was wasted computational time for every dollar spent. R EFERENCES [1] N. H. Chan and H. Y. Wong, “Simulation Techniques in Financial Risk Management,” John Wiley & Sons, 2006. [2] G. Woo, “Natural Catastrophe Probable Maximum Loss,” British Actuarial Journal, Vol. 8, 2002. [3] P. Glasserman, P. Heidelberger and P. Shahabuddin, “Portfolio Value-at-Risk with Heavy-tailed Risk Factors,” Mathematical Finance, Vol. 12, No. 3, 2002, pp. 239-269. [4] K. H. Tsoi and W. Luk, “Axel: A Heterogeneous Cluster with FPGAs and GPUs,” Proceedings of the 18th ACM/SIGDA International Symposium on Field Programmable Gate Arrays, 2010, pp. 115-124. [15] N. Singla, M. Hall, B. Shands and R. D. Chamberlain, “Financial Monte Carlo Simulation on Architecturally Diverse Systems,” Proceedings of Workshop on High Performance Computational Finance, 2008. [5] M. Showerman, J. Enos, A. Pant, V. Kindratenko, C. Steffen, R. Pennington and W. -M. Hwu, “QP: A Heterogeneous Multi-Accelerator Cluster,” Proceedings of the 10th LCI International Conference on High-Performance Clustered Computing, 2009. [16] S. Weston, J. -T. Marin, J. Spooner, O. Pell and O. Mencer, “Accelerating the Computation of Portfolios of Tranched Credit Derivatives,” Proceedings of Workshop on High Performance Computational Finance, 2010. [6] D. Kondo, B. Javadi, P. Malecot, F. Cappello and D. P. Anderson, “Cost-benefit Analysis of Cloud Computing Versus Desktop Grids,” Proceedings of the IEEE International Symposium on Parallel and Distributed Processing, 2009. [7] M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica and M. Zaharia, “A View of Cloud Computing,” Communications of the ACM, Vol. 53, Issue 4, April 2010, pp. 50-58. [8] A. Srinivasan, “Parallel and Distributed Computing Issues in Pricing Financial Derivatives through Quasi Monte Carlo,” Proceedings of the International Parallel and Distributed Processing Symposium, 2001. [9] K. Huang and R. K. Thulasiram, “Parallel Algorithm for Pricing American Asian Options with Multi-Dimensional Assets,” Proceedings of the 19th International Symposium on High Performance Computing Symposium, 2005, pp. 177185. [10] C. Bekas, A. Curioni and I. Fedulova, “Low Cost High Performance Uncertainty Quantification,” Proceedings of Workshop on High Performance Computational Finance, 2009. [11] D. Daly, K. D. Ryu and J. E. Moreira, “Multi-variate Finance Kernels in the Blue Gene Supercomputer,” Proceedings of Workshop on High Performance Computational Finance, 2008. [12] M. Majmudar, C. Docan, M. Parashar, C. Marty, “Cost vs. Performance of VaR on Accelerator Platforms,” Proceedings of Workshop on High Performance Computational Finance, 2009. [13] V. Agarwal, L. -K. Liu and D. A. Bader, “Financial Modelling on the Cell Broadband Engine,” Proceedings of the IEEE International Symposium on Parallel and Distributed Processing, 2008. [14] C. Docan, M. Parashar, and C. Marty, “Advanced Risk Analytics on the Cell Broadband Engine,” Proceedings of the 23rd IEEE International Parallel and Distributed Processing Symposium, 2009. [17] M. F. Dixon, J. Chong and K. Keutzer, “Accelerating Valueat-Risk Estimation on Highly Parallel Architectures,” Concurrency and Computation: Practice and Experience, Vol. 24, 2012, pp. 895-907. [18] B. Zhang and C. W. Oosterlee, “Option Pricing with COS Method on Graphics Processing Units,” Proceedings of the 23rd IEEE International Parallel and Distributed Processing Symposium, 2009. [19] L. A. Abbas-Turki, S. Vialle, B. Lapeyre and P. Mercier, “Pricing Derivatives on Graphics Processing Units Using Monte Carlo Simulation,” Concurrency and Computation: Practice and Experience, 2012. [20] D. M. Dang, C. C. Christara and K. R. Jackson, “An Efficient GPU-Based Parallel Algorithm for Pricing Multi-Asset American Options,” Concurrency and Computation: Practice and Experience, Vol. 24, No. 8, 2012, pp. 849-866. [21] H. Kim, S. Chaudhari, M. Parashar and C. Marty, “Online Risk Analytics on the Cloud,” Proceedings of the 9th IEEE/ACM International Symposium on Cluster Computing and the Grid, 2009, pp. 484-489. [22] R. R. Anderson and W. Dong, “Pricing Catastrophe Reinsurance with Reinstatement Provisions using a Catastrophe Model,” Casualty Actuarial Society Forum, Summer 1998, pp. 303-322. [23] G. G. Meyers, F. L. Klinker and D. A. Lalonde, “The Aggregation and Correlation of Reinsurance Exposure,” Casualty Actuarial Society Forum, Spring 2003, pp. 69-152. [24] W. Dong and F. S. Wong, “Portfolio Theory for Earthquake Insurance Risk Assessment,” Proceedings of the 12th World Conference on Earthquake Engineering, Paper No. 0163, 2000. [25] D. Cummins, C. Lewis and Richard Phillips, “Pricing Excessof-Loss Reinsurance Contracts Against Catastrophic Loss,” The Financing of Catastrophe Risk, Editor: K. A. Froot, University of Chicago Press, 1999, pp. 93-148.
5cs.CE
arXiv:1801.10006v1 [math.AC] 30 Jan 2018 PERFECTOID SPACES AND THE HOMOLOGICAL CONJECTURES Y. ANDRÉ A BSTRACT. This is a survey of recent advances in commutative algebra, especially in mixed characteristic, obtained by using the theory of perfectoid spaces. An explanation of these techniques and a short account of the author’s proof of the direct summand conjecture are included. One then portrays the progresses made with these (and related) techniques on the so-called homological conjectures. 1. T HE DIRECT SUMMAND CONJECTURE 1.1. Let R be a Noetherian (commutative) ring and S a finite ring extension, and let us consider the exact sequence of finitely generated R-modules (1.1) 0 → R → S → S/R → 0. When does this sequence split? Equivalently, when is R → S pure, i.e. remains injective after any base change? This holds for instance when R → S is flat, or when R is a normal Q-algebra, but not in general (the embedding of Q[x, y]/(xy) in its normal closure gives a counter-example, since it is no longer an embedding modulo x + y). The direct summand conjecture, formulated by M. Hochster around 1969, claims that (1.1) splits whenever R is regular. Hochster proved it when R contains a field [17]. R. Heitmann proved it in dimension ≤ 3 [14]. 1.2. Recently, the author proved it in general [2]: 1.2.1. Theorem. (1.1) splits if R is regular. This has many (non trivially) equivalent forms. One of them is that every ideal of a regular ring R is contracted from every finite (or integral) extension of R. Another (more indirect) equivalent form is the following statement, which settles a question raised by L. Gruson and M. Raynaud [28, 1.4.3]1: 1.2.2. Theorem. Any integral extension of a Noetherian ring descends flatness of modules. We will see one more equivalent form below in the framework of the so-called homological conjectures (4.2). 2. T HE ROLE OF PERFECTOID SPACES 2.1. Some heuristics. After Hochster’s work [18], it is enough to prove the direct summand conjecture in the case when R is a complete unramified local regular ring of mixed characteristic (0, p) and perfect residue field k. By Cohen’s structure theorem, one may thus assume R = W (k)[[x1 , . . . , xn ]]. 1991 Mathematics Subject Classification. 13D22, 13H05, 14G20. Key words and phrases. homological conjectures, big Cohen-Macaulay algebra, perfectoid algebra, purity. 1cf. [26] for the equivalence. Gruson and Raynaud settled the case of a finite extension and outlined that the transition to integral extensions is not a routine exercise. 1 2 Y. ANDRÉ In characteristic p, all proofs of the direct summand conjecture use the Frobenius endomorphism F in some way. In mixed characteristic, R = W (k)[[x1 , . . . , xn ]] carries a Frobenius-like endomorphism (acting as the canonical automorphism of W (k) and sending xi to xpi ), which however does not extend to general finite extensions S of R. To remedy this, p-adic Hodge theory suggests to “ramify deeply”, by adjoining iterated pth roots of p, x1 , . . . , xn . Doing this, one leaves the familiar shore of Noetherian commutative algebra for perfectoid geometry, recently introduced by P. Scholze [30]. To begin with, W (k) is replaced by the non-Noetherian complete valuation ring Ko := \1 W (k)[p p∞ ]. The valuation ring Lo of any finite extension L of the field K[ p1 ] satisfies: x7→xp 1 F : Lo /p → Lo /p is surjective, and Lo is p p∞ -almost finite etale over Ko , (2.1) this being understood in the context of almost ring theory, introduced by G. Faltings and developped by O. Gabber and L. Ramero [12], which gives precise meaning to “up to 1 1 1 p p∞ -torsion”; for instance, p p∞ -almost etaleness means that p p∞ ΩLo /Ko = 0. Actually, [12] is much more general: it deals with modules over a commutative ring up to k-torsion, for some idempotent ideal k. Going beyond the case of a valuation ideal k will be crucial: 1 1 beside “p p∞ -almost” modules, we will have to consider “(pg) p∞ -almost” modules for some “geometric” discriminant g. 2.2. Perfectoid notions. In perfectoid geometry, one works with certain Banach2 Kalgebras A. One denotes by Ao the Ko -subalgebra of power-bounded elements. One says that A is uniform if Ao is bounded, and that A is perfectoid if it is uniform and x7→xp F : Ao /p → Ao /p is surjective. An example which plays a crucial role in the sequel 1 1 i 1 i ˆ i W (k)[p pi ][[x1p , . . . , xnp ]][ p1 ] , a deeply ramified avatar of R. Morphisms of perfecis ∪ toid algebras A → B are continuous algebra homomorphisms (one then says that B is a perfectoid A-algebra). Perfectoid algebras enjoy three fundamental stability properties [30]: ˆ A C, and (B ⊗ ˆ A C)o 2.2.1. Tensor product. If B and C are perfectoid A-algebras, so is B ⊗ 1 o o ∞ ˆ Ao C . is p p -almost isomorphic to B ⊗ 2.2.2. Localization. The ring of functions A{ fg } on the subset of the perfectoid space 1 Spa(A, Ao ) where |f | ≤ |g| holds is perfectoid, and A{ fg }o is p p∞ -almost isomorphic to ′ 1 Ao h( fg′ ) p∞ i for some approximations f ′ , g ′ of f, g which admit iterated pth -roots in A. 2.2.3. Finite etale extension. Any finite etale extension B of A is perfectoid, and B o is a 1 p p∞ -almost finite etale extension of Ao . This generalization of 2.1 to perfectoid algebras is Faltings’s “almost purity theorem” [8] as revisited by Scholze [30] and Kedlaya-Liu [24]. Let us explain how the second assertion of 2.2.3 follows from the first following [1, 3.4.2]. The idea is to reduce to the case when B is Galois over A with Galois group G, i.e. BG = A and B ⊗A ∼ Q B → G B. This implies BoG = Ao . On the other hand, since B is a finitely generated projective Aˆ A B, and one deduces from 2.2.1 (assuming B perfectoid) that Bo ⊗ ˆ Ao Bo → module, B ⊗A B = B⊗ 1 Q o m p∞ -almost isomorphism. To get rid of the completion, one passes modulo p : B o /pm G B is a p 2here and in the sequel, one can work with any perfectoid field K (of mixed char. (0, p)), - i.e. complete, non-discretely valued, and such that F is surjective on Ko /p. An extensive dictionary between the langage of commutative algebra and the language of non-archimedean functional analysis is presented in [1, 2.3.1]. PERFECTOID SPACES AND THE HOMOLOGICAL CONJECTURES. 3 is almost Galois over Ao /pm , hence almost finite etale, and a variant of Grothendieck’s “équivalence remarquable” [12, 5.3.27] allows to conclude that Bo it itself almost finite etale over Ao . 2.3. Direct summand conjecture: the case when S[ p1 ] is etale over R[ p1 ]. Let us go back to the direct summand conjecture for R = W (k)[[x1 , . . . , xn ]]. The special case when S[ p1 ] is etale over R[ p1 ] was settled by B. Bhatt [4] and by K. Shimomoto [33], using 2.2.3. Here is a slightly different account, suitable to the sequel. 1 i 1 1 i ˆ i W (k)[p pi ][[x1p , . . . , xnp ]][ 1p ] and notice Let us consider the perfectoid algebra A = ∪ 1 1 i 1 i ˆ i W (k)[p pi ][[x1p , . . . , xnp ]] is a faithfully flat extension of R. By assumption that Ao = ∪ 1 B := S ⊗R A is finite etale over A, hence by 2.2.3, B o is p p∞ -almost finite etale, hence almost pure (in the sense: almost universally injective) over Ao . A fortiori, (1.1) almost splits after tensoring with Ao . In other words, if e ∈ Ext1R (S/R, R) denotes the class 1 corresponding to (1.1), then p p∞ (e ⊗ 1) = 0 in Ext1R (S/R, R) ⊗R Ao ∼ = Ext1Ao ((S ⊗R o o o A )/A , A ). One concludes that e = 0 by the following general elementary lemma 1 (applied to M = Re and K = p p∞ Ao ): 2.3.1. Lemma. [2, 1.1.2] Let R be a local Noetherian ring, M a finitely generated Rmodule, A a faithfully flat R-algebra. Let K be an idempotent ideal of A such that K.MA = 0 and R ∩ K 6= 0. Then M = 0. 2.4. The perfectoid Abhyankar lemma. In the general case, S ⊗R A is no longer etale over A: one must take into account a discriminant g ∈ R of S[ p1 ] over R[ p1 ]. This suggests to try to generalize 2.2.3 to ramified extensions of perfectoid algebras. It turns out that this is possible, provided one extracts suitable roots of g in the spirit of Abhyankar’s lemma. 1 1 This leads to replace everywhere “p p∞ -almost” by “(pg) p∞ -almost”, thereby extending the basic setting of almost ring theory beyond the usual situation of a non-discrete valuation ring. This also leads to introduce the notion of almost perfectoid algebra, where x7→xp 1 F : Ao /p → Ao /p is only assumed to be (pg) p∞ -almost surjective [1, 3.5.4]. 2.4.1. Theorem. [1] Let A be a perfectoid K-algebra, which contains a compatible system 1 of p-power roots g pj of some non-zero-divisor g ∈ Ao . Let B ′ be a finite etale A[ g1 ]1 algebra. Let B be the integral closure of g − p∞ A in B ′ , so that B[ g1 ] = B ′ . 1 Then B is almost perfectoid, and for any n, B o /pm is (pg) p∞ -almost finite etale (hence 1 (pg) p∞ -almost flat) over Ao /pm . (If g = 1, one may use [12, 5.3.27] again to conclude that B o is itself almost finite etale over Ao and recover 2.2.3). j The basic idea is to look at the pro-system of algebras of functions Aj := A{ pg } on complements of tubular neighborhoods of the hypersurface g = 0 in the perfectoid space j Spa(A, Ao ), resp. at the pro-system B j := B ′ ⊗A[ g1 ] A{ pg }. Each Aj is perfectoid (2.2.2), 1 and each B j is finite etale over Aj , hence perfectoid; moreover B jo is p p∞ -almost finite etale over Ajo by almost purity (2.2.3). One can show that B o is isomorphic to lim B jo , and that the latter has the asserted properties, However, in the sequel, the identification of (lim B jo )[ p1 ] with the integral closure of 1 g − p∞ A in B ′ plays no role; changing notation, we will set B := (lim B jo )[ p1 ], which is a uniform Banach algebra, and sktech the proof that B is almost perfectoid and that for 1 every m, B o /pm is (pg) p∞ -almost finite etale over Ao /pm . 4 Y. ANDRÉ The proof involves six steps. 1 1) For any r ∈ N[ p1 ], lim(Ajo /pr ) is (pg) p∞ -almost isomorphic to Ao /pr . This is essentially Scholze’s perfectoid version of Riemann’s extension theorem [31, II.3.1] (hint: if R denotes Ao /pr 1 1 j for short, Ajo /pr is p p∞ -almost isomorphic to Rj := R[( pg ) p∞ ]; the key idea is that for j ′ ≥ P ′ pj s j + rpk , Rj → Rj factors through Rjk := ) , so that lim Rj ∼ 1 R( = lim Rjk ; on the s≤ k p g other hand, the kernel and cokernel of R → Rjk are killed by g raised to a power which tends to 0 − 1 when j, k → ∞). Passing to the limit r → ∞, it follows that lim Ajo = g p∞ A, and this also holds under the weaker assumption that A is almost perfectoid, cf. [1, 4.2.2]. 1 2) lim1 (Bjo /pr ) is (pg) p∞ -almost zero. The technique is similar to the one in 1), cf. [1, 4.4.1]. 1 F 3) lim(Bjo /p) → lim(Bjo /p) is (pg) p∞ -almost surjective. Indeed, taking the limit of the exact sequence 0 → Bjo /p jo p−1 p jo 1 → Bjo /p → Bjo /p p → 0, one deduces from 2) (for r = 1 p∞ 1 p jo 1 p p−1 ), p jo that -almost surjective; on the other hand, B /p → B /p is lim(B /p) → lim(B /p ) is (pg) an isomorphism because Bj is perfectoid. 4) B is almost perfectoid. From 3), it suffices to show that the natural map Bo /p = 1 (lim Bjo )/p → lim(Bjo /p) is a (pg) p∞ -almost isomorphism. It is easy to see that it is injective [1, 2.8.1], and on the other hand, the composition limF,j (Bjo /p) = B♭o → (lim Bjo )/p → lim(Bjo /p) is almost surjective by 3). a 1 j ∼ Bj . The factorization comes 5) B → Bj factors through a g p∞ -almost isomorphism B{ pg } = j j a from the fact that Bj ∼ = Bj { p }, and one constructs an almost inverse to B{ p } → Bj as follows g g (cf. [1, 4.4.4]): the integral closure of Ao in B′ maps to the integral closure Ajo in Bj , which is 1 p p∞ -almost Bjo (by almost purity). Passing to the limit and inverting pg, one gets a morphism δ B′ → B[ 1g ], and the sought for inverse is induced by δ ⊗ 1Aj . 1 6) for every m, Bo /pm is (pg) p∞ -almost finite etale over Ao /pm . This is the decisive step: how to keep track of the almost finite etaleness of Bjo over Ajo at the limit? As in 2.2.3, the idea is to reduce to the case when B′ is Galois over A[ g1 ] with Galois group G, i.e. (B′ )G = A[ 1g ] and ∼ Q ˆ Ajo Bjo → B′ ⊗A[ 1 ] B′ → G B′ . It follows that Bj is G-Galois over Aj , and (as in 2.2.3) that Bjo ⊗ g 1 Q jo is a p p∞ -almost isomorphism. Passing to the limit, (and taking into account the facts GB j ˆ A B is an almost perfectoid algebra and B⊗ ˆ A B{ p } ∼ ˆ Aj Bj , so that that, by 4) and 5), B⊗ = Bj ⊗ g 1 Q ˆ Ao Bo → G Bo are (pg) p∞ -almost one can apply 1)), one concludes that Ao → BoG and Bo ⊗ isomorphisms. To get rid of the completion, one passes modulo pm : Bo /pm is almost Galois over 1 Ao /pm , hence (pg) p∞ -almost finite etale (in constrast to 2.2.3, one cannot conclude that Bo is 1 1 (pg) p∞ -almost finite etale over Ao since p may not belong to (pg) p∞ ).  2.5. Infinite Kummer extensions. In order to extend the strategy of 2.3 to the general case by means of the perfectoid Abhyankar lemma, one has first to 1 1 1 ˆ i W (k)[p pi ][[x1pi , . . . , xnpi ]][ p1 ] the iterated pth adjoin to the perfectoid algebra ∪ roots of a discriminant g. At finite level i, it seems very difficult to 1 1 i 1 i 1 control the extension (W (k)[p pi ][[x1p , . . . , xnp ]][g pi , 1p ])o , which is bigger than 1 1 i 1 i 1 W (k)[p pi ][[x1p , . . . , xnp ]][g pi ], but things turn easier at the infinite level, thanks to the perfectoid theory. 2.5.1. Theorem. [2, 2.5.2] Let A be a perfectoid K-algebra, and let g ∈ Ao be a non-zero 1 1 divisor. Then for any n, Ahg p∞ io /pm is p p∞ -almost faithfully flat over Ao /pm . PERFECTOID SPACES AND THE HOMOLOGICAL CONJECTURES. 5 1 The basic idea is to add one variable T , consider the perfectoid algebra C := AhT p∞ i and look at the ind-system of algebras of functions Ci := C{ Tp−g i } on tubular neighborhoods of the hypersurface T = g in the perfectoid space Spa(C, C o ). The proof involves three steps. 1 1 \i Cio . This is an easy consequence of the general 7) Ahg p∞ io is p p∞ -almost isomorphic to colim 1 \ i B{ fi }o is p p∞ -almost isomorphic fact that for any uniform Banach algebra B and f ∈ Bo , colim p to (B/f B)o , cf. [1, 2.9.3]. 8) C o contains a compatible system of p-power roots of some non-zero-divisor fi such that Cio 1 1 1 \j ChU io /(p pj U − fipj ). This is one instance of Scholze’s is p p∞ -almost isomorphic to colim 1 approximation lemma [30, 6.7]; one may assume fi ≡ T − g mod p p . 1 j 1 9) ChU io /(p pj U − fip , pm ) is faithfully flat over Ao /pm . One may replace pm by any 1 1 pj j p gij ≡ g mod p. Then fi 1 1 Since C is perfectoid, there is gij ∈ C p∞ io such that p pj+1 . positive power of p, e.g. 1 1 1 1 1 1 1 1 j ≡ T pj − gij mod p pj+1 , and ChU io /(p pj U − fip , p pj+1 ) ∼ = (Ao /p pj+1 )[T p∞ , U ]/(T pj − gij ), a free Ao /p pj+1 -module.  2.6. Conclusion of the proof of the direct summand conjecture. One chooses g ∈ R 1 1 ] is etale over R[ pg ]. One then follows the argument of 2.3, replacsuch that S[ pg 1 1 1 ˆ i W (k)[p pi ][[x1pi , . . . , xnpi ]][ p1 ] by the “infinite Kummer extension” A := ing A = ∪ 1 1 i 1 i 1 ˆ i W (k)[p pi ][[x1p , . . . , xnp ]][ p1 ])hg p∞ i. One introduces the finite etale extension B ′ := (∪ S ⊗R A[ 1g ] of A[ g1 ], and one replaces B = S ⊗R A in 2.3 by B := (lim B jo )[ p1 ], noting that B o is the S-algebra lim B jo . Translating Th. 2.4.1 and Th. 2.5.1 in terms of almost purity modulo pm , and reasoning as in 2.3 (using the same lemma), one obtains that (1.1) splits modulo pm for any n [2, §3]. A Mittag-Leffler argument (retractions of R/pm → S/pm form a torsor under an artinian R/pm -module [17, p. 30]) shows that (1.1) itself splits.  2.7. Derived version. In [5], B. Bhatt revisits this proof and proposes a variant, which differs in the analysis of the pro-system Ajo /pr occurring in the proof of Th. 2.4.1: he strengthens step 1) by showing that the pro-system of kernels and cokernels of (A/pr )j → 1 (Ajo /pr )j is pro-isomorphic to a pro-system of (pg) p∞ -torsion modules; this allows to apply various functors before passing to the limit j → ∞, whence a gain in flexibility. More importantly, he obtains the following derived version of the direct summand conjecture, which had been conjectured by J. de Jong: 2.7.1. Theorem. [5] Let R be a regular Noetherian ring, and f : X → Spec R be a proper surjective morphism. Then the map R → RΓ(X, OX ) splits in the derived category D(R). 3. E XISTENCE OF ( BIG ) C OHEN -M ACAULAY ALGEBRAS 3.1. Cohen-Macaulay rings, and Cohen-Macaulay algebras for non-Cohen-Macaulay rings. Let S be a local Noetherian ring with maximal ideal m and residue field k. Recall that a sequence x = (x1 , . . . , xn ) in m is secant3 if dim S/(x) = dim S − n, and regular if for every i, multiplication by xi is injective in S/(x1 , . . . , xi−1 )S. Any regular sequence 3following Bourkaki’s terminology (for instance); it is also often called “part of a system of parameters”, although grx S may not be a polynomial ring in the “parameters” xi (it is if x is regular). 6 Y. ANDRÉ is secant, and if the converse holds, S is said to be Cohen-Macaulay. Regular local rings have a secant sequence generating m, and are Cohen-Macaulay. Cohen-Macaulay rings form the right setting for Serre duality and the use of local homological methods in algebraic geometry, and have many applications to algebraic combinatorics [7]. When confronted with a non-Cohen-Macaulay ring S, one may try two expedients: 1) Macaulayfication: construct a proper birational morphism X → Spec S such that all local rings of X are Cohen-Macaulay. This weak resolution of singularities, introduced by Faltings, has been established in general by T. Kawasaki [23]. Hovewer, secant sequences in S may not remain secant (hence not become regular) in the local rings of X; this motivates the second approach: 2) Construction of a Cohen-Macaulay algebra4: an S-algebra C such that any secant sequence of S becomes regular in C, and mC 6= C. The existence of Cohen-Macaulay algebras implies the direct summand conjecture: indeed, if C is a Cohen-Macaulay algebra for a finite extension S of a regular local ring R, it is also a Cohen-Macaulay R-algebra; this implies that R → C is faithfully flat, hence pure, and so is R → S. 3.2. Constructions of Cohen-Macaulay algebras. The existence of a (big) CohenMacaulay algebra was established by Hochster and C. Huneke under the assumption that S contains a field [22]. One may assume that S is a complete local domain. In char. p > 0, one may then take C to be the total integral closure of S (i.e. the integral closure of S in an algebraic closure of its field of fractions). This is no longer true in the case of equal char. 0, which can nevertheless be treated by reduction to char. p >> 0 using ultraproduct techniques. The remaining case of mixed characteristic was settled in [2], using the same perfectoid methods, so that one has: 3.2.1. Theorem. Any local Noetherian ring S admits a (big) Cohen-Macaulay algebra C. In the case of a complete local domain S of char (0, p) and perfect residue field k (to which one reduces), one proceeds as follows. Cohen’s theorem allows to present S as a finite extension of R = W [[x1 , . . . , xn ]]. One first considers the R-algebra A := 1 1 i 1 i 1 ˆ i W (k)[p pi ][[x1p , . . . , xnp ]][ 1p ])hg p∞ io and the S-algebra Bo = lim Bjo as above 2.6. It fol(∪ 1 lows from Th. 2.4.1 and Th. 2.5.1 that Bo is (pg) p∞ -almost isomorphic to a faithfully flat R algebra 1 modulo any power of p. From there, one deduces that the sequence (p, x1 , . . . , xn ) is “(pg) p∞ almost regular” in Bo . To get rid of “almost”, Lemma 2.3.1 is no longer sufficient: instead, one uses Hochster’s technique of monoidal modifications [19][22]. After m-completion, one gets a S-algebra C in which (p, x1 , . . . , xn ), as well as any other secant sequence of S, becomes regular.  Subsequently, using the tilting equivalence between perfectoid algebras in char. 0 and in char.p and applying Hochster’s modifications in char.p rather than in char.0, K. Shimomoto [34] shows that in Th. 3.2.1, in mixed characteristic, C can be taken to be perfectoid5. In particular, if S is regular, it admits a perfectoid faithfully flat algebra (one may speculate about the converse6). 4since it would be too restrictive to impose that C is Noetherian, one often speaks of “big” Cohen-Macaulay algebra. 5actually, Shimomoto’s result is slightly weaker, but can be enhanced. 6this is settled in forthcoming work by Bhatt, Ma, Iyangar. PERFECTOID SPACES AND THE HOMOLOGICAL CONJECTURES. 7 3.3. Finite and fpqc covers. Since Cohen-Macaulay algebras for regular local rings are faithfully flat, Th. 3.2.1 implies [2]: 3.3.1. Theorem. Any finite cover of a regular scheme is dominated by a faithfully flat quasi-compact cover. If regularity is omitted, Spec(Q[x, y]/(xy)) and its normalization provide a counterexample. 4. H OMOLOGICAL CONJECTURES 4.1. Origins from intersection theory. Under the influence of M. Auslander, D. Buchsbaum and J.-P. Serre, commutative algebra has shifted in the late 50s from the study of ideals of commutative rings to the homological study of modules (cf. their characterization of regular local rings by the existence of finite free resolutions for any finitely generated module, resp. for the residue field). Serre proved that for any three prime ideals p, q, r of a regular local ring R such that r is a minimal prime of p + q, ht r ≤ ht p + ht q [32]. The special case r = m can be amplified: for any ideals I, J of R such that I + J is m-primary, dim R/I + dim R/J ≤ dim R. This is no longer true if R is not regular, and attempts to understand the general situation led to the so-called homological conjectures cf. [7, ch. 9], [20]. 4.2. Intersection conjectures. Let (R, m) be local Noetherian ring. The first “intersection conjecture” was proposed by C. Peskine and L. Szpiro [27], proved by them when R contains a field by reduction to char. p and Frobenius techniques, and later proved in general by P. Roberts using K-theoretic methods [29]. It states that if M, N are finitely generated R-modules such that M ⊗ N has finite length, then dim N ≤ pd M . It implies that R is Cohen-Macaulay if and only if there is an R-module M of finite length and finite projective dimension (in the spirit of Serre’s characterization of regular rings, which is the case M = k), resp. if there is an R-module M of finite injective dimension. Indeed, one may take N = R and deduce that dim R ≤ pd M ; by the Auslander-Buchsbaum formula, pd M = depth R − depth M , so that the inequality depth R ≤ dim R is an equality. The second assertion follows from the fact that id M = depth R [3]. The “new intersection conjecture”, also proved by Peskine, Szpiro [27] and Roberts [29], states that for any non exact complex F• of free R-modules concentrated in degrees [0, s] with finite length homology, s > dim R. The “improved new intersection conjecture” is a variant due to E. Evans and P. Griffith [11], in which the condition on F• is “slightly” relaxed: the Hi>0 are of finite length and there exists a primitive cyclic submodule of H0 of finite length. They proved it, assuming the existence of (big) Cohen-Macaulay algebras7, and showed that it implies their “syzygy conjecture”. In spite of appearances, the passage from the new intersection conjecture to its “improved” variant is no small step8: in fact, according to Hochster [20] and S. Dutta [9], the latter is equivalent to the direct summand conjecture. 7if R is Cohen-Macaulay, the Buchsbaum-Eisenbud criterion gives a condition for the exactness of F in • terms of codimension of Fitting ideals of syzygies. In general, the same condition guarantees that F• ⊗ C is exact for any Cohen-Macaulay R-algebra C [7, 9.1.8]. 8 K-theoretic techniques failed to make the leap. 8 Y. ANDRÉ On the other hand, in the wake of the new intersection conjecture (and motivated by the McKay correspondence in dimension 3 and the “fact” that threefold flops induce equivalences of derived categories), T. Bridgeland and S. Iyengar obtained a refinement of Serre’s criterion for regular rings assuming the existence of Cohen-Macaulay algebras [6, 2.4]. By Th. 1.2.1 and Th. 3.2.1, the improved new intersection conjecture and the Bridgeland-Iyengar criterion thus hold inconditionally: 4.2.1. Theorem. Let R be a Noetherian local ring and F• be a complex of finitely generated free R-modules concentrated in degree [0, s], such that H>0 (F• ) has finite length. (1) If H0 (F• ) contains a cyclic R-submodule of finite length not contained in mH0 (F• ), then s ≥ dim R. (2) If H0 (F• ) has finite length and contains k as a direct summand, and s = dim R, then R is regular. And so does the syzygy conjecture: 4.2.2. Theorem. Let R be a Noetherian local ring and M a finitely generated R-module of finite projective dimension s. Then for i ∈ {1, . . . , s − 1}, the i-th syzygy module of M has rank ≥ i. 4.3. Further work around the homological conjectures using perfectoid spaces. 4.3.1. In [15], Heitmann and L. Ma show that Cohen-Macaulay algebras can be constructed in a way compatible with quotients S → S/p by primes of height one. Using arguments similar to Bhatt’s derived techniques, they deduce the vanishing conjecture for maps of Tor [22]: 4.3.1. Theorem. [15] Let R → S → T be morphisms such that the composed map is a local morphism of mixed characteristic regular local rings, and S is a finite torsionfree extension of R. Then for every R-module M and every i, the map TorR i (M, S) → (M, T ) vanishes. TorR i They obtain the following corollary, which generalizes results by Hochster and J. Roberts, J.-F. Boutot et al.: 4.3.2. Corollary. [15] Let R ֒→ S be a pure, local morphism, with S regular. Then R is pseudo-rational, hence Cohen-Macaulay. 4.3.2. In [25], Ma and K. Schwede define and study perfectoid multiplier/test ideals in mixed characteristic, and use them to bound symbolic powers of ideals in regular domains in terms of ordinary powers: 4.3.3. Theorem. [25] Let R be a regular excellent Noetherian domain and let I ⊂ R be a radical ideal such that each minimal prime of I has height ≤ h. Then for every n, I (hn) ⊂ I n . Here I (hn) denotes the ideal of elements of R which vanish generically to order hn at I. When R contains a field, the result was proved in [10] and [21]. 4.3.3. An efficient and unified way of dealing with questions related to the homological conjectures in char. p is provided by “tight closure theory”, which has some flavor of almost ring theory. Using Th. 2.4.1 and Th. 2.5.1 above, Heitmann and Ma give evidence that the “extended plus closure” introduced in [13] is a good analog of tight closure theory in mixed characteristic [16]. PERFECTOID SPACES AND THE HOMOLOGICAL CONJECTURES. 9 R EFERENCES [1] Y. André, Le lemme d’Abhyankar perfectoı̈de, preprint (2016), to appear in Publ. Math. I.H.E.S. doi 10.1007/s10240-017-0096-x [2] Y. André, La conjecture du facteur direct, preprint (2016), to appear in Publ. Math. I.H.E.S. doi 10.1007/s10240-017-0097-9 [3] H. Bass, On the ubiquity of Gorenstein rings, Math. Z. 82 (1963), 8-28. [4] B. Bhatt, Almost direct summands, Nagoya math. J. 214 (2014), 195-204. [5] −, On the direct summand conjecture and its derived variant, preprint arXiv:1608.08882 [6] T. Bridgeland, S. Iyengar, A criterion for regular local rings, C. R. A. S. Paris I 342 (2006), 723-726. [7] W. Bruns, J. Herzog, Cohen-Macaulay rings, Cambridge Univ. Press 39 (1998). [8] G. Faltings, Almost étale extensions, Astérisque 279 (2002), 185-270. [9] S. Dutta, On the canonical element conjecture, Trans. Amer. Math. Soc. 299 (1987), 803-811. [10] L. Ein, R. Lazarsfeld, K. Smith, Uniform bounds and symbolic powers on smooth varieties, Invent. Math. 144 (2001), 241-252. [11] E. Evans, P. Griffith, The syzygy problem, Annals of Maths. 114 (1981), 323-333. [12] O. Gabber, L. Ramero, Almost ring theory, Lecture Notes in Math. 1800, Springer (2003). [13] R. Heitmann, Extensions of plus closure, J. of Algebra 238 (2001), 801826. [14] −, The direct summand conjecture in dimension three, Ann. of Maths 156 (2002), 695-712. [15] −, L. Ma, Big Cohen-Macaulay algebras and the vanishing conjecture for maps of Tor in mixed characteristic, preprint arXiv:1703.08281 [16] −−, Extended plus closure in complete local rings, preprint arXiv:1708.05761 [17] M. Hochster, Contracted ideals from integral extensions of regular rings, Nagoya Math. J., 51 (1973), 25-43. [18] − , Canonical elements in local cohomology modules and the direct summand conjecture, J. of Algebra 84 (1983), 503-553. [19] −, Big Cohen-Macaulay algebras in dimension three via Heitmann’s theorem, J. Algebra 254 (2002), 395408. [20] −, Homological conjectures, old and new, Illinois J. Math. 51, no 1 (2007), 151-169. [21] −, C. Huneke, Tight closure, invariant theory, and the Briançon-Skoda theorem, J. Amer. Math. Soc. 3 (1990) 31116. [22] −− Applications of the existence of big Cohen-Macaulay algebras, Adv. in maths 113 (1995), 45-117. [23] T. Kawasaki, On Macaulayfication of Noetherian Schemes , Trans. A. M. S. 352, No. 6 (2000), 2517-2552. [24] K. Kedlaya, R. Liu, Relative p-adic Hodge theory, I: Foundations, S. M. F. Astérisque 371 (2015). [25] L. Ma, K. Schwede, Perfectoid multiplier/test ideals in regular rings and bounds on symbolic powers, preprint arXiv:1705.02300 [26] T. Ohi, Direct summand conjecture and descent for flatness, Proc. A.M.S. 124, 7 (1996), 1967-1968. [27] C. Peskine, L. Szpiro, Dimension projective finie et cohomologie locale, Publ. Math. I.H.E.S. 42 (1973), 323-395. [28] M. Raynaud, L. Gruson, Critères de platitude et de projectivité, Inventiones math. 13 (1971), 1-89. [29] P. Roberts, Le théorème d’intersection, C. R. Acad. Sc. Paris 304 (1987), 177-180. [30] P. Scholze, Perfectoid spaces, Publ. Math. I.H.E.S. 116, no 1 (2012), 245-313. [31] −, On torsion in the cohomology of locally symmetric varieties, Annals of Maths. 182 (2015), 945-1066. [32] J.-P. Serre, Algèbre locale, multiplicités, Springer LNM 11 (1965). [33] K. Shimomoto, An application of the almost purity theorem to the homological conjectures, J. pure applied algebra 220 (2014), 621-632. [34] −, Integral perfectoid big Cohen-Macaulay algebras via André’s theorem, preprint arXiv:1706.06946 I NSTITUT DE M ATH ÉMATIQUES DE J USSIEU , 4 PLACE J USSIEU , 75005 PARIS F RANCE . E-mail address: [email protected]
0math.AC
AEkNN: An AutoEncoder kNN-based classifier with built-in dimensionality reduction Francisco J. Pulgar1 · Francisco Charte1 1 Antonio J. Rivera · Marı́a J. del Jesus1 · arXiv:1802.08465v2 [cs.LG] 9 Mar 2018 Abstract High dimensionality, i.e. data having a large number of variables, tends to be a challenge for most machine learning tasks, including classification. A classifier usually builds a model representing how a set of inputs explain the outputs. The larger is the set of inputs and/or outputs, the more complex would be that model. There is a family of classification algorithms, known as lazy learning methods, which does not build a model. One of the best known members of this family is the kNN algorithm. Its strategy relies on searching a set of nearest neighbors, using the input variables as position vectors and computing distances among them. These distances loss significance in high-dimensional spaces. Therefore kNN, as many other classifiers, tends to worse its performance as the number of input variables grows. In this work AEkNN, a new kNN-based algorithm with built-in dimensionality reduction, is presented. Aiming to obtain a new representation of the data, having a lower dimensionality but with more informational features, AEkNN internally uses autoencoders. From this new feature vectors the computed distances should be more significant, thus providing a way to choose better neighbors. A experimental evaluation of the new proposal is conducted, analyzing several configurations and comparing them against the classical kNN algorithm. The obtained conclusions demonstrate that AEkNN offers better results in predictive and runtime performance. Keywords kNN · deep learning · autoencoders · dimensionality reduction · high dimensionality F. J. Pulgar Tel.: +34 953 211 956 [email protected] F. Charte [email protected] A. J. Riverea [email protected] M. J. del Jesus [email protected] 1 Department of Computer Science, University of Jaén, 23071 Jaén, Spain 2 F. J. Pulgar et al. 1 Introduction Classification is a well-known task within the area of machine learning [29]. The main objective of a classifier is to find a way to predict the label to be assigned to new data patterns. To do so, usually a model is created from previously labeled data. In traditional classification, each example has a single label. Different algorithms have been proposed in order to address this work. One of the classic methodologies is instance-based learning (IBL) [1]. Essentially, this methodology is based on local information provided by the training instances, instead of constructing a global model from the whole data. The algorithms belonging to this family are relatively simple, however they have demonstrated to obtain very good results in facing the classification problem. A traditional example of such an algorithm is k-nearest neighbors (kNN) [23]. The different IBL approaches, including the kNN algorithm [13], have difficulties when faced with high-dimensional datasets. These datasets are made of samples having a large number of features. In particular, the kNN algorithm presents problems when calculating distances in high-dimensional spaces. The main reason is that distances are less significant as the number of dimensions increases, tending to equate [13]. This effect is one of the causes of the curse of dimensionality, which occurs when working with high-dimensional data [8, 9]. Another consequence that emerges in this context is the Hughes phenomenon. This fact implies that the predictive performance of a classifier decreases as the number of features of the dataset grows, keeping the number of examples constant [44]. In other words, more instances would be needed to maintain the same level of performance. Several approaches have been proposed for facing the dimensionality reduction task. Recently, a few proposals based on deep learning (DL) [25, 11] have obtained good results while tackling this problem. The rise of these techniques is produced by the good performance that DL models have had in many research areas, such as computer vision, automatic speech processing, or audio and music recognition. In particular, autoencoders (AEs) are DL networks offering good results due to their architecture and operation [17, 41, 84, 67, 94, 14]. High dimensionality is usually mitigated by transforming the original input space into a lower-dimensional one. In this paper an instance-based algorithm, that internally generates a reduced set of features, is proposed. Its objective is to obtain a better IBL method, able to deal with high-dimensional data. Specifically, the present work introduces AEkNN, a kNN-based algorithm with built-in dimensionality reduction. AEkNN projects the training patterns into a lower-dimensional space, relying in an AE for doing so. The goal is to produce new features of higher quality from the input data. This approach is experimentally evaluated, and a comparison between AEkNN and the kNN algorithm is performed considering predictive performance and execution time. The results obtained demonstrate that AEkNN offers better results in both metrics. In addition, AEkNN is compared with other traditional dimensionality reduction algorithms. This comparison offers an idea of the behavior of the AEkNN algorithm when facing the task of dimensionality reduction. An important aspect of the AEkNN algorithm that must be highlighted is that it performs a transformation of the features of the input data, against other traditional algorithms that perform a simple selection of the most significant features. AEkNN performs this transformation taking into account all the characteristics of AEkNN: An AutoEncoder kNN-based classifier ... 3 the input data, although not all will have the same weight in the new generated space. In short, AEkNN combines two reference methods, kNN and AE, in order to take advantage of kNN in classification and reduce the effects of high dimensionality by means of AE. In this way, the proposed method presents a baseline for future works. Summarizing, the main contributions of this work are 1) the design of a new classification algorithm, AEkNN, which combines an efficient dimensionality reduction mechanism with a popular classification method, 2) an analysis of the AEkNN operating parameters that allows selecting the best algorithm configuration, 3) an experimental demonstration of the improvement that AEkNN achieves with respect to the kNN algorithm, and 4) an experimental comparison between the use of an autoencoder for dimensionality reduction with respect to other classical methods such as PCA and LDA. This paper is organized as follows. In Section 2 a few fundamental concepts, such as machine learning, classification, and the kNN algorithm, are briefly introduced, and some details about DL techniques and AEs are provided. Section 3 describes relevant related works, focused on tackling the problem of dimensionality reduction in kNN. In Section 4, the proposed AEkNN algorithm is introduced. Section 5 defines the experimental framework, as well as the different results obtained from the experimentation. Finally, Section 6 provides the overall conclusions. 2 Preliminaries AEkNN, the algorithm proposed in this work, is a kNN-based classification method designed to deal with high-dimensional data. This section outlines the essential concepts AEkNN is founded on, such as classification, nearest neighbors classification, DL techniques and AEs. The most basic concepts are introduced in subsection 2.1. The kNN algorithm is discussed in subsection 2.2, while DL and AEs are briefly described in subsections 2.3 and 2.4. 2.1 Machine Learning and Classification In general terms, machine learning is a subfield of artificial intelligence whose aim is to develop algorithms and techniques able to generalize behaviors from information supplied as examples [46, 33]. The different tasks that can be performed on machine learning can be classified following different criteria. One of these categorizations arises according to the training patterns used to train the machine learning system [3]. In this sense, it can be distinguished between supervised learning, when patterns are labeled, such as classification and regression, and unsupervised learning, when patterns are not labeled, such as clustering, among others. Classification is one of the tasks performed in the data mining phase. It is a predictive task that usually develops through supervised learning methods [47]. Its purpose is to predict, based on previously labeled data, the class to assign to future unlabeled patterns. In traditional classification, datasets are structured as a set of input attributes, known as features, and one output attribute, the class or label. Depending on the number of values that this output class can take, the classification problem can be seen as: 4 F. J. Pulgar et al. – Binary classification, in which each pattern can only belong to one of two classes. – Multi-class classification, in which each pattern can only belong to one of a limited set of classes. Consequently, a binary classification can be seen as a problem of multi-class classification with only two classes. Several issues can emerge while designing a classifier, being some of them related to high dimensionality. According to the Hughes phenomenon [44], the predictive performance of a classifier decreases as the number of features increases, provided that the number of training instances is constant. Another phenomenon that particularly affects IBL algorithms is the curse of dimensionality. IBL algorithms are based on the similarity of individuals, calculating distances between them [1]. These distances tend to lose significance as dimensionality grows. 2.2 The kNN Algorithm kNN is a non-parametric algorithm developed to deal with classification and regression tasks[4, 23]. In classification, kNN predicts the class for new instances using the information provided by the k nearest neighbors, so that the assigned class will be the most common among them. Fig. 1 shows a very simple example on how kNN works with different k values. As can be seen, the prediction obtained with k = 3 would be B, with k = 5 would be A and with k = 11 would be A. Fig. 1: k-Nearest neighbors algorithm in a bi-dimensional space. An important feature of this algorithm is that it does not build a model for accomplishing the prediction task. Usually, no work is done until an unlabeled data pattern arrives, thus the denomination of lazy approach [5]. Once the instance to be classified is given, the information provided by its k nearest neighbors [24] is used as explained above. One of kNN’s main issues is its behavior with datasets having a high-dimensional input space, due to the loss of significance of traditional distances as the dimensionality of the data increases [13]. In such a high-dimensional space distances between individuals tend to be the same. As a consequence similarity/distancebased algorithms, such as kNN, usually do not offer adequate results. AEkNN: An AutoEncoder kNN-based classifier ... 5 In this article, kNN has been selected to perform classification tasks. kNN is very popular since it has a good performance, uses few resources and it is relatively simple [60, 88, 59, 28]. The objective of this proposal is to present an algorithm that combines the advantages of kNN to classify with DL models to reduce dimensionality. 2.3 Deep Learning DL [87, 25] arises with the objective of extracting higher-level representations of the analyzed data. In other words, the main goal of DL-based techniques is learning complex representations of data. The main lines of research in this area are intended to define different data representations and create models to learn them [12]. As the name suggests, models based on DL are developed as multi-layered (deep) architectures, which are used to map the relationships between features in the data (inputs) and the expected result (outputs) [34, 10]. Most DL algorithms learn multiple levels of representations, producing an hierarchy of concepts. These levels correspond to different degrees of abstraction. The following are some of the main advantages of DL: – These models can handle a large number of variables and generate new features as part of the algorithm itself, not as an external step [25, 19, 76]. – Provides performance improvements in terms of time needed to accomplish feature engineering, one of the most time-consuming tasks [34]. – Achieves much better results than other methods based on traditional tech- niques [20, 49, 40, 90] while facing problems in certain fields, such as image, speech recognition or malware detection. – DL-based models have a high capacity of adaptation for facing new problems [87, 10]. Recently, several new methods [11, 52, 25] founded on the good results produced by DL have been published. Some of them are focused on certain areas, such as image processing and voice recognition [52]. Other DL-based proposals have been satisfactorily applied in disparate areas, gaining advantage over prior techniques [25]. Due to the great impact of DL-based techniques, as well as the impressive results they usually offer, new challenges are also emerging in new research lines [11]. There are two main reasons behind the rise of DL techniques, the large amount of data currently available and the increase in processing power. In this context, different DL architectures have been developed: AEs (section 2.4), convolutional neural networks [50], long short-term memory [42], recurrent neural networks [69], gated recurrent unit [18], deep Boltzmann machines [39], deep stacking networks [26], deep coding networks [55], deep recurrent encoder [74], deep belief networks [45, 53], among others [25, 10]. DL models have been widely used to perform classification tasks obtaining good results [20, 49, 30, 27]. However, the objective of this proposal is not to perform the classification directly with these models, but use them to the dimensionality reduction task. 6 F. J. Pulgar et al. The goal of the present work is to obtain higher-level representations of the data but with a reduced dimensionality. One of the dimensionality reduction DLbased techniques that has achieved good results are AEs [56]. An AE is an artificial neural network whose purpose is to reproduce the input into the output, in order to generate a compressed representation of the original information [10]. Section 2.4 thoroughly describes this technique. 2.4 Autoencoders An AE is an artificial neural network able to learn new information encodings through unsupervised learning [17]. AEs are trained to learn an internal representation that allows reproducing the input into the output through a series of hidden layers. The goal is to produce a more compressed representation of the original information in the hidden layers, so that it can be used in other tasks. AEs are typically used for dimensionality reduction tasks by their characteristics and performance [41, 84, 67, 94, 14, 73, 93]. Therefore, the importance of such networks in this paper. The most basic structure of an AE is very similar to that of a multilayer perceptron. An AE is a feedforwark neural network without cycles, so the information always goes in the same direction. An AE is typically formed by a series of layers: an input layer, a series of hidden layers and an output layer, being the units in each layer connected to those in the next one. The main characteristic of AEs is that the output has the same number of nodes than the input, since the goal is to reproduce the latter into the former throughout the learning process [10]. Two parts can be distinguished in an AE, the encoder and the decoder. The first one is made up of the input layer and the first half of hidden layers. The second is composed of the second half of hidden layers and the output layer. This is the architecture shown in Fig. 2. As can be seen, the structure of an AE always is symmetrical. Fig. 2: Architecture of an autoencoder with three hidden layers. AEkNN: An AutoEncoder kNN-based classifier ... 7 The encoder and decoder parts in an AE can be defined as functions ω (Eq. (1)) and β (Eq. (2)), so that: ω:X→F (1) β:F →X (2) Where x ∈ Rd = X is the input to the AE, and z ∈ Rp = F is the mapping contained in the hidden layers of the AE. When there is only one hidden layer (the most basic case) the AE maps the input X onto Z. For doing this, a weight vector W and a bias parameter b are used: z = γ 1 (W x + b ) (3) Eq. (3) corresponds to the compression function, wherein a encoded input representation is obtained. Here, γ1 is an activation function such as a rectified linear unit or a sigmoid function. The next step is to decode the new representation z to obtain x’, in the same way as x was projected into z, by means of a weight vector W’ and a bias parameter b’. Eq. (4) corresponds to the decoder part, where the AE reconstructs the input from the information contained in the hidden layer. x’ = γ2 (W 0 z + b0 ) (4) During the training process, the AE tries to reduce the reconstruction error. This operation consists of back-propagating the obtained error through the network, and then modifying the weights to minimize such error. Algorithm 1 shows the pseudo-code of this process. Algorithm 1 AE training algorithm’s pseudo-code. 1: 2: 3: 4: 5: 6: 7: 8: 9: Inputs: T rainData . For each training instance: for each instace in T rainData do . Do a feed-forward through AE to obtain output: newCod ← feedForwardAE(aeM odel, instance) . Calculate error: error ← calculateError(newCod, instance) . Backpropagate the error through AE and perform weight update: aeModel ← backpropagateError(eror) end for . Train Data Learning a representation that allows reproducing the input into the output could seem useless at first sight, but in this case the output is not of interest. Instead, the concern is in the new representation of the inputs learned in the hidden layers. Such new codification is really interesting, because it can have very useful features [34]. The hidden layers learn a higher-level representation of the original data, which can be extracted and used in independent processes. Depending on the number of units the hidden layers have, two types of AEs can be distinguished: 8 F. J. Pulgar et al. – Those whose hidden layer have less units than the input and output layers. This type of AE is called undercomplete. Its main objective is to force the network to learn a compressed representation of the input, extracting new, higher-level features. – Those whose hidden layer have more units than the input and output layers. This type of AE is called overcomplete. The main problem in this case is that the network can learn to copy the input to the output without learning anything useful, so when it is necessary to obtain an enlarged representation of the input it is necessary to use other tools to prevent this problem. In conclusion, AEs are a very suitable tool for generating a new lower-dimensional input space made of higher-level features. AEs have obtained good results in the accomplishment of this task. This is the main reason to choose this technique to design the AEkNN algorithm described later. However, it is important to note that there are other methods of dimensionality reduction that produce good results, such as denoising autoencoders [83], restricted Boltzmann machines [70] or sparse coding [89]. The objective of this proposal is to present an algorithm that hybridizes kNN with AEs. This establishes a baseline that allows supporting studies with more complex methods. 3 Dimensionality reduction approaches In this section, an exploration of previous works related to the proposal made in this paper is carried out. The subsection 3.1 introduces classical proposals to tackle the dimensionality reduction problem. Some approaches for facing the dimensionality reduction task for kNN are portrayed in subsection 3.2. In automatic learning, dimensionality reduction is the process aimed to decrease the number of considered variables, by obtaining a subset of main features. Usually two different dimensionality reduction methods are considered: – Feature selection [58], where the subset of the initial features that provides more useful information is chosen. The final features have no transformation in the process. – Feature extraction [57], where the process constructs from the initial features a set of new ones providing more useful and non-redundant information, facilitating the next steps in machine learning and in some cases improving understanding by humans. 3.1 Classical proposals for dimensionality reduction Most dimensionality reduction techniques can be grouped into two categories, linear and non-linear approaches [79]. Below some representative proposals found in the literature, those that can be considered as traditional methods, are depicted. Commonly, classic proposals for dimensionality reduction were developed using linear techniques. The following are some of them: – Principal Components Analysis (PCA) [63, 43] is a well-known solution for di- mensionality reduction. Its objective is to obtain the lower-dimensional space AEkNN: An AutoEncoder kNN-based classifier ... 9 where the data are embedded. In particular, the process starts from a series of correlated variables and converts them into a set of uncorrelated linear variables. The variables obtained are known as principal components, and their number is less than or equal to the original variables. Often, the internal structure extracted in this process reflects the variance of the data used. – Factors analysis [75] is based on the idea that the data can be grouped according to their correlations, i.e. variables with a high correlation will be within the same group and variables with low correlation will be in different groups. Thus, each group represents a factor in the observed correlations. The potential factors plus the terms error are linearly combined to model the input variables. The objective of factor analysis is to look for independent dimensions. – Classical scaling [78] consists in grouping the data according to their similarity level. An algorithm of this type aims to place each data in an N-dimensional space where the distances are maintained as much as possible. Despite their popularity, classical linear solutions for dimensionality reduction present the problem that they can not correctly handle complex non-linear data [79]. For this reason, nonlinear proposals for dimensionality reduction arose. A compilation of these is presented in [15, 71, 54, 81]. Some of these techniques are: Isomap [77], Maximum Variance Unfolding [86], diffusion maps [21], manifold charting [79], among others. These techniques allow to work correctly with complex non-linear data. This is an advantage when working with real data, which are usually of this type. 3.2 Proposals for dimensionality reduction in kNN There are different proposals trying to face the problems of kNN when working with high-dimensional data. In this section, some of them are collected: – A method for computing distances for kNN is presented in [91]. The proposed algorithm performs a partition of the total data set. Subsequently, a reference value for each partition made is assigned. Grouping the data in different partitions allows to obtain a space of smaller dimensionality where the distances between the reference points are more significant. The method depends on the division of the data performed and the selection of the reference. This is a negative aspect, since a poor choice of parameters can greatly influence the final results. – The authors of [48] analyze the curse of dimensionality phenomenon, which states that in high-dimensional spaces the distances between the data points become almost equal. The objective is to investigate when the different methods proposed reach their limits. To do this, they perform an experiment in which different methods are compared with each other. In particular, it is exposed that the kNN algorithm begins to worsen the results when the space exceeds eight dimensions. A proposed solution is to adapt the calculation of distances to high-dimensional spaces. However, this approach does not consider a transformation of the initial data to a lower-dimensional space. – The proposal in [85] is a kNN-based method called kMkNN, whose objective is to improve the search of the nearest neighbors in a high-dimensional space. This problem is approached from another point of view, being the goal to accelerate 10 F. J. Pulgar et al. the computation of distances between elements without modifying the input space. To do this, kMkNN relies on k-means clustering and the triangular inequality. The study shows a comparison with the original kNN algorithm where it is demonstrated that kMkNN works better considering the execution time, although it is not as effective when predictive performance is taken into account. – A new aspect related to the curse of dimensionality phenomenon, occurring while working with the kNN algorithm, is explored in [65]. It refers to the number of times that a particular element appears as the closest neighbor of the rest of elements. The main objective of the study is to examine the origins of this phenomenon as well as how it can affect dimensionality reduction methods. The authors analyze this phenomenon and some of its effects on kNN classification, providing a foundation which allows making different proposals aimed to mitigate these effects. – In [37], the problem of finding the nearest neighbors in a high-dimensional space is analyzed. This is a difficult problem both from the point of view of performance and the quality of results. In this study, a new search approach is proposed, where the most relevant dimensions are selected according to certain quality criteria. Thus, the different dimensions are not treated in the same way. This can be seen as an extraction of characteristics according to a particular criterion. Finally, an algorithm based on the previous approach, that faces the problem of the nearest neighbor, is proposed. However, this method makes a selection of the initial features that meet a certain criterion, so it does not take into account all the input features. Therefore, it could discard important information in the process. – A method called DNet-kNN is presented in [62]. It consists in a non-linear feature mapping based on Deep Neural Network, aiming to improve classification by kNN. DNet-kNN relies on Restricted Boltzmann Machines (RBM) to perform the mapping of characteristics. RBMs are another type of DL network. The work offers a solution to the problem of high-dimensional data when using kNN by combining this traditional classifier with DL-based techniques. The conducted experimentation proves that DNet-kNN improves the results of the classical kNN. DNet-kNN requires a pre-training of the RBM, which is an additional phase. In addition, experimentation is performed on datasets of digits and letters, not on actual images. The aforementioned proposals represent a list of approaches that are closely related to the problem dealt with in this article. However, there are many other proposals that face the problem of dimensionality reduction from other perspectives [68, 7, 16, 36, 92]. In conclusion, different proposals have arisen to analyze and try to address the problems of IBL algorithms when they have to deal with high-dimensional data. These methods are affected by the curse of dimensionality, which raises the need to bring new approaches. Among the previous proposals, there is no one that presents an hybrid method based on IBL that incorporates the reduction of dimensionality intrinsically. In addition, none of the proposals obtains improvements both in predictive performance as well as in execution time. The present work is aimed to fulfill these aspects. AEkNN: An AutoEncoder kNN-based classifier ... 11 4 AEkNN: An AutoEncoder kNN-based classifier with built-in dimensionality reduction Once the main foundations behind our proposed algorithm have been described, this section proceeds to present AEkNN. It is an instance-based algorithm with a built-in dimensionality reduction method, performed with DL techniques, in particular by means of AEs. 4.1 AEkNN Foundations As mentioned, high dimensionality is an obstacle for most classification algorithms. This problem is more noticeable while working with distance-based methods, since as the number of variables increases these distances are less significant [44, 48]. In such situation an IBL method could loss effectiveness, since the distances between individuals are equated. As a consequence of this problem, different methods able to reduce its effects have been proposed. Some of them have been previously enumerated in Section 3.2. AEkNN is a new approach in the same direction, introducing the use of AEs to address the problem of high dimensionality. The structure and performance of this type of neural networks makes it suitable for this task. As explained above, AEs are trained to reproduce the input into the output, through a series of hidden layers. Usually, the central layer in AEs has less units than the input and output layers. Thereby, this bottleneck forces the network to learn a more compact and higherlevel representation of the information. The coding produced by this central layer can be extracted and used as the new set of features in the classification stage. In this sense, there are different studies demonstrating that better results are obtained with AEs than with traditional methods, such PCA or multidimensional scaling [41, 79]. Also, there are studies analyzing the use of AEs from different perspectives, either focusing on the training of the network and its parameters [84] or on the relationship between the data when building the model [67]. AEkNN is an instance-based algorithm designed to address classification with a high number of variables. It starts working with an N -dimensional space X that is projected into an M -dimensional space Z, being M < N. This way M new features, presumably of higher level than the initial ones, are obtained. Once the new representation of the input data is generated, it is possible to get more representative distances. To estimate the output, the algorithm uses the distances between each test example and the training ones but based on the M higher-level features. Thus, the drawbacks of high-dimensional data in distances computation can be significantly reduced. As can be seen, AEkNN is a non-lazy instance-based algorithm. It starts by generating the model in charge of producing the new features, unlike the lazy methods that do not have a learning stage or model. AEkNN allows to enhance the predictive performance, as well as obtaining improvements in execution time, when working with data having a large number of features. 12 F. J. Pulgar et al. 4.2 Method description AEkNN consists of two fundamental phases. Firstly, the learning stage is carried out using the training data to generate the AE model that allows to produce a new encoding of the data. Secondly, the classification step is performed. It uses the model generated in the first phase to obtain the new representation of the test data and, later, the class for each instance is estimated based on nearest neighbors. Algorithm 2 shows the pseudo-code of AEkNN, that is thoroughly discussed below, while Fig. 3 shows the algorithm process in a general way. Fig. 3: Method description. The inputs to the algorithm are TrainData and TestData, the train and test data to be processed, k, the number of neighbors, and PPL, the percentage of elements per layer (PPL). This latter parameter sets the structure of the AE, i.e. the number of layers and elements per layer. It is a vector made of as many items as hidden layers are desired in the AE, indicating each one the percentage of units in that layer with respect to the number of input features. In section 5, different configurations are analyzed to find the one that offers the best results. The algorithm is divided into two parts. The first part of the code (lines 29) corresponds to the training phase of AEkNN. The second part (lines 11-12) refers to the classification phase. During training AEkNN focuses on learning a new representation of the data. This is done through an AE, using the training data to learn the weights linking the AE’s units. This is a process that has to be repeated for each layer in the AE, stated by the number of elements in the PPL parameter. This loop performs several tasks: – In line 5 the function getSizeLayer is used to obtain the number of units in the layer. This value will depend on the number of characteristics of the training set (T rainData) and the percentage applied to the corresponding layer, which is established by the PPL parameter. – The function getAELayer (called in line 6 and defined in line 14) retrieves a layer of the AE model. The layer allows to obtain a new representation of the data given as first parameter (modelData). The number of units in the AE layer generated in this iteration will be given by the second parameter (sizeLayer). Firstly, the AE is initialized with the corresponding structure (line 15). The AEkNN: An AutoEncoder kNN-based classifier ... 13 Algorithm 2 AEkNN algorithm’s pseudo-code. 1: 2: 3: 4: 5: 6: 7: 8: 9: 10: 11: 12: 13: 14: 15: 16: 17: 18: 19: 20: 21: 22: 23: 24: 25: 26: 27: 28: 29: 30: 31: 32: 33: 34: 35: Inputs: T rainData . Train Data T estData . Test Data PPL . Percentage per layer k . Number of nearest neighbors . Training phase: modelData ← TrainData aeModel ← () for each layer in PPL do sizeLayer ← getSizeLayer(modelData, layer) aeLayer ← getAELayer(modelData, sizeLayer) modelData ← applyAELayer(aeLayer, modelData) aeModel ← addAEModel(aeM odel, aeLayer) end for . Classification phase: result ← classification(T rainData, T estData, k, aeM odel) return result function getAELayer(modelData, sizeLayer ) aeLayer ← initializeAEModel(modelData, sizeLayer) for each instance in modelData do outPut ← feedForwardAEModel(aeLayer, instance) error ← calculateDeviation(instance, outP ut) aeLayer ← updateWeightsAEModel(aeLayer, error) end for return aeLayer end function function classification(TrainData, TestDAta,k,aeModel) error ← 0 for each instace in T estData do newCod ← feedForwardAEModelVector(aeM odel, instance) outPut ← distanceBasedClassification(newCod, k, T rainData) if outP ut != realOutP ut(instance) then error ← error + 1 end if end for result ← error / size(T estData) return result end function number of units in the hidden layer is given by the variable computed in the previous step, and the weights are randomly initialized. Secondly, for each train instance the following steps take place: 1. The AE is used to obtain the output for the given instance (line 17). 2. The deviation of the given output with respect to the actual one is calculated (line 18). 3. The weights of the network are updated according to the obtained error (line 19). Finally, the generated AE layer is returned (line 21). – The function applyAELayer (line 7) allows to obtain a new representation of the data given as second parameter (modelData). To do this, the AE layer previously generated, represented by the first parameter (aeLayer), is used. 14 F. J. Pulgar et al. – The last step consists in adding the AE layer generated in the current iteration to the complete AE model (line 8). During classification (lines 11-12) the function classification is used (lines 2435). The class for the test instances given as the first parameter (T estData) is predicted. The process performed internally in this function is to transform each test instance using the AE model generated in the training phase (aeM odel), producing a new instance, more compact and representative. (line 27). This new set of features is used to predict a class with a classifier based on distances, using for each new example its k nearest neighbors (line 28). Finally, this function returns the error rate (result) for the total set of test instances (line 33). As can be seen, classification is conducted in a lower-dimensional space, mitigating the problems associated with a high number of variables. At this point, it should be clarified that the update of weights (lines 16-20) is done using mini-batch gradient descent [38]. This is a variation of the gradient descent algorithm that splits the training dataset into small batches that are used to calculate the model error and update the model coefficients. The reason for using this technique its better performance when dealing with large dataset. From the previous description is can be inferred how AEkNN accomplish the objective of addressing classification with high-dimensional data. On the one hand, aiming to reduce the effects of working with a large number of variables, AEs have been used to transform such data into a lower-dimensional space. On the other hand, the classification phase is founded on the advantages of IBL. In Section 5, the performance of AEkNN is analyzed. 5 Experimental study In order to demonstrate the improvements provided by AEkNN, the algorithm proposed in the present work, an experimental study was conducted. It has been structured into three steps, all of them using the same set of datasets: – The objective of the first phase is to determine how the PPL parameter in AEkNN influences the obtained results. For this purpose, classification results for all considered configurations are compared in subsection 5.2. At the end, the value of the PPL parameter that offers the best results is selected. – The second phase aims to verify whether AEkNN with the selected configuration improves the results provided by the classic kNN algorithm. In subsection 5.3, the results of both algorithms are compared. – The third phase of the experimentation aims to assess the competitiveness of AEkNN against traditional dimensionality reduction algorithms, in particular, principal component analysis (PCA) and linear discriminant analysis (LDA). In subsection 5.4, the results of the three algorithms are compared. Subsection 5.1 describes the experimental framework, moreover the following subsections present the results and their analysis. 5.1 Experimental framework The conducted experimentation aims to show the benefits of AEkNN over a set of datasets with different characteristics. Their traits are shown in Table 1. The AEkNN: An AutoEncoder kNN-based classifier ... 15 datasets’ origin is shown in the column named Ref. For all executions, datasets are given as input to the algorithms applying a 2×5 folds cross validation scheme. Table 1: Characteristics of the datasets used in the experimentation. Dataset Samples Number of Features Classes image drive coil2000 dota nomao batch musk semeion madelon hapt isolet mnist microv1 microv2 2310 58509 9822 102944 1970 13910 6598 1593 2000 10929 7797 70000 360 571 19 48 85 116 118 128 168 256 500 561 617 784 1300 1300 7 11 2 2 2 6 2 10 2 12 26 10 10 20 Type Ref Real Real Integer Real Real Real Integer Integer Real Real Real Integer Real Real [6] [6] [80] [6] [6] [82] [6] [6] [35] [66] [22] [51] [6] [6] In both phases of experimentation, the value of k for the classifier kNN and for AEkNN will be 5, since it is the recommended value in the related literature. In addition, to compare classification results was necessary to compute several evaluation measures. In this experimentation, Accuracy (5), F-Score (6) and area under the ROC curve (AUC) (9) were used. Accuracy (5) is the proportion of true results among the total number of cases examined. TP + TN Accuracy = (5) TP + TN + FP + FN Where TP stands for true positives, instances correctly identified. FP is the false positives, instances incorrectly identified. TN represents the true negatives, instances correctly rejected. FN corresponds to false negatives, instances incorrectly rejected. F-Score is the harmonic mean of Precision (7) and Recall (8), considering Precision as the proportions of positive results that are true positive results and Recall as the proportion of positives that are correctly identified as such. These measures are defined by the Eqs. (6), (7), (8): F-Score = 2 ∗ P recision ∗ Recall P recision + Recall Precision = Recall = TP TP + FP TP TP + FN (6) (7) (8) Finally, AUC is the probability that a classifier will rank a randomly chosen positive instance higher than a randomly chosen negative one. AUC is given by the Eq. (9): 16 F. J. Pulgar et al. Z −∞ TPR(T )FPR(T )dT AUC = (9) ∞ Where TPR stands for the true positive rate and FPR is false positive rate. The significance of results obtained in this experimentation is verified by appropriate statistical tests. Two different tests are used in the present study: – In the first part, the Friedman test [31] is used to rank the different AEkNN configurations and to establish if any statistical differences exist between them. – In the second part, the Wilcoxon [72] non-parametric sign rank test is used. The objective is to verify if there are significant differences between the results obtained by AEkNN and kNN. These experiments were run in a cluster made up of 8 computers, having 2 CPUs (2.33 GHz) and 7 GB RAM each of them. The AEkNN algorithm and the experimentation was coded in R language [64], relying on the H2O package [2] for some DL-related functions. 5.2 PPL Parameter Analysis AEkNN has a parameter, named PPL, that establishes the configuration of the model. This parameter allows selecting different architectures, both in number of layers (depth) and number of neurons per layer. The datasets used (see Table 1) have disparate number of input features, so the architectures will be defined according to this trait. Table 2 shows the considered configurations. For each model the number of hidden layers, as well as the number of neurons in each layer, is shown. The latter is indicated as a percentage of the number of initial characteristics. Finally, the notation of the associated PPL parameter is provided. Table 2: Configurations used in the experimentation and PPL parameter. # hidden layers AEkNN AEkNN AEkNN AEkNN AEkNN AEkNN 1 2 3 4 5 6 1 1 1 3 3 3 Number of neurons (%) Layer 1 Layer 2 Layer 3 25 50 75 150 150 150 25 50 75 150 150 150 PPL parameter (25) (50) (75) (150, 25, 150) (150, 50, 150) (150, 75, 150) The results produced by the different configurations considered are presented grouped by metric. Table 3 shows the results for Accuracy, Table 4 for F-Score and Table 5 for AUC. These results are also graphically represented. Aiming to optimize the visualization, two plots with different scales have been produced for each metric. Fig. 4 represents the results for Accuracy, Fig. 5 for F-Score and Fig. 6 for AUC. AEkNN: An AutoEncoder kNN-based classifier ... 17 Table 3: Accuracy classification results for test data. Dataset (0.25) (0.5) (0.75) (1.5, 0.25, 1.5) (1.5, 0.5, 1.5) (1.5, 0.75, 1.5) image drive coil2000 dota nomao batch musk semeion madelon hapt isolet mnist microv1 microv2 0.930 0.779 0.929 0.509 0.904 0.995 0.974 0.904 0.532 0.936 0.889 0.963 0.857 0.625 0.945 0.791 0.900 0.516 0.894 0.995 0.979 0.905 0.540 0.946 0.885 0.960 0.863 0.638 0.952 0.862 0.898 0.517 0.890 0.995 0.983 0.909 0.547 0.950 0.882 0.959 0.857 0.629 0.925 0.763 0.928 0.510 0.902 0.996 0.982 0.898 0.520 0.943 0.873 0.950 0.849 0.644 0.938 0.746 0.897 0.515 0.896 0.996 0.980 0.905 0.510 0.947 0.876 0.954 0.856 0.639 0.956 0.677 0.897 0.516 0.894 0.996 0.991 0.896 0.523 0.948 0.876 0.944 0.857 0.629 1.00 0.8 0.7 Accuracy Accuracy 0.95 0.90 0.6 0.85 0.5 batch coil2000 HAPT Image isolet MicroV1 MNIST musk nomao semeion dota drive madelon MicroV2 Dataset AE configuration 0.25 0.75 1.5_0.5_1.5 0.5 1.5_0.25_1.5 1.5_0.75_1.5 Fig. 4: Accuracy classification results for test data. The results presented in Table 3 and in Fig. 4 show the Accuracy obtained for AEkNN with different PPL values. These results indicate that there is no configuration that works best for all datasets. The configurations with three hidden layers obtain the best results in 4 out of 14 datasets, whereas the configurations with one hidden layer win in 10 out of 14 datasets. This trend can also be seen in the graphs. Table 4 and Fig. 5 show the F-Score obtained by AEkNN with different PPL values. The values indicate that the configurations with one single hidden layer get better results in 11 out of 14 datasets. The configuration with PPL = (0.25) and with PPL = (0.75) are the ones winning more times (5). The version with PPL = (0.25) shows disparate results, the best values for some cases and bad results for other cases, for example with hapt, image or microv2. Although the version with PPL = (0.75) wins the same number of times, its results are more balanced. In Table 5 the results for AUC obtained with AEkNN can be seen. Fig. 6 represents those results. For this metric, it can be appreciated that single hidden layer structures work better, obtaining top results in 12 out of 14 datasets. However, a configuration that works best for all cases has not been found. 18 F. J. Pulgar et al. Table 4: F-Score classification results for test data. Dataset (0.25) (0.5) (0.75) (1.5, 0.25, 1.5) (1.5, 0.5, 1.5) (1.5, 0.75, 1.5) image drive coil2000 dota nomao batch musk semeion madelon hapt isolet mnist microv1 microv2 0.930 0.782 0.963 0.481 0.905 0.995 0.984 0.905 0.549 0.818 0.890 0.963 0.868 0.619 0.945 0.796 0.947 0.487 0.897 0.995 0.988 0.906 0.542 0.829 0.887 0.960 0.872 0.636 0.952 0.863 0.946 0.486 0.893 0.995 0.990 0.910 0.567 0.842 0.883 0.959 0.867 0.625 0.925 0.772 0.962 0.481 0.904 0.995 0.989 0.899 0.531 0.833 0.875 0.950 0.861 0.641 0.938 0.746 0.946 0.488 0.898 0.995 0.988 0.905 0.501 0.839 0.878 0.954 0.867 0.643 0.956 0.683 0.945 0.485 0.897 0.995 0.995 0.896 0.529 0.837 0.878 0.944 0.868 0.628 1.00 0.8 0.7 0.90 F−Score F−Score 0.95 0.6 0.85 0.5 batch coil2000 HAPT Image isolet MicroV1 MNIST musk nomao semeion dota drive Dataset AE configuration madelon MicroV2 Dataset 0.25 0.75 1.5_0.5_1.5 0.5 1.5_0.25_1.5 1.5_0.75_1.5 Fig. 5: F-Score classification results for test data. Table 5: AUC classification results for test data. Dataset (0.25) (0.5) (0.75) (1.5, 0.25, 1.5) (1.5, 0.5, 1.5) (1.5, 0.75, 1.5) image drive coil2000 dota nomao batch musk semeion madelon hapt isolet mnist microv1 microv2 0.932 0.881 0.526 0.508 0.903 0.997 0.950 0.927 0.532 0.888 0.948 0.974 0.928 0.891 0.943 0.889 0.543 0.514 0.894 0.997 0.958 0.927 0.540 0.898 0.946 0.972 0.934 0.897 0.951 0.922 0.541 0.515 0.890 0.997 0.966 0.928 0.547 0.917 0.942 0.975 0.931 0.887 0.923 0.875 0.526 0.508 0.901 0.997 0.967 0.923 0.520 0.900 0.938 0.965 0.932 0.897 0.936 0.850 0.538 0.514 0.895 0.997 0.962 0.923 0.513 0.916 0.941 0.968 0.927 0.890 0.956 0.826 0.539 0.514 0.893 0.997 0.983 0.922 0.523 0.915 0.940 0.958 0.927 0.885 Summarizing, the results presented before show the metrics obtained for AEkNN with different PPL values. These results show some variability. Which PPL value is AEkNN: An AutoEncoder kNN-based classifier ... 19 1.000 0.9 0.975 0.7 AUC AUC 0.8 0.950 0.925 0.6 0.900 0.5 batch HAPT Image isolet MicroV1 MicroV2 MNIST musk nomao semeion coil2000 dota Dataset drive madelon Dataset AE configuration 0.25 0.75 1.5_0.5_1.5 0.5 1.5_0.25_1.5 1.5_0.75_1.5 Fig. 6: AUC classification results for test data. the overall best cannot be determined, since for each dataset there is a setting that works best. However, some initial trends can be drawn. Single-layer configurations get more better results than configurations with three hidden layers. Also, the configurations with PPL = (0.75) and PPL = (0.5) offer close to the best value in most cases, while the other configurations sometimes are far from the best value. Once the results have been obtained, it is necessary to determine if there are statistically significant differences for each one of them in order to select the best configuration. To do this, the Friedman test [31] will be applied. Average ranks obtained by applying the Friedman test for Accuracy, F-Score and AUC measures are shown in Table 6. In addition, Table 7 shows the different p-values obtained by the Friedman test. Table 6: Average rankings of the different PPL values by measure Accuracy PPL Ranking (0.75) (0.5) (0.25) (1.5, 0.75, 1.5) (1.5, 0.5, 1.5) (1.5, 0.25, 1.5) 2.679 2.857 3.714 3.821 3.892 4.036 F-Score PPL Ranking (0.5) (0.75) (0.25) (1.5, 0.5, 1.5) (1.5, 0.25, 1.5) (1.5, 0.75, 1.5) 2.923 3.000 3.429 3.500 4.071 4.071 AUC PPL Ranking (0.75) (0.5) (1.5, 0.25, 1.5) (0.25) (1.5, 0.5, 1.5) (1.5, 0.75, 1.5) 2.357 2.786 3.786 3.857 4.000 4.214 Table 7: Results of Friedman’s test (p-values ) Accuracy F-Score AUC 0.236 0.423 0.049 As can be observed in Table 7, for AUC (wich is considerer a stronger performance metric) there are statistically significant differences between the considered 20 F. J. Pulgar et al. PPL values if we set the p-value threshold to the usual range [0.05, 0.1]. How- ever, for Accuracy and F-Score there are no statistically significant differences. In addition, in the rankings obtained, it can be seen that there are two specific configurations that offer better results than the remaining ones. In the three rankings presented, the results with PPL = (0.75) and PPL = (0.5) appear first, clearly highlighted with respect to the other values. Therefore, it is considered that these two configurations are the best ones. Thus, the results of AEkNN with both configurations will be compared against the kNN algorithm. 5.3 AEkNN vs kNN This second part is focused on determining if the results obtained with the proposed algorithm, AEkNN, improve those obtained with the kNN algorithm. To do so, a comparison will be made between the results obtained with AEkNN, using the values of the PPL parameter selected in the previous section, and the results obtained with kNN algorithm on the same datasets. First, Table 8 shows the results for each one of the datasets and considered measures, including running time. The results for both algorithms are presented jointly, and the best ones are highlighted in bold. Two plots have been generated for each metric aiming to optimize data visualization, as in the previous phase, since the range of results was very broad. Fig. 7 represents the results for Accuracy, Fig. 8 for F-Score, Fig. 9 for AUC, and Fig. 10 for runtime. Table 8: Classification results of AEkNN (with different PPL) and kNN algorithm for test data Dataset image drive coil2000 dota nomao batch musk semeion madelon hapt isolet mnist microv1 microv2 Accuracy kNN AEkNN (0.75) (0.5) 0.937 0.691 0.897 0.507 0.891 0.995 0.956 0.908 0.531 0.951 0.872 0.947 0.800 0.607 0.952 0.862 0.898 0.517 0.890 0.995 0.983 0.909 0.547 0.950 0.882 0.959 0.857 0.629 0.945 0.791 0.900 0.516 0.894 0.995 0.979 0.905 0.540 0.946 0.885 0.960 0.863 0.638 kNN 0.937 0.615 0.945 0.479 0.892 0.995 0.974 0.910 0.549 0.842 0.874 0.946 0.806 0.603 F-Score AEkNN (0.75) (0.5) 0.952 0.863 0.946 0.486 0.893 0.995 0.990 0.910 0.567 0.842 0.883 0.959 0.867 0.625 0.945 0.796 0.947 0.487 0.897 0.995 0.988 0.906 0.542 0.829 0.887 0.960 0.872 0.636 kNN 0.934 0.700 0.547 0.416 0.891 0.996 0.934 0.927 0.532 0.903 0.943 0.965 0.890 0.873 AUC AEkNN (0.75) (0.5) 0.951 0.922 0.541 0.515 0.890 0.997 0.966 0.928 0.547 0.917 0.942 0.975 0.931 0.887 Time (seconds) kNN AEkNN (0.75) (0.5) 0.943 0.074 0.073 0.052 0.889 139.623 36.977 20.479 0.543 3.753 3.262 1.886 0.514 772.219 578.437 370.599 0.894 0.582 0.252 0.200 0.997 7.433 4.829 2.459 0.958 5.317 3.613 2.144 0.927 0.865 0.601 0.381 0.540 3.267 3.150 2.109 0.898 41.673 30.625 16.365 0.946 27.563 24.748 19.538 0.972 1720.547 1213.168 904.223 0.934 1.776 0.977 0.709 0.897 1.542 1.425 0.933 The results shown in Table 8 indicate that AEkNN works better than kNN for most datasets considering Accuracy. On the one hand, the version of AEkNN with PPL = (0.75) improves kNN in 11 out of 14 cases, obtaining the best overall results in 6 of them. On the other hand, the version of AEkNN with PPL = (0.5) obtains better results than kNN in 11 out of 14 cases, being the best configuration in 6 of AEkNN: An AutoEncoder kNN-based classifier ... 21 1.00 0.8 0.7 0.90 Accuracy Accuracy 0.95 0.6 0.85 0.80 0.5 batch coil2000 HAPT Image isolet MicroV1 MNIST musk nomao semeion dota drive madelon MicroV2 Dataset AE configuration kNN AEkNN PPL=0.75 AEkNN PPL=0.5 Fig. 7: Accuracy results for test data. them. In addition, kNN only obtains one best result. Fig. 7 confirms this trend. It can be observed that the right bars, where AEkNN results are represented, are higher in most datasets. 1.00 0.8 0.7 0.90 F−Score F−Score 0.95 0.6 0.85 0.5 0.80 batch coil2000 HAPT Image isolet MicroV1 MNIST musk nomao semeion dota drive madelon MicroV2 Dataset AE configuration kNN AEkNN PPL=0.75 AEkNN PPL=0.5 Fig. 8: F-Score results for test data. Analyzing the data corresponding to the metric F-Score, presented in Table 8, it can be observed that AEkNN produces an overall improvement over kNN. The AEkNN version with PPL = (0.75) improves kNN in 11 out of 14 cases, obtaining the best overall results in 5 of them. The version of AEkNN with PPL = (0.5) obtains better results than kNN in 10 out of 14 cases, being the best configuration in 7 of them. kNN does not obtain any best result. How the results of the versions corresponding to AEkNN produce higher values than those corresponding to kNN can be seen in Fig. 8. The data related to AUC, presented in Table 8, also show that AEkNN works better than kNN. In this case, the two versions of AEkNN improve kNN in 11 out of 14 cases each one, obtaining the best results in 13 out of 14 cases. Fig. 9 shows that the trend is increasing towards the versions of the new algorithm. kNN only gets a best result, specifically with the coil2000 dataset, maybe due to the low 22 F. J. Pulgar et al. 1.00 0.9 0.8 0.95 AUC AUC 0.7 0.6 0.90 0.5 0.4 batch HAPT Image isolet MicroV1 MicroV2 MNIST musk nomao semeion coil2000 dota drive madelon Dataset AE configuration kNN AEkNN PPL=0.75 AEkNN PPL=0.5 Fig. 9: AUC results for test data. number of features in this dataset. Nonetheless, AEkNN gets better than kNN in the rest of metrics for coil2000 dataset. 1500 1000 4 Time Time 6 500 2 0 0 batch coil2000 Image madelon MicroV1 MicroV2 musk nomao semeion dota drive HAPT isolet MNIST Dataset AE configuration kNN AEkNN PPL=0.75 AEkNN PPL=0.5 Fig. 10: Time results for test data. The running times for both algorithms are presented in Table 8 and Fig. 10. As can be seen, the configuration that takes less time to classify is the one corresponding to AEkNN with PPL = (0.5), obtaining the lowest value for all datasets. This is due to the higher compression of the data achieved by this configuration. In the same way, AEkNN with PPL = (0.75) obtains better results than the algorithm kNN in all cases. Summarizing, it can be observed that the results obtained through AEkNN improve those obtained with the original kNN algorithm for most of the datasets. AEkNN, despite the transformation of the input space to reduce dimensionality, the quality of the results in terms of classification performance are better than those of kNN in most cases. In addition, in terms of classification time, it can be noted how AEkNN with higher compression of information significantly reduces the time spent on classification, without having a negative impact on the other measures. AEkNN: An AutoEncoder kNN-based classifier ... 23 To determine if there are statistically significant differences between the obtained results, the proper statistical test has been conducted. For this purpose, the Wilcoxon test will be performed, comparing each version of AEkNN against the results of the classical kNN algorithm. In Table 9, the results obtained for Wilcoxon tests are shown. Table 9: Result of Wilcoxon’s test (p-values ) comparing kNN vs AEkNN AEkNN with PPL=(0.75) AEkNN with PPL=(0.5) Accuracy 0.0017 0.0023 F-Score 0.0003 0.0245 AUC 0.0085 0.0107 Time 0.0002 0.0001 As can be seen the p-values are rather low, so that statistical significant differences between the two AEkNN versions and the original kNN algorithm in all considered measures exist can be concluded, considering the p-value threshold within the usual [0.05, 0.1] range. On the one hand, taking into account Accuracy, F-Score and AUC, the configuration with best results is that performing a 75% of feature reduction. Therefore, it is the optimal solution from the point of view of predictive performance. The reason for this might be that there is less compression of the data, therefore, there is less loss of information compared to the other considered configuration (50%). On the other hand, considering running time, the configuration with best results is that performing a 50% of feature reduction. It is not surprising that having less features allows to compute distances in less time. 5.4 AEkNN vs PCA / LDA The objective of this third part is to assess the competitiveness of AEkNN against traditional dimensionality reduction algorithms. In particular, the algorithms used will be PCA [63, 43] and LDA [32, 92], since they are traditional algorithms that offer good results in this task [61]. To do so, a comparison will be made between the results obtained with AEkNN, using the values of the PPL parameter selected in section 5.3, and the results obtained with PCA and LDA algorithm on the same datasets. It is important to note that the number of features selected with these methods will be the same as with the AEkNN algorithm, so there are two executions for each algorithm. First, Table 10 shows the results for each one of the datasets and considered measures. The results for the three algorithms are presented jointly, and the best ones are highlighted in bold. One plot have been generated for each metric aiming to optimize data visualization. In this case, the graphs represent the best value of the two configurations for each algorithm in order to better visualize the differences between the three methods. Fig. 11 represents the results for Accuracy, Fig. 12 for F-Score and Fig. 13 for AUC. The results shown in Table 10 indicate that AEkNN works better than PCA and LDA for most datasets considering Accuracy. On the one hand, the version of AEkNN with PPL = (0.75) improves PCA in in 12 out of 14 cases and LDA in 9 out of 14 cases, obtaining the best overall results in 7 of them. On the other hand, the version of AEkNN with PPL = (0.5) obtains better results than PCA 24 F. J. Pulgar et al. 1.00 Accuracy 0.75 0.50 0.25 batch coil2000 dota drive HAPT Image isolet madelon MicroV1 MicroV2 MNIST2 musk nomao semeion Dataset Algorithm AEkNN PCA LDA Fig. 11: Accuracy results for test data. in 13 out of 14 cases and LDA in 8 out of 14 cases, being the best configuration in 4 of them. In addition, LDA only obtains the best result in 4 cases. Fig. 11 confirms this trend. It can be observed that the bars, where AEkNN results are represented, are higher in most datasets. Analyzing the data corresponding to the metric F-Score, presented in Table 10, it can be observed that AEkNN produces an overall improvement over PCA and LDA. The AEkNN version with PPL = (0.75) improves PCA in 12 out of 14 cases and LDA in 10 out of 14 cases, obtaining the best overall results in 6 of them. The version of AEkNN with PPL = (0.5) obtains better results than PCA in all cases and LDA in 8 out of 14 cases, being the best configuration in 4 of them. PCA does not obtain any best result and LDA obtains the best result in 4 cases. How the results of the versions corresponding to AEkNN show values higher than those corresponding to kNN can be seen in Fig. 12. 1.00 F−Score 0.75 0.50 0.25 batch coil2000 dota drive HAPT Image isolet madelon MicroV1 MicroV2 MNIST2 musk nomao semeion Dataset Algorithm AEkNN PCA LDA Fig. 12: F-Score results for test data. The data related to AUC, presented in Table 10, also show that AEkNN works better than PCA and LDA. The AEkNN version with PPL = (0.75) improves PCA in 13 out of 14 cases and LDA in 10 out of 14 cases, obtaining the best overall results in 7 of them. The version of AEkNN with PPL = (0.5) obtains better results than PCA in 13 out of 14 cases and LDA in 8 out of 14 cases, being the best configuration in 4 of them. LDA only gets the best result in 4 cases. Fig. 13 confirms this trend. 0.862 0.092 0.899 0.517 0.869 0.206 0.931 0.706 0.511 0.443 0.590 0.640 0.135 0.082 0.676 0.091 0.895 0.519 0.818 0.189 0.982 0.907 0.501 0.959 0.886 0.949 0.818 0.649 0.866 0.091 0.895 0.520 0.889 0.152 0.982 0.890 0.512 0.960 0.902 0.943 0.861 0.690 0.952 0.863 0.946 0.486 0.893 0.995 0.990 0.910 0.567 0.842 0.883 0.959 0.867 0.625 0.945 0.796 0.947 0.487 0.897 0.995 0.988 0.906 0.542 0.829 0.887 0.960 0.872 0.636 0.580 0.023 0.861 0.486 0.821 0.176 0.962 0.624 0.519 0.180 0.504 0.704 0.116 0.005 0.867 0.030 0.946 0.486 0.871 0.190 0.945 0.718 0.503 0.478 0.638 0.704 0.116 0.037 0.672 0.866 0.951 0.943 0.015 0.015 0.922 0.889 0.944 0.944 0.541 0.543 0.489 0.493 0.515 0.514 0.851 0.891 0.890 0.894 0.053 0.044 0.997 0.997 0.989 0.989 0.966 0.958 0.906 0.893 0.928 0.927 0.503 0.491 0.547 0.540 0.841 0.841 0.917 0.898 0.888 0.903 0.942 0.946 0.949 0.943 0.975 0.972 0.823 0.871 0.931 0.934 0.644 0.695 0.887 0.897 0.734 0.500 0.523 0.513 0.797 0.502 0.912 0.732 0.523 0.553 0.660 0.828 0.532 0.500 0.893 0.491 0.532 0.515 0.869 0.510 0.930 0.792 0.510 0.690 0.748 0.798 0.532 0.537 0.780 0.500 0.545 0.517 0.817 0.500 0.965 0.926 0.505 0.903 0.951 0.966 0.898 0.891 0.862 0.500 0.549 0.519 0.889 0.500 0.965 0.913 0.505 0.899 0.957 0.954 0.929 0.916 image drive coil2000 dota nomao batch musk semeion madelon hapt isolet mnist microv1 microv2 0.563 0.091 0.825 0.514 0.798 0.195 0.942 0.598 0.506 0.179 0.424 0.740 0.135 0.058 0.952 0.862 0.898 0.517 0.890 0.995 0.983 0.909 0.547 0.950 0.882 0.959 0.857 0.629 Dataset 0.945 0.791 0.900 0.516 0.894 0.995 0.979 0.905 0.540 0.946 0.885 0.960 0.863 0.638 Accuracy F-Score AUC AEkNN PCA LDA AEkNN PCA LDA AEkNN PCA LDA (0.75) (0.5) (0.75) (0.5) (0.75) (0.5) (0.75) (0.5) (0.75) (0.5) (0.75) (0.5) (0.75) (0.5) (0.75) (0.5) (0.75) (0.5) Table 10: Accuracy, F-Score and AUC classification results of AEkNN (with different PPL), LDA and PCA for test data AEkNN: An AutoEncoder kNN-based classifier ... 25 26 F. J. Pulgar et al. 1.0 AUC 0.9 0.8 0.7 0.6 0.5 batch coil2000 dota drive HAPT Image isolet madelon MicroV1 MicroV2 MNIST2 musk nomao semeion Dataset Algorithm AEkNN PCA LDA Fig. 13: AUC results for test data. Summarizing, it can be observed that the results obtained through AEkNN improve those obtained with the PCA and LDA algorithms for most of the datasets. The quality of the results with AEkNN in terms of classification performance are better than those of PCA and LDA in most cases. This means that the high-level features obtained by the AEkNN algorithm provide more relevant information than those obtained by the PCA and LDA algorithms. Therefore, the results obtained by classifying with the AEkNN algorithm improve those obtained with PCA and LDA. Previously, the data obtained in the experimentation have been presented and a comparison between them is made. However, it is necessary to verify if there are significant differences between the data corresponding to the different algorithms. To do this, the Friedman test [31] will be applied. Average ranks obtained by applying the Friedman test for Accuracy, F-Score and AUC measures are shown in Table 11. In addition, Table 12 shows the different p-values obtained by the Friedman test. Table 11: Average rankings of the different PPL values by measure Accuracy Algorithm Ranking AEkNN PPL=0.75 AEkNN PPL=0.5 LDA PPL=0.5 LDA PPL=0.75 PCA PPL=0.5 PCA PPL=0.75 2.286 2.357 3.000 3.571 4.321 5.464 F-Score Algorithm Ranking AEkNN PPL=0.75 AEkNN PPL=0.5 LDA PPL=0.75 LDA PPL=0.5 PCA PPL=0.5 PCA PPL=0.75 2.143 2.214 3.429 3.429 4.429 5.357 AUC Algorithm AEkNN PPL=0.75 AEkNN PPL=0.5 LDA PPL=0.5 LDA PPL=0.75 PCA PPL=0.5 PCA PPL=0.75 Table 12: Results of Friedman’s test (p-values ) Accuracy F-Score AUC 1.266e-05 7.832e-06 7.913e-07 Ranking 1.929 2.500 2.929 3.500 4.679 5.464 AEkNN: An AutoEncoder kNN-based classifier ... 27 As can be observed in Table 12, for Accuracy, F-Score and AUC there are statistically significant differences between the different PPL values if we set the p-value threshold to the usual range [0.05, 0.1]. It can be seen that AEkNN with PPL = (0.75) offer better results than the remaining ones. In the three rankings presented, the AEkNN configurations with PPL = (0.75) and PPL = (0.5) appear first, clearly highlighted with respect to the other values. Therefore, it is considered that AEkNN obtains better predictive performance, since the reduction of dimensionality generates more significant features. 5.5 General Guidelines on the use of AEkNN AEkNN could be considered as a robust algorithm on the basis of the previous analysis. The experimental work demonstrates that it has good performance with the two PPL considered values. From the conducted experimentation some guidelines can also be extracted: – When working with very high-dimensional datasets, it is recommended to use AEkNN with the PPL = (0.5) configuration. In this study, this configuration has obtained the best results for datasets having more than 600 features. The reason is that the input data has a larger number of features and allows a greater reduction without losing relevant information. Therefore, AEkNN can compress more in these cases. – When using binary datasets with a lower dimensionality, the AEkNN algorithm with the PPL = (0.5) configuration continues to be the best choice. In our experience, this configuration has shown to work better for binary datasets with a number of features around 100. In these cases, the compression may be higher since it is easier to discriminate by class. – For all other datasets, the choice of configuration for AEkNN depends on the indicator to be enhanced. On the one hand, if the goal is to achieve the best possible predictive performance, the configuration with PPL = (0.75) must be chosen. In these cases, AEkNN needs to use more original information. On the other hand, when the interest is to optimize the running time, while maintaining improvements in predictive performance with respect to kNN, the configuration with PPL = (0.5) is the best selection. The reason is in the higher compression of the data. AEkNN needs less time to classify lower-dimensional data. Summarizing, the configuration of AEkNN must be adapted to the data traits to obtain optimal results. For this, a series of tips have been established. 6 Concluding remarks In this paper, a new classification algorithm called AEkNN has been proposed. This algorithm is based on kNN but aims to mitigate the problem that arises while working with high-dimensional data. To do so, AEkNN internally incorporates a model-building phase aimed to perform a reduction of the feature space, using AEs for this purpose. The main reason that has led to the design of AEkNN are the good results that have been obtained by AEs when they are used to generate 28 F. J. Pulgar et al. higher-level features. AEkNN relies on an AE to extract a reduced representation of a higher level that replaces the original data. In order to determine if the proposed algorithm offers better results than the kNN algorithm, a experimentation has been carried out. Firstly, the analysis of these results have allowed to determine which AE structure works better. Furthermore, in the second part of the conducted experimentation, the results of the best configurations have been compared with the results produced by kNN. As has been stated, the results of AEkNN improve those obtained by kNN for all the metrics. In addition, AEkNN offers a considerable improvement with respect to the time invested in the classification. In addition, a comparison has been made with other traditional methods applied to this problem, in order to verify that the AEkNN algorithm improves the results when carrying out the dimensionality reduction task. For this, AEkNN has been compared with LDA and PCA. The results show that the proposed AEkNN algorithm improves the performance in classification for most of the dataset used. This occurs because the features generated with the proposed algorithm are more significant and provide more relevant information to the classification using distance-based algorithms. In conclusion, AEkNN is able to reduce the adverse effects of high-dimensional data while performing instance-based classification, improving both running time and classification performance. These results show that the use of AEs can be helpful to solve this kind of obstacle, opening up new possibilities of future work in which they are applied to help solve similar problems presented by other traditional models. Acknowledgment The work of F. Pulgar was supported by the Spanish Ministry of Education under the FPU National Program (Ref. FPU16/00324). This work was partially supported by the Spanish Ministry of Science and Technology under project TIN201568454-R. References 1. Aha DW, Kibler D, Albert MK (1991) Instance-Based Learning Algorithms. Machine Learning 6(1):37–66, DOI 10.1023/A:1022689900470 2. Aiello S, Kraljevic T, Maj P, with contributions from the H2Oai team (2016) h2o: R Interface for H2O. URL https://CRAN.R-project.org/package=h2o, r package version 3.8.1.3 3. Alpaydin E (2014) Introduction to machine learning. MIT press 4. Altman NS (1992) An Introduction to Kernel and Nearest-Neighbor Nonparametric Regression. The American Statistician 46(3):175–185, DOI 10.1080/ 00031305.1992.10475879 5. Atkeson CG, Moorey AW, Schaalz S, Moore AW, Schaal S (1997) Locally Weighted Learning. Artificial Intelligence 11:11–73, DOI 10.1023/A: 1006559212014 AEkNN: An AutoEncoder kNN-based classifier ... 29 6. Bache K, Lichman M (2013) UCI Machine Learning Repository. URL http: //www.ics.uci.edu/$\sim$mlearn/MLRepository.html 7. Belkin M, Niyogi P (2003) Laplacian eigenmaps for dimensionality reduction and data representation. Neural Computation 15(6):1373–1396, DOI 10.1162/ 089976603321780317 8. Bellman R (1957) Dynamic Programming. Princeton University Press 9. Bellman R (1961) Adaptive control processes: A guided tour. Princeton University Press 10. Bengio Y (2009) Learning Deep Architectures for AI. Foundations and Trends in Machine Learning 2(1):1–127, DOI 10.1561/2200000006 11. Bengio Y (2013) Deep Learning of Representations: Looking Forward. In: International Conference on Statistical Language and Speech Processing, pp 1–37, DOI 10.1007/978-3-642-39593-2\ 1 12. Bengio Y, Courville A, Vincent P (2013) Representation Learning: A Review and New Perspectives. Pattern Analysis and Machine Intelligence, IEEE Transactions on 35(8):1798–1828, DOI 10.1109/TPAMI.2013.50 13. Beyer K, Goldstein J, Ramakrishnan R, Shaft U (1999) When Is ”Nearest Neighbor” Meaningful? In: International conference on database theory, pp 217–235, DOI 10.1007/3-540-49257-7\ 15 14. Bhatia V, Rani R (2018) Dfuzzy: a deep learning-based fuzzy clustering model for large graphs. Knowledge and Information Systems DOI 10.1007/ s10115-018-1156-3, URL https://doi.org/10.1007/s10115-018-1156-3 15. Burges CJC (2005) Geometric Methods for Feature Extraction and Dimensional Reduction, Springer US, pp 59–91. DOI 10.1007/0-387-25465-X\ 4 16. Casillas J, Cordón O, Del Jesus MJ, Herrera F (2001) Genetic feature selection in a fuzzy rule-based classification system learning process for highdimensional problems. Information Sciences 136(1):135–157, DOI 10.1016/ S0020-0255(01)00147-5 17. Charte D, Charte F, Garca S, del Jesus MJ, Herrera F (2018) A practical tutorial on autoencoders for nonlinear feature fusion: Taxonomy, models, software and guidelines. Information Fusion 44:78–96, DOI 10.1016/j.inffus.2017.12.007 18. Chung J, Gülçehre C, Cho K, Bengio Y (2015) Gated feedback recurrent neural networks. In: Proceedings of the International Conference on Machine Learning, pp 2067–2075 19. Ciresan D, Giusti A, Gambardella L, Schmidhuber J (2012) Deep Neural Networks Segment Neuronal Membranes in Electron Microscopy Images. In: Advances in neural information processing systems, pp 2843–2851 20. Ciresan D, Meier U, Schmidhuber J (2012) Multi-column deep neural networks for image classification. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp 3642–3649, DOI 10.1109/CVPR. 2012.6248110 21. Coifman RR, Lafon S, Lee AB, Maggioni M, Nadler B, Warner F, Zucker SW (2005) Geometric diffusions as a tool for harmonic analysis and structure definition of data: Diffusion maps. Proceedings of the National Academy of Sciences 102(21):7426–7431, DOI 10.1073/pnas.0500334102 22. Cole R, Fanty M (1990) Spoken letter recognition. In: Proceedings of the workshop on Speech and Natural Language, pp 385–390, DOI 10.3115/116580. 116725 30 F. J. Pulgar et al. 23. Cover T, Hart P (1967) Nearest neighbor pattern classification. IEEE Transactions on Information Theory 13(1):21–27, DOI 10.1109/TIT.1967.1053964 24. Dasarathy BV (1991) Nearest neighbor norms: NN pattern classification techniques. IEEE Computer Society Press 25. Deng L (2014) Deep Learning: Methods and Applications. Foundations and Trends in Signal Processing 7(3-4):197–387, DOI 10.1561/2000000039 26. Deng L, Yu D (2011) Deep convex net: A scalable architecture for speech pattern classification. In: Proceedings of the Annual Conference of the International Speech Communication Association, pp 2285–2288 27. Deng Y, Ren Z, Kong Y, Bao F, Dai Q (2017) A hierarchical fused fuzzy deep neural network for data classification. IEEE Transactions on Fuzzy Systems 25(4):1006–1012, DOI 10.1109/TFUZZ.2016.2574915 28. Deng Z, Zhu X, Cheng D, Zong M, Zhang S (2016) Efficient knn classification algorithm for big data. Neurocomputing 195:143–148, DOI 10.1016/j.neucom. 2015.08.112 29. Duda RO, Hart PE, Stork DG (1973) Pattern Classification. Wiley New York 30. Esteva A, Kuprel B, Novoa RA, Ko J, Swetter SM, Blau HM, Thrun S (2017) Dermatologist-level classification of skin cancer with deep neural networks. Nature 542(7639):115–118, DOI 10.1038/nature21056 31. Friedman M (1937) The use of ranks to avoid the assumption of normality implicit in the analysis of variance. Journal of the American Statistical Association 32(200):675–701, DOI 10.1080/01621459.1937.10503522 32. Fukunaga K (2013) Introduction to statistical pattern recognition. Academic Press 33. Goldberg DE, Holland JH (1988) Genetic Algorithms and Machine Learning. Machine Learning 3(2):95–99, DOI 10.1023/A:1022602019183 34. Goodfellow I, Bengio Y, Courville A (2016) Deep Learning. The MIT Press 35. Guyon I, Gunn S, Ben-Hur A, Dror G (2004) Result Analysis of the NIPS 2003 Feature Selection Challenge. In: Proceedings of Neural Information Processing Systems, vol 4, pp 545–552 36. Harsanyi JC, Chang CI (1994) Hyperspectral image classification and dimensionality reduction: An orthogonal subspace projection approach. IEEE Transactions on Geoscience and Remote Sensing 32(4):779–785, DOI 10.1109/36. 298007 37. Hinneburg A, Aggarwal CC, Keim DA (2000) What Is the Nearest Neighbor in High Dimensional Spaces? In: Proceedings of the International Conference on Very Large Databases, pp 506–515 38. Hinton G (2010) A practical guide to training restricted boltzmann machines. Momentum 9(1):926, DOI 10.1007/978-3-642-35289-8\ 32 39. Hinton G, Salakhutdinov R (2012) A better way to pretrain deep Boltzmann machines. Advances in Neural Information Processing Systems (3):2447–2455 40. Hinton G, Deng L, Yu D, Dahl GE, Mohamed AR, Jaitly N, Senior A, Vanhoucke V, Nguyen P, Sainath TN (2012) Deep neural networks for acoustic modeling in speech recognition: The shared views of four research groups. IEEE Signal Processing Magazine 29(6):82–97 41. Hinton GE, Salakhutdinov RR (2006) Reducing the Dimensionality of Data with Neural Networks. Science 313(5786):504–507, DOI 10.1126/science. 1127647 AEkNN: An AutoEncoder kNN-based classifier ... 31 42. Hochreiter S, Schmidhuber J (1997) Long Short-Term Memory. Neural Computation 9(8):1735–1780, DOI 10.1162/neco.1997.9.8.1735 43. Hotelling H (1933) Analysis of a complex of statistical variables into principal components. Journal of Educational Psychology 24(6):417–441, DOI 10.1037/ h0071325 44. Hughes GF (1968) On the Mean Accuracy of Statistical Pattern Recognizers. IEEE Transactions on Information Theory 14(1):55–63, DOI 10.1109/TIT. 1968.1054102 45. Keyvanrad MA, Homayounpour MM (2017) Effective sparsity control in deep belief networks using normal regularization term. Knowledge and Information Systems 53(2):533–550, DOI 10.1007/s10115-017-1049-x, URL https://doi. org/10.1007/s10115-017-1049-x 46. Kohavi R, Provost F (1998) Glossary of Terms. Machine Learning 30(2-3):271– 274, DOI 10.1023/A:1017181826899 47. Kotsiantis SB (2007) Supervised machine learning: A review of classification techniques. Informatica 31:249–268 48. Kouiroukidis N, Evangelidis G (2011) The Effects of Dimensionality Curse in High Dimensional kNN Search. In: Proceedings of the 15th Panhellenic Conference on Informatics, IEEE, pp 41–45, DOI 10.1109/PCI.2011.45 49. Krizhevsky A, Sutskever I, Geoffrey E H (2012) ImageNet Classification with Deep Convolutional Neural Networks. In: Advances in neural information processing systems, pp 1097–1105 50. LeCun Y, Bengio Y (1995) Convolutional networks for images, speech, and time series. The handbook of brain theory and neural networks 3361:255–258, DOI 10.1109/IJCNN.2004.1381049 51. Lecun Y, Bottou L, Bengio Y, Haffner P (1998) Gradient-based learning applied to document recognition. Proceedings of the IEEE 86(11):2278–2324, DOI 10.1109/5.726791 52. LeCun Y, Bengio Y, Hinton G (2015) Deep learning. Nature 521(7553):436– 444, DOI 10.1038/nature14539 53. Lee H, Grosse R, Ranganath R, Ng AY (2009) Convolutional deep belief networks for scalable unsupervised learning of hierarchical representations. In: Proceedings of the 26th Annual International Conference on Machine Learning, ACM Press, vol 2008, pp 609–616, DOI 10.1145/1553374.1553453 54. Lee JA, Verleysen M (2007) Nonlinear Dimensionality Reduction. Springer Science & Business Media 55. Lin Y, Zhang T, Zhu S, Yu K (2010) Deep coding network. In: Advances in Neural Information Processing Systems, pp 1405–1413 56. Liou CY, Cheng WC, Liou JW, Liou DR (2014) Autoencoder for words. Neurocomputing 139:84–96, DOI 10.1016/j.neucom.2013.09.055 57. Liu H, Motoda H (1998) Feature extraction, construction and selection: A data mining perspective, vol 453. Springer Science & Business Media, DOI 10.1007/978-1-4615-5725-8 58. Liu H, Motoda H (2007) Computational methods of feature selection. CRC Press 59. Maillo J, Luengo J, Garcı́a S, Herrera F, Triguero I (2017) Exact fuzzy knearest neighbor classification for big datasets. In: IEEE International Conference on Fuzzy Systems, IEEE, pp 1–6, DOI 10.1109/FUZZ-IEEE.2017. 8015686 32 F. J. Pulgar et al. 60. Maillo J, Ramı́rez S, Triguero I, Herrera F (2017) knn-is: An iterative sparkbased design of the k-nearest neighbors classifier for big data. KnowledgeBased Systems 117:3–15, DOI 10.1016/j.knosys.2016.06.012 61. Martı́nez AM, Kak AC (2001) PCA versus LDA. IEEE Transactions on Pattern Analysis and Machine Intelligence 23(2):228–233, DOI 10.1109/34.908974 62. Min R, Stanley DA, Yuan Z, Bonner A, Zhang Z (2009) A Deep Non-linear Feature Mapping for Large-Margin kNN Classification. In: Proceedings of the International Conference on Data Mining, IEEE, pp 357–366, DOI 10.1109/ ICDM.2009.27 63. Pearson K (1901) LIII. On lines and planes of closest fit to systems of points in space. The London, Edinburgh, and Dublin Philosophical Magazine and Journal of Science 2(11):559–572, DOI 10.1080/14786440109462720 64. R Core Team (2016) R: A Language and Environment for Statistical Computing. R Foundation for Statistical Computing, Vienna, Austria, URL https: //www.R-project.org/ 65. Radovanović M, Nanopoulos A, Ivanović M (2010) Hubs in Space : Popular Nearest Neighbors in High-Dimensional Data. Journal of Machine Learning Research 11:2487–2531 66. Reyes-Ortiz JL, Oneto L, Samà A, Parra X, Anguita D (2016) TransitionAware Human Activity Recognition Using Smartphones. Neurocomputing 171:754–767, DOI 10.1016/j.neucom.2015.07.085 67. Rifai S, Muller X (2011) Contractive Auto-Encoders: Explicit Invariance During Feature Extraction. In: Proceedings of the 28th International Conference on Machine Learning, vol 85, pp 833–840 68. Roweis ST, Saul LK (2000) Nonlinear dimensionality reduction by locally linear embedding. Science 290(5500):2323–2326, DOI 10.1126/science.290.5500. 2323 69. Sak H, Senior A, Beaufays F (2014) Long Short-Term Memory Recurrent Neural Network Architectures for Large Scale Acoustic Modeling. In: Proceedings of the Annual Conference of the International Speech Communication Association, September, pp 338–342 70. Salakhutdinov R, Mnih A, Hinton G (2007) Restricted boltzmann machines for collaborative filtering. In: Proceedings of the 24th International Conference on Machine learning, ACM, pp 791–798, DOI 10.1145/1273496.1273596 71. Saul LK, Weinberger KQ, Ham JH, Sha F, Lee DD (2006) Spectral Methods for Dimensionality Reduction. The MIT Press, pp 292–308, DOI 10.7551/ mitpress/9780262033589.003.0016 72. Sheskin DJ (2004) Handbook of parametric and nonparametric statistical procedures. Technometrics 46:1193, DOI 10.1198/tech.2004.s209 73. Snoek J, Adams RP, Larochelle H (2012) Nonparametric guidance of autoencoder representations using label information. Journal of Machine Learning Research 13(Sep):2567–2588 74. Sordoni A, Bengio Y, Vahabi H, Lioma C, Grue Simonsen J, Nie JY (2015) A hierarchical recurrent encoder-decoder for generative context-aware query suggestion. In: Proceedings of the 24th ACM International on Conference on Information and Knowledge Management, ACM, pp 553–562 75. Spearman C (1904) ”General Intelligence,” Objectively Determined and Measured. The American Journal of Psychology (2):201–292, DOI 10.2307/ 1412107 AEkNN: An AutoEncoder kNN-based classifier ... 33 76. Tang P, Zhang J, Wang X, Feng B, Roli F, Liu W (2017) Learning extremely shared middle-level image representation for scene classification. Knowledge and Information Systems 52(2):509–530, DOI 10.1007/s10115-016-1015-z, URL https://doi.org/10.1007/s10115-016-1015-z 77. Tenenbaum JB (2000) A Global Geometric Framework for Nonlinear Dimensionality Reduction. Science 290(5500):2319–2323, DOI 10.1126/science.290. 5500.2319 78. Torgerson W (1952) Multidimensional scaling: I. Theory and method. Psychometrika 17(4):401–419, DOI 10.1007/BF02288916 79. Van Der Maaten LJP, Postma EO, Van Den Herik HJ (2009) Dimensionality Reduction: A Comparative Review. Journal of Machine Learning Research 10:1–41, DOI 10.1.1.112.5472 80. Van Der Putten P, Van Someren M (2004) A bias-variance analysis of a real world learning problem: The coil challenge 2000. Machine learning 57(1):177– 195 81. Venna J (2007) Dimensionality reduction for visual exploration of similarity structures. Helsinki University of Technology 82. Vergara A, Vembu S, Ayhan T, Ryan MA, Homer ML, Huerta R (2012) Chemical gas sensor drift compensation using classifier ensembles. Sensors and Actuators B: Chemical 166:320–329, DOI 10.1016/j.snb.2012.01.074 83. Vincent P, Larochelle H, Bengio Y, Manzagol PA (2008) Extracting and composing robust features with denoising autoencoders. In: Proceedings of the 25th International Conference on Machine Learning, ACM, pp 1096–1103, DOI 10.1145/1390156.1390294 84. Wang W, Huang Y, Wang Y, Wang L (2014) Generalized autoencoder: A neural network framework for dimensionality reduction. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, pp 496–503, DOI 10.1109/CVPRW.2014.79 85. Wang X (2011) A fast exact k-nearest neighbors algorithm for high dimensional search using k-means clustering and triangle inequality. In: Proceedings of the International Joint Conference on Neural Networks, IEEE, pp 1293–1299, DOI 10.1016/j.patcog.2010.01.003 86. Weinberger KQ, Saul LK (2006) An introduction to nonlinear dimensionality reduction by maximum variance unfolding. In: Proceedings of the 21st National Conference on Artificial Intelligence, vol 2, pp 1683–1686 87. Wiley JF (2016) R Deep Learning Essentials. Packt Publishing Ltd. 88. Xia Y, Peng Y, Zhang X, Bae H (2017) Demst-knn: A novel classification framework to solve imbalanced multi-class problem. In: Computer Science Online Conference, Springer, pp 291–301, DOI 10.1007/978-3-319-57261-1\ 29 89. Yang M, Zhang L, Yang J, Zhang D (2011) Robust sparse coding for face recognition. In: IEEE Conference on Computer Vision and Pattern Recognition, IEEE, pp 625–632, DOI 10.1109/CVPR.2011.5995393 90. Ye Y, Chen L, Hou S, Hardy W, Li X (2018) Deepam: a heterogeneous deep learning framework for intelligent malware detection. Knowledge and Information Systems 54(2):265–285, DOI 10.1007/s10115-017-1058-9, URL https://doi.org/10.1007/s10115-017-1058-9 91. Yu C, Ooi BC, Tan KL, Jagadish HV (2001) Indexing the Distance: An Efficient Method to KNN Processing. In: International Conference on Very Large Databases, pp 421–430 34 F. J. Pulgar et al. 92. Yu H, Yang J (2001) A direct lda algorithm for high-dimensional data-with application to face recognition. Pattern Recognition 34(10):2067–2070, DOI 10.1016/S0031-3203(00)00162-X 93. Zhang J, Tian G, Mu Y, Fan W (2014) Supervised deep learning with auxiliary networks. In: Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining, ACM, pp 353–361 94. Zhou G, Zhu Z, He T, Hu XT (2016) Cross-lingual sentiment classification with stacked autoencoders. Knowledge and Information Systems 47(1):27–44, DOI 10.1007/s10115-015-0849-0, URL https://doi.org/10. 1007/s10115-015-0849-0 AEkNN: An AutoEncoder kNN-based classifier ... 35 About the author – FRANCISCO JAVIER PULGAR RUBIO received his B.Sc. degree in Computer Science from the University of Jaén in 2013. He is a PhD student in the Computer Science Department at the University of Jaén (Spain). His research interests include areas such as classification, imbalance problems, high dimensionality problem, neural network design, subgroup discovery, big data and parallelization techniques. About the author – FRANCISCO CHARTE received his B.Eng. degree in Computer Science from the University of Jaén in 2010 and his M.Sc. and Ph.D. in Computer Science from the University of Granada in 2011 and 2015, respectively. He is currently a researcher at the University of Jaén (Spain). His main research interests include machine learning with applications to multi-label classification, high dimensionality and imbalance problems, and deep learning related techniques. About the author – ANTONIO J. RIVERA received his B.Sc. degree and his Ph.D. in Computer Science from the University of Granada in 1995 and 2003, respectively. He is a lecturer of Computer Architecture and Computer Technology with the Computer Science Department at the University of Jaén (Spain). His research interests include areas such as multilabel classification, imbalance problems, evolutionary computation, neural network design, time series prediction and regression tasks. About the author – MARÍA J. DEL JESUS received the M.Sc. and Ph.D. degrees in Computer Science from the University of Granada, Granada, Spain, in 1994 and 1999, respectively. She is an Associate Professor with the Department of Computer Science, University of Jaén, Spain. Her current research interests include fuzzy rule-based systems, genetic fuzzy systems, subgroup discovery, data preparation, feature selection, evolutionary radial basis neural networks, knowledge extraction based on evolutionary algorithms, and data mining.
9cs.NE
arXiv:1701.07535v2 [math.ST] 14 Dec 2017 Stratified Splitting for Efficient Monte Carlo Integration Radislav Vaisman, Robert Salomone, and Dirk P. Kroese School of Mathematics and Physics, The University of Queensland Brisbane, Australia [email protected] [email protected] [email protected] Abstract The efficient evaluation of high-dimensional integrals is of importance in both theoretical and practical fields of science, such as data science, statistical physics, and machine learning. However, due to the curse of dimensionality, deterministic numerical methods are inefficient in high-dimensional settings. Consequentially, for many practical problems one must resort to Monte Carlo estimation. In this paper, we introduce a novel Sequential Monte Carlo technique called Stratified Splitting. The method provides unbiased estimates and can handle various integrand types including indicator functions, which are used in rare-event probability estimation problems. Moreover, we demonstrate that a variant of the algorithm can achieve polynomial complexity. The results of our numerical experiments suggest that the Stratified Splitting method is capable of delivering accurate results for a variety of integration problems. 1 Introduction We consider the evaluation of expectations and integrals of the form Z X Ef [ϕ(X)] = ϕ(x)f (x) or Ef [ϕ(X)] = ϕ(x)f (x) dx, X X 1 where X ∼ f is a random variable taking values in a set X ⊆ Rd , f is a probability density function (pdf) with respect to the Lebesgue or counting measure, and ϕ : X → R is a real-valued function. The evaluation of such high-dimensional integrals is of critical importance in many scientific areas, including statistical inference [13], rare-event probability estimation [1], machine learning [25, 41], and cryptography [28]. An important application is the calculation of the normalizing constant of a probability distribution, such as the marginal likelihood (model evidence). However, often obtaining even a reasonably accurate estimate of Ef [ϕ(X)] can be hard [39]. Deterministic computation methods that use Fubini’s theorem [12] and quadrature rules or extrapolations [11] suffer from the curse of dimensionality, with the number of required function evaluations growing exponentially with the dimension. Many other deterministic and randomized methods have been proposed to estimate high-dimensional integrals. Examples include Bayesian quadrature, sparse grids, and various Monte Carlo, quasiMonte Carlo, Nested Sampling, and Markov Chain Monte Carlo (MCMC) algorithms [19, 26, 30, 32, 35, 42]. There are also procedures based on the sequential Monte Carlo (SMC) approach [8] that provide consistent and unbiased estimators that have asymptotic normality. However, many popular methods are not unbiased and some are not known to be consistent. For example, Nested Sampling produces biased estimates and even its consistency, when Markov Chain Monte Carlo (MCMC) is used, remains an open problem [7]. An alternative criterion that one might use to describe the efficiency of algorithms is computational complexity, which often used in a computer science context. Here, an algorithm is considered to be efficient if it scales polynomially (rather than exponentially) in the size of the problem. In this paper, we propose a novel SMC approach for reliable and fast estimation of high-dimensional integrals. Our method extends the Generalized Splitting (GS) algorithm of [4], to allow the estimation of quite general integrals. In addition, our algorithm is specifically designed to perform efficient sampling in regions of X where f takes small values and ϕ takes large values. In particular, we present a way of implementing stratification for variance reduction in the absence of knowing the strata probabilities. A benefit of the proposed Stratified Splitting algorithm (SSA) is that it provides an unbiased estimator of Ef [ϕ(X)], and that it can be analyzed in a non-asymptotic setting. In particular, we prove that a simplified version of SSA can provide polynomial complexity, under certain conditions. We give a specific example of a #P complete problem where polynomial efficiency can be achieved, providing a polynomial bound on the number of samples required to achieve a predefined error bound. The SSA uses a stratified sampling scheme (see, e.g., [39], Chapter 5), defining 2 a partition of the state space into strata, and using the law of total probability to deliver an estimator of the value of the integral. To do so, one needs to obtain a sample population from each strata and know the exact probability of each such strata. Under the classical stratified sampling framework, it is assumed that the former is easy to achieve and the latter is known in advance. However, such favorable scenarios are rarely seen in practice. In particular, obtaining samples from within a stratum and estimating the associated probability that a sample will be within this stratum is hard in general [23]. To resolve this issue, the SSA incorporates a multilevel splitting mechanism [4, 9, 24, 38] and uses an appropriate MCMC method to sample from conditional densities associated with a particular stratum. The rest of the paper is organized as follows. In Section 2 we introduce the SSA, explain its correspondence to a generic multi-level sampling framework, and prove that the SSA delivers an unbiased estimator of the expectation of interest. In Section 3, we provide a rigorous complexity analysis of the approximation error of the proposed method, under a simplified setting. In Section 4, we introduce a challenging estimation problem called the weighted component model, and demonstrate that SSA can provide an arbitrary level of precision for this problem with polynomial complexity in the size of the problem. In Section 5, we report our numerical findings on various test cases that typify classes of problems for which the SSA is of practical interest. Finally, in Section 6 we summarize the results and discuss possible directions for future research. Detailed proofs are given in the appendix. 2 2.1 Stratified splitting algorithm Generic multilevel splitting framework We begin by considering a very generic multilevel splitting framework, similar to [14]. Let X ∼ f be a random variable taking values in a set X . Consider a decreasing sequence of sets X = XS 0 ⊇ · · · ⊇ Xn = ∅ and define Zt = Xt−1 \ Xt , for t = 1, . . . , n. Note that Xt−1 = ni=t Zi and that {Zt } yields a partition of X ; that is, n [ X = Zt , Zt1 ∩ Zt2 = ∅ for 1 ≤ t1 < t2 ≤ n. (1) t=1 We can define a sequence of conditional pdfs ft (x) = f (x | x ∈ Xt−1 ) = f (x)1{x ∈ Xt−1 } Pf (X ∈ Xt−1 ) 3 for t = 1, . . . , n, (2) where 1 denotes the indicator function. Also, define gt (x) = f (x | x ∈ Zt ) = f (x)1{x ∈ Zt } Pf (X ∈ Zt ) for t = 1, . . . , n. (3) Our main objective is to sample from the pdfs ft and gt in (2) and (3), respectively. To do so, we first formulate a generic multilevel splitting framework, given in Algorithm 1. Algorithm 1: Generic multilevel splitting framework input : X0 , . . . , Xn and {ft , gt }1≤t≤n . output: Samples from ft and gt for 1 ≤ t ≤ n. Create a multi-set X1 of samples from f1 . for t = 1 to n do Set Zt ← Xt ∩ Zt . Set Yt ← Xt \ Zt . if t < n then Create a multi-set Xt+1 of samples (particles) from ft+1 , (possibly) using elements of the Yt set. /* This step is called the splitting or the rejuvenation step. */ return multi-sets {Xt }1≤t≤n , and {Zt }1≤t≤n . Note that the samples in {Xt }1≤t≤n and {Zt }1≤t≤n are distributed according to ft and gt , respectively, and these samples can be used to handle several tasks. In particular, the {Xt }1≤t≤n sets allow one to handle the general non-linear Bayesian filtering problem [17]. Moreover, by tracking the cardinalities of the sets {Xt }1≤t≤n and {Zt }1≤t≤n , one is able to tackle hard rare-event probability estimation problems, such as delivering estimates of Pf (X ∈ Zn ) [4, 26, 40]. Finally, it was recently shown by [43] that Algorithm 1 can be used as a powerful variance minimization technique for any general SMC procedure. In light of the above, we propose taking further advantage of the sets {Xt }1≤t≤n and {Zt }1≤t≤n , to obtain an estimation method suitable for general integration problems. 2.2 The SSA set-up Following the above multilevel splitting framework, it is convenient to construct the sequence of sets {Xt }0≤t≤n by using a performance function S : X → R, in such a way that {Xt }0≤t≤n can be written as super level-sets of S for chosen levels 4 γ0 , . . . , γn , where γ0 and γn are equal to inf x∈X S(x) and supx∈X S(x), respectively. In particular, Xt = {x ∈ X : S(x) ≥ γt } for t = 0, . . . , n. The partition {Zt }1≤t≤n , and the densities {ft }1≤t≤n and {gt }1≤t≤n , are defined as before via (1), (2), and (3), respectively. Similarly, one can define a sequence of sub level-sets of S; in this paper we use the latter for some cases and whenever appropriate. def Letting zt = Ef [ϕ (X) | X ∈ Zt ] Pf (X ∈ Zt ) for t = 1, . . . , n, and combining (1) with the law of total probability, we arrive at def z = Ef [ϕ (X)] = n X t=1 Ef [ϕ (X) | X ∈ Zt ] Pf (X ∈ Zt ) = n X zt . (4) t=1 The SSA proceeds with the construction of estimators Zbt for zt for t = 1, . . . , n and, as soon as these are available, we can use (4) to deliver the SSA estimator for P z, namely Zb = nt=1 Zbt . def def b t and Pbt For 1 ≤ t ≤ n, let ϕt = Ef [ϕ (X) | X ∈ Zt ], pt = Pf (X ∈ Zt ), and let Φ b t Pbt , and recall that, under be estimators of ϕt and pt , respectively. We define Zbt = Φ the multilevel splitting framework, we obtain the sets {Xt }1≤t≤n , and {Zt }1≤t≤n . b t }1≤t≤n and {Pbt }1≤t≤n , in These sets are sufficient to obtain unbiased estimators {Φ the following way. b t to be the (unbiased) Crude Monte Carlo (CMC) estimator of ϕt , 1. We define Φ that is, X bt = 1 ϕ(Z) for all t = 1, . . . , n. Φ |Zt | Z∈Z t 2. The estimator Pbt is defined similar to the one used in the Generalized Splitting (GS) algorithm of [4]. In particular, the GS product estimator is defined as foldef def lows. Define the level entrance probabilities r0 =Q1, rt = Pf (X ∈ Xt | X ∈ Xt−1 ) for t = 1, . . . , n, and note that Pf (X ∈ Xt ) = ti=0 ri . Then, for t = 1, . . . , n, it holds that pt = Pf (X ∈ Zt ) = Pf (X ∈ Xt−1 ) − Pf (X ∈ Xt ) = t−1 Y i=0 ri − t Y i=0 ri = (1 − rt ) t−1 Y ri . i=0 bt ) Qt−1 R b b def This suggests the estimator Pbt = (1 − R i=0 i for pt , where R0 = 1 and bt = |Yt | = |Xt \Zt | for all t = 1, . . . , n. R |Xt | |Xt | 5 In practice, obtaining the {Xt }1≤t≤n and {Zt }1≤t≤n sets requires sampling from the conditional pdfs in (2) and (3). However, for many specific applications, designing such a procedure can be extremely challenging. Nevertheless, we can use the Yt = Xt \ Zt set from iteration t to sample Xt+1 from ft+1 for each t = 1, . . . , n − 1, via MCMC. In particular, the particles from the Yt set can be “split”, in order to construct the desired set Xt+1 for the next iteration, using a Markov transition kernel κt+1 (· | ·) whose stationary pdf is ft+1 , for each t = 1, . . . , n − 1. Algorithm 2 summarizes the general procedure for the SSA. The particular splitting step described in Algorithm 2 is a popular choice [3, 4, 37], especially for hard problems with unknown convergence behavior of the corresponding Markov chain. Algorithm 2: SSA for estimating z = Ef [ϕ (X)] input : A set X , a pdf f , the functions ϕ : X → R and S : X → R, a sequence of levels γ0 , . . . , γn , and the sample size N ∈ N. b — an estimator of z = Ef [ϕ(X)]. output: Z b Set R0 ← 1, X1 ← ∅, and f1 ← f . for i = 1 to N do draw X ∼ f1 (x) and add X to X1 . for t = 1 to n do Set Zt ← {X ∈ Xt : X ∈ Zt } and Yt ← Xt \ Zt . bt ← 1 P Set Φ X∈Zt ϕ(X). |Zt |   |Y | t bt ← bt ← 1 − R bt Qt−1 R b Set R , and P j=0 j . N b t Pbt . Set Zbt ← Φ if t < n then /* Performing splitting to obtain Xt+1 . Set Xt+1 ← ∅ and draw Ki ∼ Bernoulli(0.5), for i = 1, . . . , |Yt |, such that P|Yt | i=1 Ki = N mod |Yt |. for Y ∈ Yt doj k Set Mi ← N |Yt | */ + Ki and Xi,0 ← Y. for j = 1 to Mi do Draw Xi,j ∼ κτt+1 (· | Xi,j−1 ) (where κτt+1 (· | ·) is a τ -step transition kernel using κt+1 (· | ·)), and add Xi,j to Xt+1 . Pn return Zb = t=1 Zbt . Remark 1 (Independent SSA) Obviously, the SSA above produces dependent samples in sets Xt and Zt . It will be convenient to also consider a version of SSA where the samples are independent. This can for example be achieved by simulating multiple independent runs of SSA, until N realizations X ∈ Xt have been produced. Of course this Independent SSA (ISSA) variant is much less efficient than the original algorithm, but the point is that the computational effort (the run time complexity) 6 remains polynomial — O(C 2 n) versus O(Cn), where C is the complexity of SSA for each level. Hence, from a complexity point of view we may as well consider the independent SSA variant. This is what will be done in Theorem 2. Theorem 1 (Unbiased h iestimator) Algorithm 2 outputs an unbiased estimator; that is, it holds that E Zb = Ef [ϕ (X)] = z. Proof 1 See Appendix A. We next proceed with a clarification for a few remaining practical issues regarding the SSA. Determining the SSA levels. It is often difficult to make an educated guess how to set the values of the level thresholds. However, the SSA requires the values of {γt }1≤t≤n to be known in advance, in order to ensure that the estimator is unbiased. To resolve this issue, we perform a single pilot run of Algorithm 2 using a so-called rarity parameter 0 < ρ < 1. In particular, given samples from an Xt set, we take the ρ |Xt | performance quantile as the value of the corresponding level γt , and form the next level set. Such a pilot run helps to establish a set of threshold values adapted to the specific problem. After the completion of the pilot run we simply continue with a regular execution of Algorithm 2 using the level threshold values observed in the pilot run. Controlling the SSA error. A common practice when working with a Monte Carlo algorithm that outputs an unbiased estimator, is to run it for R independent replications to obtain Zb(1) , . . . , Zb(R) , and report the average value. Thus, for a final estimator, we take R X −1 b Z=R Zb(j) . j=1 To measure the quality of the SSA output, we use the estimator’s relative error (RE), which is defined by r   Var Zb RE = h i √ . E Zb R As the variance and expectation of the estimator are not known explicitly, we report an estimate of the relative error by estimating both terms from the result of the R runs. 7 3 Complexity In this section, we present a theoretical complexity analysis of the Independent SSA variant, discussed in Remark 1. Our focus is on establishing time-complexity results, and thus our style of analysis is similar to that used for approximate counting algorithms. For an extensive overview, we refer to [29, Chapter 10]. We begin with a definition of a randomized algorithm’s efficiency. Definition 1 ([29]) A randomized algorithm gives an (ε, δ)-approximation for the value z if the output Zb of the algorithm satisfies   b P z(1 − ε) ≤ Z ≤ z(1 + ε) ≥ 1 − δ. With the above definition in mind, we now aim to specify the sufficient conditions for the SSA to provide an (ε, δ)-approximation n oto z. A key component in our analysis is (m) to construct a Markov chain Xt , m ≥ 0 with stationary pdf ft (defined in (2)), for all 1 ≤ t ≤ n, and to consider the speed of convergence of the distribution of (m) Xt as m increases. Let µt be the probability distribution corresponding to ft , so Z ft (u)λ(du), µt (A) = A for all Borel sets A, where λ is some base measure, such as the Lebesgue or counting measure. To proceed, we have   (τ ) (0) τ κt (A | x) = P Xt ∈ A | Xt = x , for the τ -step transition law of the Markov chain. Consider the total variation distance between κτt (· | x) and µt , defined as: kκτt (· | x) − µt kTV = sup |κτt (A | x) − µt (A)|. A An essential ingredient of our analysis is the so-called mixing time (see [36] and [27] for an extensive overview), which is defined as τmix (ε, x) = min {τ : kκτt (· | x) − µt kTV ≤ ε}. Let µ bt = κτt (· | x ) be the SSA sampling distribution at steps 1 ≤ t ≤ n where, for simplicity, we suppress x in the notation of µ bt . 8 Finally, similar to µt and µ bt , let νt be the probability distribution corresponding to the pdf gt (defined in (3)), and let νbt be the SSA sampling distribution, for all 1 ≤ t ≤ n. Theorem 2 details the main efficiency result for the ISSA. We reiterate that from a complexity point of view the independence setting does not impose a theoretical limitation, as the run time complexity remains polynomial. An advantage is that by using ISSA we can engage powerful concentration inequalities [6, 20]. Theorem 2 (Complexity of the ISSA) Let ϕ be a strictly positive real-valued function, at = minx∈Zt {ϕ(x)}, bt = maxx∈Zt {ϕ(x)}, and rt = min {rt , 1 − rt } for 1 ≤ t ≤ n. Let µ bt and νbt be the ISSA sampling distributions at steps 1 ≤ t ≤ n, for Xt and Zt , respectively. Then, the ISSA gives an (ε, δ)-approximation to z = Ef [ϕ(X)], provided that for all 1 ≤ t ≤ n the following holds. 1. kb µt − µt kTV ≤ 2. kb νt − νt kTV ≤ ε rt 32n and ε at 16(bt −at ) |Xt | ≥ and 3072 n2 ln(4n2 /δ) . ε2 r2t |Zt | ≥ 128(bt −at )2 ln(4n/δ) . ε2 a2t Proof 2 See Appendix A. In some cases, the distributions of the states in Xt and Zt generated by Markov chain defined by the kernel κτt , approach the target distributions µt and νt very fast. This occurs for example when there exists a polynomial in n (denoted by P(n)), such that the mixing time [27] is bounded by O(P(n)), (bt − at )2 /a2 = O(P(n)), and rt = O(1/P(n)) for all 1 ≤ t ≤ n. In this case, the ISSA becomes a fully polynomial randomized approximation scheme (FPRAS) [29]. In particular, the ISSA results in a desired (ε, δ)-approximation to z = Ef [ϕ(X)] with running time bounded by a polynomial in n, ε−1 , and ln(δ −1 ). Finally, it is important to note that an FPRAS algorithm for such problems is essentially the best result one can hope to achieve [22]. We next illustrate the use of Theorem 2 with an example of a difficult problem for which the ISSA provides an FPRAS. 4 FPRAS for the weighted component model Consider a system of k components. Each component i generates a specific amount of benefit, which is given by a positive real number wi , i = 1, . . . , k. In addition, each component can be operational or not. 9 Let w = (w1 , . . . , wk )> be the column vector of component weights (benefits), and x = (x1 , . . . , xk )> be a binary column vector, where xi indicates the ith component’s operational status for 1 ≤ i ≤ k. That is, if the component i is operational xi = 1, and xi = 0 if it is not. Under this setting, we define the system performance as S(w, x) = k X wi xi = w> x. i=1 We further assume that all elements are independent of each other, and that each element is operational with probability 1/2 at any given time. For the above system definition, we might be interested in the following questions. 1. Conditional expectation estimation. Given a minimal threshold performance Pk γ ≤ i=1 wi , what is the expected system performance? That is to say, we are interested in the calculation of E [S(w, X) | S(w, X) ≤ γ] , (5) where X is a k-dimensional binary vector generated uniformly at random from the {0, 1}k set. This setting appears (in a more general form), in a portfolio credit risk analysis [16], and will be discussed in Section 5. 2. Tail probability estimation [1]. Given the minimal threshold performance γ, what is the probability that the overall system performance is smaller than γ? In other words, we are interested in calculating P(S(X) ≤ γ) = E [1{S(X) ≤ γ}] . (6) The above problems are both difficult, since a uniform generation of X ∈ {0, 1}k , such that w> X ≤ γ, corresponds to the knapsack problem, which belongs to #P complexity class [31, 44]. In this section, we show how one can construct an FPRAS for both problems under the mild condition that the difference between the minimal and the maximal weight in the w vector is not large. This section’s main result is summarized next. Proposition 1 Given a weighted component model with k weights, w = (w1 , . . . , wk ) and a threshold γ, let w = min{w}, w = max{w}. Then, provided that w = O (P(k)) w, there exists an FPRAS for the estimation of both (5) and (6). 10 Prior to stating the proof of Proposition 1, define ( ) k X Xb = x ∈ {0, 1}k : wi x i ≤ b i=1 for b ∈ R, (7) and let µb be the uniform distribution on the Xb set. [31] introduce an MCMC algorithm that is capable of sampling from the Xb set almost uniformly at random. In particular, this algorithm can sample X ∼ µ bb , such that kb µb − µb kTV ≤ ε. Moreover, the authors show that their Markov chain mixes rapidly, and in particular, that its mixing time is polynomial in k and is given by τmix (ε) = O k 9/2+ε . Consequentially, the sampling from µ bb can be performed in O(P(k)) time for any ε > 0. The proof of Proposition 1 depends on the following technical lemma. Lemma 1 Let X ∼ π b be a strictly positive univariate random variable such that a ≤ X ≤ b, and let X1 , . . . , Xm be its independent realizations. Then, provided that kb π − πkTV εa ≤ , 4(b − a) and (b − a2 ) ln(2/δ) m≥ , 2(ε/4)2 a2 it holds that: 1 X P (1 − ε)Eπ [X] ≤ Xi ≤ (1 + ε)Eπ [X] m i=1 m ! ≥ 1 − δ. Proof 3 See Appendix A. We next proceed with the proof of Proposition 1 which is divided into two parts. The first for the conditional expectation estimation and the second for the tail probability evaluation. Proof 4 (Proposition 1: FPRAS for (5)) With the powerful result of [31] in hand, one can achieve a straightforward development of an FPRAS for the conditional expectation estimation problem. The proof follows immediately from Lemma 1. In particular, all we need to do in order to achieve an (ε, δ) approximation to (5) is to generate (w − w)2 ln(2/δ) m= 2(ε/4)2 w2 samples from µ bγ , such that kb µγ − µγ kTV ≤ 11 εw . 4(w − w) Recall that the mixing time is polynomial in k, and note that the number of samples m is also polynomial in k, thus the proof is complete, since m= (w − w)2 ln(2/δ) (ε/4)2 w2 = |{z} w=O(P(k))w O(P(k)) ln(2/δ) . ε2  Proof 5 (Proposition 1: FPRAS for (6)) In order to put this problem into the setting of Theorem 2 and achieve an FPRAS, a careful definition of the corresponding level sets is essential. In particular, the number of levels should be polynomial in k, and the level entrance probabilities {rt }1≤t≤n , should not be too small. Fix    P k   w − γ   i=1 i , n= w to be the number of levels, and set γt = γ + (n − t) w for t = 0, . . . , n. For general γ it holds that E [1{S(X) ≤ γ}] = E [1{S(X) ≤ γ + n w} | S(X) ≤ γ + n w] P (S(X) ≤ γ + n w) " # ! k k X X + E 1{S(X) ≤ γ} | γ + n w < S(X) ≤ wi P γ + n w < S(X) ≤ wi i=1 = E [1{S(X) ≤ γ} | S(X) ≤ γ + n w] | {z } k 2 −1 + 2k (∗) k X i=1 wi ! i=1 1 , 2k where the last equality follows from the fact Pk that there is only one vector x = (1, 1, . . . , 1) for which γ + n w < S(x) ≤ i=1 wi . That is, it is sufficient to develop an efficient approximation to (∗) only, since the rest are constants. We continue by defining the sets X = Xγ0 ⊇ · · · ⊇ Xγn via (7), and by noting that for this particular problem, our aim is to find P(X ∈ Xγn ), so the corresponding estimator simplifies to (see Section 2.2 (2)), n Y Zb = t=0 bt . R In order to show that the algorithm provides an FPRAS, we will need to justify only condition (1) of Theorem 2, which is sufficient in our case because we are dealing with an indicator integrand. Recall that the formal requirement is kb µt − µt kTV ≤ ε rt /32n, and 12 |Xt | ≥ 3072 n2 ln(4n2 /δ)/ε2 r2t , where µt is the uniform distribution on Xγt for t = 0, . . . , n, and each sample in Xt is distributed according to µ bt . Finally, the FPRAS result is established by noting that the following holds. 1. From Lemma 6 in the Appendix, we have that rt ≥ 1 k+1 for 1 ≤ t ≤ n. 2. The sampling from µ bt can be performed in polynomial (in k) time [31]. 3. The number of levels n (and thus the required sample size {|Xt |}1≤t≤n ) is polynomial in k, since   P  k   w − τ i   kw i=1  ≤ = O(P(k)).  |{z} w w w=O(P(k))w Unfortunately, for many problems, an analytical result such as the one obtained in this section is not always possible to achieve. The aim of the following numerical section is to demonstrate that the SSA is capable of handling hard problems in the absence of theoretical performance. 5 Numerical experiments 5.1 Portfolio credit risk We consider a portfolio credit risk setting [16]. Given a portfolio of k assets, the portfolio loss L is the random variable L= k X li Xi , (8) i=1 where li is the risk of asset i ∈ {1, . . . , k}, and Xi is an indicator random variable that models the default of asset i. Under this setting (and similar to Section 4), one is generally interested in the following. 1. Conditional Value at Risk (CVaR). Given a threshold (value at risk) v, calculate the conditional value at risk c = E[L | L ≥ v]. 2. Tail probability estimation. Given the value at risk, calculate the tail probability P(L ≥ v) = E [1{L ≥ v}]. 13 The SSA can be applied to both Pk problems as follows. For tail probability estimation, we simply set ϕ(x) = 1{ i=1 li xi ≥ v}. For conditional expectation, we set P ϕ(x) = ki=1 li xi . Note that the tail probability estimation (for which the integrand is the indicator function), is a special case of a general integration. Recall that the GS algorithm of [4] works on indicator integrands, and thus GS is a special case of the SSA. Consequently, in this section we will investigate the more interesting (and more general) scenario of estimating an expectation conditional on a rare event. As our working example, we consider a credit risk in a Normal Copula model and, in particular, a 21 factor model from [16] with 1, 000 obligors. Thus, the integrals of interest are 1021 dimensional. The SSA setting is similar to the weighted component model from Section 4. We define a k-dimensional binary vector x = (x1 , . . . , xk ), for which xi stands for the ith asset default (xi = 1 for default, and 0 otherwise). We take the performance function S(x) to be the loss function (8). Then, the level sets are defined naturally by Xt = {x : P S(x) ≥ γt }, (see also Section 2.2). In our experiment, we set γ0 = 0 and γn = 1 + ki=1 li . In order to determine the remaining levels γ1 , . . . , γn−1 , we execute a pilot run of Algorithm 2 with N = 1, 000 and ρ = 0.1. As an MCMC sampler, we use a Hit-and-Run algorithm [26, Chapter 10, Algorithm 10.10], taking a new sample after 50 transitions. It is important to note that despite the existence of several algorithms for estimating c, the SSA has an interesting feature, that (to the best of our knowledge) is not present in other methods. Namely, one is able to obtain an estimator for several CVaRs via a single SSA run. To see this, consider the estimation of c1 , . . . , cs for s ≥ 1. Suppose that v1 ≤ · · · ≤ vs and note that it will be sufficient to add these values to the {γt } (as additional levels), and retain s copies of Pbt and Zbt . In particular, during the SSA execution, we will need to closely follow the γ levels, and as soon as we encounter a certain vj for 1 ≤ j ≤ s, we will start to update the corre(j) (j) sponding values of Pbt and Zbt , in order to allow the corresponding estimation of cj = E[L | L ≥ vj ]. Despite that such a procedure introduces a dependence between the obtained estimators, they still remain unbiased. To test the above setting, we perform the experiment with a view to estimate {cj }1≤j≤13 using the following values at risk: {10000, 14000, 18000, 22000, 24000, 28000, 30000, 34000, 38000, 40000, 44000, 48000, 50000}. (9) The execution of the SSA pilot run with the addition of the desired VaRs (levels) 14 from (9) (marked in bold), yields the following level values of (γ0 , . . . , γ21 ): (0, 788.3, 9616.7, 10000, 14000, 18000, 22000, 24000, 28000, 30000, 34000, 38000, 40000, 44000, 47557.6, 48000, 49347.8, 50000, 50320.6, 50477.4, 50500, ∞). Table 1 summarizes the results obtained by executing 1 pilot and 5 regular independent runs of the SSA. For each run, we use the parameter set that was specified for the pilot run (N = 1, 000 and burn-in of 50). The overall execution time (for all these R = 1 + 5 = 6 independent runs) is 454 seconds. The SSA is very accurate. In particular, we obtain an RE of less than 1% for each b c while employing a very modest effort. v b c 10000 1.68 × 104 14000 2.09 × 104 18000 2.46 × 104 22000 2.82 × 104 24000 2.99 × 104 28000 3.32 × 104 30000 3.48 × 104 RE 0.67 % 0.51 % 0.21 % 0.19 % 0.23 % 0.21 % 0.14 % v 34000 38000 40000 44000 48000 50000 b c 3.80 × 104 4.11 × 104 4.26 × 104 4.56 × 104 4.86 × 104 5.01 × 104 RE 0.05 % 0.05 % 0.08 % 0.08 % 0.02 % 0.02 % Table 1: The SSA results for the Normal copula credit risk model with 21 factors and 1, 000 obligors. The obtained result is especially appealing, since the corresponding estimation problem falls into rare-event setting [15]. That is, a CMC estimator will not be applicable in this case. 5.2 Self-avoiding walks In this section, we consider random walks of length n on the two-dimensional lattice of integers, starting from the origin. In particular, we are interested in estimating the following quantities: 15 1. cn : the number of SAWs of length n, 2. ∆n : the expected distance of the final SAW coordinate to the origin. To put these SAW problems into the SSA framework, define the set of directions, X = {Left, Right, Up, Down}n , and let f be the uniform pdf on X . Let ξ(x) denote the final coordinate of the random walk represented by the directions   vector x. We have cn = Ef [1{X is SAW}] and ∆n = Ef kξ(X)k 1{X is SAW} . Next, we let Xt ⊆ X be the set of all directions vectors that yield a valid selfavoiding walk of length at least t, for 0 ≤ t ≤ n. In addition, we define Zt to be the set of all directions vectors that yield a self-avoiding walk of length (exactly) t, for 1 ≤ t ≤ n. The above gives the required partition of X . Moreover, the simulation from ft (x) = f (x | x ∈ Xt−1 ), reduces to the uniform selection of the SAW’s direction at time 1 ≤ t ≤ n. Our experimental setting for SAWs of lengths n is as follows. We set the sample size of the SSA to be Nt = 1000 for all t = 1, . . . , n. In this experiment, we are interested in both the probability that X lies in Zn , and the expected distance of X ∈ Zn (uniformly selected) to the origin. These give us the required estimators of cn and ∆n , respectively. The leftmost plot of Fig. 1 summarizes a percent error (PE), which is defined by b cn − cn , PE = 100 cn where b cn stands for the SSA’s estimator of cn . 10 200 0 R/n PE (%) 5 −5 −10 −15 10 20 30 40 50 3% 1% 150 100 50 3% RE 1% RE 60 70 0 10 20 30 40 50 60 70 n n Figure 1: The PE (leftmost plot) and the number of independent runs divided by SAW’s length (rightmost plot) of the SSA as a function of SAW length n for 3% and 1% RE. In order to explore the convergence of the SSA estimates to the true quantity of interest, the SSA was executed for a sufficient number of times to obtain 3% and 16 1% relative error (RE) [39], respectively. The exact cn values for n = 1, . . . , 71 were taken from [18, 21]); naturally, when we allow a smaller RE, that is, when we increase R, the estimator converges to the true value cn , as can be observed in leftmost plot of Fig. 1. In addition, the rightmost plot of Fig. 1 shows that regardless of the RE, the required number of independent SSA runs (R) divided by SAW’s length (n), is growing linearly with n. To further investigate the SSA convergence, we consider the two properties of SAW’s. In particular, the following holds [2, 10, 33, 34] 1 1. µ = limn→∞ cnn ∈ [µ, µ] = [2.62002, 2.679192495]. e n  n = ∆n . 2. ∆n = n 4 ≤ ∆n ≈ n3/4 = ∆ 1 Fig. 2 summarizes our results compared to these bounds. In particular, we run the SSA to achieve the 3% RE (for ĉn ) for 1 ≤ n ≤ 200. It can be clearly observed, that 1/n the estimator b cn converges toward the [µ, µ] interval as n grows. It is interesting to note that, at least for small n, ∆n seems to grow at a rate smaller than the suggested 3/4. µ 1/n b cn µ 2.9 2.8 50 40 30 en ∆ bn ∆ ∆n 20 2.7 10 2.6 50 100 n 150 1/n 6 Figure 2: The b cn Discussion 0 200 50 100 n 150 200 b n as a function of the SAW’s length n. and the ∆ In this paper we described a general procedure for multi-dimensional integration, the SSA, and applied it to various problems from different research domains. We showed that this method belongs to a very general class of SMC algorithms and developed its theoretical foundation. The proposed SSA is relatively easy to implement and 17 our numerical study indicates that the SSA yields good performance in practice. However, it is important to note that generally speaking, the efficiency of the SSA and similar sequential algorithms is heavily dependent on the mixing time of the corresponding Markov chains that are used for sampling. A rigorous analysis of the mixing time for different problems is thus of great interest. Finally, based on our numerical study, it will be interesting to apply the SSA to other practical problems. 7 Acknowledgements This work was supported by the Australian Research Council Centre of Excellence for Mathematical & Statistical Frontiers, under grant number CE140100049. References [1] Asmussen, S., and Glynn, P. W. Stochastic Simulation: Algorithms and Analysis. Applications of Mathematics. Springer Science and Business Media, LLC, 2007. [2] Beyer, W., and Wells, M. Lower bound for the connective constant of a self-avoiding walk on a square lattice. Journal of Combinatorial Theory, Series A 13, 2 (1972), 176–182. [3] Botev, Z., and Kroese, D. P. An efficient algorithm for rare-event probability estimation, combinatorial optimization, and counting. Methodology and Computing in Applied Probability 10, 4 (December 2008), 471–505. [4] Botev, Z. I., and Kroese, D. P. Efficient Monte Carlo simulation via the Generalized Splitting method. Statistics and Computing 22 (2012), 1–16. [5] Bullen, P. A Dictionary of Inequalities. Monographs and Research Notes in Mathematics. Taylor & Francis, Oxfordshire, 1998. [6] Chernoff, H. A Measure of Asymptotic Efficiency for Tests of a Hypothesis Based on the sum of Observations. Ann. Math. Statist. 23, 4 (12 1952), 493–507. [7] Chopin, N., and Robert, C. P. Properties of nested sampling. Biometrika 97, 3 (2010), 741–755. 18 [8] Del Moral, P., Doucet, A., and Jasra, A. Sequential Monte Carlo samplers. Journal of the Royal Statistical Society: Series B (Statistical Methodology) 68, 3 (2006), 411–436. [9] Duan, Q., and Kroese, D. P. Splitting for multi-objective optimization. Methodology and Computing in Applied Probability (June 2017), 1–17. [10] Duminil–Copin, H., and Hammond, A. Self-avoiding walk is sub-ballistic. Communications in Mathematical Physics 324, 2 (2013), 401–423. [11] Forsythe, G. E., Malcolm, M. A., and Moler, C. B. Computer methods for mathematical computations. Prentice-Hall series in automatic computation. Prentice-Hall, Englewood Cliffs (N.J.), 1977. [12] Friedman, H. A consistent Fubini-Tonelli theorem for nonmeasurable functions. Illinois J. Math. 24, 3 (1980), 390–395. [13] Gelman, A., Carlin, J. B., Stern, H. S., and Rubin, D. B. Bayesian Data Analysis, 3 ed. Taylor & Francis, Oxfordshire, July 2003. [14] Gilks, W. R., and Berzuini, C. Following a moving target - Monte Carlo inference for dynamic Bayesian models. Journal of the Royal Statistical Society: Series B (Statistical Methodology) 63, 1 (2001), 127–146. [15] Glasserman, P. Monte Carlo methods in financial engineering. Applications of mathematics. Springer, New York, 2004. Permire parution en dition broche 2010. [16] Glasserman, P., and Li, J. Importance sampling for portfolio credit risk. Management Science 51, 11 (2005), 1643–1656. [17] Gordon, N. J., Salmond, D. J., and Smith, A. F. M. Novel approach to nonlinear/non-Gaussian Bayesian state estimation. Radar and Signal Processing, IEE Proceedings F 140, 2 (Apr. 1993), 107–113. [18] Guttmann, A. J., and Conway, A. R. Square lattice self-avoiding walks and polygons. Annals of Combinatorics 5, 3 (2001), 319–345. [19] Heiss, F., and Winschel, V. Likelihood approximation by numerical integration on sparse grids. Journal of Econometrics 144, 1 (2008), 62–80. [20] Hoeffding, W. Probability inequalities for sums of bounded random variables. Journal of the American Statistical Association 58, 301 (1963), 13–30. 19 [21] Jensen, I. Enumeration of self-avoiding walks on the square lattice. Journal of Physics A: Mathematical and General 37, 21 (2004), 5503. [22] Jerrum, M., and Sinclair, A. The Markov chain Monte Carlo method: an approach to approximate counting and integration. In Approximation Algorithms for NP-hard Problems (Boston, 1996), D. Hochbaum, Ed., PWS Publishing, pp. 482–520. [23] Jerrum, M., Valiant, L. G., and Vazirani, V. V. Random Generation of Combinatorial Structures from a Uniform Distribution. Theor. Comput. Sci. 43 (1986), 169–188. [24] Kahn, H., and Harris, T. E. Estimation of particle Transmission by Random Sampling. National Bureau of Standards Applied Mathematics Series 12 (1951), 27–30. [25] Koller, D., and Friedman, N. Probabilistic Graphical Models: Principles and Techniques - Adaptive Computation and Machine Learning. The MIT Press, Cambridge, Massachusetts, 2009. [26] Kroese, D. P., Taimre, T., and Botev, Z. I. Handbook of Monte Carlo methods. John Wiley and Sons, New York, 2011. [27] Levin, D. A., Peres, Y., and Wilmer, E. L. Markov chains and mixing times. Providence, R.I. American Mathematical Society, 2009. With a chapter on coupling from the past by James G. Propp and David B. Wilson. [28] McGrayne, S. The Theory that Would Not Die: How Bayes’ Rule Cracked the Enigma Code, Hunted Down Russian Submarines, & Emerged Triumphant from Two Centuries of Controversy. Yale University Press, London, 2011. [29] Mitzenmacher, M., and Upfal, E. Probability and computing : randomized algorithms and probabilistic analysis. Cambridge University Press, New York, 2005. [30] Morokoff, W. J., and Caflisch, R. E. Quasi-Monte Carlo Integration. Journal of Computational Physics 122, 2 (1995), 218–230. [31] Morris, B., and Sinclair, A. Random walks on truncated cubes and sampling 0-1 knapsack solutions. SIAM Journal on Computing 34, 1 (2004), 195– 226. 20 [32] Newman, M., and Barkema, G. Monte Carlo Methods in Statistical Physics. Clarendon Press, Oxford, New York, 1999. [33] Nienhuis, B. Exact Critical Point and Critical Exponents of O(n) Models in Two Dimensions. Phys. Rev. Lett. 49 (Oct 1982), 1062–1065. [34] Noonan, J. New upper bounds for the connective constants of self-avoiding walks. Journal of Statistical Physics 91, 5 (1998), 871–888. [35] O’Hagan, A. Bayes-Hermite quadrature. Journal of Statistical Planning and Inference 29, 3 (1991), 245–260. [36] Roberts, G. O., Rosenthal, J. S., et al. General state space Markov chains and MCMC algorithms. Probability Surveys 1 (2004), 20–71. [37] Rubinstein, R. Y. The gibbs cloner for combinatorial optimization, counting and sampling. Methodology and Computing in Applied Probability 11, 4 (December 2009), 491–549. [38] Rubinstein, R. Y. Randomized algorithms with splitting: Why the classic randomized algorithms do not work and how to make them work. Methodology and Computing in Applied Probability 12, 1 (March 2010), 1–50. [39] Rubinstein, R. Y., and Kroese, D. P. Simulation and the Monte Carlo Method, 3 ed. John Wiley & Sons, New York, 2017. [40] Rubinstein, R. Y., Ridder, A., and Vaisman, R. Fast Sequential Monte Carlo Methods for Counting and Optimization. John Wiley & Sons, New York, 2013. [41] Russell, S., and Norvig, P. Artificial Intelligence: A Modern Approach, 3 ed. Prentice Hall, Englewood Cliffs (N.J.), 2009. [42] Skilling, J. Nested sampling for general Bayesian computation. Bayesian Anal. 1, 4 (12 2006), 833–859. [43] Vaisman, R., Kroese, D. P., and Gertsbakh, I. B. Splitting sequential Monte Carlo for efficient unreliability estimation of highly reliable networks. Structural Safety 63 (2016), 1 – 10. [44] Valiant, L. G. The complexity of enumeration and reliability problems. SIAM Journal on Computing 8, 3 (1979), 410–421. 21 Appendix A Technical arguments Proof of Theorem 1. Recall that Z1 , . . . , Zn is a partition of the set X , so from the law of total probability we have Ef [ϕ (X)] = n X t=1 Ef [ϕ (X) | X ∈ Zt ] Pf (X ∈ Zt ). b = Pn Z b By the linearity of expectation, and since Z t=1 t , it will be sufficient to show that for all t = 1, . . . , n, it holds that h i E Zbt = Ef [ϕ (X) | X ∈ Zt ] Pf (X ∈ Zt ) . To see this, we need the following. 1. Although that the samples in the Zt set for 1 ≤ t ≤ n are not independent due to MCMC and splitting usage, they still have the same distribution; that is, for all t, it holds that " # X ϕ(X) |Zt | = |Zt | Ef [ϕ (X) | X ∈ Zt ] . (10) E X∈Zt 2. From the unbiasedness of multilevel splitting [4, 26], it holds for all 1 ≤ t ≤ n that   t−1 h i  Y bt bj  = Pf (X ∈ Zt ) . E Pbt = E  1 − R R (11) j=0 Combining (10) and (11) with a conditioning on the cardinalities of the Zt sets, we complete the proof with: 22 " # h i h i X 1 b t Pbt = E Pbt E Zbt = E Φ ϕ(X) |Zt | X∈Zt ## " " X 1 ϕ(X) |Z0 |, . . . , |Zt | = E E Pbt |Zt | X∈Zt " " ## X 1 = E Pbt E ϕ(X) |Z0 |, . . . , |Zt | |Zt | X∈Zt   1 b = E Pt |Zt | Ef [ϕ (X) | X ∈ Zt ] |{z} |Zt | (10) h i = Ef [H (X) | X ∈ Zt ] E Pbt |{z} = Ef [H (X) | X ∈ Zt ] Pf (X ∈ Zt ) . (11)  Proof of Lemma 1. Recall that kb π − πkTV 1 sup = b − a ϕ : R→[a,b] Z ϕ(x) π b(dx) − Z ϕ(x) π(dx) , for any function ϕ : R → [a, b], (Proposition 3 in [36]). Hence, Eπ [X] − (b − a) εa εa ≤ Eπb [X] ≤ Eπ [X] + (b − a) . 4(b − a) 4(b − a) Combining this with the fact that X ≥ a, we arrive at 1− ε εa E [X] εa ε ≤1− ≤ πb ≤1+ ≤1+ . 4 4Eπ [X] Eπ [X] 4Eπ [X] 4 Next, since Eπb " # m 1 X Xi = Eπb [X] , m i=1 we can apply the [20] inequality, to obtain ! 1 Pm X ε ε i ≤1+ ≥ 1 − δ, P 1 − ≤ m i=1 4 Eπb [X] 4 for m= (12) (b − a)2 ln(2/δ) (b − a)2 ln(2/δ) ≥ . 2 2(ε/4)2 a2 2(ε/4)2 (Eπb [X]) 23 (13) Finally, we complete the proof by combining (12) and (13), to obtain: !   2  1 Pm X ε/2 2 Eπb [X] m ε/2 i i=1 P 1+ε≤ 1− ≤ ≤1+ε ≤ 1+ 2 Eπ [X] Eπb [X] 2 ! m 1 X = P (1 − ε)Eπ [X] ≤ Xi ≤ (1 + ε)Eπ [X] ≥ 1 − δ.  m i=1  Proof of Theorem 2. The proof of this theorem consists of the following steps.  1. In Lemma 2, we prove that an existence of an ε, nδ P -approximation to {zt }1≤t≤n implies an existence of an (ε, δ)-approximation to z = nt=1 zt .  δ -approximation to {ϕt }1≤t≤n 2. In Lemma 3, we prove that an existence of an 4ε , 2n  δ and {pt }1≤t≤n implies an ε, n -approximation existence to {zt }1≤t≤n .  δ -approximations to ϕt and pt 3. In Lemmas 1, 4 and 5, we provide the required 4ε , 2n for 1 ≤ t ≤ n.  Lemma 2 Suppose that for all t = 1, . . . , n, an ε, nδ -approximation to zt exists. Then,   P z(1 − ε) ≤ Zb ≤ z(1 + ε) ≥ 1 − δ.  Proof 6 From the assumption of the existence of the ε, nδ -approximation to zt for each 1 ≤ t ≤ n, we have     δ δ P Zbt − zt ≤ εzt ≥ 1 − , and P Zbt − zt > εzt < . n n By using Boole’s inequality (union bound), we arrive at n   X   bt − zt > εzt < n δ = δ, P ∃ t : Zbt − zt > εzt ≤ P Z n t=1 that is, it holds for all t = 1, . . . , n, that     bt − zt ≤ εzt = 1 − P ∃ t : Zbt − zt > εct ≥ 1 − δ, P ∀t : Z and hence, P (1 − ε) n X t=1 zt ≤ n X t=1 Zbt ≤ (1 + ε) n X t=1 24 zt !   b ∈≤ z(1 ± ε) ≥ 1 − δ. =P Z   δ Lemma 3 Suppose that for all t = 1, . . . , n, there exists an 4ε , 2n -approximation to ϕt and pt . Then,   δ P zt (1 − ε) ≤ Zbt ≤ zt (1 + ε) ≥ 1 − for all t = 1, . . . , n. n  δ Proof 7 By assuming an existence of 4ε , 2n -approximation to ϕt and pt , namely: ! ! bt Pbt Φ − 1 ≤ ε/4 ≥ 1 − δ/2n, and P − 1 ≤ ε/4 ≥ 1 − δ/2n, P ht pt and combining it with the union bound, we arrive at    2   2 b t Pbt ε/2 Φ ε/2   P 1 − ε ≤ 1 − ≤ ≤ 1+ ≤ 1 + ε ≥ 1 − δ/n, |{z} |{z} 2 ϕt pt 2 (∗) (∗) where (∗) follows from the fact that for any 0 < |ε| < 1 and n ∈ N we have     ε/2 n ε/2 n 1−ε≤ 1− and 1+ ≤ 1 + ε. n n (14) To see that n (14) holds, note that by using exponential inequalities from [5], we have that  ε/2 1− n ≥ 1 − 2ε ≥ 1 − ε. In addition, it holds that |eε − 1| < 7ε/4, and hence:   ε/2 n 7(ε/2) 1+ ≤ eε/2 ≤ 1 + ≤ 1 + ε. n 4   δ To complete the proof of Theorem 2, we need to provide 4ε , 2n -approximations to both ϕt and pt . However, at this stage we have to take into account a specific splitting strategy, since the SSA sample size bounds depend on the latter. Here we examine the independent setting, for which the samples in each {Xt }1≤t≤n set are independent. That is, we use multiple runs of the SSA at each stage (t = 1, . . . , n) of the algorithm execution. See Remark 1 for further details. Remark 2 (Lemma 1 for binary random variables) For a binary random variable X ∈ {0, 1}, with a known lower bound on its mean, Lemma 1 can be strengthened via the usage of [6] bound instead of the [20] inequality. In particular, the following holds. Let X ∼ π b(x) be a binary random variable and let X1 , . . . , Xm be its independent realizations. Then, provided that Eπb [X] ≥ E0πb [X], kb π − πkTV ≤ ε E0πb [X] , 4 and m ≥ 25 3 ln(2/δ) , (ε/4)2 (E0πb [X])2 it holds that: m 1 X P (1 − ε)Eπ [X] ≤ Xi ≤ (1 + ε)Eπ [X] m i=1 ! ≥ 1 − δ. The corresponding proof is almost identical to the one presented in Lemma 1. The major difference is the bound on the sample size in (13), which is achieved via the Chernoff bound from [29, Theorem 10.1] instead of Hoeffding’s inequality. Lemma 4 Suppose that at = minx∈Zt {ϕ(x)}, bt = maxx∈Zt {ϕ(x)} for all t = 1, . . . , n. Then, provided that the samples in the Zt set are independent, and are distributed according to νbt such that kb νt − νt kTV ≤ ε at , 16(bt − at ) b t = |Zt |−1 P then Φ X∈Zt ϕ(X) is an and ε δ 4 , 2n  |Zt | ≥ 128(bt − at )2 ln(4n/δ) , ε2 a2t -approximation to ϕt . Proof 8 The proof is an immediate consequence of Lemma 1. In particular, note that kb νt − νt kTV ≤ and that |Zt | ≥ ε 4 at ε at = , 4(bt − at ) 16(bt − at ) δ ) (bt − at )2 ) ln(2/ 2n 128(bt − at )2 ln(4n/δ) = . 2( 4ε /4)2 a2 ε2 a2t  Lemma 5 Suppose that the samples in the Xt set are independent, and are distributed according to µ bt , such that 3072 n2 ln(4n2 /δ) , ε2 r2t  δ where rt = min {rt , 1 − rt } for 1 ≤ t ≤ n. Then, Pbt is an 4ε , 2n -approximation to pt . kb µt − µt kTV ≤ ε rt , 32n and |Xt | ≥   bt Qt−1 R b Proof 9 Recall that Pbt = 1 − R j=0 j for t = 1, . . . , n. Again, by combining the union bound with (14),  we conclude that the desired approximation to pt can be obtained by ε deriving the 8n , 2nδ 2 -approximations for each rt and 1 − rt . In this case, the probability bt /rt satisfies 1 − ε/8n ≤ R bt /rt ≤ 1 + ε/8n is at least 1 − δ/2n2 . that for all t = 1, . . . , n, R bt )/(1 − rt ), and thus, we arrive at: The same holds for (1 − R !  n n ε ε bt  /2 /2 P P 1 − ε/4 ≤ 1 − 4 ≤ ≤ 1+ 4 ≤ 1 + ε/4 ≥ 1 − δ/2n. n pt n 26 bt and (1 − R bt ) are easily achieved via Remark 2. In particular, The bounds for each R  ε it is not very hard to verify that in order to get an 8n , 2nδ 2 -approximation, it is sufficient to take ε r ε rt , kb µt − µt kTV ≤ 8n t = 4 32n and  3 ln 2/ 2nδ 2 3072 n2 ln(4n2 /δ) |Xt | ≥ = .  ε ( 8n /4)2 ε2 r2t Lemma 6 Suppose without loss of generality that w = (w1 , . . . , wk ) satisfies w1 ≤ w2 ≤ · · · ≤ wk , that is w = w1 . Then, for Xb and Xb−w1 sets defined via (7), it holds that: r= |Xb−w1 | 1 ≥ . |Xb | k+1 Proof 10 For any b ∈ R and x = (x1 , . . . , xk ), define a partition of Xb via (w1 ) Xb = {x ∈ Xb : x1 = 1}, and (−w1 ) Xb = {x ∈ Xb : x1 = 0}. Then, the following holds. (w1 ) 1. For any x ∈ Xb in (−w ) Xb−w11 , replace x1 = 1 with x1 = 0, and note that the resulting vector is (w1 ) (−w ) set, since its performance is at most b − w1 , that is Xb ≤ Xb−w11 . (−w ) Similarly, for any x ∈ Xb−w11 , setting x1 = 1 instead of x1 = 0, results in a vector (w1 ) which belongs to the Xb set. That is: (w1 ) Xb (−w ) = Xb−w11 . (15) (w ) 2. For any x ∈ Xb 1 , replace x1 = 1 with x1 = 0 and note that the resulting vector is (−w ) (w ) (−w ) (−w ) now in the Xb 1 set, that is |Xb 1 | ≤ |Xb 1 |. In addition, for any x ∈ Xb 1 , there are at most k − 1 possibilities to replace x’s non-zero entry with zero and (w ) (−w ) set x1 = 1, such that the result will be in the Xb 1 set. That is, Xb 1 ≤ (w1 ) (k − 1) Xb + 1, (where +1 stands for the vector of zeros), and we arrive at (w1 ) Xb (−w1 ) ≤ Xb (w1 ) ≤ (k − 1) Xb 27 (w1 ) + 1 ≤ k Xb . (16) Combining (15) and (16), we complete the proof by noting that (w ) (−w ) (−w ) Xb−w11 Xb−w1 1 + Xb−w11 |Xb−w1 | ≥ = (w ) (−w ) (w ) (−w ) |Xb | Xb 1 + Xb 1 Xb 1 + X b 1 (w1 ) = |{z} Xb (w1 ) (15),(16) Xb +k (w ) Xb 1 = 1 . k+1  28
10math.ST
Cloud-aided collaborative estimation by ADMM-RLS algorithms for connected vehicle prognostics Technical Report TR-2017-01 arXiv:1709.07972v1 [cs.SY] 22 Sep 2017 Valentina Breschi∗, Ilya Kolmanovsky†, Alberto Bemporad∗ September 26, 2017 Abstract As the connectivity of consumer devices is rapidly growing and cloud computing technologies are becoming more widespread, cloud-aided techniques for parameter estimation can be designed to exploit the theoretically unlimited storage memory and computational power of the “cloud”, while relying on information provided by multiple sources. With the ultimate goal of developing monitoring and diagnostic strategies, this report focuses on the design of a Recursive Least-Squares (RLS) based estimator for identification over a group of devices connected to the “cloud”. The proposed approach, that relies on Node-to-Cloud-to-Node (N2C2N) transmissions, is designed so that: (i) estimates of the unknown parameters are computed locally and (ii) the local estimates are refined on the cloud. The proposed approach requires minimal changes to local (pre-existing) RLS estimators. 1 Introduction With the increasing connectivity between devices, the interest in distributed solutions for estimation [13], control [5] and machine learning [4] has been rapidly growing. In particular, the problem of parameter estimation over networks has been extensively studied, especially in the context of Wireless Sensor Networks (WSNs). The methods designed to solve this identification problem can be divided into three groups: incremental approaches [10], diffusion approaches [3] and consensus-based distributed strategies [11]. Due to the low communication power of the nodes in WSNs, research has mainly been devoted to obtain fully distributed approaches, i.e. methods that allow exchanges of information between neighbor nodes only. Even though such a choice enables to reduce multi-hop transmissions and improve robustness to node failures, these strategies allows only neighbor nodes to communicate and thus to reach consensus. The results in the report have been partially presented in a paper submitted to ACC 2018. ∗ Valentina Breschi and Alberto Bemporad are with the IMT School for Advanced Studies Lucca, Piazza San Francesco 19, 55100 Lucca, Italy. [email protected]; [email protected] † Ilya Kolmanovsky is with the Department of Aerospace Engineering, University of Michigan, Ann Arbor, MI 48109, USA. [email protected] 1 Global Updates CLOUD Communication Layer Broadcast Global Updates Collect information ······ ······ Local Updates Figure 1: Cloud-connected vehicles. As a consequence, to attain consensus on the overall network, its topology has to be chosen to enable exchanges of information between the different groups of neighbor nodes. At the same time, with recent advances in cloud computing [12] it has now become possible to acquire and release resources with minimum effort so that each node can have on-demand access to shared resources, theoretically characterized by unlimited storage space and computational power. This motivates to reconsider the approach towards a more centralized strategy where some computations are performed at the node level, while the most time and memory consuming ones are executed “on the cloud”. This requires the communication between the nodes and a fusion center, i.e. the “cloud”, where the data gathered from the nodes are properly merged. Cloud computing has been considered for automotive vehicle applications in [7][8] and [14]. As motivating example for another possible automotive application, consider a vehicle fleet with vehicles connected to the “cloud” (see Figure 1). In such a setting, measurements taken on-board of the vehicles can be used for cloud-based diagnostics and prognostics purposes. In particular, the measurements can be used to estimate parameters that may be common to all vehicles, such as parameters in components wear models or fuel consumption models, and parameters that may be specific to individual vehicles. References [15] and [6] suggest potential applications of such approaches for prognostics of automotive fuel pumps and brake pads. Specifically, the component wear rate as a function of the workload (cumulative fuel flow or energy dissipated in the brakes) can be common to all vehicles or at least to all vehicles in the same class. A related distributed diagnostic technique has been proposed in [1]. However it relies on a fully-distributed scheme, introduced to reduce long distance transmissions and to avoid the presence of a “critic” node in the network, i.e. a node whose failure causes the entire diagnostic strategy to fail. 2 In this report a centralized approach for recursive estimation of parameters in the least-squares sense is presented. The method has been designed under the hypothesis of (i) ideal transmission, i.e. the information exchanged between the cloud and the nodes is not corrupted by noise, and the assumption that (ii) all the nodes are described by the same model, which is supposed to be known a priori. Differently from what is done in many distributed estimation methods (e.g. see [11]), where the nodes estimate common unknown parameters, the strategy we propose allows to account for more general consensus constraint. As a consequence, for example, the method can be applied to problems where only a subset of the unknowns is common to all the nodes, while other parameters are purely local, i.e. they are different for each node. Our estimation approach is based on defining a separable optimization problem which is then solved through the Alternating Direction Method of Multipliers (ADMM), similarly to what has been done in [11] but in a somewhat different setting. As shown in [11], the use of ADMM leads to the introduction of two time scales based on which the computations have to be performed. In particular, the local time scale is determined by the nodes’ clocks, while the cloud time scale depends on the characteristics of the resources available in the center of fusion and on the selected stopping criteria, used to terminate the ADMM iterations. The estimation problem is thus solved through a two-step strategy. In particular: (i) local estimates are recursively retrieved by each node using the measurements acquired from the sensors available locally; (ii) global computations are performed to refine the local estimates, which are supposed to be transmitted to the cloud by each node. Note that, based on the aforementioned characteristics, back and forth transmissions to the cloud are required. A transmission scheme referred to as Node-to-Cloud-to-Node (N2C2N) is thus employed. The main features of the proposed strategies are: (i) the use of recursive formulas to update the local estimates of the unknown parameters; (ii) the possibility to account for the presence of both purely local and global parameters, that can be estimated in parallel; (iii) the straightforward integration of the proposed techniques with pre-existing Recursive Least-Squares (RLS) estimators already running on board of the nodes. The report is organized as follows. In Section 2 ADMM is introduced, while in Section 3 is devoted to the statement of the considered problem. The approach for collaborative estimation with full consensus is presented in Section 4, along with the results of simulation examples that show the effectiveness of the approach and its performance in different scenarios. In Section 5 and Section 6 the methods for collaborative estimation with partial consensus and for constrained collaborative estimation with partial consensus are described, respectively. Results of simulation examples are also reported. Concluding remarks and directions for future research are summarized in Section 7. 1.1 Notation Let Rn be the set of real vectors of dimension n and R+ be the set of positive real number, excluding zero. Given a set A, let Ă be the complement of A. Given a vector a ∈ Rn , kak2 is the Euclidean norm of a. Given a matrix 3 A ∈ Rn×p , A0 denotes the transpose of A. Given a set A, let PA denote the Euclidean projection onto A. Let In be the identity matrix of size n and 0n be an n-dimensional column vector of ones. 2 Alternating Direction Method of Multipliers The Alternating Direction Method of Multipliers (ADMM) [2] is an algorithm tailored for problems in the form minimize f (θ)+ subject to Aθ + Bz = c, (1) where θ ∈ Rnθ , z ∈ Rnz , f : Rnθ → R ∪ {+∞} and g : Rnz → R ∪ {+∞} are closed, proper, convex functions and A ∈ Rp×nθ , B ∈ Rp×nz , c ∈ Rp . To solve Problem (1), the ADMM iterations to be performed are θ(k+1) = argmin L(θ, z (k) , δ (k) ), (2) θ z (k+1) = argmin L(θ(k+1) , z, δ (k) ), δ (k+1) = δ z (k) (3) + ρ(Aθ(k+1) + Bz (k+1) − c), (4) where k ∈ N indicates the ADMM iteration, L is the augmented Lagrangian associated to (1), i.e. L(θ, z, δ) = f (θ) + g(z) + δ 0 (Aθ + Bz − c) + ρ 2 kAθ + Bz − ck2 , 2 (5) δ ∈ Rp is the Lagrange multiplier and ρ ∈ R+ is a tunable parameter (see [2] for possible tuning strategies). Iterations (2)-(4) have to be run until a stopping criteria is satisfied, e.g. the maximum number of iterations is attained. It has to be remarked that the convergence of ADMM to high accuracy results might be slow (see [2] and references therein). However, the results obtained with a few tens of iterations are usually accurate enough for most of applications. For further details, the reader is referred to [2]. 2.1 ADMM for constrained convex optimization Suppose that the problem to be addressed is min f (θ) θ s.t. (6) θ ∈ C, with θ ∈ Rnθ , f : Rnθ → R ∪ {+∞} being a closed, proper, convex function and C being a convex set, representing constraints on the parameter value. As explained in [2], (6) can be recast in the same form as (1) through the introduction of the auxiliary variable z ∈ Rnθ and the indicator function of set C, i.e. ( 0 if z ∈ C g(z) = . (7) +∞ otherwise 4 In particular, (6) can be equivalently stated as min f (θ) + g(z) θ,z (8) θ − z = 0. s.t. Then, the ADMM scheme to solve (8) is θ(k+1) = argmin L(θ, z (k) , δ (k) ), (9) θ z (k+1) = PC (θ(k+1) + δ (k) ), (10) δ (k+1) = δ (k) + ρ(θ(k+1) − z (k+1) ) (11) with L equal to ρ L(θ, z, δ) = f (θ) + g(z) + δ 0 (θ − z) + kθ − zk22 2 2.2 ADMM for consensus problems Consider the optimization problem given by min g θ N X fn (θg ), (12) n=1 where θg ∈ Rnθ and each term of the objective, i.e. fn : Rnθ → R ∪ {+∞}, is a proper, closed, convex function. Suppose that N processors are available to solve (12) and that, consequently, we are not interested in a centralized solution of the consensus problem. As explained in [2], ADMM can be used to reformulate the problem so that each term of the cost function in (12) is handled by its own. In particular, (12) can be reformulated as N X minimize fn (θn ) (13) n=1 θn − θ g = 0 subject to n = 1, . . . , N. Note that, thanks to the introduction of the consensus constraint, the cost function in (13) is now separable. The augmented Lagrangian correspondent to (13) is given by g N L({θn }N n=1 , θ , {δn }n=1 ) = N  X fn (θn ) + δn0 (θn − θg ) + n=1  ρ 2 kθn − θg k2 , (14) 2 and the ADMM iterations are θn(k+1) = argmin Ln (θn , δn(k) , θg,(k) ), n = 1, . . . , N (15) θn  N  1 X (k+1) 1 (k) θn + δn , N n=1 ρ   = δn(k) + ρ θn(k+1) − θg,(k+1) , n = 1, . . . , N θg,(k+1) = (16) δn(k+1) (17) 5 with ρ Ln = fn (θn ) + (δn )0 (θn − θg ) + kθn − θg k22 . 2 Note that, on the one hand (15) and (17) can be carried out independently by each agent n ∈ {1, . . . , N }, (16) depends on all the updated local estimates. The global estimate should thus be updated in a “fusion center”, where all the local estimates are collected and merged. 3 Problem statement Assume that (i) measurements acquired by N agents are available and that (ii) the behavior of the N data-generating systems is described by the same known model. Suppose that some parameters of the model, θn ∈ Rnθ with n = 1, . . . , N , are unknown and that their value has to to be retrieved from data. As the agents share the same model, it is also legitimate to assume that (iii) there exist a set of parameters θg ∈ Rng , with ng ≤ nθ , common to all the agents. We aim at (i) retrieving local estimates of {θn }N n=1 , employing information available at the local level only, and (ii) identifying the global parameter θg at the “cloud” level, using the data collected from all the available sources. To accomplish these tasks (i) N local processors and (ii) and a “cloud”, where the data are merged are needed. The considered estimation problem can be cast into a separable optimization problem, given by N X min fn (θn ) θn s.t. n=1 F (θn ) = θg , (18) θn ∈ Cn , n = 1, . . . , N nθ where fn : R → R∪{+∞} is a closed, proper, convex function, F : Rnθ → Rng is a nonlinear operator and Cn ⊂ Rnθ is a convex set representing constraints on the parameter values. Note that, constraints on the value of the global pa˘ with θ ∈ C. rameter can be enforced if Cn = C ∪ {Cn ∩ C}, Assume that the available data are the output/regressor pairs collected from each agent n ∈ {1, . . . , N } over an horizon of length T ∈ N, i.e. {yn (t), Xn (t)}Tt=1 . Relying on the hypothesis that the regressor/output relationship is well modelled as yn (t) = Xn (t)0 θn + en (t), (19) with en (t) ∈ Rny being a zero-mean additive noise independent of the regressor Xn (t) ∈ Rnθ ×ny , we will focus on developing a recursive algorithm to solve (18) with the local cost functions given by T fn (θn ) = 1 X T −t 2 λ kyn (t) − Xn (t)0 θn k2 . 2 t=1 n 6 (20) The forgetting factor λn ∈ (0, 1] is introduced to be able to estimate timevarying parameters. Note that different forgetting factors can be chosen for different agents. Remark 1 ARX models Suppose that an AutoRegressive model with eXogenous inputs (ARX) has to be identified from data. The input/output relationship is thus given by y(t) = θ1 y(t − 1) + . . . + θna y(t − na )+ + θna +1 u(t − nk − 1) + . . . + θna +nb u(t − nk − nb ) + e(t) (21) where u is the deterministic input, {na , nb } indicate the order of the system, nk is the input/output delay. Note that (21) can be recast as the output/regressor relationship with the regressor defined as  0 X(t) = y(t − 1)0 . . . y 0 (t − na ) u(t − nk − 1)0 . . . u(t − nk − nb )0 (22) It is worth to point out that, in the considered framework, the parameters na , nb and nk are the same for all the N agents, as they are supposed to be described by the same model.  4 Collaborative estimation for full consensus Suppose that the problem to be solve is (12), i.e. we are aiming at achieving full consensus among N agents. Consequently, the consensus constraint in (18) has to be modified as F (θn ) = θg → θn = θg and Cn = Rnθ , so that θn ∈ Cn can be neglected for n = 1, . . . , N . Moreover, as we are focusing on the problem of collaborative least-squares estimation, we are interested in the particular case in which the local cost functions in (13) are equal to (20) . Even if the considered problem can be solved in a centralized fashion, our goal is to obtain estimates of the unknown parameters both (i) at a local level and (ii) on the “cloud”. With the objective of distributing the computation among the local processors and the “cloud”, we propose 5 approaches to address (13). 4.1 Greedy approaches All the proposed ‘greedy’ approaches rely on the use, by each local processor, of the standard Recursive Least-Squares (RLS) method (see [9]) to update the N local estimates, {θ̂n }N n=1 . Depending on the approach, {θ̂n }n=1 are then combined on the “cloud” to update the estimate of the global parameter. The first two methods that are used to compute the estimates of the unknown parameters both (i) locally and (ii) on the “cloud” are: 7 {θ̂1 (0), φ1 (0)} #1 φ1 (0) {θ̂N (0), φN (0)} ··· θ̂1 (t) or {θ̂1 (t), φ1 (t)} ··· #1 #N θ̂N (t) or {θ̂N (t), φN (t)} θ̂g φN (0) θ̂1 (t) or {θ̂1 (t), φ1 (t)} CLOUD θ̂og θ̂g #N θ̂N (t) or {θ̂N (t), φN (t)} θ̂g CLOUD θ̂g (a) S-RLS and SW-RLS (b) M-RLS and MW-RLS Figure 2: Greedy approaches. Schematic of the information exchanges between the agents and the “cloud”. 1. Static RLS (S-RLS) The estimate of the global parameter is computed as N 1 X g θ̂ = θ̂n (t). (23) N n=1 2. Static Weighted RLS (SW-RLS) Consider the matrices {φn }N n=1 , obtained applying standard RLS at each node (see [9]), and assume that g {φn }N n=1 are always invertible. The estimate θ̂ is computed as the weighted average of the local estimates θ̂g = N X !−1 φn (t)−1 n=1 N X ! φn (t)−1 θ̂n (t) . (24) n=1 Considering that φn is an indicator of the accuracy of the nth local estimate, (24) allows to weight more the “accurate ” estimates then the “inaccurate” ones. S-RLS and SW-RLS allow to achieve our goal, i.e. (i) obtain a local estimate of the unknowns and (ii) compute θ̂g using all the information available. However, looking at the scheme in Figure 2(a) and at Algorithm 1, it can be noticed that the global estimate is not used at a local level. Thanks to the dependence of θ̂g on all the available information, the local use of the global estimate might enhance the accuracy of {θ̂n }N n=1 . Motivated by this observation, we introduce two additional methods: 4. Mixed RLS (M-RLS) 5. Mixed Weighted RLS (MW-RLS) While M-RLS relies on (23), in MW-RLS the local estimates are combined as in (24). However, as shown in Figure 2(b) and outlined in Algorithm 2, the global estimate θ̂g is fed to the each local processor and used to update the local estimates instead of their values at the previous step. Note that, especially at 8 Algorithm 1 S-RLS and SW-RLS Input: Sequence of observations {Xn (t), yn (t)}Tt=1 , initial matrices φn (0) ∈ nθ ×nθ , initial estimates θ̂n (0) ∈ Rnθ , n = 1, . . . , N R 1. for t = 1, . . . , T do Local 1.1. for n = 1, . . . , N do 1.1.1. compute Kn (t), φn (t) and θ̂n (t) with standard RLS [9]; 1.2. end for; Global 1.1. compute θ̂g ; 2. end. Output: Local estimates {θ̂n (t)}Tt=1 , n = 1, . . . , N , estimated global parameters {θ̂g (t)}Tt=1 . Algorithm 2 M-RLS and MW-RLS Input: Sequence of observations {Xn (t), yn (t)}Tt=1 , initial matrices φn (0) ∈ nθ ×nθ R , n = 1, . . . , N , initial estimate θ̂og . 1. for t = 1, . . . , T do Local 1.1. for n = 1, . . . , N do 1.1.1. set θ̂n (t − 1) = θ̂g (t − 1); 1.1.2. compute Kn (t), φn (t) and θ̂n (t) with standard RLS [9]; 1.2. end for; Global 1.1. compute θ̂g ; 2. end. Output: Local estimates {θ̂n (t)}Tt=1 , n = 1, . . . , N , estimated global parameters {θ̂g (t)}Tt=1 . the beginning of the estimation horizon, the approximation made in M-RLS and MW-RLS might affect negatively some of the local estimates, e.g. the ones obtained by the agents characterized by a relatively small level of noise. Remark 2 While S-RLS and M-RLS require the local processors to transmit N to the “cloud” only {θ̂n }N n=1 , the pairs {θ̂n , φn }n=1 have to be communicated to the “cloud” with both SW-RLS and MW-RLS (see (23) and (24), respectively). Moreover, as shown in Figure 2, while S-RLS and SW-RLS require Node-toCloud-to-Node (N2C2N) transmissions, M-RLS and MW-RLS are based on a 9 Node-to-Cloud (N2C) communication policy. 4.2  ADMM-based RLS (ADMM-RLS) for full consensus Instead of resorting to greedy methods, we propose to solve (12) with ADMM. Note that the same approach has been used to develop a fully distributed scheme for consensus-based estimation over Wireless Sensor Networks (WSNs) in [11]. However, our approach differs from the one introduced in [11] as we aim at exploiting the “cloud” to attain consensus and, at the same time, we want local estimates to be computed by each node. As the problem to be solved is equal to (13), the ADMM iterations to be performed are (15)-(17), i.e. o n ρ θ̂n (T )(k+1) = argmin fn (θn ) + (δn(k) )0 (θn − θ̂g,(k) ) + kθn − θ̂g,(k) k22 , 2 θn   N 1 X (k+1) 1 (k) θ + δn , θ̂g,(k+1) = N n=1 n ρ   δn(k+1) = δn(k) + ρ θ̂n(k+1) (T ) − θ̂g,(k+1) , n = 1, . . . , N with the cost functions fn defined as in (14) and where the dependence on T of the local estimates is stressed to underline that only the updates of θ̂n are directly influenced by the current measurements. Note that the update for θ̂g is a combination of the mean of the local estimates, i.e. (23), and the mean of the Lagrange multipliers. As (16)-(17) are independent from the specific choice of fn (θn ), we focus on the update of the local estimates, i.e. (15), with the ultimate goal of finding recursive updates for θ̂n . Thanks to the characteristics of the chosen local cost functions, the closedform solution for the problem in (15) is given by   θ̂n(k+1) (T ) = φn (T ) Yn (T ) − δn(k) + ρθ̂g,(k) , (25) Yn (t) = t X λt−τ n Xn (τ )yn (τ ), t = 1, . . . , T, (26) τ =1 φn (t) = t X !−1 0 λt−τ n Xn (τ )(Xn (τ )) + ρInθ , t = 1, . . . , T. (27) τ =1 With the aim of obtaining recursive formulas to update θ̂n , consider the local estimate obtained at T − 1, which is given by   θ̂n (T − 1) = φn (T − 1) Yn (T − 1) + ρθ̂g (T − 1) − δn (T − 1) , (28) with δn (T −1) and θ̂g (T −1) denoting the Lagrange multiplier and the global es(k) timate computed at T −1, respectively. It has then to be proven that θ̂n (T −1) can be computed as a function of θ̂(T − 1), yn (T ) and Xn (T ). 10 Consider the inverse matrix φn (27), given by φn (T )−1 = Xn (T ) + ρInθ , Xn (t) = t X 0 λt−τ n Xn (τ )(Xn (τ )) . τ =1 Based on (27), it can be proven that φn (T )−1 can be computed as a function of φn (T − 1)−1 . In particular: φn (T )−1 = Xn (T ) + ρInθ = = λn Xn (T − 1) + Xn (T )(Xn (T ))0 + ρInθ = = λn [Xn (T − 1) + ρInθ ] + Xn (T )(Xn (T ))0 + (1 − λn )ρInθ = = λn φn (T − 1)−1 + Xn (T )(Xn (T ))0 + (1 − λn )ρInθ . Introducing the extended regressor vector X̃n (T ) p   X̃n (T ) = Xn (T ) (1 − λn )ρInθ ∈ Rnθ ×(ny +nθ ) , (29) (30) (29) can then be further simplified as φn (T )−1 = λn φn (T − 1)−1 + X̃n (T )(X̃n (T ))0 . Applying the matrix inversion lemma, the resulting recursive formulas to update φn are Rn (T ) = λn I(ny +nθ ) + (X̃n (T ))0 φn (T − 1)X̃n (T ), −1 Kn (T ) = φn (T − 1)X̃n (T )(Rn (T )) ,   0 φn (T ) = λ−1 I − K (T )( X̃ (T )) φn (T − 1). n n n n θ (31) (32) (33) Note that the gain Kn and matrix φn are updated as in standard RLS (see [9]), with the exceptions of the increased dimension of the identity matrix in (31) and the substitution of the regressor with X̃n . Only when λn = 1 the regressor Xn and X̃n are equal. Moreover, observe that (31)-(33) are independent from k and, consequently, {Rn , Kn , φn }N n=1 can be updated once fer step t. Consider again (25). Adding and subtracting h i λn φn (T ) ρθ̂g (T − 1) − δn (T − 1) to (25), the solution of (15) corresponds to h   θ̂n(k+1) (T ) = φn (T ) λn Yn (T − 1) − δn (T − 1) + ρθ̂g (T − 1) +    i +Xn (T )yn (T ) − δn(k) − λn δn (T − 1) + ρ θ̂g,(k) − λn θ̂g (T − 1) = = θ̂nRLS (T ) + θ̂nADM M,(k+1) (T ), (34) with n   θ̂nRLS (T ) = φn (T ) λn Yn (T − 1) + ρθ̂g (T − 1) − δn (T − 1) + +Xn (T )yn (T )} , i h (k+1) (k+1) = φn (T ) ρ∆g,λn (T ) − ∆λn (T ) , θ̂nADM M,(k+1) (T ) 11 (35) (36) and g,(k) ∆k+1 − λn θ̂g (T − 1), g,λn (T ) = θ̂ (k+1) ∆λn (T ) = δn(k) − λn δn (T − 1). (37) (38) Observe that (36) is independent from the past data-pairs {yn (t), Xn (t)}Tt=1 , while (35) depends on Yn (T − 1). Aiming at obtaining recursive formulas to update θ̂n , the dependence of (35) should be eliminated. Consider (35). Exploiting (33) and (28), θ̂nRLS (T ) is given by n o θ̂nRLS (T ) = φn (T − 1) Yn (T − 1) + ρθ̂g (T − 1) − δn (T − 1) + n o − Kn (T )(X̃n (T )0 )φn (T − 1) Yn (T − 1) + ρθ̂g (T − 1) − δn (T − 1) + + φn (T )Xn (T )yn (T ) = = θ̂n (T − 1) − Kn (T )(X̃n (T ))0 θ̂n (T − 1) + φn (T )Xn (T )yn (T ). (39) For (39) to be dependent on the extended regressor only, we define the extended measurement vector  0 ỹn (T ) = (yn (T ))0 01×ng . The introduction of ỹn yields (39) can be modified as θ̂nRLS (T ) = θ̂n (T − 1) − Kn (T )(X̃n (T ))0 θ̂n (T − 1) + φn (T )X̃n (T )ỹn (T ). Notice that the equality φn (T )X̃n (T ) = Kn (T ) holds and it can be proven as follows   0 φn (T )X̃n (T ) = λ−1 I − K (T )( X̃ (T )) φn (T − 1)X̃n (T ) = n n n n θ   = λ−1 Inθ − φn (T − 1)X̃n (T )(Rn (T ))−1 (X̃n (T ))0 φn (T − 1)X̃n (T ) = n   −1 −1 0 = φn (T − 1)X̃n (T ) λ−1 I − λ (R (T )) ( X̃ (T )) φ (T − 1) X̃ (T ) = n n n n n n n θ = φn (T − 1)X̃n (T ) λ−1 n Inθ +  0 −1 −λ−1 (X̃n (T ))0 φn (T − 1)X̃n (T ) = n (λn I(ny +nθ ) + (X̃n (T )) φn (T − 1)X̃n (T ))  −1 −1 0 −1 = φn (T − 1)X̃n (T ) λ−1 n Inθ − λn (I(ny +nθ ) + λn (X̃n (T )) φn (T − 1)X̃n (T )) ·  ·(X̃n (T ))0 φn (T − 1)X̃n (T )λn−1 =  −1 = φn (T − 1)X̃n (T ) λn Inθ + (X̃n (T ))0 φn (T − 1)X̃n (T ) = Kn (T ), where the matrix inversion lemma and (32)-(33) are used. It can thus be proven that θ̂nRLS can be updated as θ̂nRLS (T ) = θ̂n (T − 1) + Kn (T )(ỹn (T ) − X̃n (T )0 θ̂n (T − 1)). (40) While the update for θ̂nADM M (36) depends on both the values of the Lagrange multipliers and the global estimates, θ̂nRLS (40) is computed on the basis 12 φ1 (0) ··· #1 θ̂1 (t) φN (0) #N {θ̂1RLS (t), φ1 (t)} RLS {θ̂N (t), φN (t)} CLOUD θ̂N (t) {θ̂nADMM }N n=1 θ̂g , δn , {θ̂n (t)}N n=1 Figure 3: ADMM-RLS. Schematic of the information exchanges between the agents and the “cloud”when using a N2C2N communication scheme. of the previous local estimate and the current measurements. Consequently, θ̂nRLS is updated recursively. Under the hypothesis that both θ̂g and δn are stored on the “cloud”, it does seems legitimate to update θ̂g and δn on the “cloud”, along with θ̂nADM M . Instead, the partial estimates θ̂nRLS , n = 1, . . . , N , can be updated by the local processors. Thanks to this choice, the proposed method, summarized in Algorithm 3 and Figure 3, allows to obtain estimates both at the (i) agent and (ii) “cloud” level. Observe that, thanks to the independence of (40) from k, θ̂nRLS can be updated once per step t. The local updates are thus regulated by a local clock and not by the one controlling the ADMM iterations on the “cloud”. Looking at (31)-(33) and (40), it can be noticed that θ̂nRLS is updated through standard RLS, with the exceptions that, at step t ∈ {1, . . . , T }, the update depends on the previous local estimate θ̂n (t−1) instead of depending on θ̂nRLS (t−1) and that the output/regressor pair {yn (t), Xn (t)} is replaced with {ỹn (t), X̃n (t)}. As a consequence, the proposed method can be easily integrated with preexisting RLS estimators already available locally. Remark 3 Algorithm 1 requires the initialization of the local and global estimates. If some data are available to be processed in a batch mode, θ̂n (0) can be chosen as the best linear model, i.e. θ̂n (0) = argmin θn τ X kyn (t) − Xn (t)0 θk22 t=1 and θ̂g (0) can be computed as the mean of {P θ̂n (0)}N n=1 . Moreover, the matrices φn , n = 1, . . . , N , can be initialized as φn (0) = γInθ , with γ > 0.  Remark 4 The chosen implementation requires θ̂nRLS and φn to be transmitted from the local processors to the “cloud” at each step, while the “cloud”has to communicate θ̂n to all the agents. As a consequence, the proposed approach is based on N2C2N transmissions.  13 Algorithm 3 ADMM-RLS for full consensus (N2C2N) Input: Sequence of observations {Xn (t), yn (t)}Tt=1 , initial matrices φn (0) ∈ Rnθ ×nθ , initial local estimates θ̂n (0), initial dual variables δn,o , n = 1, . . . , N , initial global estimate θ̂og , parameter ρ ∈ R+ . 1. for t = 1, . . . , T do Local 1.1. for n = 1, . . . , N do 1.1.1. compute X̃n (t) as in (30); 1.1.2. compute Kn (t) and φn (t) with (32) - (33); 1.1.3. compute θ̂nRLS (t) with (40); 1.2. end for; Global 1.1. do ADM M,(k+1) (t) with (36), n = 1, . . . , N ; 1.1.1. compute θ̂n 1.1.2. compute θ̂g,(k+1) (t) with (16); (k+1) with (17), n = 1, . . . , N ; 1.1.3. compute δn 1.2. until a stopping criteria is satisfied (e.g. maximum number of iterations attained); 2. end. Output: Estimated global parameters {θ̂g (t)}Tt=1 , estimated local parameters {θ̂n (t)}Tt=1 , n = 1, . . . , N . 4.3 Example 1. Static parameters Suppose that N data-generating systems are described by the following models yn (t) = 0.9yn (t − 1) + 0.4un (t − 1) + en (t), (41) 0 where yn (t) ∈ R, Xn (t) = [ yn (t−1) un (t−1) ] , un is known and is generated in this example as a sequence of i.i.d. elements uniformly distributed in the interval [ 2 3 ] and en ∼ N (0, Rn ) is a white noise sequence, with {Rn ∈ N}N n=1 randomly chosen in the interval [ 1 30 ]. Evaluating the effect of the noise on the output yn through the Signal-to-Noise Ratio SN Rn , i.e. PT 2 (yn (t) − en (t)) dB (42) SNRn = 10 log t=1PT 2 t=1 en (t) the chosen covariance matrices yield SNRn ∈ [7.8 20.8] dB, n = 1, . . . , N . Note that (41) can be equivalently written as 0 yn (t) = (Xn (t))0 θg + en (t) with θg = [ 0.9 0.4 ] and the regressor Xn (t) is defined as in (22), i.e. Xn = [ yn (t−1) un (t−1) ]. 14 1.2 1.2 1 1 0.8 0.8 0.6 0.4 0.6 0.2 0 200 400 600 800 1000 (a) θ1g vs θ̂1g 0 200 400 600 800 1000 (b) θ2g vs θ̂2g Figure 4: Example 1. True vs estimated parameters. Black : true, red : C-RLS, blue : S-RLS, cyan : SW-RLS, magenta : M-RLS, green : MW-RLS. Observe that the deterministic input sequences {un (t)}Tt=1 are all different. However, they are all generated accordingly to the same distribution, as it seems reasonable to assume that systems described by the same model are characterized by similar inputs. Initializing φn as φn (0) = 0.1Inθ , while θ̂n (0) and θ̂og are sampled from the distributions N (θ̂g , 2Inθ ) and N (θ̂g , Inθ ), respectively, and {λn = Λ}N n=1 , with Λ = 1, we first evaluate the performance of the greedy approaches. The actual parameter θg and the estimate obtained with the different greedy approaches are reported in Figure 4. Despite the slight difference performances in the first 300 steps, which seems to be legitimate, the estimates obtained with SW-RLS, M-RLS and MW-RLS are similar. Moreover, θ̂g obtained with the different methods are comparable with respect with the estimate computed with C-RLS. In particular, the similarities between the estimates obtained with M-RLS, MWRLS and C-RLS prove that, in the considered case, the choice of the “mixed” strategy allows to enhance the accuracy of θ̂g . Comparing the estimates obtained with S-RLS and SW-RLS, observe that the convergence of the estimate to the actual value of θg tends to be faster if θ̂g is computed as in (24). Setting ρ = 0.1, the performance of the ADMM-RLS are assessed for different values of N and T . Moreover, the retrieved estimates are compared to the ones obtained with C-RLS and the greedy approaches. The accuracy of the estimate θ̂g is assessed through the Root Mean Square Error (RMSE), i.e. v 2  uP u T θig − θ̂ig (t) t t=1 , i = 1, . . . , ng . (43) RMSEgi = T As expected (see Table 1), the accuracy of the estimates tends to increase if the number of local processors N and the estimation horizon T increase. In the case N = 100 and T = 1000, the estimates obtained with both C-RLS and the SW-RLS and MW-RLS have comparable accuracy. See Table 2. The estimates obtained with ADMM-RLS, C-RLS and MW-RLS are further compared in Figure 5 and, as expected the three estimates are barely distinguishable. Thus the proposed ADMM-RLS algorithm, which uses local esti- 15 Table 1: ADMM-RLS: kRMSEg k2 T N 2 10 102 10 102 103 104 1.07 0.55 0.39 0.33 0.22 0.11 0.16 0.09 0.03 0.10 0.03 0.01 Table 2: kRMSEg k2 : C-RLS and greedy methods vs ADMM-RLS kRMSEg k2 C-RLS 0.03 S-RLS 0.05 SW-RLS 0.03 1.2 Method M-RLS 0.04 MW-RLS 0.03 ADMM-RLS 0.03 0.2 1.1 0.1 1 0.9 0 0.8 0.7 -0.1 0 200 400 600 800 1000 0 200 (a) θ1g vs θ̂1g 400 600 800 1000 800 1000 (b) |θ̂1g − θ1g | 1 0.6 0.8 0.4 0.6 0.2 0.4 0 0.2 0 200 400 600 800 1000 (c) θ2g vs θ̂2g 0 200 400 600 (d) |θ̂2g − θ2g | Figure 5: Example 1. Model parameters. Black : true, red : C-RLS, green : MW-RLS, blue : ADMM-RLS. mates and the cloud, is able to obtain good accuracy versus the fully centralized approach. Moreover, ADMM-RLS allows to retrieve estimates as accurate as the ones obtained with the MW-RLS, i.e. the greedy approach associated with the least RMSE. 4.3.1 Non-informative agents Using the previously introduced initial setting and parameters, lets assume that some of the available data sources are non-informative, i.e. some systems are not excited enough to be able to retrieve locally an accurate estimate of all the unknown parameters [9]. Null input sequences and white noise sequences characterized by Rn = 10−8 are used to simulate the behavior of the Nni ≤ N non-informative agents. 16 Table 3: Example 1. kRMSEg k2 vs Nni kRMSEg k2 Nni 10 20 0.02 0.02 1 0.02 50 0.03 Table 4: Example 1. kRMSEg k2 : 20% of non-informative agents kRMSEg k2 C-RLS 0.02 S-RLS 0.03 SW-RLS 0.02 Method M-RLS 0.07 MW-RLS 0.03 ADMM-RLS 0.02 1.5 1.6 1.4 1 1.2 1 0.5 0.8 0 1000 2000 (a) θ1g 3000 vs 4000 5000 θ̂1g 0 1000 2000 (b) θ2g 3000 vs 4000 5000 θ̂2g Figure 6: Example 1. Model parameters vs Nni . Black : true, red : Nni = 1, blue : Nni = 10, cyan : Nni = 20, magenta : Nni = 50. Consider the case N = 100 and T = 5000. The performance of ADMM-RLS are studied under the hypothesis that an increasing number Nni of systems is non-informative. Looking at the RMSEs in Table 3 and the estimates reported in Figure 6, it can be noticed that the quality of the estimate starts to decrease only when half of the available systems are non-informative. In case of Nni = 20, the estimates obtained with ADMM-RLS are then compared with the ones computed with C-RLS and the greedy approaches. As it can be noticed from the RMSEs reported in Table 4, in presence of non-informative agents SW-RLS tends to perform better than the other greedy approaches and the accuracy of the estimates obtained with C-RLS, SW-RLS and ADMM-RLS are comparable. 4.3.2 Agents failure Consider again N = 100 and T = 5000 and suppose that, due to a change in the behavior of Nf local agents the parameters of their models suddenly assume different values with respect to [ 0.9 0.4 ]. We study the performance of ADMM-RLS under the hypothesis that the change in the value of the parameters happens at an unknown instant tn , randomly chosen in the interval [1875, 3750] samples, and simulating the change in the local parameters using θn,1 sampled from the distribution U[ 0.2 0.21 ] and θn,2 sampled from U[ 1.4 1.43 ] after tn . Observe that it might be beneficial to use a non-unitary forgetting factor, due to the change in the local parameters. Consequently, λn , n = 1, . . . , N , is set to 0.99 for all the N agents. The performance of ADMM-RLS are initially assessed considering an increasing number of systems subject to failure. See Table 5 and Figure 7. Observe that the failure of the agents seems not to influence the accuracy of the obtained 17 Table 5: Example 1. ADMM-RLS: kRMSEg k2 vs Nf Nf kRMSEg k2 1 0.03 10 0.03 20 0.03 50 0.04 1.8 0.8 1.6 0.6 1.4 1.2 0.4 1 0.2 0 0.8 0 1000 2000 3000 4000 5000 0 1000 (a) θ1g vs θ̂1g 2000 3000 4000 5000 4000 5000 (b) |θ̂1g − θ1g | 1.5 1 0.8 1 0.6 0.4 0.2 0.5 0 0 1000 2000 3000 4000 5000 (c) θ2g vs θ̂2g 0 1000 2000 3000 (d) |θ̂2g − θ2g | Figure 7: Example 1. Model parameters vs Nf . Black : true, red : Nf = 1, blue : Nf = 10, cyan : Nf = 20, magenta : Nf = 50. estimates if Nf 6= 50. The use of ADMM-RLS thus allows to compute accurate global estimates even when some of the agent experience a failure. 4.4 Example 2. Time-varying parameters The presence of the forgetting factor in the cost functions fn (see (20)) allows to estimate time-varying parameters, as it enables to weight differently past and currently collected data. Suppose that the behavior of N systems is described by the ARX model yn (t + 1) = θ1g (t)yn (t − 1) + θ2g (t)un (t − 1) + en (t) (44) where θ1g = 0.9 sin (x) and θ2g = 0.4 cos (x), with x ∈ [0, 2π], and un ∼ U[ 2 3 ] . The white noise sequences en ∼ N (0, Rn ), n = 1, . . . , N , have covariances Rn randomly selected in the interval [ 1 30 ] yielding to SN Rn ∈ [ 2.4 6.5 ] dB. Considering an estimation horizon T = 1000, imposing φn as φn (0) = 0.1Inθ , while θ̂n (0) and θ̂og are sampled from the distributions N (θ̂g , 2Inθ ) and N (θ̂g , Inθ ), respectively, ρ = 0.1 and setting {λn = Λ}N n=1 , with Λ = 0.95, the performances of ADMM-RLS are compared with the ones of C-RLS and the four greedy approaches. See Table 6. As for the case where time-invariant parameters have to be estimated (see Example 1), SW-RLS and MW-RLS tend to perform slightly better than the other greedy approaches. Note that the accuracy of the estimates C-RLS, SW-RLS and MW-RLS is comparable. Figure 8 reports the actual global parameters and the estimates obtained 18 Table 6: Example 2. kRMSEg k2 vs Method kRMSEg k2 C-RLS 0.08 S-RLS 0.10 SW-RLS 0.08 Method M-RLS 0.09 MW-RLS 0.08 ADMM-RLS 0.08 1 0.2 0.5 0.1 0 0 -0.5 -1 -0.1 0 200 400 600 800 1000 0 200 (a) θ1g vs θ̂1g 400 600 800 1000 800 1000 (b) |θ̂1g − θ1g | 1 0.6 0.5 0.4 0 0.2 0 -0.5 0 200 400 600 800 1000 0 200 (c) θ2g vs θ̂2g 400 600 (d) |θ̂2g − θ2g | Figure 8: Example 2. True vs estimated model parameters. Black : true, red : C-RLS, blue : ADMM-RLS. with C-RLS and ADMM-RLS, along with the estimation errors. As already observed, the accuracy of the estimates computed with C-RLS and ADMM-RLS is comparable. 5 Collaborative estimation for partial consensus Consider the more general hypothesis that there exist a parameter vector θg ∈ Rng , with ng ≤ nθ such that: P θn = θg ∀n ∈ {1, . . . , N }, (45) where P ∈ Rng ×nθ is a matrix assumed to be known a priori. The problem that we want to solve is then given by min {θn }N n=1 s.t. N X fn (θn ) n=1 (46) g P θn = θ , n = 1, . . . , N, with fn defined as in (20). Note that (46) corresponds to (18) with the consensus constraint modified as F (θn ) = θg → P θn = θg . The considered consensus constraint allows to enforce consensus over a linear combination of the components of θn . Note that, through proper choices of P , 19 different settings can be considered, e.g. if P = Inθ then θn = θg and thus (46) is equal to (12). We can also enforce consensus only over some components of θn , so that some of the unknowns are assumed to be global while others are supposed to assume a different value for each agent. g As we are interested in obtaining an estimate for both {θn }N n=1 and θ , note that (46) cannot be solved resorting to a strategy similar to C-RLS (see Appendix A). In particular, even if properly modified, a method as C-RLS would allow to compute an estimate for the global parameter only. The ADMM iterations to solve problem (46) are given by θ̂n(k+1) (T ) = argmin L(θn , θ̂g,(k) , δn(k) ), (47) g (k) N θ̂g,(k+1) = argmin L({θ̂n(k+1) (T )}N n=1 , θ , {δn }n=1 ), (48) δn(k+1) = δn(k) + ρ(P θ̂n(k+1) (T ) − θ̂g,(k+1) ), (49) θn θg with k ∈ N indicating the ADMM iteration, ρ ∈ R+ being a tunable parameter, δn ∈ Rng representing the Lagrange multiplier and the augmented Lagrangian L given by L= N n o X ρ 2 fn (θn ) + δn0 (P θn − θg ) + kP θn − θg k2 . 2 n=1 (50) Note that the dependence on T is explicitly indicated only for the local estimates θ̂n , as they are the only quantities directly affected by the measurement and the regressor at T . Consider the update of the estimate θ̂g . The closed form solution for (48) is θ̂g,(k+1) =  N  1 1 X P θ̂n(k+1) (T ) + δn(k) . N n=1 ρ (51) The estimate of the global parameter is thus updated through the combination (k+1) of the mean of {δn }N (T )}N n=1 and the mean of {P θ̂n n=1 . As expected, (51) resembles (16), where the local estimates are replaced by a linear combination of their components. Consider the update for the estimate of the local parameters. The close form solution for (47) is given by: n o θ̂n(k+1) (T ) = φn (T ) Yn (T ) + P 0 (ρθ̂g,(k) − δn(k) ) , (52) Yn (t) = t X λt−τ n Xn (τ )yn (τ ), t = 1, . . . , T, (53) τ =1 " φn (t) = t X # 0 λt−τ + ρP 0 P n Xn (τ )Xn (τ ) !−1 , t = 1, . . . , T. (54) τ =1 As also in this case we are interested in obtaining recursive formulas for the local updates, consider θ̂n (T − 1), defined as   θ̂n (T − 1) = φn (T − 1) Yn (T − 1) + P 0 (ρθ̂g (T − 1) − δn (T − 1)) , (55) 20 where φn (T − 1) is equal to (54), and θ̂g (T − 1) and δn (T − 1) are the global estimate and the Lagrange multiplier obtained at T − 1, respectively. Observe that the following equalities hold −1 φn (T ) = (Xn (T ) + ρP 0 P ) = −1 = (λn Xn (T − 1) + Xn (T )Xn (T )0 + ρP 0 P ) 0 = −1 = (λn (Xn (T − 1) + ρP P ) + Xn (T )Xn (T ) + ρ(1 − λn )P 0 P ) −1 , = λn φn (T − 1)−1 + Xn (T )Xn (T )0 + ρ(1 − λn )P 0 P with Xn (t) = t X 0 = 0 λt−τ n Xn (τ )(Xn (τ )) , t = 1, . . . , T. τ =1 Introducing the extended regressor p   X̃n (T ) = Xn (T ) ρ(1 − λn )P 0 ∈ Rnθ ×(ny +ng ) (56) and applying the matrix inversion lemma, it can be proven that φn can be updated as Rn (T ) = λn I(ny +ng ) + (X̃n (T ))0 φn (T − 1)X̃n (T ), Kn (T ) = φn (T − 1)X̃n (T ) (Rn (T )) φn (T ) = λ−1 n (Inθ −1 , 0 − Kn (T )(X̃n (T )) )φn (T − 1). (57) (58) (59) Note that (57)-(59) are similar to (31)-(33), with differences due to the new definition of the extended regressor. Consider again (52). Adding and subtracting   λn φn (T )P 0 ρθ̂g (T − 1) − δn (T − 1) (k+1) can be computed as h   θ̂n(k+1) (T ) = φn (T ) λn Yn (T − 1) + P 0 (ρθ̂g (T − 1) − δn (T − 1) )+    i +Xn (T )yn (T ) − P 0 δn(k) − λn δn (T − 1) + P 0 ρ θ̂g,(k) − λn θ̂g (T − 1) = to (52), θ̂n = θ̂nRLS (T ) + θ̂nADM M,(k+1) (T ). (60) In particular, n o θ̂nRLS (T ) = φn (T )λn Yn (T − 1) + ρP 0 θ̂(T − 1) − P 0 δn (T − 1) + + φn (T )X̃n (T )yn (T ), and   (k+1) (k+1) θ̂nADM M,(k+1) (T ) = φn (T )P 0 ρ∆g,λn (T ) − ∆λn , with g,(k) ∆k+1 − λn θ̂g (T − 1), g,λn (T ) = θ̂ (k+1) ∆λn (T ) = δn(k) − λn δn (T − 1). 21 (61) (62) Observe that, as for (16) and (51), (62) differs from (36) because of the presence of P . Note that, accounting for the definition of φn (T − 1), exploiting the equality Kn (T ) = φn (T )X̃n (T ) (see Section 4 for the proof) and introducing the extended measurement vector  0 ỹn (T ) = yn (T )0 O1×ng , the formula to update θ̂nRLS in (62) can be further simplified as n o θ̂nRLS (T ) = φn (T − 1) Yn (T − 1) + P 0 (ρθ̂g (T − 1) − δn (T − 1)) + n o − Kn (T )(X̃n (T )0 )φn (T − 1) Yn (T − 1) + P 0 (ρθ̂g (T − 1) − δn (T − 1)) + + φn (T )Xn (T )yn (T ) = = θ̂n (T − 1) − Kn (T )(X̃n (T ))0 θ̂n (T − 1) + φn (T )X̃n (T )ỹn (T ) = = θ̂n (T − 1) + Kn (T )(ỹn (T ) − (X̃n (T ))0 θ̂n (T − 1)). (63) As the method tailored to attain full consensus (see Section 4), note that both θ̂g and δn should be updated on the “cloud”. As a consequence, also θ̂nADM M should be updated on the “cloud”, due to its dependence on both θ̂g and δn . On the other hand, θ̂nRLS can be updated by the local processors. As for the case considered in Section 4, note that (63) is independent from k and, consequently, the synchronization between the local clock and the one on the “cloud”is not required. The approach is outlined in Algorithm 4 and the transmissions characterizing each iteration is still the one reported in the scheme in Figure 3. As a consequence, the observations made in Section 4 with respect to the information exchange between the nodes and the “cloud” hold also in this case. 5.1 Example 3 Assume to collect data for T = 1000 from a set of N = 100 dynamical systems modelled as yn (t) = θ1g yn (t − 1) + θn,2 yn (t − 2) + θ2g un (t − 1) + en (t), 0 (64) where θg = [ 0.2 0.8 ] and θn,2 is sampled from a normal distribution N (0.4, 0.0025), so that it is different for the N systems. The white noise sequence en ∼ N (0, Rn ), where, for the “informative’ systems, Rn ∈ [1 20] yields SN R ∈ [3.1, 14.6] dB (see (42)). Initializing φn as φn (0) = 0.1Inθ , while θ̂n (0) and θ̂og are sampled from the distributions N (θ̂g , 2Inθ ) and N (θ̂g , Inθ ), respectively, {λn = Λ}N n=1 , with Λ = 1, and ρ = 0.1, the performance of the proposed approach are evaluated. Figure 9 shows θ̂g obtained with ADMM-RLS, along with the estimation error. Observe that the estimates tends to converge to the actual value of the global parameters. To further assess the performances of ADMM-RLS, θn , θ̂n and θ̂nRLS obtained for the 5th system, i.e. n = 5, are compared in Figure 10. It can thus be seen 22 Algorithm 4 ADMM-RLS for partial consensus (N2C2N) Input: Sequence of observations {Xn (t), yn (t)}Tt=1 , initial matrices φn (0) ∈ Rnθ ×nθ , initial local estimates θ̂n (0), initial dual variables δn,o , forgetting factors λn , n = 1, . . . , N , initial global estimate θ̂og , parameter ρ ∈ R+ . 1. for t = 1, . . . , T do Local 1.1. for n = 1, . . . , N do 1.1.1. compute X̃n (t) with (56); 1.1.2. compute Kn (t) and φn (t) with (58) - (59); 1.1.3. compute θ̂nRLS (t) with (63); 1.2. end for; Global 1.1. do ADM M,(k+1) (t) with (62), n = 1, . . . , N ; 1.1.1. compute θ̂n (k+1) 1.1.2. compute θ̂n 1.1.3. compute θ̂ (t) with (60), n = 1, . . . , N ; g,(k+1) with (51); (k+1) δn with (49), n = 1, . . . , N ; 1.1.4. compute 1.2. until a stopping criteria is satisfied (e.g. maximum number of iterations attained); 2. end. Output: Estimated global parameters {θ̂g (t)}Tt=1 , estimated local parameters {θ̂n (t)}Tt=1 , n = 1, . . . , N . that the difference between θ̂nRLS and θ̂n is mainly noticeable at the beginning of the estimation horizon, but then θ̂nRLS and θ̂n are barely distinguishable. Note that SNR5 = 8.9 dB. 5.1.1 Non-informative agents Suppose that among the N = 100 systems described by the model in (64), Nni = 20 randomly chosen agents are non-informative, i.e. their input sequences un are null and Rn = 10−8 . As it can be observed from the estimates reported in Figure 11, {θ̂ig }2i=1 converge to the actual values of the global parameters even if 20% of the systems provide non-informative data. The local estimates θ̂n,2 for the 8th and 65th system (SN R65 ≈ 6 dB) are reported in Figure 12. As, the 8th system is among the ones with a non exciting input, θ̂8,2 = θ̂8,2 (0) over the estimation horizon. Instead, θ̂65,2 tends to converge to the actual value of θ65,2 . Even if the purely local parameter is not retrieved from the data, using the proposed collaborative approach θ8,1 and θ8,3 are accurately estimated (see Figure 13). We can thus conclude that the proposed estimation method “forces” the estimates of the global components of 23 0.4 0.3 0.2 0.2 0.1 0 0 -0.2 -0.1 0 200 400 (a) θ1g 600 vs 800 1000 0 200 θ̂1g 400 (b) 1.4 0.6 1.2 0.4 |θ̂1g 600 − 800 1000 θ1g | 1 0.2 0.8 0 0.6 0 200 400 600 800 1000 0 200 (c) θ2g vs θ̂2g 400 600 800 1000 (d) |θ̂2g − θ2g | Figure 9: Example 3. True vs estimated global parameters. Black : true, blue : ADMM-RLS. 0.5 0.5 0 0 -0.5 -0.5 -1.5 -1 -2 0 200 400 600 800 1000 0 RLS (a) θ5,1 vs θ̂5,1 and θ̂5,1 200 400 600 800 1000 RLS (b) θ5,2 vs θ̂5,2 and θ̂5,2 2.5 2 1.5 1 0 200 400 600 800 1000 RLS (c) θ5,3 vs θ̂5,3 and θ̂5,3 Figure 10: Example 3. Local parameter θn,2 , n = 5. Black : true, blue : θ̂5 , red: θ̂5RLS . θn to follow θ̂g , which is estimated automatically discarding the contributions from the systems that lacked excitation. 24 1.4 0.4 1.2 0.2 1 0 0.8 -0.2 0.6 0 200 400 600 800 1000 0 200 (a) θ1g vs θ̂1g 400 600 800 1000 (b) θ2g vs θ̂2g Figure 11: Example 3. True vs estimated global parameters. Black : true, blue : ADMM-RLS. 1 0.4 0 0.2 -1 0 -2 -3 -0.2 -4 -0.4 -5 0 200 400 600 800 0 1000 200 (a) θ8,2 vs θ̂8,2 400 600 800 1000 (b) θ65,2 vs θ̂65,2 Figure 12: Example 3. Local parameters θn,2 , n = 8, 65. Black : true, blue : ADMM-RLS. 0.35 1.6 0.3 1.4 0.25 1.2 1 0.2 0.8 0.15 0.6 0 200 400 600 800 1000 0 RLS (a) θ8,1 vs θ̂8,1 and θ̂8,1 200 400 600 800 1000 RLS (b) θ8,3 vs θ̂8,3 and θ̂8,3 Figure 13: Example 3. Local parameters θ8,i , i = 1, 3. Black : true, blue : RLS θ̂8,i , red: θ̂8,i . 6 Constrained Collaborative estimation for partial consensus Suppose that the value of the local parameter θn is constrained to a set Cn and that this hypothesis holds for all the agents n ∈ {1, . . . , N }. With the objective of reaching partial consensus among the agents, the problem to be solved can thus be formulated as minimize N X fn (θn ) n=1 s.t. (65) P θn = θ, n = 1, . . . , N, θn ∈ Cn , n = 1, . . . , N. 25 Observe that (65) corresponds to (18) if the nonlinear consensus constraint is replaced with (45). To use ADMM to solve (65), the problem has to be modified as minimize N X {fn (θn ) + gn (zn )} n=1 P θn = θg n = 1, . . . , N s.t. (66) θn = zn , n = 1, . . . , N N where {gn }N n=1 are the indicator functions of the sets {Cn }n=1 (defined as in (7)) nθ N and {zn ∈ R }n=1 are auxiliary variables. Observe that (66) can be solved with ADMM. Given the augmented Lagrangian associated with (66), i.e. L= N X 0 0 {fn (θn ) + gn (zn ) + δn,1 (θn − zn ) + δn,2 (P θn − θg )+ n=1 + ρ2 ρ1 kθn − zn k22 + kP θn − θg k22 }, 2 2 (67) the iterations that have to be performed to solve the addressed problem with ADMM are θ̂n(k+1) (T ) = argmin L(θn , θ̂g,(k) , zn(k) , δn(k) ), (68) zn(k+1) = argmin L(θ̂n,(k+1) (T ), θ̂g,(k) , zn , δn(k) ), (69) g (k+1) (k) N θ̂g,(k+1) = argmin L({θ̂n(k+1) }N , δn }n=1 ), n=1 , θ , {zn (70) θn zn θg (k+1) = δn,1 + ρ1 (θ̂n(k+1) (T ) − z (k+1) ), (k+1) = δn,2 + ρ2 (P θ̂n(k+1) (T ) − θ̂g,(k+1) ). δn,1 δn,2 (k) (71) (k) (72) N Note that two sets of Lagrangian multipliers, {δn,1 }N n=1 and {δn,2 }n=1 , have ng been introduced. While δn,1 ∈ R is associated with the partial consensus constraint, δn,2 ∈ Rnθ is related to the constraint θn ∈ Cn , n = 1, . . . , N . Solving (69)-(70), the resulting updates for the auxiliary variables and the global estimates are   1 (k) (k+1) (k+1) (73) zn =PCn θ̂n (T ) + δn,1 , n = 1, . . . , N, ρ1  N  1 X 1 (k) θ̂g,(k+1) = P θ̂n(k+1) (T ) + δn,2 . (74) N n=1 ρ2 Observe that z-update is performed projecting onto the set Cn a combination of (k) the updated local estimate and δn,1 , while θ̂g,(k+1) is computed as in Section 5, with δn replaced by δn,2 . 26 Consider the close form solution of (68), which is given by o n (k) (k) θ̂n(k+1) (T ) = φn (T ) Yn (T ) − δn,1 − P 0 δn,2 + ρ1 zn(k) + ρ2 P 0 θ̂g,(k) , Yn (t) = t X λt−τ n Xn (τ )yn (τ ), (75) (76) τ =1 " φn (t) = t X !−1 # 0 λt−τ + ρ1 Inθ + ρ2 P 0 P n Xn (τ )Xn (τ ) . (77) τ =1 Aiming at finding recursive formulas to update the estimates of the local parameters, we introduce the nth local estimate obtained at T − 1, i.e. θ̂n (T − 1) = φn (T − 1) {Yn (T − 1) − δn,1 (T − 1) − P 0 δn,2 (T − 1)+ o +ρ1 zn (T − 1) + ρ2 P 0 θ̂g (T − 1) (78) with δn,1 (T − 1), δn,2 (T − 1), zn (T − 1) and θ̂g (T − 1) being the Lagrange multipliers and the global estimate obtained at T − 1, respectively. (k+1) To obtain recursive formulas to compute θ̂n , we start proving that φn (T ) can be computed as a function of φn (T − 1). in particular, introducing Xn (t) = t X 0 λt−τ n Xn (τ )(Xn (τ )) , τ =1 note that φn (T )−1 = Xn (T ) + ρ1 Inθ + ρ2 P 0 P = = λn Xn (T − 1) + Xn (T )Xn (T )0 + ρ1 Inθ + ρ2 P 0 P = = λn [Xn (T − 1) + ρ1 Inθ + ρ2 P 0 P ] + Xn (T )Xn (T )0 + (1 − λn )ρ1 + (1 − λn )ρ2 P 0 P = = λn φn (T − 1)−1 + Xn (T )Xn (T )0 + (1 − λn )ρ1 + (1 − λn )ρ2 P 0 P. Defining the extended regressor as p  X̃n (T ) = Xn (T ) (1 − λn )ρ1 Inθ  (1 − λn )ρ2 P 0 ∈ Rnθ ×(ny +nθ +ng ) , (79) and applying the matrix inversion lemma, it can be easily proven that φn (T ) can then be computed as: p Rn (T ) = λn I(ny +nθ +ng ) + X̃n (T )0 φn (T )X̃n (T ), Kn (T ) = φn (T − 1)X̃n (T )(Rn (T )) φn (T ) = λ−1 n (Inθ −1 , 0 − Kn (T )X̃n (T ) )φn (T − 1). (80) (81) (82) The same observations relative to the update of φn made in Section 5 holds also in the considered case. Consider (75). Adding and subtracting h i λn −δn,1 (T − 1) − P 0 δn,2 (T − 1) + ρ1 zn (T − 1) + ρ2 P 0 θ̂g (T − 1) 27 to (75) and considering the definition of φn (T − 1) (see (77)), the formula to update θ̂n can be further simplified as θ̂n(k+1) (T ) = φn (T ){λn (Yn (T − 1) − δn,1 (T − 1) − P 0 δn,2 (T − 1)+  +ρ1 zn (T − 1) + ρ2 P 0 θ̂g (T − 1) + Xn (T )yn (T ) + ρ1 (zn(k) − λn zn (T − 1))+ (k) + ρ2 P 0 (θ̂g,(k) − λn θ̂g (T − 1)) − (δn,1 − λn δn,1 (T − 1))+ (k) − P 0 (δn,2 − λn δn,2 (T − 1))} = = θ̂n (T − 1) − Kn (T )X̃n (T )θ̂n (T − 1) + φn (T ){Xn (T )yn (T )+ + ρ1 (zn(k) − λn zn (T − 1)) + ρ2 P 0 (θ̂g,(k) − λn θ̂g (T − 1))}+ (k) (k) − (δn,1 − λn δn,1 (T − 1)) − P 0 (δn,2 − λn δn,2 (T − 1))} = = θ̂nRLS (T ) + θ̂nADM M,(k+1) (T ). (83) In particular, θ̂nRLS = φn (T )λn (Yn (T − 1) − δn,1 (T − 1) − P 0 δn,2 (T − 1) + ρ1 zn (T − 1)+  +ρ2 P 0 θ̂g (T − 1) + φn (T )Xn (T )yn (T ), (84) while i h (k+1) (k+1) (k+1) (k+1) θ̂nADM M,(k+1) (T ) = φn (T ) ρ1 ∆z,λn (T ) + ρ2 P 0 ∆g,λn (T ) − ∆1,λn − P 0 ∆2,λn . (85) with (k+1) ∆z,λn (T ) = zn(k) − λn zn (T − 1), (k+1) ∆g,λn (T ) = θ̂g,(k) − λn θ̂g (T − 1), (k+1) (k) (k+1) (k) ∆1,λn = δn,1 − λn δn,1 (T − 1), ∆2,λn = δn,2 − λn δn,2 (T − 1). Note that (85) differs from (62) because of the introduction of the additional terms ∆z,λn and ∆1,λn . Similarly to what is presented in Section 5, thanks to (82) the formula to update θ̂nRLS can be further reduced as θ̂nRLS = θ̂n (T − 1) − Kn (T )(X̃n (T ))0 θ̂n (T − 1) + φn (T )Xn (T )yn (T ) = = θ̂n (T − 1) − Kn (T )(X̃n (T ))0 θ̂n (T − 1) + φn (T )X̃n (T )ỹn (T ), with the extended measurement vector ỹn (T ) is defined as  0 ỹn (T ) = yn (T )0 O1×nθ O1×nng . Exploiting the equality Kn (T ) = φn (T )X̃n (T ) (the proof can be found in (4)), it can thus be proven that θ̂nRLS = hatθn (T − 1) + Kn (T )(ỹn (T ) − (X̃n (T ))0 θ̂n (T − 1)). (86) It is worth remarking that θ̂nRLS can be updated (i) locally, (ii) recursively and (iii) once per step t. 28 Remark 5 The proposed method, summarized in Algorithm 5 and in Figure 3, requires the agents to transmit {θ̂nRLS , φn } to the “cloud”, while the “cloud” has to communicate θ̂n to each node once it has been computed. As a consequence, a N2C2N transmission scheme is required.  6.1 Example 4 Suppose that the data are gathered from N = 100 systems, described by (64) and collected over an estimation horizon T = 5000. Moreover, assume that the a priori information constraints parameter estimates to the following ranges: `n,1 ≤ θ̂n,1 ≤ upn,1 `n,2 ≤ θ̂n,2 ≤ upn,2 `n,3 ≤ θ̂n,3 ≤ upn,3 . (87) Algorithm 5 ADMM-RLS algorithm for constrained consensus Input: Sequence of observations {Xn (t), yn (t)}Tt=1 , initial matrices φn (0) ∈ nθ ×nθ o o R , initial local estimates θ̂n (0), initial dual variables δn,1 and δn,2 , initial auxiliary variables ẑn,o , forgetting factors λn , n = 1, . . . , N , initial global estimate θ̂og , parameters ρ1 , ρ2 ∈ R+ . 1. for t = 1, . . . , T do Local 1.1. for n = 1, . . . , N do 1.1.1. compute X̃n (t) with (79); 1.1.2. compute Kn (t) and φn (t) with (81) - (82); 1.1.3. compute θ̂nRLS (t) with (86); 1.2. end for; Global 1.1. do ADM M,(k+1) (t) with (85), n = 1, . . . , N ; 1.1.1. compute θ̂n (k+1) 1.1.2. compute θ̂n 1.1.3. compute (t) with (83), n = 1, . . . , N ; (k+1) zn (t) g,(k+1) 1.1.4. compute θ̂ with (73), n = 1, . . . , N ; with (74); (k+1) 1.1.5. compute δn,1 with (71), n = 1, . . . , N ; (k+1) δn,2 with (72), n = 1, . . . , N ; 1.1.6. compute 1.2. until a stopping criteria is satisfied (e.g. maximum number of iterations attained); 2. end. Output: Estimated global parameters {θ̂g (t)}Tt=1 , estimated local parameters {θ̂n (t)}Tt=1 , n = 1, . . . , N . 29 100 10-2 -4 10 -4 10 -2 10 10 0 10 2 Figure 14: Example 4. N̄ b vs ρ1 /ρ2 : black = N̄1b , red = N̄2b , blue = N̄3b . Observe that the parameters ρ1 , ρ2 ∈ R+ have to be tuned. To assess how the choice of these two parameters affects the satisfaction of (87), consider the number of steps the local estimates violate the constraints over the estimation horizon T , {Nib }3i=1 . Assuming that “negligible” violations of the constraints are allowed, (87) are supposed to be violated if the estimated parameters fall outside the interval Bn = [ `n −10−4 un +10−4 ]. Considering the set of constraints S2 = {`n = [ 0.19 θn,2 −0.1 0.79 ] , upn = [ 0.21 θn,2 +0.1 0.81 ]}, Figure 14 shows the average percentage of violations over the N agents obtained fixing ρ2 = 0.1 and choosing ρ1 = {10−5 , 10−4 , 10−3 , 10−2 .10−1 , 1, 10, 20}. Observe that if ρ1 dominates over ρ2 the number of violations tends to decrease, as in the augmented Lagrangian (87) are weighted more than the consensus constraint. However, if ρ1 /ρ2 > 100, {N̄ib }3i=1 tend to slightly increase. It is thus important to trade-off between the weights attributed to (87) and the consensus constraint. To evaluate how the stiffness of the constraints affects the choice of the parameters, {Nib }3i=1 are computed considering three different sets of box constraints S1 = {`n = [ 0.195 θn,2 −0.05 0.795 ] , upn = [ 0.205 θn,2 +0.05 0.805 ]}, S2 = {`n = [ 0.19 θn,2 −0.1 0.79 ] , upn = [ 0.21 θn,2 +0.1 0.81 ]}, S3 = {`n = [ 0.15 θn,2 −0.5 0.75 ] , upn = [ 0.25 θn,2 +0.5 0.85 ]}. The resulting {N̄ib }3i=1 are reported in Figure 15. Note that also in this case the higher the ratio ρ1 /ρ2 is, the smaller {N̄ib }3i=1 are. However, also in this case, the constraint violations tend to increase for ρ1 /ρ2 > 100. Focusing on the assessment of ADMM-RLS performances when the set of constraints is S2 , Figure 16 shows the global estimates obtained using the same initial conditions and forgetting factors as in Section 6, with ρ1 = 10 and ρ2 = 0.1. Note that the global estimates satisfy (87), showing that the constraints on the global estimate are automatically enforced imposing θn ∈ Cn . As it concerns the RMSEs for θ̂g (43), they are equal to: RM SE1g = 0.001 and RM SE2g = 0.006, and their relatively small values can be related to the introduction of the additional constraints, that allow to limit the resulting estimation error. 30 100 100 -10 -10 10 10 10 -4 -2 10 10 0 10 2 10 -4 -2 10 (a) N̄1b 10 0 10 2 (b) N̄2b 100 10-2 -4 10 -4 -2 10 10 10 0 10 2 (c) N̄3b Figure 15: Example 4. Average percentage of constraint violations N̄ib %, i = 1, 2, 3, vs ρ1 /ρ2 . Black : S1 , red : S2 , blue : S3 . 0.22 0.85 0.21 0.2 0.8 0.19 0.18 0.75 0 1000 2000 (a) θ1g 3000 vs 4000 5000 θ̂1g 0 1000 2000 (b) θ2g 3000 vs 4000 5000 θ̂2g Figure 16: Example 4.Global model parameters: black = true, blue = ADMMRLS, red = upper and lower bounds. Figure 17 show the estimate θ̂n for n = 11, with SN R11 = 10.6 dB. Note that the estimated parameters tend to satisfy the constraints. In Figure 18 θ̂n and θ̂nRLS , with n = 11, are compared. As it can be noticed, while θ̂11 satisfied RLS the imposed constraints on its values, the effect of using θ̂11 to update θ̂11 (see (86)) is not strong enough to enfoce also the estimates computed locally to satisfy the contraints. To further assess the performance of the proposed approach, the RMSE for the local estimates v  2 uP u T t t=1 θn,i − θ̂n,i (t) . (88) RMSEn,i = T is also considered. RM SEn,2 obtained for each of the N systems is reported in Figure 19 and, as it can be noticed, RM SEn,2 is relatively small. As for the global parameters’ estimates, this result can be related to the introduction of the additional constraints. 31 0.22 0.6 0.21 0.5 0.2 0.4 0.19 0.18 0.3 0 1000 2000 3000 4000 5000 0 1000 (a) θ11,1 vs θ̂11,1 2000 3000 4000 5000 (b) θ11,2 vs θ̂11,2 0.85 0.8 0.75 0 1000 2000 3000 4000 5000 (c) θ11,3 vs θ̂11,3 Figure 17: Local parameter θn , n = 11. Black : true, blue : ADMM-RLS, red : upper and lower bounds 0.8 0.3 0.2 0.6 0.1 0.4 0 -0.1 0.2 0 200 400 600 800 1000 0 RLS (a) θ11,1 vs θ̂11,1 and θ̂11,1 200 400 600 800 1000 RLS (b) θ11,2 vs θ̂11,2 and θ̂11,2 1.2 1 0.8 0.6 0 1000 2000 3000 4000 5000 RLS (c) θ11,3 vs θ̂11,3 and θ̂11,3 Figure 18: Local parameter θn , n = 11, for t ∈ [1 1000]. Black : true, blue : RLS θ̂11 , cyan : θ̂11 , red : upper and lower bounds 7 Concluding Remarks and Future Work In this report a method for collaborative least-squares parameter estimation is presented based on output measurements from multiple systems which can perform local computations and are also connected to a centralized resource in the “cloud”. The approach includes two stages: (i) a local step, where estimates of the unkown parameters are obtained using the locally available data, and (ii) 32 0.04 0.03 0.02 0.01 0 10 20 30 40 50 60 70 80 90 100 Figure 19: RM SE2 for each agent n, n = 1, . . . , N . a global stage, performed on the cloud, where the local estimates are fused. Future research will address extentions of the method to the nonlinear and multi-class consensus cases. Moreover, an alternative solution of the problem will be studied so to replace the transmission policy required now, i.e. N2C2N, with a Node-to-Cloud (N2C) communication scheme. This change should allow to alleviate problems associated with the communication latency between the cloud and the nodes. Moreover, it should enable to obtain local estimators that run independently from the data transmitted by the cloud, and not requiring synchronous processing by the nodes and “cloud”. Other, solutions to further reduce the trasmission complexity and to obtain an asynchronous scheme with the same characteristics as the one presented in this report will be investigated. A Centralized RLS Consider problem (12), with the cost functions given by T 1X kyn (t) − (Xn (t))0 θn k22 . fn (θn ) = 2 t=1 The addressed problem can be solved in a fully centralized fashion, if at each step t all the agents transmit the collected data pairs {yn (t), Xn (t)}, n = 1, . . . , N , to the “cloud”. This allows the creation of the lumped measurement vector and regressor, given by  0 y̌(t) = y1 (t)0 . . . yN (t)0 ∈ RN ·ny ×1 , (89)  0 X̌(t) = X1 (t)0 . . . XN (t)0 ∈ Rnθ ×ny ·N . Through the introduction of the lumped vectors, (12) with fn as in (20) is equivalent to T 1X 2 y̌(t) − (X̌(t))0 θg 2 . (90) min θg 2 t=1 The estimate for the unknown parameters θ̂g can thus be retrieved applying standard RLS (see [9]), i.e. performing at each step t the following iterations −1 K(t) = φ(t − 1)X̌(t) ID + (X̌(t))0 φ(t − 1)X̌(t) , (91)  0 φ(t) = Inθ − K(t)(X̌(t)) φ(t − 1), (92)   g g 0 g θ̂ (t) = θ̂ (t − 1) + K(t) y̌(t) − (X̌(t)) θ̂ (t − 1) , (93) with D = N · ny × 1. 33 References [1] F. Boem, Y. Xu, C. Fischione, and T. Parisini. A distributed estimation method for sensor networks based on pareto optimization. In 2012 IEEE 51st IEEE Conference on Decision and Control (CDC), pages 775–781, Dec 2012. [2] S. Boyd, N. Parikh, E. Chu, B. Peleato, and J. Eckstein. Distributed optimization and statistical learning via the alternating direction method of multipliers. Found. Trends Mach. Learn., 3(1):1–122, January 2011. [3] F. S. Cattivelli, C. G. Lopes, and A. H. Sayed. Diffusion recursive leastsquares for distributed estimation over adaptive networks. IEEE Transactions on Signal Processing, 56(5):1865–1877, May 2008. [4] Pedro A. Forero, Alfonso Cano, and Georgios B. Giannakis. Consensusbased distributed support vector machines. The Journal of Machine Learning Research, 11:1663–1707, Aug 2010. [5] F. Garin and L. Schenato. A Survey on Distributed Estimation and Control Applications Using Linear Consensus Algorithms, pages 75–107. Springer London, London, 2010. [6] M.N. Howell, J.P. Whaite, P. Amatyakul, Y.K. Chin, M.A. Salman, C.H. Yen, and M.T. Riefe. Brake pad prognosis system, Apr 2010. US Patent 7,694,555. [7] Z. Li, I. Kolmanovsky, E. Atkins, J. Lu, D. P. Filev, and J. Michelini. Road risk modeling and cloud-aided safety-based route planning. IEEE Transactions on Cybernetics, 46(11):2473–2483, Nov 2016. [8] Z. Li, I. Kolmanovsky, E. M. Atkins, J. Lu, D. P. Filev, and Y. Bai. Road disturbance estimation and cloud-aided comfort-based route planning. IEEE Transactions on Cybernetics, PP(99):1–13, 2017. [9] L. Ljung. System identification: theory for the user. Prentice-Hall Englewood Cliffs, NJ, 1999. [10] C. G. Lopes and A. H. Sayed. Incremental adaptive strategies over distributed networks. IEEE Transactions on Signal Processing, 55(8):4064– 4077, Aug 2007. [11] G. Mateos, I. D. Schizas, and G. B. Giannakis. Distributed recursive leastsquares for consensus-based in-network adaptive estimation. IEEE Transactions on Signal Processing, 57(11):4583–4588, Nov 2009. [12] Peter M. Mell and Timothy Grance. Sp 800-145. the nist definition of cloud computing. Technical report, Gaithersburg, MD, United States, 2011. [13] R. Olfati-Saber. Distributed kalman filtering for sensor networks. In 2007 46th IEEE Conference on Decision and Control, pages 5492–5498, Dec 2007. 34 [14] E. Ozatay, S. Onori, J. Wollaeger, U. Ozguner, G. Rizzoni, D. Filev, J. Michelini, and S. Di Cairano. Cloud-based velocity profile optimization for everyday driving: A dynamic-programming-based solution. IEEE Transactions on Intelligent Transportation Systems, 15(6):2491–2505, Dec 2014. [15] E. Taheri, O. Gusikhin, and I. Kolmanovsky. Failure prognostics for intank fuel pumps of the returnless fuel systems. In Dynamic Systems and Control Conference, Oct 2016. 35
3cs.SY
Automatic Backward Differentiation for American Monte-Carlo Algorithms (Conditional Expectation) Christian P. Fries arXiv:1707.04942v1 [q-fin.CP] 16 Jul 2017 [email protected] June 27, 2017 Version 0.4.0 Abstract In this note we derive the backward (automatic) differentiation (adjoint [automatic] differentiation) for an algorithm containing a conditional expectation operator. As an example we consider the backward algorithm as it is used in Bermudan product valuation, but the method is applicable in full generality. The method relies on three simple properties: 1. a forward or backward (automatic) differentiation of an algorithm containing a conditional expectation operator results in a linear combination of the conditional expectation operators; d E(Y ) = 2. the differential of an expectation is the expectation of the differential dx d E( dx Y ); 3. if we are only interested in the expectation of the final result (as we are in all valuation problems), we may use E(A · E(B|F)) = E(E(A|F) · B), i.e., instead of applying the (conditional) expectation operator to a function of the underlying random variable (continuation values), it may be applied to the adjoint differential. The methodology not only allows for a very clean and simple implementation, but also offers the ability to use different conditional expectation estimators in the valuation and the differentiation. Disclaimer: The views expressed in this work are the personal views of the authors and do not necessarily reflect the views or policies of current or previous employers. Feedback welcomed at [email protected]. 1 Automatic Backward Differentiation for American Monte-Carlo Christian Fries Contents 1 Introduction 3 2 American Monte-Carlo and Bermudan Option Valuation 2.1 Bermudan Option Valuation . . . . . . . . . . . . . . . . . . . . 2.2 Bermudan Digital Option Valuation . . . . . . . . . . . . . . . . 3 4 4 3 Automatic Differentiation of the American-Monte-Carlo Backward Algorithm 5 3.1 Forward Differentiation . . . . . . . . . . . . . . . . . . . . . . . 5 3.2 Backward Differentiation . . . . . . . . . . . . . . . . . . . . . . 6 4 Numerical Results 7 5 Implementation Design 8 6 Conclusion 8 References c 2017 Christian Fries 10 2 Version 0.4.0 (20170627) http://www.christianfries.com/finmath/stoachasticautodiff Automatic Backward Differentiation for American Monte-Carlo 1 Christian Fries Introduction Given a filtered probability space (Ω, Q, {Ft }) we consider a Monte-Carlo simulation of a (time-discretised) stochastic process, i.e., we simulate sample path ωi of sequences of random variables. Assuming that the drawings are uniform with respect to the measure Q, this allows to approximate the unconditional expectation EQ (X) of a random variable X via n−1 1X E (X) ≈ X(ωl ). n Q l=0 However, the calculation of conditional expectations EQ (X|FTi ) is known to be involved, since the Monte-Carlo simulation does not provide a discretization of the filtration {Ft }. For the calculation (estimation) of conditional expectations numerical approximations, like least-square regressions can be used. These methods are often referred to as American Monte-Carlo, c.f. [6]. Let x denote a given model parameter used in the generation of the MonteCarlo simulation. Given a valuation algorithm which calculates the unconditional expectation EQ (V ) of a random variable V , where the calculation of V involves one or more conditional expectations, we consider the calculation of the derivative d Q dx E (V ). Using automatic differentiation (i.e., analytic differentiation and the chain rule), see [2, 8], this would require a differentiation of the conditional expectation operator or - in practice - the approximation of the the conditional expectation operator. Hence, direct application of automatic differentiation would result in the differentiation of the approximation of the the conditional expectation operator, e.g., the regression, see [1, 3]. First of all, this is know to be difficult due to the cross-sectional character of such approximations. In addition, it is in general questionable to differentiate an approximation, since it is not guaranteed that the differentiation of an approximation is a good approximation of the differential. However, we can easily avoid this issue: First the differentiation of the conditional expectation can be replaced by a conditional expectation of a differentiation. While this alone would present an improvement, it seems to make (backward) automatic differentiation much more complicated, since we would have to calculate a derivative for each argument of a conditional expectation. In the next section we show that we can simplify the algorithm by taking the conditional expectation of the adjoint. 2 American Monte-Carlo and Bermudan Option Valuation We shortly given the definition of the backward algorithm. For details see [6], we use a similar notation here. c 2017 Christian Fries 3 Version 0.4.0 (20170627) http://www.christianfries.com/finmath/stoachasticautodiff Automatic Backward Differentiation for American Monte-Carlo Christian Fries Let 0 = T0 < T1 < . . . < Tn denote a given time discretization. Let Vi , i = 1, . . . , n denote the time-Ti numéraire relative values of given underlyings. Here Vi are FTi -measurable random variables. Then let Ui be defined as follows: Un+1 := 0   Ui := Bi EQ (Ui+1 |FTi ) , Ui+1 , Vi , where Bi are arbitrary function. 2.1 Bermudan Option Valuation For a Bermudan option Bi is given by the optimal exercise criteria, i.e., Bi (x, u, v) := G(x − v, u, v) with   u if y>0 G(y, u, v) := . v else This defines a backward induction i = n, n − 1, . . . , 1 for Ui . For a Bermudan option we have that the unconditional expectation (assuming that we have N (T0 ) = 1 for the numéraire) EQ (U1 ) is the (risk) neutral value of the Bermudan option with exercise dates T1 < . . . < Tn and exercise values Vi . 2.2 Bermudan Digital Option Valuation For a Bermudan option the exercise is optimal. This allows for a popular “trick” to ignore the first order derivative of G(y, u, v) with respect to y. Hence, for a Bermudan option it is not necessary to differentiate Bi with respect to x. However, this is just a special property of the function G and only holds for first order derivatives. For example, the trick cannot applied to a Bermudan digital option, i.e., Bi (x, u, v) := H(x − v, u, v) with   u if y>0 H(y, u, v) := . 1 else We will use this product as a test case of the methodology in Section 4. Remarks: The Bermudan digital option shows a dependency on the first order derivative with respect to the indicator condition y, since the expectation of the two outcomes u and 1 differs, i.e., we have a jump at y = 0. For the classic Bermudan option we have that the expectation of u and v agree at y = 0. The (automatic) differentiation of a jump may appear as an issue, but it is possible to solve this elegantly in an stochastic automatic differentiation [7] and in this note we focus on the treatment of the conditional expectation (however, our numerical results demonstrate that the algorithm [5] treats the discontinuity correctly, c.f. [7]). c 2017 Christian Fries 4 Version 0.4.0 (20170627) http://www.christianfries.com/finmath/stoachasticautodiff Automatic Backward Differentiation for American Monte-Carlo 3 Christian Fries Automatic Differentiation of the American-Monte-Carlo Backward Algorithm Let z denote an arbitrary model parameter. We assume that the underlying values Vi depend on z. For i = 1, . . . , n we have   d d Ui = Bi EQ (Ui+1 |FTi ) , Ui+1 , Vi dz dz  and writing Bi = Bi EQ (Ui+1 |FTi ) , Ui+1 , Vi to avoid the lengthy argument list  dBi d Ui = · dz dx and using d Q dz E (Ui )  d Q dBi dUi+1 dBi dVi E (Ui+1 |FTi ) + · + · dz du dz dv dz d dBi Ui = · EQ dz dx 3.1 d dz Ui = EQ   dUi+1 |FTi dz  + dBi dUi+1 dBi dVi · + · du dz dv dz (1) Forward Differentiation Applying this relation iteratively (plugging the expression of i of dU dz for j = i, . . . , n − 1) gives n X d Ui = dz j=i j−1 Y k=i dBk du ! dBj · EQ dx  dUj+1 |FTj dz  + dUj+1 dz j−1 Y k=i into the equation dBk du ! dBj dVj · dv dz To shorten notation, let Ai,j = j−1 Y k=i dBk du ! dBj dx Ci,j = j−1 Y k=i dBk du ! dBj dv such that    n  X dUj+1 dVj dUi = Ai,j · EQ |FTj + Ci,j · . dz dz dz (2) j=i This last equation would be natural in a forward (automatic) differentiation, since dV n+1 dUn dUn−1 we calculate 0 = dUdz , dz , dz , . . . , together with dzj forwardly. Note that forward here refers to the order of the operations in the algorithms (which runs backward over the indices j). c 2017 Christian Fries 5 Version 0.4.0 (20170627) http://www.christianfries.com/finmath/stoachasticautodiff ! . Automatic Backward Differentiation for American Monte-Carlo 3.2 Christian Fries Backward Differentiation For the application of a backward (adjoint) automatic differentiation Equation (2) would require a mixture of backward differentiation for that we first calculate dUj dz and followed by a forward application of (2). However, we can calculate the derivative in a single backward differentiation sweep: d Q We start with (1) for i = 1. Since we are only interest in dz E (U1 ) =  d Q E dz U1 , we can take expectation and get       d dB1 dU2 dB1 dV1 Q Q dB1 Q dU2 E U1 = E ·E |FTi + · + · dz dx dz du dz dv dz Now we may use        dU2 Q dB1 Q dB1 Q Q dU2 E = E E ·E |FT1 |FT1 · dx dz dx dz to get        d dB1 dU2 dB1 dV1 dB1 EQ U1 = EQ EQ |FT1 + · + · . (3) dz dx du dz dv dz Plugging (1) into (3) and repeating the previous argument for i = 2, . . . , k − 1 we get iteratively the forward equation     k X dVj  dUk+1 d ∗ U1 = EQ A∗1,k · + C1,j · . EQ dz dz dz j=1 where A∗1,i ∗ C1,i A∗1,0   dBi dBi ∗ = E A1,i−1 |FTi + A∗1,i−1 dx du dBi = A∗1,i−1 dv = 1 Q Using i = n we have with Un+1 = 0 that  EQ d U1 dz   = EQ  n X j=1  ∗ C1,j · dVj  . dz ∗ have an intuitive interpretation in a The recursive definitions of A∗1,i , C1,i backward (automatic) differentiation algorithm: in the algorithm the conditional expectation operator on Ui+1 is replaced by taking the conditional expectation of the adjoint differential. c 2017 Christian Fries 6 Version 0.4.0 (20170627) http://www.christianfries.com/finmath/stoachasticautodiff Automatic Backward Differentiation for American Monte-Carlo 4 Christian Fries Numerical Results As a test case we calculate the delta of a Bermudan digital option. This product pays if S(Ti ) − Ki > Ũ (Ti ) in Ti if no payout has been occurred, 1 where Ũ (T ) is the time T value of the future payoffs, for T1 , . . . , Tn . Note that Ũ (Tn ) = 0, such that the last payment is a digital option. This product is an ideal test-case: the valuation of Ũ (Ti ) is a conditional expectation. In addition conditional expectation only appears in the indicator function, such that keeping the exercise boundary (the condition) fixed, would result in a delta of 0. On the other hand, the delta of a digital option payoff is only driven by the movement of the indicator function, since d df(S) E(1(f (S(T )) > 0)) = φ(f −1 (0)) , dS0 dS0 where φ is the probability density of S and 1(·) the indicator function. See [6] The results are depicted in Figure 1 for T1 = 1, T2 = 2, T3 = 3, T4 = 4, and K1 = 0.5, K2 = 0.6, K3 = 0.8, K4 = 1.0 for a model with S0 = 1. The implementation of this test case is available in [5]. Bermudan Digital Option Delta 1 Central Finite Difference Approximation 0.9 Stochastic Automatic Differentiation 0.8 0.7 Delta 0.6 0.5 0.4 0.3 0.2 0.1 0 0.000001 0.00001 0.0001 0.001 0.01 0.1 1 10 Finite Difference Shift Size Figure 1: Delta of a Bermudan digital option using finite differences (red) and stochastic AAD. The calculations were repeated with 4 different Monte-Carlo random number seeds (hence there 4 red data series and 4 data series). The finite difference approximation is biased for large shifts size The blue dashed line depicts the value of the delta of the conditional expectation operator is ignored. This generates a bias du to the correlation of derivative and underlying. c 2017 Christian Fries 7 Version 0.4.0 (20170627) http://www.christianfries.com/finmath/stoachasticautodiff Automatic Backward Differentiation for American Monte-Carlo 5 Christian Fries Implementation Design Using the framework described in [7] we are able to implement the methodology with a minimum of code complexity: we require only two additional lines of code: In [4] all random variable objects of a Monte-Carlo simulation are implementing a common interface RandomVariableInterface. This interface offers methods for arithmetic operators like add, sub, mult, exp, but also an operator RandomVariableInterface getConditionalExpectation( ConditionalExpectationEstimatorInterface estimator); The default implementation of this method is just default RandomVariableInterface getConditionalExpectation( ConditionalExpectationEstimatorInterface estimator) { return estimator.getConditionalExpectation(this); } In other words: all conditional expectations of random variables have to be called through this method - which enables us to track conditional expectation in the operator tree. To enable adjoint automatic differentiation we inject a special implementation of RandomVariableInterface which records the operator tree and can perform the AAD. The implementation of the differential of the operator getConditionalExpectation now consists of two parts: First, the partial derivative of the operator with respect to its arguments is set to 1.0: case CONDITIONAL_EXPECTATION: return new RandomVariable(1.0); - this implies that for the arguments the conditional expectation is replaced by the identity operator. Second, the backward propagation of the differential contains the additional check for the operator, applying it to the differential if required: if(operatorType == OperatorType.CONDITIONAL_EXPECTATION) { ConditionalExpectationEstimatorInterface estimator = ( ConditionalExpectationEstimatorInterface)operator; derivative = estimator.getConditionalExpectation(derivative); } 6 Conclusion In this note we presented a simple modification of the backward automatic differentiation of algorithms which require the calculation (estimation) of a conditional expectation: the conditional expectation operator has to be applied to the adjoint differential, while the remaining algorithm remains unchanged. Our method has important advantages over a direct differentiation of the conditional expectation estimator ([1, 3]): 1. Do not differentiate an approximation: It is often not clear that differentiation of an approximation given a good approximation of the differential. In c 2017 Christian Fries 8 Version 0.4.0 (20170627) http://www.christianfries.com/finmath/stoachasticautodiff Automatic Backward Differentiation for American Monte-Carlo Christian Fries our approach it is not necessary to differentiate the approximation of the conditional expectation operator. A simple example is if the conditional expectations is approximated by fixed bins, which results in a pice-wise constant approximation (see [6]) and the (automatic) differentiation of the conditional expectation would be zero. 2. The approach allows to use a different approximations of the conditional expectation operator in the valuation and in the algorithmic differentiation. This can improve the accuracy of the differentiation. For example, it is possible to choose different regression basis functions. Most importantly, the approach greatly simplifies the implementation of the algorithm. In [5] the implementation basically consists of adding two lines of code. c 2017 Christian Fries 9 Version 0.4.0 (20170627) http://www.christianfries.com/finmath/stoachasticautodiff Automatic Backward Differentiation for American Monte-Carlo Christian Fries References [1] A NTONOV, A LEXANDRE: Algorithmic Differentiation for Callable Exotics (April 4, 2017). http://ssrn.com/abstract=2839362. [2] C APRIOTTI , L UCA ; G ILES , M IKE: Algorithmic Differentiation: Adjoint Greeks Made Easy (2011). http://ssrn.com/abstract= 1801522. [3] C APRIOTTI , L UCA ; J IANG , Y UPENG ; M ACRINA , A NDREA: AAD and Least Squares Monte Carlo: Fast Bermudan-Style Options and XVA Greeks (September 23, 2016). https://ssrn.com/abstract=2842631 or http://dx.doi.org/10.2139/ssrn.2842631 [4] FINMATH . NET: finmath-lib: Mathematical Finance Library: Algorithms and methodologies related to mathematical finance. https://github. com/finmath/finmath-lib finmath-lib automatic differentiation exten[5] FINMATH . NET: tions: Enabling finmath lib to utilize automatic differentiation algorithms (e.g. AAD). https://github.com/finmath/ finmath-lib-automaticdifferentiation-extensions [6] F RIES , C HRISTIAN P.: Mathematical Finance. Theory, Modeling, Implementation. John Wiley & Sons, 2007. ISBN 0-470-04722-4. http://www.christian-fries.de/finmath/book. [7] F RIES , C HRISTIAN P.: Stochastic Automatic Differentiation: Efficient Implementation of Automatic Differentiation for Monte-Carlo Simulations. (June, 2017). https://ssrn.com/abstract=2995695 [8] G ILES , M ICHAEL ; G LASSERMAN , PAUL: Smoking adjoints: fast Monte Carlo Greeks (2006). Risk, January 2006. https://www.risk.net Notes Suggested Citation F RIES , C HRISTIAN P.: Automatic Differentiation of the AmericanMonte-Carlo Backward Algorithm. (June, 2017). https: //ssrn.com/abstract=3000822 http://www.christian-fries.de/finmath/ stoachasticautodiff c 2017 Christian Fries 10 Version 0.4.0 (20170627) http://www.christianfries.com/finmath/stoachasticautodiff Automatic Backward Differentiation for American Monte-Carlo Christian Fries Classification Classification: MSC-class: 65C05 (Primary) ACM-class: G.1.4; G.3; I.6.8. JEL-class: C15, G13. c 2017 Christian Fries 11 Version 0.4.0 (20170627) http://www.christianfries.com/finmath/stoachasticautodiff
8cs.DS
Sign properties of Metzler matrices with applications Corentin Briat arXiv:1512.07043v3 [math.DS] 7 Nov 2016 Department of Biosystems Science and Engineering, ETH-Zürich, Switzerland Abstract Several results about sign properties of Metzler matrices are obtained. It is first established that checking the sign-stability of a Metzler sign-matrix can be either characterized in terms of the Hurwitz stability of the unit sign-matrix in the corresponding qualitative class, or in terms the negativity of the diagonal elements of the Metzler sign-matrix and the acyclicity of the associated directed graph. Similar results are obtained for the case of Metzler block-matrices and Metzler mixed-matrices, the latter being a class of Metzler matrices containing both sign- and real-type entries. The problem of assessing the sign-stability of the convex hull of a finite and summable family of Metzler matrices is also solved, and a necessary and sufficient condition for the existence of common Lyapunov functions for all the matrices in the convex hull is obtained. The concept of sign-stability is then generalized to the concept of Ker+ (B)-sign-stability, a problem that arises in the analysis of certain jump Markov processes. A sufficient condition for the Ker+ (B)-sign-stability of Metzler sign-matrices is obtained and formulated using inverses of sign-matrices and the concept of L+ -matrices. Several applications of the results are discussed in the last section. Keywords: Sign-stability; Metzler matrices; Positive systems 2010 MSC: 15A48, 34D05 1. Introduction Metzler matrices [1] are often encountered in various fields such as economics [2] and biology [3–6].These matrices have also been shown to play a fundamental role in the description of linear positive systems, a class of systems that leave the nonnegative orthant invariant [7]. Due to their particular structure, such systems have been the topic of a lot of works in the dynamical systems and control communities; see e.g. also [8–14] and references therein. In this paper, we will be interested in the sign-properties of such matrices, that is, those general properties that can be deduced from the knowledge of the sign-pattern. This problem initially emerged from economics [15], but also found applications in ecology [16–19] and chemistry [20, 21]. The rationale for this approach stems from the fact that, in these fields, the interactions between different participants in a given system are, in general, qualitatively known but quantitatively unknown. This incomplete knowledge is very often a direct consequence of the difficulty in identifying and discriminating models because of their inherent complexity and scarce experimental data. In this context, it seems relevant to study the properties of the system solely based on the sign pattern structure or, more loosely, from the pattern of nonzero entries. This is referred to as qualitative analysis [22]. For instance, the sign-stability of general matrices (the property that all the matrices having the same sign-pattern are all Hurwitz stable) has been studied in [15, 19, 23]. An algorithm, having worst-case O(n2 ) time- and space-complexity, verifying the conditions in [23] has been proposed in [24]. Many other problems have also been addressed over the past decades; see e.g. [25–29] and references therein. The first problem addressed in this paper is the sign-stability problem for which several general necessary and sufficient conditions exist [22]. By adapting these results, we show that the sign-stability of a Metzler Email address: [email protected], [email protected] (Corentin Briat) URL: www.briat.info (Corentin Briat) Preprint submitted to Elsevier November 8, 2016 sign-matrix can be assessed from the Hurwitz stability of a single particular matrix, referred to as the unit sign-matrix, lying inside the qualitative class. Therefore, for this class of matrices, checking the Hurwitz stability of an uncountably infinite and unbounded family of matrices is not more difficult than checking the stability of a given matrix. Lyapunov conditions, taking in this case the form of linear programs [30], can hence be used for establishing the sign-stability of a given Metzler sign-matrix. An alternative condition is formulated in terms of the acyclicity of the graph associated with the sign-pattern, a property that can be easily checked using algorithms such as the Depth-First-Search algorithm [31]. This result is then generalized to the case of block matrices for which several results, potentially enabling the use of distributed algorithms, are provided. Sign-stability results are then generalized to the problem of establishing the sign-stability of all the matrices located in the convex hull of a finite number of ”summable” Metzler sign-matrices. This problem is highly connected to the analysis of linear positive switched systems, a problem that has been extensively considered in the literature: see e.g. [32–34]. Necessary and sufficient conditions for the existence of a common Lyapunov function for all the matrices in the convex-hull of such matrices are also provided. A novel stability concept, referred to as Ker+ (B)-sign-stability, is then considered in order to formulate a constrained stability concept that arises in the analysis and the control of positive nonlinear systems and stochastic reaction networks [4, 6, 35]. It is shown that the obtained sufficient conditions characterizing Ker+ (B)-sign-stability of a Metzler sign-matrix can be brought back to a combinatorial problem known to be NP-complete [36]. Finally, mixed-matrices consisting of matrices with both sign- and real-type entries are considered and their sign-properties clarified, again in terms of algebraic and graph theoretical conditions analogous to those obtained in the pure sign-matrix case. Several application examples are provided in the last section. Outline: Section 2 recalls some important definitions and known results. Section 3 is devoted to the analysis of the sign-stability of Metzler sign-matrices. The analysis of the sign-stability of block matrices is carried out in Section 4. Conditions for the sign-stability of the convex-hull of Metzler sign-matrices are obtained in Section 5. Section 6 is concerned with relative structural stability analysis whereas Section 7 addresses partial sign-stability. Application examples are finally discussed in Section 8. Notations: The set of real, real positive and real nonnegative numbers are denoted by R, R>0 and R≥0 , respectively. These notations generalize to vectors where Rn>0 and Rn≥0 are used to denote vectors with positive and nonnegative entries, respectively. The sets of integers and nonnegative integers are denoted by Z and Z≥0 , respectively. The n-dimensional vector of ones is denoted by 1n . The block-diagonal matrix with diagonal elements given by Mi ∈ Rni ×mi is denoted by diagi {Mi }. 2. Preliminaries We define in this section the terminology that will be used in the paper as well as some elementary results. Definition 2.1. Let us define the following matrix types and associated sets: • A sign-matrix is a matrix taking entries in S := {⊖, 0, ⊕}. The set of all n × m sign-matrices is denoted by Sn×m . The set S has a full-order structure with the order ⊖ < 0 < ⊕. In this regard, ⊖ is considered here as a negative entry and ⊕ as a positive one. • A Metzler matrix with entries in R ∪ S is a square matrix having nonnegative off-diagonal entries. The set of all n × n Metzler matrices with entries in R ∪ S is denoted by Mn := (R ∪ S)n×n . n×m n×m • The cones of n × m nonnegative matrices with entries in S or R are denoted by S≥0 and R≥0 , respectively. • The sets MSn and MRn are used to denote the sets of Metzler sign-matrices and Metzler real matrices, respectively. The considered orders are the natural one and the one defined above for sign-matrices. 2 Definition 2.2. The qualitative class of a matrix A ∈ (S ∪ R)n×m is the set of matrices given by    ∈ R>0 if [A]ij = ⊕   Q(A) := M ∈ Rn×m [M ]ij ∈ R<0 if [A]ij = ⊖ .    = [A]ij otherwise Definition 2.3. Let M ∈ Sn×m . Then, the unit sign-matrix U associated with M , denoted by U = sgn(M ), is defined as  if [S]ij = 0,  0 [U ]ij := (1) 1 if [S]ij = ⊕,  −1 if [S]ij = ⊖ where sgn(·) is the extension of the signum function to sign-matrices. Definition 2.4 ([23]). For any matrix A ∈ (S ∪ R)n×n , we define its associated directed graph as DA = (V, ED ) where V = {1, . . . , n} and ED = {(j, i) : aij 6= 0, i, j ∈ V, i 6= j} . Definition 2.5. A matrix M ∈ Sn×n is sign-stable if all the matrices M ′ ∈ Q(M ) are Hurwitz stable. Definition 2.6. A matrix M ∈ Sn×n is potentially stable if Q(M ) contains at least one matrix that is Hurwitz stable. Example 2.7. Let us consider the matrices  ⊖ M1 = ⊕   ⊖ ⊕ and M2 = ⊕ ⊖  ⊖ . ⊖ (2) The matrix M1 is not sign-stable since the determinant is not sign definite; i.e. det(M1 ) = ⊕ + ⊖. Indeed, the entries (1,1), (1,2) and (2,2) being given, we can always find a sufficiently large entry (2,1) such that the determinant is negative and, hence, the matrix not Hurwitz stable. On the other hand, the matrix M2 is sign-stable since trace(M2 ) = ⊖ and det(M2 ) = ⊕; i.e. the coefficients of the characteristic polynomial are always positive and hence all the matrices in the qualitative class are Hurwitz stable. However, the sign-matrix M1 is potentially sign-stable as some matrices in the qualitative class are Hurwitz stable. Lemma 2.8 (Hurwitz stability of Metzler matrices, [1]). Let us consider a matrix A ∈ MRn . Then, the following statements are equivalent: (a) The matrix A is Hurwitz stable. (b) A is nonsingular and A−1 ≤ 0. (c) There exists a vector v ∈ Rn>0 such that v T A < 0. 3. Sign-stability of Metzler sign-matrices The sign-stability of matrices is a problem that has been extensively studied and for which a complete solution exists. Such a complete solution is, for instance, given in [23, Theorem 2] where a set of necessary and sufficient conditions is provided in terms of algebraic and graph theoretical concepts. We propose here to study the particular case of Metzler sign-matrices and derive a collection of conditions that are more tailored to that kind of matrices than the general ones stated in [23]. These conditions will be shown to be simpler than those in [23] from both a theoretical and a computational viewpoint. It will indeed be proved that the sign-stability of a Metzler sign-matrix can be established by checking the Hurwitz stability of a single matrix in the associated qualitative class. From a computational viewpoint, we also demonstrate that the Depth-First Search (DFS) algorithm [31] can be used in order to establish the sign-stability of the matrix. This algorithm has worst-case time- and space-complexity of O(n2 ) and O(n), respectively. 3 3.1. Preliminary results The following results will play a key role in the derivation of the main results of the section. Lemma 3.1 ([7]). Let A ∈ MRn . If A is Hurwitz stable, then A has negative diagonal elements. Lemma 3.2. Let us consider a matrix M ∈ MSn with negative diagonal elements and assume that its associated directed graph DM is an elementary cycle. Then, the matrix sgn(M ) is irreducible and its PerronFrobenius eigenvalue, denoted by λP F (sgn(M )), is equal to 0 with 1n as associated right-eigenvector. Proof : Since DM is an elementary cycle, then sgn(M ) can be decomposed as sgn(M ) = P − In where P is a cyclic permutation matrix with zero entries on the diagonal. Hence, sgn(M ) is irreducible since P is irreducible. Furthermore, it is immediate to see that sgn(M )1 = 0 and hence that 0 is an eigenvalue of sgn(M ) with positive right-eigenvector equal to 1. From the irreducibility property and the Perron-Frobenius theorem [1], we have that this eigenvalue is the Perron-Frobenius one and that it is unique. The proof is complete. ♦ Lemma 3.3. Let us consider a matrix M ∈ MRn ∩ {−1, 0, 1}n×n. Then, the following statements are equivalent: (a) M is Hurwitz stable (in the sense that M interpreted as a real matrix is Hurwitz stable). (b) The diagonal elements of M are negative and the directed graph DM is acyclic. Proof : Proof of (a) ⇒ (b). We use the contrapositive. We have two cases. The first one is when at least one of the diagonal entries is nonnegative and, in this case, Lemma 3.1 proves the implication. The second one is when there exists at least a cycle in the graph DM . Let us assume that there is a single cycle of order k ≥ 2 in DM (the case of multiple cycles can be addressed in the same way). Define the matrix f ∈ MRn ∩ {−1, 0, 1}n×n with negative diagonal elements and for which the graph D f is obtained from M M f is a cyclic permutation of the DM by removing all the edges that are not involved in the cycle. Then, M matrix   P − Ik 0 (3) 0 −In−k where P is a cyclic permutation matrix with diagonal elements equal to 0. The left-upper block then corresponds to the nodes involved in the cycle whereas the right-lower block corresponds to those that are f (in the same permutation basis). Hence, from the Perron-Frobenius not. Clearly, we have that M ≥ M f). Again due theorem and the theory of nonnegative/Metzler matrices [1], we have that λP F (M ) ≥ λP F (M f to the Perron-Frobenius theorem and Lemma 3.2, we have that λP F (M ) = λP F (P − Ik ) = 0 and hence λP F (M ) ≥ 0, proving then that M is not Hurwitz stable. Proof of (b) ⇒ (a). Assume that statement (b) holds. Since the graph DM is acyclic, then there exists a permutation matrix P such that the matrix P T M P is upper-triangular with negative elements on the diagonal and nonnegative elements in the upper-triangular part. Therefore, the matrix M is Hurwitz stable since its eigenvalues coincide with its diagonal elements, which are negative. The proof is complete. ♦ 3.2. Main results We can now state our main result on the sign-stability of Metzler sign-matrices: Theorem 3.4. Let A ∈ MSn×n . Then, the following statements are equivalent: (a) The matrix A is sign-stable. (b) The matrix sgn(A) is Hurwitz stable. 4 (c) There exists v ∈ Rn>0 such that v T sgn(A) < 0. (d) The directed graph DA is acyclic and the diagonal elements of A are negative. (e) There exists a permutation matrix P such that P T AP is upper-triangular with negative diagonal elements. (f) The diagonal elements of A are negative and the DFS algorithm applied to the graph DA returns a spanning tree with no back edge1 . Proof : The proofs that (a) implies (b) and that (e) implies (a) are obvious. The proof that (b) is equivalent to (c) follows from Lemma 2.8. The proof that (d) is equivalent to (b) follows from Lemma 3.3. The proof that (d) is equivalent to (e) follows from the definition of an acyclic graph and, finally, the proof that (d) is equivalent to (f) follows from the property that a graph is acyclic if and only if one of its associated spanning trees has no back edge; see [31]. ♦ Remark 3.5. The condition of statement (b) in Theorem 3.4 states that it is enough to check the Hurwitz stability of the unique unit sign-matrix inside the qualitative class in order to establish the sign-stability of the sign-matrix and the Hurwitz stability of the entire qualitative class. It is important to stress that this condition is peculiar to Metzler matrices as demonstrated by the following example. Indeed, the matrix   ⊖ ⊕ ⊕ A = ⊖ ⊖ ⊖ (4) 0 ⊕ ⊖ is not sign-stable because of the presence of a cycle of order 3 unit sign-matrix given by  −1 1 sgn(A) = −1 −1 0 1 is Hurwitz stable since sgn(A) + sgn(A)T is negative definite. in its directed graph. However, the associated  1 −1 (5) −1 Remark 3.6. The proof that (a) is equivalent to (d) in Theorem 3.4 could have been based on the general sign-stability result [23, Theorem 2] that involves both algebraic and graph theoretical conditions. By applying them to the particular case of Metzler sign-matrices, we obtain that a Metzler sign-matrix is sign-stable if and only if the diagonal elements are negative and its directed graph does not contain any cycle. For general matrices, cycles of length 2 are still allowed provided that the products of the entries involved in the same cycle are negative. This is clearly not possible in the context of Metzler matrices since all the off-diagonal entries are nonnegative. Remark 3.7 (Computational complexity). The statement (c) indicates that the Hurwitz stability of the real Metzler matrix sgn(A) can be easily checked since the problem of finding a vector v > 0 such that v T sgn(A) < 0 is a linear programming problem [30] that can be solved using modern optimization algorithms in an efficient way. By virtue of statement (f ), an alternative way for checking the sign-stability of a Metzler sign-matrix is through the negativity of its diagonal elements and the acyclicity of its associated directed graph. Indeed, checking the negativity of the diagonal elements and the existence of a cycle in a given graph are both simple problems, the latter being solvable using algorithms such as the Depth-First-Search algorithm [31] which has a worst-case time-complexity of O(n2 ) and a worst-case space-complexity of O(n). Complexity-wise, the general conditions of [23, Theorem 2] can be checked using the algorithm proposed in [24] which has worst-case time- and space-complexity of O(n2 ). 1 The spanning tree is the tree generated by the DFS algorithm while searching the graph and a back edge is an edge that points from a node to one of its ancestors in the spanning tree [31]. 5 For completeness, we provide several necessary conditions for the sign-stability of Metzler sign-matrices: Proposition 3.8 (Necessary conditions). The Metzler sign-matrix A ∈ MSn is not sign-stable if one of the following statements hold: (a) (b) (c) (d) [A]ii ≥ 0 for some i = 1, . . . , n. [A]ij [A]ji > 0 for some i, j = 1, . . . , n, i 6= j. There is a cycle in the directed graph DA . The matrix A is irreducible. Proof : Statement (a) follows from Lemma 3.1 while the others follow from the existence of at least one cycle in the directed graph associated with the sign-matrix. ♦ We conclude this section with a result on the potential sign-stability of Metzler sign-matrices: Theorem 3.9 (Potential sign-stability). Let us consider a Metzler sign-matrix A ∈ MSn . Then, the following statements are equivalent: (a) The diagonal entries of A are negative. (b) The matrix A is potentially sign-stable. Proof : Proof of 2) ⇒ 1) Since the matrix A is Metzler and is partially sign-stable, then there exists a matrix A′ ∈ Q(A) that is Hurwitz stable. From Lemma 3.1, this matrix necessarily has negative diagonal elements and, hence, A must have negative diagonal elements. Proof of 1) ⇒ 2) Assume the matrix A has negative diagonal entries. Let us then consider the matrix Mε , ε > 0, defined as  if [A]ij = ⊖,  −1 [Mε ]ij = (6) ε if [A]ij = ⊕,  0 if [A]ij = 0 and note that Mε ∈ Q(A). Clearly, when ε = 0, the matrix M0 is Hurwitz stable and all the eigenvalues are equal to -1. Using the fact that the eigenvalues of Mε are continuous with respect to ε, then we can conclude that there exists an ε̄ > 0 such that for all 0 ≤ ε < ε̄, the matrix Mε is Hurwitz-stable, showing then that A is potentially sign-stable. The proof is complete. ♦ It is finally interesting to note that Theorem 3.4 can also be used to obtain analogous sign-stability conditions for nonnegative sign-matrices. Note, however, that sign-stability needs to be defined here as the Schur stability of all the matrices in the qualitative class; i.e. all the matrices in the qualitative class have spectral radius less than unity. This result is stated below: n×n Theorem 3.10. Let A ∈ S≥0 . Then, the following statements are equivalent: (a) (b) (c) (d) (e) (f) All the matrices in Q(A) have spectral radius less than unity. All the matrices in Q(A) have zero spectral radius. The matrix sgn(A) − In is Hurwitz stable. There exists v ∈ Rn>0 such that v T (sgn(A) − In ) < 0. The directed graph DA is acyclic and the diagonal elements of A are all equal to zero. There exists a permutation matrix P such that P T AP is upper-triangular and has zero elements on the diagonal. (g) There is no back edge in DA and the diagonal elements of A are all equal to zero. 6 Proof : We need to prove here that (a) is equivalent to (b). The equivalence with the other statements n×n follows from Theorem 3.4 and the fact that a nonnegative matrix A ∈ R≥0 is Schur stable if and only if the Metzler matrix A − In is Hurwitz stable. Clearly, (b) implies (a), so let us focus on the reverse implication and assume that (b) does not hold. Hence, there exists a matrix M ∈ Q(A) such that ρ(M ) = ǫ > 0. If ǫ ≥ 1, then (a) does not hold and, on the other hand, if ǫ ∈ (0, 1), then using the fact that αM ∈ Q(A) for any α > 0, we can conclude that, by choosing a large enough α > 0, we will have ρ(αM ) > 1 and the statement (a) does not hold again. This proves that (a) implies (b). ♦ 4. Sign-stability of block matrices The objective of this section is to extend the results of the previous one to the case of Metzler block sign-matrices. At first sight, it may seem irrelevant to consider Metzler block sign-matrices as they can be analyzed using the tools derived in the previous section. The main rationale, however, is that these matrices are commonplace in fields such as control theory where they can be used to represent, for instance, interconnections of linear (positive) dynamical systems. The objective is then to find conditions that characterize the sign-stability of a given Metzler block sign-matrix based on the sign-stability of its elementary diagonal blocks and some additional conditions capturing the interactions between the different diagonal blocks (i.e. the off-diagonal blocks). This paradigm has led to many important results such as the small-gain theorem [37, 38] and its linear positive systems variants [9, 12]. First of all, several existing results about the linear S-procedure [39, 40] are recalled and some novel ones are also obtained. The S-procedure is an essential tool of control theory which allows for checking the negativity of some conditions under some constraints in a computationally tractable way. These results are then used to obtain exact linear programming conditions characterizing the sign-stability of Metzler block real matrices. Finally, the obtained conditions are then adapted to the analysis of the sign-stability of Metzler block-matrices. It is emphasized that such an approach enables the use of distributed algorithms for solving this problem for very large systems in a very efficient way. 4.1. Preliminary results The main theoretical tool considered here is the so-called S-procedure [39] and, more specifically, its linear version which is known to provide an exact characterization of the nonnegativity of a linear form on a set defined by linear inequalities (e.g. a compact convex polytope). The linear version of the S-procedure is recalled below for completeness. Lemma 4.1 (Linear S-procedure, [39, 40]). Let σi ∈ Rn , i = 0, . . . , N , and assume that the set  S≥0 := y ∈ Rn : σiT y ≥ 0, i = 1, . . . , N (7) is nonempty. Then, the following statements are equivalent: (a) We have that σ0T y ≥ 0 for all y ∈ S≥0 . (b) There exist some multipliers τi ≥ 0, i = 1, . . . , N , such that the inequality σ0T y − N X τi σiT y ≥ 0 (8) i=1 holds for all y ∈ Rn . (c) There exists a multiplier vector τ ∈ RN ≥0 such that the inequality σ0T y − τ T σ̄y ≥ 0 T holds for all y ∈ Rn where σ̄ := colN i=1 (σi ). 7 (9) Proof : The equivalence between the first statements follows from the results in [39, 40]. The last one is simply is an equivalent vector reformulation of the statement (b). ♦ With this result in mind, we can now derive an analogous result on the nonnegative orthant that involves equality instead of inequality constraints. Based on the linear S-procedure, the following result can be proved: Proposition 4.2. Let σi ∈ Rn , i = 0, . . . , N , and assume that the set  S0+ := y ∈ Rn≥0 : σiT y = 0, i = 1, . . . , N (10) is nonempty. Then, the following statements are equivalent: (a) We have that σ0T y ≥ 0 for all y ∈ S0+ . (b) There exist some multipliers ηi ∈ R, i = 1, . . . , N , such that the inequality σ0T y + N X ηi σiT y ≥ 0 (11) i=1 holds for all y ∈ Rn≥0 .  (c) There exists a multiplier vector η ∈ RN such that σ0T − η T σ̄ y ≥ 0 for all y ∈ Rn≥0 where σ̄ := T colN i=1 (σi ). T (d) There exists a multiplier vector η ∈ RN such that σ0T − η T σ̄ ≥ 0 where σ̄ := colN i=1 (σi ). Proof : Defining S0+  S≤0 := y ∈ Rn : −σiT y ≥ 0, i = 1, . . . , N (12) S≥0 ∩ S≤0 ∩ Rn≥0 . then we can see that = Applying then the linear S-procedure, i.e. Lemma 4.1, we get that the statement (a) is equivalent to the existence of some scalars τi ≥ 0, i = 1, . . . , 2N , such that σ0T y + N X [τi − τi+N ] σiT y ≥ 0 i=1 for all y ∈ Rn≥0 . Letting then ηi := τi − τi+N ∈ R yields the equivalence between the two first statements. The equivalence between the three last statements follows from the facts that σ0T y − N X i=1  ηi σiT y = σ0T − η T σ̄ y n T n with η = colN i=1 (ηi ) and that for a given vector c ∈ R , we have that c y ≥ 0 for all y ∈ R≥0 if and only if T c ≥ 0. ♦ We can now state the following important result: n ×nij i Theorem 4.3. Let Ai ∈ MRni and Bij ∈ R≥0 statements are equivalent: (a) The Metzler matrix is Hurwitz stable.  A1  ..  . BN 1 CN 1 n ×nj ij , Cij ∈ R≥0 B12 C12 BN 2 CN 2 8 , i, j = 1, . . . , N , i 6= j. Then, the following  . . . B1N C1N  ..  . ... AN (13) i (b) There exist vectors vi ∈ Rn>0 , ℓij ∈ Rnij , i, j = 1, . . . , N , i 6= j, such that the inequalities viT Ai + N X ℓTji Cji j6=i viT Bij − ℓTij < 0 (14) ≤ 0 hold for all i, j = 1, . . . , N , j 6= i. Proof : The equivalence between the two statements can be shown using Proposition 4.2. From Lemma 2.8, a Metzler matrix A ∈ MRn is Hurwitz stable if and only if there exists a vector v ∈ Rn>0 such that v T A < 0, which is equivalent to the existence of a vector v ∈ Rn>0 and a small enough scalar ε > 0 such that v T Ax ≤ −εv T x for all x ∈ Rn≥0 . By applying this result to the matrix (13) and decomposing v =: colN i=1 (vi ), ni i vi ∈ Rn>0 , and x =: colN (x ), x ∈ R , following the same partitioning, we get that the matrix (13) is i i i=1 >0 Hurwitz stable if and only if the following feasibility problem has a solution: Find (P) s.t. i vi ∈ Rn>0 , ε > 0 N X i=1 for all  viT  Ai xi + N X j=1 j6=i  N X  viT xi , ≤ −ε Bij Cij xj   i=1 i xi ∈ Rn≥0 , i = 1, . . . , N Letting now wij := Cij xj , i, j = 1, . . . , N , i 6= j, we get that the inequality constraint in Problem (P) is equivalent to the fact that the inequality   N X i=1 N X   Bij wij  viT  (A + εI)x + i i   ≤ 0. (15) j=1 j6=i Hence, we get a problem analogous to that of Proposition 4.2 with the difference that we have vector equality constraints instead of scalar ones. However, by virtue of the statement (c) or (d) of Proposition 4.2, vector of constraints can be dealt using vector multipliers (this can also be retrieved by scalarizing the constraints, considering scalar multipliers and vectorizing the result). Invoking then Proposition 4.2, (b), adapted to vector equality constraints, we get that the above inequality condition holds under the vector equality constraints if and only if there exist some vector multipliers ℓij ∈ Rnij , i, j = 1, . . . , N , i 6= j, such that   N X i=1 N N X  X  + ℓTij (Cij xj − wij ) ≤ 0 B w (A + εI)x + viT  ij ij i i   (16) i,j=1 j6=i j=1 j6=i n ij i holds for all xi ∈ Rn≥0 , i, j = 1, . . . , N , i 6= j. Reorganizing the terms in the above and all wij ∈ R≥0 inequality yields   N N N X X X   T  T  v (Ai + εI) + viT Bij − ℓTij wij ≤ 0 ℓji Cji  xi +  i i=1 (17) i,j=1 j6=i j=1 j6=i where the swapping of the indices in the ℓij stems from the fact ℓij acts on terms depending on xj while ℓji acts on terms depending on xi . Using finally the equivalence between the statements (c) and (d) of nij i Proposition 4.2, we get that the feasibility of (17) for all xi ∈ Rn≥0 is equivalent to the and all wij ∈ R≥0 feasibility of N X ℓTji Cji ≤ 0 and viT Bij − ℓTij ≤ 0 (18) viT (Ai + εI) + j=1 j6=i 9 for all i, j = 1, . . . , N , i 6= j, which is equivalent to the conditions (14). The proof is complete. ♦ We can see from this result that the stability of the overall block-matrix can be broken down to the stability analysis of N subproblems (one for each of the vi ’s) involving coupled multipliers that explicitly capture the topology of the interconnection. An important advantage of this formulation lies in its convenient form allowing for the derivation of efficient parallel algorithms for establishing the Hurwitz stability of Metzler block-matrices. 4.2. Main results Before stating the main result of the section, we define the Minkowski product between two qualitative classes associated with nonnegative sign-matrices as the set Q(A1 )Q(A2 ) := {M1 M2 : M1 ∈ Q(A1 ), M2 ∈ Q(A2 )} (19) n1 ×m 2 where A1 ∈ S≥0 and A2 ∈ Sm×n . It is also important to introduce the three following product rules for ≥0 dealing with products of nonnegative sign-matrices: 1) ⊕ + ⊕ = ⊕; 2) ⊕ · ⊕ = ⊕; 3) 0 · ⊕ = 0. It seems that product of sign-matrices has never been introduced before and is defined for the first time. In addition, the Minkowski products of qualitative classes also seems to be new. A possible reason comes from the fact that the set of sign-matrices is not closed under addition or multiplication. However, the set of nonnegative sign-matrices is closed under these operations. Remark 4.4. Note that because of these product rules, we have Q(A1 )Q(A2 ) ⊂ Q(A1 A2 ) and, in general, Q(A1 )Q(A2 ) 6= Q(A1 A2 ). Similarly, sgn(A1 A2 ) 6= sgn(A1 ) sgn(A2 ) in general. Remark 4.5. Note that because of these product rules, we have that Q(A1 )Q(A2 ) ⊂ Q(A1 A2 ) and that, in general, Q(A1 )Q(A2 ) 6= Q(A1 A2 ). For instance, if     ⊕ and A2 = ⊕ ⊕ , A1 = ⊕ then Q(A1 )Q(A2 ) is the set of all 2 × 2 rank-1 positive matrices. However, since   ⊕ ⊕ , A1 A2 = ⊕ ⊕ then Q(A1 A2 ) is the set of all 2 × 2 positive matrices. On the other hand, if     ⊕ and A2 = ⊕ 0 , A1 = ⊕ then we have that Q(A1 )Q(A2 ) = Q(A1 A2 ). A similar statement can be made for unit sign-matrices. We indeed have, in general, that sgn(A1 A2 ) 6= sgn(A1 ) sgn(A2 ). For instance, this is the case for the matrices     ⊕ ⊕ ⊕ , and A2 = A1 = ⊕ 0 ⊕ for which we have that sgn(A1 A2 ) =     2 1 . and sgn(A1 ) sgn(A2 ) = 1 1 The above remark emphasizes the difficulty arising from the possible loss of independence between the entries of a matrix resulting from the multiplication of two sign-matrices. With this warning in mind, we can state the following result: 10 n ×n n ×n ij j i ij . Assume, moreover, that Q(B̃ij C̃ij ) = Theorem 4.6. Let Ãi ∈ MSni and B̃ij ∈ S≥0 , C̃ij ∈ S≥0 Q(B̃ij )Q(C̃ij ) for all i, j = 1, . . . , N , i 6= j. Then, the following statements are equivalent: (a) The Metzler sign-matrix   . . . B̃1N C̃1N  ..  . ... ÃN B̃12 C̃12 Ã1  .. à =  . B̃N 1 C̃N 1 B̃N 2 C̃N 2 (20) is sign-stable. (b) The matrix sgn(Ã) is Hurwitz stable. i (c) There exist vectors vi ∈ Rn>0 , ℓij ∈ Rnj , i, j = 1, . . . , N , j 6= i, such that the inequalities viT sgn(Ãi ) + N X ℓTji < 0 ℓTij < 0 (21) j6=i viT sgn(B̃ij C̃ij ) − for all i, j = 1, . . . , N , j 6= i. (d) The diagonal elements of à are negative and the directed graph Dà is acyclic. Proof : The assumption that Q(B̃ij C̃ij ) = Q(B̃ij )Q(C̃ij ) for all i, j = 1, . . . , N , i 6= j, indicates that multiplications between nonnegative sign-matrices do not create qualitative classes that strictly include the initial ones. This indicates, by virtue of Theorem 3.4 and Remark 4.5, that the sign-stability of the matrix à is equivalent to the Hurwitz stability of sgn(Ã), which proves the equivalence between (a) and (b). The equivalence with (d) also follows from Theorem 3.4 and Remark 4.5. We prove now the equivalence between (b) and (c). To this aim, let us consider the matrix  sgn(Ã1 )  .. sgn(Ã) =  . sgn(B̃N 1 C̃N 1 )  . . . sgn(B̃1N C̃1N )  .. . . sgn(ÃN ) sgn(B̃N 2 C̃N 2 ) . . . sgn(B̃12 C̃12 ) (22) Note that, by virtue of Remark 4.5, we have that sgn(B̃ij C̃ij ) 6= sgn(B̃ij ) sgn(C̃ij ) in general. We now observe that the above matrix is of the form of the matrix (13) where Ai = Ãi , Bij = sgn(B̃ij C̃ij ) and ♦ Cij = Inj . Applying then Theorem 4.3 yields the equivalence between the statements (b) and (c). The above result admits a potentially simpler formulation from a computational viewpoint (in the case where nij < nj ) whenever the assumption sgn(B̃ij C̃ij ) = sgn(B̃ij ) sgn(C̃ij ) holds for all i, j = 1, . . . , N , i 6= j. In this case, we have the following result: n ×n n ×n ij j i ij . Assume, moreover, that Q(B̃ij C̃ij ) = Theorem 4.7. Let Ãi ∈ MSni and B̃ij ∈ S≥0 , C̃ij ∈ S≥0 Q(B̃ij )Q(C̃ij ) and sgn(B̃ij C̃ij ) = sgn(B̃ij ) sgn(C̃ij ) for all i, j = 1, . . . , N , i 6= j. Then, the following statements are equivalent: (a) The matrix à in (20) is sign-stable. i (b) There exist vectors vi ∈ Rn>0 , ℓij ∈ Rnij , i, j = 1, . . . , N , j 6= i, such that the inequalities viT sgn(Ãi ) + N X ℓTji sgn(C̃ji ) < j6=i viT sgn(B̃ij ) for all i, j = 1, . . . , N , j 6= i. 11 − ℓTij < 0 0 (23) Proof : The proof follows the same lines as the proof of Theorem 4.6 with the difference that we identify the matrix sgn(Ã) with the matrix (13) together with Ai = Ãi , Bij = sgn(B̃ij ) and Cij = sgn(C̃ij ), and where we have used the assumption that sgn(B̃ij C̃ij ) = sgn(B̃ij ) sgn(C̃ij ) for all i, j = 1, . . . , N , i 6= j. The rest of the proof follows from the application of Theorem 4.3. ♦ When the assumption that Q(B̃ij C̃ij ) = Q(B̃ij )Q(C̃ij ) for all i, j = 1, . . . , N , i 6= j, is removed in the above results, then the conditions stated in the statements (b) and (c) are only sufficient for (a) to hold, but not necessary. 4.3. Example Let us consider the following matrices A1 A2 = =   ⊖ ⊕ ⊖ 0  0 , B12 ⊖  0 , B21 ⊖ = =   ⊕ , C21 0   0 , C12 ⊕  T 0 , ⊕  T ⊕ . = 0 = (24) Clearly, the assumptions of Theorem 4.6 are satisfied and the conditions (23) write −v11 + v12 −v21 + ℓ12 < 0, −v12 + ℓ21 < 0, −v22 < < 0, v11 − ℓ12 0, v22 − ℓ21 ≤ 0, ≤ 0 (25) where vi := col(vi1 , vi2 ). These conditions are equivalent to v12 < v11 , ℓ12 ∈ [v11 , v21 ) and ℓ21 ∈ [v22 , v12 ). The conditions are readily seen to be feasible. For instance, we may pick v1 = (5, 3), v2 = (7, 1), ℓ12 = 6 and ℓ21 = 2, proving then that the block matrix Ā is sign-stable. If, however, the matrix A2 is changed to   ⊖ ⊕ , A2 = 0 ⊖ then Ā is not sign-stable anymore and the conditions (23) are infeasible. 5. Sign-stability of a convex-hull of Metzler matrices We address in this section the problem of establishing whether, for some given family of Metzler signmatrices Ai ∈ MSn , i = 1, . . . , N , all the matrices in the convex-hull co(A1 , . . . , AN ) (when it is well-defined) are sign-stable. We first derive several intermediate results that will allow us to state under what conditions on the matrices A1 , . . . , AN , the convex-hull co(A1 , . . . , AN ) exists; i.e. co(A1 , . . . , AN ) ⊂ MSn . We will show that this problem is equivalent to the sign-summability problem of the matrices A1 , . . . , AN . Then, we show that establishing whether all the matrices in the convex hull of the matrices in co(A1 , . . . , AN ) are sign-stable is equivalent to checking the sign-stability of N + 1 Metzler sign-matrices, a problem having solutions that can be formulated in various ways including graph theoretical conditions or linear programs. The second problem is concerned with the existence of common quadratic/linear Lyapunov functions for a sign-summable family of Metzler sign-matrices A1 , . . . , AN . It will be shown that a necessary and sufficient condition for the existence of such Lyapunov functions is that all the matrices in the convex-hull be signstable. This result can be opposed to a well-known result stating that for a family of Metzler matrices, the stability of the associated convex-hull does not necessarily imply the existence of common Lyapunov function; e.g. [34]. Definition 5.1. Let A ⊂ MSn be a set of Metzler sign-matrices. The qualitative class of A is defined as [ Q(A) = Q(M ). (26) M∈A 12 Definition 5.2. Let Ai ∈ MSn , i = 1, . . . , N , be given Metzler sign-matrices. We say that the convex-hull of the matrices A1 , . . . , AN defined as ) (N N X X αi = 1 (27) αi Ai : α ≥ 0, co(A1 , . . . , AN ) := i=1 i=1 n is well-defined if co(A1 , . . . , AN ) ⊂ MS . Definition 5.3. Let us consider a family of Metzler sign-matrices AiP ∈ MSn , i = 1, . . . , N . We say that n the family is sign-summable or that the matrices are sign-summable if N i=1 Ai ∈ MS . Nonnegative matrices are trivially sign-summable as all the entries are nonnegative and, hence, the signsummability problem did not occur in the previous section. However, the sign of the diagonal elements of Metzler matrices is indefinite and this may cause their sum to have indefinite sign. A simple necessary and sufficient condition for the sign-summability of Metzler sign-matrices is given in the result below together with a full characterization of well-defined convex-hulls of Metzler sign-matrices: Proposition 5.4. Let us consider a family of Metzler sign-matrices Ai ∈ MSn , i = 1, . . . , N . Then, the following statements are equivalent: (a) The matrices A1 , . . . , AN are sign-summable. (b) For each fixed j = 1, . . . , n, the non-zero elements in the set {[Ai ]jj : i = 1, . . . , N } have the same sign. (c) The convex-hull co(A1 , . . . , AN ) is well-defined and we have that ) (N X N βi Ai : β ∈ {0, 1} , β 6= 0 (28) co(A1 , . . . , AN ) = i=1 together with Q(co(A1 , . . . , AN )) = [ β∈{0,1}N β6=0 Q N X i=1 βi Ai ! . (29) Proof : Proof that (a) is equivalent to (b). First note that because of the Metzler structure of the matrices, the nonnegative off-diagonal elements can be summed freely and only the diagonal elements are problematic. In this regard, the fact that (a) implies (b) is immediate. To prove the converse, we use contraposition and assume that (a) does not hold. This implies there exists a k ∈ {1, . . . , n} for which the set {[Ai ]kk : i = 1, . . . , N } contains at least one positive entry and one negative entry. Let i1 , i2 ∈ {1, . . . , N } be such that [Ai1 ]kk = ⊕ and [Ai2 ]kk = ⊖. This then implies that the sum Ai1 + Ai2 does not exist since the entry [Ai1 + Ai2 ]kk = ⊕ + ⊖ has indefinite sign. Proof that (a) is equivalent to (c). Assume that the statement (c) holds and hence that co(A1 , . . . , AN ) is well-defined or, equivalently, thatPall the matrices in the convex-hull are P Metzler sign-matrices. Observing P N N 1 now that the matrix N A = A ∈ co(A , . . . , A ) implies that 1 N i=1 i i=1 i i=1 Ai is a Metzler sign-matrix, N which implies in turn that the matrices A1 , . . . , AN are sign-summable and that (a) holds. Assume now that (a) holds. To prove that the convex-hull is well-defined, first note that for any αi > 0, we have that αi Ai = Ai as Q(αi Ai ) = Q(Ai ) and that for αi = 0 we have that αi Ai = 0n×n since Q(αi Ai ) = {0n×n }. Hence, only the sign of the αi ’s matters (i.e. whether they are zero or positive) and, in this respect, we can substitute each αi in the definition of the convex-hull by a binary parameter βi ∈ {0, 1} where βi = 1 if αi > 0 and 0 otherwise. This naturally leads to the alternative expression for the convex-hull given in (28). Using now the sign-summability property of the matrices implies that the convex-hull is well-defined. The expression (29) for the qualitative-class of the convex-hull then immediately follows from Definition 5.1. ♦ Now that the sign-summability of Metzler sign-matrices has been fully characterized, we can move on to the main objective of the section, that is, the characterization of the sign-stability of all the matrices in a well-defined convex-hull of Metzler sign-matrices: 13 Theorem 5.5. Let us consider a family of Metzler sign-matrices Ai ∈ MSn , i = 1, . . . , N . Then, the following statements are equivalent: (a) (b) (c) (d) The convex-hull co(A1 , . . . , AN ) is well-defined and only contains sign-stable matrices. PN For all β ∈ {0, 1}N , β 6= 0, the matrix A(β) := i=1 βi Ai exists and is sign-stable. P The matrices A1 , . . . , AN have negative diagonal elements and the matrix N i=1 Ai is sign-stable. The diagonal elements of the matrices A1 , . . . , AN are negative and the directed graph DĀ is acyclic. Proof : The equivalence between the statements (a) and (b) follows from Proposition 5.4 while the equivalence between the statements (c) and (d) follows from Theorem 3.4. Let us prove then the equivalence between (b) and (c). Assume that (b) holds. Hence, for all β ∈ {0, 1}N , β 6= 0, the matrix A(β) exists N and is sign-stable. Let {ei }N i=1 be the natural basis of R , then we get that A(ei ) = Ai . Therefore, for any i = 1, . . . , N , the matrix Ai is sign-stable and, hence, it has negative diagonal elements. Considering, finally, PN β = 1N , we get that A(1N ) = i=1 Ai is sign-stable and the statement (c) holds. PK Assume now that (c) holds and let A(β) := i=1 βi Ai . From the facts that the Metzler matrices Ai have PN negative diagonal elements and β 6= 0, then we can state that A(β) ≤ i=1 Ai for all β ∈ {0, 1}N , β 6= 0. PN Hence, we have that sgn(A(β)) ≤ sgn( i=1 Ai ) and thus !! N X for all β ∈ {0, 1}N , β 6= 0 (30) Ai λP F (sgn(A(β))) ≤ λP F sgn i=1 PN and where λP F (·) denotes the Perron-Frobenius eigenvalue. By virtue of Theorem 3.4, we know that i=1 Ai P  N is sign stable if and only if sgn i=1 Ai is Hurwitz stable. As a consequence, the inequality (30) implies PN that if i=1 Ai is sign stable, then A(β) is sign stable for any β ∈ {0, 1}N , β 6= 0. The proof is complete. ♦ 5.1. Existence of common Lyapunov functions We first recall the following result from [41] that we slightly adapt to our setup: Lemma 5.6 ([41]). Let us consider N upper-triangular matrices Ai ∈ Rn×n , i = 1, . . . , N . Then, the following statements are equivalent: (a) The matrices Ai , i = 1, . . . , N , are Hurwitz stable. (b) There exists a symmetric positive definite matrix Q ∈ Rn×n such that ATi Q + QAi is negative definite for all i = 1, . . . , N . We then have the following result: Theorem 5.7. The following statements are equivalent: (a) All the matrices in co(A) are sign-stable. (b) For all (A′1 , . . . , A′N ) ∈ Q(A1 ) × . . . × Q(AN ), there exists a positive definite matrix Q ∈ Rn×n such that ÃT Q + Qà is negative definite for all à ∈ co{A′1 , . . . , A′N }. (c) For all (A′1 , . . . , A′N ) ∈ Q(A1 ) × . . . × Q(AN ), there exists a positive vector v ∈ Rn>0 such that v T à < 0 for all à ∈ co(A′ ). Proof : The implication that (b) implies (a) and (c) implies (a) are immediate. Assume that (a) holds and note that, by virtue of Theorem 3.4, the sign-stability of the Ai ’s and their sums is equivalent to saying that they can be simultaneously expressed as Hurwitz stable upper-triangular matrices through appropriate simultaneous row/column permutations. Assuming now that they are in such a form then the conclusion directly follows from Lemma 5.6. The proof that (a) implies (c) follows from fact that for all upper-triangular Hurwitz stable A′i ∈ Q(Ai ), i = 1, . . . , N , we can recursively construct a v ∈ Rn>0 such that v T A′i < 0 for all i = 1, . . . , N . ♦ 14 6. Ker+ (B)-sign-stability of Metzler sign-matrices 6.1. Preliminaries In this section, we will work with a larger class of sign-matrices, referred to as indefinite sign-matrices, taking entries in S⊙ := S ∪ {⊙} where ⊙ denotes a sign indefinite entry that can be obtained from the rule ⊕ + ⊖ = ⊙. To avoid confusion, sign-matrices will sometimes be referred to as definite sign-matrices. n×m Definition 6.1 (Sign-qualitative class). The sign-qualitative class associated with a matrix A ∈ S⊙ is defined as    ∈S if [A]ij = ⊙ n×m SQ(A) := M ∈ S . [M ]ij = [A]ij otherwise It is important to stress that, due to the presence of sign-indefinite entries ⊙, all the matrices in SQ(A) do not have the same sign-pattern. When there is no sign-indefinite entry in A, then SQ(A) = A. In accordance with Definition 5.1, we have that [ Q(A′ ) (31) Q(SQ(A)) := A′ ∈SQ(A) which defines the set of all real matrices sharing the same sign-pattern of at least one matrix in the signqualitative class of the matrix A. Let us define now the concept of Ker+ (B)-sign-stability: Definition 6.2. Let A ∈ MSn×n and B ∈ Rn×ℓ , ℓ < n, full-rank. We say that A is Ker+ (B)-sign-stable if for all A′ ∈ Q(A), there exists a v ∈ Rn>0 such that v T A′ < 0 and v T B = 0. The main reason for considering the above concept is that finding such a vector is a problem which arises, for instance, in the analysis of certain stochastic Markov jump processes that can represent certain biological processes [4, 6, 42]. When B = 0, the usual notion of sign-stability is retrieved. We will also need the concept of an inverse of a sign-matrix. This existence problem of inverses of signmatrices has been well-studied in the literature; see e.g. [26, 27, 43, 44]. We consider here the following definition: Definition 6.3. We say that the matrix A ∈ MSn is invertible if there exists a matrix à ∈ Sn×n such that for all M ∈ Q(A), there exists a matrix N ∈ Q(Ã) such that M N = I. When this is the case, we denote the inverse of A, Ã, by A−1 . We then have the following result: Theorem 6.4. Assume that the sign-matrix A ∈ MSn is sign-stable. Then, (a) the inverse of the sign-matrix A exists, is nonpositive, and is such that [A−1 ]ii = ⊖, i = 1, . . . , n, and  ⊖ if there is a path from node j to node i in the directed graph DA . [A−1 ]ij = 0 otherwise for all i, j = 1, . . . , n, i 6= j.  (b) we have that Q(A)−1 := M −1 : M ∈ Q(A) ⊂ Q(A−1 ). Proof : To prove statement (a), we first assume, without loss of generality, that the sign-matrix A is upper-triangular with negative diagonal elements. The key idea behind the proof is to demonstrate the existence of an inverse for the matrix A by showing that the inverses of all the matrices in the qualitative class Q(A) all share the same sign-pattern. To this aim, let us introduce the following matrix M (m) := − n X mi,i ei eTi + n X j>i i 15 mi,j ei eTj (32) where mi,j ≥ 0 for all i, j = 1, . . . , N , j ≥ i. Note, moreover, that we have Q(A) = {M (m) : mi,j > 0 if (i, j) ∈ I(A), mi,j = 0 otherwise} (33) I(A) := {(i, j) : [A]ij 6= 0, i, j = 1, . . . , N, j ≥ i} . (34) where Since, by assumption, the matrix A is sign-stable, then its diagonal elements are negative (and hence mi,i > 0 for all i = 1, . . . , N ), the directed graph DA is acyclic and all the matrices in Q(A) are invertible. Considering further the system of linear equations given by y = M (m)x and recursively solving for x yields xn = xn−1 = = xn−2 = .. . xn−k = −1 yn mn,n 1 (−yn−1 + mn−1,n xn ) mn−1,n−1   −1 mn−1,n yn−1 + yn mn−1,n−1  mn,n    −1 mn−2,n−1 mn−2,n mn−2,n−1 mn−1,n yn−2 + yn yn−1 + + mn−2,n−2 mn−1,n−1 mn−1,n−1 mn,n mn,n 1 mn−k,n−k −yn−k + n X mn−k,i xi i=n−k+1 ! (35) , k = 3, . . . , n − 1. As expected the diagonal entries of M (m)−1 are just the inverse of the diagonal entries of M (m). The off-diagonal entries of M (m)−1 are defined recursively over all possible paths in the graph DA from one node to another. For instance, the entry [M (m)−1 ]n−2,n is nonzero if there is a path of length one from the node n to the node n − 2 in the directed graph DA (i.e. mn−2,n 6= 0) or a path of length two passing through the node n − 1 (i.e. mn−2,n−1 mn−1,n 6= 0). This argument easily generalizes to all the entries of the inverse of the matrix M (m)−1 by exploiting the acyclicity of the graph DA and the nonnegativity of the off-diagonal elements of M (m). As a consequence, all the nonzero entries are necessarily negative and, hence, the matrix M (m)−1 is nonpositive. Uniqueness follows from the fact the sign-pattern of the inverse only depends on the paths in the graph DA which are, in turn, uniquely defined by the sign-matrix A. Consequently, an entry of M (m)−1 is 0 if and only if there is no path from j to i in DA , otherwise it is negative. This proves statement (a). To prove statement (b), first remark that since A is a sign-stable Metzler sign-matrix, then from statement (a) we have that the matrix A−1 is well-defined and is nonpositive with negative diagonal elements. Hence, statement (b) holds since all the inverses of the matrices in Q(A) have the same sign-pattern as A−1 . The proof is complete. ♦ Two important facts are stated in the above result. First of all, the sign-pattern of the inverse signmatrix A−1 is uniquely defined by the sign-pattern of A provided that A is sign-stable. Secondly, that for any sign-stable matrix A ∈ Sn×n , the nonzero entries of the inverse matrix A−1 can simply be deduced from the examination of the graph DA . For comparison, it requires at most n2 operations, which is better than usual real matrix inversion algorithms; see e.g. [45]. A drawback, however, is that by considering the matrix A−1 , we lose some information since the class of matrices that is considered is larger. Remark 6.5. It is important to stress that, for any A ∈ MSn , A sign-stable, we have that Q(A)−1 6= Q(A−1 ). Indeed, the inverse of a Hurwitz stable real nonpositive matrix with negative diagonal is not necessarily Metzler, even in the upper-triangular case. In other words, the matrix inversion operation on the set of sign-stable upper-triangular nonpositive sign-matrices is not well-defined in the sense that the sign-pattern 16 is non-uniquely defined. For instance, we have that   −1 1 1 −1 −1 −2 −4   0 −1 −1 −5  but M −1 =  0 −1 1 M = 0 0 0 −1 0 −1 −1 0 0 0 0 0 0 −1   −2 4  1 −1 (36) is not a Metzler matrix. The following concept will be crucial for stating the main result of this section: Definition 6.6 (L+ -matrices, [36]). Let A ∈ Sm×n . We say that A is an L+ -matrix if for all A′ ∈ Q(A), the dual cone of {A′ x : x ≥ 0} defined as {y : y T A′ ≥ 0} is equal to {0}. Let us also recall the following result: Theorem 6.7 ([36], Theorem 2.4). Let R ∈ Sm×n . Then, the following statements are equivalent: (a) (b) (c) (d) (e) R is an L+ -matrix. R has no zero row and for all R′ ∈ Q(R), there exists a v ∈ Rn>0 such that R′ v = 0. For all nonzero diagonal matrices D ∈ {−1, 0, 1}m×m, some column of DR is nonzero and nonnegative. For all nonzero diagonal matrices D ∈ {−1, 0, 1}m×m, some column of DR is nonzero and nonpositive. For all R′ ∈ Q(R), we have that {R′ x : x ∈ Rn≥0 } = Rm ; i.e. the cone generated by R′ is all of Rm . We are now ready to state the main result of this section which provides sufficient conditions for the Ker+ (B)-sign-stability of a given matrix A ∈ MSn : Proposition 6.8. Let A ∈ MSn×n be sign-stable and B ∈ Rn×ℓ , ℓ < n, be full-rank. Assume that one of the following equivalent statements holds: (a) All the matrices in SQ(B T A−T ) are L+ -matrices. (b) All the matrices in SQ(B T A−T ) have no zero row and for all M ∈ Q(SQ(B T A−T ), there exists a w ∈ Rn>0 such that M w = 0. (c) For all nonzero diagonal matrices D ∈ {−1, 0, 1}ℓ×ℓ and all M ∈ SQ(B T A−T ), some column of DM is nonzero and nonnegative. (d) For all nonzero diagonal matrices D ∈ {−1, 0, 1}ℓ×ℓ and all M ∈ SQ(B T A−T ), some column of DM is nonzero and nonpositive. (e) For all M ∈ Q(SQ(B T A−T ), we have {M x : x ∈ Rn≥0 } = Rℓ . Then, the matrix A is Ker+ (B)-sign-stable. Proof : The equivalence between the statements of the result directly follows from Theorem 6.7. Hence, we simply need to prove that (b), for instance, implies that the matrix A is Ker+ (B)-sign-stable. From statement (b), we have that for all M ∈ Q(SQ(B T A−T ), there exists a w ∈ Rn>0 such that M w = 0 and observe, moreover, that the following inclusions hold Q(A)−1 B ⊆ Q(A−1 )B ⊆ Q(SQ(A−1 B)). (37) The first inclusion follows from the statement (b) of Theorem 6.4 while the second one is immediate from the fact that any matrix in Q(A−1 )B necessarily belongs to Q(SQ(A−1 B)) since SQ(A−1 B) contains all the possible sign patterns that Q(A−1 )B could have. Hence, if all the matrices in SQ(B T A−T ) are L+ matrices, then for all M ∈ B T Q(A)−T , there exist a vector w ∈ Rn>0 such that M w = 0. Decomposing M as M = B T Ã−T , where à ∈ Q(A) is Hurwitz stable, yields wT Ã−1 B = 0. Letting v T := −wT Ã−1 , we get that v > 0 since w > 0 and Ã−1 ≤ 0. Hence, we have that −v T B = 0 or, equivalently, v T B = 0 together 17 with v T à = −wT < 0, which proves that the matrix A is Ker+ (B)-sign-stable. ♦ From the statements (c) and (d) of Theorem 6.7, we can see that checking whether a matrix is an L+ matrix is a combinatorial problem which turns out to be NP-complete (see [25, 36]). However, the approach remains applicable for matrices R having a small number of rows. Applied to our problem, the number of sign-matrices on which to apply the column/row condition (see the statements (c) and (d) of Proposition 6.8) is equal to (3ℓ − 1)p sign-matrices where p is the cardinal of SQ(B T A−T ). Interestingly, the complexity does not directly depend on n, but indirectly depends on n through the cardinality p since a larger n is likely to lead to a higher cardinality for the set SQ(B T A−T ). Finally, it is important to stress than the problem remains tractable as long as the values of ℓ and p are sufficiently small. 7. Sign-stability of mixed matrices As we have seen in the previous sections, sign-stability requires strong structural properties for the considered sign-matrices. The idea here is to extend the scope of sign-stability to mixed matrices which contain both sign and real entries. The idea is to enlarge the structures of the matrices (i.e. not necessarily triangular) that can be considered using such an approach. In this case, we will shown that cycles can be allowed for the nodes associated with real entries. We notably prove here that the sign-stability of a class of mixed matrices can be exactly characterized in terms of Hurwitz stability conditions, sign-stability conditions and the non-existence of cycles in a particular bipartite graph obtained from the mixed matrix. 7.1. Preliminaries The following definition states an immediate extension of the sign-stability property of sign-matrices to the case of mixed matrices: n×n Definition 7.1. A mixed matrix M ∈ (R ∪ S) stable. is sign-stable if all the matrices M ′ ∈ Q(M ) are Hurwitz The following lemma states a result regarding the stability of Metzler block matrices which is analogous to the Schur complement formula: Lemma 7.2. Let us consider a matrix M ∈ MRn1 +n2 that we decompose as   M11 M12 M =: M21 M22 (38) 1 ×n2 2 ×n1 where M11 ∈ MRn1 , M22 ∈ MRn2 , M12 ∈ Rn≥0 and M21 ∈ Rn≥0 . Then, the following statements are equivalent: (a) The matrix M is Hurwitz stable. −1 (b) The matrices M11 and M22 − M21 M11 M12 are Hurwitz stable. −1 (c) The matrices M22 and M11 − M12 M22 M21 are Hurwitz stable. Proof : We only prove the equivalence between the two first statement. The proof of the equivalence between the first and third statements is analogous. To this aim, assume that M is Hurwitz stable. Hence, there exist two positive vectors λ1 , λ2 of appropriate dimensions such that we have    M11 M12 λ1 < 0. (39) M21 M22 λ2 Since the matrices M12 and M21 are nonnegative, the above inequality implies that M11 λ1 < 0 and M22 λ2 < 0, i.e. the matrices M11 and M22 are both Hurwitz stable. Moreover, the inequality (39) is equivalent to the existence of a sufficiently small ǫ > 0 such that M11 λ1 + M12 λ2 < 0 and M21 λ1 + M22 λ2 ≤ −ǫλ2 . 18 (40) Solving for λ2 in the second inequality yields λ2 ≥ −(M22 + ǫIn2 )−1 M21 λ1 ≥ 0 (41) where the second inequality comes from the fact that M22 + ǫIn2 is Metzler and Hurwitz, which implies that (M22 + ǫIn2 )−1 ≤ 0. Using now the fact that M12 ≥ 0, we get that  (42) M11 − M12 (M22 + ǫIn2 )−1 M21 λ1 < 0. and finally observing now that implies −1 − M22 ≤ −(M22 + ǫIn2 )−1  −1 M11 − M12 M22 M21 λ1 < 0. This proves the result. The proof of the converse simply consists of reversing the arguments. (43) (44) ♦ The following result, which is essential in proving the main result of this section, provides a graph interpretation for the spectral radius of the product of two nonnegative matrices to be zero: n×n n×n Lemma 7.3. Let us consider two square nonnegative matrices M1 ∈ R≥0 and M2 ∈ R≥0 . Then, the following statements are equivalent: (a) We have that ρ(M1 M2 ) = 0. (b) There is no cycle in the directed bipartite graph B = (V1 , V2 , E) where Vi = {v1i , . . . , vni }, i = 1, 2, E := E1 ∪ E2 , E1 := {(vi2 , vj1 ) ∈ V1 × V2 : [M1 ]ji 6= 0} and E2 := {(vi1 , vj2 ) ∈ V1 × V2 : [M2 ]ji 6= 0}. Proof : Assume that (b) holds and let us define the matrix   0 S1 S := S2 0 (45) (46) n×n where S1 , S2 ∈ S≥0 and sgn(Si ) = sgn(Mi ), i = 1, 2. Note, moreover, that the directed graph DS = (V, ES ) (see Definition 2.4) coincides with the graph B = (V1 , V2 , E) with V = V1 ∪ V2 and ES = E. Therefore, the graph B is acyclic if and only if DS is. From Theorem 3.10, this is equivalent to saying that all the matrices in Q(S) have zero spectral radius and, equivalently, that they can all be expressed in upper-triangular form with zero diagonal elements modulo some permutation. Noting now that for any X ∈ Q(S) with Xi ∈ Q(Si ), we have that ρ(X) = 0 if and only if ρ(X1 X2 ) = 0 implies that ρ(M1 M2 ) = 0 since Mi ∈ Q(Si ), i = 1, 2. This proves the implication (b) ⇒ (a). Assume now that (a) holds and let   0 M1 M= M2 0 from which we have that ρ (M ) = 0 ⇔ ρ(M1 M2 ) = 0. This then implies that M can be put in uppertriangular form modulo some permutation, which implies that the graph DM is acyclic. Noting, finally, that the graph DM = (V, EM ) coincides with B yields the result. ♦ 7.2. Main result Let us consider in this section mixed matrices of the form   Aσ Cϕ Aσϕ = Bϕ Aϕ n ×n n ×n (47) σ ϕ ϕ σ where Aσ ∈ MSnσ , Aϕ ∈ MRnϕ , Bϕ ∈ R≥0 . The following result that can be seen as and Cϕ ∈ R≥0 the “mixed matrix analogue” of Theorem 3.4 as it contains both algebraic and graph theoretical conditions characterizing the sign-stability of mixed matrices. While graph theoretical conditions are easier to check, algebraic ones can be combined with linear optimization problems in the same spirit as in Theorem 3.4: 19 Theorem 7.4. The following statements are equivalent: (a) The mixed matrix Aσϕ defined in (47) is sign-stable. (b) The following statements hold: (b1) the matrix Aϕ is Hurwitz stable, and −1 (b2) the matrix M − Mϕ where Mϕ := Cϕ Aϕ Bϕ is Hurwitz stable for all M ∈ Q(Aσ ) or, equivalently, −1 we have that ρ(M Mϕ ) < 1 for all M ∈ Q(Aσ ). (c) The following statements hold: (c1) Aσ is sign-stable, (c2) Aϕ is Hurwitz stable, (c3) we have that ρ(Mσ Mϕ ) = 0 where Mσ := sgn(A−1 σ ). (d) The following statements hold: (d1) Aσ is sign-stable, (d2) Aϕ is Hurwitz stable, (d3) There is no cycle in the directed bipartite graph B = (Vσ , Vϕ , E) where E = Eσ ∪ Eϕ with Eσ := {viϕ , vjσ ) ∈ Vϕ × Vσ : [Mσ ]ji 6= 0} and Eϕ := {(viσ , vjϕ ) ∈ Vσ × Vϕ : [Mϕ ]ji 6= 0}. (48) (e) The following statements hold: (e1) Aσ is sign-stable, (e2) Aϕ is Hurwitz stable, (e3) There is no cycle in the directed graph DAσϕ containing nodes in both Vσ = {v1σ , . . . , vnσσ } and Vϕ = {v1ϕ , . . . , vnϕϕ } where Vσ contains the first nσ nodes associated with DAσϕ and Vϕ the nϕ last ones. (f) The following statements hold: (f1) sgn(Aσ ) is Hurwitz stable, (f2) Aϕ is Hurwitz stable, (f3) The matrix sgn(Mσ Mϕ ) − I is Hurwitz stable. Proof : Proof of (a) ⇔ (b). The matrix Aσϕ is sign-stable if and only if for all M ∈ Q(Aσ ), we have that the matrix   M Cϕ (49) Bϕ Aϕ is Hurwitz stable. Since the above matrix is Metzler, then we know from Lemma 7.2 that it is Hurwitz −1 stable if and only if M and M − Cϕ Aϕ Bϕ are both Hurwitz stable. Note also that from the fact that Aσ is necessarily sign-stable, then there exists an M ∗ ∈ Q(Aσ ) such that M ∗ − Mϕ is Hurwitz stable. Hence, this means that the matrix M − Cϕ A−1 ϕ Bϕ is Hurwitz stable for all M ∈ Q(Aσ ) if and only if det(M − Mϕ ) 6= 0 for all M ∈ Q(Aσ ). From the determinant formula, we get that this condition is equivalent to saying that det(I − M −1 Mϕ ) 6= 0 for all M ∈ Q(Aσ ) and hence ρ(M −1 Mϕ ) < 1 for all M ∈ Q(Aσ ). Proof of (b) ⇔ (c). We prove first that (b) implies (c). To this aim, assume that ρ(M −1 Mϕ ) < 1 for all M ∈ Q(Aσ ) and that Aσ is in upper-triangular form with negative diagonal elements (this last statement comes from the fact that Aσ is sign-stable and Theorem 3.4). Hence, from Theorem 6.4, its inverse is welldefined and we have that A−1 σ is nonpositive with negative diagonal elements. Since the diagonal elements of A−1 (which are the inverse of the diagonal elements of Aσ ) can be arbitrarily large, then the spectral radius σ condition of statement (b) can only be satisfied if Mϕ is upper-triangular with zero diagonal elements, which implies that ρ(M −1 Mϕ ) = 0 for all M ∈ Q(Aσ ) and, hence, that ρ(Mσ Mϕ ) = 0. To prove the converse, let us assume that ρ(Mσ Mϕ ) = 0. Using the fact that the matrices Mσ and Mϕ are both nonpositive and that Mσ has negative diagonal elements, then this implies that ρ(M −1 Mϕ ) = 0 for all M ∈ Q(Aσ ) and, hence, that ρ(M −1 Mϕ ) < 1 for all M ∈ Q(Aσ ). 20 Proof of (c) ⇔ (d). The proof of this statement directly follows from Lemma 7.3. Proof of (d) ⇔ (e). The equivalence follows from the fact that the cycles in DAσϕ that contain nodes in both Vσ and Vϕ are exactly those in the graph B. Proof of (c) ⇔ (f). Clearly the statements (c1) and (c2) are equivalent to (f1) and (f2), respectively. The condition that ρ(Mσ Mϕ ) = 0 has been shown to be equivalent to saying that Mσ Mϕ is upper-triangular modulo some cyclic permutation and that its diagonal elements are all equal to zero. Assuming then that ρ(Mσ Mϕ ) = 0, this implies that the matrix sgn(Mσ Mϕ ) has diagonal elements equal to zero and is uppertriangular, which implies, in turn, that the Metzler matrix sgn(Mσ Mϕ ) − I is Hurwitz stable. To prove the converse, let us assume that the Metzler matrix sgn(Mσ Mϕ ) − I is Hurwitz stable. This, then implies, from Theorem 3.4 that it must be upper-triangular with negative elements on the diagonal, which implies then that sgn(Mσ Mϕ ) is triangular with diagonal elements equal to zero. This proves the result. ♦ Remark 7.5 (Linear program condition). Interestingly, the conditions of statement (4) of Theorem 7.4 nϕ σ can be exactly reformulated as the following linear feasibility problem: Find v, z ∈ Rn>0 and w ∈ R>0 such T T T that v sgn(Aσ ) < 0, w Aϕ < 0 and z (sgn(Mϕ Mσ ) − I) < 0. 7.3. Example Let us consider the matrix Aσϕ  ⊖ ⊕ 0 ⊖  =  Bϕ  1 0 0 0  . −1 2  1 −5 (50)  0 . 1 (51) Clearly, Aσ is sign-stable and Aϕ is Hurwitz stable. Assume now that Bϕ is given by Bϕ =  0 0 In this case, the matrices Mσ and Mϕ are given by Mσ = − and we have that  1 0    2 0 1 1 and Mϕ = − 1 3 0 0   2 0 1 Mσ Mϕ = 3 0 0 (52) (53) which has clearly zero spectral radius. Therefore, the matrix Aσϕ in (50) is sign-stable. The same conclusion can be drawn by checking the no-cycle condition in the graphs. Now, if we let  0 0 Bϕ = 1 0 then we have that     1 0 1 0 0 and Mσ Mϕ = Mϕ = − 3 1 0 3 0  1 . 1 Clearly, we have that ρ(Mσ Mϕ ) = 1/3 and, hence, the matrix Aσϕ in (50) is not sign-stable. 21 8. Applications The goal of this section is to apply some of the obtained results to some problems arising in the structural analysis of linear positive time-delay systems (Section 8.1.1 and Section 8.1.2), linear positive switched systems (Section 8.1.3) and linear positive impulsive systems (Section 8.1.4). The problem of establishing the structural attractiveness and forward invariance of a compact set for a class of nonlinear positive dynamical systems is considered in Section 8.2. Finally, the problem of establishing the structural ergodicity of a class of continuous-time Markov jump process arising in the analysis of biochemical reaction networks is addressed in Section 8.3. 8.1. Linear positive dynamical systems 8.1.1. Continuous-time systems with discrete delays Linear positive systems with discrete-delays arise in problems such as in power-control in networks [46, 47] and have been theoretically studied in several papers; see e.g. [9, 48]. Let us consider the following linear system with constant discrete-delays [49–51]: ẋ(t) = A0 x(t) + N X Ai x(t − hi ) i=1 x(s) = (54) φ(s), s ∈ [−h̄, 0] where A0 , Ai ∈ Rn×n , hi > 0, i = 1, . . . , N , x ∈ Rn , φ ∈ C([−h̄, 0], Rn ) and h̄ := maxi {hi }. It is known [48] that the above system is positive for all delays hi ≥ 0 if and only if (a) the matrix A0 is Metzler and (b) the matrices Ai , i = 1, . . . , N , are all nonnegative; and that it is asymptotically stable for any delays hi ≥ 0, P i = 1, . . . , N , if and only if the matrix N A is Hurwitz stable. i=0 i Remark 8.1 (Extension to time-varying delays). By virtue of the results in [9? ? ], the above result remains valid when time-varying delays are considered instead of constant ones. Before stating the main result, it seems important to recall that the sign-summability of Metzler and nonnegative matrices has been fully characterized in Proposition 5.4 (note that nonnegative matrices form a subset of Metzler matrices). With this in mind, we can state the following result: Proposition 8.2. Let M0 ∈ MSn and Mi ∈ Sn≥0 , i = 1, . . . , N . Then, the following statements are equivalent: (a) For all A0 ∈ Q(M0 ) and all Ai ∈ Q(Mi ), i = 1, . . . , N , the linear positive system with delays (54) is asymptotically stable; i.e. the linear positive system with discrete-delays (54) is structurally stable. (b) For all A0 ∈ Q(M0 ) and all Ai ∈ Q(Mi ), i = 1, . . . , N , there exists a vector v ∈ Rn>0 such that P vT ( N i=0 Ai ) < 0. PN (c) The matrices M0 , . . . , MN are sign-summable and the matrix i=0 Mi is sign-stable. (d) The matrices M0 , . . . , MN are sign-summable and there exists a permutation matrix P such that the PN matrix P T ( i=0 Mi )P is upper-triangular.  P N M < 0 holds. (e) There exists a vector v ∈ Rn>0 such that v T sgn i i=0 Proof : The equivalence between the statements (b), (c), (d) and (e) follows from Theorem 3.4 while the proof that (a) and (b) are equivalent follows from the stability result for linear positive systems with delays. ♦ 22 8.1.2. Discrete-time systems with discrete delays Let us now consider the case of linear discrete positive systems [52]. To this aim, we consider the following system [53] N X Ai x(k − hi ) x(k + 1) = A0 x(k) + (55) i=1 x(s) = φs , s ∈ {−h̄, . . . , 0} where A0 , Ai ∈ Rn×n , hi ∈ Z≥0 , i = 1, . . . , N , x ∈ Rn , φs ∈ Rn , s = −h̄, . . . , 0 and h̄ := maxi {hi }. It is known [52] that the above system is positive for all for all delays hi ∈ Z≥0 if and only if the matrices Ai , i = 0, . . . , N , are all nonnegative; and that it is asymptotically stable for any delays hi ≥ 0, i = 1, . . . , N PN if and only if the matrix i=0 Ai is Schur stable. With these results in mind, we can state the following result: Proposition 8.3. Let Mi ∈ Sn≥0 , i = 0, . . . , N . Then, the following statements are equivalent: (a) For all Ai ∈ Q(Mi ), i = 0, . . . , N , the linear positive system with delays (55) is asymptotically stable; i.e. the linear positive system with discrete-delays (55) is structurally stable. PN (b) For all Ai ∈ Q(Mi ), i = 0, . . . , N , there exists a vector v ∈ Rn>0 such that v T ( i=0 Ai − I) < 0. P (c) The matrix N i=0 Mi is sign-stable. PN (d) There exists a permutation matrix P such that the matrix P T ( i=0 Mi )P is upper-triangular.  i h P N (e) There exists a vector v ∈ Rn>0 such that v T sgn i=0 Mi − I < 0 holds. Proof : The proof follows the same lines as the proof of Proposition 8.2 with the difference that Theorem 3.10 is used instead of Theorem 3.4. ♦ 8.1.3. Continuous-time switched systems Linear positive switched systems have been widely studied in the literature [32–34] as they can represent a wide variety of real-world processes; see e.g. [54, 55]. Let us consider, as a starting point, the following linear switched system [56]: ẋ(t) = Aσ(t) x(t) (56) x(0) = x0 where x ∈ Rn and σ : R≥0 → {1, . . . , N } is a piecewise constant switching signal and Ai ∈ Rn×n . It is known that [32, 33] the above linear switched system is positive if and only if Ai ∈ MRn for all i = 1, . . . , N . Proposition 8.4. Let Mi ∈ MSn , i = 1, . . . , N . Then, the following statements are equivalent: (a) For all Ai ∈ Q(Mi ), i = 1, . . . , N , the linear switched system (56) is asymptotically stable under arbitrary switching i.e. the system (56) is structurally stable under arbitrary switching. (b) For all Ai ∈ Q(Mi ), i = 1, . . . , N , the linear time-varying positive system ẋ(t) = A(t)x(t) (57) where A(t) ∈ co(A1 , . . . , AN ), is robustly asymptotically stable. PN (c) The diagonal elements of the matrices Mi , i = 1, . . . , N , are negative and the matrix i=1 Mi is signstable. (d) For all Ai ∈ Q(Mi ), i = 1, . . . , N , there exists a positive definite matrix Q ∈ Rn×n such that ÃT Q + Qà is negative definite for all à ∈ co(A1 , . . . , AN ). (e) For all Ai ∈ Q(Mi ), i = 1, . . . , N , there exists a vector v ∈ Rn>0 such that v T à < 0 for all à ∈ co(A1 , . . . , AN ). 23 Proof : The proof of the equivalence between the statements (a) and (b) follows from [57, Theorem 3] while the equivalence between the statements (c), (d) and (e) follows from Theorem 5.5 and Theorem 5.7. Clearly, statement (d) implies statement (b) using standard results on switched systems; see e.g. [56]. Finally, statement (b) implies (c) since if the conditions of statement (c) does not hold, then there will exist some matrices Ai ∈ Q(Mi ), i = 1, . . . , N , for which the set co(A1 , . . . , AN ) will contain unstable matrices. The proof is completed. ♦ 8.1.4. Continuous-time impulsive systems Linear positive impulsive systems have been less studied than positive switched system but some results can be found in [14]. Let us consider, as a starting point, the following linear impulsive system: ẋ(t) x(t+ k) x(t0 ) = Ax(t), t 6= tk = Jx(tk ), k = 1, . . . = x0 (58) where x ∈ Rn is the state of the system. The sequence of jumping instants {tk }∞ k=0 is assumed to be increasing and to grow unbounded. It is known [14] that this system is positive if and only if A ∈ MRn and n×n J ∈ R≥0 . n×n Proposition 8.5. Let MA ∈ MSn and MJ ∈ S≥0 . Then, the following statements are equivalent: (a) For all A ∈ Q(MA ) and all J ∈ Q(JA ), there exists a vector λ ∈ Rn>0 such that λT A < 0 and λT (J − I) < 0. (59) (b) MA has negative diagonal, MJ has zero diagonal and the matrix MA + MJ is sign-stable. Moreover, when one of the above equivalent statements holds, then for all A ∈ Q(MA ) and all J ∈ Q(JA ), the linear positive impulsive system is asymptotically stable for any increasing sequence {tk }∞ k=0 such that tk → ∞ as k → ∞. Proof : The proof that the first statement implies the stability under arbitrary jump sequence can be found in [14] and relies on the use of the linear copositive Lyapunov function V (x) = λT x, λ ∈ Rn>0 . Assume that (b) holds, then MA is sign-stable and MA + MJ is upper-triangular modulo some simultaneous row/column permutations which both imply that MJ has zero diagonal entries or, equivalently, that for all J ∈ Q(MJ ), the matrix J − In is Metzler and Hurwitz stable. Since these matrices are upper-triangular, we can finally use Theorem 5.7 to prove that (a) holds. Assume now that (a) holds. Hence, we have that MA and MJ − In are sign-stable and, hence, MA and MJ has negative and zero diagonal, respectively. Hence, MA and MJ are sign-summable and we have that λT (A + J − In ) < 0 for all A ∈ Q(MA ), J ∈ Q(MJ ). This implies that MA + MJ − In is sign-stable or, equivalently, that it is upper-triangular modulo some simultaneous row/column permutations, which is equivalent to saying that MA + MJ is sign-stable. ♦ 8.2. Nonlinear positive systems Let us consider the following class of nonlinear positive systems that arises, among others, in reaction network theory ẋ(t) = Ax(t) + Bf (x(t)) + b (60) x(0) = x0 where x ∈ Rn≥0 , f : Rn≥0 → Rℓ≥0 , b ∈ Rn≥0 , A ∈ Rn×n and B ∈ Zn×ℓ . 24 Proposition 8.6. Let A ∈ MRn and assume that there exist a v ∈ Rn>0 and an ε > 0 such that v T A ≤ −εv T and v T B = 0. Then, for all x0 ∈ Rn≥0 , the trajectories of the system (60) are bounded and converge to the compact set S := {x ∈ Rn≥0 : V (x) ≤ v T b/ε}, (61) i.e. S is forward-invariant and attractive. Proof : Let us consider the linear copositive Lyapunov function V (x) = v T x, v ∈ Rn>0 . The derivative of this function along the solutions of (60) is given by V̇ (x) = v T Ax + v T Bf (x) + v T b. Assuming the conditions of the theorem hold, then we have that V̇ (x) ≤ −εV (x) + v T b and, therefore, that V (x(t)) ≤ e−εt V (x0 ) + (1 − e−εt )v T b/ε. Hence, for all x0 ∈ / S , the trajectories of the system (60) converge to the compact set which proves the result. ♦ We can now derive the following structural version of the above result: Proposition 8.7. Let M ∈ MSn and suppose further that (a) M is sign-stable, (b) Z := (M −1 B)T ∈ Sℓ×n and (c) Z is an L+ -matrix. Then, for all A ∈ Q(M ), there exist a v ∈ Rn>0 and an ε > 0 such that v T A ≤ −εv T and v T B = 0. Therefore, the trajectories of the system (60) are structurally bounded and structurally converge to a compact set inside the nonnegative orthant. 8.3. Ergodicity of stochastic reaction networks Reaction networks [42, 58, 59] is a powerful modeling paradigm for representing processes arising, for instance, in biology [4, 6, 42]. We consider here a stochastic reaction network denoted by (X, R) involving d molecular species X1 , . . . , Xd that interact through K reaction channels R1 , . . . , RK defined as Rk : d X i=1 ρk l ζk,i Xi −−−→ d X r ζk,i Xi , k = 1, . . . , K (62) i=1 l r where ρk ∈ R>0 is the reaction rate parameter and ζk,i , ζk,i ∈ Z≥0 . Each reaction is additionally described by a stoichiometric vector and a propensity function. The stoichiometric vector of reaction Rk is given r r l l by ζk := ζkr − ζkl ∈ Zd where ζkr = col(ζk,1 , . . . , ζk,d ) and ζkl = col(ζk,1 , . . . , ζk,d ). In this regard, when the reaction R fires, the state jumps from x to x + ζ . We define the stoichiometry matrix S ∈ Zd×K k  k  as S := ζ1 . . . ζK . When the kinetics is mass-action, the propensity function of reaction Rk is given by Qd d xi ! / Zd≥0 . We restrict ourselves here λk (x) = ρk i=1 (xi −ζ l )! and is such that λk (x) = 0 if x ∈ Z≥0 and x + ζk ∈ n,i to reaction networks involving at most bimolecular reactions. That is, the propensities functions are at most polynomials of degree two and, therefore, we can write the propensity vector as λ(x) = col(w0 , W x, Y (x)) 0 u b where w0 ∈ Rn≥0 , W x ∈ Rn≥0 and Y (x) ∈ Rn≥0 are the propensity vectors associated the zeroth-, first- and second-order reactions, respectively. According to this structure, the stoichiometric matrix is decomposed   as S =: S0 Su Sb . Under the well-mixed assumption, this network can be described by a continuoustime Markov process (X1 (t), . . . , Xd (t))t≥0 with state-space Zd≥0 ; see e.g. [42]. A fundamental result from [60] states that the ergodicity of an irreducible2 continuous-time Markov process can be checked using a Lyapunov-like condition, referred to as a Foster-Lyapunov condition. This has led to the following result: 2 The state-space of the Markov process is said to be irreducible if any state can be reached from any other state with positive probability. When the state-space is finite, then this reduces to the irreducibility of the transition-rate matrix. A method for proving the irreducibility of the state-space in the infinite case has been proposed in [61]. 25 Theorem 8.8 ([4]). Let us consider an irreducible3 bimolecular reaction network (X, R) and define A := Su W . Assume that there exists a vector v ∈ Rd>0 such that v T Sb = 0 and v T A < 0. Then, the reaction network (X, R) is exponentially ergodic and all the moments are bounded and converging. The above result can be made structural the following way: Proposition 8.9. Let Z ∈ MSn×n and suppose, further, that (a) the matrix Z is sign-stable, (b) the matrix Y := (Z −1 Sb )T is a sign-matrix, and (c) the matrix Y is an L+ -matrix. Then, for all A ∈ Q(Z), there exists a v ∈ Rn>0 such that v T A < 0 and v T Sb = 0, which implies, in turn, that for all Su W = A ∈ Q(Z), the reaction network (X, R) is exponentially ergodic and all the moments are bounded and converging. Bibliography References [1] A. Berman and R. J. Plemmons. Nonnegative matrices in the mathematical sciences. SIAM, Philadelphia, USA, 1994. [2] H. Nikaido. Convex structures and economic theory. Academic Press, New York, USA, 1968. [3] C. Briat and M. Khammash. Computer control of gene expression: Robust setpoint tracking of protein mean and variance using integral feedback. In 51st IEEE Conference on Decision and Control, pages 3582–3588, Maui, Hawaii, USA, 2012. [4] A. Gupta, C. Briat, and M. Khammash. A scalable computational framework for establishing long-term behavior of stochastic reaction networks. PLOS Computational Biology, 10(6):e1003669, 2014. [5] F. Parise, M. E. Valcher, and J. Lygeros. On the reachable set of the controlled gene expression system. In 53rd IEEE Conference on Decision and Control, pages 4597–4604, Los Angeles, USA, 2014. [6] C. Briat, A. Gupta, and M. Khammash. Antithetic integral feedback ensures robust perfect adaptation in noisy biomolecular networks. Cell Systems, 2:17–28, 2016. [7] L. Farina and S. Rinaldi. Positive Linear Systems: Theory and Applications. John Wiley & Sons, 2000. [8] M. Ait Rami and F. Tadeo. Controller synthesis for positive linear systems with bounded controls. IEEE Transactions on Circuits and Systems – II. Express Briefs, 54(2):151–155, 2007. [9] C. Briat. Robust stability and stabilization of uncertain linear positive systems via integral linear constraints - L1 - and L∞ -gains characterizations. International Journal of Robust and Nonlinear Control, 23(17):1932–1954, 2013. [10] A. Rantzer. Distributed control of positive systems. In 50th IEEE Conference on Decision and Control, pages 6608–6611, 2011. 3 Computationally tractable conditions for checking the irreducibility of reaction networks are provided in [61]. 26 [11] T. Tanaka and C. Langbort. Symmetric formulation of the S-Procedure, Kalman-Yakubovich-Popov Lemma and their exact losslessness conditions. IEEE Transactions on Automatic Control, 58(6):1486– 1496, 2013. [12] M. Colombino and R. S. Smith. A convex characterization of robust stability for positive and positively dominated linear systems. IEEE Transactions on Automatic Control, 61(7):1965–1971, 2016. [13] C. Briat and M. Khammash. Interval peak-to-peak observers for continuous- and discrete-time systems with persistent inputs and delays. Automatica, 74:206–213, 2016. [14] C. Briat. Dwell-time stability and stabilization conditions for linear positive impulsive and switched systems. Submitted, 2016. URL http://arxiv.org/abs/1608.02741. [15] J. Quirk and R. Ruppert. Qualitative economics and the stability of equilibrium. The review of economic studies, 32(4):311–326, 1965. [16] R. M. May. Will a large complex system be stable? Nature, 238:413–414, 1972. [17] R. M. May. Stability and Complexity in Model Ecosystems. Princeton University Press, Princeton, New Jersey, 1973. [18] A. Roberts. The stability of a feasible random ecosystem. Nature, 251:607–608, 1974. [19] C. Jeffries. Qualitative stability and digraphs in model ecosystems. Ecology, 55:1415–1419, 1974. [20] J. J. Tyson. Classification of instabilities in chemical reaction systems. The Journal of Chemical Physics, 62:1010–1015, 1974. [21] B. L. Clarke. Theorems on chemical network stability. The Journal of Chemical Physics, 62:773–775, 1975. [22] J. Maybee and J. Quirk. Qualitative problems in matrix theory. SIAM Reviews, 11(1):30–51, 1969. [23] C. Jeffries, V. Klee, and P. van den Driessche. When is a matrix sign stable? Canadian Journal of Mathematics, 29:315–326, 1977. [24] V. Klee and P. van den Driessche. Linear algorithms for testing the sign stability of a matrix and for finding z-maximum matchings in acyclic graphs. Numerische Mathematik, 28(3):273–285, 1977. [25] V. Klee, R. Ladner, and R. Manber. Signsolvability revisited. Linear Algebra and Its Applications, 59: 131–157, 1984. [26] M. A. Berger and A. Felzenbaum. Sign patterns of matrices and their inverses. Linear Algebra and its Applications, 86:161–177, 1987. [27] C. Thomassen. When the sign pattern of a square matrix determines uniquely the sign patter of its inverse. Linear Algebra and its Applications, 119:27–34, 1989. [28] R. A. Brualdi and B. L. Shader. Matrices of sign-solvable linear systems. Cambridge University Press, Cambridge, UK, 1995. [29] M. Catral, D. D. Olesky, and P. van den Driessche. Allow problems concerning spectral properties of sign pattern matrices: A survey. Linear Algebra and its Applications, 430(11-12):3080–3094, 2009. [30] S. Boyd and L. Vandenberghe. Convex Optimization. Cambridge University Press, Cambridge, MA, USA, 2004. [31] D. Knuth. The Art of Computer Programming, Vol. 1: Fundamental Algorithms, 3rd Edition. AddisonWesley, Boston, USA, 1997. 27 [32] L. Gurvits, R. Shorten, and O. Mason. On the stability of switched positive linear systems. IEEE Transactions on Automatic Control, 52(6):1099–1103, 2007. [33] O. Mason and R. N. Shorten. On linear copositive Lyapunov functions and the stability of switched positive linear systems. IEEE Transactions on Automatic Control, 52(7):1346–1349, 2007. [34] E. Fornasini and M. E. Valcher. Linear copositive Lyapunov functions for continuous-time positive switched systems. IEEE Transactions on Automatic Control, 55(8):1933–1937, 2010. [35] C. Briat and M. Khammash. Robust ergodicity and tracking in antithetic integral control of stochastic biochemical reaction networks. In 55th IEEE Conference on Decision and Control (Accepted), Las Vegas, USA, 2016. URL http://arxiv.org/abs/1607.07080. [36] G.-Y. Lee and B. L. Shader. Sign-consistency and solvability of constrained linear systems. Electronic Journal of Linear Algebra, 4:1, 1998. [37] C. A. Desoer and M. Vidyasagar. Feedback Systems : Input-Output Properties. Academic Press, New York, 1975. [38] K. Zhou, J. C. Doyle, and K. Glover. Robust and Optimal Control. Prentice Hall, Upper Saddle River, New Jersey, USA, 1996. [39] V. A. Yakubovich. S-procedure in nonlinear control theory. Vestnik Leningrad Univ., pages 62–77, 1971. English translation in Vestnik Leningrad Univ. Math., vol. 4, pp. 73–93, 1977. [40] U. T. Jönsson. A lecture on the S-procedure. Technical report, Division of Optimization and Systems Theory, Royal Institute of Technology, Stockholm, Sweden, 2001. URL http://www.math.kth.se/ulfj/5B5746/Lecture.ps. [41] D. Liberzon, J. P. Hespanha, and A. S. Morse. Stability of switched systems: a Lie-algebraic condition. System and Control Letters, 37:117–122, 1999. [42] D. F. Anderson and T. G. Kurtz. Stochastic Analysis of Biochemical Systems, volume 1.2 of Mathematical Biosciences Institute Lecture Series. Springer Verlag, 2015. [43] C. R. Johnson. Sign patterns of inverse nonnegative matrices. Linear Algebra and its Applications, 55: 69–80, 1983. [44] C. A. Eschenbach, F. J. Hall, D. L. Harrel, and Z. Li. When does the inverse have the same sign pattern as the transpose? Czechoslovak Mathematical Journal, 49(124):255–275, 1999. [45] F. Le Gall. Powers of tensors and fast matrix multiplication. In 39th International Symposium on Symbolic and Algebraic Computation, pages 296–303, Kobe, Japan, 2014. [46] G. J. Foschini and Z. Miljianic. A simple distributed autonomous power control algorithm and its convergence. IEEE Transactions on Vehicular Technology, 42(4):641–646, 2002. [47] A. Zappavigna, T. Charalambous, and F. Knorn. Unconditional stability of the foschinimiljanic algorithm. Automatica, 48(1):219–224, 2012. [48] W. M. Haddad and V. Chellaboina. Stability theory for nonnegative and compartmental dynamical systems with time delay. Systems & Control Letters, 51(5):355–361, 2004. [49] S. I. Niculescu. Delay effects on stability. A robust control approach, volume 269. Springer-Verlag: Heidelbeg, 2001. [50] K. Gu, V. L. Kharitonov, and J. Chen. Stability of Time-Delay Systems. Birkhäuser, Boston, 2003. 28 [51] C. Briat. Linear Parameter-Varying and Time-Delay Systems – Analysis, Observation, Filtering & Control, volume 3 of Advances on Delays and Dynamics. Springer-Verlag, Heidelberg, Germany, 2015. [52] M. Buslowicz. Simple stability conditions for linear positive discrete-time systems with delays. Bulletin of the Polish Academy of Sciences - Technical sciences, 56(4):325–328, 2008. [53] E. I. Verriest and A. F. Ivanov. Robust stability of delay-difference equations. In 34th IEEE Conference on Decision and Control, pages 386–391, 1995. [54] M. Ogura, M. Wakaiki, and V. M. Preciado. Dynamic analysis of bet-hedging strategies as a protection mechanism against environmental fluctuations. In 55th IEEE Conference on Decision and Control, 2016. [55] M. Ogura and V. M. Preciado. Stability of spreading processes over time-varying large-scale networks. IEEE Transactions on Network Science and Engineering, 3(1):44–57, 2016. [56] D. Liberzon. Switching in Systems and Control. Birkhäuser, New York, 2003. [57] H. Lin and P. J. Antsaklis. Stability and stabilizability of switched linear systems: A survey of recent results. IEEE Transactions on Automatic Control, 54(2):308–322, 2009. [58] F. Horn and R. Jackson. General mass action kinetics. Archive for rational mechanics and analysis, 47(2):81–116, 1972. [59] M. Feinberg. Complex balancing in general kinetic systems. Archive for rational mechanics and analysis, 49(3):187–194, 1972. [60] S. P. Meyn and R. L. Tweedie. Stability of Markovian processes III: Foster-Lyapunov criteria for continuous-time processes. Adv. Appl. Prob. , 25:518–548, 1993. [61] A. Gupta and M. Khammash. Determining the long-term behavior of cell populations: A new procedure for detecting ergodicity in large stochastic reaction networks. Technical Report arXiv:1312.2879, ETHZürich, 2013. 29
3cs.SY
Block-Level Parallelism in Parsing Block Structured Languages Abhinav Jangda arXiv:1509.08068v1 [cs.PL] 27 Sep 2015 Indian Institute of Technology (BHU), Varanasi [email protected] Abstract. Softwares source code is becoming large and complex. Compilation of large base code is a time consuming process. Parallel compilation of code will help in reducing the time complexity. Parsing is one of the phases in compiler in which significant amount of time of compilation is spent. Techniques have already been developed to extract the parallelism available in parser. Current LR(k) parallel parsing techniques either face difficulty in creating Abstract Syntax Tree or requires modification in the grammar or are specific to less expressive grammars. Most of the programming languages like C, ALGOL are block-structured, and in most languages grammars the grammar of different blocks is independent, allowing different blocks to be parsed in parallel. We are proposing a block level parallel parser derived from Incremental Jump Shift Reduce Parser by [13]. Block Parallelized Parser (BPP) can even work as a block parallel incremental parser. We define a set of Incremental Categories and create the partitions of a grammar based on a rule. When parser reaches the start of the block symbol it will check whether the current block is related to any incremental category. If block parallel parser find the incremental category for it, parser will parse the block in parallel. Block parallel parser is developed for LR(1) grammar. Without making major changes in Shift Reduce (SR) LR(1) parsing algorithm, block parallel parser can create an Abstract Syntax tree easily. We believe this parser can be easily extended to LR (k) grammars and also be converted to an LALR (1) parser. We implemented BPP and SR LR(1) parsing algorithm for C Programming Language. We evaluated performance of both techniques by parsing 10 random files from Linux Kernel source. BPP showed 28% and 52% improvement in the case of including header files and excluding header files respectively. 1 Introduction Multi core chip architectures are emerging as feasible solution to effectively utilizing the ever growing number of chip. Multi-core chip depends on success in system software technology (compiler and runtime system), in order to have thread level parallelism and utilizing on-chip concurrency. With multi-core processors, additional speedups can be achieved by the use of parallelism in dataindependent tasks. There is a gradual shift towards making current algorithms and design into parallel algorithms. It is rather difficult to achieve lock free and low cache contention parallel algorithms. In 70s papers appeared ideas on parallel compilation of programming languages and parallel execution of programs were expected. In those papers discussions on parallel lexical analysis, syntactic analysis and code generation were done. With VLSI applications, prominent increase in research on parallel compilation is observed. A compiler contains different phases: lexical analyzer, syntactic analyzer, semantic analyzer and code generator. Parsing or syntax analysis is the phase of compiler which analyses the program code according to the language. After analysis, it converts the code into another formal representation which will act as input for succeeding phases of compiler. Complexity of software source code is increasing. An effort to compile large code base is very time consumable. [4] describes two types of parsers: Top Down and Bottom Up Parsers. Top Down parsers have less power as compared to Bottom Up Parser. LR (k), SLR (k) and LALR (1) are types of Bottom Up Parsers. With more power Bottom Up Parsers also requires more space and more time in parsing a string as compared to Top Down parsers. Most of the compiler compilers like Yacc [17] and Bison [16] creates LR (1) parsers and compilers like clang [18], Mono C# Compiler [19] etc. uses LR(1) parsers. So, it is evident that programming languages can be represented easily by LR (1) languages. Parsing is very time consuming phase of compiler. Parsing different files in parallel is not enough. As programming languages like C and C++ can includes different files (using #include) in a single file which results in generation of very long file. If we can parallel the parsing phase of single file, it will give performance benefits in compiling the source code. Many significant techniques are already proposed for making parallel parsers ([2], [8], [10], [9], [11]). A parallel parsing for programming language is given by [14]. A block is a section of code which is grouped together. In a language, a block may contain class definition, member or method declaration. Another block could be a block of statements also called compound statement. This block is usually associated with a function code or if statement or loop. Programming Languages such as C, C++, Java, Python use the concept of blocks heavily. One of most important property of parsing blocks is that they all are independent of each other i.e. each block can be parsed independently of other block. So, we could parse many blocks in a parallel fashion. In this paper, we will propose a technique to parse various blocks of the code in parallel. It can also work as a block parallel incremental parser. Our parser is termed as Block Parallelized Parser (BPP, for short). Our technique of parallel parsing is based on incremental parsing. An incremental parser is the one that parse only those portions of a program that have been modified. Whereas an ordinary parser must process the entire program when it is modified. An incremental parser takes only the known set of changes done in a source file and updates its internal representation of source file which may be an Abstract Syntax Tree. By building upon the previously parsed files, the incremental parser avoids the wasteful re-parsing of entire source file where most of the cod remains unchanged. BPP is based on the properties that an incremental parser can parse any part of a source code without the need of parsing the whole source code and different blocks in a source code can be parsed independently of other blocks. In BPP these parts are blocks in a source code. Using the property of incremental parser, BPP parse each of the blocks independently of other blocks. Each of these blocks are parsed in their own thread. It can be easily seen that BPP follows a divide and conquer approach. It divides the source into different blocks, parse each of them in parallel and at the end conquer these blocks. In our scheme the conquer step does nothing except waiting for all the BPP Threads to complete their operations. There have been many works on incremental parsing [Incremental Parsing References]. We choose to extend on the works of Incremental Jump Shift Reduce parser of [13]. BPP is derived from Incremental Jump Shift Reduce Parser. In [13], authors defined Incremental Jump Shift reduce parser for SLR (1) languages only. However, we decided to extend this parser to accept LR(1) language because LR(1) languages has more power than SLR (1) and nearly all programming languages can be defined in the form of LR(1) grammars. We define the incremental categories to be a statement containing a block like class definition or function definition or if statement or for loop statement. Then, we give a notion of First Non-Terminal symbols of a Non-Terminal symbol. We used this notion to create partitions of a grammar such that a partition includes an incremental category and its First Non-Terminals. We observed that this scheme gives us a very interesting property in Incremental Jump Shift Reduce parser. We used this property to create our Block Parallelized Parser. Whenever a start of the block symbol is encountered the parser will first check whether the current block is related to any incremental category and can it be parsed independently. If BPP is able to find the incremental category for it, BPP will start parsing the block in parallel. In this paper we developed this BPP for LR(1) languages but we believe it can be easily extended to LR(k) or can be easily converted to LALR (1) or SLR (1) grammars. We also see that no major changes were done to the current LR(1) parsing algorithm and hence, it should be easy to create an Abstract Syntax Tree. This parser can also work as an incremental parallel parser which can parse different blocks in parallel. Moreover, it could be seen that there is no requirement of any Thread Synchronization to communicate between different threads of BPP each of which is parsing a block in parallel. This is because no two blocks are related in any way for the purpose of parsing. We compiled C# implementation using Mono C# Compiler 3.12.1 and executed the implementation using Mono JIT Compiler 3.12.1 on machine running Fedora 21 with Linux Kernel 3.19.3 with 6 GB RAM and Intel Core i7-3610 CPU with HyperThreading enabled. We found out that our technique showed 28% performance improvement in the case of including header files and 52% performance improvement in the case of excluding header files. The following paper is designed as follows. Section 2 shows some previous work done in parallel parsing. Section 3 and 4 provides the terminology we will use and the background required to understand our technique. In Section 5 we will extend Incremental Jump Shift Reduce parser to accept LR(1) grammars. In Section 6, we introduced the concept of First Non Terminals of a non terminal. In Section 7 we will use this concept to create partitions of the grammar. We also showed that by creating partitions using this concept we get a very interesting property. This property would be used by BPP. We have generalized this property in a theorem and also provided a proof for it. In Section 8 we presents our Block Parallelized Parser and its parsing algorithm. In Section 9 we will compare our algorithm with previous work. Section 10 shows our evaluation and results. In Section 11 and Section 12 we complete our document with conclusion and related work. 2 Related Work A lot of previous work has been done in Parallel Parsing of LR (1) and Context Free Languages. The most recent work done by [2] in parallel parsing of LR(1) is an extension of an LR substring parser for Bounded Context Languages (developed by Cormack) for Parallel environment. [3] provided a substring parser for Bounded Context-LR Grammars and Simple Bounded Context-LR Grammars. [2] distributes the work of parsing the substrings of a language over different processors. The work was extended to different processors in a Balanced Binary Tree Fashion and achieved O(log n) time complexity of parsing. But constructing a Bounded Context LR Grammar for a programming language is also difficult. C++ is one of the programming languages which cannot be parsed by LR (1) parsing [12] so creating a Bounded Context Grammar is out of question here. Parallel and distributed compilation schemes can be divided into two broad categories, functional decomposition and data decomposition. [1] and [20] talks about distributed compilation using a scheme based on functional decomposition. Functional decomposition scheme divides different phases of compiler: lexer, parser, semantic analyzer into functional component and running each of them on separate processors like an instruction pipeline fashion. The data decomposition scheme divide the input into sections of equal length and parse them in parallel. BPP is data decomposition scheme which parallel the parser by divide and conquer approach. The data decomposition scheme was developed by [8], [7], [9], [11]. These schemes are parsing LR (k) in parallel. They divide the input into sections of equal length and then parse them in parallel. [10], [11], [8] describes asynchronous algorithms while [9] develops a synchronous algorithm. [11] develops a parallel LR parser algorithm using the error recovery algorithm of [21]. [1] has developed an Incremental Parallel Compiler which could be used in Interactive Programming Environment and he developed an Incremental Parallel Parser also. [22] improves upon the Divide and Conquer Parsing technique developed by [23]. They show that while the conquer step of algorithm in [23] is O(n3 ) but under certain conditions it improves to O(log 3 n) . [14] describes a grammar partitioning scheme which would help in parsing the language in parallel. In [14] a type of Statement Level Parallelism has been developed. The grammar is divided into n different sub-grammars corresponding to n subsets of the language which will be handled by each sub-compiler. For each n sub grammars required to generate parse tables (using parser generator) along with driver routine constitute a parser for sub-compiler. For each subcompiler, a requirement of modified scanner is there which recognizes subset of the language. The technique described in [14] requires a lot of modification to the Lexical Analyzer. A separate Lexical Analyzer has to be developed for one type of language. The parser of [14] requires automatic tools for its implementation. In all the above described techniques constructing Abstract Syntax Tree for a Block Structured Language is difficult. As Blocks in a Block Structured Language are independent on each other, so they can be parsed independently. Moreover this scheme would not involve Inter-Thread Communication before a thread completes its Parsing of Blocks. Hence, no shared memory synchronization methods are required to coordinate between different threads. It could be easily seen that the creation of an Abstract Syntax Tree is also very easy. With all these required things in mind we have developed Block Parallelized Parser for LR (1) languages. 3 Terminology We assume the notation for Context Free Grammar is represented by G = (N, T, S, P ) where N is set of non-terminals, T is set of terminals, S is start symbol and P is set of productions of the grammar. n The language o generated by G is ∗ ∗ given as L(G) = ω ∈ T |S ⇒ ω We will use the following conventions. S, A, B, ... ∈ N a, b, ... ∈ T ..., w, x ∈ T ∗ X, Y ∈ N ∪ T α, β, γ, ... ∈ (N ∪ T )∗ Given a grammar G, we represent its augmented grammar as G0 = (N 0 , T 0 , S 0 , P 0 ), where N 0 = N ∪ {S 0 } T 0 = T ∪ {$} 0 P = P ∪ {S 0 → S$} 0 Here S is called the augmented start symbol of G0 and $ is the end of string marker. We denote a set of End Of String markers as EOS. In our paper we will represent Block Parallelized Parser as BPP, Jump Shift Reduce parser as JSR and Incremental Jump Shift Reduce parser as I JSR. An LR(1) item is represented as [A → α.β, a] , where a is the lookahead symbol. In a programming language, a block represents a section of code grouped together. This section of code can be a group of statements, or a group of declaration statements. For example in Java, a block corresponding to class defini- Fig. 1. Top-Level and Child Blocks of a Java Program. tion contains declaration statements for fields and methods. Block corresponding to function definition can contain declaration statement for local variables or expression statements or control flow statements. A Top-Level Block is the starting block of a program which contains definition for Classes, Functions, Import/Include statements etc. Child Blocks are contained in either Top-Level Block or another Child Block. As we proceed further, Block will be in reference to Child Block. Fig. 1, shows an example of Top-Level and Child Blocks of a Java Program. A start block symbol could be ”{” in C style languages, ”begin” in Pascal style languages is represented as terminal sb . An end block symbol which could be ”}” in C style languages or ”end” in Pascal style languages is represented as eb . 4 Background We now survey LR (1) parsers and their generation algorithm as given by [4]. LR (1) parsers are table driven Shift Reduce parsers. In LR (1), L denotes left-to-right scanning of input symbols and R denotes constructing right most derivation in reverse. Some extra information is indicated with each item: the set of possible terminals which could follow the items LHS. This set of items is called the lookahead set for the item. Here, 1 signifies that number of lookahead symbols required are 1. LR (1) parser consists of an input, an output, a stack, a driver routine. A driver routine runs its parsing algorithm which interacts with two tables ACTION and GOTO. Any entry in ACTION and GOTO tables are indexed by a symbol which belongs to N ∪ T 0 and the current state. An entry in both the tables can be any one of the following: – – – – – If If If If If ACTION [j, a] = <S, q> then a Shift Action must be taken. ACTION [j, a] = <R, A → α > then reduce symbols to a production. ACTION [j, a] = Accept then grammar is accepted. ACTION [j, a] = error then Error has occurred. GOTO [j,A] = q then go to state q. An LR (1) item is of the form [A → α.β, a], where a is a lookahead symbol. Construction of LR (1) items requires two procedures CLOSURE and GOTO. CLOSURE takes a set of items as its argument. GOTO takes a set of items and a symbol as arguments. Both are defined as follows: CLOSU RE(I) = I ∪ {[B → .γ, b] | [A → α.Bβ, a] ∈ I and B → γ ∈ P 0 ∀ b ∈ F IRST (βa)} GOT O(I, X) = CLOSU RE({[A → αX.β, a] | [A → α.Xβ, a] ∈ I}) Collection of set of LR (1) items is created using CLOSURE and GOTO functions. Items function creates the collection of set of LR (1) items. items(G0 ) = CLOSU RE({[S 0 → .S, $]}) ∪ {GOT O(I, X) | I ∈ C and X ∈ P 0 } ACTION and GOTO tables are created using this collection. Following is the procedure to create these tables: 1. Create collection of set of LR(1) items. Let this collection be C 0 = {I0 , I1 , I2 , ..., In } 2. Let i be the state of a parser constructed from Ii . Entries in ACTION table are computed as follows: (a) ACTION [i, a] = shift j, if [A → α.aβ, b] ∈ Ii and GOT O(Ii , a) = Ij (b) ACTION [i, a] = reduce A → α., if [A → α., a] ∈ Ii and A 6= S 0 (c) ACTION [i, $] = accept, if [S 0 → S., $] ∈ Ii (d) GOTO [i, A] = j, if GOTO (Ii , A) = Ij 3. All other entries not defined by (b) and (c) are set to error. 4. The Initial State is the one containing the item [S 0 → .S, $]. Most of the programming languages could be constructed from LR (1) grammar. Hence, LR (1) is the most widely used parser. Many parser generators like YACC and GNU Bison generates an LR (1) parser. A Jump Shift Reduce [13] (JSR in short) parser is an extension of LR (1) parser. LR (1) parser generates ACTION and GOTO table for the augmented grammar G0 . JSR parser first partition the grammar G0 into several sub grammars and creates parsing sub- table of every sub grammar. Hence, the ACTION and GOTO tables of LR (1) are split into several ACTION and GOTO tables in JSR parser. JSR parser is equivalent to the LR (1) parser that is it will only accept languages generated by LR (1) grammar [13]. Let G0 = (N 0 , T 0 , S 0 , P 0 ) be the augmented grammar of grammar G = (N, T, S, P ). Let us partition the grammar G on the basis of Non Terminals. Let Gi denotes a partition of the grammar G, such that we have Gi = (M i , T i , S i , P i ) i where, N ⊆ N such that N i ∩ N j = φ | i, j = 1, ..., n, i 6= j  i Pi = A → α  ∈ P | A ∈ N ∀i = 1, ...,i n i i M = N ∪ B ∈ N | ∃A → αBβ ∈ P T i = a ∈ T i | ∃A → αaβ ∈ P i Si ∈ N i Therefore, we have (∪N i , ∪ T i , S 0 , ∪ P i ) = G0 For every subgrammar Gi , a parsing subtable named Tab(S i ) is built. Each subtable contains ACTION and GOTO subtables which are represented by Tab(S i ).ACTION and Tab(S i ).GOTO. In addition to the Shift, Reduce and Accept action there is an additional Jump action. Jump action is associated with a sub-table. Whenever a Jump action is encountered then the parsing algorithm Jumps to a sub-table and parse the partition related to that sub-table. We will now investigate few points about the Incremental Jump Shift Reduce Parser [13]. Incremental Jump Shift Reduce Parser (I JSR) [13] is based upon the JSR parser [13]. A set of Incremental Categories will be defined which could be incrementally parsed by I JSR parser. Given a grammar G = (N, T, S, P ) a set of Incremental Categories has to be defined IC = {Cj | Cj ∈ N, j = 1, 2, ..., n} and the Incremental Language of G is L∗ (G) = ∪L∗ (A), ∗ where A ∈ IC ∪ {S} and L∗ (A) = {α ∈ (T ∪ IC)∗ | A ⇒ α} For every Incremental Category A, add a production A → A#A , where #A is an end-of-string for A. For a given grammar G = (N, T, S, P ) with a set of Incremental Categories IC = {Cj | Cj ∈ N, j = 1, 2, ...n} an Incremental Grammar is defined as G∗ = (N, T ∪ EOS, S, P ∪ PI C), where, EOS is the set of End of String markers = {#j | j = 1, 2, ..n} PIC = {Cj → Cj #j | Cj ∈ IC, #j ∈ EOS} A major change by this extension is that now the strings may contain incremental symbols which are also non-terminal symbols. The difference between ACTION and GOTO tables disappears, as an incremental category can also occur in the input string and can be shifted on the stack. Hence, we would have only ACTION table and no need for GOTO table. As we have also introduced EOS set, the ACTION table can now be indexed with symbols belonging to N ∪ T 0 ∪ EOS. Every Incremental Category will have its own start state and accept action. We will represent the subtable as Tab(S t ). Entries of table will be as follows: If Tab(S t ) If Tab(S t ) If Tab(S t ) If Tab(S t ) accepted. – If Tab(S t ) – If Tab(S t ) – – – – [j, [j, [j, [j, X ] = <S, q> then a Shift Action must be taken. X ] = <R, A → α. > then a Reduce Action must be taken. $] = Accept then input is accepted. #i ] = Accept then input for Incremental Category Ci will be [j, a] = <J, K> then jump to a subtable Tab(S k ). [j, a] = error then error occurred. 5 Extending I JSR Parser to accept languages generated by LR (1) grammars As JSR Generation Algorithm was already developed for LR (0) items and Incremental JSR Generation Algorithm was developed for SLR (0) items [13]. In this section, we will first extend the JSR Parser Generation Algorithm to accept LR (1) Grammar and then we will extend I JSR parser to accept LR(1) Grammar. Generation of subtables first requires the generation of canonical collection of sets of augmented items. An augmented item is a triplet represented as <i, FF, TF>, where i is an LR item, FF called From-Field and TF called To-Field are the names of parsing sub-tables. From-Field represents the sub-table which contains the last action performed by parser and To-Field represent the subtable which contains the next action to be performed. Although we focus only LR (1) items but the procedure for LR (k) items is very similar. To-Field of an augmented item of a state is determined using TO function. Let us define the TO function. Function TO calls Function CHOOSE NEXT. 1: procedure TO(Ij ) 2: Ij00 = φ 3: for all item ik in Ij do 4: if ik is [A → α.aβ, b] then 5: add < ik , CHOOSEN EXT (Ij , a) > to Ij00 6: else if ik is [A → α.Bβ, b] then 7: add < ik , S i > to Ij00 , where B ∈ N i 8: else if ik is [A → β., b] then 9: add < ik , S i > to Ij00 , where A ∈ N i return Ij00 This function selects a parsing table out of those in which the parsing of the remaining string could continue. Let < · be a total ordering relation over the set ST = {S p | p = 1, 2, ..., n} of the names of parsing sub-tables, such that S i < ·S i+1 , i = 1, 2, ...n − 1 From-Field of an augmented item is enriched using FROM function. FROM 1: procedure CHOOSE NEXT(Ij , a) 2: let ST 0 be a set of parsing subtables 3: for all item [H → α.aβ, b] in Ij do 4: add Sh to ST 0 such that H ∈ Nh return min < ·ST 0 takes two arguments It00 , which is a set of items enriched with To-Field and Ij , whose items we have to enrich with From-Field. STATES procedure is used to generate the collection of set of JSR items. 1: procedure FROM(It00 , Ij ) 2: Ij0 = φ 3: for all itemik ∈ Ij do 4: if ik is [S 0 → .S$, b] then 5: add < ik , S 1 > toIj 6: else if ik is [A → αX.β, b] then 7: add < ik , T F > to Ij0 , where < [A → α.Xβ, b], T F >∈ It00 8: else if ik is [A → .β, b] then 9: add < ik , F F > to Ij0 , where < [B → α.Aβ, b], F F >∈ Ij0 return Ij0 STATES algorithm first generates the collection of sets of LR(1) items using ITEMS procedure which was discussed previously. Afterwards, it calls TO and FROM functions to generate set of augmented items from the corresponding set of LR(1) items. We will now extend I JSR parser to accept LR (1) languages. This extended 1: procedure STATES(G0 ) 2: C 0 = items(G0 ) 3: IA = φ 4: for all Ij ∈ C 0 do 5: Ij0 = {< ik , F Fk > | ik ∈ Ij } = F ROM (It00 , Ij ), where Ij = GOT O(It , X) and It = φ if j = 0 6: Ij00 = {< ik , T Fk > | ik ∈ Ij } = T O(Ij ) 7: IjA = {< ik , F Fk , T Fk > | < ik , F Fk >∈ Ij0 and < ik , T Fk >∈ Ij00 } 8: I A = I A ∪ {IjA } return I A parser is based on the previous JSR parsing algorithm. The FIRST function used to compute the set of First symbols related to a non-terminal has to be modified to include the incremental categories also. The reason being an incremental category can also occur in the input string, can be shifted on the stack while parsing and can reduce to a production. Moreover, FIRST should now also include the EOS markers. Hence, the new FIRST becomes ∗ F IRST (A) = {a | A ⇒ aβ, where a ∈ T 0 ∪ EOS ∪ IC} For an incremental category A, there will be a set of items containing item [A → .A#A , #A ] and items [B → α.Aβ#A ]. Then the state corresponding to this set of items will be the start state of the incremental grammar corresponding to A. Correspondingly, there will a single set of items that contains the item [A → A.#A , #A ]. The state belonging to this set of item is the accepting state of the incremental grammar corresponding to A. The I JSR parser has initial and final states for every incremental category. Now, we can extend the I JSR parser for accepting languages generated by LR(1) grammars. The procedure I TABS given below is used to construct the I JSR parsing table. 1: procedure I TABS(G0 ) 2: C 0 = items(G0 ) 3: for all IjA ∈ C 0 do 4: for all < ih , H, K >∈ IjA do 5: if ih is of the f orm [A → α.Xβ, b] then 6: T ab(S K )[j, X] =< S, q > where GOT O(Ij , X) = Iq 7: if H 6= K then 8: T ab(S H )[j, X] =< J, K > 9: else if ih is of the f orm [A → α., X] then 10: T ab(S K )[j, X] =< R, A → α > 11: if H 6= K then 12: T ab(S H )[j, X] =< J, K > 13: else if ih is of the f orm [S 0 → S.$, $] then 0 14: T ab(S S )[j, $] = accept 15: else if ih is of the f orm [A → A.#A , #A ] then 16: T ab(S K )[j, #A ] = accept 6 First Non Terminals In this section we will define the concept of First Non Terminals. We define a set of First Non Terminals for a non terminal A as a set of non-terminals that appear at the beginning of any sentential form derived from A i.e. a set of non terminals B such that there exists a derivation of the form ∗ A ⇒ Bβ. F IRST N T (A) represents the set of First Non Terminals for A and can be represented in set notations as: [ n o ∗ F IRST N T (A) = B | A ⇒ Bβ B To compute F IRST N T (A) for any non-terminal A, apply the following rules until no more terminals can be added to the F IRST N T (A) set. 1. If A is a terminal, then F IRST N T (A) = φ 2. If A is a non-terminal and A → B1 B2 ...Bk is a production for some k ≤ 1, then place Bi and everything in F IRST N T (Bi ) in F IRST N T (A) if ∗ B1 , B2 , ...Bi−1 ⇒  3. If A →  is a production, then F IRST N T (A) = φ EXAMPLE 1: If we have following productions: S → DAB S→C A → aB B→b C→c D→d Then find F IRST N T (S)? SOLUTION 1: Due to first two productions of S we have, S S F IRST N T (S) = F IRST N T (A) F IRST N T (C) {A, C} F IRST N T (A) = F IRST N T (a) = φ F IRST N T (C) = F IRST N T (c) = φ 7 Using First Non Terminals to create partitions In this section we will use the concept of First Non Terminals to create partitions of grammar. I JSR Parser will use these partitions to develop its tables. We will see that this kind of partitioning leads to a very interesting property in I JSR Parsing algorithm. We will generalize this property in a theorem and will also prove it. We will partition the grammar in such way that: – Every Incremental Category will have its own partition. – The partition of Incremental Category will contain First Non Terminals of that incremental category also. – Intersection of set of First Non-Terminals of any two incremental categories must be empty. – All other remaining non-terminals including the augmented and start symbol are included in the first partition. Given a grammar G∗ = (N, T ∪ EOS, S, P ∪ PIC ) with a set of Incremental Category, IC = {Ct | Ct ∈ N } we define partitions of non-terminals as N 2 , N 3 , ..., N n such that: N t = {Ct } ∪ F IRST N T (Ct ) and Ct 6= S and F IRST N T (Ct ) ∩ F IRST N T (Cs ) = φ, where t, s = 1, 2, ..., n and t 6= s And first partition, [ N1 = N − Nt t Example 2: Partition the grammar given in Example 1 using first non terminals as given above and create I JSR parsing table. Then parse the string ”dabb” and parse string ”ab” incrementally for incremental category A. Solution 2: First we have to create an augmented grammar of the given grammar by adding production S 0 → S$. Next we can create two partitions of grammar as given by the following partitions of non terminals. N 1 = {S 0 , S, B, C, D} N 2 = {A} As the incremental category we want is only A. Hence, there will be two partitions, N 2 containing A and its first non terminals and N 1 will contain the remaining non terminals. Moreover, we would also have to add an EOS marker for A, let us say it is #1 . We can generate the I JSR table using I TABS procedure described in Section 5. Let us parse the string ”dabb”. Table 1 shows the series of actions taken while parsing ”dabb”. In this case the start state will be the start state of table T ab(S 0 ) i.e. 0. Table 2 shows the series of actions taken when ”ab” is parsed incrementally with the incremental category A. In this case the start state will be the start state of table Tab (A) i.e. 2. Table 1. Parsing of ”dabb” STACK INPUT ACTION 0 dabb$ Shift 5 0d5 abb$ Reduce D → d 0D2 abb$ Jump A 0D2 abb$ Shift 7 0D2a7 bb$ Jump S’ 0D2a7 bb$ Shift 11 0D2a7b11 b$ Reduce B → b 0D2a7B10 b$ Jump A 0D2a7B10 b$ Reduce A → aB 0D2A6 b$ Shift 9 0D2A6b9 $ Reduce B → b 0D2A6B8 $ Reduce S → DAB 0S1 $ Accept Table 2. Parsing of ”ab” STACK INPUT ACTION 2 ab#1 Shift 7 2a7 b#1 Jump S’ 2a7 b#1 Shift 11 2a7b11 #1 Reduce B → b 2a7B10 #1 Jump A 2a7B10 #1 Reduce A → aB 2A6 #1 Accept In Table 1, when stack state reaches 0D2 there is a Jump to the Table Tab (A). From this point until when stack state changes to 0D2A6, the actions taken are same as the actions of Table 2 and in the same table i.e. Tab (A). Moreover, in between these Stack states in Table 1 ”ab” is parsed to A. We can generalize this example in the sense that same series of actions are taken when parsing a string and when parsing its substring incrementally for its incremental category. In the current example all the same actions happens in the same table because we created the partitions in such a way that all the first non terminals are in that partition. If the partitions were not created in the way described, it could have happened that these actions would happen in the different sub tables. This technique is utilized by our BPP and it is generalized and proved in the theorem below. Theorem 1 Given an Incremental Grammar G∗ = (N, T, P 0 , S 0 ) with set of incremental categories IC = {Ct | Ct ∈ N } such that the non terminal partition, N t related to incremental category Ct contains only Ct and F IRST N T (Ct ). For ∗ an incremental category Ct and any terminal b ∈ F IRST (Ct ), if Ct ⇒ bγ and during parsing of the word w = ”µbγδ” the parser reaches at a state q in the subtable of Ct after performing the shift action on b then during the incremental parsing of the word wt = ”bγ” for the incremental category Ct the parser will also reach the state q after performing the shift action on b in the sub table of Ct . Proof. Outline: We will divide the proof in 4 cases. For each case, we will first find two sets of JSR items reached after performing shift on b one during the parsing of word w and other during the incremental parsing of word wt related to incremental category Ct . We will then show that both of these sets contains same JSR items which implies the above theorem. It is given that Ct is an incremental category and Ct 6= S and let N t be the partition containing only Ct and F IRST N T (Ct ). Let S t be the sub-table related to Ct . For any non-terminal A ∈ F IRST N T (Ct ) and A → bβ, we must have A ∈ N t. During incremental parsing of the word wt = bγ for the incremental category Ct , the state before performing actions related to b will be the start state of the sub table T ab(Ct ). Let that start state be m. We will have four cases on the basis of whether the grammar has productions of the form, B → cXCt β and B → Ct β Case 1: If B → cXCt β ∈ P 0 and B → Ct β ∈ P 0 Let the set of LR(1) items related to the start state of T ab(Ct ) i.e. state m be Im and X lies in some partition other than N t i.e. X ∈ N h and t 6= h. As noted by [13] the start state of T ab(Ct ) must contain the item [Ct → .Ct #t , d], where d is a lookahead symbol. So we have [Ct → .Ct #t , d] ∈ Im . It is evident that the item [Ct → .Ct #t , d] should be result of a closure of another item. The only such item we can see is [B → cX.Ct β, j], where j is some lookahead symbol. So, we must have [B → cX.Ct β, j] ∈ Im . As discussed in Section 2, to get a set of LR(1) items we have to apply CLOSURE ([B → cX.Ct β, j]). Hence, we have [B → c.XCt β, j] ∈ Im [Ct → .Ct #t , d] ∈ Im [Ct → .Aγβ, e] ∈ Im [A → .bβ, f ] ∈ Im where e and f are some lookahead symbols. Let Io be the set of LR(1) items such that Im = GOT O(Io , X). So, [B → cX.Ct β, j] ∈ Io . Let Io00 be a set of JSR items enriched with TO fields corresponding to all LR(1) items in Io . After applying TO procedure over Io we would get the TO field for item [B → cX.Ct β, j] as S h because X ∈ N h . To get TO fields for all JSR items corresponding to LR (1) items of the set Im we have to apply TO procedure over Im . We could see that the TO fields for items [B → cX.Ct β, j], [Ct → .Ct #t , d], [Ct → .Aγ, e], [A → .bβ, f ] will be S t . To enrich JSR items for all the LR(1) items in Im with FROM field, we would apply FROM procedure as F ROM (Io00 , Im ). Now we could see that the FROM field of JSR item of LR(1) item [Ct → .Aγ, e] will be equal to the FROM field of [B → cX.Ct β, j] which in turn is equal to the TO field of [B → c.XCt β, j], A which is S h . So, the set of JSR items (Im ) corresponding to Im contains the following items: A [B → cX.Ct β, j, S h , S t ] ∈ Im h t A [Ct → .Ct #t , d, S , S ] ∈ Im A [Ct → .Aγ, e, S h , S t ] ∈ Im h t A [A → .bβ, f, S , S ] ∈ Im Let after performing shift operation in the state m over the symbol b, parser reaches state n. So, we must have In = GOT O(Im , a) = CLOSU RE({[A → b.β, g] | ∀ g ∈ F IRST (βf )}) Moreover, the TO and FROM fields of all items in the above state will be S t . We have obtained the set of JSR items reached after performing shift over the symbol b during incremental parsing of word wt for incremental category Ct . Also, the subtable at this state is T ab(S t ). We will now obtain the set of JSR items reached after performing shift over the symbol b during the parsing of word w for incremental category Ct . Let us ∗ ∗ consider the derivation S ⇒ ηB ⇒ µbγδ such that, B doesn’t derive η. In the above derivation only one production out of B → cXCt β and B → Ct β will be used. Hence, we have two cases of the basis of which production is used. Case 1.1 : If production B → cXCt β is used, then the set of items related to state reached just after performing shift on c in the above derivation say Ix will contain the LR(1) item [B → c.XCt β, j] besides other items of the form [X → .δ, k], where k ∈ F IRST (Ct βc). After applying TO procedure on Ix , we should get the TO field for LR(1) item [B → c.XCt β, j] as S h . Let us represent these set of items enriched with TO field as Ix00 . After parsing X next state will be obtained by performing GOTO over Ix with symbol X. Let that state be Iy . Now we must have, Iy = GOT O(Ix , X) . After performing GOTO we get [B → cX.Ct β, j] ∈ Iy [Ct → .Ct #t , d] ∈ Iy [Ct → .Aγ, e] ∈ Iy [A → .bβ, f ] ∈ Iy After applying TO procedure over Iy , we get the TO fields of items [B → cX.Ct β, j] [Ct → .Ct #t , d] [Ct → .Aγ, e] [A → .bβ, f ] as S t . To enrich JSR items of LR(1) items in Iy we would apply FROM procedure as F ROM (Ix00 , Iy ). Now, we could see that the FROM field of JSR item for [Ct → .Aγ, e] will be equal to the FROM field of JSR item for [B → cX.Ct β, j] which in turn is equal to the TO field of [B → c.XCt β, j], which is S h . So, the set of JSR items (IyA ) corresponding to Iy contains the following items: [B → cX.Ct β, j, S h , S t ] ∈ IyA [Ct → .Ct #t , d, S h , S t ] ∈ IyA [Ct → .Aγ, e, S h , S t ] ∈ IyA [A → .bβ, f, S h , S t ] ∈ IyA Let the state reached after performing shift of b from the state Iy be Iz . Then, Iz = GOT O(Iy , b) = CLOSU RE({[A → b.β, g] | ∀ g ∈ F IRST (βf )}) Moreover, the TO and FROM fields of all JSR items of Iz will be S t . So, we have Iz = In . This shows that the states z and n are same. Let us name these states as q. Also, the TO fields for the items of Iz and In are same i.e. S t . Hence, in this case Shift on terminal b in states m and x results only in one state q and in the sub-table for incremental category Ct . Theorem is proved in this case. Case 1.2 : If B → cXCt β is used. Let x is the state reached before performing the shift on b. Then, the set of items, say Ix related to state x will contain following items: [B → .Ct β, j] ∈ IyA [Ct → .Ct #t , d] ∈ IyA [Ct → .Aγ, e] ∈ IyA [A → .bβ, f ] ∈ IyA After applying TO operation to Ix , the TO fields of all JSR items for above LR(1) items will be S t . Let Iy be the state reached after performing shift on b in the state Ix . So, Iy = GOT O(Ix , b) = CLOSU RE({[A → b.β, g] | ∀ g ∈ F IRST (βf ) }) Also, the TO and FROM fields of all the JSR items for the above set of LR (1) items will be S t . Hence, Iy = In . This shows that the states y and n are same. Let us name the state as q. Moreover, the TO fields of LR(1) items of Iy and In are S t . Hence, in this case Shift on terminal b in the states m and x results only in one state q in the subtable of Ct . Theorem is proved in this case. As Theorem has been proved in Case 1.1 and Case 1.2. So, for Case 1 also the Theorem has been proved. We have proved for the case containing both productions. Two other cases are when only one of these productions is present. The proof of both of these cases are very similar to the Case 1. Please note that with the given set of conditions in the Theorem, we couldn’t have the case in which none of the productions belong to this set. THEOREM 1 is crucial to BPP. In the succeeding sections we will use this theorem to create our parallel parsing algorithm. 8 Block Parallelized Parser In this section we will present our Block Parallelized Parser for LR (1) grammars. We will first give the intuition and working of BPP. Then we will present our algorithm and give a proof that our parser can accept all the LR(k) and LALR (k) languages which can be accepted by a Shift Reduce LR(k) and LALR (k) parser. Let G0 = (N 0 , T 0 , P 0 , S 0 ) be the augmented grammar. The incremental categories are the Non Terminals associated with the blocks to be parsed in parallel. For example, if we want to parse class definitions in parallel then we can define class-definition as the incremental category. Other examples can be function-definition, if-statement, for-loop, while-loop if they can be parsed in parallel. For most of the programming languages including C, C++, Java, C# above blocks can be parsed in parallel. In general we can define an incremental category to be the non terminals which derive a string containing the start of the block symbol, sb and ending with the end of the block symbol eb . In mathematical terms,nfor BPP the set of incremental category IC o is defined as: ∗ IC = Ct | if Ct → αX ∈ P 0 then Ct ⇒ αsb βeb In the C Programming Language, a function-definition can be represented by the following context free grammar productions: f unction-def inition → type name (arguments) block block → sb statement∗ eb statement → type name ; statement → if -stmt statement → f or-loop statement → while-loop; if -stmt → if (expression) block while-loop → while (expression) block f or-loop → for (expression; expression; expression) block According to the definition of Incremental Categories above, we can see that function-definition, if-stmt, while-loop, for-loop follows the condition for an incremental category. In a programming language there could be many types of blocks like in Java, a block related to the class definition may contain only method definitions and declaration of member variables while a block related to the method definition would contain statements including expression statements, variable declarations, if statement or loop etc. This means in a programming language not all blocks contains same type of statements. Hence, encountering the start symbol of block doesn’t give us enough information about what kind of statements the block would contain. To overcome this problem we will modify the productions of incremental category such that a reduce action will happen when the start symbol is encountered. Modify the productions of Ct ∈ IC in such a way that every production Ct → αt sb Xt eb is split into two productions: Ct → At sb Xt eb At → αt If the productions of incremental category Ct is structured as above then during the parsing of a word related to this incremental category there will be reduce action to reduce the current symbols to production At → αt when sb becomes the look ahead symbol. As each At is related to only one Ct and viceverse, we can easily determine which incremental category has to be parsed next. Now we are in a stage to define Block Parallelized Grammar. Given a grammar G = (N, T, P, S) and a set of incremental categories n o ∗ IC = Ct | Ct ∈ αsb Xeb ∈ P 0 and Ct ⇒ αsb βeb we define Block Parallelized Grammar GP = (N P , T, P P , S) such that P P = P ∪ {Ct → At sb Xt eb , At → αt | Ct → αt Xt ∈ P } − {Ct → αt Xt | Ct → αt Xt ∈ P } N P = {At | Ct → At sb Xt eb , At → αt ∀ Ct → αt Xt ∈ P } and N P is partitioned using FIRSTNT as given in Section 7. Now we can use THEOREM 1 to create BPP. Let us have a string w = ∗ ∗ ”ωaδsb ηeb µ” where ω, δ, η, µ ∈ T ∗ , At ⇒ aδ and Xt ⇒ sb ηeb . During the parsing w, when sb is encountered we should have a reduce action to At , based on the production At → αt . Now, we can get Ct associated with At . According to THEOREM 1, during parsing of the word w if the parser reaches at state q in the sub table of Ct after performing shift action on a then during the incremental parsing of the word wt = ”aδsb ηeb ” for the incremental category Ct the parser will also reach the state q in the sub table of Ct after performing the shift action on a. This means, we can replace the state reached just before performing shift action on a with the start state of subtable of Ct and wt can now be parsed incrementally. It is now evident that why the partitions of Non Terminals should be created as described in Section 7. If the partitions are not created in this way, then it may happen after a shift on a during the parsing of w and incremental parsing of wt may reach the same state but not in the same sub-table. By creating partitions as described in Section 8, we make sure that when sb is encountered by BPP then the newly created parallel parser knows in which sub-table it has to continue the parsing in. On the other hand if partitions are not created as described in Section 8, then newly created parallel parser wouldnt know in which sub-table it has to continue parsing in. This property is used by BPP to parse the block incrementally. Algorithm 1 is the BPP parsing algorithm of incremental table S t . If t = 1, then the algorithm is for the Top Level Block. Otherwise it is for other incremental category. This parsing algorithm is for any block be it top level block or child block. Lines 1-4 initializes different local variables. Lines 5-32 is the main loop of algorithm which does the whole work. Line 6, gets the top state on the stack. Lines 7-9 pushes the next state on the stack if there is a shift operation. Similarly, lines 10-11 changes current table if there is a jump operation. Line 12-27 are executed if there is reduce action which reduces according to the production A → β. Line 14 checks if current input symbol is a start of the block symbol and if reduce action reduces At → αt for an incremental category Ct . If yes then Lines 15-22 gets Ct related to At , pops |αt | states from stack and pushes these states and start state to a new stack, creates and starts a new BPP for Ct and shifts to the end of block. In this case next symbol will become Ct . If check of Line 14 fails then it means this is a regular reduce action not associated with any block. Lines 24-27, pops |β| states from stack and shifts to a new state. Line 28 returns if there is an accept action. Accept action can be for both Top Level block and Child Block. Line 30 reports error if none of the above cases are satisfied. Fig. 2 shows an example of how BPP works. It will start parsing the block Algorithm 1 Block Parallelized Parsing Algorithm 1: 2: 3: 4: 5: 6: 7: 8: 9: 10: 11: 12: 13: 14: 15: 16: 17: 18: 19: 20: 21: 22: 23: 24: 25: 26: 27: 28: 29: 30: a = start symbol of input $ = last symbol of input h = initial parsing subtable stack = stack of states while true do s = stack.top() if T ab(S h )[s, a] == shif t t then stack.push(t) a = next symbol of input else if T ab(S h )[s, a] == jump k then h=k else if T ab(S h )[s, a] == reduce A → β then b=a if a == sb and T ab(S h )[s, a] == reduce At → αt then get Ct related to At stackt = new stack of states stackt .push(start state of Ct ) pop |αt | states f rom stackt and push them to stackt create new block parser related to Ct with stackt start new block parser go to the end of this block a = Ct else pop |β| states f rom stack t = stack.top() if T ab(S h )[t, A] == shif t p then stack.push(p) else if T ab(S h )[s, a] == accept then return else error Fig. 2. Example of BPP parsing source code of function f. When it will encounter an if block a new BPP in another thread will be created which will parse if block. Parent BPP will move ahead to the end of if block and will also create another thread to parse else block. In this way input is divided into different threads parsing each block. In this algorithm we have tried to minimize the amount of serial work to be done to get to the end of the block for the new block parser. One BPP doesnt have to do any communication with other BPPs. Also, there are no side effects of the above algorithm. All the variables which are being modified are local variables. Hence, there is no need of synchronization. This also reduces any amount of cache contention between different processors. Generation of Abstract Syntax Tree or Parsing Tree is easy using above algorithm and it requires very little change in the above algorithm. It may be argued that the step go to the end of this block is a serial bottleneck for the parallel algorithm. [15] describes an algorithm to perform lexical analysis of string in O(log n) time using O(n) processors in a parallel fashion. When performing lexical analysis in parallel as described in [15], lexer could store the start symbols of a block with its corresponding end symbol for that block. Now determining the end of block is just a matter of searching through the data structure. Many ways exist to make this searching as fast as possible like using a Binary Search Tree or a Hash Table. 9 Comparison with other Parallel Parsing Algorithms In this section we will show how our technique is better than other techniques. [14] developed a technique which divides whole grammar into n sub- grammars which are individually handled by n sub-compilers. Each sub-compiler needs its own scanner which can scan a sub-grammar. It requires an automatic tool to generate sub-compiler. This technique requires significant changes in not only in Parser and Grammar but also in Lexical Analyzer phase. Contrast to this our Block Parallelized Parser is easy to generate as our technique does not require any change in the grammar and lexical analyzer and it is pretty easy to modify current YACC and Bison Parser Generator tools to support the generation of our parser. LR substring parsing technique described in [2] is specifically for Bounded Context (1, 1) grammars. There are no limitations like this to Block Parallelized Parser. Although in this paper we have shown how we can create an LR (1) Block Parallelized Parser but we believe it can be extended to LR (k) class of languages and also could be used by LALR (1) parser. Hence, our technique accepts a larger class of grammars. [8], [7], [9], [11] all develops algorithm for parsing LR (k) class of languages in parallel. These techniques and in all other techniques the creation of Abstract Syntax Tree is not as easy as itis in our technique. Moreover our technique is simpler than all others. Hence, we could see that Block Parallelized Parser is easy to construct, accepts wider class of languages and supports an easy construction of Abstract Syntax Tree. 10 Implementation and Evaluation We implemented Lexer, Block Parallelized Parser and Shift Reduce LR (1) parser for C Programming Language supporting a few GNU C extensions required for our tests. Implementation was done in C# Programming Language. To simplify our implementation we only included function-definition as the Incremental Category for BPP. Moreover, function-definition would still give us a sufficient amount of parallelism as we would see in the evaluation. We modified the Lexer phase so that it will keep track of the position of s b and its corresponding e b . This information was stored in the form of a C# Dictionary (which is implemented as a Hash Table) with the position of s b as the key and position of e b as the value. As, thread creation has significant overhead so we used C# TaskParallel Library which is Thread Pool implementation in C#. Our implementation doesnt have a C preprocessor implementation. So, we first used gcc to perform preprocessing and the preprocessed file is used as input to our implementation. We evaluated the performance of BPP with Shift Reduce LR (1) parser by parsing 10 random files from the Linux Kernel source code. We compiled C# implementation using Mono C# Compiler 3.12.1 and executed the implementation using Mono JIT Compiler 3.12.1 on machine running Fedora 21 with Linux Kernel 3.19.3 with 6 GB RAM and Intel Core i7-3610 CPU with HyperThreading enabled. In C Programming Language, preprocessing #include could actually generate very long files. Normally, the header files contains declarations not function definitions. So, this leads to less amount of parallelism being available. Hence we decided to evaluate with including header files and excluding header files. Fig. 3 shows the performance improvement with respect to Shift Reduce LR(1) parser of 10 random Linux Kernel files. Fig. 3 shows performance improvement for both cases including the header files and excluding the header files. As expected we Fig. 3. Results of parsing 10 Linux Kernel Source Files. could see that the performance improvement with excluding the header files is more than the performance improvement including the header files. The performance improvement in the case of excluding header files matters most for the programming languages like Java, Python, C# where most of the program is organized into blocks the results because in these programs the amount of parallelism available is high. The average performance improvement in the case of excluding header files is 52% and including header files is 28%. 11 Conclusion In this document we present our Block Parallelized Parser technique which could parse the source code in a parallel fashion. Our approach is a divide and conquer approach in which, the divide step divides the source code into different blocks and parse them in parallel whereas the conquer step only waits for all the parallel parsers to complete their operation. It is based on the Incremental Jump Shift Reduce Parser technique developed by [13]. Our technique doesnt require any communication in between different threads and doesnt modify any global data. Hence, this technique is free of thread synchronization. We develop this technique for LR (1) languages and we believe that it can be extended to accept LR (k) languages and could be converted to an LALR (1) parser easily. Our technique doesnt do any major changes in the parsing algorithm of a Shift Reduce Parser hence the Abstract Syntax Tree can be created in the same way as it has been creating in Shift Reduce Parser. Moreover, our parser can also work as an Incremental Block Parallelized Parser. We implemented Block Parallelized Parser and Shift Reduce LR (1) Parser for C Programming Language in C#. The performance evaluation of BPP with Shift Reduce LR (1) parser was done by parsing 10 random files from the Linux Kernel source code. We compiled C# implementation using Mono C# Compiler 3.12.1 and executed the implementation using Mono JIT Compiler 3.12.1 on machine running Fedora 21 with Linux Kernel 3.19.3 with 6 GB RAM and Intel Core i7-3610 CPU with HyperThreading enabled. We found out that our technique showed 28% performance improvement in the case of including header files and 52% performance improvement in the case of excluding header files. 12 Future Work Our parser accepts LR (1) languages we would like to extend it to accept LR (k) languages. In our technique, the parser determines when to create a new parallel parser thread. If the responsibility of this decision can be given to the lexical analysis phase then the lexical analysis can actually start the parsers in parallel. This will lead to significant performance advantage. Moreover, our technique has been applied to languages which doesnt have indentation in their syntax like the way Python has. [24] shows an efficient way to parse the language which has indentation as a mean to determine blocks. Our parser can be extended to accept those languages also. We are working towards developing a Block Parallelized Compiler which could compile different blocks of a language in parallel. Block Parallelized Parser is one of the components of a Block Parallelized Compiler. Semantic Analysis phase also share the same properties as the Syntax Analysis phase. In Programming Languages, an entity like variable or type is declared before using it. So, in this case also a lot can be done to actually parallelize the semantic analysis phase. References 1. Neal M. Gafter and Thomas J. LeBlanc. Parallel Incremental Compilation. Department of Computer Science, University of Rochester: Ph. D. Thesis. 113 2. Gwen Clarke and David T. Barnard. 1996. An LR Substring Parser Applied in a Parallel Environment, Journal of Parallel and Distributed Computing. 3. G. V. Cormack. 1989. An LR Substring Parser for noncorrecting syntax error recovery, ACM SIGPLAN Notices 4. Alfred V. Aho, Monica S. Lam, Ravi Sethi and Jeffery D. Ullman. 2007. Compilers Principle Tools and Techniques Second Edition, Prentice Hall 5. Floyd, R. W. Bounded Context Synctactic Analysis. Comm. ACM 7, 21 February 1961 6. J. H. Williams, 1975. Bounded context parsable grammars. Information and Control 28, 314-334 7. R. M. Schell, 1979. Jr. Methods for constructing parallel compilers for use in a multiprocessor environment. Ph. D. thesis, Univ. of Illinois at Urbana-Champaign 8. J. Cohen and S. Kolodner. 1985. Estimating the speedup in parallel parsing, IEEE Trans. Software Engrg. SE-11 9. C. N. Fischer, 1975. On parsing context free languages in parallel environments. Ph. D. thesis, Cornell Univ. 10. M. D. Mickunas and R. M. Schell. 1978. Parallel Compilation in a multi-processor environment (extended abstract). J. Assoc. Comput 11. D. Ligett, G. McCluskey, and W. M. McKeeman, Parallel LR Parsing Tech. Rep., Wang Institute of Graduate Studies, July 1982 12. Edward D. Willink, Meta-Compilation for C++, University of Surrey, June 2001 13. Pierpaolo Degano, Stefano Mannucci and Bruno Mojana, Efficient Incremental LR Parsing for Syntax-Directed Editors, ACM Transactions on Programming Languages and Systems, Vol. 10, No. 3, July 1988, Pages 345-373. 14. Sanjay Khanna, Arif Ghafoor and Amrit Goel, A PARALLEL COMPILATION TECHNIQUE BASED ON GRAMMAR PARTITIONING, 1990 ACM 089791-3485/90/0002/0385 15. W. Daniel Hillis and Guy L. Steele, DATA PARALLEL ALGORITHMS, Communications of the ACM, 1986 16. Bison, http://www.gnu.org/software/bison 17. YACC, http://dinosaur.compilertools.net/yacc 18. Clang, http://clang.llvm.org 19. Mono, http//mono-project.com 20. El-Essouki, W. Huen, and M. Evans, Towards a Partitioning Compiler for Distributed Computing System, IEEE First International Conference on Distributed Computing Systems, October 1979. 21. Thomas J. Pennello and Frank DeRemer, A Forward Move Algorithm for LR Error Recovery, Fifth Annual ACM Symposium on Principles of Programming Language. 22. Jean-Philipe Bernardy and Koen Claessen, Efficient Divide-and-Conquer Parsing of Practical Context-Free Languages. 23. L. Valiant. General context-free recognition in less than cubic time. J. of Computer and System Sciences, 10(2):308-314, 1975. 24. Micheal D. Adams. Principled Parsing for Indentation-Sensitive Languages, ACM Symposium on Principles of Programming Languages 2013. January 23-25.
6cs.PL
arXiv:1412.6144v1 [cs.NE] 14 Dec 2014 The Computational Theory of Intelligence: Applications to Genetic Programming and Turing Machines Daniel Kovach December 22, 2014 Abstract In this paper, we continue the efforts of the Computational Theory of Intelligence (CTI) by extending concepts to include computational processes in terms of Genetic Algorithms (GA’s) and Turing Machines (TM’s). Active, Passive, and Hybrid Computational Intelligence processes are also introduced and discussed. We consider the ramifications of the assumptions of CTI with regard to the qualities of reproduction and virility. Applications to Biology, Computer Science and Cyber Security are also discussed. 1 Introduction In this work, we carry on the ideas proposed in [15, 16]. In [15], we posited some very basic assumptions as to what intelligence means as a mapping. Using our analysis, we formulated some axioms based on entropic analysis. In the paper that followed [16] we talked about how ideas or memes can aggregate together to form more complex constructs. Here, we extend the concept of intelligence as a computational process to computational processes themselves, in the classic Turing sense. The structure of this paper is as follows. In section 2, we provide deeper insights as to different types of computational intelligence, specifically in the light of executable code, section 3 the qualities of reproduction, virility, and nested programs, section 4 presents some experimental results, and sections 5 and 6 discuss applications. In the conclusion, we recapitulate and discuss future work. 2 Extending Concepts Consider the definition of computational intelligence from [15]. Given the two sets S and O, which represent input and output sets, respectively, we introduce the mapping 1 I : S → O, (1) where I essentially makes a prediction based on the input. The disparity between a prediction and reality can then be used to update I in such a way that it can climb the gradient of the learning function L so as to improve future performance. Although we touched upon the application of this framework to genetic algorithms [15], it will be insightful to revisit it in more detail. 2.1 Active, Passive, and Hybrid Computational Intelligence Let us clarify the terminology. By genetic algorithm (GA), we mean a collection or population Π = {πi } of potential solutions to a particular task, which evolves as time progresses according to some fitness function, F. The function F is synonymous with learning function L from our previous formulation. It evaluates the quality of Π as a solution to the task. Specifically, if our task or program P is a function of Π, then the fitness function F is nothing more than F = F(P (Π)). (2) Note that the population Π is not only our input set S but our output set O in the representation 1. Furthermore, the mapping I is nothing but a collection of mutation operations to update the Π at iteration t to iteration t + 1. That is I : Πt → Πt+1 . (3) Some common mutation operations of genetic algorithms are [8]: 1. Reproduction: selecting individuals within a population and copying them without alteration into the new population. 2. Crossover: produces new offspring from elements of two other parents. 3. Mutation: one of the central concepts of genetic algorithms. Mutation perturbs the population or its constituents in some way. This includes altering the elements of the population directly, or changing their placement in the population in some way such as swapping their indices. 4. Editing: a manner in which more complicated functionality can be reduced to simpler algebraic rules. 5. Adding/Deleting: the ability to add a new element to a population or remove an existing element from the population. 6. Encapsulating: the process of creating a new element which represents an aggregate of functionality from one or more other elements in the population. 2 Some consideration should be given to the statement It+1 = It + ∇Ft (4) from [15]. For this equation to make sense, not only must the algebraic operation ’+’ be meaningfully defined, but the gradient operator implies that F is differentiable. The gradient operation makes sense only if the domain of F is a Banach space . In this context, we cannot make such a claim. Thus equation 4 becomes It+1 = It + ∆F, (5) where ∆F = F(Πt ) − F(Πt−1 ). Observe that although the mathematical formulation is different, the intent still holds. The ’+’ operator communicates the number of permutations proportional to ∆F. Since the information is retained in the population, and only improved through evolutionary perturbations, we consider this an example of passive computational intelligence. This stands in contrast to active computational intelligence, where we are updating the mapping I itself. Any combination of the two methods can be considered a form of hybrid computational intelligence. 2.2 Genetic Algorithms Recall the entropic considerations from [15], where we specified that • Computational intelligence is a process that locally minimizes and globally maximizes entropy. Since the population Π is the output set, it is the entropy of the population that must be minimized by the intelligence process. Equivalently, we can say that as the amount of iterations becomes sufficiently large, the difference between Πt and Πt−1 becomes increasingly negligible. In other words, assuming the subtraction operation is meaningfully defined, we have lim Πt+1 − Πt = 0. t→∞ (6) This makes sense, for we expect that as time increases, the fitness of our solution reaches an optimum, so that eventually there is no need to update. In other words, our population becomes more consistent over time. Of course, the typical considerations regarding genetic algorithms such the necessity of avoiding local optima, the proper choice of a fitness function, the complexity of the algorithm itself, among others, still hold [8]. As for global entropy considerations, we must consider the role of the population in its realization under its program P . As mentioned before, the total entropy of a system can be written as: S= N X i=1 3 si (7) where {si } represent each respective source of entropy. In particular, under the considerations of this section, we have S = sΠ + sP , (8) where sΠ and sP represent the entropy due to the population itself and the entropy from the program P , respectively. To calculate the entropy, we used the Renyi entropy of order α, where α ≥ 0 and α 6= 1 defined as "N # X 1 α log P [xi ] . (9) Hα (X) = 1−α i=1 where P[xi ] is the probability associated with state xi ∈ X. 2.3 Turing Machines Let us consider the discussions of the previous sections in terms of code that is executable in the Turing sense. We will apply the formulations we have considered thus far and make improvements to refine the theory in this light. Recall that a Turing machine M is a hypothetical device that manipulates symbols on a tape, called a Turing tape, according to a set of rules. Despite its simplicity, the Turing machine analogy can be used to describe certain aspects of modern computers [21], and more [13]. The Turing tape has some important characteristics. The tape contents, called the alphabet, encode a given table of rules. Using these rules the machine manipulates the tape. It can write and read to and from the tape, change the configuration, or state Σ of the machine, and move the tape back and forth [11]. Typically, the instructions on the Turing tape consist of at least one instruction that tells the machine to begin computation, or a START instruction, and one to cease computation, called a STOP or HALT instruction [11]. Other instructions might include MOVE, COPY, etc, or even instructions that encode no operation at all. Such instructions are commonly called NOOP’s (NO OPeration). The total number of instructions depends on the situation and the application at hand, but for the purposes of this paper, we will consider only tape of finite length for which the instruction set is also finite and contains at least the START and STOP instructions. In fact, for our purposes, the minimum amount of opcodes a program needs to run, or to be executable, are the START and STOP instructions. Now, consider the set of all instructions available to a particular M . To be consistent with our notation thus far, we will denote this set as π e, where π e = {π0 = START, ..., πn = STOP} (10) From this set, a particular sequence of instructions Π can be formed. Although many synonymous terms abound for this sequence of instructions, including a code segment, executable, or tape, we will refer to it simply as the 4 code. We consider the execution or implementation Ψ to be the execution of the code on the Turing machine M , which produces could produce another code segment, and change the machine state. Expressed in notation: e ×Σ e→Π e × Σ. e Ψ:Π (11) e and Σ e represent the set of all code and machine states, respectively. where Π For the majority of this paper, it is the code that is of primary concern, and thus we can omit the machine state to simplify the notation when this context is understood: e →Π e Ψ:Π (12) Our fitness function F is a measure the efficaciousness of the implementation of our program by some predefined standard. Later, we will present some specific examples used in application. We are still free to think of the intelligence mapping I as a perturbation mapping as we did in section 2.1. The only difference is the physical interpretation of the term ’population’. This case concerns machine code instructions. As with genetic algorithms, perturbing code may advance or impede the fitness of the program. In fact, it may even destroy the ability to execute at all, if one either the START or STOP operations are removed. A final note should be made as to the entropic considerations of the Turing Machine. In this light, we must take into account all the workings of the machine and thus 8 becomes S = sΠ + sM (13) where sM is the entropy incurred by the Turing Machine, which includes its state Σ. 3 Reproduction, Viruses, and Nested Programs In this section, we will continue the above analysis, and discussed some qualities that emerge based on our assumption. 3.1 Formalisms of Code and Other Qualities We can apply set theoretic formalisms in the usual sense. For example, consider a code Π and an instruction, π ∈ π e. Then the notation π ∈ Π communicates the fact that π is an instruction in Π. Further, set theoretic operations follow e In the case of the union operation, we have naturally. Let Π1 , Π2 ∈ Π. Π1 ∪ Π2 = {Π1 , Π2 } (14) which is a set containing the two programs Π1 and Π2 . Similarly, with the intersection operation, we have 5 c ∈ Π1 ∩ Π2 ⇔ c ∈ Π1 ∧ c ∈ Π2 , (15) or the set of all contiguous code segments c = {π} that are contained by both Π1 and Π2 . Note that this code segment need not be executable. Also, if it is of particular utility in the program it may be degenerate in that it may appear multiple times throughout the code. For set inclusion, we say that Π1 ⊂ Π2 ⇔ π ∈ Π2 ∀π ∈ Π1 (16) Proper containment evolves naturally if Π1 = Π2 . 3.2 Metrics and Neighborhoods The differences between code and real numbers or sets in conventional mathematics make it at first difficult to form a distance metric d on them. Still, some have been explored such as the Levenshtein distance [9], Damerau-Levenshtein distance [2], Hamming distance [10], and the Jaro-Winkler distance [12]. Given a metric d, we can form an open ball [7], or neighborhood B centered at some code Π0 consisting of all programs Π such that for some real number ,d(Π0 , Π) < . In other words B(Π0 , ) = {Π : d(Π0 , Π) < }. (17) We can utilize the developments above to relax the definition of set inclusion with respect to the metric, d. Specifically, define  Π1 ⊂ Π2 ⇔ d(Π1 , Π) < , Π ⊂ Π2 Of course, similar considerations can be extended to proper containment. Such code segments that lie suitably close to each other with respect to d will be referred to as polymorphic with respect to d. 3.3 Reproduction Consider the mapping Ψi (Π) = Π0 (18) where Π0 is in the neighborhood of Π. Of particular interest is when Π0 not only lies within the neighborhood of Π but produces a machine state Σ0 suitably close to that of Π, as valued by some meaningful metric. We note in particular the condition when Π0 also encodes for reproduction. Unless in the presence of polymorphic programs [20], we will assume the code copies itself exactly, and replace Π0 with Π in notation. Sequential program execution will yield the same result Ψt = Ψ(Ψt−1 ), Ψ0 = Ψ(Π) 6 (19) where Ψi (Π) = Π, ∀i. (20) Suppose that a particular tape is able to produce, say N copies of itself. Then the entropy of the system is simply S = sM + N X sΠi , (21) i=0 where s0 refers to the original copy of the tape. By comparison with equation 13, the entropy is proportional to the number of progeny in addition to the machine state. 3.4 Viruses Thus far, we have been considering only predefined programs. But a well known concept from nature concerns when external code is injected into a host program, or otherwise hijacks the computational resources of the system. One key characteristic of viruses is their ability to proliferate. Consider ν such that ν ∈ Ψ(Π), ν ⊆ Π (22) If the viral code, ν is executable, we will call the virus ν-executable. If the viral code also can reproduce, that is ν ∈ Ψ(ν), we will call this quality νreproductive. Finally, it is often the case that viral code is not reproductive or executable. Its task is to merely copy or install some payload [18], here denoted by ρ. In this case, ρ ∈ Ψ(Π), ρ ⊆ ν ⊆ Π (23) Viral code most often is pernicious, though this is not necessarily the case. For example, up to 8% of the human genome derives from retroviruses [3]. To determine the nature of the effect of the virus, we look at the change in fitness before and after its influence. The influence T of viral code on T program fitness falls into three categories. Consider Π, ν Π = ∅, and Π0 , ν Π0 = ν, Π = Π0 − ν. In other words, Π0 code in the presence of a virus, from the otherwise pristine Π. The three cases are F(Π0 ) − F(Π) > 0, F(Π0 ) − F(Π) = 0, and F(Π0 ) − F(Π) < 0. These cases are of enough significance that they deserve their own nomenclature. We will refer to these cases as commensalistic, symbiotic, and parasitic, respectively, out of consistency with their counterparts from biological sciences. 3.5 Nested Programs One final case to be considered is when a program or multiple programs can contribute to produce aggregate programs of greater complexity. In such a case, the program, when executed, would not only alter machine state and produce 7 code as in 11 but will also contain a product code segment, and product code machine state, e ×Σ e→Π e ×Σ e ×Π e1 × Σ e1 Ψ:Π (24) Introduce the program e1 × Σ e1 → Π e1 × Σ e1 Ψ1 = Π (25) Of course, we could nest this process and define e1 × Σ e1 → Π e1 × Σ e1 × Π e2 × Σ e 2, Ψ1 = Π (26) with Ψ from 24 denoted as Ψ0 , we could write en × Σ en Ψn [Ψn−1 [...Ψ0 [Π0 × Σ0 ]...]] → Π (27) where the superscript indicates the level of nesting of the program. Just as we discussed programs producing multiple progeny, we can also let them produce multiple product code. We will denote each copy with a subscript im = {0, 1, ..., Im }. Thus the above becomes 0 0 0 en en Ψn [Ψn−1 in−1 [...Ψi0 [Πi0 × Σi0 ]...]] → Πin × Σin . (28) To determine the total entropy, simply sum over all product code. S = sM + Ik X n X e kj × Σ e kj Π (29) j=0 k=0 This time we see that the entropy of the code varies exponentially with product and copy code. 4 Experimentation Consider the following scenario. We have a set of instructions, and a construct for a tape that encodes them. In the following experiments, the code is created randomly. We apply a GA to the code to acheive interesting results. The code involved had no write back capabilities, and thus the experiment was purely passive. 4.1 Genetics and Codons A major focus for future work is the application of this research to computational molecular biology. Hence, we chose to implement the instruction set that nature has chosen for genetics in the following experiments. For the base instruction alphabet, we will choose that of RNA [19]. This instruction set is composed of the ’bits’ Adenine (A), Uracil (U), Guanine (G), 8 and Thymine (T). Each instruction can be represented as three of these quaternary bits, for a total of 64 possible outcomes. We have chosen this quaternary codon formulation to be the basis of our tape. In both experiments, the choice of operational codes, or opcodes, are taken directly from these 64 quaternary bit codons. The choice to represent a opcode by a particular codon is completely arbitrary. All codons appear with the same probability in experiment, with the exception of the STOP opcode, as we will see in section 4.2. We present two instructions sets, and two different experiments. In the first experiment, we determine how many iterations our genetic algorithm takes to produce code that is executable, and code that reproduces itself. In the second experiment, we compare the amount of reproductions of code with the total entropy incurred by the simulation. 4.2 First Instruction Set For the first experiment we constructed a robust instruction set consisting of the following: 1. START (AAA): Commences program execution. 2. STOP (AUA, ATC, ATG): Halts program execution. Observe that there are three STOP codons, but only one START codon. This mirrors the amount of codons in RNA and DNA observed in nature [4]. 3. BUILD FR (CUC): Copies to product code starting from the next respective instruction to that which comes before the BUILD TO (GCG) instruction. 4. COND (UUC, UUA, GAA): Sets an internal variable in the Turing machine state called a flag. A flag can be thought of as an internal Boolean variable. Every time one of the COND opcodes is encountered the sign of the flag is switched, that is COND = ¬COND. 5. IF (AAU): Only executes the following instruction if the COND flag has been set. 6. COPY ALL (AAG): Copies the entire tape to progeny. 7. COPY FR (CCC): Copies to progeny code starting from the next respective instruction to that which comes before the COPY TO (GGG) instruction. 8. JUMP FAR FR, (CUU) and JUMP NEAR FR, (AGA): both require a JUMP TO, (CAC, GUG) instruction. The JUMP family of instructions is designed to continue program execution at the index of the JUMP TO instruction. The former will find the JUMP TO address that is farthest away, while the JUMP NEAR finds the closest JUMP TO instructions. If there is no multiplicity in the JUMP TO instruction, then JUMP FAR FR, (CUU) and JUMP NEAR FR will produce the same result. 9 9. REM FR, (GCU) and REM TO, (UAA): Removes all code in between these instructions. 4.3 Second Instruction Set Although the code of the previous section was robust, it was redundant. For example, the functionality of the code to copy itself to progeny should be a desireable trait of the code itself, not just an opcode that accomplishes the task in one step. Further, the remove operations can be handled via mutation operations (albeit far less efficiently) in the genetic algorithm itself. Note that in Experiment 1, most operations have a partner or conjugate opcode. The necessity of conjugate pairs of instructions follows from the fact that two pieces of information are required to complete the instruction, as shown below: [ i n s t r u c t i o n ] . . . < code > . . . [ i n s t r u c t i o n d u a l ] We will call such instructions dual. The necessity for a predefined conjugate opcode can be mitigated by using the concept of addressing. Instead of conjugate opcodes, the instruction immediately following the dual can be thought of as an argument. The machine uses this address (unless the address is represents opcode) as a manner of locating the conjugate to the dual and thus reducing the instruction set. Specifically: [ i n s t r u c t i o n ] [ a d d r e s s ] . . . < code > . . . [ a d d r e s s ] Under these considerations (and omitting the ability to build to a product), we have need for only six instructions: START, STOP, IF, COND, COPY, and JUMP. The first four instructions are exactly the same as in Experiment 1. The COPY instruction concatenates section of the tape to progeny, and the JUMP instruction continues program execution at a specified address. These final two are conjugates, the duals of which are handled via the addressing method entailed above. Notice although the lexicon is different, they have the same functionality as their respective counterparts in the first instruction set. 4.4 Experiment 1: Execution and Reproduction The goal of the first instruction set was to produce code that was executable, and code that could reproduce. The code was perturbed by a GA randomly. That is, no fitness function was used in the perturbation of the code strings. Each epoch of the simulation terminated once an executable or reproducable code was discovered. For each experiment, a maximum of 1,000,000 computational iterations were allowed. The results of the first experiment using the first instruction set are shown in table 1. The results of the first experiment using the second instruction set are summarized in table 2. Observe that the number iterations in the first instruction set was much less than that of the second, which is likely due to the disparity in robustness between the two. Also note how wildly the results vary 10 Table 1: Results: Experiment 1, Instruction Set 1 Experiment Executable Code Reproductive Code Average 184.083 330.964 Std. Dev 126.202 243.924 Experiments 100,000 96,964 Table 2: Results: Experiment 1, Instruction Set 2 Experiment Executable Code Reproductive Code Average 283.387 2003.24 Std. Dev 210.359 96504.8 Experiments 1,000,000 1,000,000 especially in terms of the reproductive capabilities of the second instruction set as demonstrated by the large standard deviation in results. 4.5 Experiment 2: Reproduction and Entropy Upon answering the basic questions like the amount of computational iterations necessary to produce executable and reproductive code, the next experiment focused on the total entropy incurred by a given code segment and its offspring. Here, recall that we are considering the entropy produced by not only a given tape, but its progeny as well. We will continue with the alphabets of Experiment 1 and 2, respectively. We bounded the total computational iterations per experimental run at 1,000,000. The maximum progeny allowed was 50. Mutations were applied by the GA according to a fitness function which evaluated the quality of the code with respect to its Renyi Entropy (of order α = 2). The results are summarized in table 3. Observe that the entropy and the amount of reproductions appear to be correlated as demonstrated by the r-values in table 3 and in the correlation maps in Figure 1. Note that some programs appear to have acheived reproductive qualities without substantially increasing entropy but the converse is not true. Although the actual data summarized in table 3 was one of the primary goals of this experiment, the operational characteristics of the code itself were also of interest. The graphics in figure 2 represent some interesting code behaviors. In the graphs below, each opcode was represented by a number in the following manner: START = 0, COPY = 1, JUMP = 2, IF = 3, COND = 4, STOP = 5. With these numeric values we can visualize program behavior graphically. Although a myriad of behaviors were observed, in Figure 1 we have selected some graphs of the different behaviors. Of specific interest were the non-terminating programs. Each of these selections also exhibited reproductive capabilities. Observe that although towards the beginning of program execution, a variety of instructions were executed, eventually the programs under consideration converged to some sort of periodic behavior, a tendency we will call asymptotic periodicity. 11 Table 3: Results: Reproduction vs. Entropy Total Simulations Average in Reproductions Std. Dev. in Reproductions Average in Entropy Std. Dev. in Entropy r-value (a) Reproduction vs. Entropy (Alphabet 1) Alphabet 1 1,025,043 17.1433 23.7111 12.4556 18.5525 0.870675 Alphabet 2 577,876 39.3921 20.1516 34.8463 17.6445 0.983243 (b) Reproduction vs. Entropy (Alphabet 2) Figure 1: Graphs of reproductive iterations plotted against the total entropy of the simulation, for the first and second instruction sets, respectively. The graphs selected not only demonstrated asymptotic periodicity but reproduced continuously in the sense that the progeny produced reached the maximum allowable threshold. 5 Applications to Biology Readers familiar with genetics will notice a strong correlation between our computational formulations and genetics. In fact, genetics has been an inspiration for this research, specifically with regard to passive and hybrid forms of CTI. Recent research has been devoted to the crossover between genetics and computer science. In fact, it has been demonstrated in [13] that DNA computing is Turing complete. This has grand implications for the very nature of the definition of life itself. The definition of life has always been somewhat controversial. In [1], life is defined as a characteristic that distinguishes objects with self sustaining processes from those that do not. From the vantage point of Biology, life is defined as a characteristic of organisms that exhibit all or most of the following characteristics: homeostasis, organization, metabolism, growth, adaptation, response 12 (a) Program Behavior from Sample 457 (b) Program Behavior from Sample 506 (c) Program Behavior from Sample 1156 (d) Program Behavior from Sample 1519 Figure 2: Four examples of asymptotically periodic code behaviors taken from samples of code that reproduced continuously in experiment 2. 13 to stimuli, and reproduction [14]. Many sources stress the chemical nature of life, and mandate that living things contain Carbon, Hydrogen, Nitrogen, Oxygen, Phosphorous and Sulfur [17]. In this paper, we introduce a definition for life as a self sustaining passive or hybrid CTI process. Embedded in this definition are well known assumptions regarding qualities one commonly associates with living things. It is known that the purpose of life is to survive, a fact that is redundant in the light of CTI. The fact that life is fitness maximizing, and increases entropy follows directly from the framework of CTI as well. Homeostasis follows naturally from the entropy minimizing portion of the fundamental axiom of CTI. If an organism is in homeostasis, this implies that the internal state space is ordered and transitions can be predicted with high probability which implies a lower entropy. Further, note the similarities with asymptotic periodicity from the samples shown in 2. Of course, no discussion about life would be complete without mentioning reproduction, which we showed in this paper follows as a natural consequence of CTI. As far as we know, Earth is the only planet in the universe known to sustain life. However, recent advances in planetary sciences have discovered the possibility of habitable zones in other solar systems. This coupled with the observed robustness of life on Earth in extreme environments, has raised interest the application of biological concepts to the search for life beyond the confines of Earth. The vastness of these environments forces us to rethink and generalize what we know as life itself. One fantastic example of such an esoteric formulation of life is the discovery of arsenic based life right here on Earth. In December of 2010, NASA unveiled a discovery of a bacterium that integrated Arsenic into its cellular structure and even its DNA. They found that the bacterium was able to substitude arsenic for phosphorous, one of the six essential ingredients of life. This challenges conventional notions of life and seems to encourage a more general definition. In this paper, we advocate a computational approach to the definition of life over a chemical one. 6 Applications to Computer Science and Cyber Security Applications to cyber security abound as well. In the past, computer viruses typically served little more than the entertainment of the author. Now, malicious softaware, or malware, is a commoditized industry. Patrons will hire teams of programmers to create specialized malware for end goals such as espionage, ransome, or identity theft. As such, mitigating these threats has become a priority in most industries and even an interest in national security. For example, the US Defense Advanced Research Projects Agency (DARPA) has issued a ’Cyber Grand Challenge’ offering up to $2 million for designs of a fully automated software defense system, capable of mitigating software exploitation in real time [5]. This is just one example of increased efforts in this area. In fact, 14 the US president is proposing to increase the cyber defense budget to $14 billion in 2014, more than a billion dollar increase from that of the previous year [6]. How might this research be of merit in this field? Currently, most antimalware software (AM) stores hashes of actual malware samples against which to compare new potential threats. This has multiple disadvantages in that it ties users to a provider which may be an issue if internet connectivity is a problem. Frequently such hashes fail with polymorphic code. Recently, much research has been conducted looking at a behavioral approach to malware classification. While this is an exciting area of resarch, approaches of this nature are typically burdened with false positives rendering the solutions impractical. This reserach offers the potential to view executable code in a new light offering insights into two key areas of interests: the nature of viruses, and the executable code itself, offering a new paradigm to the software industry. Software serves a purpose. It has solid attainable goals to suit the end user. Concurrently, it must function within a specified range of parameters to preserve privacy, security, and even safety. The effectiveness of a program under these guidelines can be viewed as its fitness. Regardless of whether we are analysing virus behavior or developing code that optimizes its fitness, we need a reliable indicator as to its behavior. One of the first successful defenses of malware was to attack the very functions the AM product would call to detect it! This is akin to asking the burgler if he is in your house. Thus behavior detecting components must function at a ’lower’ level than those to which the malware may have access. Insuring this can be quite challenging. Nevertheless, if such a framework were in place, the advantages have enormous potential. In terms of viruses and payload detection, we could apply analysis from section 3.4. Equivalently, we could monitor program performance to scan for points of inadequacy. Moreover, in the event of a breach or infection, we could employ the methods of CTI as a means by which the code could heal itself. Again, this necessitates a proper fitness function to evaluate the ’health status’ of the executable, and trusted behavioral data from the system. Of course, there is a wide rift between the musings of theory and the result of implementation, but this framework seems to provide a promising direction for future efforts in this arena. 7 Conclusion To recapitulate, in this paper, we extended the CTI framework presented in [15, 16] to include genetic algorithms and Turing machines. We defined classes of CTI including active, passive and hybrid. Finally, we demonstrated that reproduction emerges as a consequence of the axioms of CTI, both theoretically, and experimentally. The concepts we presented have great potential for development in future work. As far as the theoretical concepts of this paper are concerned, we have 15 a lot to do in terms of exploring the potential of passive, active, and hybrid processes. It remains the stance of this paper that hybrid CTI processes are present optimal solutions but this remains to be shown. We would also like to further explore simulation and programming using reproductive nested code. Further, we would like to repeat the experiments of section 4 with different instruction sets, and observe not only the behaviors, but the phenotypes of the solutions in general, to observe overarching patterns among diverse coding alphabets that acheive the same result. In terms of multidisciplinary studies we have only scratched the surface of the relationship between these concepts and computational molecular biology, computer science, and cyber security. Further, there is much to do in the way of advancing the theoretical framework of CTI itself. In the next paper, we will visit the ramifications of adding feedback into the intelligence process. Another paper will focus on the global properties of intelligent agent. References [1] The American Heritage Dictionary. New York: Dell, 2012. Print. [2] Bard, Gregory V. ”Spelling-error Tolerant, Order-independent Passphrases via the Damerau-Levenshtein String-edit Distance Metric” Proc. of Proceedings of the Fifth Australasian Symposium on ACSW Frontiers. Vol. 69. N.p.: n.p., n.d. 117-24. Print. [3] Belshaw, R. ”Long-term Reinfection of the Human Genome by Endogenous Retroviruses.” Proceedings of the National Academy of Sciences 101.14 (2004): 4894-899. Print. [4] Brenner, S., A. O. W. Stretton, and S. Kaplan. ”Genetic Code: The ‘Nonsense’ Triplets for Chain Termination and Their Suppression.” Nature 206.4988 (1965): 994-98. Print. [5] ”Cyber Grand Challenge (CGC).” DARPA RSS. N.p., n.d. Web. 13 Dec. 2013. [6] ”Defense News & Career Advice ClearanceJobs Defense News & Career Advice.” Defense News. N.p., n.d. Web. 13 Dec. 2013. [7] Dshalalow, Jewgeni H. Foundations of Real Analysis. [S.l.]: Chapman & Hall (Us), n.d. Print. [8] Floreano, Dario, and Claudio Mattiussi. Bio-inspired Artificial Intelligence: Theories, Methods, and Technologies. Cambridge, MA: MIT, 2008. Print. [9] Gusfield, Dan. Algorithms on Strings, Trees, and Sequences: Computer Science and Computational Biology. Cambridge [England: Cambridge UP, 1997. Print. 16 [10] Hamming, Richard W. ”Error Detecting and Error Correcting Codes.” Bell System Technical Journal 29.2 (n.d.): 147-60. Print. [11] Hopcroft, John E., and Jeffrey D. Ullman. Introduction to Automata Theory, Languages, and Computation. Reading, MA: Addison-Wesley, 1979. Print. [12] Jaro, Matthew A. ”Probabilistic Linkage of Large Public Health Data Files.” Statistics in Medicine 14.5-7 (1995): 491-98. Print. [13] Jonoska, Nataša, and Nadrian C. Seeman. DNA Computing :. Berlin: Springer, 2002. Print. [14] Koshland, Daniel E., Jr. ”The Seven Pillars of Life.” Science 295.5563 (2009): 2215-216. Print. [15] Kovach, Daniel J., Jr. The Computational Theory of Intelligence: Information Entropy. Proc. of Internation Conference of Nonlinear Analysis and Applied Mathematics 2013, Greece, Rodos. N.p.: n.p., n.d. Print. [16] Kovach, Daniel J., Jr. The Computational Theory of Intelligence: Data Aggreagation. Proc. of Internation Conference of Nonlinear Analysis and Applied Mathematics 2013, Greece, Rodos. N.p.: n.p., n.d. Print. [17] Neuhauss, Scott. Handbook for the Deep Ecologist. N.p.: IUniverse, 2005. Print. [18] ”Payload Definition from PC Magazine Encyclopedia.” Payload Definition from PC Magazine Encyclopedia. N.p., n.d. Web. 13 Dec. 2013. [19] Snustad, D. Peter., and Michael J. Simmons. Principles of Genetics. Hoboken, NJ: Wiley, 2012. Print. [20] Srinivasan, Raghunathan. Protecting Anti-virus Software under Viral Attacks. Thesis. Arizona State University, 2007. N.p.: n.p., n.d. Print. [21] Strathern, Paul. Turing and the Computer. New York: Anchor, 1999. Print. 17
9cs.NE
The boundary of the outer space of a free product Camille Horbez arXiv:1408.0543v3 [math.GR] 24 Apr 2016 Abstract Let G be a countable group that splits as a free product of groups of the form G = G1 ∗ · · · ∗ Gk ∗ FN , where FN is a finitely generated free group. We identify the closure of the outer space PO(G, {G1 , . . . , Gk }) for the axes topology with the space of projective minimal, very small (G, {G1 , . . . , Gk })-trees, i.e. trees whose arc stabilizers are either trivial, or cyclic, closed under taking roots, and not conjugate into any of the Gi ’s, and whose tripod stabilizers are trivial. Its topological dimension is equal to 3N + 2k − 4, and the boundary has dimension 3N + 2k − 5. We also prove that any very small (G, {G1 , . . . , Gk })-tree has at most 2N + 2k − 2 orbits of branch points. Introduction Let G be a countable group that splits as a free product G = G1 ∗ · · · ∗ Gk ∗ FN , where FN denotes a finitely generated free group of rank N . We assume that N + k ≥ 2. A natural group of automorphisms associated to such a splitting is the group Out(G, {G1 , . . . , Gk }) consisting of those outer automorphisms of G that preserve the conjugacy classes of each of the groups Gi . The study of the group Out(FN ) of outer automorphisms of a finitely generated free group has greatly benefited from the study of its action on Culler and Vogtmann’s outer space [4], as well as some hyperbolic complexes. The present paper is a starting point of a work in which we extend results about the geometry of these Out(FN )-spaces to analogues for free products, with a view to establishing a Tits alternative for the group of outer automorphisms of a free product [14]. The second main step towards this will be to define hyperbolic complexes equipped with Out(G, {G1 , . . . , Gk })-actions, and give a description of the Gromov boundary of the graph of cyclic splittings of G relative to the Gi ’s [13]. The group Out(G, {G1 , . . . , Gk }) acts on a space PO(G, {G1 , . . . , Gk }) called outer space. This was introduced by Guirardel and Levitt in [12], who generalized Culler and Vogtmann’s construction [4] of an outer space CVN associated to a finitely generated free group of rank N , with a view to proving finiteness properties of the group Out(G, {G1 , . . . , Gk }). The outer space PO(G, {G1 , . . . , Gk }) is defined as the space of all G-equivariant homothety classes of minimal Grushko (G, {G1 , . . . , Gk })-trees, i.e. metric 1 simplicial G-trees in which nontrivial point stabilizers coincide with the conjugates of the Gi ’s, and edge stabilizers are trivial. Outer space can be embedded into the projective space PRG by mapping any tree in PO(G, {G1 , . . . , Gk }) to the collection of all translation lengths of elements in G. The goal of the present paper is to describe the closure of the image of this embedding. The closure of Culler and Vogtmann’s classical outer space has been identified by Bestvina and Feighn [1] and Cohen and Lustig [2], with the space of projective length functions of minimal, very small actions of FN on R-trees. An FN -tree is very small if arc stabilizers are cyclic (possibly trivial) and closed under taking roots, and tripod stabilizers are trivial. More precisely, Cohen and Lustig have first proved [2, Theorem I] that CVN is contained in the space of projective length functions of very small FN -actions on Rtrees. In addition, they have shown that every simplicial, very small FN -tree is a limit of free and simplicial actions [2, Theorem II]. Bestvina and Feighn have shown that this remains true of every very small (possibly nonsimplicial) FN -action on an R-tree. However, their proof does not seem to handle the case of geometric actions that are dual to foliated band complexes, one of whose minimal components is a measured foliation on a nonorientable surface, and in which some arc stabilizer is nontrivial. Indeed, in this case, it is not clear how to approximate the foliation by rational ones without creating any one-sided compact leaf, and one-sided compact leaves are an obstruction for the dual action to be very small (arc stabilizers are not closed under taking roots). Building on Cohen and Lustig’s and Bestvina and Feighn’s arguments, and using approximation techniques due to Levitt and Paulin [19] and Guirardel [9], we reprove the fact that CVN identifies with the space of minimal, very small projective FN -trees. Our proof tackles both cases of simplicial and nonsimplicial trees at the same time (it gives a new interpretation of Cohen and Lustig’s argument in the simplicial case). We work in the more general framework of free products of groups. A (G, {G1 , . . . , Gk })-tree is an Rtree, equipped with a G-action, in which all Gi ’s fix a point. A (G, {G1 , . . . , Gk })-tree will be termed very small if arc stabilizers are either trivial, or cyclic, closed under taking roots, and not conjugate into any of the Gi ’s, and tripod stabilizers are trivial. We prove the following theorem. Theorem 1. The closure PO(G, {G1 , . . . , Gk }) in PRG is compact, and it is the space of projective length functions of minimal, very small (G, {G1 , . . . , Gk })-trees. When T is a (G, {G1 , . . . , Gk })-tree with trivial arc stabilizers, we can be a bit more precise about the approximations we get, and show that T is an unprojectivized limit of Grushko (G, {G1 , . . . , Gk })-trees Tn , that come with G-equivariant 1-Lipschitz maps from Tn to T , see Theorem 5.3. We then compute the topological dimension of the closure and the boundary of the outer space of a free product of groups. In the case of free groups, Bestvina and Feighn have shown in [1] that CVN has dimension 3N −4, their result was extended by Gaboriau and Levitt who proved in addition that ∂CVN has dimension 3N − 5 in [6]. Following Gaboriau and Levitt’s arguments, we show the following. Theorem 2. The space PO(G, {G1 , . . . , Gk }) has topological dimension 3N + 2k − 4, and ∂PO(G, {G1 , . . . , Gk }) has dimension 3N + 2k − 5. Along the proof, we provide a bound on the number of orbits of branch points and centers of inversion in a very small (G, {G1 , . . . , Gk })-tree, and on the possible Kurosh ranks of point stabilizers. 2 We also introduce the slightly larger class of tame (G, {G1 , . . . , Gk })-trees, defined as those trees whose arc stabilizers are either trivial, or cyclic and non-conjugate into any Gi , and with a finite number of orbits of directions at branch points and inversion points. We study some properties of this class, and provide some conditions under which a limit of tame (G, F)-trees is tame. This class will turn out to be the right class of trees for carrying out our arguments to describe the Gromov boundary of the graph of cyclic splittings of G relative to the Gi ’s in [13]. The paper is organized as follows. In Section 1, we review basic facts about free products of groups, and the associated outer spaces. We prove in Section 2 that the space V SL(G, {G1 , . . . , Gk }) of projective, minimal, very small (G, {G1 , . . . , Gk })-trees is compact. In Section 3, we introduce a notion of geometric (G, {G1 , . . . , Gk })-trees, and explain in particular how to approximate every very small (G, {G1 , . . . , Gk })-tree by a sequence of geometric (G, {G1 , . . . , Gk })-trees. We then compute the topological dimension of V SL(G, {G1 , . . . , Gk }) in Section 4, and we then identify it with the closure of outer space in Section 5. We finally introduce the class of tame (G, {G1 , . . . , Gk })-trees, and discuss some of its properties, in Section 6. Acknowledgments I warmly thank my advisor Vincent Guirardel for his help, his rigour and his patience in reading through first drafts of this work. I am also highly grateful to the referee for their very careful reading of the paper and their numerous and valuable remarks and suggestions. These suggestions led in particular to significant clarifications in the approach to the notion of geometric trees. Finally, I acknowledge support from ANR11-BS01-013 and from the Lebesgue Center of Mathematics. Contents 1 Background 3 2 Closedness of the space of projective very small (G, F)-trees 7 3 Geometric (G, F)-trees 9 4 Dimension of the space of very small (G, F)-trees 14 5 Very small actions are in the closure of outer space. 25 6 Tame (G, F)-trees 36 1 1.1 Background Free products of groups and free factors Let G be a countable group which splits as a free product of groups of the form G = G1 ∗ · · · ∗ Gk ∗ F, 3 gN G1 Gk g1 Figure 1: A standard (G, F)-free splitting. where F is a finitely generated free group. We let F := {[G1 ], . . . , [Gk ]} be the finite collection of the G-conjugacy classes of the Gi ’s, which we call a free factor system of G. The rank of the free group F arising in such a splitting only depends on F. We call it the free rank of (G, F) and denote it by rkf (G, F). The Kurosh rank of (G, F) is defined as rkK (G, F) := rkf (G, F) + |F|. Subgroups of G that are conjugate into one of the subgroups in F will be called peripheral. A splitting of G is a simplicial tree S, equipped with a minimal and simplicial action of G (here minimality of the action means that S contains no proper nonempty Ginvariant subtree). We say that a subgroup H ⊆ G is elliptic in S if there exists a point in S that is fixed by all elements of H. A (G, F)-free splitting is a splitting of G in which all subgroups in F are elliptic, and all edge stabilizers are trivial. A (G, F)-free factor is a subgroup of G which is a vertex stabilizer in some (G, F)-free splitting. Subgroups of free products have been studied by Kurosh in [17]. Let H be a subgroup of G. Let T be the Bass–Serre tree of the graph of groups decomposition of G represented in Figure 1, which we call a standard (G, F)-free splitting. By considering the H-minimal subtree in T , we get the existence of a (possibly infinite) set J, together with an integer ij ∈ {1, . . . , k}, a nontrivial subgroup Hj ⊆ Gij and an element gj ∈ G for each j ∈ J, and a (not necessarily finitely generated) free subgroup F ′ ⊆ G, so that H = ∗j∈J gj Hj gj−1 ∗ F ′ . This decomposition is called a Kurosh decomposition of H. The Kurosh rank of H (which can be infinite in general) is defined as rkK (H) := rk(F ′ ) + |J|, it does not depend on a Kurosh decomposition of H. We let F|H be the set of all H-conjugacy classes of the subgroups gj Hj gj−1 , for j ∈ J, which does not depend on a Kurosh decomposition of H either. When H is a (G, F)-free factor, we have Hj = Gij for all j ∈ J, and all integers ij are distinct (in particular J is finite). In this case, the free group F ′ is finitely generated. Hence the Kurosh rank of H is finite. 1.2 Outer space and its closure An R-tree is a metric space (T, dT ) in which any two points x, y ∈ T are joined by a unique embedded topological arc, which is isometric to a segment of length dT (x, y). 4 Let G be a countable group, and let F be a free factor system of G. In the present paper, a (G, F)-tree is an R-tree T equipped with an isometric action of G, in which every peripheral subgroup fixes a unique point. A Grushko (G, F)-tree is a minimal, simplicial metric (G, F)-tree with trivial edge stabilizers, whose collection of point stabilizers coincides with the conjugates of the subgroups in F. Two (G, F)-trees are equivalent if there exists a G-equivariant isometry between them. The unprojectivized outer space O(G, F) is defined to be the space of all equivalence classes of Grushko (G, F)-trees. Outer space PO(G, F) is defined as the space of homothety classes of trees in O(G, F). We note that in the case where F = {G}, outer space is reduced to a single point, corresponding to the trivial action of G on a point. For all (G, F)-trees T and all g ∈ G, the translation length of g in T is defined to be ||g||T := inf dT (x, gx). x∈T Theorem 1.1. (Culler–Morgan [3]) The map i : O(G, F) → RG T 7→ (||g||T )g∈G is injective. We equip O(G, F) with the topology induced by this embedding, which is called the axes topology, and we denote by O(G, F) the closure of the image of this embedding. Culler and Morgan have shown in [3, Theorem 4.5] that if G is finitely generated, then the subspace of PRG made of projective classes of translation length functions of minimal G-trees is compact. This can fail to be true in general if G is not finitely generated. For example, if G = A ∗ B with A not finitely generated, and if (Ai )i∈N is an increasing sequence of finitely generated subgroups of A whose union equals A, then the projective translation length functions of the Bass–Serre trees of the splittings G = A ∗Ai (B ∗ Ai ) do not admit any converging subsequence in PRG . However, the key point in Culler– Morgan’s argument [3, Proposition 4.1] still holds in our context, in the form the following proposition. Proposition 1.2. Let R be a standard Grushko (G, F)-tree, in which all edges are assigned length 1. Then there exists a finite set Y ⊆ G such that for all g ∈ G and all trees T ∈ O(G, F), we have ||g||T ≤ M ||g||R , where M := maxh∈Y ||h||T . Proof. The existence of a finite set Y ⊆ G that works for all trees T ∈ O(G, F) is established in [13, Theorem 4.7]. Proposition 1.2 then follows by taking limits. Arguing as in Culler–Morgan’s proof of [3, Theorem 4.2], we then obtain the following result. Proposition 1.3. The closure O(G, F) is projectively compact. The goal of the present paper is to identify the closure O(G, F) with the space of very small (G, F)-trees, which are defined in the following way. Definition 1.4. A (G, F)-tree T is small if arc stabilizers in T are either trivial, or cyclic (and non-peripheral). A (G, F)-tree T is very small if it is small, and in addition nontrivial arc stabilizers in T are closed under taking roots, and tripod stabilizers in T are trivial. We note that the trivial action of G on a point is very small in the above sense. We denote by V SL(G, F) the subspace of PRG made of projective classes of minimal, nontrivial, very small (G, F)-trees, which we equip with the axes topology. 5 1.3 The equivariant Gromov–Hausdorff topology The equivariant Gromov–Hausdorff topology on the space of (G, F)-trees. The space O(G, F) can also be equipped with the equivariant Gromov–Hausdorff topology [21], which is equivalent to the axes topology [22]. We now recall the definition of the equivariant Gromov–Hausdorff topology on the space of (G, F)-trees. Let T and T ′ be two (G, F)-trees, let K ⊂ T and K ′ ⊂ T ′ be finite subsets, let P ⊂ G be a finite subset of G, and let ǫ > 0. A P -equivariant ǫ-relation between K and K ′ is a subset R ⊆ K × K ′ whose projection to each factor is surjective, such that for all (x, x′ ), (y, y ′ ) ∈ R and all g, h ∈ P , we have |dT (gx, hy)−dT ′ (gx′ , hy ′ )| < ǫ. A basis of open sets for the equivariant Gromov–Hausdorff topology is given by the sets O(T, K, P, ǫ) of all (G, F)-trees T ′ for which there exist a finite subset K ′ ⊂ T ′ and a P -equivariant ǫ-relation R ⊆ K × K ′ [21]. The equivariant Gromov–Hausdorff topology on the space of pointed (G, F)trees. The equivariant Gromov–Hausdorff topology can also be defined on the space of pointed (G, F)-trees. Let T be a (G, F)-tree, and let (x1 , . . . , xl ) ∈ T l . Let K ⊂ T and P ⊂ G be finite subsets, and let ǫ > 0. A basis of open sets for the equivariant Gromov– Hausdorff topology is given by the sets O ′ ((T, (x1 , . . . , xl )), K, P, ǫ) of all pointed (G, F)trees (T ′ , (x′1 , . . . , x′l )) for which there exist a finite subset K ′ ⊂ T ′ and a P -equivariant ǫrelation R ⊆ (K ∪{x1 , . . . , xl })×(K ′ ∪{x′1 , . . . , x′l }) with (xi , x′i ) ∈ R for all i ∈ {1, . . . , l}. Let T be a (G, F)-tree, let x ∈ T , and let (Tn )n∈N be a sequence of (G, F)-trees that converges to T in the equivariant Gromov–Hausdorff topology. A sequence (xn )n∈N ∈ Q n∈N Tn is an approximation of x if the sequence ((Tn , xn ))n∈N of pointed (G, F)-trees converges to (T, x). Proposition 1.5. (Horbez [15, Theorem 4.3]) Let (T, u) (resp. (T ′ , u′ )) be a pointed very small (G, F)-tree, and let ((Tn , un ))n∈N (resp. ((Tn′ , u′n ))n∈N ) be a sequence of pointed very small (G, F)-trees that converges to (T, u) (resp. (T ′ , u′ )) in the equivariant Gromov–Hausdorff topology. Assume that for all n ∈ N, there exists a 1-Lipschitz G-equivariant map fn : Tn → Tn′ , such that fn (un ) = u′n . Then there exists a 1-Lipschitz G-equivariant map f : T → T ′ , such that f (u) = u′ , where T ′ denotes the metric completion of T ′ . 1.4 Graphs of actions and transverse coverings Let G be a countable group, and F be a free factor system of G. A (G, F)-graph of actions consists of • a marked graph of groups G, whose fundamental group is isomorphic to G, such that all subgroups in F are conjugate into vertex groups of G, together with an assignment of length (possibly equal to 0) to each edge of G, in such a way that every edge with peripheral stabilizer has length 0, and • an isometric action of every vertex group Gv on a Gv -tree Tv (possibly reduced to a point), in which all intersections of Gv with peripheral subgroups of G are elliptic and fix a unique point, and • a point pe ∈ Tt(e) fixed by ie (Ge ) ⊆ Gt(e) for every oriented edge e. 6 A (G, F)-graph of actions is nontrivial if the associated graph of groups is not reduced to a point. Associated to any (G, F)-graph of actions G is a G-tree T (G). Informally, the tree T (G) is obtained from the Bass–Serre tree S of the underlying graph of groups by equivariantly attaching each vertex tree Tv at the corresponding vertex v, an incoming edge being attached to Tv at the prescribed attaching point, and making each edge from S whose assigned length is equal to d isometric to the segment [0, d] (edges of length 0 are collapsed). The reader is referred to [9, Proposition 3.1] for a precise description of the tree T (G). We say that a (G, F)-tree T splits as a (G, F)-graph of actions if there exists a (G, F)-graph of actions G such that T = T (G). A transverse covering of an R-tree T is a family Y of nondegenerate closed subtrees of T such that every arc in T is covered by finitely many subtrees in Y, and for all Y 6= Y ′ ∈ Y, the intersection Y ∩ Y ′ contains at most one point. It is trivial if Y = {T }, and nontrivial otherwise. The skeleton of Y is the simplicial tree S defined as follows. The vertex set of S is the set Y ∪ V0 (S), where V0 (S) is the set of all intersection points between distinct subtrees in Y. There is an edge between Y ∈ Y and y ∈ V0 (S) whenever y ∈Y. Proposition 1.6. (Guirardel [11, Lemma 1.5]) A (G, F)-tree splits as a nontrivial (G, F)-graph of actions if and only if it admits a nontrivial G-invariant transverse covering. 2 Closedness of the space of projective very small (G, F )trees We denote by V SL(G, F) the space of projective very small, minimal, nontrivial (G, F)trees, as defined in Section 1.2. The goal of the present section is to establish the following fact. Proposition 2.1. The space V SL(G, F) is closed in PRG . In other words, every limit point of a sequence of very small (G, F)-trees is very small. This was proved by Cohen–Lustig for actions of finitely generated groups on R-trees [2, Theorem I]: by working in the axes topology, they proved closedness of the conditions that nontrivial arc stabilizers are cyclic and root-closed, and that tripod stabilizers are trivial. We will provide a shorter proof of these facts by working in the equivariant Gromov–Hausdorff topology. A (G, F)-tree T is irreducible if no end of T is fixed by all elements of G. The Gromov–Hausdorff topology is equivalent to the axes topology on the space of minimal, irreducible (G, F)-trees [22]. Since limits of trees in O(G, F) are irreducible, we can carry our arguments in the equivariant Gromov–Hausdorff topology. A proof of the fact that being small is a closed condition (in the equivariant Gromov– Hausdorff topology) also appears in [21, Lemme 5.7]. In our setting, we also need to check closedness of the condition that arc stabilizers are not peripheral. We will make use of classical theory of group actions on R-trees, and refer the reader to [3] for an introduction to this theory. Lemma 2.2. Let T be a minimal (G, F)-tree, and let (Tn )n∈N be a sequence of minimal (G, F)-trees that converges (non-projectively) to T . Let g ∈ G be an element that fixes a nondegenerate arc in T . Then for all n ∈ N sufficiently large, either g fixes a nondegenerate arc in Tn , or g is hyperbolic in Tn . 7 Proof. Otherwise, up to passing to a subsequence, we can assume that for all n ∈ N, the element g fixes a single point xn in Tn . Let [a, b] be a nondegenerate arc fixed by g in T . Let an (resp. bn ) be an approximation of a (resp. b) in the tree Tn . As dTn (an , gan ) and dTn (bn , gbn ) both tend to 0, the points an and bn are both arbitrarily close to xn . Therefore, the distance dTn (an , bn ) converges to 0, and a = b, a contradiction. Lemma 2.3. Let T be a minimal (G, F)-tree, and let (Tn )n∈N be a sequence of minimal (G, F)-trees that converges to T . Let g ∈ G. Assume that some power gk of g fixes a nondegenerate arc I in T . If for all sufficiently large n ∈ N, the element g is hyperbolic in Tn , then g fixes I. Proof. Let I := [a, b]. Let an (resp. bn ) be an approximation of a (resp. b) in Tn . Since dTn (an , gk an ) and dTn (bn , gk bn ) both converge to 0, the points an and bn are arbitrarily close to the axis of g in Tn , and ||g||Tn converges to 0. Hence both dTn (an , gan ) and dTn (bn , gbn ) converge to 0, so g fixes [a, b]. Proof of Proposition 2.1. Let (Tn )n∈N be a sequence of very small (G, F)-trees that converges to a (G, F)-tree T . Let g ∈ G be a peripheral element. Then for all n ∈ N, the element g fixes a single point in Tn . Lemma 2.2 implies that g fixes a single point in T . Let now g, h ∈ G be two elements that fix a common nondegenerate arc [a, b] ⊆ T . We will show that the group hg, hi is abelian, and hence cyclic because g and h are nonperipheral. Let an (resp. bn ) be an approximation of a (resp. b) in Tn . Let ǫ > 0, chosen to be small compared to dT (a, b). Since dTn (an , gan ), dTn (bn , gbn ) ≤ ǫ for n large enough, while dTn (an , bn ) ≥ dT (a, b) − ǫ, the elements g and h are hyperbolic in Tn , and their translation axes have an overlap of length greater than 3ǫ. On the other hand, we have ||g||Tn , ||h||Tn ≤ ǫ. This implies that the elements [g, h], g[g, h]g −1 and h[g, h]h−1 all fix a common nondegenerate arc in Tn . As Tn is very small, the group generated by these elements is (at most) cyclic, and in addition [g, h] is nonperipheral. This implies that [g, h] is hyperbolic in any Grushko (G, F)-tree. Both g and h preserve the axis of [g, h] in a Grushko (G, F)-tree, and hence g and h commute. Let now g ∈ G be an element, one of whose proper powers gk fixes a nondegenerate arc [a, b] ⊆ T . We first assume that g fixes a nondegenerate arc in Tn for all n ∈ N, and let In denote the fixed point set of g in Tn . Since Tn is very small, the element g also fixes In for all n ∈ N. Let an (resp. bn ) be an approximation of a (resp. b) in Tn . Since dTn (gk an , an ) and dTn (gk bn , bn ) both converge to 0, the arc In comes arbitrarily close to both an and bn . This implies that both dTn (gan , an ) and dTn (gbn , bn ) converge to 0, and therefore g fixes [a, b] in T . Otherwise, up to passing to a subsequence, we can assume that gk , and hence g, is hyperbolic in Tn for all n ∈ N. It then follows from Lemma 2.3 that g fixes [a, b]. We finally assume that g fixes a nondegenerate tripod in T , whose extremities we denote by a, b and c. Let m be the center of this tripod, and L > 0 be the shortest distance in T between m and one of the points a, b or c. Let an (resp. bn , cn , mn ) be an approximation of a (resp. b, c, m) in Tn , and let ǫ > 0 be such that ǫ < L2 . For n sufficiently large, the point mn lies at distance at most ǫ from the center m′n of the tripod formed by an , bn and cn in Tn . In addition, as an , bn and cn all lie at distance at 8 most ǫ from CTn (g), the distance from m′n to one of the points an , bn or cn is at most ǫ. This leads to a contradiction. 3 Geometric (G, F )-trees In the present section, we introduce the class of geometric (G, F)-trees, that will be an important tool in our analysis of the closure of O(G, F). In particular, we will explain how to approximate any very small (G, F)-tree by geometric ones. Our presentation was largely inspired by Gaboriau–Levitt’s work in the context of free groups [6]. The idea of using band complexes and systems of isometries for studying trees dates back to the work of Rips. 3.1 Approximations by geometric (G, F )-trees Given a tree T , we define a finite tree in T as the convex hull of a finite collection of points in T . A finite forest of T is a subset of T having finitely many connected components, each of which is a finite tree. Let B := {g1 , . . . , gN } be a fixed free basis of FN , and let S be the standard (G, F)free splitting represented on Figure 1. Let T be a (G, F)-tree, and let K ⊆ T be a finite forest. Let v0 ∈ S be a vertex with trivial stabilizer, and let v1 , . . . , vk be the adjacent vertices with stabilizers G1 , . . . , Gk . Notice that the set {v0 , . . . , vk } is a set of representatives of all G-orbits of vertices in S. Given a vertex v ∈ V (S) in the orbit of vi (for some i ∈ {0, . . . , k}), we let Kv be the union, taken over all elements g ∈ G such that gvi = v, of the translates gK. Notice in particular that for all i ∈ {1, . . . , k}, we have Kvi = Gi .K, and in general the forest Kv is Stab(v)-invariant. Let a Kv . X := v∈V (S) Let Σ be the foliated complex obtained from X by adding, for each pair {v, v ′ } of adjacent vertices in S, a band Kv ∩ Kv′ × [0, 1], joining the two copies of Kv ∩ Kv′ sitting in Kv and in Kv′ . These bands are foliated by the vertical sets of the form {x} × [0, 1]. Notice that Σ can also be viewed as the subset of T × S made of all couples of the form (x, y), where either y is a vertex of S and x ∈ Ky , or else y belong to the interior of an edge joining two vertices v and v ′ in S, and x ∈ Kv ∩ Kv′ . The diagonal action of G on T × S then restricts to a G-action on Σ. The projections to T and S define natural G-equivariant maps πT : Σ → T and πS : Σ → S. We will let Σ0 := πS−1 (G.v0 ) We now assume that the set K ⊆ T is a finite tree, i.e. K is connected, that K ∩ gK 6= ∅ for all g ∈ B, and that for all i ∈ {1, . . . , k}, the tree K contains the unique point xi which is fixed by Gi . In this way, all subsets Kv with v ∈ V (S) are connected. Then Σ projects onto the tree S, and all fibers of the projection map πS are trees, which implies that Σ is contractible. It follows from [19, Proposition 1.7] that the leaf space of Σ made Hausdorff is an R-tree TK . Notice by construction that for all vertices vi with nontrivial stabilizer in S, the tree Kvi is equal to the union of all trees Kv with v adjacent to vi . Therefore, every point in TK has a representative in Σ0 . We will now establish a few properties of TK , thus extending a theorem of Gaboriau and Levitt [6, Theorem I.1] to the context of (G, F)-trees. Given two R-trees T and T ′ , a morphism f : T → T ′ is a map such that every segment in T can be subdivided into finitely many subsegments, in restriction to which f is an isometry. 9 Theorem 3.1. Let T be a (G, F)-tree, and let K ⊆ T be a finite tree that contains the fixed point of Gi for all i ∈ {1, . . . , k}, and such that K ∩ gK 6= ∅ for all g ∈ B. Then TK is the unique (G, F)-tree such that 1. the finite tree K embeds isometrically into TK , and 2. for all g ∈ G and all x, y ∈ K, if g.x = y ∈ T and the points (y, v0 ) and (y, gv0 ) belong to the same leaf of Σ, then g.x = y in TK , and 3. every segment of TK is contained in a finite union of translates g.K with g ∈ G, and 4. if T ′ is any (G, F)-tree satisfying the first two above properties, then there exists a unique G-equivariant morphism j : TK → T ′ such that j(x) = x for all x ∈ K. Proof. The proof of Theorem 3.1 is the same as the proof of [6, Theorem I.1], we will sketch a proof for completeness. Uniqueness follows from the fourth property: if T ′ is another (G, F)-tree with the same properties, then there are G-equivariant morphisms from TK to T ′ and from T ′ to TK . Since morphisms can only decrease translation length functions, this implies that TK and T ′ are G-equivariantly isometric. The tree TK is obtained in the following way. Given any two points x, y ∈ Σ0 , we let δ(x, y) := inf dT (x, u1 ) + dT (u′1 , u2 ) · · · + dT (u′k−1 , y), σ where the infimum is taken over the set of all sequences σ = (x = u′0 , u1 , u′1 , u2 , u′2 , . . . , uk−1 , u′k−1 , uk = y) of points in Σ, such that for all i ∈ {0, . . . , k − 1}, the segment [u′i , ui+1 ] is horizontal (i.e. its projection to S is constant), and for all i ∈ {1, . . . , k}, the segment [ui , u′i ] is vertical (i.e. its projection to T is constant), and hence [u′i , ui+1 ] is contained in a leaf of Σ. Then δ defines a pseudo-metric on Σ0 , and TK is the metric space (Σ0 , δ) made Hausdorff. Property 2 in Theorem 3.1 easily follows from the construction, and Property 3 follows from Properties 1 and 2. Property 4 is obtained by noticing that if T ′ is a tree satisfying the first two conclusions of the theorem, then if we let δ′ ((x, gv0 ), (x′ , g′ v0 )) := dT ′ (gx, g′ x′ ) for all x, x′ ∈ K and all g, g ′ ∈ G, then we have δ′ ≤ δ. Then using the fact that every segment in T ′ is covered by finitely many G-translates of K, we get that the identity map on K × Σ0 induces the required morphism from T ′ to T . We refer to the proof of [6, Theorem I.1] for details of the arguments. The key point for establishing Property 1 will be to prove that if δ(x, y) = 0, then x and y belong to the same leaf of the foliation. We will prove more generally that the infimum in the definition of δ is achieved, and that the πS -images of the points in the minimizing sequence are aligned in the right order in S. Property 1 in Theorem 3.1 will follow from this fact: if x, y ∈ K, then any minimizing sequence has to be contained in K, and therefore δ(x, y) = dT (x, y). We will now prove that the infimum in the definition of δ is achieved. Given a sequence σ as above, we let δ(σ) := dT (x, u1 ) + dT (u′1 , u2 ) + · · · + dT (u′k−1 , y). In order to prove the above fact, we first notice that if the πS -image of the sequence σ backtracks, then one can find another sequence σ ′ with δ(σ ′ ) ≤ δ(σ): indeed, if σ 10 contains a subsequence of the form ui , u′i , ui+1 , u′i+1 where πS (ui ) = πS (u′i+1 ) := v, then this subsequence can be replaced by ui , u′i+1 (indeed, the segment [ui , u′i+1 ] is then contained in Kv ), and this yields a new sequence σ ′ satisfying δ(σ ′ ) ≤ δ(σ). In addition, let u′i , ui+1 , u′i+1 be a finite subsequence arising in a sequence σ as above. Let γ := πS ([ui+1 , u′i+1 ]). Let γK ⊆ K be the subset of K made of those points x ∈ K such that there exists a leaf segment in Σ containing x and projecting to γ. Then one does not increase the value of δ(σ) if one replaces ui+1 by the projection y of ui to γK , and u′i+1 by the unique point z in Σ in the same leaf as y, such that πS ([y, z]) = γ. This implies that the supremum can be taken over the finite set made of those points in K that are extremal in some band of Σ. In particular, this supremum is achieved. If T ′ is a tree satisfying the first two conclusions of Theorem 3.1, the morphism j provided by Theorem 3.1 is called a resolution of T ′ . Definition 3.2. A (G, F)-tree T is geometric if there exists a finite subtree K ⊆ T such that T = TK . Let T be a (G, F)-tree, and let (Tn )n∈N be a sequence of (G, F)-trees. The sequence (Tn )n∈N strongly converges towards T (in the sense of Gillet and Shalen [8]) if for all integers n ≤ n′ , there exist morphisms jn,n′ : Tn → Tn′ and jn : Tn → T such that for all n ≤ n′ and all segments I ⊆ Tn , the morphism jn′ is an isometry in restriction to jn,n′ (I). Strong convergence implies in particular that for all g ∈ G, there exists n0 ∈ N such that for all n ≥ n0 , we have ||g||Tn = ||g||T . The following theorem essentially follows from work by Levitt and Paulin [19, Theorem 2.2] and Gaboriau and Levitt [6, Proposition II.1]. Theorem 3.3. Let G be a countable group, and let F be a free factor system of G. Let T be a minimal (G, F)-tree. Then there exists a sequence (Tn )n∈N of minimal geometric (G, F)-trees that strongly converges towards T . If in addition H is a subgroup of G with finite Kurosh rank that is elliptic in T , then the approximation can be chosen so that H is elliptic in Tn . Proof. By carefully choosing an increasing sequence of finite subtrees Kn ⊆ T whose union is the whole tree T , we will establish that the trees TKn strongly converge towards T . One point in the proof is to carefully choose Kn so that all trees TKn are minimal: the idea for this is to choose a subtree Kn all of whose endpoints belong to the G-orbit of some fixed basepoint x0 ∈ T . Here are the details of the proof. Let T be a minimal (G, F)-tree. Let (gn )n∈N be an enumeration of G. Assume that this enumeration is chosen so that if v0 , gn v0 and gm v0 are aligned in this order in S, then m ≥ n. Let x0 ∈ T , and for all n ≥ 1, let Kn be the convex hull of {gk x0 |k ≤ n} in T , so that by construction, all extreme points of Kn belong to the G-orbit of x0 . By minimality, the tree T is the increasing union of the trees Kn , and there exists g ∈ G such that x0 belongs to the translation axis of g in T . Let n0 ∈ N be large enough so that Kn0 contains gx0 and satisfies the hypotheses from Theorem 3.1. For all n ≥ n0 , we let Tn := TKn . The first property in Theorem 3.1 implies that the distance between x0 and gx0 is the same in Tn and in T , so x0 belongs to the axis of g in Tn . In addition, the second property in Theorem 3.1, together with our choice of enumeration of G, implies that Tn is the convex hull of the orbit of x0 . Hence Tn is minimal. We claim that the sequence (Tn )n∈N strongly converges towards T . Given any two integers n ≤ n′ , we have Kn ⊆ Kn′ . Theorem 3.1 applied to Kn′ implies that Tn′ 11 contains an isometrically embedded copy of Kn′ , and hence of Kn . In addition, if two points belong to the same leaf of Σn , then they also belong to the same leaf of Σn′ (where Σn and Σn′ denote the band complexes associated to Kn and Kn′ , respectively). Therefore Tn′ satisfies the first two properties of Theorem 3.1 with respect to the finite tree Kn . The last property in Theorem 3.1 (applied to Kn ) then provides morphisms jn,n′ : Tn → Tn′ for all n ≤ n′ , as well as morphisms jn : Tn → T for all n ∈ N. Let n ∈ N, and I ⊆ Tn . The third property in Theorem 3.1 then enables us to choose a finite set Y of elements of G so that I is covered by the translates of Kn in Tn under elements in Y . We then let n′ be large enough so that Kn′ contains the translates of Kn in T under the elements in Y . Then jn′ is an isometry from jn,n′ (I) to jn (I). This shows strong convergence of the trees Tn towards T . By choosing n large enough so that all elements in a basis of the free part of the Kurosh decomposition of H, as well as all conjugators arising in this decomposition, are of the form gk for some k ≤ n, and Kn contains a fixed point of H, we can ensure that the last property of Theorem 3.3 is satisfied. Remark 3.4. Notice that if branch points are dense in T , then the tree Kn has edges of arbitrarily small length as n tends to +∞, from which it follows that simplicial edges in the geometric approximation of T have lengths going to 0. 3.2 Properties of geometric (G, F )-trees We now list a few other useful properties of the tree TK , which were proved by Gaboriau and Levitt in [6] in the case of FN -trees. Any element of G can be written in a unique way as a reduced word of the form s1 . . . sk , where • for all i ∈ {1, . . . , k}, either si ∈ B ∪ B −1 , or else si belongs to one of the peripheral groups Gj , and • no two consecutive letters are of the form ss−1 or s−1 s with s ∈ B, and • no two consecutive letters belong to the same peripheral group Gj . It is cyclically reduced if in addition, it does not start and end with letters that are inverses to each other, and does not either start and end with letters belonging to a common peripheral group. Proposition 3.5. Let T be a (G, F)-tree, let K ⊆ T be a finite subtree that contains the fixed points of all groups Gj , and such that K ∩ sK 6= ∅ for all s ∈ B, and let g ∈ G be nonperipheral and cyclically reduced. Then the fixed point set of g in TK is contained in K. Proof. The proof goes as in [6, Proposition I.5]. Let a ∈ TK be a fixed point of g. Choose a representative (x, v) ∈ Σ0 of a, with v = hv0 for some h ∈ G, such that the distance from v0 to v is minimal. We let x0 := h−1 x. Assume towards a contradiction that v 6= v0 , i.e. h 6= e. We have (x, v) = (gx, gv) = (x, gv) in TK : the first equality comes from the fact that g(x, v) = (x, v) in TK , and the second from the fact that gx = x in T . By applying h−1 , we get that (x0 , v0 ) = (x0 , h−1 ghv0 ). It follows from Theorem 3.1 that (x0 , v0 ) and (x0 , h−1 ghv0 ) lie in a common leaf of Σ. Let g1 (resp. gk ) be the first (resp. last) letter in the reduced word representing h−1 gh. Then there is a leaf in Σ joining (x0 , v0 ) to (x0 , g1 v0 ), and there is a leaf in Σ joining (x0 , h−1 ghgk−1 v0 ) to (x0 , h−1 ghv0 ). By translating those by h and g−1 h, respectively, we find leaves in 12 Σ joining (x, v) to (x, hg1 v0 ) and to (x, hgk−1 v0 ). Our choice of v then implies that the reduced word representing h cannot end with gk , and the reduced word representing h−1 cannot begin with g1 . But since h−1 gh begins with g1 and ends with gk , this forces g not to be cyclically reduced, a contradiction. Corollary 3.6. Let T be a small (G, F)-tree, and let K be a finite subtree of T that contains all fixed points of the Gi ’s, and such that K ∩ sK 6= ∅ for all s ∈ B. For all g 6= 1 ∈ G, the restriction of the resolution map j : TK → T to the fixed point set of g is an isometry. In particular, arc stabilizers in TK are either trivial, or cyclic and non-peripheral. If T is very small, then tripod stabilizers in TK are trivial. Let k ∈ N. A (G, F)-tree T is k-tame if T is small, and in addition, we have Fix(gkl ) = Fix(g k ) for all l ≥ 1. We refer to Section 6 for details and equivalent definitions. Corollary 3.7. Let T be a small (G, F)-tree, and let K be a finite subtree of T that contains all fixed points of the Gi ’s, and such that K ∩ sK 6= ∅ for all s ∈ B. For all k ∈ N, if T is k-tame, then TK is k-tame. Proof. Let g ∈ G be nonperipheral, and let k ∈ N. Up to passing to a conjugate, we can assume that g is cyclically reduced, and in this case the fixed point set of g in TK is contained in K by Proposition 3.5. Let x ∈ K be such that there exists l ∈ N such that gkl x = x in TK . This implies in particular that gkl x = x in T . We will show that gk x = x in TK . By Theorem 3.1, there is a leaf segment in Σ joining (x, v0 ) to (x, g kl v0 ). But since g is cyclically reduced, this implies that there is also a leaf segment in Σ (which is a subsegment of the previous one) joining (x, v0 ) to (x, gk v0 ). Since gk x = x in T (because T is k-tame), we have found a leaf segment in Σ joining (x, v0 ) to (g k x, g k v0 ). This implies that gk x = x in TK , as required. As a consequence of Theorem 3.3 and the above two corollaries, we get the following approximation result. Theorem 3.8. Let G be a countable group, and let F be a free factor system of G. Let T be a minimal, small (G, F)-tree. Then there exists a sequence (Tn )n∈N of minimal, small, geometric (G, F)-trees, that strongly converges towards T . If T is very small (resp. k-tame for some k ∈ N), the approximation can be chosen very small (resp. k-tame). 3.3 Interpretation in terms of systems of isometries Let K be a finite forest. Given two nonempty closed subtrees A and B of K, a morphism from A to B is a surjective map φ : A → B, such that A can be subdivided into finitely many subtrees in restriction to which φ is an isometry. The subtrees A and B are called the bases of φ. A finite system of morphisms is a pair K = (K, Φ), where K is a finite forest, and Φ is a finite collection of morphisms between nonempty closed subtrees of K. In the case where all morphisms φ ∈ Φ are isometries between their bases, we call K a finite system of isometries. Notice that any finite system of morphisms can be turned into a finite system of isometries by appropriately subdividing the bases of the morphisms in Φ. We now assume that Φ is a finite system of isometries. Given an isometry φ from Aφ to Bφ , we denote by φ−1 its inverse, which is a partial isometry from Bφ to Aφ . Given partial isometries φ1 , . . . , φn , we denote by φ1 ◦ · · · ◦ φn the composition of the 13 φi ’s, which is a partial isometry whose domain is the set of all x ∈ Aφn such that for all i ∈ {2, . . . , n}, we have φi ◦ · · · ◦ φn (x) ∈ Aφi−1 . A word in the partial isometries in the family Φ and their inverses is reduced if it does not contain any subword of the form φ ◦ φ−1 or φ−1 ◦ φ. A finite system of isometries K has independent generators if no reduced word in the isometries in Φ and their inverses represents a partial isometry of K that fixes some nondegenerate arc. Let T be a (G, F)-tree, let K ⊆ T be a finite subtree, and let Σ be the corresponding foliated complex. We recall from Section 3.1 that X is the disjoint union of all trees Kv . The quotient space F := X/G is a finite forest: one connected component of F is isometric to Kv0 , and the other components are isometric to the quotient spaces Kvi /Gi . There is a naturally defined finite system of morphisms on F : every map has one base contained in Kv0 , and there are N morphisms with image in Kv0 , and for each i ∈ {1, . . . , k}, there is a morphism from Kv0 to Kvi /G. The morphisms of the second kind may however fail to be isometries because two segments in a common base of Kv0 may have images in Kvi that belong to the same Gvi -orbit, in which case they have the same image in the quotient. However, as mentioned above, by subdividing the bases of these morphisms at the points xi ∈ Kv0 corresponding to the fixed points of the groups Gi , we get a finite system of isometries associated to K. Lemma 3.9. Let T be a (G, F)-tree in which no element of G fixes a nondegenerate arc, and let K ⊆ T be a finite subtree. Then the finite system of isometries associated to K has independent generators. Proof. We denote by K this finite system of isometries. Assume towards a contradiction that a reduced word in the partial isometries in K represents a partial isometry fixing a nondegenerate arc of X/G. Then one could find a nondegenerate arc I ⊆ K, and an element g ∈ G, such that for all x ∈ I, there is a leaf joining (x, v0 ) to (gx, gv0 ) in Σ. But this implies that I = gI in TK . By the fourth property in Theorem 3.1, there is a morphism from TK to T , so g also fixes a nondegenerate arc in T , a contradiction. 4 Dimension of the space of very small (G, F )-trees Bestvina and Feighn have shown in [1, Corollary 7.12] that the space of very small FN trees has dimension 3N − 4. Their result was improved by Gaboriau and Levitt in [6, Theorem V.2], who showed in addition that V SL(FN ) r CVN has dimension 3N − 5. Following Gaboriau and Levitt’s proof, we extend their computation to the general case of (G, F)-trees. We recall the notion of the free rank of (G, F) from Section 1.1. Theorem 4.1. Let G be a countable group, and let F be a free factor system of G, such that rkK (G, F) ≥ 2. Then V SL(G, F) has topological dimension 3rkf (G, F) + 2|F| − 4. Theorem 4.2. Let G be a countable group, and let F be a free factor system of G, such that rkK (G, F) ≥ 2. Then V SL(G, F) r PO(G, F) has topological dimension 3rkf (G, F) + 2|F| − 5. The proof of Theorem 4.1 will be carried in the next two sections. Additional arguments for getting the dimension of the boundary (Theorem 4.2) will be given in Section 4.4. 14 4.1 The index of a small (G, F )-tree Let T be a small (G, F)-tree, and let x ∈ T . The Kurosh decomposition of the stabilizer Stab(x) reads as Stab(x) = g1 Gi1 g1−1 ∗ · · · ∗ gr Gir gr−1 ∗ F. We claim that the groups Gi1 , . . . , Gir are pairwise non conjugate in G, which implies in particular that there are only finitely many free factors arising in the Kurosh decomposition of Stab(x). Indeed, otherwise, we could find i ∈ {1, . . . , k}, and g ∈ G r Stab(x), such that both Gi and gGi g−1 fix x. This would imply that Gi fixes both x and g−1 x, and therefore g−1 x = x because no arc of T is fixed by a peripheral element. Hence Gi and gGi g−1 are conjugate in Stab(x), a contradiction. Notice that the free group F might a priori not be finitely generated (though it will actually follow from Corollary 4.5 that it is). We define the index of x as i(x) = 2 rkK (Stab(x)) + v1 (x) − 2, where v1 (x) denotes the number of Stab(x)-orbits of directions from x in T with trivial stabilizer. A point x ∈ T is a branch point if T r{x} has at least 3 connected components. It is an inversion point if T r {x} has 2 connected components, and some element g ∈ G fixes x and permutes the two directions at x. The following proposition is a generalization of [6, Proposition III.1]. Proposition 4.3. For all small minimal (G, F)-trees T and all x ∈ T , we have i(x) ≥ 0. If T is very small, then i(x) > 0 if and only if x is a branch point or an inversion point. Proof. If rkK (Stab(x)) ≥ 2, then we have i(x) ≥ 2, and in this case x is a branch point. If Stab(x) is trivial, then i(x) = v1 (x) − 2, where v1 (x) is the number of connected components of T r {x}, which is nonnegative because T is minimal, and i(x) > 0 if and only if x is a branch point. Finally, if rkK (Stab(x)) = 1, then i(x) = v1 (x) ≥ 0. If i(x) > 0, then either x is a branch point as in the first case, or x has valence 2 and is therefore an inversion point. If i(x) = 0, and T is very small, the stabilizer of any direction from x is isomorphic to Stab(x). As tripod stabilizers are trivial in T , this implies that x is not a branch point. Let T be a small (G, F)-tree, and let x, x′ ∈ T . If x and x′ belong to the same G-orbit, then i(x) = i(x′ ). Given a G-orbit O of points in T , we can thus define i(O) to be equal to i(x) for any x ∈ O. We then let X i(T ) := i(O). O∈T /G We now extend [6, Theorem III.2] and its corollaries [6, Corollaries III.3 and III.4] to the context of (G, F)-trees. The converse of the second statement of Proposition 4.4 will be proved in Proposition 4.18 below. Proposition 4.4. For all small (G, F)-trees T , we have i(T ) ≤ 2rkK (G, F) − 2. If T is geometric, then i(T ) = 2rkK (G, F) − 2. Using Proposition 4.3, we get the following result as a corollary of Proposition 4.4. Corollary 4.5. Any very small (G, F)-tree has at most 2 rkK (G, F) − 2 orbits of branch or inversion points, and the Kurosh rank of the stabilizer of any x ∈ T is at most equal to rkK (G, F). 15 Proof of Proposition 4.4. First assume that T is geometric. For all i ∈ {1, . . . , k}, we let xi ∈ T be the fixed point of Gi . Let K ⊆ T be a finite subtree containing all points xi , and such that T = TK . Let K = (F, Φ) be the associated system of morphisms on the compact forest F := X/G (see Section 3.3). We fix a G-orbit of points O ⊂ T . We will associate to O two graphs S and S ′ in the following way. Vertices of S are the points in O ∩ F (with a slight abuse of notations, as we are actually considering the image in F of the set of points in X that correspond to points in O). There is an edge e from z to z ′ whenever there is a morphism in Φ that sends either z to z ′ or z ′ to z. We note that Theorem 3.1 implies that S is connected. The graph S is actually equal to the quotient space under the G-action of the leaf in the foliated 2-complex Σ passing through any point of O ∩ F . The copies of the points xi in the trees Kvi /Gi ⊆ F are called the special vertices of F . We let n(S) be the number of special vertices in S. We define the Kurosh rank of S to be rkK (S) = 1 + |E(S)| − |V (S)| + n(S). We similarly define the Kurosh rank of any subgraph G ⊆ S. We will now assign labels in G to the edges in S. When a morphism in Φ has both its bases in Kv0 , the corrsponding edge between z and z ′ comes equipped with a natural (oriented) label, given by the element in the base B of FN corresponding to the partial isometry. If z ′ is a nonspecial point in Kvi /Gi , its preimage by the corresponding morphism in Φ consists of finitely many points z1 , . . . , zm which all differ by elements in Gi . We arbitrarily choose the label of one of the corresponding edges (say the one from z1 to z ′ ) to be equal to 1, and if gj ∈ Gi satisfies zj = gj z1 , we label the edge from z ′ to zj by gj . We finally assign label 1 to every edge that contains the special vertex. Fix x ∈ O ∩ F . Lemma 4.6. We have rkK (S) = rkK (Stab(x)). Proof. By adding a vertex with vertex group Gi at each special vertex contained in S, the graph S has a natural structure of graph of groups, and there is a natural morphism ρ : π1 (S, x) → G, sending any edge of a path in π1 (S, x) to the product of the labels it crosses. The morphism ρ is injective and takes its values in Stab(x), and surjectivity follows from the second assertion of Theorem 3.1. By definition, the Kurosh rank of S is also equal to the Kurosh rank of its fundamental group (as a graph of groups), so rkK (S) = rkK (Stab(x)). We now define a graph S ′ by considering orbits of directions instead of orbits of points. Vertices of S ′ are the directions in F from points in O ∩ F , and two directions d and d′ are joined by an edge whenever there exists a morphism in Φ that either sends d to d′ or d′ to d. In this way, every vertex of S is replaced by vF (x) vertices in S ′ , where vF (x) denotes the valence of x in F . Every edge e in S joining two points z and z ′ , and corresponding to a morphism φ is replaced by vφ (e) edges in S ′ , where vφ (e) is the valence of z in the domain of φ. There is a natural map π : S ′ → S that sends vertices to vertices and edges to edges. Lemma 4.7. The set of components of S ′ is in one-to-one correspondence with the set of Stab(x)-orbits of directions at x in T . For all directions d ∈ V (S ′ ), the fundamental group of the component of S ′ that contains d is isomorphic to the stabilizer of d, hence to {1} or Z. 16 Proof. Let S1′ be a component of S ′ . Then S1′ contains a vertex d0 ∈ V (S1′ ) corresponding to a direction based at a point y ∈ O ∩ Kv0 . Applying any g ∈ G taking y to x, we get a direction d := gd0 from x in T . The Stab(x)-orbit of d only depends on the component S1′ (and not on the choices of d0 and g). This defines a map Ψ from the set of connected components of S ′ to the set of Stab(x)-orbits of directions at x in T . We now prove injectivity of the map Ψ. Let d0 and d′0 be two directions in K = Kv0 having the same Ψ-image, then there exists g ∈ G mapping d0 to d′0 . Theorem 3.1, applied to two nearby points defining the direction d0 , implies that d0 and d′0 belong to the same component of S ′ , showing injectivity of Ψ. We now show surjectivity of Ψ. Let d be a Stab(x)-orbit of directions at x in T . There exists a segment [x, x1 ], such that d is contained in [x, x1 ]. Then [x, x1 ] is contained in some translate wK with w ∈ G, and w−1 d ⊆ K. This shows that d belongs to the image of Ψ. The proof of the second statement of the lemma is similar to the proof of Lemma 4.6. For all d ∈ V (S1′ ), there is an injective morphism ρ′ : π1 (S1′ ) → Stab(d), where this time S1′ is an actual graph and not a graph of groups because no element in Gi fixes a nondegenerate arc in TK . Surjectivity of ρ′ follows from Theorem 3.1, applied to two nearby points defining d. We say that a (G, F)-tree T has finitely many orbits of directions if there are finitely many orbits of directions based at branch or inversion points in T . We define the singular set Sing ⊆ F as the subset of F made of all branch points in F , all endpoints of the bases of the morphisms in Φ, and all points xi . Corollary 4.8. For all x ∈ K, there are only finitely many Stab(x)-orbits of directions at x in T . In addition, there are finitely many orbits of branch or inversion points in T (and hence finitely many orbits of directions in T ). Proof. Let d be a direction at x in T . Then the Stab(x)-orbit of d contains a direction in K based at a point y ∈ O ∩ K. Since S is connected, there exists g ∈ G such that (x, v0 ) and (gy, gv0 ) are joined by a leaf of Σ. By dragging d along this leaf, we get that either d is a direction at x that is contained in K, or d is in the G-orbit of a direction in K at a point in the singular set Sing. The claim follows because Sing is a finite set. Using the fact that the orbit of any point of T meets K, the above argument also shows that the orbit of any branch or inversion point in T meets Sing. Let G be a finite connected subgraph of S containing all vertices in O ∩ Sing (where Sing denotes the singular set) and all edges e ∈ E(S) with vφ (e) 6= 2 (where φ is the morphism corresponding to e). Let G ′ ⊆ S ′ be the π-preimage of G in S ′ . Lemma 4.7, together with the fact that there are only finitely many Stab(x)-orbits of directions at any point x ∈ T (Corollary 4.8), shows that up to enlarging G if necessary, we may assume that π1 (G ′ ) generates the fundamental group of every component of S ′ . Denote by Gj′ the components of G ′ . As the fundamental group of any finite connected graph X satisfies 1 − rk(π1 (X)) = |V (X)| − |E(X)|, we have X X X (1 − rk(π1 (Gj′ ))) = vF (x) − vφ (e). j x∈V (G) 17 e∈E(G) Moreover, we have 2rkK (G) − 2 = −2|V (G)| + 2|E(G)| + 2n(G). Summing the above two equalities, we get X X X 2rkK (G) − 2 + (1 − rk(π1 (Gj′ ))) = (vF (x) − 2) + (2 − vφ (e)) + 2n(G). j x∈V (G) e∈E(G) We claim that rkK (G) is bounded independently of the choice of the finite graph G, which implies that rkK (S) is finite. Indeed, Lemma 4.7 implies that 1 − rk(π1 (Gj′ )) cannot be negative. In addition, the right-hand side of the equality does not depend on G, because vF (x) = 2 as soon as x ∈ / Sing, and vφ (e) = 2 for all edges of S that do not belong to G. Up to enlarging G if necessary, we can thus assume that π1 (G) = π1 (S) (as graphs of groups). This implies that G contains any embedded path in S with endpoints in G, and therefore each component of S ′ contains only one component of G ′ . Lemmas 4.6 and 4.7 then imply that the left-hand side of the above equality is equal to i(O), so X X i(O) = (vF (x) − 2) + (2 − vφ (e)) + 2|FO |, (1) x∈V (S) e∈E(S) where |FO | is the common value of |F|Stab(x) | for all x ∈ O (we recall that F|Stab(x) denotes the set of conjugacy classes of peripheral subgroups in the Kurosh decomposition of Stab(x)). We will now sum up the above equality over all orbits of points in F to get an expression of the index of T . Remark that given a finite tree K, we have X (vK (x) − 2) = −2, x∈K where vK (x) denotes the valence of x in K. Therefore, as F has 1 + |F| connected components, we obtain that X X (vF (x) − 2) = −2 − 2|F|. O∈T /G x∈V (S) We also have X 2|FO | = 2|F|. O∈T /G Finally, since the number of morphisms in Φ is equal to rkK (G, F), we have X X (2 − vφ (e)) = 2rkK (G, F). O∈T /G e∈S By summing the above three contributions, we obtain i(T ) = 2rkK (G, F) − 2, and we are done in the geometric case. We now turn to the general case, where T need no longer be geometric. Let (Kn )n∈N be a sequence of finite subtrees of T such that the corresponding geometric (G, F)-trees 18 Tn strongly converge to T (we recall the definition of strong convergence from the paragraph preceding Theorem 3.3). Let x ∈ T be a branch or inversion point, and let s ≤ i(x) be an integer. As T is a (G, F)-tree, the Kurosh decomposition of Stab(x) reads as Stab(x) = g1 Gi1 g1−1 ∗ · · · ∗ gr Gir gr−1 ∗ F, where Gi1 , . . . , Gir are pairwise non conjugate in G, and F is a free group (which might a priori not be finitely generated). Let Y be a finite subset of Stab(x) made of elements from a free basis of F and one nontrivial element in each of the subgroups gj Gij gj−1 . Let d1 , . . . , dq be directions at x in T with trivial stabilizers, in distinct Stab(x)-orbits. We make these choices in such a way that 2|Y | + q − 2 = s. Because of strong convergence, it is possible for n large enough to lift x to an element xn ∈ Tn in such a way that all elements in Y fix xn , and we can similarly lift all directions di to a direction from xn in Tn . We have v1 (xn ) ≥ q, and the resolution morphism from Tn to T provided by Theorem 3.1 induces an injective morphism from Stab(xn ) to Stab(x), whose image contains all elements in Y , and all subgroups gj Gij gj−1 because Tn is a (G, F)-tree. As the subgroup generated by Y and the collection of subgroups of the form gj Gij gj−1 is a free factor, we get that rkK (Stab(x)) ≥ |Y |. Hence i(xn ) ≥ s. As this is true for all s ≤ i(x), we get that i(x) ≤ i(xn ). Since lifts to Tn of branch or inversion points in distinct G-orbits in T belong to distinct G-orbits of Tn , it follows from the first part of the argument that i(T ) ≤ 2 rkK (G, F) − 2. 4.2 Bounding Q-ranks, and the dimension of V SL(G, F ) We now compute the dimension of V SL(G, F), following the arguments in [6, Sections IV and V]. Let T be a minimal, small (G, F)-tree. We denote by L the additive subgroup of R generated by the values of the translation lengths ||g||T , for g varying in G. The Z-rank rZ (T ) is the rank of the abelian group L, i.e. the minimal number of elements in a generating set of L (it is infinite if L is not finitely generated). The Q-rank rQ (T ) is defined to be the dimension of the Q-vector space L ⊗Z Q. Notice that we always have rQ (T ) ≤ rZ (T ). Let Y be the set of points in T which are either branch points or inversion points. We define Λ as the subgroup of R generated by distances between points in Y . We have 2Λ ⊆ L ⊆ Λ, see [6, Section IV]. The following two propositions were stated by Gaboriau and Levitt in the case of nonabelian actions of finitely generated groups on R-trees without inversions. Their proofs adapt to our framework. Proposition 4.9. (Gaboriau–Levitt [6, Proposition IV.1]) Let T be a small (G, F)-tree, and let {g1 , . . . , gN } be a free basis of FN . Then the set {||gi ||T }i∈{1,...,N } generates L/2Λ. Proposition 4.10. (Gaboriau–Levitt [6, Proposition IV.1]) Let T be a small (G, F)tree, and let {pj }j∈J be a set of representatives of the G-orbits of branch and inversion points in T . Then for all j0 ∈ J, the set {dT (pj0 , pj )}j∈Jr{j0 } generates Λ/L. We refer the reader to [6, Proposition IV.1] for a proof of the above two facts. We mention that these proofs are based on the following lemma, which follows from standard theory of group actions on R-trees. Lemma 4.11. (Gaboriau–Levitt [6, Proposition IV.1]) Let T be a small (G, F)-tree. • For all branch or inversion points p, q, r ∈ T , we have d(p, r) = d(p, q)+d(q, r) mod 2Λ. • For all branch or inversion points p ∈ T and all g ∈ G, we have d(p, gp) = ||g||T mod 2Λ. 19 G1 Gk Figure 2: A (3rkf (G, F) + 2|F| − 4)-simplex in PO(G, F). • For all g, h ∈ G, we have ||gh||T = ||g||T + ||h||T mod 2Λ. Proposition 4.12. Let T ∈ V SL(G, F) be a geometric tree, and let b be the number of orbits of branch or inversion points in T . Then rZ (T ) ≤ rkf (G, F) + b − 1. Proof of Proposition 4.12. It follows from the proof of Theorem 3.1 that Λ is generated by distances between points in the finite singular set Sing. So Λ is finitely generated, and therefore L is finitely generated (recall that 2Λ ⊆ L ⊆ Λ). Hence Λ/2Λ is isomorphic to (Z/2Z)rZ (T ) , and the upper bound on rZ (T ) follows from Propositions 4.9 and 4.10. We also recall the following result from [6, Proposition IV.2]. Proposition 4.13. (Gaboriau–Levitt [6, Proposition IV.2]) Let T ∈ V SL(G, F) be a nongeometric tree obtained as the strong limit of a continuous system TK(t) of geometric trees. Then rQ (T ) ≤ lim inf rZ (TK(t) ), t→+∞ and rQ (T ) < lim sup rZ (TK(t) ). t→+∞ Proposition 4.14. For all T ∈ V SL(G, F), we have rQ (T ) ≤ 3rkf (G, F) + 2|F| − 3. Proof. When T is geometric, Proposition 4.12 implies that rQ (T ) ≤ rZ (T ) ≤ rkf (G, F)+ b−1. Corollary 4.5 shows that b ≤ 2rkf (G, F)+2|F|−2, and the claim follows. When T is nongeometric, it is a strong limit of a system of geometric trees. Indeed, the construction of the approximation in Theorem 3.3 can be done in a continuous way by choosing a continuous increasing family of finite trees K(t) ⊆ T , though some of the trees TK(t) may fail to be minimal in general. The claim then follows from Proposition 4.13. Proposition 4.15. (Gaboriau–Levitt [6, Proposition V.1]) Let G be a countable group, let F be a free factor system of G, and let k ≥ 1 be an integer. The space of projectivized length functions of (G, F)-trees with Q-rank smaller than or equal to k has dimension smaller than or equal to k − 1. Proof of Theorem 4.1. Theorem 4.1 follows from Propositions 4.14 and 4.15, since outer space PO(G, F) contains (3rkf (G, F) + 2|F| − 4)-simplices, obtained for instance by varying the edge lengths of a graph of groups that has the shape displayed on Figure 2. 20 4.3 Very small graphs of actions In this section, we mention a decomposition result which was proved by Levitt for actions of finitely generated groups on R-trees having finitely many orbits of branch points [18, Theorem 1]. The proof uses the fact that every such action on a tree T is finitely supported, i.e. there exists a finite tree K ⊂ T such that every arc I ⊂ T is covered by finitely many translates of K. The fact that minimal (G, F)-actions on R-trees are finitely supported was noticed by Guirardel in [11, Lemma 1.14]. Using finiteness of the number of orbits of branch and inversion points in a very small (G, F)-tree, Levitt’s theorem adapts to our more general framework. Theorem 4.16. (Levitt [18, Theorem 1]) Let G be a countable group, and let F be a free factor system of G. Then every tree T ∈ V SL(G, F) splits uniquely as a graph of actions, all of whose vertex trees have dense orbits, such that the Bass–Serre tree of the underlying graph of groups is very small, and all its edges have positive length. 4.4 Additional arguments for computing the dimension of V SL(G, F ) r PO(G, F ) We start by recalling the following well-known fact. We recall that a (G, F)-tree T has finitely many orbits of directions if there are finitely many orbits of directions at branch or inversion points in T . Proposition 4.17. Let T be a (G, F)-tree with dense orbits. If T is small, and has finitely many orbits of directions (in particular, if T is very small, or small and geometric), then all stabilizers of nondegenerate arcs in T are trivial. Proof. Let e ⊆ T be a nondegenerate arc in T , and assume there exists a nontrivial element g ∈ G such that ge = e. We can find two distinct directions d, d′ in e based at branch or inversion points of T (oriented in the same way), and an element h ∈ G so that d′ = hd. Notice in particular that h is hyperbolic in T , so h is nonperipheral, and hg, hi is not cyclic. The points at which these directions are based can be chosen to be both arbitrarily close to the midpoint of e, and in this case g and hgh−1 fix a common nondegenerate subarc of e. As T is small, this implies that g and hgh−1 commute. Hence h preserves the axis of g in any Grushko (G, F)-tree, which implies that g and h generate a cyclic subgroup of G, a contradiction. The following proposition extends [6, Theorem III.2]. Proposition 4.18. Let T be a small (G, F)-tree. If T is nongeometric, then i(T ) < 2rkK (G, F) − 2. Proof. We know from Proposition 4.4 that i(T ) ≤ 2rkK (G, F) − 2. Assume towards a contradiction that i(T ) = 2rkK (G, F) − 2. Let Y ⊂ T be a finite set that contains one point from each G-orbit with positive index, and let x ∈ Y . The Kurosh decomposition of Stab(x) reads as Stab(x) = Hi1 ∗ · · · ∗ Hij ∗ F, where F is a finitely generated free group, and Hil is G-conjugate to Gil for all l ∈ {1, . . . , j}. Let q be the rank of F . Let (Tn )n∈N be an approximation of T constructed as in the proof of Theorem 3.3. We can assume that Kn has been chosen so that the 21 extremities of Kn are branch points or inversion points in T (this can be achieved by choosing for x0 a branch point or inversion point of T , with the notations from the proof of Theorem 3.3). As in the proof of Proposition 4.4 in the nongeometric case, we choose directions d1 , . . . , dr , so that 2j + 2q + r − 2 = i(x), and n ∈ N so that we can associate a point xn ∈ Tn to each x ∈ Y . As i(Tn ) = i(T ), the orbit of every branch or inversion point of Tn with positive index contains some xn . Furthermore, every direction from xn with trivial stabilizer belongs to the Stab(xn )-orbit of the lift d′β of one of the directions dβ to Tn . The morphism jn : Tn → T is not an isometry, otherwise T would be geometric. Hence there exist y ∈ Tn , and two adjacent arcs e1 and e2 at y whose jn -images have a common initial segment. If y is a branch point or an inversion point with positive index, it follows from the above paragraph that both e1 and e2 have nontrivial stabilizer (otherwise we would have i(T ) < i(Tn )). As T is small, the stabilizers of e1 and e2 generate a cyclic subgroup of G, so there exists g ∈ G that fixes both e1 and e2 in Tn . This contradicts injectivity of jn in restriction to the fixed point set of g (Proposition 3.6). If y is a branch or inversion point with index 0, then y has cyclic stabilizer, and there exists g ∈ G that stabilizes all adjacent edges. Again, this contradicts injectivity of jn in restriction to the fixed point set of g. If y is neither a branch point nor an inversion point, then Theorem 3.1 implies that e1 and e2 are contained in the interior of a common G-translate of Kn , because extremal points of Kn have been chosen to be branch or inversion points in T . This again leads to a contradiction, since the restriction of jn to this translate of Kn is an isometry. The following proposition is an extension of [6, Theorem IV.1]. Proposition 4.19. For all very small (G, F)-trees T ∈ / O(G, F), we have rQ (T ) < 3rkf (G, F) + 2|F| − 3. Proof. When T is nongeometric, the claim follows from Propositions 4.13 and 4.14. We will assume that T is geometric and show that rZ (T ) < 3rkf (G, F) + 2|F| − 3. We have rZ (T ) < +∞ (Proposition 4.12), and Λ/2Λ is isomorphic to (Z/2Z)rZ (T ) . If the number of distinct orbits of branch or inversion points in T is strictly smaller than 2rkK (G, F) − 2, then rZ (T ) < 3rkf (G, F) + 2|F| − 3 by Proposition 4.12, and we are done. Otherwise, let p1 , . . . , p2rkK (G,F )−2 be a set of representatives in K of the orbits of branch or inversion points in T . Proposition 4.4 implies that for all j ∈ {1, . . . , 2rkK (G, F) − 2}, we have i(pj ) ≤ 1, and hence i(pj ) = 1 by Proposition 4.3. If T is a simplicial tree, then Λ is generated by the lengths of the edges of the quotient graph of groups. In particular, Proposition 4.14 implies that the maximal number of edges of a simplicial tree in V SL(G, F) is 3rkf (G, F) + 2|F| − 3. All vertices of T have index 1. Therefore, if x ∈ T is a vertex, we either have Stab(x) = {e} and v1 (x) = 3, or rkK (Stab(x)) = 1 and v1 (x) = 1. Using the fact that T is very small, we get that every vertex v of T satisfies one of the following possibilities, displayed on Figure 3: either v 1. has valence 3, and trivial stabilizer, or 2. projects in the quotient graph of groups to a valence 1 vertex whose stabilizer is peripheral, or 3. projects in the quotient graph of groups to a valence 1 vertex whose stabilizer is isomorphic to Z, and not peripheral, or 22 Gi Z Z Z 1 2 3 4 Z Z Z 5 Figure 3: Vertices of index 1 in a very small simplicial (G, F)-tree. Z Z Z Figure 4: Simplicial trees in V SL(G, F) r PO(G, F) do not have maximal Z-rank. 4. projects in the quotient graph of groups to a valence 2 vertex with stabilizer isomorphic to Z and not peripheral, adjacent to both an edge with trivial stabilizer and an edge with Z stabilizer, or 5. projects in the quotient graph of groups to a valence 3 vertex with stabilizer isomorphic to Z and not peripheral, adjacent to one edge with trivial stabilizer, and two edges with Z stabilizers. As T ∈ / O(G, F), some vertex in T satisfies one of the last three possibilities. If some vertex in T satisfies the third possibility, then one can replace the point with Z-stabilizer in the quotient graph of groups by a loop-edge. This operation yields a new minimal, very small simplicial tree T ′ for which rZ (T ′ ) > rZ (T ), so rZ (T ) < 3rkf (G, F) + 2|F| − 3. Otherwise, the graph of groups T /G contains a concatenation of edges that all have the same Z stabilizer, whose two extremal vertices have valence 2, and are adjacent to an edge with trivial stabilizer, and whose interior vertices have valence 3, and are adjacent to a single edge with trivial stabilizer, see Figure 4. Figure 4 illustrates how to construct a tree T ′ with strictly more orbits of edges than T , so that rZ (T ′ ) > rZ (T ). Again, we have rZ (T ) < 3rkf (G, F) + 2|F| − 3. Assume now that T has dense orbits. Notice that Λ/2Λ = Λ/L + L/2Λ, so by Propositions 4.9 and 4.10, it suffices to prove that the rank of Λ/L is strictly less than b−1, where b denotes the number of orbits of branch or inversion points in T . Let K ⊆ T be a finite subtree such that T = TK , chosen in such a way that every terminal vertex of K is either a branch point or an inversion point in T . The (G, F)-tree T has trivial arc stabilizers by Proposition 4.17, so the associated system of isometries K = (F, Φ) has independent generators by Lemma 3.9 (notice here that we are considering the system of isometries and not the system of morphisms). Using [7, Proposition 6.1], we get that X |F | = |Aφ |, (2) φ∈Φ where |F | (resp. |Aφ |) denotes the total length of F (resp. of Aφ ). We have X |F | = dT (q, r), e=[q,r]∈E(K) 23 where the sum is taken over all edges in F , after subdividing F at all points in the singular set Sing (notice that in view of our choice of K, all points in Sing correspond to branch points or inversion points in T ). We denote by V (F ) the set of vertices in F . Our hypothesis on the extremal vertices of K, together with Lemma 4.11, implies that for all points q, r ∈ V (F ), the length of [q, r] is equal modulo L to the sum dT (p1 , pi )+dT (p1 , pj ), where pi (resp. pj ) belongs to the G-orbit of q (resp. r). Denoting by O(pi ) the orbit of pi for all i ∈ {1, . . . , 2rkK (G, F) − 2}, we have   2rkK (G,F )−2 X X vF (x) mod L, dT (p1 , pi ) ×  |F | = i=1 x∈V (F )∩O(pi ) and similarly, for all φ ∈ Φ, we have  2rkK (G,F )−2 |Aφ | = X i=1 dT (p1 , pi ) ×  X x∈V (Aφ )∩O(pi )  vφ (x) mod L, where V (Aφ ) denotes the set of vertices of Aφ , which is contained in V (F ), and vφ (x) denotes the valence of x in Aφ . Using the above two equalities, Equation (2) gives a linear relation in Λ/L between the numbers dT (p1 , pi ), where the coefficient of dT (p1 , pi ) is equal to   X X vF (x) − vφ (x) . φ∈Φ x∈V (F )∩O(pi ) For all i ∈ {1, . . . , 2rkK (G, F) − 2}, the index of pi is equal to 1. Therefore, Equation (1) from the proof of Proposition 4.4 implies that   X X vF (x) − vφ (x) φ∈Φ x∈V (F )∩O(pi ) is odd. Equation (2) thus leads to the nontrivial relation 2rkK (G,F )−2 X dT (p1 , pj ) = 0 mod L j=2 between the generators of Λ/L, so rZ (T ) < 3rkf (G, F) + 2|F| − 3. In general, let G be the decomposition of T as a graph of actions provided by Theorem 4.16. We assume that T is not simplicial, and let Tv be a nontrivial vertex tree of this decomposition. Then Tv is a very small (Gv , FGv )-tree with dense Gv -orbits. Let T ′ be the very small (G, F)-tree obtained from T by collapsing all vertex trees in the G-orbit of Tv to points. By definition of the index, we have i(T ) − i(T ′ ) = i(Tv ) − (2rkK (Gv ) − 2). As T is geometric, Proposition 4.4 implies that the left-hand side of the above equality is nonnegative, while the right-hand side is nonpositive. This implies that i(Tv ) = 2rkK (Gv ) − 2. Using Proposition 4.18, this shows that the tree Tv is geometric. Assume that the number of distinct Gv -orbits of branch or inversion points in the minimal subtree of Tv is strictly smaller than 2rkK (Gv ) − 2. Then one of these orbits has index at least 24 2 in Tv , and hence in T . This implies that the number of distinct G-orbits of branch or inversion points in T is strictly smaller than 2rkK (G, F) − 2, and we are done by Proposition 4.12. We are thus left with the case where the number of distinct Gv -orbits of branch or inversion points in Tv is equal to 2rkK (Gv ) − 2. As distinct G-translates of Tv are disjoint in T , all these Gv -orbits of branch or inversion points are distinct when viewed as G-orbits of points in T . We denote by p1 , . . . , p2rkK (Gv )−2 a set of representatives of the Gv -orbits of branch or inversion points of Tv . In this case, as Tv has dense orbits, the analysis from the above paragraph provides a nontrivial relation between the generators dTv (p1 , pi ) of Λ(Tv )/L(Tv ). The numbers dTv (p1 , pi ) may also be viewed as part of a generating set of Λ(T )/L(T ), and we have a nontrivial relation between these generators. Again, this implies that rZ (T ) < 3rkK (G, F) + 2|F| − 3. Proof of Theorem 4.2. Theorem 4.2 follows from Propositions 4.15 and 4.19, because V SL(G, F) r PO(G, F) contains a (3rkf (G, F) + 2|F| − 5)-simplex made of simplicial (G, F)-trees (except in the case where G = G1 ∗ G2 and F = {G1 , G2 }, for which PO(G, F) is reduced to a point and V SL(G, F) r PO(G, F) is empty). An example of such a simplex is given by varying edge lengths in a graph of groups obtained from the graph of groups displayed on Figure 2 by collapsing a loop, or merging two points corresponding to subgroups G1 and G2 , and adding an edge with nontrivial cyclic stabilizer generated by a nonperipheral element in G1 ∗ G2 , for instance. 5 Very small actions are in the closure of outer space. In the classical case where G = FN is a finitely generated free group of rank N , and F = ∅, Cohen and Lustig have shown that a minimal, simplicial FN -tree lies in the closure cvN if and only if it is very small [2]. Bestvina and Feighn [1] have extended their result to all minimal FN -actions on R-trees. However, it seems that their proof does not handle the case of actions that contain both nontrivial arc stabilizers, and minimal components dual to measured foliations on compact, nonorientable surfaces. Indeed, for such actions, it is not clear how to approximate the foliation by rational ones without creating any one-sided leaf (in which case the action we get is not very small). If the action has trivial arc stabilizers (i.e. if the dual band complex contains no annulus), then the argument in [1, Lemma 4.1] still enables to get an approximation by very small, simplicial FN -trees, by using the narrowing process described in [9, Section 7]. However, this argument does not seem to handle the case of trees having nontrivial arc stabilizers. We will give a proof of the fact that cvN is the space of very small, minimal, isometric actions of FN on R-trees that does not rely on train-track arguments for approximating measured foliations on surfaces by rational ones. Our proof also gives an interpretation of Cohen and Lustig’s for simplicial trees. We again work in our more general framework of (G, F)-trees, and show the following result. Theorem 5.1. Let G be a countable group, and let F be a free factor system of G. The closure O(G, F) (resp. PO(G, F)) is the space of (projective) length functions of very small (G, F)-trees. In particular, Theorem 5.1 states that every minimal, very small (G, F)-tree T can be approximated by a sequence of Grushko (G, F)-trees. When T has trivial arc stabilizers, we can be a bit more precise about the nature of the approximation we get. 25 Definition 5.2. Let T be a (G, F)-tree. A Lipschitz approximation of T is a sequence (Tn )n∈N of (G, F)-trees that converges to T , and such that for all n ∈ N, there exists a 1-Lipschitz G-equivariant map from Tn to T . Lipschitz approximations seem to be useful: they were a crucial ingredient in [15] for tackling the question of spectral rigidity of the set of primitive elements of FN in cvN . They also turn out to be a useful ingredient for describing the Gromov boundary of the (hyperbolic) graph of (G, F)-cyclic splittings in [13]. The quotient volume of a very small (G, F)-tree T is defined as the sum of the edge lengths of the graph of actions underlying the Levitt decomposition of T (where we recall the definition of the Levitt decomposition from Theorem 4.16). In other words, if S is the simplicial tree obtained after collapsing all subtrees with dense orbits in the decomposition of T , then the quotient volume of S is the volume of the quotient graph S/G. In particular, if T has dense orbits, then its quotient volume is equal to 0. Theorem 5.3. Let G be a countable group, and let F be a free factor system of G. Then every minimal (G, F)-tree T with trivial arc stabilizers admits a Lipschitz approximation by (unprojectivized) Grushko (G, F)-trees, whose quotient volumes converge to the quotient volume of T . 5.1 Reduction lemmas To prove Theorem 5.1, we are left showing that every very small minimal (G, F)-tree T can be approximated by a sequence of Grushko (G, F)-trees. By Theorem 3.8, we can approximate every minimal, very small (G, F)-tree T by a sequence of minimal, very small, geometric (G, F)-trees. This approximation is a Lipschitz approximation. If T has dense orbits, then Remark 3.4 implies that the quotient volumes of the trees in the approximation converge to the quotient volume of T , which is equal to 0. More generally, in the case where the Levitt decomposition of T has trivial edge stabilizers, then Lemmas 5.4 and 5.5 below enable us to find a Lipschitz approximation of T by trees Tn whose quotient volumes converge to the quotient volume of T , such that all trees with dense orbits in the Levitt decomposition of the trees Tn are geometric. In this case, the argument from the last paragraph of the proof of Proposition 4.19 shows that the trees Tn themselves are geometric. To complete the proof of Theorems 5.1 and 5.3, we are left understanding how to approximate minimal, very small, geometric (G, F)-trees by minimal Grushko (G, F)-trees. Our proof of Theorems 5.1 and 5.3 will make use of the following lemmas, which enable us to approximate very small (G, F)-trees that split as graphs of actions, as soon as we are able to approximate the vertex actions. Lemma 5.5 is a version of Guirardel’s Reduction Lemma in [9, Section 4], where we keep track of the fact that the approximations of the trees are Lipschitz approximations. In Lemma 5.6, we tackle the problem of approximating trees with nontrivial arc stabilizers by Grushko (G, F)trees. Our argument may be seen as an interpretation of Cohen and Lustig’s twisting argument for approximating such trees [2]. We consider graphs of actions, instead of restricting ourselves to simplicial trees. We first recall Guirardel’s Reduction Lemma from [9, Section 4]. In the statements below, all limits are nonprojective. Lemma 5.4. (Guirardel [9, Section 4]) Let T be a very small (G, F)-tree that splits as a graph of actions G. Assume that all pointed vertex actions (T v , (uv1 , . . . , uvk )) admit an approximation by a sequence of pointed (Gv , F|Gv )-actions ((Tnv , (uv1,n , . . . , uvk,n )))n∈N , in 26 which the approximation points are fixed by the adjacent edge stabilizers. For all n ∈ N, let Tn be the (G, F)-tree obtained by replacing all vertex actions (T v , (uv1 , . . . , uvk )) by their approximation (Tnv , (uv1,n , . . . , uvk,n )) in G. Then (Tn )n∈N converges to T . We say that a sequence ((Tn , (u1n , . . . , ukn )))n∈N of pointed (G, F)-trees is a Lipschitz approximation of a pointed (G, F)-tree (T, (u1 , . . . , uk )) if ((Tn , (u1n , . . . , ukn )))n∈N converges to (T, (u1 , . . . , uk )), and for all n ∈ N, there exists a 1-Lipschitz G-equivariant map fn : Tn → T such that for all i ∈ {1, . . . , k}, we have fn (uin ) = ui . Guirardel’s Reduction Lemma can be refined in the following way. Lemma 5.5. Let T be a very small (G, F)-tree with trivial arc stabilizers, that splits as a (G, F)-graph of actions G. If all pointed vertex trees (T v , (uv1 , . . . , uvk )) of G admit Lipschitz approximations by pointed Grushko (Gv , F|Gv )-trees, in which the approximation points uv1,n , . . . , uvk,n are fixed by the adjacent edge stabilizers, then T admits a Lipschitz approximation by Grushko (G, F)-trees. Lemma 5.6. Let T be a minimal, very small (G, F)-tree, that splits as a (G, F)-graph of actions over a one-edge (G, F)-free splitting (where the vertex actions need not be minimal). If the minimal subtrees of all vertex trees of G (with respect to the action of their stabilizer Gv ) admit approximations by minimal Grushko (Gv , F|Gv )-trees, then T admits an approximation by minimal Grushko (G, F)-trees. Figures 5, 7, and 8 provide examples of trees for which the vertex actions of the splitting are not minimal (but they are minimal in the sense of pointed trees when we keep track of the attaching points). These are the crucial cases of Lemma 5.6, in which we deal with the problem of approximating trees with nontrivial arc stabilizers. Considering nonminimal vertex actions is crucial to deal with the simplicial case in Theorem 5.1 (when there are edges with nontrivial stabilizers), and Lemma 5.6 provides a new interpretation of Cohen and Lustig’s argument for dealing with this case. Lemma 5.6 will also be crucial for dealing with the case of geometric actions of surface type containing nontrivial arc stabilizers. Proof. We will provide a detailed argument in the case where the (G, F)-free splitting S is a free product, and explain how to adapt the argument to the case of an HNN extension. Case 1 : The splitting S is of the form G = A ∗ B. The following description of G is illustrated in Figure 5. We denote by L the length of the edge of G, which might be equal to 0. Denote by T A and T B the vertex trees of G, and by uA ∈ T A and uB ∈ T B the corresponding attaching points. The trees T A and A B T B may fail to be minimal, we denote by Tmin and Tmin their minimal subtrees. Up A to enlarging L if necessary, we can assume that the set T A r Tmin is either empty (in A the case where T is minimal), or consists of the orbit of a single point in the closure of A , or consists of the orbit of a nondegenerate half-open arc with nontrivial stabilizer. Tmin We will explain how to approximate the tree (T A , uA ) by a sequence of pointed Grushko (A, F|A )-trees. By approximating the pointed tree (T B , uB ) in the same way, our claim then follows from Guirardel’s Reduction Lemma (Lemma 5.4). If T A is minimal, we can approximate (T A , uA ) by a sequence of pointed Grushko A A (A, F|A )-trees (TnA , uA n ) by assumption (by choosing un to be an approximation of u in the tree TnA , provided by the definition of the equivariant Gromov–Hausdorff topology). 27 A y TA vA A A y Tmin B y TB lA L uA uB hcA i hcA i lB hcB i hcB i vB B B y Tmin Figure 5: The splitting of T as a graph of actions in Case 1 of the proof of Lemma 5.6. A consists of the orbit of a single point This also remains true in the case where T A r Tmin A A u in the closure of Tmin . Indeed, in this case, we can first approximate uA by a sequence A )N , and then choose for each n ∈ N an approximation uA of u′ of points (u′n )n∈N ∈ (Tmin n n A . in an approximation of Tmin A consists of the orbit of a nondegenerate arc [uA , v A ] We now assume that T A r Tmin with nontrivial stabilizer, whose length we denote by lA . We choose the notations so A . We will also first assume that T A that v A ∈ Tmin min is not reduced to a point. As T is very small, the stabilizer hcA i of the arc [uA , v A ] is cyclic, closed under taking roots, and non-peripheral. As tripod stabilizers are trivial in T , the point v A is an endpoint of A fixed by cA . If this arc is nondegenerate, then we let w A be its other the subarc of Tmin endpoint. Otherwise, we let wA be any point that is not equal to v A . A A Let (Tmin,n )n∈N be an approximation of Tmin by minimal Grushko (A, F|A )-trees. A A A Denote by vn (respectively wn ) an approximation of v A (resp. wA ) in the tree Tmin,n , provided by the definition of convergence in the equivariant Gromov–Hausdorff topology. A We can assume that for all n ∈ N, the point vnA belongs to the axis of cA in Tmin,n . We refer to Figure 6 for an illustration of the following construction. For all n ∈ N, A A let (TnA , uA n ) be the pointed tree obtained from (T , u ) in the following way. We start A A by equivariantly unfolding the arc [u , v ] to obtain a tree TeA that contains an edge e0 of length lA with trivial stabilizer. We then equivariantly replace the pointed tree A , v A ) in the graph of actions defining T eA by its approximation (T A , v A ), to get (Tmin min,n n A A A f a tree Tn . Finally, we define the tree (T , u ) in the following way: the tree (T A , uA ) n n n n fn A , uA ) by fully folding the edge e0 along the axis of cA in T A , is obtained from (T min,n A A A A A A f in a direction that does not contain wn . We denote by fn : (Tn , u ) → (Tn , un ) the folding map. A A We now prove that the pointed trees (TnA , uA n ) converge to (T , u ). Lemma 5.4 fn A , uA ) converge to (TeA , uA ). For all n ∈ N, there is a 1implies that the trees (T A fn , uA ) → (TnA , uA Lipschitz G-equivariant map fnA : (T n ). This implies that for all A A g ∈ G, we have dTnA (un , gun ) ≤ d f A (uA , guA ). Therefore, up to possibly passing to Tn A A a subsequence, the pointed trees (TnA , uA n ) converge to a pointed tree (T∞ , u∞ ) in the Gromov–Hausdorff equivariant topology, that is minimal in the sense of pointed G-trees. A , uA ), Proposition 1.5 shows that there exists a 1-Lipschitz map f A : (TeA , uA ) → (T∞ ∞ A denotes the metric completion of T A . We will show that f A factors through where T∞ ∞ A , uA ), and that g A is an isometry between (T A , uA ) and a map gA : (T A , uA ) → (T∞ ∞ A , uA ). This will imply that the pointed trees (T A , uA ) converge to (T A , uA ). (T∞ n n ∞ A We first notice that for all n ∈ N, the map fnA is an isometry in restriction to Tmin,n . A A By taking limits, this implies that the A-minimal subtree Tmin of T isometrically emA . In addition, for all n ∈ N, the point uA belongs to the axis of cA in beds into T∞ n 28 fn A T A A y Tmin,n cA wnA vnA lA uA TeA convergence A A v A y Tmin lA {1} uA fold uA n TA A A v A y Tmin fnA lA hcA i uA hcA i gA = id convergence (TnA , uA n) A , uA ) (T∞ ∞ Figure 6: The situation in Case 1 of the proof of Lemma 5.6. Tn . By definition of the equivariant Gromov–Hausdorff topology on the set of pointed A A (G, F)-trees, this implies that cA fixes uA ∞ in T∞ . Similarly, the element c fixes all A A A A points of the image of [u , v ] in T . Therefore, the map f factors through a map A A can A , uA ). As T A gA : (T A , uA ) → (T∞ ∞ min isometrically embeds into T∞ , the map g only decrease the length of the segment [uA , v A ], and fold this segment over a subarc of [v A , wA ]. A Let g ∈ A be an element that is hyperbolic in Tmin (we recall that we have asA sumed Tmin not to be reduced to a point), such that dT A (v A , gv A ) = dT A (wA , gwA ) + 2dT A (v A , wA ). In particular, we have dT A (uA , guA ) = dT A (wA , gwA )+2lA +2dT A (v A , wA ). Using the fact that we folded in a direction that did not contain wn , together with the definition of the equivariant Gromov–Hausdorff topology, we get that the distance A A A A A A dTnA (uA n , gun ) gets arbitrarily close to dTnA (wn , gwn ) + 2l + 2dT A (v , w ) as n tends to A A A A A A + 2d A A +∞, so dT∞ A (u∞ , gu∞ ) = dT A (w , gw ) + 2l T A (v , w ). This implies that g is A , uA ), and we are done. an isometry from (T A , uA ) to (T∞ ∞ A A If Tmin is reduced to a point, then it can be approximated by a sequence (Tmin,n )n∈N 1 of Grushko (A, F|A )-trees, where all edge lengths are equal to n , which we choose to be all homothetic to each other. We also choose two distinct constant sequences vnA and wnA A in the trees Tmin,n , and construct the trees TnA as above. Let g ∈ A be any element such that dTnA (vnA , gvnA ) = dTnA (wnA , gwnA ) + 2dTnA (vnA , wnA ) for all n ∈ N. Arguing similarly as A A A A defined as above, we get that dT∞ A (u∞ , gu∞ ) = 2l . This again implies that the map g above is an isometry. Case 2 : The splitting S is of the form G = C∗. 29 fA hc2 i C C y Tmin l2 v2 v1 hc1 i hc2 i u2 l3 t l1 u 1 hc1 i C y TC Figure 7: The splitting of T as a graph of actions in Cases 2.1, 2.2 and 2.5 of the proof of Lemma 5.6. The vertex tree T C of G may fail to be minimal. We denote by u1 and u2 two points in T C in the orbits of the attaching points (the points u1 and u2 may belong to the same C of the C-minimal G-orbit). We denote by v1 and v2 their projections to the closure Tmin subtree of T . One of the following cases occurs. Case 2.1 : The segments [u1 , v1 ] and [u2 , v2 ] are nondegenerate, and their stabilizers are nontrivial and nonconjugate in C. In other words, the tree T splits as a graph of actions that has the shape displayed on Figure 7, where l1 , l2 > 0, and the stabilizers hc1 i and hc2 i are nonconjugate. We allow the case where v1 and v2 belong to the same G-orbit. For all i ∈ {1, 2}, we let wi be C , if this arc is nondegenerate, such that [vi , wi ] is the maximal arc fixed by ci in Tmin and we let wi be any point distinct from vi otherwise (as in Case 1, one has to slightly C is reduced to a point). Let T eC be the tree obtained from adapt the argument when Tmin C T by replacing the edges [u1 , v1 ] and [u2 , v2 ] by edges of the same length with trivial stabilizer. For all i ∈ {1, 2}, let vn,i (resp. wn,i ) be an approximation of vi (resp. wi ) in C . We can assume v an approximation of Tmin n,i to belong to the translation axis of ci . C C fn , u1 , u2 ) be the approximation of (Te , u1 , u2 ) obtained from an approximation Let (T C of Tmin by adding an edge of length l1 (resp. l2 ) with trivial stabilizer at vn,1 (resp. fn C by G-equivariantly fully folding the edge vn,2 ). Let TnC be the tree obtained from T [ui , vn,i ] along the axis of ci , in a direction that does not contain wn,i , for all i ∈ {1, 2}. fn C → TnC the corresponding morphism. Arguing as in Case 1, one We denote by fnC : T shows that the trees (TnC , fnC (u1 ), fnC (u2 )) converge to (T C , u1 , u2 ). Let now Tn be the tree obtained by replacing (T C , u1 , u2 ) by its approximation (TnC , fnC (u1 ), fnC (u2 )) in the graph of actions G. Lemma 5.4 implies that the trees Tn converge to T . Case 2.2 : The segments [u1 , v1 ] and [u2 , v2 ] are nondegenerate and have nontrivial stabilizers that are conjugate in C, and no two nondegenerate subsegments of [u1 , v1 ] and [u2 , v2 ] belong to the same G-orbit. Again, the tree T splits as a graph of actions that has the shape displayed on Figure 7, where this time the groups hc1 i and hc2 i are conjugate. Up to a good choice of the stable letter t, we can assume that hc1 i = hc2 i. As tripod stabilizers are trivial in T , the 30 t C C y Tmin hci v := v1 = v2 l1 hci l3 u1 u2 hci hci l2 C y TC Figure 8: The splitting of T as a graph of actions in Case 2.3 of the proof of Lemma 5.6. C . Again, we let T eC be the tree segment [v1 , v2 ] is the maximal arc fixed by c1 in Tmin C obtained from T by replacing the edges [u1 , v1 ] and [u2 , v2 ] by edges of the same length with trivial stabilizer. For all i ∈ {1, 2}, let vn,i be an approximation of vi in an approxiC by minimal Grushko (C, F )-trees, which we can assume to belong to the mation of Tmin |C C fn , u1 , u2 ) be the approximation of (TeC , u1 , u2 ) obtained translation axis of c1 . Let (T C from an approximation of Tmin by adding an edge of length l1 (resp. l2 ) with trivial fn C by G-equivariantly stabilizer at vn,1 (resp. vn,2 ). The tree TnC is then obtained from T fully folding the edges [u1 , vn,1 ] and [u2 , vn,2 ] along the axis of c1 in opposite directions. The folding directions should not contain the segment [vn,1 , vn,2 ], in case this segment fn C → T C the corresponding morphism, the is nondegenerate. Again, denoting by fnC : T n trees (TnC , fnC (u1 ), fnC (u2 )) converge to (T C , u1 , u2 ). The trees Tn obtained by replacing (T C , u1 , u2 ) by (TnC , fnC (u1 ), fnC (u2 )) in G converge to T . Case 2.3 : Some nondegenerate subsegments of [u1 , v1 ] and [u2 , v2 ] belong to the same G-orbit, and their common stabilizer is nontrivial. Using the fact that tripod stabilizers in T are trivial, we can assume that v1 = v2 (and we let v := v1 = v2 ), and that [u1 , v] ⊆ [u2 , v]. The tree T splits as a graph of actions that has the form displayed on Figure 8. We let w be such that [v, w] is the maximal C arc fixed by c in Tmin if this arc is nondegenerate, and choose any w 6= v otherwise (as C in Case 1, one has to slightly adapt the argument if Tmin is reduced to a point). Let C e T be the tree obtained from T by replacing the segment [u2 , v] by a segment of same length l1 + l2 with trivial stabilizer. Let vn (resp. wn ) be an approximation of v (resp. C . We can assume v to belong to the translation axis w) in an approximation Yn of Tmin n C f e of c in Yn . Let (Tn , u2 ) be the approximation of (T C , u) obtained from Yn by adding an edge of length l1 + l2 with trivial stabilizer at vn . The tree TnC is then obtained from fn C by G-equivariantly fully folding the edge [u2 , vn ] along the axis of c, in a direction T fn C → TnC the corresponding morphism, that does not contain wn . Denoting by fnC : T the trees (TnC , fnC (u1 ), fnC (u2 )) converge to (T C , u1 , u2 ). Again, the trees Tn obtained by replacing (T C , u1 , u2 ) by (TnC , fnC (u1 ), fnC (u2 )) in G converge to T . Case 2.4 : Some nondegenerate subsegments of [u1 , v1 ] and [u2 , v2 ] belong to the same G-orbit, and they have trivial stabilizer. Then T splits as a graph of actions of the form displayed on Figure 9. This case may be viewed as a particular case of Case 1. 31 C C y Tmin t C y TC Figure 9: The splitting of T as a graph of actions in Case 2.4 of the proof of Lemma 5.6. Case 2.5 : One of the subsegments [u1 , v1 ] or [u2 , v2 ] is degenerate. This case is treated in a similar way as Case 2.1, and left to the reader. 5.2 Dynamical decomposition of a geometric very small (G, F )-tree Every geometric very small (G, F)-tree splits as a graph of actions, which has the following description. Proposition 5.7. Any very small geometric (G, F)-tree T splits as a graph of actions G, where for each nondegenerate vertex action Y , with vertex group GY , and attaching points v 1 , . . . , v k fixed by subgroups H 1 , . . . , H k , either • the tree Y is an arc containing no branch point of T except at its endpoints, or • the group GY is the fundamental group of a 2-orbifold with boundary Σ holding an e or arational measured foliation, and Y is dual to Σ, • there exists a Lipschitz approximation of Y by pointed Grushko (GY , F|GY )-trees (Yn , (vn1 , . . . , vnk )), whose quotient volumes converge to 0, such that for all n ∈ N, there exists a morphism fn : Yn → Y , with fn (vni ) = v i for all i ∈ {1, . . . , k}, and vni is fixed by H i for all i ∈ {1, . . . , k} and all n ∈ N. We call G the dynamical decomposition of T , it is determined by T . Vertex actions of the third type are called exotic. In case no vertex action is exotic, we say that T is of surface type. The proof of Proposition 5.7 goes as follows. Let T be a geometric (G, F)-tree, and let K ⊆ T be a finite subtree such that T = TK . Let A := Σ/G, where Σ is the band complex defined in Section 3.1. Let A∗ be the complement of the singular set in F ⊆ A (where F is the compact forest defined in Section 3.3), endowed with the restriction of the foliation of Σ. Let C ∗ ⊆ A∗ be the union of the leaves of A∗ which are closed but not compact. The cut locus of A is defined as C := C ∗ ∪ Sing. The set A r C is a union of finitely many open sets U1 , . . . , Up , which are unions of leaves of A∗ . By a classical result of Imanishi [16], see also [7, Section 3], for all i ∈ {1, . . . , p}, either every leaf of Ui is compact, or else every leaf of Ui is dense in Ui . Notice that each component Ui is again dual to a finite system of isometries. As noticed in [11, Propositions 1.25 and 1.31], Imanishi’s theorem provides a transe be the lift of the cut locus to Σ. Given a verse covering of T in the following way. Let C e we let TU be the tree dual to the foliated 2-complex U , i.e. the component U of Σ r C, leaf space made Hausdorff of U . Then the family {TU }U is a transverse covering of T . Each TU is either an arc (in the case where every leaf of the image of U in A is compact) or has dense orbits (in the case where all leaves of the image of U in A are dense). Associated to this transverse covering of T is a graph of actions, whose vertex groups are 32 finitely generated, and whose vertex actions are dual to foliated 2-complexes. In addition, arc stabilizers in the vertex actions with dense orbits are trivial (Proposition 4.17). Therefore, we can apply [11, Proposition A.6] to each of the vertex actions with dense orbits. This provides a classification of vertex actions with dense orbits into three types (axial, surface and exotic). As our system of partial isometries on F has independent generators (Lemma 3.9), all vertex actions with dense orbits of the decomposition are dual to finite systems of isometries with independent generators. This excludes the axial case, see [5, Proposition 3.4]. The existence of the Lipschitz approximation with the required properties in the exotic case was proved by Guirardel in [9, Proposition 7.2], using a pruning and narrowing argument. We finish this section by mentioning a consequence of Proposition 5.7, that will turn out to be useful in [14]. Lemma 5.8. Let T be a small, minimal (G, F)-tree. If there exists a subgroup H ⊆ G that is elliptic in T , and not contained in any proper (G, F)-free factor, then T is geometric of surface type. Proof. If T is geometric, this follows from Proposition 5.7, so we assume that T is nongeometric. Up to replacing H by the point stabilizer of T in which it is contained, we can assume that rkK (H) < +∞. Theorem 3.8 lets us approximate T by a sequence (Tn )n∈N of small, minimal geometric (G, F)-trees, in which H is elliptic. The trees Tn come with morphisms onto T . As T is nongeometric, Corollary 3.6 ensures that the trees Tn contain an edge with trivial stabilizer. This implies that H is contained in a proper (G, F)-free factor, a contradiction. 5.3 Trees of surface type Let T be a very small geometric (G, F)-tree of surface type (where we recall the definition from the paragraph below Proposition 5.7). Let G be the dynamical decomposition of T , and let S be the skeleton of the corresponding transverse covering. It follows from Proposition 5.7 that there are three types of vertices in S, namely: vertices of surface type, of arc type, and vertices associated to nontrivial intersections between the trees of the transverse covering, which we call vertices of trivial type. All edge stabilizers in S are cyclic (possibly finite or peripheral). Indeed, stabilizers of edges adjacent to vertices of surface type are either trivial, or they are cyclic, and represent boundary curves or conical points of the associated orbifold. Both edges adjacent to vertices of arc type have the same stabilizer, equal to the stabilizer of the corresponding arc in T , which is cyclic because T is very small. Definition 5.9. Let T be a very small geometric (G, F)-tree of surface type, and let σ be a compact 2-orbifold arising in the dynamical decomposition G of T . Let g ∈ G be an element represented by a boundary curve of σ. We say that g is used in T if either g is peripheral, or g is conjugate into some adjacent edge group of G. Otherwise g is unused in T . Proposition 5.10. Let T be a minimal, very small, geometric (G, F)-tree of surface type. Then either there exists an unused element in T , or T splits as a (G, F)-graph of actions over a one-edge (G, F)-free splitting. Our proof of Proposition 5.10 is based on the following lemma. Given a group G, and a family Y of subgroups of G, we say that G splits as a free product relatively to 33 Y if there exists a splitting of the form G = A ∗ B, such that every subgroup in Y is conjugate into either A or B. Lemma 5.11. Let G be a countable group, and let F be a free factor system of G. Let T be a minimal, simplicial (G, F)-tree, whose edge stabilizers are all cyclic and nontrivial (they may be finite or peripheral). Then there exists a vertex v in G, such that Gv splits as a free product relative to incident edge groups and subgroups in F|Gv . Let T, T ′ be two simplicial (G, F)-trees. A map f : T → T ′ is a G-equivariant edge fold (or simply a fold) if there exist two edges e1 , e2 ⊆ T , incident to a common vertex in T , such that T ′ is obtained from T by G-equivariantly identifying e1 and e2 , and f : T → T ′ is the quotient map. A fold f : T → T ′ is determined by the orbit of the pair of edges (e1 , e2 ) identified by f . We say that f is • of type 1 if e1 and e2 belong to distinct G-orbits of oriented edges in T , and both e1 and e2 have nontrivial stabilizer, and • of type 2 if e1 and e2 belong to distinct G-orbits of oriented edges in T , and either e1 or e2 (or both) has trivial stabilizer in T , and • of type 3 if e1 and e2 belong to the same G-orbit of oriented edges in T . Assume that f : T → T ′ is a fold. We note that if H ⊆ G is a subgroup of G that fixes an edge e1 ⊆ T ′ , and ee1 is an edge in the f -preimage of e1 in T , then H fixes an extremity of ee1 . We start by making the following observation. Lemma 5.12. Let T and T ′ be two simplicial (G, F)-trees with cyclic edge stabilizers. Assume that T ′ is obtained from T by performing a fold f of type 2 or 3. If e′1 and e′2 are two edges of T that are identified by f , then either e′1 or e′2 (or both) has trivial stabilizer. Proof of Lemma 5.11. Let T0 be any Grushko (G, F)-tree. All point stabilizers in T0 are elliptic in T , so up to possibly collapsing some edges in T0 , and subdividing edges of T0 , there exists a simplicial map f : T0 → T (i.e. sending vertices to vertices and edges to edges). By [23, 3.3], the map f can be decomposed as a sequence of G-equivariant edge folds fi : Ti → Ti+1 . We can assume that along the folding sequence, we always perform edge folds of type 1 before performing edge folds of type 2 and 3, and we always perform edge folds of type 2 before edge folds of type 3, for as long as possible. This is possible because the number of orbits of edges decreases when performing a fold of type 1 or 2. We claim that we can also assume that folds are maximal in the following sense: if g fixes an edge e in T , then we never identify a preimage e′ of e with a translate of the form gk e′ without identifying it with ge′ . Assume otherwise, and let i be the first time at which a non-maximal fold occurs. Let e′ be a preimage of e in Ti , having a vertex y stabilized by gk , so that we fold e′ and gk e′ when passing from Ti to Ti+1 . By our choice of i and the fact that edge stabilizers in T are cyclic, the edge e′ has trivial stabilizer in Ti (in particular, the fold performed from Ti to Ti+1 is not of type 1). The element g is also elliptic in Ti . We let x be the point closest to y that is fixed by g in Ti . If x = y, then we could choose to identify e′ and ge′ when passing from Ti to y. Otherwise, all edges in the segment [x, y] ⊆ Ti are stabilized by g k . Our choice of i implies that the stabilizer of their images in T is equal to gk (and not to any proper root of g k ). Since the 34 image of e′ in T is stabilized by g, this implies that we can find two consecutive edges on the segment [x, y] that are identified in T . This shows that one could perform a fold of type 1 on the tree Ti , contradicting our choice of folding path. Let Tk be the last tree along the folding sequence that contains an edge with trivial stabilizer. The fold fk is either of type 2 or of type 3. It identifies an edge ek of Tk with trivial stabilizer with some translate gek with g ∈ G (although the pair (ek , gek ) might not be the defining pair of the edge fold). We can assume hgi to be maximal in the following sense: if g is of the form hl with h ∈ G and l > 1, then ek is not identified with hek . We claim that Tk+1 = T . We postpone the proof of the claim to the next paragraph, and first explain how to derive the lemma from this claim. Let vk be the vertex of ek such that gvk = vk , and vk′ be the other vertex of ek . Notice that Gvk′ is nontrivial: otherwise, all edges in Tk adjacent to vk′ would have trivial stabilizer, and there would be at least three distinct G-orbits of such edges. Since the fold fk involves at most two orbits of edges, there would be an edge with trivial stabilizer in Tk+1 , contradicting the definition of Tk+1 . If fk is a fold of type 3, defined by the pair (ek , gek ), then the vertex fk (vk′ ) satisfies the conclusion of the lemma. Indeed, we have Gfk (vk′ ) = Gvk′ ∗ hgi. If fk is a fold of type 2, then fk identifies ek with an edge e′k with nontrivial stabilizer, because otherwise Tk+1 would contain an edge with trivial stabilizer. Denote by vk′′ the vertex of e′k distinct from vk . If vk′ and vk′′ do not belong to the same G-orbit, then we have a nontrivial splitting Gfk (vk′ ) = Gvk′ ∗ Gvk′′ . If vk′ and vk′′ belong to the same G-orbit, then we have a nontrivial splitting Gfk (vk′ ) = Gvk′′ ∗ Z. In both cases, this splitting is relative to incident edge groups and to F|Gv , because all trees along the folding sequence are (G, F)-trees. We now prove the above claim that Tk+1 = T . Assume towards a contradiction that Tk+1 6= T . It follows from our choice of folding path, and the fact that T has cyclic edge stabilizers, that all possible folds in Tk+1 identify two edges e1 and e2 at fk (vk′ ) in distinct G-orbits, and e1 and e2 have the same nontrivial stabilizer H in Tk+1 . Let ee1 (resp. ee2 ) be an edge in Tk in the fk -preimage of e1 (resp. e2 ). The group H fixes an extremity of both ee1 and ee2 . If ee1 and ee2 were disjoint, then H would fix the segment between them, a contradiction (Lemma 5.12). Therefore, the edges ee1 and ee2 are adjacent in Tk . By our choice of folding path, at least one of them, say ee1 , has trivial stabilizer (otherwise we could perform a fold of type 1 in Tk identifying ee1 and ee2 ), and hence belongs to the G-orbit of ek . Since it is possible to fold ee1 and ee2 in Tk , the fold fk is of type 2. Hence fk identifies ee1 with an edge e3 whose stabilizer is equal to H. Then e3 is adjacent to e2 , and is identified with e2 in T , so we could have performed a fold of type 1 in Tk , a contradiction. Proof of Proposition 5.10. Let S be the skeleton of the dynamical decomposition of T . If S is reduced to a point, then T is dual to a minimal measured foliation on a compact 2-orbifold σ. Some boundary component c of σ represents a nonperipheral conjugacy class. Indeed, all boundary components of a compact 2-orbifold cannot be elliptic in a common free splitting of the fundamental group of the orbifold. Then c is an unused element in T . Now assume that S is a nontrivial minimal (G, F)-tree. If S contains an edge with trivial stabilizer, then this edge defines a (G, F)-free splitting, and T splits as a graph of actions over this splitting by [10, Lemma 4.7]. Otherwise, let v be a vertex of S provided by Lemma 5.11. We note that the vertex v cannot be of arc type, because a vertex of arc type has a stabilizer equal to the stabilizer of the incident edges. If v is of surface type, it is 35 associated to a compact 2-orbifold σ, equipped with a minimal measured foliation. The fundamental group of σ splits as a free product relatively to incident edge groups and to subgroups in F|π1 (σ) . This implies the existence of an unused element in T , otherwise π1 (σ) would split as a free product in which all boundary components of σ are elliptic. If v is of trivial type, then we get a one-edge (G, F)-free splitting S0 that is compatible with S, by splitting the vertex group Gv . Associated to each vertex of S0 with vertex group Gv′ is a geometric (possibly trivial) Gv′ -action Tv′ . The tree T splits as a graph of actions over S0 , with the trees Tv′ as vertex actions. 5.4 Approximating very small geometric (G, F )-trees by Grushko (G, F )trees Proof of Theorems 5.1 and 5.3. Let T be a very small, minimal (G, F)-tree. We want to show that we can approximate T by a sequence of minimal Grushko (G, F)-trees, and that the approximation can be chosen to be a Lipschitz approximation, by trees whose quotient volumes converge to the quotient volume of T , if T has trivial arc stabilizers. We will argue by induction on rkK (G, F). The claim holds true when rkK (G, F) = 1, so we assume that rkK (G, F) ≥ 2. The claim also holds true if T is reduced to a point. Thanks to Theorem 3.3, we can assume T to be geometric. (For the statement about quotient volumes, see the argument at the beginning of Section 5.1). By Proposition 5.7, the tree T decomposes as a graph of actions whose vertex actions are either arcs, or of surface or exotic type. Proposition 5.7 also enables us to approximate all exotic vertex actions. Using Lemmas 5.4 and 5.5, we can therefore reduce to the case where T is a tree of surface type (notice that all edges of the decomposition as a graph of actions whose stabilizer is noncyclic, or nontrivial and peripheral, have length 0). First assume that there exists an unused element c in T , corresponding to a boundary curve in a minimal orbifold σ of the dynamical decomposition. One can then narrow the band complex by width δ > 0 from c to get a Lipschitz approximation of T : this is done by cutting a segment on Σ of length δ (arbitrarily small) transverse to the boundary curve c and to the foliation. In this way, all leaves of the foliations become segments (halfleaves of the original foliation on σ are dense), so the tree dual to the foliated complex by which the minimal foliation on σ has been replaced is simplicial. By choosing δ > 0 arbitrarily close to 0, we can ensure the volume of this tree to be arbitrarily small. In the new band complex obtained in this way, the orbifold σ has therefore been replaced by a simplicial component, with trivial edge stabilizers. We thus reduce to the case where no element of G is unused in T . Lemma 5.10 thus ensures that T splits as a (G, F)-graph of actions over a one-edge (G, F)-free splitting, and we can conclude by induction, using Lemmas 5.5 and 5.6. 6 Tame (G, F )-trees We finish this paper by introducing another class of (G, F)-trees, larger than the class of very small (G, F)-trees, which we call tame (G, F)-trees. This class will turn out to provide the right setting for carrying out our arguments in [13] to describe the Gromov boundary of the graph of cyclic splittings of (G, F). Definition 6.1. A minimal (G, F)-tree is tame if it is small, and has finitely many orbits of directions at branch points. 36 There exist small (G, F)-actions that are not tame. A typical example is the following: a sequence of splittings of F2 = ha, bi of the form F2 = (hai ∗ha2 i ha2 i ∗ha4 i · · · ∗ha2n i k n ha2 i) ∗ hbi, in which the edge with stabilizer generated by a2 has length 21k , converges to a small F2 -tree with infinitely many orbits of branch points. By the discussion in Section 4.3, the class of tame (G, F)-trees is the right class of trees in which Levitt’s decomposition makes sense. Theorem 6.2. (Levitt [18, Theorem 1]) Let G be a countable group, and let F be a free factor system of G. Then every tame (G, F)-tree splits uniquely as a graph of actions, all of whose vertex trees have dense orbits for the action of their stabilizer, such that the Bass–Serre tree of the underlying graph of groups is small, and all its edges have positive length. However, the above example of a small (G, F)-tree that is not tame shows that the space of tame (G, F)-trees is not closed. We will describe conditions under which a limit of tame trees is tame. It will be of interest to introduce yet another class of (G, F)-trees. The equivalences in the definition below are straightforward. Definition 6.3. Let k ∈ N∗ . A small minimal (G, F)-tree is k-tame if one of the following equivalent conditions occurs. • For all nonperipheral g ∈ G and all arcs I ⊆ T , if hgi ∩ Stab(I) is nontrivial, then its index in hgi divides k. • For all nonperipheral g ∈ G, and all l ≥ 1, we have Fix(g l ) ⊆ Fix(gk ). • For all nonperipheral g ∈ G, and all l ≥ 1, we have Fix(g kl ) = Fix(gk ). Notice in particular that 1-tame (G, F)-trees are those (G, F)-trees in which all arc stabilizers are either trivial, or maximally-cyclic and nonperipheral. Proposition 6.4. For all k ∈ N∗ , the space of k-tame (G, F)-trees is closed in the space of small minimal (G, F)-trees. Proof. Let T be a small, minimal (G, F)-tree, and let (Tn )n∈N be a sequence of k-tame (G, F)-trees that converges to T . Let g ∈ G, and assume that there exists l ≥ 1 such that gl fixes a nondegenerate arc [a, b] ⊆ T . If g is hyperbolic in Tn for infinitely many n ∈ N, then Lemma 2.3 implies that g fixes [a, b]. We can therefore assume that for all n ∈ N, the fixed point set In of gl is nonempty. Let an (resp. bn ) be an approximation of a (resp. b) in Tn . Since dTn (gl an , an ) and dTn (gl bn , bn ) both converge to 0, the distances dTn (an , In ) and dTn (bn , In ) both converge to 0. As Tn is k-tame, this implies that the distances of both an and bn to the fixed point set of g k in Tn converge to 0. So both dTn (gk an , an ) and dTn (gk bn , bn ) converge to 0, and therefore gk fixes [a, b] in T . This shows that T is k-tame. Proposition 6.5. A minimal (G, F)-tree is tame if and only if there exists k ∈ N∗ such that T is k-tame. Proof. Let T be a tame minimal (G, F)-tree. By Theorem 6.2, the tree T splits as a graph of actions, all of whose vertex actions have dense orbits for the action of their stabilizer. As tame (G, F)-trees with dense orbits have trivial arc stabilizers by Lemma 4.17, we do not modify the collection of arc stabilizers of T if we collapse all vertex trees to points. We can therefore reduce to the case where T is simplicial. In this case, minimality 37 implies that the G-action on T has finitely many orbits of edges, from which it follows that T is k-tame for some k ∈ N. The converse statement will follow from the following proposition. Proposition 6.6. For all k ∈ N∗ , there exists γ(k) ∈ N such that any k-tame minimal (G, F)-tree has at most γ(k) orbits of directions at branch points. Proof. Let T be a k-tame minimal (G, F)-tree. We first assume that T is geometric. Let G be the dynamical decomposition of T . We recall that all vertex trees of G are either arcs or have dense orbits. As T is geometric, there are finitely many orbits of directions in T (see Corollary 4.8). This implies that arc stabilizers are trivial in the vertex trees of G with dense orbits (Proposition 4.17). If x is a branch or inversion point of T contained in one of the vertex trees with dense orbits Tv of G, then all directions at x contained in Tv have a positive contribution to the index i(T ). It follows from Proposition 4.4 that there is a bound on the number of such orbits of directions. Therefore, we can collapse all the vertex trees with dense orbits to points, and reduce to the case where T is simplicial. In this case, we argue by induction on rkK (G, F), and show that there is a bound γ(k, l) on the number of orbits of directions in any k-tame minimal simplicial (G, F)-tree with rkK (G, F) ≤ l. By splitting one of the vertex stabilizers of the splitting relatively to incident edge stabilizers if needed (which is made possible by Lemma 5.11, and can only increase the number of orbits of directions), we can assume that T contains an edge e with trivial stabilizer. By removing from T the interior of the edges in the orbit of e in T , we get one or two orbits of trees, whose stabilizers have a strictly smaller Kurosh rank. Let T ′ be one of the trees obtained in this way, whose stabilizer we denote by G′ . Then T ′ is k-tame. If T ′ is minimal, then we are done by induction. However, the tree T ′ may fail to be minimal. The quotient graph T ′ /G′ consists of a minimal graph of groups ′ ′ Tmin /G′ , with a segment I = e1 ∪ · · · ∪ en attached to Tmin /G′ at one of its extremities (where we denote by ei the edges in I). All edge groups are cyclic, and they satisfy Gei = Go(ei ) ⊆ Gei+1 for all i ∈ {1, . . . , n − 1}. Since T is k-tame, we have n ≤ k. By ′ induction, there are at most γ(k, l − 1) orbits of directions in Tmin , so we get a uniform bound on the possible number of orbits of directions in T . We have thus shown that there is a uniform bound γ(k) on the possible number of orbits of directions in a minimal k-tame geometric (G, F)-tree. Let now T be a minimal nongeometric (G, F)-tree, and assume that T has strictly more than γ(k) orbits of directions. Arguing as in the proof of Proposition 4.4 in the nongeometric case, we can find a geometric (G, F)-tree T ′ in which we can lift at least γ(k) + 1 orbits of directions. Lemma 3.7 shows that the approximation T ′ can be chosen to be k-tame. This is a contradiction. We finally establish one more condition under which a limit of tame trees is tame, which will be used in [13]. Proposition 6.7. Let (Tn )n∈N be a sequence of simplicial metric small (G, F)-trees that converges to a minimal (G, F)-tree T . If all trees Tn contain a single orbit of edges, then T is tame. We will make use of the following lemma. Lemma 6.8. Let T be a simplicial small (G, F)-tree, with one orbit of edges. Then the fixed point set of any element of G is a star of diameter at most 2 for the simplicial metric on T . 38 Proof. Let e1 and e2 be two edges of T stabilized by a common element g ∈ G. As T has only one orbit of edges, there exists h ∈ G such that he1 = e2 . By choosing an orientation on e1 , this relation defines an orientation on e2 . Then hge1 = ghe1 , which implies that h commutes with g because T is small. Hence h is elliptic in T . This implies that e1 and e2 point in opposite directions in T . As this is true of any pair of edges stabilized by g, the fixed point set of g has the desired description. Proof of Proposition 6.7. Up to possibly passing to a subsequence, one of the following situations occurs. Case 1 : The length of the unique orbit of edges in Tn converges to 0. In this case, we will show that T is very small. This implies that T is 1-tame, and hence tame by Proposition 6.5. We have seen in the proof of Proposition 2.1 that limits of small (G, F)-trees are small, and limits of trees with trivial tripod stabilizers have trivial tripod stabilizers. Let g ∈ G be a nonperipheral element, and assume that there exists l ≥ 1 such that gl fixes a nondegenerate arc [a, b] ⊆ T . Let an (resp. bn ) be an approximation of a (resp. b) in Tn . If g were elliptic in Tn , then both an and bn would be arbitrarily close to the fixed point set Xn of gl in Tn , as n goes to +∞. It follows from Lemma 6.8 that the diameter of Xn in Tn converges to 0 as n tends to +∞. This contradicts the fact that dTn (an , bn ) is bounded below (because a 6= b). Therefore, for n large enough, the element g is hyperbolic in Tn . The distances dTn (an , g l an ) and dTn (bn , gl bn ) converge to 0, so the points an and bn are arbitrarily close to the axis of g in Tn , and ||g||Tn converges to 0. This implies that dTn (an , gan ) and dTn (bn , gbn ) both tend to 0, so g fixes [a, b]. Case 2 : There is a positive lower bound on the length of the unique orbit of edges in Tn . Up to passing to a subsequence and rescaling Tn by a factor λn > 0 converging to some λ > 0, we can assume that all trees Tn have edge lengths equal to 1. This implies that all translation lengths in Tn belong to Z, so all translation lengths in T belong to Z. It follows that T is a simplicial metric tree (see [20, Theorem 10]), so it has finitely many orbits of directions. Since a limit of small (G, F)-trees is small, the tree T is tame. References [1] M. Bestvina and M. Feighn, Outer limits, preprint, http://andromeda.rutgers.edu/ feighn/papers/outer.pdf, 1994. available at [2] M.M. Cohen and M. Lustig, Very small group actions on R-trees and Dehn twist automorphisms, Topology 34 (1995), no. 3, 575–617. [3] M. Culler and J.W. Morgan, Group actions on R-trees, Proc. London Math. Soc. 55 (1987), no. 3, 571–604. [4] M. Culler and K. Vogtmann, Moduli of graphs and automorphisms of free groups, Invent. math. 84 (1986), no. 1, 91–119. [5] D. Gaboriau, Générateurs indépendants pour les systèmes d’isométries de dimension un, Ann. Inst. Fourier 47 (1997), no. 1, 101–122. 39 [6] D. Gaboriau and G. Levitt, The rank of actions on R-trees, Ann. Scient. Éc. Norm. Sup. 28 (1995), no. 5, 549–570. [7] D. Gaboriau, G. Levitt, and F. Paulin, Pseudogroups of isometries of R and Rips’ theorem on free actions on R-trees, Israel J. Math. 87 (1994), no. 3, 403–428. [8] H. Gillet and P.B. Shalen, Dendrology of groups in low Q-ranks, J. Differential Geom. 32 (1990), no. 3, 605–712. [9] V. Guirardel, Approximations of stable actions on R-trees, Comment. Math. Helv. 73 (1998), no. 1, 89–121. [10] , Limit groups and groups acting freely on Rn -trees, Geom. Topol. 8 (2004), 1427–1470. [11] , Actions of finitely generated groups on R-trees, Ann. Inst. Fourier 58 (2008), no. 1, 159–211. [12] V. Guirardel and G. Levitt, The outer space of a free product, Proc. London Math. Soc. 94 (2007), no. 3, 695–714. [13] C. Horbez, Hyperbolic graphs for free products, and the Gromov boundary of the graph of cyclic splittings, arXiv:1408.0544v2 (2014). [14] , The Tits alternative for the automorphism group of a free product, arXiv:1408.0546v2 (2014). [15] , Spectral rigidity for primitive elements of FN , J. Group Theory 19 (2016), no. 1, 55–123. [16] H. Imanishi, On codimension one foliations defined by closed one forms with singularities, J. Math. Kyoto Univ. 19 (1979), no. 2, 285–291. [17] A.G. Kurosh, Die Untergruppen der freien Produkte von beliebigen Gruppen, Math. Ann. 109 (1934), no. 1, 647–660. [18] G. Levitt, Graphs of actions on R-trees, Comment. Math. Helv. 69 (1994), no. 1, 28–38. [19] G. Levitt and F. Paulin, Geometric group actions on trees, Amer. J. Math. 119 (1997), no. 1, 83–102. [20] J.W. Morgan, Λ-trees and their applications, Bull. Amer. Math. Soc. 26 (1992), no. 1, 87–112. [21] F. Paulin, Topologie de Gromov équivariante, structures hyperboliques et arbres réels, Invent. math. 94 (1988), no. 1, 53–80. [22] , The Gromov topology on R-trees, Topol. Appl. 32 (1989), no. 3, 197–221. [23] J.R. Stallings, Topology of Finite Graphs, Invent. math. 71 (1983), no. 3, 551–565. 40
4math.GR
SETS OF LENGTHS arXiv:1509.07462v2 [math.GR] 10 Aug 2016 ALFRED GEROLDINGER Abstract. Oftentimes the elements of a ring or semigroup H can be written as finite products of irreducible elements, say a = u1 · . . . · uk = v1 · . . . · vℓ , where the number of irreducible factors is distinct. The set L(a) ⊂ N of all possible factorization lengths of a is called the set of lengths of a, and the full system L(H) = {L(a) | a ∈ H} is a well-studied means of describing the non-uniqueness of factorizations of H. We provide a friendly introduction, which is largely self-contained, to what is known about systems of sets of lengths for rings of integers of algebraic number fields and for transfer Krull monoids of finite type as their generalization. 1. Introduction We all know that every positive integer can be written as a finite product of irreducibles (primes) and that such a factorization is unique up to the order of appearance. Similar to factorizations in the positive integers, in many rings and semigroups, elements can also be written as finite products of irreducible elements, but unlike the case of the integers, such factorizations need not always be unique. It is the main objective of factorization theory to describe the various aspects of non-uniqueness and to classify them in terms of invariants of the underlying algebraic structure. Before it was extended to commutative ring and semigroup theory, factorization theory had its origin in algebraic number theory, and only in recent years has been extended to non-commutative settings [4, 50]. For further background, we refer the reader to several monographs and conference proceedings [1, 23, 28, 16, 11]. It is no surprise that this development has been chronicled over the years by a series of Monthly articles (from [38] to [6, 5]). While the focus of this interest has been on commutative domains and their semigroups of ideals, such studies range from abstract semigroup theory to the factorization theory of motion polynomials with application in mechanism science [37]. Sets of lengths are the most investigated invariants in factorization theory. To fix notation, if an element a in a semigroup can be written as a product of irreducible elements, say a = u1 · . . . · uk , then k is called the length of the factorization, and the set L(a) ⊂ N of all possible factorization lengths of a is called the set of lengths of a. Under a mild condition on the semigroup, sets of lengths are finite nonempty subsets of N0 , and if there is an element a in the semigroup with |L(a)| > 1 (meaning that a has factorizations of distinct lengths), then sets of lengths can get arbitrarily long (a precise statement of this is in Lemmas 2.1 and 2.2). The goal of this paper is to give a friendly introduction to factorization theory. Indeed, we take the reader on a tour through sets of lengths which is highlighted by two structure theorems (Theorems 2.6 and 5.3), two open problems (Problem 4.7 and the Characterization Problem at the beginning of Section 6), and a conjecture (Conjecture 6.7). In Section 2 we introduce sets of distances and unions of sets of lengths. We provide a full and self-contained proof for the Structure Theorem for Unions of 2010 Mathematics Subject Classification. 11B30, 11R27, 13A05, 13F05, 16H10, 16U30, 20M13. Key words and phrases. Krull monoids, maximal orders, zero-sum sequences; sets of lengths, unions of sets of lengths, sets of distances, elasticities. I would like to thank Daniel Smertnig, Salvatore Tringali, Qinghai Zhong, and all the anonymous referees for their careful reading. Their comments helped me to eliminate a couple of flaws, to improve the presentation of the paper, and to increase its readability. Furthermore, I would like to thank the Scott Chapman for his encouragement to write this survey and all his patience, and Moshe Roitman for showing to me that transfer Krull monoids need not be Mori. This work was supported by the Austrian Science Fund FWF, Project Number P 28864-N35. 1 2 ALFRED GEROLDINGER Sets of Lengths (Theorem 2.6), and outline an argument that finitely generated commutative monoids satisfy all assumptions of that Structure Theorem. In Section 3 we discuss commutative Krull monoids. This class includes Dedekind domains and hence rings of integers of algebraic number fields, and we will provide an extended list of examples stemming from a variety of mathematical areas. The central strategy for studying sets of lengths in a given class of semigroups is to construct homomorphisms (called transfer homomorphisms) which can be used to transfer analogous results in a simpler class of semigroups directly back to the more complex class. In Section 4 we discuss transfer homomorphisms, show that they preserve sets of lengths, and provide a self-contained proof for the fact that there is a transfer homomorphism from commutative Krull monoids to monoids of zero-sum sequences (which are monoids having a combinatorial flavor that will often be the simpler class of semigroups to which the more complex semigroup is reduced). We provide an extended list of transfer Krull monoids (these are the monoids allowing a transfer homomorphism to a monoid of zero-sum sequences), and then we restrict our discussion to this class of monoids. In Section 5 we discuss the Structure Theorem for Sets of Lengths and provide examples showing that all aspects addressed in the Structure Theorem occur naturally. In Section 6 we discuss sets of lengths of the monoid of zero-sum sequences over a finite abelian group (the transfer machinery of Section 4 guarantees that these sets of lengths coincide with the sets of lengths of a ring of integers). They can be studied with methods from Additive Combinatorics and their structure is by far the best understood (among all classes of monoids). In this setting, unions of sets of lengths and the set of distances are intervals and they have natural upper bounds (Proposition 6.1). In spite of the fact that almost all (in a certain sense) sets of lengths are intervals (Theorem 6.3) we conjecture that the system of sets of lengths is a characteristic for the group (Conjecture 6.7). In order to keep this article as self-contained as possible, we do not mention arithmetical concepts beyond sets of lengths (such as catenary and tame degrees), or factorization theory in rings with zero-divisors, or divisibility theory in non-atomic rings. 2. Basic Notation and Unions of Sets of Lengths We denote by N the set of positive integers and set N0 = N ∪ {0}. For integers a, b ∈ Z, we denote by [a, b] = {x ∈ Z | a ≤ x ≤ b} the (discrete) interval between a and b, and by an interval we always mean a set of this form. Let L, L′ ⊂ Z be subsets of the integers. Then L + L′ = {a + b | a ∈ L, b ∈ L′ } is the sumset of L and L′ . Thus we have L + ∅ = ∅, and we set −L = {−a | a ∈ L}. For an integer m ∈ Z, m + L = {m} + L is the shift of L by m. For k ∈ N, we denote by kL = L + . . . + L the k-fold sumset of L and by k · L = {ka | a ∈ L} the dilation of L by k. A positive integer d ∈ N is called a distance of L if there are k, ℓ ∈ L with ℓ − k = d and the interval [k, ℓ] contains no further elements of L. We denote by ∆(L) ⊂ N the set of distances of L. By definition, we have ∆(L) = ∅ if and only if |L| ≤ 1, and L is an arithmetical progression if and only if |∆(L)| ≤ 1 . For L ⊂ N, we denote by ρ(L) = sup L/ min L ∈ Q≥1 ∪ {∞} the elasticity of L and we set ρ({0}) = 1. By a semigroup, we always mean an associative semigroup, and if not stated otherwise, we use multiplicative notation. Let S be a semigroup. We say that S is cancelative if for all elements a, b, c ∈ S, the equation ab = ac implies b = c and the equation ba = ca implies b = c. All rings and semigroups are supposed to have an identity, and all ring and semigroup homomorphisms preserve the identity. By a monoid, we mean a cancelative semigroup. Clearly, subsemigroups of groups are monoids, and finite monoids are groups. If aS ∩ bS 6= ∅ and Sa ∩ Sb 6= ∅ for all a, b ∈ S, then S has a (unique left and right) quotient group which will be denoted by q(S). If R is a ring, then the set of cancelative elements R• is a monoid. A domain D is a ring in which zero is the only zero-divisor (i.e., D• = D \ {0}). We use the abbreviation ACC for the ascending chain condition on ideals. Let P be a set. We denote by F ∗ (P ) the free monoid with basis P , the elements of which may be viewed as words on the alphabet P . We denote by | · | : F ∗ (P ) → N0 the function which maps each word onto its length. The free abelian monoid with basis P will be denoted by F (P ). Every a ∈ F (P ) has a SETS OF LENGTHS 3 unique representation of the form Y a= pνp , where νp ∈ N0 and νp = 0 for almost all p ∈ P . p∈P Therefore, for every p ∈ P , there is a homomorphism (called the p-adic exponent) vp : F (P ) → N0 defined by vp (a) = νp . Similar to the Pcase of free monoids, we denote by |·| : F (P ) → N0 the usual length function, and we observe that |a| = p∈P vp (a) for all a ∈ F (P ). Let H be a monoid and let a, b ∈ H. The element a is said to be invertible if there exists an element a′ ∈ H such that aa′ = a′ a = 1. The set of invertible elements of H will be denoted by H × , and we say that H is reduced if H × = {1}. The element a ∈ H is called irreducible (or an atom) if a ∈ / H × and, for all u, v ∈ H, a = uv implies × × that u ∈ H or v ∈ H . The monoid H is said to be atomic if every a ∈ H \ H × is a product of finitely many atoms of H. While most integral domains introduced in elementary courses are atomic, not all such algebraic objects are. An elementary example of a non-atomic monoid can be found in [10, p. 166]. If a ∈ H and a = u1 · . . . · uk , where k ∈ N and u1 , . . . , uk ∈ A(H), then we say that k is the length of the factorization. For a ∈ H \ H × , we call LH (a) = L(a) = {k ∈ N | a has a factorization of length k} ⊂ N the set of lengths of a. For convenience, we set L(a) = {0} for all a ∈ H × . By definition, H is atomic if and only if L(a) 6= ∅ for all a ∈ H. Furthermore, it is clear that the following conditions are equivalent: (1) L(a) = {1}; (2) a ∈ A(H); (3) 1 ∈ L(a). If a, b ∈ H, then L(a) + L(b) ⊂ L(ab). If H is commutative, then Hred = H/H × = {aH × | a ∈ H} is the associated reduced monoid, and H is called factorial if Hred is free abelian. We say that H is a BF-monoid (or a bounded factorization monoid) if L(a) is finite and nonempty for all a ∈ H. We call L(H) = {L(a) | a ∈ H} the system of sets of lengths of H. So if H is a BF-monoid, then L(H) is a set of finite nonempty subsets of the non-negative integers. We say that H is half-factorial if |L| = 1 for every L ∈ L(H). Clearly, factorial monoids are half-factorial, and in 1960 Carlitz showed that the ring of integers of an algebraic number field is half-factorial if and only if the class group has at most two elements (see Propositions 3.3 and 4.3). Since then, half-factoriality has been a central topic in factorization theory (see, for example, [13, 25, 41]). We focus in this paper on the structure of sets of lengths in non-half-factorial BF-monoids. We start with two simple lemmas. Lemma 2.1. Let H be a monoid. 1. If H satisfies the ACC on principal left ideals and the ACC on principal right ideals, then H is atomic. 2. Suppose that H is atomic. Then H is either half-factorial or for every N ∈ N there is an element aN ∈ H such that |L(aN )| > N . Proof. For ease of discussion, suppose that aH = Ha for all a ∈ H (see [49, Proposition 3.1] for details in the general case). Assume to the contrary that the set Ω of all nonunits a ∈ H that are not products of atoms is nonempty. If a ∈ Ω, then a = bc with nonunits b, c ∈ H, and either b ∈ Ω or c ∈ Ω. Thus for any a ∈ H, there is some a′ ∈ Ω with aH ( a′ H. Starting from an arbitrary a ∈ H, this gives rise to a properly ascending chain of principal ideals, a contradiction. To verify the second statement, suppose that H is atomic but not half-factorial. Then there exist an element a ∈ H, integers k, ℓ ∈ N with k < ℓ, and atoms u1 , . . . , uk , v1 . . . , vℓ ∈ A(H) such that a = u1 · . . . · uk = v1 · . . . · vℓ . Then for every N ∈ N we have aN = (u1 · . . . · uk )ν (v1 · . . . · vℓ )N −ν and hence {ℓN − ν(ℓ − k) | ν ∈ [0, N ]} ⊂ L(aN ). for all ν ∈ [0, N ] ,  4 ALFRED GEROLDINGER Let H be a monoid. A function λ : H → N0 is called a right length function (resp. a left length function) if λ(a) < λ(b) for all a ∈ H and all b ∈ aH \ aH × (resp. all b ∈ Ha \ H × a). Lemma 2.2. Let H be a monoid. 1. H is a BF-monoid if and only if there is a left length function (or a right length function) λ : H → N0 . 2. If H is a BF-monoid, then H satisfies the ACC on principal left ideals and on principal right ideals. 3. Submonoids of free monoids and of free abelian monoids are BF-monoids. Proof. 1. If H is a BF-monoid, then the function λ : H → N0 , defined by a 7→ max L(a) for every a ∈ H, is a right length function and a left length function. Now, if there is a right length function λ : H → N0 , then we have to show that H is a BF-monoid (the proof is completely analogous for left length functions). First we observe that, if b ∈ H × and c ∈ H \ H × = bH \ bH × , then λ(c) > λ(b) ≥ 0. We claim that every a ∈ H \ H × can be written as a product of finitely many atoms, and that sup L(a) ≤ λ(a). If a ∈ A(H), then L(a) = {1}, and the assertion holds. Suppose that a ∈ H is neither an atom nor a unit. Then a has a product decomposition of the form a = u1 · . . . · uk where k ≥ 2 and u1 , . . . , uk ∈ H \ H × . For i ∈ [0, k], we set ai = u1 · . . . · ui , with a0 = 1, and hence ai+1 ∈ ai H \ ai H × for all i ∈ [0, k − 1]. This implies that λ(a) = λ(ak ) > λ(ak−1 ) > . . . > λ(a1 ) > 0 and thus λ(a) ≥ k. Therefore there is a maximal k ∈ N such that a = u1 · . . . · uk where u1 , . . . , uk ∈ H \ H × , and this implies that u1 , . . . , uk ∈ A(H) and k = max L(a) ≤ λ(a). 2. Suppose that H is a BF-monoid. Let λ : H → N0 be a right length function and assume to the contrary that there is a properly ascending chain of principal right ideals a0 H ( a1 H ( a2 H ( . . .. Then λ(a0 ) > λ(a1 ) > λ(a2 ) > . . ., a contradiction. Similarly, we can show that H satisfies the ACC on principal left ideals. 3. Use 1., and note that the restriction of a length function is a length function.  Next we introduce a main parameter describing the structure of sets of lengths, namely [ ∆(L) ∆(H) = L∈L(H) which is the set of distances of H (also called the delta set of H). We open by showing that ∆(H) satisfies a fundamental property. Proposition 2.3. Let H be an atomic monoid with ∆(H) 6= ∅. Then min ∆(H) = gcd ∆(H). Proof. We set d = gcd ∆(H). Clearly, it suffices to show that d ∈ ∆(H). There are t ∈ N, d1 , . . . , dt ∈ ∆(H) and m1 , . . . , mt ∈ Z \ {0} such that d = m1 d1 + . . . + mt dt . After renumbering if necessary, there is some s ∈ [1, t] such that m1 , . . . , ms , −ms+1 , . . . , −mt are positive. For every ν ∈ [1, t], there are xν ∈ N and aν ∈ H such that {xν , xν + dν } ⊂ L(aν ) for every ν ∈ [1, s] and {xν − dν , xν } ⊂ L(aν ) for every ν ∈ [s + 1, t]. This implies that ν {mν xν , mν xν + mν dν } ⊂ L(am ν ) for every ν ∈ [1, s] {−mν xν + mν dν , −mν xν } ⊂ ν ) L(a−m ν and for every ν ∈ [s + 1, t] . −m s+1 ms t 1 · . . . · a−m We set a = am , and observe that L(a) ⊃ t 1 · . . . · as as+1 s t s t n o X X X X k := mν xν − mν xν , ℓ := mν (xν + dν ) − mν (xν − dν ) . ν=1 ν=s+1 ν=1 Since ℓ − k = d ≤ min ∆(H), it follows that d ∈ ∆(L(a)) ⊂ ∆(H). ν=s+1  SETS OF LENGTHS 5 We now introduce unions of sets of lengths. Let H be an atomic monoid, and k, ℓ ∈ N. In the extremal case where H = H × it is convenient to set Uk (H) = {k}. Now suppose that H 6= H × . We define Uk (H) to be the set of all ℓ ∈ N such that we have an equation of the form u1 · . . . · uk = v1 · . . . · vℓ where u1 , . . . , uk , v1 , . . . , vℓ ∈ A(H) . In other words, Uk (H) is the union of sets of lengths containing k. Clearly, we have k ∈ Uk (H), and 1 ∈ Uk (H) if and only if k = 1, and U1 (H) = {1}. Furthermore, we have k ∈ Uℓ (H) if and only if ℓ ∈ Uk (H). Now we define ρk (H) = sup Uk (H) and λk (H) = min Uk (H) , and we call ρk (H) the kth elasticity of H. Since Uk (H) + Uℓ (H) ⊂ Uk+ℓ (H), we infer that (2.1) λk+ℓ (H) ≤ λk (H) + λℓ (H) ≤ k + ℓ ≤ ρk (H) + ρℓ (H) ≤ ρk+ℓ (H) , and we will use these inequalities without further mention. The invariant ρ(H) = sup{ρ(L) | L ∈ L(H)} ∈ R≥1 ∪ {∞} is called the elasticity of H. If k ∈ N and L ∈ L(H) with min L ≤ k, then sup L ≤ ρ(H) min L ≤ kρ(H) and hence ρk (H) ≤ kρ(H). Thus if the elasticity ρ(H) is finite, then H is a BF-monoid and ρk (H) < ∞ for all k ∈ N. The kth elasticities ρk (H) were first studied for rings of integers of algebraic number fields and then in the setting of abstract semigroups [26]. Unions of sets of lengths have been introduced by Chapman and Smith [12] in the setting of commutative Dedekind domains, and the Structure Theorem for Unions of Sets of Lengths (as given in Theorem 2.6) has first been proved in [19] (in a commutative setting). Proposition 2.4. Let H be an atomic monoid with H 6= H × . 1. For every k ∈ N we have ρk (H) = sup{sup L | L ∈ L(H), min L ≤ k} ≥ sup{sup L | L ∈ L(H), k = min L}, and equality holds if ρk (H) < ∞. 2. n ρ (H) o ρk (H) k and ρ(H) = sup k ∈ N = lim k→∞ k k n λ (H) o λk (H) 1 k = inf . k ∈ N = lim k→∞ ρ(H) k k 3. Suppose that ρ(H) < ∞. Then the following statements are equivalent. (a) There is an L ∈ L(H) such that ρ(L) = ρ(H). (b) There is an N ∈ N such that kN ρ(H) = ρkN (H) for all k ∈ N. (c) There is some k ∈ N such that kρ(H) = ρk (H). If one of the above statements holds, then there is some M ∈ N such that ρk (H) − ρk−1 (H) ≤ M for all k ≥ 2. Proof. 1. Let k ∈ N. We define ρ′k (H) = sup{sup L | L ∈ L(H), min L ≤ k}, ρ′′k (H) = sup{sup L | L ∈ L(H), k = min L}, and obtain by definition ρ′k (H) ≥ ρk (H) ≥ ρ′′k (H). Hence we must prove that ρk (H) ≥ ρ′k (H), and if ρk (H) < ∞, then also ρ′′k (H) ≥ ρ′k (H). Let a ∈ H with min L(a) = ℓ ≤ k and u ∈ A(H). Then k ∈ L(auk−ℓ ) implies ρk (H) ≥ sup L(auk−ℓ ) ≥ sup L(a) + k − ℓ ≥ sup L(a), and therefore ρk (H) ≥ ρ′k (H). Assume now that ρk (H) < ∞, and let a be as above such that sup L(a) = ρ′k (H). Then min L(auk−ℓ ) ≤ min L(a) + (k − ℓ) = k and therefore ρ′k (H) ≥ sup L(auk−ℓ ) ≥ sup L(a) + (k − ℓ) ≥ ρ′k (H) . Thus k = ℓ = min L(a) and ρ′′k (H) ≥ sup L(a) = ρ′k (H). 2. If there is a k ∈ N such that ρk (H) = ∞, then all three terms of the first equation are equal to infinity. Suppose that ρk (H) < ∞ for all k ∈ N. Then the first equality follows from 1. To verify the 6 ALFRED GEROLDINGER first limit assertion, let ρ′ < ρ(H) be arbitrary. We must prove that ρk (H) ≥ kρ′ for all sufficiently large k. If ρ′ < ρ′′ < ρ(H), then there exists some q0 ∈ N such that qρ′′ + 1 > ρ′ q+1 for all q ≥ q0 , and there exists some N ∈ N such that ρN (H) > N ρ′′ . If k > N q0 , then k = N q + r for some q ≥ q0 and r ∈ [1, N ], and ρk (H) ≥ qρN (H) + ρr (H) ≥ qρN (H) + r by Inequality (2.1). Since ρN (H) ≥ N , it follows that ρk (H) qρN (H) + r qρN (H) + N qN ρ′′ + N ≥ ≥ > > ρ′ . k qN + r qN + N qN + N n o Since ρ(H) = sup m m, n ∈ L, {0} 6= L ∈ L(H) , we have n nm 1 = inf ρ(H) n o m, n ∈ L, {0} 6= L ∈ L(H) with 1/ρ(H) = 0 if ρ(H) = ∞. The verification of the second limit assertion runs along the same lines as the proof of the first one (just replace ρk (H) by λk (H) and reverse all inequality signs). 3. In order to show the implication (a) ⇒ (b), let a ∈ H with L = L(a) ∈ L(H) such that ρ(L) = ρ(H) and set N = min L. Then kN ∈ L(ak ) for all k ∈ N, and thus sup L(ak ) k sup L(a) ρkN (H) ρkN (H) ≥ ≥ = ρ(L) = ρ(H) ≥ . kN kN kN kN The implication (b) ⇒ (c) is obvious. Suppose that (c) holds and let k ∈ N such that kρ(H) = ρk (H). Let L ∈ L(H) such that min L = k and ρk (H) = max L. Then kρ(H) = max L = kρ(L) and hence ρ(L) = ρ(H). Suppose that the equivalent statements hold and let N ∈ N such that mN ρ(H) = ρmN (H) for all m ∈ N. Let k ∈ N be given and set k = iN + j with i ∈ N0 and j ∈ [1, N ]. Then we infer that iN ρ(H) + j ≤ ρiN (H) + ρj (H) ≤ ρiN +j (H) and (iN + j)ρ(H) − N (ρ(H) − 1) ≤ (iN + j)ρ(H) − j(ρ(H) − 1) ≤ ρiN +j (H) . Thus kρ(H) − ρk (H) ≤ M ′ := N (ρ(H) − 1) for all k ∈ N. If k ≥ 2, then ρk (H) ≤ kρ(H), (k − 1)ρ(H) − ρk−1 (H) ≤ M ′ , and hence ρk (H) − ρk−1 (H) ≤ M ′ + ρ(H).  Unions of sets of lengths do have – in a variety of settings – a structure which is only slightly more general than that of arithmetical progressions. In order to show this, we introduce the concept of almost arithmetical progressions. Definition 2.5. Let d ∈ N and M ∈ N0 . A subset L ⊂ Z is called an almost arithmetical progression (AAP for short) with difference d and bound M if L = y + (L′ ∪ L∗ ∪ L′′ ) ⊂ y + dZ where y ∈ Z and L∗ is a nonempty (finite or infinite) arithmetical progression with difference d such that min L∗ = 0, L′ ⊂ [−M, −1], L′′ ⊂ sup L∗ + [1, M ] (with the convention that L′′ = ∅ if L∗ is infinite). Clearly, every single finite set is an AAP with a particularly trivial choice of M and d. Suppose we have an atomic monoid with nonempty set of distances. Then, by Lemma 2.1, sets of lengths become arbitrarily large, whence the unions Uk (H) are growing as k is growing. The next theorem states (under the given assumptions) that all unions Uk (H) are AAPs with the critical point that a single choice of M works for all sufficiently large k. Once this M is chosen, it says that all unions have a ”middle” piece that becomes larger and larger as k grows and that ”middle” part has a very rigid structure. The poorly behaved ”end” pieces are bounded in size by a constant and in their distance from the middle. SETS OF LENGTHS 7 Theorem 2.6 (Structure Theorem for Unions of Sets of Lengths). Let H be an atomic monoid with finite nonempty set of distances ∆(H) and d = min ∆(H). Suppose that either, ρk (H) = ∞ for some k ∈ N, or that there is an M ∈ N such that ρk (H) − ρk−1 (H) ≤ M for all k ≥ 2. 1. There exist constants k ∗ and M ∗ ∈ N such that for all k ≥ k ∗ , Uk (H) is an AAP with difference d and bound M ∗ . Moreover, if ρk (H) < ∞ for all k ∈ N, then the assertion holds for k ∗ = 1. 2. We have 1  1 |Uk (H)| ρ(H) − . = lim k→∞ k d ρ(H) Proof. 1. For every k ∈ N, we have λk (H), k ∈ Uk (H), and since every d′ ∈ ∆(H) is a multiple of d by Proposition 2.3, it follows that Uk (H) ⊂ λk (H) + dN0 . Thus it remains to show that there exist constants k ∗ , M ∗ ∈ N such that, for all k ≥ k ∗ , (∗) Uk (H) ∩ [k, ρk (H) − M ∗ ] and Uk (H) ∩ [λk (H) + M ∗ , k] are arithmetical progressions with difference d (note, if ρk (H) = ∞, then [k, ρk (H) − M ∗ ] = N≥k ). We break the proof into three steps. 1.(a) First, we show that the left set in (∗) is an arithmetical progression. Since d ∈ ∆(H), there is an element a ∈ H and m ∈ N such that  {m, m + d} ⊂ L(a). Since ∆(H) is finite and min ∆(H) = gcd ∆(H) by Proposition 2.3, ψ := ρ ∆(H) ∈ N. Then the ψ-fold sumset satisfies the containment U ∗ := ψ{m, m + d} = {ψm, ψm + d, . . . , ψm + ψd} ⊂ L(aψ ) . We set k0 = ψm and observe that U ∗ ⊂ Uk0 (H), say Uk0 (H) = U ′ ⊎ U ∗ ⊎ U ′′ , where U ′ = {x ∈ Uk0 (H) | x < k0 } and U ′′ = {x ∈ Uk0 (H) | x > k0 + ψd}. Let k ∗ ∈ N with k ∗ ≥ 2k0 . If there is some ℓ ∈ N with ρℓ (H) = ∞, then let ℓ0 denote the smallest such ℓ ∈ N, and we suppose further that k ∗ − k0 ≥ ℓ0 . Now let k ≥ k ∗ be given. Then Uk0 (H) + Uk−k0 (H) =       U ′ + Uk−k0 (H) ∪ U ∗ + Uk−k0 (H) ∪ U ′′ + Uk−k0 (H) ⊂ Uk (H) .   Clearly, we have k ∈ U ∗ + Uk−k0 (H). Since max ∆ Uk−k0 (H) ≤ max ∆(H) and ∆ Uk−k0 (H) ⊂ dN, it follows that U ∗ + Uk−k0 (H) is an arithmetical progression with difference d. If there is some ℓ ∈ N such that ρℓ (H) = ∞, then ρk−k0 (H) = ρk (H) = ∞ and  U ∗ + Uk−k0 (H) ∩ N≥k = k + dN0 = Uk (H) ∩ N≥k . Suppose that ρℓ (H) < ∞ for all ℓ ∈ N. Then   max Uk (H) − max U ∗ + Uk−k0 (H) = ρk (H) − max U ∗ − ρk−k0 (H) ≤ k0 M , and hence  U ∗ + Uk−k0 (H) ∩ [k, ρk (H) − k0 M ] = Uk (H) ∩ [k, ρk (H) − k0 M ] is an arith. progression with difference d. Thus the assertion follows with M ∗ = k0 M . 1.(b). By 1.(a), there are k ∗ , M ∗ ∈ N such that for all k ≥ k ∗ , the set Uk (H) ∩ [k, ρk (H) − M ∗ ] is an arithmetical progression with difference d. Without restriction we may suppose that M ∗ ≥ k ∗ . Let k ≥ k ∗ and ℓ = λk (H). We show that Uk (H) ∩ [ℓ + M ∗ , k] is an arithmetical progression with difference d. Let m ∈ [ℓ + M ∗, k] be such that k − m is a multiple of d. In order to show that m ∈ Uk (H), we verify that k ∈ Um (H). Since k ≤ ρℓ (H) and ℓ + M ∗ ≤ m , it follows that k ≤ ρℓ (H) ≤ ρm−M ∗ (H) and hence k + M ∗ ≤ ρm−M ∗ (H) + M ∗ ≤ ρm−M ∗ (H) + ρM ∗ (H) ≤ ρm (H) . Since k ∈ m + dN0 with k ≤ ρm (H) − M ∗ and Um (H) ∩ [m, ρm (H) − M ∗ ] is an arithmetical progression with difference d, it follows that k ∈ Um (H). 8 ALFRED GEROLDINGER 1.(c). Suppose that ρk (H) < ∞ for all k ∈ N. In this step, we show that for all k ∈ N the sets Uk (H) f. Suppose that the assertion holds with the constants k ∗ are AAPs with difference d and some bound M ∗ ∗ and M ∈ N. Since for all k ∈ [1, k − 1],   Uk (H) = [λk (H), k − 1] ∩ Uk (H) ∪ {k} ∪ [k + 1, ρk (H)] ∩ Uk (H) is an AAP with bound M ′ = max{k − λk (H), ρk (H) − k | k ∈ [1, k ∗ − 1]}, it follows that for all k ∈ N f = max{M ∗ , M ′ }. the sets Uk (H) are AAPs with difference d and bound M 2. If there is some k ∈ N such that ρk (H) = ∞, then both the left and the right hand side of the asserted equation are infinite. Suppose that ρk (H) < ∞ for all k ∈ N. By 1. there are k ∗ ∈ N and M ∗ ∈ dN such that, for all k ≥ k ∗ , Uk (H) ∩ [λk (H) + M ∗ , ρk (H) − M ∗ ] is an arithmetical progression with difference d. Thus for all k ≥ k ∗ we obtain that   ρk (H) − M ∗ − λk (H) + M ∗ + d |Uk (H)| ρk (H) − λk (H) + d ≤ ≤ . dk k dk Since, by Proposition 2.4.2, limk→∞ ρk (H) k = ρ(H) and limk→∞ λk (H) k = 1 ρ(H) , the assertion follows.  We end this section with a discussion of finitely presented monoids and of commutative finitely generated monoids. Let H be a monoid. For every generating set P of H, there is an epimorphism ψ : F ∗ (P ) → H and F ∗ (P )/ ker(ψ) ∼ = H, where ker(ψ) = {(x, y) ∈ F ∗ (P ) × F ∗ (P ) | ψ(x) = ψ(y)} is a congruence relation on F ∗ (P ). If there is a finite generating set P and a finite set of relations R ⊂ ker(ψ) which generates ker(ψ) as a congruence relation, then H is said to be finitely presented (by P and R). If R = {(x1 , y1 ), . . . , (xt , yt )}, then we write (as usual) H = hP | Ri = hP | x1 = y1 , . . . , xt = yt i. Proposition 2.7. If H = hA(H) | Ri is a reduced atomic monoid with a finite set of relations R, then the set of distances ∆(H) is finite. Proof. We set A = A(H), ψ : F ∗ (A) → H, R = {(x1 , y1 ), . . . , (xt , yt )}, M = max{ |x1 | − |y1 | , . . . , |xt | − |yt | }, and assert that ∆(H) ⊂ [1, M ]. Let a ∈ H. Then L(a) = {|x| | x ∈ F ∗ (A) with ψ(x) = a}. We choose two words v, w ∈ F ∗ (A) with ψ(v) = ψ(w) = a. Since F ∗ (P )/ ker(ψ) ∼ = H and ker(ψ) is generated by R (as a congruence), there is a sequence of words v = v0 , . . . , vn = w in ψ −1 (a) ⊂ F ∗ (A) where vν arises from vν−1 by replacing xi by yi for some i ∈ [1,t] and all ν ∈ [1, n]. We set L = {|v0 |, . . . , |vn |} and obtain ∆(L) ⊂ [1, M ]. Thus it follows that ∆ L(a) ⊂ [1, M ] and hence ∆(H) ⊂ [1, M ].  There are atomic finitely presented monoids H such that ρ(H) = ρk (H) = ∞ for all k ≥ 2. To provide an example, consider the monoid H = ha, b | a2 = ba2 bi (note that H is an Adyan semigroup and hence cancelative, see [4, Section 2] for details). Obviously, H is finitely presented and atomic with A(H) = {a, b}, and ρ2 (H) = ∞ which implies that ρk (H) = ∞ for all k ≥ 2. Since Ha2 bi ( Ha2 bi+1 for all i ∈ N, H does not satisfy the ACC on principal left ideals. As another example, the monoid H = ha, b | a = babi is a finitely presented monoid which is not atomic (note that a is not a finite product of atoms). However, this behavior cannot occur in the case of commutative monoids. The next result shows in particular that finitely generated commutative monoids satisfy all assumptions of Theorem 2.6, and hence they satisfy the Structure Theorem for Unions of Sets of Lengths. Proposition 2.8. Let H be a reduced commutative monoid. 1. For a subset A ⊂ A(H) the following statements are equivalent. (a) H is atomic and A = A(H). (b) A is the smallest generating set of H (with respect to set inclusion). (c) A is a minimal generating set of H. 2. H is finitely generated if and only if H is atomic and A(H) is finite. SETS OF LENGTHS 9 3. Suppose that H is finitely generated. Then H is a BF-monoid with finite set of distances and finite elasticity. Moreover, there is an L ∈ L(H) such that ρ(L) = ρ(H), and there is an M ∈ N such that ρk (H) − ρk−1 (H) ≤ M for all k ≥ 2. Proof. 1.(a) ⇒ (b) Since H is atomic, A is a generating set of H and it remains to show that it is the smallest one. Let A′ be any generating set of H. If u ∈ A, then u = v1 · . . . · vk with k ∈ N and v1 , . . . , vk ∈ A′ \ {1}. Since u is an atom, it follows that k = 1 and u = v1 ∈ A′ . The implication (b) ⇒ (c) is obvious. (c) ⇒ (a) It suffices to verify that A = A(H). Since A is a minimal generating set, it follows that 1 ∈ / A. If u ∈ A(H), then u = v1 ·. . . ·vk with k ∈ N and v1 , . . . , vk ∈ A. This implies k = 1, u = v1 ∈ A, and thus A(H) ⊂ A. Assume to the contrary that there is some u ∈ A \ A(H), say u = vw with v, w ∈ H \ {1}. Then v = u1 · . . . · um and w = um+1 · . . . · un where n ∈ N≥2 , m ∈ [1, n − 1], and u1 , . . . , un ∈ A. Therefore we obtain that u = u1 · . . . · un and u ∈ / {u1 , . . . , un }. Thus A \ {u} is a generating set of H, a contradiction. 2. This assertion follows directly from 1. 3. By 1. and 2., H is atomic and A = A(H) is the smallest generating set. By Redei’s Theorem, every finitely generated commutative monoid is finitely presented. Thus ∆(H) is finite by Proposition 2.7. Next we show that there is an L ∈ L(H) such that ρ(H) = ρ(L) < ∞. This implies that H is a BF-monoid and by Proposition 2.4.3 it follows that there is an M ∈ N such that ρk (H) − ρk−1 (H) ≤ M for all k ≥ 2. Let π : F (A) → H be the canonical epimorphism. We set S = {(x, y) ∈ F (A) × F (A) | π(x) = π(y)} and S ∗ = S \ {(1, 1)} , o n ∗ . Clearly, it is sufficient to show that this supremum (x, y) ∈ S and we observe that ρ(H) = sup |x| |y| ∗ A is attained for some f : F (A) × F (A) → (NA 0 × N0 , +), defined  Q pairnu(x, y) ∈ S . There is an isomorphism Q mu by ( u∈A u , u∈A u ) 7→ (mu )u∈A , (nu )u∈A . By Dickson’s Theorem [23, Theorem 1.5.3], the set f (S ∗ ) has only finitely many minimal points, and let T ⊂ S ∗ denote the inverse image of the set of minimal points. Therefore it suffices to prove that o n |x′ | |x| ′ ′ (x , y ) ∈ T for all (x, y) ∈ S ∗ . ≤ max |y| |y ′ | We proceed by induction on |x| + |y|. If (x, y) ∈ T , then there is nothing to do. Suppose that (x, y) ∈ / T. Then there exist (x1 , y1 ) ∈ T such that (x, y) = (x1 x2 , y1 y2 ) with (x2 , y2 ) ∈ F (A) × F (A). It follows that (x2 , y2 ) ∈ S ∗ , and clearly we have |xj | + |yj | < |x| + |y| for j ∈ {1, 2}. Then n |x′ | o n |x | |x | o |x| |x1 | + |x2 | 2 1 ′ ′ ≤ max (x , y ) ∈ T = < max , |y| |y1 | + |y2 | |y1 | |y2 | |y ′ | by the induction hypothesis.  A most interesting class of finitely generated commutative monoids are numerical monoids. Their study was initiated by Frobenius in the 19th century and they are still a topic of much research due to their intrinsic relationship with a wide area of mathematics. A monoid H is said to be numerical if it is a submonoid of (N0 , +) such that the complement N0 \ H is finite. Clearly, numerical monoids are reduced. Let H be a numerical monoid with H 6= N0 . Since N0 \ H is finite, H has a finite generating set and hence a smallest generating set. Thus Proposition 2.8 implies that the smallest generating set is the set of atoms, and that the elasticity and the set of distances are both finite. Suppose that A(H) = {n1 , . . . , , nt } with t ∈ N and n1 < . . . < nt . We encourage the reader to check that ρ(H) = nt /n1 and that min ∆(H) = gcd{n2 − n1 , . . . , nt − nt−1 } (compare with Proposition 6.1.2). These results were the starting points of detailed investigations of the arithmetic of numerical monoids initiated by Chapman and Garcı́a-Sánchez. 10 ALFRED GEROLDINGER Clearly, there are natural connections between the arithmetical invariants of factorization theory and the presentations of a monoid. This point has been emphasized by Garcı́a-Sánchez and it opened the way to an algorithmic approach towards the computational determination of arithmetical invariants. Many algorithms have been implemented in GAP (see the GAP Package [14] and a survey by Garcı́a-Sánchez [20]). 3. Commutative Krull Monoids It was the observation of the mathematicians of the 19th century that a ring of integers in an algebraic number field need not be factorial (in other words, it need not satisfy the Fundamental Theorem of Arithmetic). This led to the development of ideals (every nonzero ideal in a ring of integers is a unique product of prime ideals whence the Fundamental Theorem of Arithmetic holds for ideals) and subsequently to the development of ”divisor theories” from the elements to the ideals. A divisor theory is a divisibility preserving homomorphism to an object which fulfills the Fundamental Theorem of Arithmetic. Semigroups allowing a divisor theory are now called Krull monoids. Commutative Krull monoids can be studied with divisor theoretic and with ideal theoretic tools. We start with divisor theoretic concepts. Let H and D be commutative monoids. A monoid homomorphism ϕ : H → D is said to be: • a divisor homomorphism if a, b ∈ H and ϕ(a) | ϕ(b) (in D) implies that a | b (in H); • cofinal if for every α ∈ D there is an a ∈ H such that α | ϕ(a) (in D); • a divisor theory if D is free abelian, ϕ is a divisor homomorphism, and for every α ∈ D there are  a1 , . . . , am ∈ H such that α = gcd ϕ(a1 ), . . . , ϕ(am ) . In particular, every divisor theory is a cofinal divisor homomorphism. Let ϕ : H → D be a cofinal divisor homomorphism. The group  C(ϕ) = q(D)/q ϕ(H)  is called the class group of ϕ. For a ∈ q(D) we denote by [a] = aq ϕ(H) ∈ C(ϕ) the class containing a. We use additive notation for the class group and observe that [1] is the zero element of the abelian group C(ϕ). Divisor theories of a given monoid are unique up to isomorphism. If H has a divisor theory, then there is a free abelian monoid F = F (P ) such that the inclusion ϕ : Hred ֒→ F is a divisor theory, and the class group C(ϕ) = C(H) = q(F )/q(Hred ) is called the (divisor) class group of H and G0 = {[p] | p ∈ P } ⊂ C(H) is the set of classes containing prime divisors. We continue with the most classical example of a cofinal divisor homomorphism and a divisor theory. Proposition 3.1. Let R be a commutative domain, I ∗ (R) the monoid of invertible ideals where the operation is the usual multiplication of ideals, and let ϕ : R• → I ∗ (R) be the homomorphism mapping each element onto its principal ideal. 1. The map ϕ is a cofinal divisor homomorphism and C(ϕ) is the Picard group Pic(R) of R. 2. If R is a commutative Dedekind domain, then ϕ is a divisor theory and C(ϕ) is the usual ideal class group of R. 3. If R is the ring of integers of an algebraic number field, then C(ϕ) is finite and every class contains infinitely many prime ideals. Proof. 1. A short calculation shows that for two invertible ideals I, J ⊳ R we have J | I in I ∗ (R) if and only if I ⊂ J. To show that ϕ is a divisor homomorphism, let a, b ∈ R• be given and suppose that bR | aR in I ∗ (R). Then there is a J ∈ I ∗ (R) such that (aR)J = bR whence a−1 bR = J ⊂ R and a | b in R• . To show that ϕ is cofinal, let I ∈ I ∗ (R) be given. If a ∈ I, then aR ⊂ I and hence I | aR in I ∗ (R). The definition of C(ϕ) coincides with the definition of Pic(R). SETS OF LENGTHS 11 2. Suppose that R is a commutative Dedekind domain. Then every nonzero ideal is invertible and a product of prime ideals. Thus I ∗ (R) is free abelian. Let I ∈ I ∗ (R). Then I is generated by two elements a, b ∈ R, whence I = ha, bi = aR + bR = gcd(aR, bR) = gcd(ϕ(a), ϕ(b)). Therefore ϕ is a divisor theory. 3. This can be found in many textbooks on algebraic number theory (see, for example, [23, Theorem 2.10.14] for a summary).  The previous proposition shows that in case of commutative Dedekind domains the embedding in a monoid of ideals establishes a divisor theory. This holds true in much greater generality and in order to outline this we mention briefly some key notions on divisorial ideals (see [36] for a thorough treatment of divisorial ideals). Let H be a commutative monoid and let A, B ⊂ q(H) be subsets. We denote by (A : B) = {x ∈ q(H) | xB ⊂ A}, by A−1 = (H : A), and by Av = (A−1 )−1 . By an ideal of H we always mean an s-ideal (thus AH = A holds), and an s-ideal A is a divisorial ideal (or a v-ideal) if Av = A. We denote by Fv (H) the set of all fractional divisorial ideals and by Iv (H) the set of all divisorial ideals of H. Furthermore, Iv∗ (H) is the monoid of v-invertible divisorial ideals (with v-multiplication) and its  quotient group Fv (H)× = q Iv∗ (H) is the group of fractional invertible divisorial ideals. By X(H), we denote the set of all minimal nonempty prime s-ideals of H and b = {x ∈ q(H) | there is a c ∈ H such that cxn ∈ H for all n ∈ N} ⊂ q(H) H b is called the complete integral closure of H. We say that H is completely integrally closed if H = H. Straightforward arguments show that every factorial monoid is completely integrally closed and that a noetherian commutative domain is completely integrally closed if and only if it is integrally closed. Theorem 3.2 (Commutative Krull monoids). Let H be a commutative monoid. Then the following statements are equivalent. (a) H is completely integrally closed and satisfies the ACC on divisorial ideals. (b) The map ϕ : H → Iv∗ (H), a 7→ aH for all a ∈ H, is a divisor theory. (c) H has a divisor theory. (d) There is a free abelian monoid F such that the inclusion Hred ֒→ F is a divisor homomorphism. If one of the equivalent statements holds, then H is called a Krull monoid, and Iv∗ (H) is free abelian with basis X(H). For a proof of Theorem 3.2 we refer to [23, Section 2.5]. Note, since H is factorial if and only if Hred is free abelian, it follows that H is factorial if and only if it is Krull with trivial class group. In the remainder of this section we present a list of examples of commutative Krull monoids stemming from quite diverse mathematical areas. Commutative domains. Let R be a commutative domain and H = R• . Then the maps ( ( Fv (R) → Fv (H) Fv (H) → Fv (R) • ◦ (3.1) ι : and ι : a 7→ a \ {0} a 7→ a ∪ {0} are inclusion preserving isomorphisms which are inverse to each other. In particular, if a is a divisorial semigroup theoretical ideal of H, then a ∪ {0} is a divisorial ring theoretical ideal of R. Thus R satisfies the ACC on (ring theoretical) divisorial ideal of R if and only if H satisfies the ACC on (semigroup theoretical) divisorial ideals of H. Since, by definition, R is completely integrally closed if and only H is completely integrally closed, we obtain that R is a commutative Krull domain if and only if H is a commutative Krull monoid. Property (a) in Theorem 3.2 easily implies that noetherian integrally closed commutative domains are Krull. Furthermore, a commutative Krull domain is Dedekind if and only if it is at most onedimensional. If R is Dedekind, then every ideal is divisorial and Iv∗ (R) = I ∗ (R) (confer Theorem 3.2.(b) and Proposition 3.1.2). 12 ALFRED GEROLDINGER Submonoids of commutative domains. Let R be a commutative Krull domain, {0} = 6 f ⊳ R an ideal, and Γ ⊂ (R/f)× a subgroup. Then the monoid HΓ = {a ∈ R• | a + f ∈ Γ} is a Krull monoid, called the (regular) congruence monoid defined in R modulo f by Γ. We refer the reader to [23, Section 2.11] for more on congruence monoids. Monadic submonoids of rings of integer-valued polynomials. Let us consider the classical ring of integer-valued polynomials over the integers. This is the ring Int(Z) = {f ∈ Q[X] | f (Z) ⊂ Z} ⊂ Q[X] . We refer the reader to the Monthly article by Cahen and Chabert [9] for a friendly introduction to integervalued polynomials and to their monograph [8] for a deeper study. It is well-known that Int(Z) is an integrally closed two-dimensional Prüfer domain. It is a BF-domain but it is not Krull. However, every divisor-closed submonoid of Int(Z), which is generated by one element, is a Krull monoid [44, Theorem 5.2]. We refer to recent work of Frisch and Reinhart [43, 18]. Monoids of regular elements in commutative rings with zero-divisors. By a commutative Krull ring we mean a completely integrally closed commutative ring which satisfies the ACC on regular divisorial ideals. The isomorphisms (as given in Equation (3.1)) between monoids of divisorial ideals carry over from the setting of commutative domains to the setting of commutative rings with zero divisors. Thus, if a commutative ring R is Krull, then the monoid of cancelative (regular) elements is a Krull monoid, and the converse holds for v-Marot rings [27, Theorem 3.5]. Monoids of Modules. Let R be a ring and let C be a class of right R-modules which is closed under finite direct sums, direct summands, and isomorphisms. For a module M in C, let [M ] denote the isomorphism class of M . Let V(C) denote the set of isomorphism classes of modules in C (we assume here that V(C) is indeed a set.) Then V(C) is a commutative semigroup with operation defined by [M ]+ [N ] = [M ⊕ N ] and all information about direct-sum decomposition of modules in C can be studied in terms of factorization of elements in the semigroup V(C). In particular, the direct-sum decompositions in C are (essentially) unique (in other words, the Krull-Remak-Schmidt-Azumaya Theorem holds) if and only if V(C) is a free abelian monoid. This semigroup-theoretical point of view was justified by Facchini [15] who showed that V(C) is a reduced Krull monoid provided that the endomorphism ring EndR (M ) is semilocal for all modules M in C. This result allows one to describe the direct-sum decomposition of modules in terms of factorization of elements in Krull monoids. We refer the reader to the Monthly article by Baeth and Wiegand [5]. e of a commutative monoid H Finitely generated monoids and affine monoids. The root closure H is defined as e = {x ∈ q(H) | xn ∈ H for some n ∈ N} ⊂ q(H) , H e If and H is said to be root closed (also the terms normal, full, and integrally closed are used) if H = H. b e H is finitely generated, then H = H. Since finitely generated monoids satisfy the ACC on ideals, they are Krull if and only if they are root closed (see Theorem 3.2.(a)). A monoid is called affine if it is a finitely generated submonoid of a finitely generated free abelian group. It is easy to check that the concepts of normal affine monoids and of reduced finitely generated commutative Krull monoids coincide (a variety of further characterizations are given in [23, Theorem 2.7.14]). (Normal) affine monoids play an important role in combinatorial commutative algebra. Monoids of Zero-Sum Sequences. Let G be an additively written abelian group and G0 ⊂ G a subset. By a sequence over G0 , we mean a finite sequence of terms from G0 where repetition is allowed and the order is disregarded. Clearly, the set of sequences forms a semigroup, with concatenation as its operation and with the empty sequence as its identity element. We consider sequences as elements of the free abelian monoid with basis G0 . This algebraic point of view has turned out to be quite convenient SETS OF LENGTHS 13 from a notational point of view. But there is much more which we start to outline here and later in Proposition 4.3. Let Y S = g1 · . . . · gℓ = g vg (S) ∈ F (G0 ) , g∈G0 where ℓ ∈ N0 and g1 , . . . , gℓ ∈ G. Then |S| = ℓ is the length of S, supp(S) = {g1 , . . . , gℓ } is the support of S, −S = (−g1 ) · . . . · (−gℓ ), and σ(S) = g1 + . . . + gℓ is the sum of S. We say that S is a zero-sum sequence if σ(S) = 0, and clearly the set B(G0 ) = {S ∈ F (G0 ) | σ(S) = 0} ⊂ F (G0 ) of all zero-sum sequences is a submonoid, called the monoid of zero-sum sequences (also called Block Monoid) over G0 . Obviously, the inclusion B(G0 ) ֒→ F (G0 ) is a divisor homomorphism and hence B(G0 ) is a reduced commutative Krull monoid by Theorem 3.2.(d). Monoids of zero-sum sequences form a powerful link between the theory of (general) Krull monoids and additive combinatorics [28, 34]. Thus all methods from the later area are available for the study of sets of lengths in Krull monoids, and we will make heavily use of this in Section 6. Proposition 3.3. Let G be an additive abelian group and G0 ⊂ G a subset. 1. If G0 is finite, then B(G0 ) is finitely generated. 2. The following statements are equivalent. (a) |G| ≤ 2. (b) B(G) is factorial. (c) B(G) is half-factorial. 3. If |G| ≥ 3, then the inclusion B(G) ֒→ F (G) is a divisor theory with class group isomorphic to G and every class contains precisely one prime divisor. 4. Let G′ be an abelian group. Then the monoids B(G) and B(G′ ) are isomorphic if and only if the groups G and G′ are isomorphic. Q mg 0 , is a monoid isomorphism. Proof. 1. The map f : NG 0 → F (G0 ), defined by m = (mg )g∈G0 7→ g∈G0 g G0 −1 The embedding Γ := f (B(G0 )) ֒→ N0 is a divisor homomorphism (i.e, m, n ∈ Γ and m ≤ n implies that n − m ∈ Γ). By Dickson’s Lemma [23, Theorem 1.5.3], Γ is generated by the finite set of minimal points Min(Γ), and hence B(G0 ) is generated by f (Min(Γ)). 2. If G = {0}, then B(G) = F (G) ∼ = (N0 , +) is free abelian. If G = {0, g}, then B(G) is free abelian with basis A(G) = {0, g 2 }. Thus (a) ⇒ (b), and obviously (b) ⇒ (c). In order to verify that (c) ⇒ (a), it suffices to show that |G| ≥ 3 implies that B(G) is not half-factorial. Suppose that |G| ≥ 3. If there is some element g ∈ G with ord(g) = n ≥ 3, then U = g n , −U , and V = (−g)g are atoms of B(G) and (−U )U = V n shows that B(G) is not half-factorial. If there are two distinct elements e1 , e2 ∈ G of order two, then U = e1 e2 (e1 + e2 ), V0 = (e1 + e2 )2 , V1 = e21 , and V2 = e22 are atoms of B(G) and U 2 = V0 V1 V2 shows that B(G) is not half-factorial. 3. Let |G| ≥ 3. Clearly, the inclusion is a cofinal divisor homomorphism. To show that it is a divisor theory, let g ∈ G \ {0} be given. If ord(g) = n ≥ 3, then g = gcd g n , g(−g) . If ord(g) = 2, then there is  an element h ∈ G \ {0, g}, and we obtain that g = gcd g 2 , gh(−g − h) . It is easy to check that the map     Φ : C B(G) = q F (G) /q B(G) = {[S] = Sq B(G) | S ∈ F (G)} → G , defined by Φ([S])  = σ(S) is a group isomorphism. Since for every S ∈ F (G), [S] ∩ G = {σ(S)}, every class of C B(G) contains precisely one prime divisor. 4. This follows from 2.,3., and the fact that a reduced commutative Krull monoid is uniquely determined by its class group and the distribution of prime divisors in its classes ([23, Theorem 2.5.4]).  14 ALFRED GEROLDINGER 4. Transfer Homomorphisms and Transfer Krull Monoids A central method to study the arithmetic of a given class of monoids H is to construct simpler auxiliary monoids B (and such constructions are often based on the ideal theory of H) and homomorphisms θ : H → B (called transfer homomorphisms) which allow us to pull back arithmetical results from B to H. The concept of transfer homomorphisms was introduced by Halter-Koch in the commutative setting [35]) and recently generalized to the noncommutative setting ([4, Definition 2.1]). Definition 4.1. Let H and B be atomic monoids. A monoid homomorphism θ : H → B is called a weak transfer homomorphism if it has the following two properties. (T1) B = B × θ(H)B × and θ−1 (B × ) = H × . (WT2) If a ∈ H, n ∈ N, v1 , . . . , vn ∈ A(B) and θ(a) = v1 · . . . · vn , then there exist u1 , . . . , un ∈ A(H) and a permutation τ ∈ Sn such that a = u1 · . . . · un and θ(ui ) ∈ B × vτ (i) B × for each i ∈ [1, n]. Property (T1) says that θ is surjective up to units and that only units are mapped onto units. Property (WT2) says that factorizations can be lifted up to units and up to order. We do not discuss equivalent formulations or variants of the definition and we do not give the definition of a transfer homomorphism, but note that the two concepts coincide if H and T are both commutative. Lemma 4.2. Let H and B be atomic monoids, and let θ : H → B be a weak transfer homomorphism.  1. For every a ∈ H, we have LH (a) = LB θ(a) . In particular, an element a ∈ H is an atom in H if and only if θ(a) is an atom in B. 2. L(H) = L(B). In particular, ∆(H) = ∆(B), Uk (H) = Uk (B), and ρk (H) = ρk (B) for every k ∈ N.  Proof. Since 2. follows directly from 1., we prove 1. Let a ∈ H. If n ∈ LB θ(a) , then θ(a) = v1 · . . . · vn with v1 , . . . , vn ∈ A(B), and thus (WT2) implies that n ∈ LH (a). Conversely, let n ∈ LH (a). Then there are u1 , . . . , un ∈ A(H) such that a = u1 · . . . · un . Thus θ(a) = θ(u1 ) · . . . · θ(un ), and we have to verify that θ(u1 ), . . . , θ(un ) ∈ A(B). Let i ∈ [1, n]. Property (T1) implies that θ(ui ) is not a unit. Since B is atomic, there are m ∈ N and w1 , . . . , wm ∈ A(B) such that θ(ui ) = w1 · . . . · wm . Since this factorization can be lifted and ui is an atom, it follows that m = 1 and that θ(ui ) = w1 ∈ A(B). Since an element of an atomic monoid is an atom if and only if its set of lengths equals {1}, the statement follows.  Next we discuss the most classic example of a transfer homomorphism and its application. This is the homomorphism from a commutative Krull monoid to an associated monoid of zero-sum sequences. If H is a commutative monoid, then H is Krull if and only if Hred is Krull, and if this holds, then the canonical epimorphism π : H → Hred is a transfer homomorphism. Thus, in the following proposition we may restrict to reduced Krull monoids for technical simplicity, but without loss of generality. Proposition 4.3. Let H be a reduced commutative Krull monoid, F = F (P ) a free abelian monoid such that the embedding H ֒→ F is a cofinal divisor homomorphism with class group G, and let G0 = {[p] | p ∈ P } ⊂ G = q(F )/q(H) denote the set of classes containing prime divisors. Then there is a transfer  homomorphism β : H → B(G0 ). In particular, we have L(H) = L B(G0 ) . e : F → F (G0 ) be the unique epimorphism defined by β(p) e Proof. Let β = [p] for all p ∈ P . We start with the following assertion. e e A1. For every a ∈ F , we have β(a) ∈ B(G0 ) if and only if a ∈ H. Thus β(H) = B(G0 ) and  −1 e B(G0 ) = H. β Proof of A1. Let a = p1 · . . . · pℓ ∈ F where ℓ ∈ N0 and p1 , . . . , pℓ ∈ P . Then  e β(a) = [p1 ] · . . . · [pℓ ] ∈ F (G0 ) and σ [p1 ] · . . . · [pℓ ] = [p1 ] + . . . + [pℓ ] = [a] . Since H ֒→ F is a divisor homomorphism, we have [a] = 0 ∈ G if and only if a ∈ H. Therefore all assertions follow and we have proved A1. SETS OF LENGTHS 15 e : H → B(G0 ), and we assert that it is a transfer Therefore we can define the homomorphism β = β|H homomorphism. Clearly, H and B(G0 ) are reduced and β is surjective. Thus (T1) reads as B(G0 ) = β(H) and β −1 ({1}) = {1} , which holds true by A1. We continue with the following assertion. A2. If a ∈ H, B, C ∈ B(G0 ) and β(a) = BC, then there exist b, c ∈ H such that a = bc, β(b) = B, and β(c) = C. Proof of A2. Let a = p1 · . . . · pℓ ∈ H, where ℓ ∈ N0 and p1 , . . . , pℓ ∈ P , and suppose that β(a) = BC, say B = [p1 ] · . . . · [pk ] and C = [pk+1 ] · . . . · [pℓ ] for some k ∈ [0, ℓ]. By A1, we infer that b = p1 · . . . · pk ∈ H, c = pk+1 · . . . · pℓ ∈ H and clearly we have a = bc. This completes the proof of A2. Clearly, (WT2) follows from A2 by a straightforward  induction, and hence β is a transfer homomorphism. Then Lemma 4.2 implies that L(H) = L B(G0 ) .  Definition 4.4. A monoid H is said to be a transfer Krull monoid (over G0 ) if there exists a weak transfer homomorphism θ : H → B(G0 ) for a subset G0 of an abelian group G. If G0 is finite, then we say that H is a transfer Krull monoid of finite type. By Proposition 4.3, every commutative Krull monoid is a transfer Krull monoid. If a monoid H ∗ has a weak transfer homomorphism to a commutative Krull monoid, say θ : H ∗ → H, then the composition β ◦ θ : H ∗ → B(G0 ) is a weak transfer homomorphism (with the notation of Proposition 4.3) and hence H ∗ is a transfer Krull monoid. Thus a monoid is a transfer Krull monoid if and only if it allows a weak transfer homomorphism to a commutative Krull monoid. Since monoids of zero-sum sequences are BF-monoids (this can be checked directly or by using Lemma 2.2), Lemma 4.2 shows that transfer Krull monoids are BF-monoids. However, the examples given below reveal that transfer Krull monoids need neither be commutative nor completely integrally closed nor Mori (i.e., they do not necessarily satisfy the ACC on divisorial ideals). Before we provide a list of transfer Krull monoids, we briefly discuss general, not necessarily commutative Krull monoids (for details we refer to [22]). This concept was introduced by Wauters in 1984 in complete analogy to the ideal theoretic definition of commutative Krull monoids (compare with Theorem 3.2.(a)). Suppose that H is a monoid such that aH ∩ bH 6= ∅ and Ha ∩ Hb 6= ∅ for all a, b ∈ H. Then H is called a Krull monoid (or a Krull order) if it is completely integrally closed and satisfies the ACC on two-sided divisorial ideals. The isomorphisms in Equation (3.1) between monoids of divisorial ideals carry over from the setting of commutative domains to the setting of prime Goldie rings. Thus, in analogy to the commutative setting, we have that a prime Goldie ring is a Krull ring if and only if its monoid of cancelative elements is a Krull monoid [22, Proposition 5.1]. Moreover, Krull monoids play a central role in the study of noetherian semigroup algebras. We refer to [11] for recent surveys on non-commutative Krull rings and monoids. Examples 4.5. 1. As outlined above, commutative Krull monoids (hence all the examples given is Section 3) are transfer Krull monoids. But more generally, every normalizing Krull monoid is a transfer Krull monoid by [22, Theorems 4.13 and 6.5] (a monoid H is said to be normalizing if aH = Ha for all a ∈ H). 2. Let H be a half-factorial monoid. Since the map θ : H → B({0}), defined by θ(ǫ) = 1 for all ǫ ∈ H × and θ(u) = 0 for every u ∈ A(H), is a transfer homomorphism, H is a transfer Krull monoid (over the trivial group {0}). Only recently M. Roitman showed that commutative half-factorial domains need not be Mori [45]. Thus, transfer Krull monoids satisfy the ACC on principal left ideals and on principal right ideals (since they are BF-monoids; see Lemma 2.2) but they do not necessarily satisfy the ACC on divisorial ideals. 3. Let O be the ring of integers of an algebraic number field K, A a central simple algebra over K, and R a classical maximal O-order of A. Then R• is a Krull monoid. If every stably free left R-ideal is free, then R• is a transfer Krull monoid over a ray class group of O (note that this group is finite). If 16 ALFRED GEROLDINGER there is a stably free left R-ideal that is not free, then R• is not a transfer Krull monoid. This is due to Smertnig [49, Theorem 1.1 and 1.2], and for related results in a more general setting we refer to [4]. 4. Let R be an order in an algebraic number field K, R the integral closure of R (thus R is the ring of integers of K), and let π : spec(R) → spec(R) be the natural map defined by π(P) = P ∩ R for all nonzero prime ideals P ⊳ R. 4.(a) If R is seminormal, π is bijective, and there is an isomorphism δ : Pic(R) → Pic(R), then R• is a transfer Krull monoid over Pic(R) ([25, Theorem 5.8]). 4.(b) Suppose that π is not bijective. Since ρ(R• ) = ∞ by [23, Corollary 3.7.2], R• is not a transfer Krull monoid of finite type by Theorem 4.6. Moreover, R• is not a transfer Krull monoid over an infinite abelian group G (compare Theorems 4.6 and 5.5). 5. Let D be a commutative Krull domain, R ⊂ D a subring having the same quotient field such that D = RD× , D× ∩ R = R× , and (R : D) = m ∈ max(R). Then the inclusion R• ֒→ D• is a transfer homomorphism and hence R• is a transfer Krull monoid [23, Proposition 3.7.5]. Note that K +M -domains satisfy the above assumptions. Indeed, let R ( D be commutative domains, m a nonzero maximal ideal of D, and let K ( L ( D be subfields such that D = L + m and R = K + m. If D is Krull, then the above assumptions are satisfied. 6. Let R be a bounded HNP (hereditary noetherian prime) ring, and note that a commutative domain is an HNP ring if and only if it is a Dedekind domain. If every stably free left R-ideal is free, then R• is a transfer Krull monoid [48, Theorem 4.4]. 7. In [3], the authors study monoids of modules over HNP rings and thereby monoids of the following type occur. Let H0 be a commutative Krull monoid but not a group, D be a commutative monoid with D 6= {1D }, and define H = (H0 \ H0× ) × D ∪ H0× × {1D }. Then H is a transfer Krull monoid which is not completely integrally closed [3, Proposition 6.1]. 8. In [2], the authors study conditions under which monoids of upper triangular matrices over commutative domains allow weak transfer homomorphisms to the underlying domain. Thus, in case of commutative Krull domains we obtain transfer Krull monoids. Smertnig established characterizations on the existence of transfer homomorphisms from full matrix rings over commutative noetherian rings with no nonzero nilpotent elements to commutative Krull domains [50, Theorem 5.18]. Sets of lengths in transfer Krull monoids (hence in all above examples) can be studied successfully with the strategy using transfer homomorphisms. Indeed combining Lemma 4.2 and Proposition 3.3 we are able to apply the structural results for finitely generated monoids (derived in Section 2) to transfer Krull monoids. This is done in Theorem 4.6 whose proof follows from Propositions 2.8, 3.3, and from Lemma 4.2. Theorem 4.6. Let H be a transfer Krull monoid of finite type. Then the set of distances ∆(H) is finite, the elasticity ρ(H) is finite, the unions Uk (H) of sets of lengths are finite for all k ∈ N, and they satisfy the Structure Theorem for Unions of Sets of Lengths, as given in Theorem 2.6. We end this section by posing the following problem (see [30]). Problem 4.7. Let R be an order in an algebraic number field. Characterize when the monoid of nonzero elements R• and when the monoid of invertible ideals I ∗ (R) are transfer Krull monoids, resp. transfer Krull monoids of finite type. 5. The Structure Theorem for Sets of Lengths In transfer Krull monoids of finite type, not only do unions of sets of lengths do have a well-defined structure (as given in Theorem 4.6), but the same is true for sets of lengths. We start with a set of examples which demonstrate that the structure of sets of lengths is richer than that of their unions. Examples 5.1. Let G be a finite abelian group and G0 ⊂ G a subset such that B(G0 ) is not half-factorial.  Since min ∆ B(G0 ) = gcd B(G0 ) by Proposition 2.3, it follows that for every B ∈ B(G0 ) and every SETS OF LENGTHS y ∈ L(B) we have L(B) ⊂ y + dZ where 17  d = min ∆ B(G0 ) . Clearly, every set of lengths in B(G0 ) is an arithmetical progression with difference d if and only if  ∆ B(G0 ) = {d}. We will demonstrate that arithmetical progressions (of arbitrary lengths) actually occur as sets of lengths, but also several variants of arithmetical progressions do occur naturally. 1. Arithmetical progressions. Let g ∈ G with ord(g) = n ≥ 3. Then U = g n , −U = (−g)n , and V = (−g)g are atoms, (−U )U = V n , and clearly L (−U )U = {2, n}. For every k ∈ N, we have L (−U )k U k = 2k + {ν(n − 2) | ν ∈ [0, k]}. 2. Sumsets of arithmetical progressions. Let r, k1 , . . . , kr ∈ N and n1 , . . . , nr ∈ N≥3 . For every i ∈ [1, r], let gi ∈ G with ord(gi ) = ni and we define Bi = (−gi )ni gini . If hg1 , . . . , gr i = hg1 i ⊕ . . . ⊕ hgr i, then by 1., L(B1k1 · . . . · Brkr ) = L(B1k1 ) + ...+ L(Brkr ) = 2(k1 + . . . + kr ) + r X {ν(ni − 2) | ν ∈ [0, ki ]} i=1 is the sum of r arithmetical progressions. Clearly, the sum of r long arithmetical progressions with differences d1 , . . . , dr is an almost arithmetical progression with difference d = gcd(d1 , . . . , dr ). 3. Almost arithmetical progressions (AAPs, see Definition 2.5). We sketch the argument that large sets of lengths in B(G0 ) are AAPs with difference d = min ∆ B(G0 ) (for a formal statement and proof we refer to [23, Theorem 4.3.6]). We proceed as at the beginning of the proof of Theorem 2.6. Clearly, C0 ∈ B(G0 )   there exist an element and m ∈ N such that {m, m + d} ⊂ L(C0 ). Since d = gcd ∆ B(G0 , ψ = ρ ∆ B(G0 − 1 ∈ N. Then L0 = {k0 , k0 + d, . . . , k0 + ψd} ⊂ L(C) where C = C0ψ and k0 = ψm. Now pick any large element A ∈ B(G0 ), where by large we mean that A is divisible by C. Thus, for some B ∈ B(G0 ), we have A = BC and L0 + L(B) ⊂ L(C) + L(B) ⊂ L(A) . Since L(B) can be viewed as an arithmetical progression with difference d which has gaps (whose number is controlled by ψ), the sumset L0 + L(B) is an arithmetical progression with difference d. Thus, if A is large (with respect to the parameters d and ψ depending on G0 ), the set of lengths L(A) contains a long arithmetical progression with difference d as the central part, whereas the initial and end parts may have gaps. 4. Almost arithmetical multiprogressions (the definition is given below). Let G1 ⊂ G0 be a subset and let B ∈ B(G1 ) be such that L(B) is an AAP with difference d, say L(B) = y + (L′ ∪ L∗ ∪ L′′ ) ⊂ y + dZ where L∗ is a long arithmetical progression with difference d (the long central part of L(B)) such that min L∗ = 0. It is not difficult to show that every finite subset of N≥2 can be realized as a set of lengths (e.g., [23, Proposition 4.8.3]). Thus for any set D ⊂ [0, d] with min D = 0 and max D = d, there is a zero-sum sequence C with L(C) = x + D for some x ∈ N. Suppose that C ∈ B(G2 ) for a subset G2 ⊂ G0 with hG1 i ∩ hG2 i = {0}. Then   (x + y)+ (L′ + D) ⊎ (L∗ + D) ⊎ (L′′ + D) ⊂(x + y) + L(B) + L(C) ⊂ (x + y) + L(BC) ⊂ (x + y) + D + dZ . Note that the long central part L∗ + D repeats the set D periodically, whereas the short initial and end parts L′ + D and L′′ + D may contain gaps. Indeed, if L∗ = {0, d, 2d, . . . , ℓd}, then L∗ + D = D ∪ (d + D) ∪ . . . ∪ (ℓd + D) ⊂ D + dZ . Consider transfer Krull monoids of finite type. Then their sets of lengths coincide with sets of lengths of the monoid of zero-sum sequences. Moreover, the Structure Theorem for Sets of Lengths for these 18 ALFRED GEROLDINGER monoids states that no other phenomena besides those which we have described in the above examples can occur. We make this more precise with the following definition. Definition 5.2. Let d ∈ N, ℓ, M ∈ N0 and {0, d} ⊂ D ⊂ [0, d]. A subset L ⊂ Z is called an almost arithmetical multiprogression (AAMP for short) with difference d, period D, length ℓ and bound M , if L = y + (L′ ∪ L∗ ∪ L′′ ) ⊂ y + D + dZ where y ∈ Z is a shift parameter, • the central part L∗ satisfies min L∗ = 0, L∗ = [0, max L∗ ] ∩ (D + dZ), and ℓ ∈ N is maximal such that ℓd ∈ L∗ , • the initial part L′ satisfies L′ ⊂ [−M, −1], and • the end part L′′ satisfies L′′ ⊂ max L∗ + [1, M ]. Note that AAMPs are finite subsets of the integers, that an AAMP with period D = {0, d} is an AAP, and that an AAMP with period D = {0, d} and bound M = 0 is a usual arithmetical progression with difference d. As it was with AAPs (see Definition 2.5), every single finite set is an AAMP with a trivial choice of parameters (let L∗ be a singleton and set M = max L). To discuss one example of an AAMP (with natural parameters), let n = pk11 · . . . · pkr r , where r, k1 , . . . , kr ∈ N and p1 , . . . , pr are distinct primes. We consider the set A = {a ∈ [0, n] | gcd(a, n) > 1} ∪ {0} and observe that A = ∪ri=1 pi N0 ∩ [0, n]. Setting d = p1 · . . . · pr and D = A ∩ [0, d], we obtain that A = D + {0, d, 2d, . . . , (n/d − 1)d} ⊂ D + dZ is an AAMP with difference d, period D, and bound M = 0. Consider an atomic monoid with nonempty set of distances. Lemma 2.1 shows that sets of lengths become arbitrarily large. The Structure Theorem for Sets of Lengths (formulated below) states that the set of distances is finite (whence there are only finitely many periods D with differences in ∆(H)) and there is one global bound M for all sets of lengths. Thus (with the above notation) long sets of lengths have a highly structured central part L∗ , and L∗ is the only part of the set of lengths that can become arbitrarily large whereas the initial and end parts are universally bounded. Theorem 5.3 (Structure Theorem for Sets of Lengths). Let H be a transfer Krull monoid of finite type. Then the set of distances is finite and there is some M ∈ N0 such that every L ∈ L(H) is an AAMP with some difference d ∈ ∆(H) and bound M . The above theorem was first proved in [21] (in a slightly weaker version), and a detailed proof can be found in [23, Chapter 4]. To provide an additional example for the validity of the Structure Theorem, b and with nontrivial conductor take a commutative Mori domain R with complete integral closure R, b b f = (R : R). If the class group C(R) and the residue class ring R/f are both finite, then the Structure Theorem holds true [23, Theorems 2.11.9 and 4.6.6] (this setting includes orders in algebraic number fields). It is an open problem whether the assumption on the finiteness of R/f is necessary for the validity of the Structure Theorem [24, 39]. On the other hand, for transfer Krull monoids of finite type the description given by the above Structure Theorem is best possible as the following realization theorem by Schmid [46] shows. Theorem 5.4 (A Realization Theorem). Let M ∈ N0 and ∆∗ ⊂ N be a finite nonempty set. Then there exists a commutative Krull monoid H with finite class group such that the following holds : for every AAMP L with difference d ∈ ∆∗ and bound M there is some yH,L ∈ N such that y + L ∈ L(H) for all y ≥ yH,L . We end this section with results which are in sharp contrast to the Structure Theorem. Indeed, they offer monoids where every finite subset of N≥2 occurs as a set of lengths. Moreover, there is a transfer Krull monoid H1 and a monoid H2 , which is not a transfer Krull monoid, whose systems of sets of lengths coincide (the first class is due to a theorem of Kainrath [40] and the second example due to Frisch [17]). SETS OF LENGTHS 19 Theorem 5.5. For the following classes of monoids we have  L(H) = {L ⊂ N≥2 | L is finite and nonempty} ∪ {0}, {1} . • H is a transfer Krull monoid over an infinite abelian group G. • H = Int(Z)• is the monoid of nonzero integer-valued polynomials over Z. Moreover, Int(Z)• is not a transfer Krull monoid. 6. The Characterization Problem for Systems of Sets of Lengths Let H be a transfer Krull monoid of finite type. As we have seen in Theorems 4.6 and 5.3, the finite type property implies the finiteness of the set of distances and the structural results on unions of sets of lengths and on sets of lengths. In this final section we will always suppose that H is a transfer Krull monoid over a finite abelian group, and this assumption will imply even stronger results. Thus let H be a transfer Krull monoid over a finite abelian group G. Then Lemma 4.2 implies that  L(H) = L B(G) , and as usual we set L(G) := L B(G) . Recall all the examples discussed in Section 3 and in Examples 4.5. In particular, rings of integers of algebraic number fields are the prototypical examples for transfer Krull monoids over finite abelian groups. Classical philosophy in algebraic number theory (dating back to the 19th century) states that the class group determines their arithmetic. This idea can be justified (see [23, Section 7.1]), and concerning lengths of factorizations it holds true by Proposition 4.3. In the 1970s Narkiewicz posed the inverse question of whether or not arithmetical behaviour (in other words, behaviour describing the non-uniqueness of factorizations) characterize the class group. The first affirmative answers ([23, Sections 7.1 and 7.2]) have an artificial flavor because the given characterizations are based on rather abstract arithmetical properties which are designed to do the characterization and play only a small role in other parts of factorization theory. Since on the other hand sets of lengths are of central interest in factorization theory, it has been natural to ask whether their structure is rich enough to force characterizations, and this question is known as the Characterization Problem. The Characterization Problem. Given two finite abelian groups G and G′ with D(G) ≥ 4 such that L(G) = L(G′ ). Does it follow that G ∼ = G′ ? Clearly, a necessary condition for an affirmative answer is that G and G′ are isomorphic if and only if the associated monoids B(G) and B(G′ ) are isomorphic. This necessary condition is guaranteed by Proposition 3.3.4. Answering the Characterization Problem is a long-term goal in the study of sets of lengths of transfer Krull monoids over finite abelian groups. We start with two elementary results (Propositions 6.1 and 6.2). Then we will be in  Problem in greater detail. As  a position to analyze  the Characterization usual we set A(G) := A B(G) , ∆(G) := ∆ B(G) , Uk (G) = Uk B(G) , and ρk (G) := ρk B(G) for every k ∈ N. Since A(G) is finite (see Propositions 2.8 and 3.2), the Davenport constant D(G) = max{|U | | U ∈ A(G)} is finite. Clearly, D(G) is the smallest integer ℓ ∈ N such that every sequence S over G of length |S| ≥ ℓ has a zero-sum subsequence T of length |T | ≥ 1. The significance of D(G) for the study of sets of lengths will become  clear in our next result. If |G| ≤ 2, then D(G) = |G| and Proposition 3.3.2 implies that L(G) = {k} | k ∈ N0 , whence ∆(G) = ∅, and Uk (G) = {k} for every k ∈ N. Thus we suppose that 2 < |G| < ∞. Proposition 6.1. Let G be a finite abelian group with |G| ≥ 3. 1. For every k ∈ N, Uk (G) is an interval, ρ(G) = D(G)/2, ρ2k (G) = kD(G), and D(G) ⌋. 2 2. ∆(G) is an interval with min ∆(G) = 1 and max ∆(G) ≤ D(G) − 2. 1 + kD(G) ≤ ρ2k+1 (G) ≤ kD(G) + ⌊ 20 ALFRED GEROLDINGER Proof. 1. Let k ∈ N. First, we show that Uk (G) is an interval. Note that it suffices to prove that [k, ρk (G)] ⊂ Uk (G). Indeed, suppose that this is done, and let ℓ ∈ [min Uk (G), k]. Then ℓ ≤ k ≤ ρℓ (G), hence k ∈ Uℓ (G) and consequently ℓ ∈ Uk (G). Thus let ℓ ∈ [k, ρk (G)] be minimal such that [ℓ, ρk (G)] ⊂ Uk (G) and assume to the contrary that ℓ > k. Let Ω be the set of all A ∈ B(G) such that {k, j} ⊂ L(A) for some j ≥ ℓ, and let B ∈ Ω be such that |B| is minimal. Then B = U1 · . . . · Uk = V1 · . . . · Vj , where j ≥ ℓ and U1 , . . . , Uk , V1 , . . . , Vj ∈ A(G). Since j > k, we have B 6= 0|B| , and (after renumbering if necessary) we may assume that Uk = g1 g2 U ′ and Vj−1 Vj = g1 g2 V ′ , where g1 , g2 ∈ G and U ′ , V ′ ∈ F (G). Then Uk′ = (g1 + g2 )U ′ ∈ A(G), and we suppose ′ that Vj−1 = (g1 +g2 )V ′ = W1 ·. . .·Wt , where t ∈ N and W1 , . . . , Wt ∈ A(G). If B ′ = U1 ·. . .·Uk−1 Uk′ , then |B ′ | < |B| and B ′ = V1 · . . . · Vj−2 W1 · . . . · Wt . By the minimal choice of |B|, it follows that j − 2 + t < ℓ, hence t = 1, j = ℓ and ℓ − 1 ∈ Uk (G), a contradiction. Second, we study ρk (G). We start with the following assertion. A. If A = 0m B ∈ B(G), with m = v0 (A) ∈ N0 and B ∈ B(G), then D(G) . 2 Proof of A. Let A = 0m U1 · . . . · Uℓ where ℓ, m ∈ N0 and U1 , . . . , Uℓ ∈ A(G) \ {0}. Then 2 ≤ |Uν | ≤ D(G) for all ν ∈ [1, ℓ] and hence m + 2ℓ ≤ |A| ≤ m + ℓD(G) . 2 max L(A) − m ≤ |A| ≤ D(G) min L(A) − m(D(G) − 1) and ρ(A) ≤ Choosing ℓ = min L(B) and ℓ = max L(B) we obtain the first inequalities, and then we obtain ρ(A) = max L(A) m + max L(B) max L(B) D(G) = ≤ ≤ . min L(A) m + min L(B) min L(B) 2 The proof of A and Proposition 2.4.2 imply that ρk (G) ≤ kρ(G) ≤ kD(G)/2. If U = g1 ·. . .·gD(G) ∈ A(G), k QD(G) then (−U )k U k = i=1 (−gi )gi , whence kD(G) ≤ ρ2k (G) and thus ρ2k (G) = kD(G). Furthermore, it follows that (2k + 1)D(G) 1 + kD(G) = ρ1 (G) + ρ2k (G) ≤ ρ2k+1 (G) ≤ . 2 Finally, Proposition 2.4.2 implies that ρ(G) = D(G)/2. 2. The proof that ∆(G) is an interval is similar but trickier than that of 1., and we refer to [31]. It is easy to verify that 1 ∈ ∆(G), and we encourage the reader to do so. Next we prove that max ∆(G) ≤ D(G)−2. If A′ = 0k A with k ∈ N0 and A ∈ B(G) with 0 ∤ A, then L(A′ ) = k + L(A) and ∆(L(A′ )) = ∆(L(A)). Thus we have to prove that max ∆(L(A)) ≤ D(G) − 2 for all A ∈ B(G) with 0 ∤ A, and we proceed by induction on |A|. Suppose that A = U1 · . . . · Ui = V1 · . . . · Vk , where i < k, U1 , . . . , Ui , V1 , . . . , Vk ∈ A(G) , and L(A)∩[i, k] = {i, k}. If |A| ≤ 2D(G), then k ≤ D(G) and k −i ≤ D(G)−2. Suppose that |A| > 2D(G) and that max ∆(L(A′ )) ≤ D(G) − 2 for all A′ with |A′ | < |A|. If |Vj | ≥ i for all j ∈ [1, k], then ki ≤ |V1 · . . . · Vk | = |U1 · . . . · Ui | ≤ iD(G) and hence k − i ≤ D(G) − 2 . Suppose that there is a j ∈ [1, k] such that |Vj | < i, say j = 1, V1 | U1 · . . . · Ui−1 , and let U1 · . . . · Ui−1 = V1 W2 · . . . · Wℓ with ℓ ∈ N and W2 , . . . , Wℓ ∈ A(G). We distinguish two cases. CASE 1: ℓ ≥ i. Since L(U1 ·. . .·Ui )∩[i, k] = {i, k}, it follows that L(U1 ·. . .·Ui−1 )∩[i, k −2] = ∅ and hence ℓ ≥ k − 1. We may suppose that ℓ ≥ k − 1 is minimal such that U1 · . . . · Ui−1 satisfies such an equation. Then the induction hypothesis implies that ℓ − (i − 1) ≤ D(G) − 2 and hence k − i ≤ (ℓ + 1) − i ≤ D(G) − 2. CASE 2: ℓ ≤ i−1. Since V1 ·. . .·Vk = U1 ·. . .·Ui = V1 W2 ·. . .·Wℓ Ui , it follows that V2 ·. . .·Vk = Ui W2 ·. . .·Wℓ . Note that L(V2 · . . . · Vk ) ∩ [i, k − 2] = ∅, and suppose that ℓ ≤ i − 1 is maximal such that V2 · . . . · Vk satisfies such an equation. Then the induction hypothesis implies that (k − 1) − ℓ ≤ D(G) − 2 and hence k − i = (k − 1) − (i − 1) ≤ k − 1 − ℓ ≤ D(G) − 2.  SETS OF LENGTHS 21 The state of the art on ρ2k+1 (G) is discussed in [47]. For some small groups G the system L(G) can be written down explicitly. Proposition 6.2.  1. L(C3 ) = L(C  2 ⊕ C2 ) = y + 2k + [0, k]  y, k ∈ N0 . 2. L(C4 ) = y +k+ 1+[0, k] | y, k ∈ N0 ∪ y +2k+2 · [0, k] | y, k ∈ N0 . 3 3. L(C  2 ) = y + (k + 1) + [0, k] y ∈N0 , k ∈ [0, 2] ∪ y + k + [0, k] y ∈ N0 , k ≥ 3 ∪ y + 2k + 2 · [0, k] y, k ∈ N0 . 4. L(C32 ) = {[2k, ℓ] | k ∈ N0 , ℓ ∈ [2k, 5k]} ∪ {[2k + 1, ℓ] | k ∈ N, ℓ ∈ [2k + 1, 5k + 2]} ∪ {{1}}. Proof. We prove the first statement. The proofs of the remaining statements are similar but more lengthy (details can be found in [29, Proposition 4.2]). Suppose that G is cyclic of order three, say G = {0, g, −g}. Then A(G) = {0, U = g 3 , −U, V = (−g)g}, D(G) = 3, and (−U )U = V 3 is the only minimal relation. Clearly, L(V 3 ) = {2, 3}, L(V 3k ) = {2k, 2k + 1, . . . , 3k} = 2k + [0, k], and L(0y V 3k ) = y + 2k + [0, k] for all y, k ∈ N0 . Since ∆(G) = {1}, ρ2k (G) = 3k, and ρ2k+1 (G) = 3k + 1 for every k ∈ N by Proposition 6.1, there are no further sets of lengths. Suppose that G is an elementary 2-group of rank two, say G = {0, e1 , e2 , e1 + e2 }. Then A(G) = {0, U = e1 e2 (e1 + e2 ), V1 = e21 , V2 = e22 , V3 = (e1 + e2 )2 }, and hence U 2 = V1 V2 V3 is the only minimal relation. Now the proof runs along the same lines as above.  One big difficulty in all work on the Characterization Problem stems from the fact that most sets of lengths over any finite abelian group are intervals. To make this precise we mention two deep results without proof. Theorem 6.3 (Sets of lengths which are intervals). Let G be a finite abelian group with |G| ≥ 3. 1. If A is a zero-sum sequence whose support supp(A) ∪ {0} is a subgroup of G, then L(A) is an interval. 2. If R is the ring of integers of an algebraic number field K with class group G, then lim x→∞ #{aR | NK/Q (aR) ≤ x, L(a) is an interval} = 1. #{aR | NK/Q (aR) ≤ x} The first statement is a result in additive combinatorics which can be found in [23, Theorem 7.6.8]. The limit formula is based on the first statement and on the analytic machinery of counting functions [23, Theorem 9.4.11]. In the 1960s Narkiewicz initiated a systematic study of the asymptotic behavior of counting functions associated with non-unique factorizations. We refer to the monographs [42, Chapters 7 and 9], [23, Chapters 8 and 9], and to [39] (analytic monoids, introduced in [39], are Krull monoids which have an abstract norm function satisfying axioms which allow to develop a theory of L-functions). In spite of Theorem 6.3 and having Propositions 6.1 and 6.2 at our disposal, we start with a more detailed analysis of the Characterization Problem. We have seen that L(C1 ) = L(C2 ) and L(C3 ) = L(C2 ⊕ C2 ) . An abelian group G has Davenport constant D(G) ≤ 3 if and only if it is either cyclic of order |G| ≤ 3 or isomorphic to C2 ⊕ C2 . Thus we focus on groups whose Davenport constant is at least four. Let G be a finite abelian group with D(G) ≥ 4, say G∼ = Cn1 ⊕ . . . ⊕ Cnr with 1 < n1 | . . . | nr and set D∗ (G) = 1 + r X (ni − 1) . i=1 Clearly, the system L(G) depends only on G and hence on the group invariants (n1 , . . . , nr ). Thus L(G) as a whole as well as the invariants controlling L(G) – such as the set of distances ∆(G) and the kth 22 ALFRED GEROLDINGER elasticities ρk (G) – allow a description in (n1 , . . . , nr ). We demonstrate the complexity of such problems by considering ρ2 (G). By Proposition 6.1, we have ρ2 (G) = D(G). The Davenport constant D(G) is one of the most classical zero-sum invariants which has been studied since the 1960s. If (e1 , . . . , er ) is a basis of G with ord(ei ) = ni for each i ∈ [1, r], then r Y A = (e1 + . . . + er ) eini −1 ∈ A(G) , i=1 and hence D∗ (G) = |A| ≤ D(G). It has been known since the 1960s that equality holds for p-groups and groups of rank at most two [23, Theorem 5.8.3]. It is an open problem whether equality holds for groups of rank three, but for every r ≥ 4 there are infinitely many groups G having rank r and for which D∗ (G) < D(G) holds. We refer to [28, 47] for a survey of what is known on parameters controlling L(G). We first show a simple finiteness result and then present one result (a proof can be found in [23, Theorem 6.6.3]) revealing characteristic phenomena of L(G) for cyclic groups and elementary 2-groups. Lemma 6.4. Let G be a finite abelian group with D(G) ≥ 4. Then there are only finitely many abelian groups G′ (up to isomorphism) such that L(G) = L(G′ ). Proof. If G′ is an abelian group such that L(G′ ) = L(G), then Proposition 6.1 implies D(G) = ρ2 (G) = ρ2 (G′ ) = D(G′ ) and hence D∗ (G′ ) ≤ D(G). Since there are only finitely many G′ (up to isomorphism) such that D∗ (G′ ) is bounded above by a constant, there are only finitely many groups G′ for which L(G′ ) = L(G) can hold.  Proposition 6.5. Let G be a finite abelian group with D(G) ≥ 4. Then {2, D(G)} ∈ L(G) if and only if G is either cyclic or an elementary 2-group. The next theorem gathers what is known on the Characterization Problem. Theorem 6.6. Let G be a finite abelian group with D(G) ≥ 4, and let G′ be an abelian group with L(G) = L(G′ ). Then G and G′ are isomorphic in each of the following cases. 1. G ∼ = Cn1 ⊕ Cn2 where n1 , n2 ∈ N with n1 | n2 and n1 + n2 > 4. 2. G is an elementary 2-group. 3. G ∼ = Cnr where r, n ∈ N with n ≥ 2 and 2r < n − 2. 4. D(G) ≤ 11. Proof of a special case. We give a sketch of the proof for cyclic groups and for elementary 2-groups. Let G be either cyclic or an elementary 2-group with D(G) ≥ 4, and let G′ be any abelian group with L(G) = L(G′ ). Since D(G) = ρ2 (G) = ρ2 (G′ ) = D(G′ ) by Proposition 6.1 and since {2, D(G)} ∈ L(G) by Proposition 6.5, it follows that {2, D(G′ )} ∈ L(G′ ). Again Proposition 6.5 implies that G′ is either cyclic or an elementary 2-group. There are two proofs showing that the system of sets of lengths of cyclic groups and that of elementary 2-groups (with the same Davenport constant) are distinct ([28, Corollary 5.3.3, page 77] or [23, Theorem 7.3.3]), and neither of them is elementary. Both proofs use the Savchev-Chen Structure Theorem for long zero-sum free sequences over cyclic groups ([28, Theorem 5.1.8, page 61], [34, Chapter 11]) or related statements. To discuss one approach, let k ∈ N and consider the inequality for ρ2k+1 (G) given in Proposition 6.1. Elementary examples show in case of elementary 2-groups that we have equality on the right side, whereas for cyclic groups we have equality on the left side ([28, Theorem 5.3.1, page 75]. Detailed proofs can be found in [28, Corollary 5.3.3, page 77] and [23, Theorem 7.3.3]. Now suppose that G has rank two, say G ∼ = Cn1 ⊕Cn2 where n1 , n2 ∈ N with 1 < n1 | n2 and n1 +n2 > 4, and let G′ be any abelian group such that L(G) = L(G′ ). The proof that G and G′ are isomorphic has two main ingredients. First, it is based on the characterization of all minimal zero-sum sequences over G of length D(G). This has been done in a series of papers by Gao, Geroldinger, Grynkiewicz, Reiher, and Schmid (see [7] for the characterization and detailed references). Second, it is based on the Structure SETS OF LENGTHS 23 Theorem for Sets of Lengths (Theorem 5.3), on an associated inverse result ([23, Proposition 9.4.9]), and on a detailed study of the set of minimal distances ∆∗ (G) ([33]), which is defined as ∆∗ (G) = {min ∆(G0 ) | G0 ⊂ G with ∆(G0 ) 6= ∅} ⊂ ∆(G) . Detailed proofs of 1., 3., and 4. can be found in [29, 32, 51].  We end this survey with the conjecture stating that the Characterization Problem has a positive answer for all finite abelian groups G having Davenport constant D(G) ≥ 4. Conjecture 6.7. Let G be a finite abelian group with D(G) ≥ 4. If G′ is an abelian group with L(G) = L(G′ ), then G and G′ are isomorphic. References [1] D.D. Anderson (ed.), Factorization in Integral Domains, Lect. Notes Pure Appl. Math., vol. 189, Dekker, New York, 1997. [2] D. Bachman, N. Baeth, and J. Gossell, Factorizations of upper triangular matrices, Linear Algebra Appl. 450 (2014), 138 – 157. [3] N.R. Baeth, A. Geroldinger, D.J. Grynkiewicz, and D. Smertnig, A semigroup-theoretical view of direct-sum decompositions and associated combinatorial problems, J. Algebra Appl. 14 (2015), 1550016 (60 pages). [4] N.R. Baeth and D. Smertnig, Factorization theory: From commutative to noncommutative settings, J. Algebra 441 (2015), 475 – 551. [5] N.R. Baeth and R. Wiegand, Factorization theory and decomposition of modules, Amer. Math. Monthly 120 (2013), 3 – 34. [6] P. Baginski and S.T. Chapman, Factorizations of algebraic integers, block monoids, and additive number theory, Amer. Math. Monthly 118 (2011), 901 – 920. [7] P. Baginski, A. Geroldinger, D.J. Grynkiewicz, and A. Philipp, Products of two atoms in Krull monoids and arithmetical characterizations of class groups, Eur. J. Comb. 34 (2013), 1244 – 1268. [8] P.-J. Cahen and J.-L. Chabert, Integer-Valued Polynomials, vol. 48, Amer. Math. Soc. Surveys and Monographs, 1997. , What you should know about integer-valued polynomials, Amer. Math. Monthly 123 (2016), 311 – 337. [9] [10] S.T. Chapman, A tale of two monoids: a friendly introduction to nonunique factorizations, Math. Magazine 87 (2014), 163 – 173. [11] S.T. Chapman, M. Fontana, A. Geroldinger, and B. Olberding (eds.), Multiplicative Ideal Theory and Factorization Theory, Proceedings in Mathematics and Statistics, vol. 170, Springer, 2016. [12] S.T. Chapman and W.W. Smith, Factorization in Dedekind domains with finite class group, Isr. J. Math. 71 (1990), 65 – 95. [13] J. Coykendall and W.W. Smith, On unique factorization domains, J. Algebra 332 (2011), 62 – 70. [14] M. Delgado, P.A. Garcı́a-Sánchez, and J. Morais, “numericalsgps”: a gap package on numerical semigroups, (http://www.gap-system.org/Packages/numericalsgps.html). [15] A. Facchini, Direct sum decomposition of modules, semilocal endomorphism rings, and Krull monoids, J. Algebra 256 (2002), 280 – 307. [16] M. Fontana, E. Houston, and T. Lucas, Factoring Ideals in Integral Domains, Lecture Notes of the Unione Matematica Italiana, vol. 14, Springer, 2013. [17] S. Frisch, A construction of integer-valued polynomials with prescribed sets of lengths of factorizations, Monatsh. Math. 171 (2013), 341 – 350. [18] , Relative polynomial closure and monadically Krull monoids of integer-valued polynomials, in Multiplicative Ideal Theory and Factorization Theory. Ed. S. T. Chapman, M. Fontana, A. Geroldinger, and B. Olberding. Springer, 2016, pp. 145 – 157. [19] W. Gao and A. Geroldinger, On products of k atoms, Monatsh. Math. 156 (2009), 141 – 157. [20] P.A. Garcı́a-Sánchez, An overview of the computational aspects of nonunique factorization invariants, in Multiplicative Ideal Theory and Factorization Theory. Ed. S.T. Chapman, M. Fontana, A. Geroldinger, and B. Olberding. Springer, 2016, pp. 159 – 181. [21] A. Geroldinger, Über nicht-eindeutige Zerlegungen in irreduzible Elemente, Math. Z. 197 (1988), 505 – 529. , Non-commutative Krull monoids: a divisor theoretic approach and their arithmetic, Osaka J. Math. 50 (2013), [22] 503 – 539. [23] A. Geroldinger and F. Halter-Koch, Non-Unique Factorizations. Algebraic, Combinatorial and Analytic Theory, Chapman & Hall/CRC, Boca Raton, FL, 2006. [24] A. Geroldinger and F. Kainrath, On the arithmetic of tame monoids with applications to Krull monoids and Mori domains, J. Pure Appl. Algebra 214 (2010), 2199 – 2218. 24 ALFRED GEROLDINGER [25] A. Geroldinger, F. Kainrath, and A. Reinhart, Arithmetic of seminormal weakly Krull monoids and domains, J. Algebra 444 (2015), 201 – 245. [26] A. Geroldinger and G. Lettl, Factorization problems in semigroups, Semigroup Forum 40 (1990), 23 – 38. [27] A. Geroldinger, S. Ramacher, and A. Reinhart, On v-Marot Mori rings and C-rings, J. Korean Math. Soc. 52 (2015), 1 – 21. [28] A. Geroldinger and I. Ruzsa, Combinatorial Number Theory and Additive Group Theory, Advanced Courses in Mathematics - CRM Barcelona, Birkhäuser, 2009. [29] A. Geroldinger and W. A. Schmid, A characterization of class groups via sets of lengths, http://arxiv.org/abs/1503.04679. [30] A. Geroldinger, W. A. Schmid, and Q. Zhong, Systems of sets of lengths: transfer Krull monoids versus weakly Krull monoids, http://arxiv.org/abs/1606.05063. [31] A. Geroldinger and P. Yuan, The set of distances in Krull monoids, Bull. Lond. Math. Soc. 44 (2012), 1203 – 1208. [32] A. Geroldinger and Q. Zhong, A characterization of class groups via sets of lengths II, J. Théor. Nombres Bordx. (forthcoming). [33] , The set of minimal distances in Krull monoids, Acta Arith. 173 (2016), 97 – 120. [34] D.J. Grynkiewicz, Structural Additive Theory, Developments in Mathematics, Springer, 2013. [35] F. Halter-Koch, Finitely generated monoids, finitely primary monoids and factorization properties of integral domains, in Factorization in Integral Domains. Ed. D.D. Anderson. Lect. Notes Pure Appl. Math., vol. 189, Dekker, New York, 1997, pp. 73 – 112. , Ideal Systems. An Introduction to Multiplicative Ideal Theory, Marcel Dekker, 1998. [36] [37] G. Hegedüs, Z. Li, J. Schicho, and H.P. Schröcker, From the fundamental theorem of algebra to Kempe’s universality theorem, Internat. Math. Nachrichten 229 (2015), 13–26. [38] B. Jacobson, Matrix number theory : an example of non-unique factorization, Amer. Math. Monthly 72 (1965), 399 – 402. [39] J. Kaczorowski, Analytic monoids and factorization problems, Semigroup Forum (forthcoming). [40] F. Kainrath, Factorization in Krull monoids with infinite class group, Colloq. Math. 80 (1999), 23 – 30. [41] P. Malcolmson and F. Okoh, Half-factorial subrings of factorial domains, J. Pure Appl. Algebra 220 (2016), 877 – 891. [42] W. Narkiewicz, Elementary and Analytic Theory of Algebraic Numbers, 3rd ed., Springer, 2004. [43] A. Reinhart, On the divisor-class group of monadic submonoids of rings of integer-valued polynomials, Commun. Korean Math. Soc. (forthcoming). , On monoids and domains whose monadic submonoids are Krull, in Commutative Algebra. Recent Advances in [44] Commutative Rings, Integer-Valued Polynomials, and Polynomial Functions. Ed. M. Fontana, S. Frisch, and S. Glaz. Springer, 2014, pp. 307 – 330. [45] M. Roitman, Half-factorial domains, manuscript. [46] W.A. Schmid, A realization theorem for sets of lengths, J. Number Theory 129 (2009), 990 – 999. , Some recent results and open problems on sets of lengths of Krull monoids with finite class group, in Multi[47] plicative Ideal Theory and Factorization Theory. Ed. S.T. Chapman, M. Fontana, A. Geroldinger, and B. Olberding. Springer, 2016, pp. 323 – 352. [48] D. Smertnig, Factorizations in bounded hereditary noetherian prime rings, http://arxiv.org/abs/1605.09274. [49] , Sets of lengths in maximal orders in central simple algebras, J. Algebra 390 (2013), 1 – 43. , Factorizations of elements in noncommutative rings: A Survey, in Multiplicative Ideal Theory and Factorization [50] Theory. Ed. S.T. Chapman, M. Fontana, A. Geroldinger, and B. Olberding. Springer, 2016, pp. 353 – 402. [51] Q. Zhong, Sets of minimal distances and characterizations of class groups of Krull monoids, http://arxiv.org/abs/1606.08039. University of Graz, NAWI Graz, Institute for Mathematics and Scientific Computing, Heinrichstraße 36, 8010 Graz, Austria E-mail address: [email protected]
4math.GR
TORSION FUNCTORS WITH MONOMIAL SUPPORT arXiv:1207.0610v3 [math.AC] 2 Apr 2014 FRED ROHRER Abstract. The dependence of torsion functors on their supporting ideals is investigated, especially in the case of monomial ideals of certain subrings of polynomial algebras over not necessarily Noetherian rings. As an application it is shown how flatness of quasicoherent sheaves on toric schemes is related to graded local cohomology. Introduction Over a Noetherian ring (where rings are always understood to be commutative), torsion functors (and hence local cohomology functors) depend only on the radical of their supporting ideals. Without Noetherianness this need not hold. Supposing the supporting ideals to be monomial ideals of finite type of a polynomial algebra one might hope for it to still hold – after all, monomial ideals behave quite independently of the base ring and hence might be unaffected by its potential lack of some nice properties. We will see that this is indeed true. However, the torsion functors with respect to a monomial ideal of finite type and its radical may be different, unless the nilradical of the base ring is nilpotent. But using a monomial variant of the notion of radical it is possible to get a satisfying result that is independent of the base ring and moreover can be generalised to a class of subalgebras of polynomial algebras. There were two main reasons for writing this note. First, the recent preprint [2] by Botbol and Chardin on Castelnuovo-Mumford regularity over not necessarily Noetherian polynomial algebras contains the claim that local cohomology with respect to monomial ideals of finite type remains the same when we replace the supporting ideal by its radical. This aroused suspicions and turned out to be indeed wrong. Luckily, the aforementioned monomial variant of radical can save the day, and the moral might be that working over not necessarily Noetherian rings requires some meticulousness even in a monomial setting. The second reason comes from the study of toric schemes, i.e., “toric varieties over arbitrary base rings”. An overview of this continuing project including its motivation can be found in [8]. With this approach to toric geometry one gets a relation between flatness of quasicoherent sheaves on a toric scheme and graded Čech cohomology over a corresponding restricted Cox ring with respect to a certain sequence of monomials. The ideal J generated by these monomials is not necessarily equal to the restricted irrelevant ideal I, and thus – in case graded Čech cohomology coincides with graded local cohomology (which it need not do in general) – the question arises whether or not graded local cohomology distinguishes between J 2010 Mathematics Subject Classification. Primary 13D45; Secondary 14M25. Key words and phrases. Torsion functor, local cohomology, monomial ideal, Čech cohomology, flatness, Cox scheme. The author was supported by the Swiss National Science Foundation. 1 2 FRED ROHRER and I. By applying our general results we will see that it does not, and thus we can relate flatness of quasicoherent sheaves on toric schemes with graded local cohomology with respect to I. (The importance of graded local cohomology with respect to I stems from its relation to sheaf cohomology as given by the toric Serre-Grothendieck correspondence ([9, 4.5]).) 1. Equality of torsion functors: The general case In this section we search for conditions under which torsion functors over arbitrary rings depend only on the radical of the supporting ideals. For the sake of generality we consider throughout a graded setting, even if the graduation is not relevant. So, let G be a commutative group and let R be a G-graded ring. By a projective system of graded ideals we mean a projective system of graded ideals of R over an ordered set. We denote such a system in the form A = (aj )j∈J , where J is understood to be an ordered set. For a projective system of graded ideals A = (aj )j∈J we denote by ΓA the G-graded A-torsion functor, i.e., the subfunctor of the identity functor on the category GrModG (R) of G-graded R-modules with S ΓA (M ) = j∈J (0 :M aj ) for a G-graded R-module M . Extending our ambient universe (cf. [1, I.0]) we can consider the (potentially big) set T(R) := {ΓA | A projective system of graded ideals} of subfunctors of the identity functor as an ordered set by means of its canonical ordering. If A = (aj )j∈J and B = (bk )k∈K are two projective systems of graded ideals, then A is called coarser than B if for every j ∈ J there exists k ∈ K with bk ⊆ aj ; this defines a preorder relation. Two projective systems of graded ideals are called equivalent if each of them is coarser than the other; this defines an equivalence relation. Slightly generalising [3, III.1.2] (and keeping in mind [3, II.6.9]) we get representatives of equivalence classes under this relation, and thus obtain an order relation associated with the above preorder relation. This order relation is readily seen to have a graph, and so we end up with a (small) ordered set (R) whose elements are representatives of equivalence classes of projective systems of graded ideals. The relation between (R) and (R) is given by the following proposition, where by an isomorphism of ordered sets we understand – accordingly to [3, III.1.3] – an increasing bijection with increasing inverse. S S T (1.1) Proposition There is an isomorphism of ordered sets ∼ = S(R) −→ T(R), A 7→ ΓA. Proof. The map in question is obviously a surjective morphism of ordered sets. Let A = (aj )j∈J and B = (bk )k∈K be projective systems of graded ideals such that ΓA is a subfunctor of ΓB . If j ∈ J then R/aj is annihilated by aj , and so R/aj = ΓA (R/aj ) ⊆ ΓB (R/aj ). Hence, there exists k ∈ K with bk ⊆ aj , and thus A is coarser than B. The claim follows from this.  T In particular, it follows that the set (R) is small. For a graded ideal a ⊆ R we consider the projective system of graded ideals A = (an )n∈N and set Γa := ΓA , and we denote by Ta the a-adic topology on R. If a, b ⊆ R are two graded ideals, then (an )n∈N is coarser than (bn )n∈N if and only if Ta is coarser than Tb ([5, III.2.5]). TORSION FUNCTORS WITH MONOMIAL SUPPORT 3 (1.2) Corollary There is an isomorphism of ordered sets ∼ = {Ta | a ⊆ R graded ideal } −→ {Γa | a ⊆ R graded ideal }. (1.3) Corollary a) If a ⊆ R is a graded ideal, then Γa = Γ√a holds if and only √ n if there exists n ∈ with a ⊆ a. √ √ b) If a, b ⊆ R are graded ideals, then Γa = Γb implies a = b, and the converse √ n √ m holds if there exist m, n ∈ with a ⊆ a and b ⊆ b. N N If a ⊆ R is a graded ideal whose radical is of finite type then Γa = Γ√a holds by 1.3 a). Hence, if R is Noetherian (where Noetherianness of a graded ring is always understood to mean that every graded ideal is of finite type) then we have Γa = Γ√a for every graded ideal a ⊆ R. Similarly, the hypothesis for the converse to hold in 1.3 b) is fulfilled if the radicals of a and b are of finite type, hence in particular if R is Noetherian. The seemingly weaker hypothesis that every perfect graded ideal of R is of finite type yields no improvement – it is equivalent to Noetherianness of R by a graded version of Cohen’s Theorem [6, 0.6.4.7], proved analogously to the ungraded one. The above shows that even when considering only graded ideals of finite type we do not have a satisfying result. Therefore, we will restrict our attention to a more specific situation in the next section. 2. Equality of torsion functors: The monomial case In this section we consider the following situation. Let A be a ring, let I be a set, and let ψ : ⊕I ։ G be an epimorphism of groups. We denote by R the polynomial algebra A[(Xi )i∈I ] in indeterminates (Xi )i∈I over A, furnished with the G-graduation derived from its canonical ⊕I -graduation by means of ψ. By a Q monomial (in R) we mean an element of R of the form i∈I Xiµi with µ = (µi )i∈I ∈ ⊕I , and such an element is homogeneous of degree ψ(µ). By a monomial ideal (of R) we mean an ideal of R generated by a set of monomials in R. Monomial ideals are graded, but the converse is not necessarily true. For a subset E ⊆ R we write hEiR or, if no confusion can arise, hEi for the ideal of R generated by E. The ordered set ⊕I (whose ordering is induced by the product ordering on I ) is Artinian. Therefore, for a monomial ideal a ⊆ R there exists a unique subset Q E ⊆ ⊕I such that { i∈I Xiµi | µ ∈ E} is a minimal generating set of a; we denote this set by E(a) and define a monomial ideal Q ⌊a⌋ := h i∈I,µi >0 Xi | µ ∈ E(a)iR . Z Z N N N N This contains but not necessarily equals a. (2.1) Lemma If a ⊆ R is a monomial ideal, then a is of finite type if and only if ⌊a⌋ is so. Proof. If a is of finite type then E(a) is finite, hence ⌊a⌋ is of finite type, too. Conversely, suppose that ⌊a⌋ is of finite type, and assume that a is not of finite type. Then, by the pigeonhole principle there exists an infinite subset F ⊆ E(a) Q Q such that for µ, ν ∈ F we have i∈I,µi >0 Xi = i∈I,νi >0 Xi . Thus, there exists a Q finite subset J ⊆ I with F ⊆ ⊕J . But then F = E(h i∈J Xiµi | µ ∈ F i) is the minimal set of generators of a monomial ideal in a polynomial ring in finitely many indeterminates, hence finite – a contradiction.  N 4 FRED ROHRER For a ring B we denote by Nil(B) its nilradical. If Nil(B) is finitely generated then it is nilpotent, but the converse is not necessarily true. In our situation we have Nil(R) = Nil(A)R, i.e., a polynomial in R is nilpotent if and only if its coefficients are nilpotent ([4, IV.1.5 Proposition 9]). Hence, Nil(R) is nilpotent or of finite type, respectively, if and only if Nil(A) is so. √ (2.2) Lemma a) For a monomial ideal a ⊆ R we√have a = Nil(R) + ⌊a⌋. √ b) For monomial ideals a, b ⊆ R we have a = b if and only if ⌊a⌋ = ⌊b⌋. √ √ Proof. a) Clearly, Nil(R) + ⌊a⌋ is contained in a. Conversely, let f ∈ a. Every term occurring in f being either nilpotent or not, and the sum of the nilpotent terms being nilpotent, we can write f = g + h with g ∈ Nil(R) and h ∈ R such that no term occurring in h is nilpotent. So, it suffices to show h ∈ ⌊a⌋. As √ √ f, g ∈ a it follows h ∈ a, and hence we can suppose that no term occurring in f is nilpotent. We prove now by induction on the number r of terms occurring in f that f ∈ ⌊a⌋. If r = 0 this is clear. Suppose that r > 0 and that the claim holds for strictly smaller values of r. Furnishing ⊕I with a structure of totally ordered group (e.g., the lexicographic product with respect to some well-ordering of I) there occurs a term t in f whose ⊕I -degree is the greatest of the ⊕I -degrees of the terms occurring in f . If n ∈ with f n ∈ a then tn is a term occurring in f n whose ⊕I -degree is not shared by any other term occurring in f n . Hence, as a is √ Q a monomial ideal, i∈I Xiµi divides tn for some µ ∈ E(a), and thus t ∈ ⌊a⌋ ⊆ a. √ We get f ′ := f − t ∈ a. As the number of terms occurring in f ′ is strictly smaller than r it follows f ′ ∈ ⌊a⌋,√hence f = f ′ + t ∈ ⌊a⌋ as desired. √ b) Suppose that a = b and therefore ⌊a⌋ ⊆ Nil(R)+⌊b⌋ by a). For µ ∈ E(a) it Q Q follows i∈I,µi >0 Xi ∈ ⌊a⌋ ⊆ Nil(R) + ⌊b⌋, hence either i∈I,µi >0 Xi ∈ Nil(R) and Q thus R = 0, or i∈I,µi >0 Xi ∈ ⌊b⌋. So, by reasons of symmetry we get ⌊a⌋ = ⌊b⌋. The converse follows from a).  Z N Z Z Z (2.3) Proposition a) For a monomial ideal a ⊆ R of finite type we have Γa = Γ⌊a⌋ . b) If a, b ⊆ R are monomial ideals of finite type, then √ the following statements √ are equivalent: (i) Γa = Γb ; (ii) ⌊a⌋ = ⌊b⌋; (iii) a = b. N Proof. a) For µ ∈ E(a) and m ∈ with m ≥ µi for every i ∈ I we have Q m ( i∈I,µi >0 Xi ) ∈ a. As ⌊a⌋ is of finite type by 2.1 this implies that there exists m ∈ with ⌊a⌋m ⊆ a. Hence, as a ⊆ ⌊a⌋ the claim follows from 1.2. b) (i) implies (iii) by 1.3 b), (iii) implies (ii) by 2.2 b), and (ii) implies (i) by a).  N This answers our original question in a satisfying way. But since the radical of a monomial ideal of finite type is not necessarily a monomial ideal we cannot infer that Γa = Γ√a . Moreover, in case of monomial ideals that are not of finite type 2.3 b) is no longer true. Let us provide some examples of good and bad behaviour. N (2.4) Examples Let I = >0 and ψ = IdZ⊕I , let a ⊆ R be a monomial ideal of finite type, and let b := hXii | i ∈ IiR . If A = [(Yk )k∈N ]/hYk2 | k ∈ Ii then we have Γa = Γ⌊a⌋ = Γ√a and Γb 6= Γ⌊b⌋ = Γ√b . If A = [(Yk )k∈N ]/hYkk | k ∈ Ii then we have Γa = Γ⌊a⌋ 6= Γ√a and Γb 6= Γ⌊b⌋ 6= Γ√b 6= Γb . Q Q TORSION FUNCTORS WITH MONOMIAL SUPPORT 5 These examples already hint at the condition on the base ring for Γ⌊a⌋ and Γ√a (and in case a is of finite type Γa and Γ√a ) to coincide, as presented in the next result. (2.5) Proposition The following statements are equivalent: (i) Nil(A) is nilpotent; (ii) For every monomial ideal a ⊆ R we have Γ⌊a⌋ = Γ√a ; (iii) There exists a monomial ideal a ⊆ R with Γ⌊a⌋ = Γ√a . N Proof. “(i)⇒(ii)”: Immediately by 1.2 and 2.2 a). “(iii)⇒(i)”: There exists n ∈ √ n with a ⊆ ⌊a⌋ (1.2), implying Nil(A)n ⊆ Nil(R)n ∩ A ⊆ ⌊a⌋ ∩ A = 0 (2.2 a)).  Sometimes – for example in toric geometry – it is necessary to consider a slightly more general situation than the one above, namely monomial ideals in subrings of R obtained by degree restriction to a subgroup of finite index of G. So, from now on let H ⊆ G be a subgroup of finite index. We consider the degree restriction Q S := R(H) of R to H, i.e., the sub-A-algebra A[ i∈I Xiµi | µ ∈ ⊕I ∧ ψ(µ) ∈ H] of R generated by the monomials with degree in H, furnished with the H-graduation Q such that deg( i∈I Xiµi ) = ψ(µ). By a monomial in S we mean a monomial in R contained in S, and by a monomial ideal of S we mean an ideal of S generated by monomials in S. Monomial ideals of S are graded, but the converse is not necessarily true. For a monomial ideal a of R we consider the degree restriction a(H) := a ∩ S to H. This is a monomial ideal of S, and if a is of finite type then so is a(H) (as is seen analogously to [9, 3.1.3 a)]). Conversely, if a is a monomial ideal (of finite type) of S then haiR is a monomial ideal (of finite type) of R, and we have (haiR )(H) = a ([9, 2.2.3]). Therefore, every monomial ideal (of finite type) of S is of the form a(H) for some monomial ideal a (of finite type) of R. In this situation there are two ways of forming a “monomial radical” of a monomial ideal. We will show now that both yield the same torsion functors, but only one of them can be used to characterise equality of torsion functors. So, let a ⊆ R be a monomial ideal. Since H has finite index in G it follows that for µ ∈ E(a) Q with the property that i∈I,µi >0 Xim ∈ a(H) , and there exists a minimal m ∈ we denote this number by mµ . Then, Q m ⌊a⌋H := h i∈I,µi >0 Xi µ | µ ∈ E(a)iS ⊆ S N N is a monomial ideal. On the other hand, we can also consider the monomial ideal ⌊a⌋(H) ⊆ S, obtained by degree restriction from ⌊a⌋. Clearly, both these constructions generalise the one above, corresponding to the case H = G. It is readily checked that a(H) ⊆ ⌊a⌋H ⊆ ⌊a⌋(H) , but none of these inclusions is necessarily an equality. For the first this is clear by considering the case H = G. For the second we suppose that G = , deg(X0 ) = 1, and H = 2 . Then, setting a = hX04 iR we get a(H) = ⌊a⌋H = hX04 iS $ hX02 iS = hai(H) (provided A 6= 0). Z Z (2.6) Lemma If a ⊆ R is a monomial ideal, then a is of finite type if and only if ⌊a⌋H is so. Proof. Analogously to 2.1.  (2.7) Proposition For a monomial ideal a ⊆ R of finite type we have Γa(H) = Γ⌊a⌋H = Γ⌊a⌋(H) . 6 FRED ROHRER N Proof. Let t ∈ ⌊a⌋(H) be a monomial. Then, there exist µ ∈ E(a) and ν ∈ ⊕I Q Q with t = i∈I,µi >0 Xi1+νi · i∈I,µi =0 Xiνi , and there exists n ∈ such that for i ∈ I with µi > 0 we have n(1 + νi ) ≥ µi . This implies that tn is a multiple of Q µi i∈I Xi and therefore belongs to a. Since ⌊a⌋(H) ⊆ S is by 2.1 a monomial ideal of finite type, the claim follows from 1.2.  N (2.8) Proposition Let a, b ⊆ R be monomial ideals of finite type. √ √ a) The following statements are equivalent: (i) Γa(H) = Γb(H) ; (ii) a = b; (iii) ⌊a⌋ = ⌊b⌋; (iv) ⌊a⌋(H) = ⌊b⌋(H) . b) If ⌊a⌋H = ⌊b⌋H then Γa(H) = Γb(H) . p p Proof. a) “(i)⇒(iii)”: If Γa(H) = Γb(H) then ⌊a⌋H = ⌊b⌋H holds (2.7, 1.3). Let Q nm µ ∈ E(a). There exists n ∈ >0 with i∈I,µi >0 Xi µ ∈ ⌊b⌋H , so there exists Q Q nm ν ∈ E(b) such that i∈I,νi >0 Ximν divides i∈I,µi >0 Xi µ . If mν = 0 or mµ = 0 Q then we get a = R = b and thus the claim. Otherwise, i∈I,νi >0 Xi divides Q Q i∈I,µi >0 Xi ∈ ⌊b⌋ and thus by symmetry the claim. The i∈I,µi >0 Xi , implying remaining implications follow trivially or by p p 2.3 b) and 2.7. b) The hypothesis implies ⌊a⌋H = ⌊b⌋H , and the claim follows with the same argument as the implication “(i)⇒(iii)” in a).  N Z The converse of 2.8 b) is not true. Indeed, supposing again that G = , deg(X0 ) = 1, and H = 2 , and setting a = hX04 iR and b = hX02 iR , we get ⌊a⌋ = hX0 iR = ⌊b⌋, but ⌊a⌋H = hX04 iS $ hX02 iS = ⌊b⌋H (provided A 6= 0). Z 3. Application: Flatness of quasicoherent sheaves on Cox schemes In this last section we will apply our results to toric geometry. For the necessary background and unexplained notations we refer the reader to [9]. Before recalling the toric setting we have to make some general remarks on flatness and Čech cohomology. During these, let G be a commutative group, let A be a ring, and let R be a G-graded ring such that R0 is an A-algebra. For a G-graded R-module M we set degsupp(M ) := {g ∈ G | Mg 6= 0}. For a finite sequence a = (aj )nj=1 in Rhom we denote by C(a, M ) the G-graded Čech cocomplex of M with respect to a, by C(a, M )i its i-th component for i ∈ , and by H i (a, M ) the i-th G-graded Čech cohomology of M with respect to a for i ∈ . Furthermore, for a graded ideal a ⊆ R and i ∈ we denote by Hai (M ) the i-th G-graded local cohomology of M with respect to a. One should note that if R is not Noetherian then Čech cohomology with respect to a and local cohomology with respect to the ideal of R generated by a do not necessarily coincide. Z Z Z (3.1) Lemma Let R′ be a flat G-graded R-algebra, and let M be a G-graded R-module. If M is flat over A, then so is R′ ⊗R M . Proof. The functor (R′ ⊗R M ) ⊗A • : Mod(A) → Mod(A) is the composition of R′ ⊗R (M ⊗A •) : Mod(A) → GrModG (R′ ) with the forgetful functor from GrModG (R′ ) to Mod(R′ ) and the scalar restriction from Mod(R′ ) to Mod(A), and all these three functors are exact.  (3.2) Lemma Let a = (aj )nj=1 be a finite sequence in Rhom , and let M be a Ggraded R-module. If Maj is flat over A for every j ∈ [1, n], then so is C(a, M )ig for every i ∈ >0 and every g ∈ G. N TORSION FUNCTORS WITH MONOMIAL SUPPORT 7 Proof. Using 3.1 and [5, I.2.3 Proposition 2] this follows immediately from the definition of the Čech cocomplex.  (3.3) Proposition Let a = (aj )nj=1 be a finite sequence in Rhom , and let M be a G-graded R-module. If Maj is flat over A for every j ∈ [1, n], then so is Mg for Sn every g ∈ G \ i=0 degsupp(H i (a, M )). Sn Proof. Taking components of degree g ∈ G \ i=0 degsupp(H i (a, M )) of C(a, M ) yields an exact sequence 0 → C(a, M )0g → C(a, M )1g → · · · → C(a, M )gn−1 → C(a, M )ng → 0 of A-modules. Using 3.2 and [5, I.2.5 Proposition 5] the claim follows then by induction on n.  R Now we are ready to consider the toric setting. Let V be an -vector space of finite dimension, let N be a -structure on V , let Σ be an N -fan in V , let Σ1 denote the set of 1-dimensional cones in Σ, and let R be a ring. The combinatorics of Σ give rise to a group A and an epimorphism a : Σ1 ։ A, as well as to a subgroup Pic(Σ) ⊆ A, the so-called Picard group of Σ. Additionally, we choose a subgroup B ⊆ A of finite index. The Cox ring S associated with Σ1 over R is defined as the polynomial algebra R[(Zρ )ρ∈Σ1 ] furnished with the A-graduation derived from its canonical Σ1 -graduation by means of a, and the B-restricted Cox ring SB is defined as its degree restriction to B. For σ ∈ Σ we define a monomial Q bσ := with the Z ρ∈Σ1 \σ Zρ ∈ S. For σ ∈ Σ there exists a minimal m ∈ m b property that Zσ ∈ SB , and we denote this number by mσ . We denote the ring bmσ by SB,σ . Its component of degree of fractions obtained from SB by inverting Z Z Z Z N σ 0 is independent of the choice of B and is denoted by S(σ) . The facial relation in Σ allows us to glue the R-schemes Spec(S(σ) ) to obtain an R-scheme Y := YΣ (R), called the Cox scheme associated with Σ over R. There is a canonical morphism of R-schemes from Y to the toric scheme associated with Σ over R, which is an S isomorphism if and only if Σ is full, i.e., h ΣiR = V . Hence, studying Cox schemes is essentially the same as studying toric schemes. There is an essentially surjective functor SB from the category of B-graded SB modules to the category of quasicoherent OY -modules, allowing to translate the study of quasicoherent sheaves on Cox schemes (and hence on toric schemes) into the study of B-graded SB -modules. For example, in [9, 4.2.7] it was shown that if F is a B-graded SB -module such that SB,σ ⊗SB F is flat over R for every σ ∈ Σ, then SB (F ) is flat over R, and the converse holds if B ⊆ Pic(Σ) (in which case Σ is simplicial by [9, 1.4.5]). Thus, after choosing a counting Zb of (Zbσmσ )σ∈Σ we can relate flatness of SB (F ) with Čech cohomology of F . (3.4) Proposition Suppose that B ⊆ Pic(Σ), and let F be a B-graded SB module. If SB (F ) is flat over R, then Fα is flat over R for every α ∈ B \ S i b i∈N degsupp(H (Z, F )). Proof. Immediately from the above and 3.3.  bσ | σ ∈ ΣiS of S is called the irrelevant ideal, and The monomial ideal I := hZ its degree restriction IB ⊆ SB to B is a monomial ideal of finite type. Under the condition that SB has the ITI-property with respect to IB , i.e., that ΓIB preserves injectivity of B-graded SB -modules, the toric Serre-Grothendieck correspondence 8 FRED ROHRER ([9, 4.5.4]) states that we can study sheaf cohomology on Y in terms of B-graded local cohomology over SB with support in IB . Thus, local cohomology with respect to IB seems to be an appropriate tool in our setting, and the question arises on b Under the condition that SB its relation with Čech cohomology with respect to Z. has the ITI-property with respect to hZbσmσ iSB for every σ ∈ Σ, our results so far provide a satisfying answer. (3.5) Corollary Suppose that B ⊆ Pic(Σ) and that SB has the ITI-property with respect to hZbσmσ iSB for every σ ∈ Σ, and let F be a B-graded SB -module. If SB (F ) S is flat over R, then Fα is flat over R for every α ∈ B \ i∈N degsupp(HIiB (F )). bσmσ | σ ∈ ΣiSB = ⌊I⌋B this follows from 2.7, 3.4 and the proof of Proof. Since hZ [10, Proposition 7].  It remains the question about a converse of the above result, i.e., Does flatness of certain components of F imply flatness of SB (F )? Considering the analogous results in the case of projective schemes one should be able to tackle this problem using bounds for some notion of Castelnuovo-Mumford regularity appropriate to our setting (cf. [2], [7]). We hope to address this in some future work. Acknowledgement: I thank the referee for the very careful reading and for his comments and suggestions. References [1] M. Artin, A. Grothendieck, J. L. Verdier, Séminaire de géométrie algébrique 4. Théorie des topos et cohomologie étale des schémas I. Lecture Notes in Math. 269. Springer, Berlin, 1972. [2] N. Botbol, M. Chardin, G-graded Castelnuovo-Mumford regularity. Preprint (2011). arXiv:1107.2494 [3] N. Bourbaki, Éléments de mathématique: Théorie des ensembles. Chapitres 1 à 4. Hermann, Paris, 1970. [4] N. Bourbaki, Éléments de mathématique: Algèbre. Chapitres 4 à 7. Masson, Paris, 1981. [5] N. Bourbaki, Éléments de mathématique: Algèbre commutative. Chapitres 1 à 4. Masson, Paris, 1985. [6] A. Grothendieck, J. A. Dieudonné, Éléments de géométrie algébrique. I: Le langage des schémas (seconde édition). Grundlehren Math. Wiss. 166. Springer, Berlin, 1971. [7] D. Maclagan, G. G. Smith, Uniform bounds on multigraded regularity. J. Algebraic Geom. 14 (2005) 137–164. [8] F. Rohrer, On toric schemes. Proceedings of the 32nd Symposium and the 6th Japan-Vietnam Joint Seminar on Commutative Algebra (Hayama, Japan, 2010). Meiji Institute for Advanced Study of Mathematical Sciences, 2011. arXiv:1107.2713 [9] F. Rohrer, Quasicoherent sheaves on toric schemes. Expo. Math. 32 (2014) 33–78. [10] F. Rohrer, Coarsening of graded local cohomology. Comm. Algebra 42 (2014) 593–599. Institute of Mathematics, Vietnam Academy of Science and Technology, 18 Hoàng Quốc Việt, 10307 Hà Nội, Việt Nam E-mail address: [email protected]
0math.AC
Efficient Constraint Propagation Engines arXiv:cs/0611009v1 [cs.AI] 2 Nov 2006 CHRISTIAN SCHULTE School of Information and Communication Technology, KTH – Royal Institute of Technology, Isafjordsgatan 39, Electrum 229 SE-164 40 Kista, SWEDEN, email: [email protected]. PETER J. STUCKEY NICTA Victoria Laboratory, Dept of Comp. Sci. & Soft. Eng., University of Melbourne 3010, AUSTRALIA, email: [email protected]. Abstract This paper presents a model and implementation techniques for speeding up constraint propagation. Three fundamental approaches to improving constraint propagation based on propagators as implementations of constraints are explored: keeping track of which propagators are at fixpoint, choosing which propagator to apply next, and how to combine several propagators for the same constraint. We show how idempotence reasoning and events help track fixpoints more accurately. We improve these methods by using them dynamically (taking into account current domains to improve accuracy). We define priority-based approaches to choosing a next propagator and show that dynamic priorities can improve propagation. We illustrate that the use of multiple propagators for the same constraint can be advantageous with priorities, and introduce staged propagators that combine the effects of multiple propagators with priorities for greater efficiency. 1 Introduction We consider the problem of solving Constraint Satisfaction Problems (CSPs) defined in the sense of Mackworth [21], which can be stated briefly as follows: We are given a set of variables, a domain of possible values for each variable, and a set (read as conjunction) of constraints. Each constraint is a relation defined over a subset of the variables, limiting the combination of values that the variables in this subset can take. The goal is to find a consistent assignment of values to the variables so that all the constraints are satisfied simultaneously. 1 One widely-adopted approach to solving CSPs combines backtracking tree search with constraint propagation. This framework is realized in finite domain constraint programming systems, such as SICStus Prolog [18], ILOG Solver [17], and Gecode [12] that have been successfully applied to many real-life industrial applications. At the core of a finite domain constraint programming system is a constraint propagation engine that repeatedly executes propagators for the constraints of a problem. Propagators discover and remove values from the domains of variables that can no longer take part in a solution of the constraints. Example 1.1 Consider a simple CSP, with variables x1 , x2 , and x3 whose domain of possible values are respectively x1 ∈ {2, 3, 4}, x2 ∈ {0, 1, 2, 3}, x3 ∈ {−1, 0, 1, 2} and the constraints are x3 = x2 , x1 ≤ x2 + 1, and x1 6= 3. A propagator for x3 = x2 can determine that x2 6= 3 in any solution of this constraint since x3 cannot take the value 3. Similarly x3 6= −1. The propagator then reduces the domains of the variables to x2 ∈ {0, 1, 2} and x3 ∈ {0, 1, 2}. A propagator for x1 ≤ x2 + 1 can determine that x1 6= 4 since x2 ≥ 3, and x2 6= 0 since x1 ≤ 1 so the domains are reduced to x1 ∈ {2, 3} and x2 ∈ {1, 2}. The propagator for x1 6= 3 can remove the value 3 from the domain of x1 , leaving x1 ∈ {2} (or x1 = 2). If we now reconsider the propagator for x3 = x2 we can reduce domains to x2 ∈ {1, 2} and x3 ∈ {1, 2}. No propagator can remove any further values. We have not solved the problem, since we do not know a value for each variable. So after propagation we apply search, usually by splitting the domain of a variable into two disjoint subsets and considering the resulting two subproblems. Suppose we split the domain of x2 . One subproblem has x1 ∈ {2}, x2 ∈ {1} and x3 ∈ {1, 2}. Applying the propagator for x2 = x3 results in x3 ∈ {2}. Since each variable now takes a fixed value we can check that x1 = 2, x2 = 1, x3 = 1 is a solution to the CSP. The other subproblem has x1 ∈ {2}, x2 ∈ {2} and x3 ∈ {1, 2}, and leads to another solution. ✷ As can be seen from the example finite domain constraint programming interleaves propagation with search. In this paper we investigate how to make a propagation engine as efficient as possible. There are two important decisions the engine must make: which propagators should execute, and in which order they should execute. In order to make constraint propagation efficient, it is clear that the engine needs to take the following issues into account: avoid unnecessary propagator execution, restrict propagation to relevant variables, and choose the cheapest possible method for propagation. In this paper we show how propagation can be speeded up if the engine takes these issues into account. The contributions of the paper are as follows: • We give a formal definition of propagation systems including fixpoint and event-based optimizations used in current propagation systems. • We extend event-based propagation systems to use dynamically changing event sets. 2 • We introduce multiple propagators and staged propagators for a single constraint for use with propagation queues with priority. • We give experimental results that clarify the impact of many choices in implementing propagation engines: including idempotence reasoning, static and dynamic events, basic queuing strategies, priority queues, and staged propagation. Plan of the paper The next section introduces propagation-based constraint solving, followed by a model for constraint propagation systems in Section 3. Section 4 presents how to optimize propagation by taking idempotence into account, while Section 5 explores the use of event sets. Which propagator should be executed next is discussed in Section 6, while combination strategies of multiple propagators for the same constraint is discussed in Section 7. Experiments for each feature are included in the relevant section, and a summary is given in Section 8. Section 9 concludes. 2 Propagation-based Constraint Solving This section defines our terminology for the basic components of a constraint propagation engine. In this paper we restrict ourselves to finite domain integer constraint solving. Almost all the discussion applies to other forms of finite domain constraint solving such as for sets and multisets. Domains A domain D is a complete mapping from a fixed (finite) set of variables V to finite sets of integers. A false domain D is a domain with D(x) = ∅ for some x ∈ V. A variable x ∈ V is fixed by a domain D, if |D(x)| = 1. The intersection of domains D1 and D2 , denoted D1 ⊓ D2 , is defined by the domain D(x) = D1 (x) ∩ D2 (x) for all x ∈ V. A domain D1 is stronger than a domain D2 , written D1 ⊑ D2 , if D1 (x) ⊆ D2 (x) for all x ∈ V. A domain D1 is stronger than (equal to) a domain D2 w.r.t. variables V , denoted D1 ⊑V D2 (resp. D1 =V D2 ), if D1 (x) ⊆ D2 (x) (resp. D1 (x) = D2 (x)) for all x ∈ V . A range is a contiguous set of integers, we use range notation [l .. u] to denote the range {d ∈ Z | l ≤ d ≤ u} when l and u are integers. A domain is a range domain if D(x) is a range for all x. Let D′ = range(D) be the smallest range domain containing D, that is, the unique domain D′ (x) = [inf D(x) .. sup D(x)] for all x ∈ V. We shall be interested in the notion of an initial domain, which we denote Dinit . The initial domain gives the initial values possible for each variable. It allows us to restrict attention to domains D such that D ⊑ Dinit . Valuations and constraints An integer valuation θ is a mapping of variables to integer values, written {x1 7→ d1 , . . . , xn 7→ dn }. We extend the valuation θ to map expressions and constraints involving the variables in the natural way. 3 Let vars be the function that returns the set of variables appearing in a valuation. We define a valuation θ to be an element of a domain D, written θ ∈ D, if θ(xi ) ∈ D(xi ) for all xi ∈ vars(θ). The infimum and supremum of an expression e with respect to a domain D are defined as inf D e = inf {θ(e)|θ ∈ D} and supD e = sup {θ(e)|θ ∈ D}. We can map a valuation θ to a domain Dθ as follows  {θ(x)} x ∈ vars(θ) Dθ (x) = Dinit (x) otherwise A constraint c over variables x1 , . . . , xn is a set of valuations θ such that vars(θ) = {x1 , . . . , xn }. We also define vars(c) = {x1 , . . . , xn }. Propagators We will implement a constraint c by a set of propagators prop(c) that map domains to domains. A propagator f is a monotonically decreasing function from domains to domains: f (D) ⊑ D, and f (D1 ) ⊑ f (D2 ) whenever D1 ⊑ D2 . A propagator f is correct for a constraint c iff for all domains D {θ | θ ∈ D} ∩ c = {θ | θ ∈ f (D)} ∩ c This is a very weak restriction, for example the identity propagator is correct for all constraints c. A set of propagators F is checking for a constraint c, if for all valuations θ where vars(θ) = vars(c) the following holds: f (Dθ ) = Dθ for all f ∈ F , iff θ ∈ c. That is, for any domain Dθ corresponding to a valuation on vars(c), f (Dθ ) is a fixpoint iff θ is a solution of c. We assume that prop(c) is a set of propagators that is correct and checking for c. The output variables output(f ) ⊆ V of a propagator f are the variables changed by the propagator: x ∈ output(f ) if there exists a domain D such that f (D)(x) 6= D(x). The input variables input(f ) ⊆ V of a propagator f is the smallest subset V ⊆ V such that for each domain D: D =V D′ implies that D′ ⊓f (D) =output(f ) f (D′ )⊓D. Only the input variables are useful in computing the application of the propagator to the domain. Example 2.1 [Propagators, input, and output] For the constraint c ≡ x1 ≤ x2 + 1 the function fA defined by fA (D)(x1 ) = {d ∈ D(x1 ) | d ≤ supD x2 + 1} and fA (D)(v) = D(v), v 6= x1 is a correct propagator for c. Its output variables are {x1 } and its input variables are {x2 }. Let D1 (x1 ) = {1, 5, 8} and D1 (x2 ) = {1, 5}, then f (D1 ) = D2 where D2 (x1 ) = D2 (x2 ) = {1, 5}. The propagator fB defined as fB (D)(x2 ) = {d ∈ D(x2 ) | d ≥ inf D x1 − 1} and fB (D)(v) = D(v), v 6= x2 is another correct propagator for c. Its output variables are {x2 } and input variables {x1 }. The set {fA , fB } is checking for c. The domain Dθ1 (x1 ) = Dθ1 (x2 ) = {2} corresponding to the solution θ1 = {x1 7→ 2, x2 7→ 2} of c is a fixpoint of both propagators. The non-solution domain Dθ2 (x1 ) = {2}, Dθ2 (x2 ) = {0} corresponding to the valuation θ2 = {x1 7→ 2, x2 7→ 0} is not a fixpoint (of either propagator). ✷ 4 A propagation solver solv(F, D) for a set of propagators F and an initial domain D finds the greatest mutual fixpoint of all the propagators f ∈ F . In other words, solv(F, D) returns a new domain defined by solv(F, D) = gfp(λd. iter(F, d))(D) iter(F, D) = ⊓ f ∈F f (D) where gfp denotes the greatest fixpoint w.r.t ⊑ lifted to functions. Note that by inverting the direction of ⊑ we could equally well phrase this as a least fix point (as in [1]). But the current presentation emphasizes the reduction of domains as computation progresses. Domain and bounds propagators A consistency notion C gives a condition on domains with respect to constraints. A set of propagators F maintains C-consistency for a constraint c, if solv(F, D) is always C consistent for c. Many propagators in practice are designed to maintain some form of consistency: usually domain or bounds. But note that many more do not. The most successful consistency technique was arc consistency [21], which ensured that for each binary constraint, every value in the domain of the first variable, has a supporting value in the domain of the second variable that satisfied the constraint. Arc consistency can be naturally extended to constraints of more than two variables. This extension has been called generalized arc consistency [24], as well as domain consistency [33, 34] (which is the terminology we will use), and hyper-arc consistency [22]. A domain D is domain consistent for a constraint c if D is the least domain containing all solutions θ ∈ D of c, that is, there does not exist D′ ⊏ D such that θ ∈ D ∧ θ ∈ c → θ ∈ D′ . Define the domain propagator dom(c), for a constraint c as dom(c)(D)(x) dom(c)(D)(x) = = {θ(x) | θ ∈ D ∧ θ ∈ c} where x ∈ vars(c) D(x) otherwise The basis of bounds consistency is to relax the consistency requirement to apply only to the lower and upper bounds of the domain of each variable x. There are a number of different notions of bounds consistency [8], we give the two most common here. A domain D is bounds(Z) consistent for a constraint c with vars(c) = {x1 , . . . , xn }, if for each variable xi , 1 ≤ i ≤ n and for each di ∈ {inf D xi , supD xi } there exist integers dj with inf D xj ≤ dj ≤ supD xj , 1 ≤ j ≤ n, j 6= i such that θ = {x1 7→ d1 , . . . , xn 7→ dn } is an integer solution of c. A domain D is bounds(R) consistent for a constraint c with vars(c) = {x1 , . . . , xn }, if for each variable xi , 1 ≤ i ≤ n and for each di ∈ {inf D xi , supD xi } there exist real numbers dj with inf D xj ≤ dj ≤ supD xj , 1 ≤ j ≤ n, j 6= i such that θ = {x1 7→ d1 , . . . , xn 7→ dn } is a real solution of c. A set of propagators F maintains bounds(α) consistency for a constraint c, if for all domains D, solv(F, D) is bounds(α) consistent for c. We can define a bounds(Z) propagator, zbnd(c) for a constraint c as follows: zbnd(c)(D) = D ⊓ range(dom(c)(range(D))) 5 search(Fo , Fn , D) D := isolv(Fo , Fn , D) if (D is a false domain) return false if (∃x ∈ V.|D(v)| > 1) choose {c1 , . . . , cm } where C ∧ D |= c1 ∨ · · · ∨ cm for i ∈ [1 .. m] if (search(Fo ∪ Fn , prop(ci ), D)) return true return false return true % propagation % search strategy Figure 1: Search procedure It is not straightforward to give a generic description of bounds(R) propagators, rbnd(c), for a constraint c, that just maintains bounds(R) consistency. Examples 3.2 and 4.3 define three such propagators. 3 Constraint Propagation Systems A constraint propagation system evaluates the function solv(F, D) during backtracking search. We assume an execution model for solving a constraint problem with a set of constraints C and an initial domain D0 as follows. We execute the procedure search(∅, F, D0 ) given in Figure 1 for an initial set of propagators F = ∪c∈C prop(c). This procedure is used to make precise the optimizations presented in the remainder of the paper. Note that the propagators are partitioned into two sets, the old propagators Fo and the new propagators Fn . The incremental propagation solver isolv(Fo , Fn , D) (to be presented later) takes advantage of the fact that D is guaranteed to be a fixpoint of the old propagators. The somewhat unusual definition of search is quite general. The default search strategy for many problems is to choose a variable x such that |D(x)| > 1 and explore x = inf D x or x ≥ inf D x + 1. This is commonly thought of as changing the domain D for x to either {inf D x} or {d ∈ D(x) | d > inf D x}. This framework allows more general strategies, for example x1 ≤ x2 or x1 > x2 . The basic incremental propagation solver algorithm is given in Figure 2. The algorithm uses a queue Q of propagators to apply. Initially, Q contains the new propagators. Each time the while loop is executed, a propagator f is deleted from the queue, f is applied, and then all propagators that may no longer be at a fixpoint at the new domain D′ are added to the queue. An invariant of the algorithm is that at the while statement f (D) = D for all f ∈ F − Q. The propagation solver isolv leaves two components undefined: choose(Q) chooses the propagator f ∈ Q to be applied next; new(f, F, D, D′ ) determines the set of propagators f ′ ∈ F that are not guaranteed to be at their fixpoint at 6 isolv(Fo , Fn , D) F := Fo ∪ Fn ; Q := Fn while (Q 6= ∅) f := choose(Q) Q := Q − {f }; D′ := f (D) Q := Q ∪ new(f, F, D, D′ ) D := D′ return D % select next propagator to apply % add propagators f ′ ∈ F . . . % . . . not necessarily at fixpoint at D′ Figure 2: Incremental propagation solver. the domain D′ . The remainder of the paper investigates how to best implement these two components. 3.1 Basic Variable Directed Propagation The core aim of the constraint propagation solver solv(F, D) is to find a domain that is a mutual fixpoint of all f ∈ F . The incremental solver isolv(Fo , Fn , D) already takes into account that initially D is a fixpoint of propagators f ∈ Fo . The role of new is (generally) to return as few propagators f ∈ F as possible. A basic definition of new is as follows newinput (f, F, D, D′ ) = {f ′ ∈ F | input(f ′ ) ∩ {x ∈ V | D(x) 6= D′ (x)} = 6 ∅} Here all propagators f ′ are added whose input variable domains have changed. By the definition of input variables, if none of them have changed for f ′ , then f ′ (D′ ) = D′ since f ′ (D) = D if f ′ ∈ F − Q. Proposition 3.1 newinput maintains the invariant f ′ (D) = D for all f ′ ∈ F − Q at the start of the while loop. Proof : Consider f ′ ∈ F − Q. Then f ′ (D) = D and if D =input(f ′ ) D′ we have that D′ ⊓ f ′ (D) =output(f ′ ) f ′ (D′ ) ⊓ D. Then D′ = = =output(f ′ ) = D′ ⊓ D D′ ⊓ f ′ (D) f ′ (D′ ) ⊓ D f ′ (D′ ) since D′ ⊑ D since D = f ′ (D) by definition of input(f ′ ) since f ′ (D′ ) ⊑ D′ ⊑ D Now D′ =output(f ′ ) f ′ (D′ ) implies D′ = f ′ (D′ ) by the definition of output(f ′ ). Hence each f ′ in F − Q is at fixpoint at the start of the loop. ✷ The incremental propagation solver isolv with this definition of new (assuming Fo = ∅) is more or less equivalent to the propagation algorithms in [4] and [1, page 267]. 7 Example 3.2 [Incremental propagation] Consider the problem with constraints cC ≡ x1 = 2x2 and cD ≡ x1 = 3x3 represented by the bounds(R) propagators fC (D)(x1 ) = fC (D)(x2 ) = fC (D)(x) = D(x1 ) ∩ [2 inf D x2 .. 2 supD x2 ] ,  D(x2 ) ∩ ⌈ 12 inf D x1 ⌉ .. ⌊ 12 supD x1 ⌋ , D(x) x 6∈ {x1 , x2 } fD (D)(x1 ) = fD (D)(x3 ) = fD (D)(x) = D(x1 ) ∩ [3 inf D x3 .. 3 supD x3 ] ,  D(x3 ) ∩ ⌈ 13 inf D x1 ⌉ .. ⌊ 13 supD x1 ⌋ , D(x) x 6∈ {x1 , x3 }, with initial domains D(x1 ) = [0 .. 17], D(x2 ) = [0 .. 9], and D(x3 ) = [0 .. 6]. Initially no constraint is at fixpoint, so Q = {fC , fD }. fC is selected initially, and we execute the bounds propagator determining D(x1 ) = [0 .. 16], D(x2 ) = [0 .. 8]. Since x1 has changed, both fC and fD are added to the queue. Then fD is executed setting D(x1 ) = [0 .. 15], D(x3 ) = [0 .. 5]. Again both constraints are re-queued. fC is executed changing the domains to D(x1 ) = [0 .. 14], D(x2 ) = [0 .. 7]. Then fD changes the domains to D(x1 ) = [0 .. 12], D(x3 ) = [0 .. 4]. Since x1 has changed we have Q = {fC , fD }. Now fC is executed for no change, and fD is executed for no change. We have reached a fixpoint D(x1 ) = [0 .. 12], D(x2 ) = [0 .. 6], and D(x3 ) = [0 .. 4]. ✷ 4 Fixpoint Reasoning The propagation engine computes a mutual fixpoint of all the propagators. Clearly, if we can determine that some propagators are at fixpoint without executing them we can limit the amount of work required by the engine. 4.1 Static Fixpoint Reasoning A propagator f is idempotent if f (D) = f (f (D)) for all domains D. That is, applying f to any domain D yields a fixpoint of f . Example 4.1 [Idempotent propagator] The propagator fE defined by fE (D)(x1 ) = fE (D)(x2 ) = fE (D)(x) = {d ∈ D(x1 ) | 32 d ∈ D(x2 )} {d ∈ D(x2 ) | 23 d ∈ D(x1 )} D(x) x 6∈ {x1 , x2 } is the domain propagator for the constraint 3x1 = 2x2 . The propagator fE is idempotent. ✷ It is not difficult to see that each domain propagator dom(c) is idempotent. Proposition 4.2 For all constraints c and domains D dom(c)(D) = dom(c)(dom(c)(D)) 8 Proof : Consider θ ∈ c where θ ∈ D. Then by definition θ(x) ∈ dom(c)(D) for all x ∈ vars(c). Hence θ ∈ dom(c)(D). Since dom(c)(D) ⊑ D we have θ ∈ c∧θ ∈ D iff θ ∈ c ∧ θ ∈ dom(c)(D). Hence dom(c)(D) = dom(c)(dom(c)(D)). ✷ Example 4.3 [Non-idempotent propagators] While many propagators are idempotent, some widely used ones are not idempotent. Consider the constraint 3x1 = 2x2 and the propagator fF :   fF (D)(x1 ) = D(x1 ) ∩ ⌈ 23 inf D x2 ⌉ .. ⌊ 32 supD x2 ⌋ fF (D)(x2 ) = D(x2 ) ∩ ⌈ 32 inf D x1 ⌉ .. ⌊ 23 supD x1 ⌋ fF (D)(x) = D(x) x 6∈ {x1 , x2 } In almost all constraint programming systems prop(3x1 = 2x2 ) is {fF } where fF is the bounds(R) propagator for 3x1 = 2x2 . Now fF is not idempotent. Consider D(x1 ) = [0 .. 3] and D(x2 ) = [0 .. 5]. Then D′ = fF (D) is defined by D′ (x1 ) = [0 .. 3] ∩ [0 .. ⌊10/3⌋] = [0 .. 3] and D′ (x2 ) = [0 .. 5] ∩ [0 .. ⌊9/2⌋] = [0 .. 4]. Now D′′ = fF (D′ ) is defined by D′′ (x1 ) = [0 .. 3] ∩ [0 .. ⌊8/3⌋] = [0 .. 2] and D′′ (x2 ) = [0 .. 4] ∩ [0 .. ⌊9/2⌋] = [0 .. 4]. Hence fF (fF (D)) = D′′ 6= D′ = fF (D). ✷ We can always create an idempotent propagator f ′ from a propagator f by defining f ′ (D) = solv({f }, D). Indeed, in some implementations (for example [16]) prop(3x1 = 2x2 ) is defined as the fixpoint of applying fF . Assume that idem(f ) = {f } if f is an idempotent propagator and idem(f ) = ∅ otherwise. The definition of new is improved by taking idempotence into account newsfix (f, F, D, D′ ) = newinput (f, F, D, D′ ) − idem(f ) An idempotent propagator is never put into the queue after application. Note that without the idempotence optimization each propagator f that changes the domain is likely to be executed again to check it is at fixpoint. Almost all constraint propagation solvers take into account static fixpoint reasoning (for example ILOG Solver [17], Choco [19], SICStus [18], and Gecode [12]). Some systems even only allow idempotent propagators (for example Mozart [26]). 4.2 Dynamic Fixpoint Reasoning Even if a propagator is not idempotent we can often determine that f (D) is a fixpoint of f for a specific domain D. For simplicity we assume a function fix(f, D) that returns {f } if it can show that f (D) is a fixpoint for f and ∅ otherwise (of course without calculating f (f (D)), otherwise we gain nothing). In practice this will be included in the implementation of f . newdfix (f, F, D, D′ ) = newinput (f, F, D, D′ ) − fix(f, D) Example 4.4 [Dynamic idempotence] For bounds propagation for linear equations on range domains we are guaranteed that the propagator is at a fixpoint if there is no rounding required in determining new endpoints [16, Theorem 8]. 9 We can define fix(fF , D) for the bounds propagator fF from Example 4.3 for the constraint 3x1 = 2x2 , as returning {fF } if any new bound does not require rounding, e.g. 2 inf D x2 /3 = ⌈2 inf D x2 /3⌉ or 2 inf D x2 /3 ≤ inf D x1 and similarly for the other three bounds. Consider applying fF to the domain D′′ from the same example. Now D′′′ = fF (D′′ ) is defined by D′′′ (x1 ) = [0 .. 2] ∩ [0 .. ⌊8/3⌋] = [0 .. 2] and D′′′ (x2 ) = [0 .. 4] ∩ [0 .. ⌊6/2⌋] = [0 .. 3]. Notice that the new bound x2 ≤ 3 is obtained without rounding ⌊6/2⌋ = ⌊3⌋ = 3. In this case we are guaranteed that the propagator is at a fixpoint. ✷ Note that the dynamic case extends the static case since for idempotent f it holds that fix(f, D) = {f } for all domains D. The dynamic fixpoint reasoning extensions are obviously correct, given Proposition 3.1. Proposition 4.5 newdfix maintains the invariant f (D) = D for all f ∈ F − Q at the start of the while loop. A complexity of either form of fixpoint reasoning is that a great deal of care has to be taken when we claim a propagator is at fixpoint, particularly for bounds propagators and for propagators computing with multiple occurrences of the same variable. Example 4.6 [Falling into domain holes] Consider a bounds propagator for x1 = x2 + 1 defined as fG (D)(x1 ) fG (D)(x2 ) fG (D)(x) = D(x1 ) ∩ [inf D x2 + 1 .. supD x2 + 1] = D(x2 ) ∩ [inf D x1 − 1 .. supD x1 − 1] = D(x) x 6∈ {x1 , x2 } We would expect this propagator to be idempotent since there is no rounding required. Consider the application of fG to the domain D(x1 ) = {0, 4, 5, 6} and D(x2 ) = {2, 3, 4, 5}. Then fG (D) = D′ where D′ (x1 ) = {4, 5, 6} and D′ (x2 ) = {2, 3, 4, 5}. This is not a fixpoint for fG because of the hole (that is 1, 2, 4 6∈ D(x1 )) in the original domain of x1 . ✷ Example 4.7 [Multiple variable occurrences] The regular constraint introduced in [27] constrains a sequence of variables to take values described by a regular expression (or a corresponding finite automaton). A common case for the regular constraint is to express cyclic patterns by performing propagation on a sequence of variables where some variables appear multiply. Assume a propagator fH propagating that the sequence of variables hx1 , x2 , x3 i conforms to the regular expression (11|00)0 (that is, the values of three variables form either the string 110 or 000). For a domain D with D(x1 ) = D(x2 ) = D(x3 ) = {0, 1} propagation for the sequence hx1 , x2 , x3 i is obtained by checking which values are still possible for each variable by traversing the sequence once. In this particular case, for D′ = fH (D) we have that D′ (x3 ) = {0} and D′ (x1 ) = D′ (x2 ) = {0, 1} and D′ is a fixpoint for fH . 10 Now assume a sequence hx1 , x2 , x1 i where x1 appears twice. Using the same strategy as above, a single forward traversal of the sequence yields: D′ = fH (D) where D′ (x1 ) = {0} and D′ (x2 ) = {0, 1}. However, D′ is not a fixpoint for fH . ✷ The two examples above describe common cases where a propagator is not idempotent but in many cases still computes a fixpoint. In these cases, dynamic fixpoint reasoning is beneficial: static fixpoint reasoning would force these propagators to be never considered to be at fixpoint while dynamic fixpoint reasoning allows the propagator to decide whether the propagator is at fixpoint for a given domain or not. In practice dynamic fixpoint reasoning completely subsumes static fixpoint reasoning and is easy to implement. To implement dynamic fixpoint reasoning a propagator is extended to not only return the new domain but also a flag indicating whether it is guaranteed to be at fixpoint. 4.3 Fixpoint Reasoning Experiments Table 1 shows runtime (walltime) and the number of propagation steps for the three different variants of fixpoint reasoning considered. The first column presents absolute runtime values in milliseconds and the number of propagation steps when no fixpoint reasoning is considered. The two remaining columns “static” and “dynamic” show the relative change to runtime and propagation steps when using static and dynamic fixpoint reasoning. For example, a relative change of +50% means that the system takes 50% more time or propagation steps, whereas a value of −50% means that the system takes only half the time or propagation steps. The row “average (all)” gives the average (geometric mean) of the relative values for all examples. More information on the examples can be found in Appendix A and on the used platform in Appendix B. Note that both static and dynamic fixpoint reasoning do not change the memory requirements for any of the examples. Static fixpoint reasoning While static fixpoint reasoning reduces the number of propagator executions by 8.9% in average, the reduction in runtime is modest by 1.6% in average. The reason that the reduction in propagation steps does not directly translate to a similar reduction in runtime is that the avoided steps tend to be cheap: after all, these are steps not performing any propagation as the propagator is already at fixpoint. Examples with significant reduction in runtime (such as donald-d, minsort-200, picture, and square-5-d) profit because the execution of costly propagators is avoided (domain-consistent linear equations for donald-d and square-5-d; regular propagators for picture; minimum propagators involving up to 200 variables for minsort). The behavior of golomb-10-b and golomb-10-d is explained further below. Dynamic fixpoint reasoning As expected, both runtime as well as propagation steps are considerably smaller for dynamic fixpoint reasoning compared 11 Table 1: Fixpoint reasoning experiments. Example all-interval-500 alpha bibd-7-3-60 cars crowded-chess-7 donald-b donald-d donald-v golomb-10-b golomb-10-d graph-color grocery knights-10 minsort-200 o-latin-7-d partition-32 photo picture queens-400 queens-400-a sequence-500 square-5-d square-7-b square-7-v warehouse average (all) none time (ms) steps 118.31 503 036 106.56 272 398 2 279.36 1 335 657 4.64 15 641 624.25 806 664 0.70 546 30.37 46 0.38 546 1 347.48 2 642 464 2 430.00 2 642 962 35.87 9 344 55.41 2 299 7.46 48 038 342.48 240 991 574.36 387 060 8 571.24 16 785 128 108.87 422 206 1 553.42 150 165 4 433.12 31 424 152 16.15 2 469 517.96 151 609 33 391.24 1 762 492 10 166.24 7 731 557 5 690.00 13 956 982 0.74 2 486 — — 12 static time steps −3.1% −24.8% −2.0% −5.7% −0.2% −6.5% −0.4% ±0.0% −0.1% ±0.0% −2.5% −8.4% −6.3% −6.5% −5.9% −16.5% +4.7% −17.9% +4.5% −18.0% −0.1% ±0.0% +2.6% −3.8% +0.9% +2.2% −11.3% −8.3% ±0.0% −0.5% −3.7% −18.8% −0.3% −0.8% −4.1% −13.1% +0.2% ±0.0% −1.2% −16.2% −0.1% −0.1% −6.2% −16.0% +2.4% −14.5% −4.1% −16.9% −2.5% −1.8% −1.6% −8.9% dynamic time steps −38.9% −24.9% −1.5% −5.7% −0.2% −6.5% +0.1% ±0.0% −0.2% ±0.0% −10.4% −16.5% −6.4% −13.0% −5.1% −16.5% +0.1% −17.5% +4.3% −18.0% −7.2% −6.2% +2.6% −3.8% +0.9% +2.2% −5.1% −16.9% −8.7% −18.2% −9.2% −19.7% −14.6% −3.6% −3.4% −20.5% ±0.0% ±0.0% −1.2% −16.2% −0.1% −0.1% −6.1% −16.1% −6.8% −14.7% −4.3% −16.9% −7.9% −9.1% −5.6% −11.5% Table 2: Fixpoint reasoning experiments with propagator priorities. Example all-interval-500 alpha bibd-7-3-60 cars crowded-chess-7 donald-b donald-d donald-v golomb-10-b golomb-10-d graph-color grocery knights-10 minsort-200 o-latin-7-d partition-32 photo picture queens-400 queens-400-a sequence-500 square-5-d square-7-b square-7-v warehouse average (all) static time steps −2.9% −24.9% −5.4% −15.6% −0.7% −6.5% −0.2% ±0.0% −0.7% ±0.0% −4.8% −22.9% −6.7% −5.1% −5.6% −16.5% −4.9% −23.5% −3.3% −23.4% +0.4% ±0.0% −4.9% −29.5% ±0.0% +1.3% −10.9% −9.1% +0.3% −1.4% −8.5% −30.4% −0.7% −1.2% +6.5% −13.1% +0.2% ±0.0% −1.3% −16.2% +0.1% ±0.0% −6.4% −11.1% −2.5% −25.2% −6.6% −24.9% −2.2% −1.4% −2.9% −12.7% dynamic time steps −37.7% −25.0% −4.6% −15.6% −0.7% −6.5% +0.1% ±0.0% −0.5% ±0.0% −11.8% −29.4% −6.7% −28.8% −5.3% −16.5% −6.5% −23.5% −3.0% −23.4% −7.3% −4.9% −4.9% −29.5% +0.2% +1.3% −0.9% −9.2% −6.1% −22.9% −11.8% −30.9% −7.5% −2.6% +4.0% −20.5% +0.2% ±0.0% −1.3% −16.2% +0.1% ±0.0% −7.3% −15.8% −10.0% −26.0% −5.8% −24.9% −7.9% −9.8% −6.1% −15.9% to static reasoning. This is in particular true for examples donald-b and square-7-b where a bounds-consistent alldifferent constraint can take advantage of reporting whether propagation has computed a fixpoint due to no domain holes as discussed in Example 4.6 (all-interval-500 shows the same behavior due to the absolute value propagator used). Influence of propagation order Some examples show a considerable increase in runtime (in particular, golomb-10-b and golomb-10-d). This is due to the fact that the order in which propagators are executed changes: costly propagators are executed often while cheap propagators are executed less often (witnessed by the decrease in propagation steps). Section 6 presents priorities that order execution according to propagator priorities. For now it is sufficient to note that when these priority inversion problems are avoided through the use of priorities, there is no increase in runtime. Table 2 provides evidence for this. The table shows relative runtime and propagation steps (relative to no fixpoint reasoning as in Table 1). When avoiding priority inversion it becomes clear that both static as well as dynamic 13 fixpoint reasoning consistently improve the number of propagation steps and also runtime. The only exception is picture where even with priorities the considerable reduction in execution steps does not translate into a reduction in runtime. This is possibly due to a change in propagation order that affects runtime (that this can have a remarkable effect even with priorities is demonstrated in Section 6). 5 Event Reasoning The next improvement for avoiding propagators to be put in the queue is to consider what changes in domains of input variables can cause the propagator to no longer be at a fixpoint. To this end we use events: an event is a change in the domain of a variable. Assume that the domain D changes to the domain D′ ⊑ D. A typical set of events defined in a constraint propagation system are: • fix(x): the variable x becomes fixed, that is |D′ (x)| = 1 and |D(x)| > 1. • lbc(x): the lower bound of variable x changes, that is inf D′ x > inf D x. • ubc(x): the upper bound of variable x changes, that is supD′ x < supD x. • dmc(x): the domain of variable x changes, that is D′ (x) ⊂ D(x). Clearly the events overlap. Whenever a fix(x) event occurs then a lbc(x) event, a ubc(x) event, or both events must also occur. If any of the first three events occur then a dmc(x) event occurs. These events satisfy the following property. Definition 5.1 [Event] An event φ is a change in domain defined by an event condition φ(D, D′ ) which states that event φ occurs when the domain changes from D to D′ ⊑ D. The event condition must satisfy the following property φ(D, D′′ ) = φ(D, D′ ) ∨ φ(D′ , D′′ ) where D′′ ⊑ D′ ⊑ D. So an event occurs on a change from D to D′′ iff it occurs in either the change from D to D′ or from D′ to D′′ . Given a domain D and a stronger domain D′ ⊑ D, then events(D, D′ ) is the set of events φ where φ(D, D′ ). Suppose D′′ ⊑ D′ ⊑ D, then clearly events(D, D′′ ) = events(D, D′ ) ∪ events(D′ , D′′ ). (1) Most integer propagation solvers use the events defined above, although many systems collapse ubc(x) and lbc(x) into a single event bc(x) (for example, SICStus [18], ILOG Solver [17], and Gecode [12]). Choco [19] maintains an event queue and interleaves propagator execution with events causing more propagators to be added to the queue. Other kinds of events or variants of the above events are also possible. For example, (for domains D and D′ with D′ ⊑ D): 14 • bc(x): as discussed above (lbc(x) ∨ ubc(x)). • two(x): the variable x reduces to a domain of at most two values: |D′ (x)| ≤ 2 and |D(x)| > 2. • ran(x): the variable x reduces to a domain that will always be a range (two consecutive values or a single value): supD′ x − inf D′ x ≤ 1 and supD x − inf D > 1. • pos(x): the variable x reduces to a domain that is strictly positive, that is inf ′D x > 0 and inf D x ≤ 0 (likewise, an event neg(x) for reduction to a strictly negative domain). • nneg(x): the variable x reduces to a domain that is non-negative: inf ′D x ≥ 0 and inf D x < 0 (likewise, an event npos(x) for reduction to a non-positive domain). • neq(x, d): the variable x can no longer take the value d, that is d ∈ D(x) and d 6∈ D′ (x) The events two and ran are useful for tracking endpoint-relevance and rangeequivalence [31]. The neq event has been used in e.g. Choco [19] and BProlog [37] for building AC4 [23] style propagators. Example 5.2 [Events] Let D(x1 ) = {1, 2, 3}, D(x2 ) = {3, 4, 5, 6}, D(x3 ) = {0, 1}, and D(x4 ) = {7, 8, 10} while D′ (x1 ) = {1, 2}, D′ (x2 ) = {3, 5, 6}, D′ (x3 ) = {1} and D′ (x4 ) = {7, 8, 10}. Then events(D, D′ ) is {ubc(x1 ), dmc(x1 ), dmc(x2 ), fix(x3 ), lbc(x3 ), dmc(x3 )} Considering the additional events we obtain in addition {bc(x1 ), two(x1 ), ran(x1 ), bc(x3 ), neq(x1 , 3), neq(x2 , 4), neq(x3 , 0)} ✷ Example 5.3 [Events are monotonic] Events are monotonic: further changes to a domain do not discard events from previous changes. Consider the property range(x) capturing that D(x) is a range for a domain D (this property is related to the event ran(x), lacking the restriction that the domain can have at most two elements). The property range(x) is not an event: consider domains D′′ ⊑ D′ ⊑ D with D(x) = {1, 2, 3, 5}, D′ (x) = {1, 2, 3}, and D′′ (x) = {1, 3}. If range were an event, then events(D, D′′ ) = events(D, D′ ) ∪ events(D′ , D′′ ). However, events(D, D′′ ) = {dmc(x), ubc(x)} whereas events(D, D′ ) ∪ events(D′ , D′′ ) = {dmc(x), ubc(x), range(x)} ∪ {dmc(x)} ✷ 15 5.1 Static Event Sets Re-execution of certain propagators can be avoided since they require certain events to generate new information. Definition 5.4 [Propagator dependence] A propagator f is dependent on a set of events es(f ) iff (a) for all domains D if f (D) 6= f (f (D)) then events(D, f (D)) ∩ es(f ) 6= ∅, (b) for all domains D and D′ where f (D) = D, D′ ⊑ D and f (D′ ) 6= D′ then events(D, D′ ) ∩ es(f ) 6= ∅. The definition captures the following. If f is not at a fixpoint then one of the events in its event set occurs. If f is at a fixpoint D then any change to a domain that is not a fixpoint D′ involves an occurrence of one of the events in its set. Note that for idempotent propagators the case (a) never occurs. For convenience later we will store the event set chosen for a propagator f in an array evset[f ]. Clearly, if we keep track of the events since the last invocation of a propagator, we do not need to apply a propagator if it is not dependent on any of these events. Example 5.5 [Event sets] Event sets for previously discussed propagators are as follows: fA {ubc(x2 )} fB {lbc(x1 )} fE {dmc(x1 ), dmc(x2 )} fF {lbc(x1 ), ubc(x1 ), lbc(x2 ), ubc(x2 )} This is easy to see from the definitions of these propagators. If they use inf D x then lbc(x) is in the event set, similarly if they use supD x then ubc(x) is in the event set. If they use the entire domain D(x) then dmc(x) is in the event set. ✷ Indexical propagation solvers [34, 9, 6] are based on such reasoning. They define propagators in the form f (D)(x) = D(x) ∩ e(D) where e is an indexical expression. The event set for such propagators is automatically defined by the domain access terms that occur in the expression e. Example 5.6 [Indexical] An example of an indexical to propagate x1 ≥ x2 +1 is x1 ∈ [inf(x2 ) + 1 .. + ∞] x2 ∈ [−∞ .. sup(x1 ) − 1] These range expressions for indexicals define two propagators: fI (D)(x1 ) fI (D)(x) fJ (D)(x2 ) fJ (D)(x) = = = = D(x1 ) ∩ [inf(x2 ) + 1 .. + ∞] D(x) x 6= x1 D(x2 ) ∩ [−∞ .. sup(x1 ) − 1] D(x) x= 6 x2 16 The event set for the propagator fI from the definition is {lbc(x2 )} while the the event set for fJ is {ubc(x1 )}. ✷ Using events we can define a much more accurate version of new that only adds propagators for which one of the events in its event set has occurred. newevents (f, F, D, D′ ) = {f ′ ∈ F | evset[f ′ ] ∩ events(D, D′ ) 6= ∅} − fix(f, D) This version of new (without dynamic fixpoint reasoning) roughly corresponds with what most constraint propagation systems currently implement. Proposition 5.7 newevents maintains the invariant f (D) = D for all f ∈ F −Q at the start of the while loop. Proof : Consider f ′ ∈ F − Q − {f } different from the selected propagator f . Then f ′ (D) = D and if f ′ (D′ ) 6= D′ then events(D, D′ ) ∩ es(f ′ ) 6= ∅ by case (b) of the definition of es(f ′ ), so f ′ ∈ Q at the start of the loop. Consider selected propagator f . This is removed from Q, but if f (D′ ) 6= D′ then events(D, D′ ) ∩ es(f ) 6= ∅ by case (a) of the definition of es(f ). Clearly also fix(f, D) 6= ∅. So f ∈ Q at the start of the loop. ✷ 5.2 Event Set Experiments Table 3 shows runtime and number of propagation steps for different event sets relative to a propagation engine not using events (the engine uses dynamic fixpoint reasoning but no priorities). The row “average (above)” gives the geometric mean of the relative numbers given in the table whereas “average (all)” shows the relative numbers for all examples. General observations A first, quite surprising, observation is that using no events at all is not so bad. It is the best approach for 10 out of the 25 benchmarks and for crowded-chess-7 by a considerable margin (between 8.3% and 38.7%). Another general observation is that a reduction in the number of propagation steps does not directly translate into a reduction in runtime. This is due to the fact that all saved propagator executions are cheap: the propagator is already at fixpoint and does not have to perform propagation. Note that the ratio between reduction in steps and reduction in runtime ultimately depends on the underlying system. In Gecode, the system used, the actual overhead for executing a propagator is rather low. In systems with higher overhead one can expect that the gain in runtime will be more pronounced. Event set observations Adding the fix event is particularly beneficial for benchmarks with many disequalities, particularly queens-400 which only uses disequalities. Adding the bc event has significant benefit (up to 5%) when there are linear equalities as in alpha or bounds(Z) consistent alldifferent as in photo. But 17 Table 3: Event set experiments (runtime and propagation steps). Example all-interval-500 alpha bibd-7-3-60 cars crowded-chess-7 donald-b donald-d donald-v golomb-10-b golomb-10-d graph-color grocery knights-10 minsort-200 o-latin-7-d partition-32 photo picture queens-400 queens-400-a sequence-500 square-5-d square-7-b square-7-v warehouse average (all) only fix, dmc time steps +0.6% ±0.0% −2.0% −4.4% −2.6% −16.6% +1.1% −0.2% +8.3% ±0.0% +0.3% ±0.0% ±0.0% ±0.0% +0.6% −10.5% −0.6% ±0.0% +0.2% ±0.0% −0.7% −47.7% −0.1% ±0.0% −12.7% −47.5% +0.4% ±0.0% −1.2% ±0.0% +0.7% ±0.0% +1.6% ±0.0% +2.0% ±0.0% −87.5% −99.1% −10.4% −38.8% +2.2% ±0.0% +0.8% ±0.0% −0.2% +0.5% −1.0% −8.9% +2.2% +0.2% −8.5% −24.3% with time +1.0% −7.3% −1.4% +1.7% +20.2% −2.1% +0.9% −1.4% ±0.0% +26.4% +0.1% ±0.0% −10.8% +1.1% +0.2% +15.1% −3.3% +3.5% −87.5% −9.6% +3.5% +2.7% +0.6% −1.7% +3.3% −6.7% 18 bc steps ±0.0% −19.2% −16.6% −0.2% −8.4% −9.2% ±0.0% −19.7% −3.9% −3.5% −49.5% ±0.0% −48.6% ±0.0% −1.7% +3.4% −27.1% ±0.0% −99.1% −38.8% +36.3% ±0.0% −8.2% −16.9% −7.6% −26.9% with lbc, ubc time steps +2.0% ±0.0% −6.3% −19.3% +7.4% −15.8% +2.6% −0.2% +38.7% −8.4% −1.3% −9.2% −0.1% ±0.0% +0.1% −19.7% −0.5% −3.9% +26.5% −3.5% +0.6% −49.5% ±0.0% ±0.0% −7.7% −48.6% +1.5% ±0.0% +1.5% −1.7% +18.8% +17.7% −2.0% −26.9% +11.5% ±0.0% −87.5% −99.1% −8.2% −38.8% +8.8% +36.3% +2.6% +0.5% +0.7% −7.8% +1.2% −16.9% +4.2% −6.6% −4.6% −26.4% Table 4: Event set experiments with priorities (runtime and propagation steps). Example bibd-7-3-60 crowded-chess-7 donald-b donald-d golomb-10-b golomb-10-d minsort-200 partition-32 picture square-5-d square-7-b average (above) average (all) only fix, dmc time steps +6.1% −3.3% +8.0% ±0.0% +0.9% ±0.0% −0.3% ±0.0% +0.1% ±0.0% +0.1% ±0.0% +0.9% ±0.0% +1.9% −1.2% +2.6% ±0.0% +0.9% ±0.0% +0.4% −0.1% +1.9% −0.4% −7.8% −24.1% with time +0.6% +20.4% −1.1% +0.1% −0.9% −0.5% +1.5% +1.8% +3.7% +3.2% +0.2% +2.5% −7.8% bc steps −3.3% −0.7% −9.2% ±0.0% −5.5% −7.8% ±0.0% −1.8% ±0.0% ±0.0% −10.6% −3.6% −27.8% with lbc, ubc time steps +13.1% −2.5% +38.0% −0.7% −0.7% −9.2% −0.2% ±0.0% −0.9% −5.5% ±0.0% −7.8% +1.8% ±0.0% +1.0% −0.4% +1.6% ±0.0% +3.2% +0.2% +1.2% −10.6% +4.8% −3.4% −6.3% −27.7% for other examples, where one would expect some reduction in runtime, the overhead (to be discussed in more detail below) for maintaining a richer event set exceeds the gains from reducing the number of propagation steps. This is true for examples such as minsort-200 (minimum propagators), partition-32 (multiplication), and golomb-10-b and square-7-b (linear equations and bounds(Z) consistent alldifferent). Splitting the bc event into lbc and ubc events exposes the overhead once more. There is almost never an improvement in number of propagations, since only inequalities can actually benefit, and there is substantial overhead. Influence of propagation order Similar to using fixpoint reasoning, the use of events also changes the order in which propagators are executed. Table 4 reconsiders all examples that could possibly benefit from bc or lbc, ubc events and all examples that show a remarkable increase in number of propagation steps in Table 3. The numbers confirm that with priorities no considerable increase in runtime can be observed for all but crowded-chess-7, where the increase in runtime here is due to a change in propagation order to the introduction of event sets that does not depend on the relative priorities of the propagators used. Once priorities are used, lbc and ubc are basically never beneficial. Memory requirements Table 5 shows the total memory allocated for different event sets relative to a propagation engine not using events (the engine uses dynamic fixpoint reasoning and priorities). It is important to note that the memory figures reflect the amount of memory allocated which is bigger than the amount of memory actually used. In particular, for small examples such as donald-* the increase in allocated memory just reflects the fact that an additional memory block gets allocated. 19 Table 5: Event set experiments with priorities (allocated memory). Example bibd-7-3-60 crowded-chess-7 donald-b donald-d donald-v golomb-10-b golomb-10-d minsort-200 partition-32 picture queens-400 queens-400-a average (above) average (all) no events mem (KB) 6 690.1 198.2 7.8 3.4 5.8 39.7 37.7 32 419.1 160.3 451.6 30 286.6 567.0 — — only fix, dmc mem +2.9% +4.0% ±0.0% ±0.0% +34.3% +2.6% ±0.0% +1.1% +3.7% +17.7% +0.2% +2.8% +5.4% +3.9% with bc mem +5.7% +13.1% +12.8% +58.2% +34.3% +10.1% +2.8% +2.3% +9.4% +17.7% +0.2% +4.2% +13.3% +9.9% with lbc, ubc mem +14.4% +21.2% +12.8% +58.2% +51.5% +12.7% +16.0% +17.4% +17.5% +30.1% +0.2% +4.2% +20.3% +15.5% Using just a fix event increases the required memory by less than 4% in average, while using full event sets increases the required memory by 15.5% in average. It must be noted that Gecode (the system used) has a particularly efficient implementation of event sets: the implementation uses a single pointer for an entry in an event set; entries for the same variable and the same propagator but with different events still use a single pointer. The memory overhead is due to the fact that per variable and supported event, one single pointer for bookkeeping is needed. Hence, the highest overhead can be expected for examples with many variables but relatively few propagators and small event sets (such as bibd-7-3-60, crowded-chess-7, and picture). The overhead becomes less noticeable for examples with many propagators or large event sets and few variables (such as queens-400 and queens-400-a). Summary In summary, while there is a compelling argument for fix events, there is only a weak case for bc being supported, and lbc and ubc should not be used. 5.3 Dynamic Event Sets Events help to improve the efficiency of a propagation-based solver. Just as we can improve the use of fixpoint reasoning by examining the dynamic case, we can also consider dynamically updating event sets as more information is known about the variables in the propagator. Monotonic event sets 20 Definition 5.8 [Monotonic propagator dependence] A propagator f is monotonically dependent on a set of events es(f, D) in the context of domain D iff (a) for all domains D0 ⊑ D if f (D0 ) 6= f (f (D0 )) then events(D0 , f (D0 )) ∩ es(f, D) 6= ∅, (b) for domains D0 and D1 where D0 ⊑ D, f (D0 ) = D0 , D1 ⊑ D0 and f (D1 ) 6= D1 then events(D0 , D1 ) ∩ es(f, D) 6= ∅. Clearly given this definition es(f, D) is monotonically decreasing with D. The simplest kind of event reduction occurs by subsumption. Definition 5.9 [Subsumption] A propagator f is subsumed for domain D, if for each domain D′ ⊑ D we have f (D′ ) = D′ . A subsumed propagator makes no future contribution. If f is subsumed by D then es(f, D) = ∅ and f is never re-applied. Most current constraint propagation systems take into account propagator subsumption. Example 5.10 [Subsumption] Consider the propagator fA and the domain D with D(x1 ) = [1 .. 3] and D(x2 ) = [3 .. 7]. Then the constraint holds for all D′ ⊑ D and es(f, D) = ∅. ✷ Changing event sets can occur in cases other than subsumption. Example 5.11 [Minimum propagator] Consider the propagator fK for x0 = min(x1 , x2 ) defined by fK (D)(x0 ) fK (D)(xi ) fK (D)(x) = D(x0 ) ∩ [min(inf D x1 , inf D x2 ) .. min(supD x1 , supD x2 )] = D(xi ) ∩ [inf D x0 .. + ∞] i ∈ {1, 2} = D(x) x∈ 6 {x0 , x1 , x2 } The static event set es(fK ) is {lbc(x0 ), lbc(x1 ), ubc(x1 ), lbc(x2 ), ubc(x2 )}. Note that this propagator is idempotent. But given domain D where D(x0 ) = [1 .. 3] and D(x2 ) = [5 .. 7] we know that modifying the value of x2 will never cause propagation. A minimal definition of es(fK , D) is {lbc(x0 ), lbc(x1 ), ubc(x1 )}. ✷ Example 5.12 [exactly propagator] Another example is a propagator for the exactly constraint [35]: exactly([x1 , . . . , xn ], m, k) states that exactly m out of the variables x1 , . . . , xn are equal to a value k. As soon as one of the xi becomes different from k, all events for xi can be ignored. Originally the events are dmc(xi ), 1 ≤ i ≤ m, lbc(m), ubc(m) and dmc(k). Suppose a domain D where D(k) = {1, 3, 8} and D(x3 ) = {2, 5, 6, 10, 11, 12}, then x3 6= k and we know its contribution to the exactly constraint. We can remove the event dmc(x3 ) from the event set safely. ✷ 21 Other examples for monotonic event sets are propagators for the lex constraint and the generalized element constraint. When using a variant of the lex propagator proposed in [5], events can be removed as soon as the order among pairs of variables being compared can be decided. For the generalized element constraint [7] where the array elements are variables, events for a variable from the array can be safely removed as soon as the variable becomes known to be different from the result of the element constraint. Using monotonic dynamic event sets we can refine our definition of new as follows. newmevents (f, F, D, D′ ) F ′ := {f ′ ∈ F | evset[f ′ ] ∩ events(D, D′ )} − fix(f, D) evset[f ] := es(f, D′ ) return F ′ Every time a propagator f is applied its event set is updated to take into account newly available information. A related idea is the “type reduction” of [30] where propagators are improved as more knowledge on domains (here called types) becomes available. For example, the implementation of x0 = x1 × x2 will be replaced by a more efficient one, when all elements in D(x1 ) and D(x2 ) are non-negative. Here we concentrate on how the event sets change. The two ideas could be merged as they are complementary. Proposition 5.13 newmevents maintains the invariant f (D) = D for all f ∈ F − Q at the start of the while loop. Proof : The proof is almost identical to that for Proposition 5.7 since we are working in a context if evset[f ] = es(f, D∗ ) then D ⊑ D∗ . For propagators using the monotonic event sets, we have the invariant that f ∈ F − Q iff evset[f ] = es(f, D∗ ) where D∗ is the result of the last time we executed propagator f . Suppose we have f ′ ∈ F − Q − {f } where f ′ (D′ ) 6= D′ and f (D) = D then events(D∗ , D′ ) ∩ es(f, D∗ ) 6= ∅ and since f ′ 6∈ Q we have that events(D∗ , D) ∩ es(f, D∗ ) = ∅ otherwise we would have placed f in the queue already, hence by the equation (1) events(D, D′ ) ∩ es(f, D∗ ) 6= ∅ so f ′ ∈ Q at the start of the loop. Consider selected propagator f . Then it is removed from Q but if f (D′ ) 6= D′ then clearly fix(f, D) = ∅ and using case (a) of Definition 5.8 we have that events(D, D′ ) ∩ es(f, D) 6= ∅. Hence f ∈ Q at the start of the loop. ✷ Fully dynamic event sets Note that for many propagators we can be more aggressive in our definition of event sets if we allow the event sets to change in a manner that is not necessarily monotonically decreasing. Definition 5.14 [General propagator dependence] A propagator f is dependent on a set of events es(f, D) in the context of domain D if for all domains D1 where D1 ⊏ D and f (D1 ) 6= D1 then events(D, D1 ) ∩ es(f, D) 6= ∅. 22 Using fully dynamic event sets we can refine our definition of new as follows. newdevents (f, F, D, D′ ) F ′ := {f ′ ∈ F | evset[f ′ ] ∩ events(D, D′ )} − fix(f, D) if (fix(f, D) = ∅) F ′ := F ′ ∪ {f } evset[f ] := es(f, D′ ) return F ′ Every time a propagator f is applied its event set is updated to take into account newly available information. The only difficult case is that if the definition of dynamic dependency does not capture the events that occur when moving from D to D′ = f (D). If fixpoint reasoning cannot guarantee a fixpoint we need to add f to the queue. Fully dynamic event sets are more powerful than monotonically decreasing event sets, but in general they require reasoning about the new event sets each time the propagator is run. Example 5.15 [Fully dynamic events for minimum] Given the propagator fK from Example 5.11 and the domain D where D(x0 ) = [0 .. 10], D(x1 ) = [0 .. 15], and D(x2 ) = [5 .. 10]. D is a fixpoint of fK and a minimal set es(fK , D) is {lbc(x0 ), lbc(x1 ), ubc(x1 ), ubc(x2 )} While at D′ ⊑ D where D′ (x0 ) = [5 .. 9], D′ (x1 ) = [6 .. 9], and D′ (x2 ) = [5 .. 10], which is also a fixpoint, the minimal set es(fK , D′ ) is {lbc(x0 ), ubc(x1 ), lbc(x2 ), ubc(x2 )} For the constraint cK we simply need to maintain a lbc event for some variable xi in the right hand side with the minimal lbc value. ✷ Proposition 5.16 newdevents maintains the invariant f (D) = D for all f ∈ F − Q at the start of the while loop. Proof : We have the invariant that f ∈ F − Q iff evset[f ] = es(f, D∗ ) where D∗ is the result of the last time we executed propagator f . Suppose we have f ′ ∈ F − Q − {f } where f ′ (D′ ) 6= D′ and f (D) = D then events(D∗ , D′ ) ∩ es(f, D∗ ) 6= ∅ and since f ′ 6∈ Q we have that events(D∗ , D) ∩ es(f, D∗ ) = ∅ otherwise we would have placed f ′ in the queue already, hence by the equation (1) events(D, D′ ) ∩ es(f, D∗ ) 6= ∅ so f ′ ∈ Q at the start of the loop. Consider the selected propagator f . The same reasoning cannot apply since even though we know that events(D∗ , D′ ) ∩ es(f, D∗ ) 6= ∅, we have no guarantee that events(D, D′ ) ∩ es(f, D∗ ) is not empty. Now if fix(f, D) = ∅ then possibly f (D′ ) 6= D′ , but this will force f ∈ Q by the start of the loop. ✷ Effectively the fully dynamic event sets approach relies only on the dynamic fixpoint reasoning of the propagator f to handle what happens when moving from D to D′ . 23 Table 6: Dynamic event sets experiments (with priorities). Example bibd-7-3-60 crowded-chess-7 sequence-500 o-latin-7-d average (above) average (all) time +0.4% −24.0% −82.3% −0.7% −39.5% −10.8% monotonic steps mem ±0.0% ±0.0% ±0.0% −15.2% −78.3% −49.5% ±0.0% ±0.0% −31.8% −19.1% −8.2% −4.1% time −5.0% −28.2% −82.1% −1.7% −41.1% −11.2% fully dynamic steps mem −5.2% ±0.0% −34.2% −17.8% −78.3% −49.5% ±0.0% ±0.0% −39.3% −19.7% −9.9% −4.2% Fully dynamic event sets are closely related to the watched literals approach to improving unit propagation in SAT solving [25]. Using watched literals, unit propagation only considers a clause for propagation if one of two watched literals in the clause becomes false. Recently, the idea of watched literals has been used in constraint programming for the Minion solver [13]. Watched literals differ from the events we concentrate on here since they take into account values (similar to the neq(x, a) event). Note that dynamic event sets do not usually have the property of watched literals, in that they do not need to be updated on backtracking. 5.4 Dynamic Event Sets Experiments Table 6 shows the comparison of monotonic and fully dynamic event sets to a propagation solver using static event sets with {fix, bc, dmc} events and priorities to avoid priority inversion as discussed before. The table lists only examples where dynamic event sets are used. The propagators using monotonic event sets are as follows: for bibd-7-3-60: lex; for crowded-chess-7: exactly and element; for sequence-500: exactly; for o-latin-7-d: lex. Clearly, monotonic event sets lead to a drastic reduction in both runtime and memory usage, where it is worth noting that the reduction in time is even more marked than the reduction in propagation steps (each propagation step becomes cheaper as smaller event sets must be maintained). Fully dynamic event sets are considered in Boolean-sum propagators used in bibd-7-3-60 and crowded-chess-7. The difference in improvement between the two examples can be explained by the fact that crowded-chess-7 uses Boolean-sums as inequalities while bibd-7-3-60 uses Boolean-sums as equalities where inequalities offer the potential for considerably smaller event sets [13]. Example bibd-7-3-60 provides another insight: the drastic reduction in runtime observed in [13] by using watched literals for Boolean-sum propagators in the Minion solver is most likely not due to small event sets but to other aspects. A possible aspect is the knowledge about which variables have been modified when a propagator is executed. 24 Table 7: Queue versus stack experiments. Example all-interval-500 alpha bibd-7-3-60 cars crowded-chess-7 donald-b donald-d donald-v golomb-10-b golomb-10-d graph-color grocery knights-10 minsort-200 o-latin-7-d partition-32 photo picture queens-400 queens-400-a sequence-500 square-5-d square-7-b square-7-v warehouse average (all) 6 queue time (ms) steps 73.00 377 777 97.31 207 470 2 020.30 1 020 162 4.65 14 860 553.25 660 525 0.62 414 28.53 40 0.36 366 1 342.48 2 095 161 3 201.84 2 091 691 33.54 4 422 56.87 2 211 6.66 25 225 141.84 113 437 532.48 311 135 9 001.24 13 939 101 90.37 296 661 1 583.12 119 406 549.36 268 771 14.40 1 265 98.12 56 048 32 263.12 1 478 403 9 491.84 6 054 656 5 345.00 9 636 675 0.70 2 075 — — stack time steps +13626.0% +32.2% +47.5% +99.0% +7.7% +102.7% +1.3% +2.6% +4.7% +68.1% +36.3% +31.9% −5.4% +7.5% +7.6% +23.2% +870.6% +171.5% −11.9% +98.9% +299.7% +118.4% +44.2% −6.3% +7.7% +53.3% +1580.1% +1123.3% +4.9% +24.9% −18.5% +34.8% +11.1% +8.7% +27.1% +79.9% ±0.0% −0.1% −0.9% −0.3% +53.8% +240.9% +71.5% +57.7% +75.3% +44.9% +8.3% +35.2% +11.7% +29.3% +78.4% +61.0% Which Propagator to Execute Next We now address how to define which propagator f in the queue Q should execute first, that is how to define the choose function. The simplest policy to implement is a FIFO (First In First Out) queue of propagators. Propagators are added to the queue, if they are not already present, and choose selects the oldest propagator in the queue. The FIFO policy ensures fairness so that computation is not dominated by a single group of propagators, while possibly not discovering failure (a false domain) from other propagators quickly. The equally simple LIFO (Last In First Out) policy is a stack where propagators not already in the stack are pushed, and choose selects the top of the stack. 25 6.1 Basic Queuing Strategy Experiments Table 7 compares using a FIFO queue versus a LIFO stack. The result, according with folklore knowledge, clearly illustrates that a queue must be used. The few cases where a stack is better are comprehensively outweighed by the worst cases for a stack. Later experiments in Section 6.3 using priorities with combinations of FIFO queues and LIFO stacks reveal that the pathological behavior of all-interval-500 is due to priority inversion. However, the pathological behavior of minsort-200 is due to the use of a LIFO stack. 6.2 Static Priorities A statically prioritized queue associates with each propagator a fixed priority, we will assume an integer in the range [0 .. k − 1]. In effect, the queue Q is split into k queues, Q[0], . . . Q[k − 1] where each Q[i] is a FIFO queue for the propagators with priority i. Selection always chooses the oldest propagator in the lowest numbered queue Q[i] that is non-empty. Static prioritization allows one to ensure that quick propagators are executed before slow propagators. We give an example of seven static priorities, with names of the integer priorities as follows: unary=0, binary=1, ternary=2, linear=3, quadratic=4, cubic=5, and veryslow=6. The names are meant to represent the arity of the constraint, and then the asymptotic runtime of the propagator, once the constraint can handle n variables. So binary is for binary constraints, quadratic is for constraints that are approximately O(n2 ) for instances with n variables. Example 6.1 [Propagator priorities] For example, the propagator fL for even(x1 ) defined by   fL (D)(x1 ) = D(x1 ) ∩ 2⌈ 21 inf D x1 ⌉ .. 2⌊ 21 supD (x1 )⌋ fL (D)(x) = D(x) x 6= x1 might be given priority unary, while fE and fF might be given priority binary. The domain propagator defined in [29] for the alldifferent constraint ∧ni=1 ∧nj=i+1 xi 6= xj (with complexity O(n2.5 )) might be given priority quadratic. The alldifferent bounds(Z) propagator defined in [28] (with complexity O(n log n)) might be given priority linear. ✷ Priorities in effect force many more fixpoints to be calculated. A fixpoint of all propagators at priority level i and lower must be reached before a propagator at priority level i + 1 is run. This means we will often cause more propagators to run when using priorities, but more cheap propagators! Example 6.2 [Repeated fixpoints] Consider the execution of a system of propagators for constraints cC ≡ x1 = 2x2 , cD ≡ x1 = 3x2 , cM ≡ x2 ≤ 6 → x1 ≤ x3 + 7 and cN ≡ alldifferent[x1 , x2 , x3 , x4 , x5 ]. We will use the bounds(R) propagators fC , fD , fM for the first three constraints, and the domain propagator, fN , for alldifferent from [29], for the last constraint. Let 26 the initial domain be D(x1 ) = [0 .. 18], D(x2 ) = [0 .. 9], D(x3 ) = [0 .. 6], and D(x4 ) = D(x5 ) = [0 .. 3]. The priorities are binary, binary, ternary, and quadratic respectively. All propagators are at fixpoint. Suppose the domain of x1 changes to [0 .. 17]. All propagators are enqued. The priority level binary propagators are run to fixpoint (as in Example 3.2) giving D(x1 ) = [0 .. 12], D(x2 ) = [0 .. 6], D(x3 ) = [0 .. 4] Then fM is scheduled and causes D(x1 ) = [0 .. 11]. Both fC and fD are enqued, and after executing fC , fD , fC and fD the next fixpoint of the binary priority propagators is reached: D(x1 ) = [0 .. 6], D(x2 ) = [0 .. 3], D(x3 ) = [0 .. 2]. Then fM is scheduled again and causes no change. After that, fN is executed, it reduces the domains of D(x1 ) = [4 .. 6] since all the values [0 .. 3] are required for the variables x2 , x3 , x4 , x5 . Both fC and fD are enqued, and after executing we reach their fixpoint D(x1 ) = {6}, D(x2 ) = {3}, D(x3 ) = {2}. Once again fM is executed for no change. Then fN is executed once more obtaining D(x4 ) = D(x5 ) = {0, 1}. This is the overall fixpoint. ✷ We can adjust the granularity of the priorities: we can have a finer version of the above priorities with 14 priorities, each priority above with a low and high version. This allows us to separate, for example, a domain consistent propagator for the binary absolute value constraint abs(x) = y (binary-low) from a bounds consistent propagator for the same constraint (binary-high). This increased granularity will be important in Section 7. Conversely, we may collapse the priorities into fewer levels, for example into three levels unary-ternary, linear-quadratic, cubic-veryslow. Another model for priorities in constraint propagation based on composition operators is [14]. The model, however, runs all propagators of lower priority before switching propagation back to propagators of higher priority. This model does not preempt computing a fixpoint for a low priority. The model always completes a fixpoint for a given priority level and only then possibly continues at a higher priority level. Most systems have some form of static priorities, typically using two priority levels (for example, SICStus [18], Mozart [26]). The two levels are often not entirely based on cost: in SICStus all indexicals have high priority and all other lower priority. While ECLi PSe [36, 15] supports twelve priority levels, its finite domain solver also uses only two priority levels where another level is used to support constraint debugging. A similar, but more powerful approach is used by Choco [19] using seven priority levels allowing both LIFO and FIFO traversal. Prioritizing particular operations during constraint propagation is important in general. For interval narrowing, prioritizing constraints can avoid slow convergence, see for example [20]. The prioritizing of propagators by cost is important, inverting the priorities can lead to significant disadvantages. Example 6.3 [Inverted priorities] Consider executing Example 6.2 with inverted priorities. We first execute fN then fM for no effect. Then executing fC 27 Table 8: Priority experiments with varying granularities. Example all-interval-500 alpha bibd-7-3-60 cars crowded-chess-7 donald-b donald-d donald-v golomb-10-b golomb-10-d graph-color grocery knights-10 minsort-200 o-latin-7-d partition-32 photo picture queens-400 queens-400-a sequence-500 square-5-d square-7-b square-7-v warehouse average (all) small time steps +1.8% +0.3% +1.2% ±0.0% +0.1% +16.9% −1.4% −10.4% +8.1% +91.2% +1.1% ±0.0% −0.1% ±0.0% +1.6% ±0.0% −33.1% +33.5% −49.5% +29.2% −1.3% ±0.0% +10.3% −9.2% −3.4% −19.5% +0.5% ±0.0% −10.6% +4.6% −38.6% −18.2% +0.1% +3.4% −1.0% ±0.0% +0.7% ±0.0% +0.2% ±0.0% +0.5% ±0.0% −0.5% ±0.0% +1.3% ±0.0% +0.9% ±0.0% +5.3% +13.0% −5.6% +3.8% medium time steps +2.3% +0.3% +1.2% ±0.0% +0.1% +16.9% −1.5% −10.5% +9.0% +91.2% +0.4% ±0.0% −5.6% +5.0% +2.6% ±0.0% −31.3% +51.0% −49.0% +46.7% −1.3% −0.1% −5.6% +1.9% −4.7% −19.9% +0.5% ±0.0% −11.0% +4.6% −38.7% −17.8% +0.2% +3.4% −1.5% ±0.0% +0.5% ±0.0% +0.2% ±0.0% +0.3% ±0.0% +0.9% +23.8% +0.4% ±0.0% +0.7% ±0.0% +5.7% +12.0% −6.3% +6.4% full time +2.3% +1.2% +0.2% −1.8% +8.8% +0.9% −5.5% +2.2% −31.6% −48.9% −0.9% −5.6% −3.7% −0.2% −10.6% −38.4% −7.3% +0.2% +0.5% +0.3% +0.6% +1.1% −23.4% +0.9% +5.3% −7.4% steps +0.3% ±0.0% +16.9% −10.5% +91.1% ±0.0% +5.0% ±0.0% +51.0% +46.7% −0.1% +1.9% −19.9% ±0.0% +4.6% −17.8% −1.8% ±0.0% ±0.0% ±0.0% ±0.0% +23.8% +22.0% ±0.0% +12.0% +7.0% modifies D(x1 ), so each of fN and fM are enqued and re-executed for no effect. Then executing fD has the same behavior. Overall we execute the propagators fM and fN each at least 10 times, as opposed to 3 and 2 times respectively in Example 6.2. Since they are the most expensive to execute we would expect this to be slower (this is confirmed immediately below). ✷ 6.3 Static Priority Experiments Priority granularity Table 8 gives runtime and propagation steps of various priority granularities compared to a propagation engine using a FIFO queue (and using dynamic fixpoint reasoning, events of types {fix, bc, dmc}, and fully dynamic event sets). The three different experiment capture different priority granularities: “small” uses three priorities (unary-ternary, linear-quadratic, cubic-veryslow); “medium” uses seven priority levels (from unary to veryslow); “full” uses 14 priority levels (from unary-high to veryslow-low). The results illustrate that even when there are substantially more propagations (for example, golomb-10-{b,d}) there can be significant savings. Priori- 28 ties can have a very substantial saving (almost 50% for golomb-10-d) and the worst case cost on the benchmarks is only 10.3%. Overall while the “medium” range of priorities is preferable on many benchmarks, the “full” range of priorities gives real speedups on two more benchmarks (photo and square-7-b) and tends to reduce the worst case behavior of “medium”. Examples such as queens-400, queens-400-a, and sequence-500 for “small” only feature propagators with the same priority (the number of propagation steps remains the same). Hence the increase in runtime by less than 1% describes the overhead of using priorities at all. Depending on the underlying system, increasing the granularity also requires more memory. Gecode, as a system based on recomputation and copying, constitutes the worst case in that each copied node in the search tree maintains queues for all priority levels. However, the average increase in used (not allocated as before) memory is +0.2% for “small”, +0.7% for “medium”, and +1.5% for “full” and hence can be neglected. A broad spectrum of priorities will be useful for the optimizations presented in Section 7. Therefore it is important that while “full” does not offer huge advantages over “medium”, it neither degrades overall performance nor requires much memory. Priorities and stacks Table 9 gives the runtime and propagation steps of using priorities together with stacks or combinations of stacks and queues for the different priority levels. All numbers are given relative to a propagation engine using the “full” priority spectrum with only queues for each priority level. All propagation engines considered also use the full priority spectrum. The propagation engine for “for all” uses only stacks for all priority levels, whereas “for 1, 2, 3-ary” (“for 1, 2-ary”) uses stacks for priority levels unary-high to ternary-low (unary-high to binary-low) and queues for the other levels. The numbers for “for all” clarify that the misbehavior of LIFO stacks is not due to priority inversion. The folklore belief that LIFO stacks are good for small propagators is refuted by the numbers for “for 1, 2, 3-ary” and “for 1, 2-ary”. Only three examples show improvement in both cases while grocery “for 1, 2, 3-ary” already exhibits pathological behavior. The measurements show that queue versus stack does not matter for unary or binary constraints whereas stacks are wrong for anything else. Issues to avoid Table 10 shows runtime and propagation steps of using priorities in flawed ways. The experiment “complete fixpoints” refers to the model proposed in [14] where fixpoints are always completed before possibly switching to a higher priority level. As to be expected, the number of propagation steps is reduced, however at the expense of increased runtime. More importantly, two examples exhibiting substantial slowdown (golomb-10-d and square-5-d) are particularly relevant as they feature propagators of vastly different priority levels. The surprising behavior of bibd-7-3-60 appears to be due to a problem 29 Table 9: Priority experiments with stacks and priorities. Example all-interval-500 alpha bibd-7-3-60 cars crowded-chess-7 donald-b donald-d donald-v golomb-10-b golomb-10-d graph-color grocery knights-10 minsort-200 o-latin-7-d partition-32 photo picture queens-400 queens-400-a sequence-500 square-5-d square-7-b square-7-v warehouse average (all) for all time steps −0.6% ±0.0% +47.2% +99.0% +5.5% +49.7% −4.2% −7.3% +0.6% +10.4% +0.3% ±0.0% −0.6% +2.4% +7.7% +23.2% +7.1% +27.0% +5.7% +39.2% +62.7% +77.1% +42.8% +7.1% +0.1% +5.0% +1545.4% +1106.4% −3.3% +5.2% −2.2% −2.9% −1.3% −0.8% +21.1% +79.9% −0.1% −0.1% −1.0% −0.3% +54.1% +240.9% +65.2% +31.6% +1.7% +18.6% +8.9% +35.2% −2.5% +1.7% +23.9% +36.0% 30 for 1, 2, 3-ary time steps +1.3% ±0.0% +2.3% ±0.0% −4.0% +1.4% +1.2% −2.0% +2.0% ±0.0% +1.6% ±0.0% +1.0% ±0.0% +2.5% ±0.0% +9.7% +27.0% +7.7% +39.2% +2.3% ±0.0% +45.8% +7.1% +2.1% +5.0% +2.2% ±0.0% +1.0% +0.3% +2.2% +2.3% −1.0% −0.9% −1.3% ±0.0% +1.0% −0.1% +1.2% ±0.0% +1.4% ±0.0% +1.2% ±0.0% +1.4% ±0.0% +2.9% ±0.0% +3.0% +0.2% +3.3% +2.8% for 1, 2-ary time steps +0.2% ±0.0% +1.0% ±0.0% −5.9% +1.4% +1.8% −2.0% +1.7% ±0.0% +0.9% ±0.0% +0.3% ±0.0% +1.7% ±0.0% +1.2% ±0.0% +1.0% ±0.0% +1.5% ±0.0% +1.6% −0.3% +1.4% +5.0% +2.4% ±0.0% −0.4% +0.3% +2.2% +0.4% +0.1% −0.9% −1.2% ±0.0% +0.8% −0.1% +1.2% ±0.0% +0.8% ±0.0% +0.8% ±0.0% +0.8% ±0.0% +2.6% ±0.0% +3.0% +0.2% +0.8% +0.2% Table 10: Priority experiments: issues to avoid. Example all-interval-500 alpha bibd-7-3-60 cars crowded-chess-7 donald-b donald-d donald-v golomb-10-b golomb-10-d graph-color grocery knights-10 minsort-200 o-latin-7-d partition-32 photo picture queens-400 queens-400-a sequence-500 square-5-d square-7-b square-7-v warehouse average (all) complete time −0.8% +0.5% −11.7% −1.2% −4.2% +0.9% +0.9% +1.6% −2.5% +14.6% +1.9% +29.3% −0.9% +5.5% +7.3% +0.4% +1.2% −3.6% −0.7% +0.3% +0.2% +32.5% +0.5% +2.6% −3.7% +2.5% fixpoints steps ±0.0% ±0.0% −45.8% −0.9% −41.1% ±0.0% ±0.0% ±0.0% −14.5% −14.2% +0.1% −23.4% ±0.0% +8.6% −3.8% −1.2% ±0.0% ±0.0% ±0.0% ±0.0% ±0.0% +7.9% ±0.0% ±0.0% −9.0% −6.6% 31 inverse priorities time steps +13296.5% +32.1% +0.3% ±0.0% −7.7% −42.8% +14.4% +40.1% −7.4% −52.0% +36.8% +31.9% +6.2% −7.1% +0.2% ±0.0% +892.0% −5.7% +945.4% −2.2% +336.8% +51.1% +35.3% +9.1% +8.7% +43.5% +2732.2% +2246.7% +105.1% +18.7% +108.3% +66.8% +18.6% −1.9% −3.7% ±0.0% +0.2% ±0.0% −0.3% ±0.0% −0.2% ±0.0% +50.1% +7.5% +177.4% −7.6% ±0.0% ±0.0% +14.7% +11.3% +107.5% +18.4% with how the priorities for the two different kinds of propagators used in this example (lex and Boolean-sum) are classified. This clarifies that even with a rich spectrum of priority levels at disposal it remains difficult to assign priority levels to propagators. The experiment “inverse priorities” shows numbers for a propagation engine where a propagator with lowest priority is executed first. The experiment shows that there is a point to the priority levels, high priority = fast propagator. While the number of propagations is often reduced the approach is rarely better than no priorities and sometimes catastrophically worse. The experiment “inverse priorities” clarifies a very important aspect of priorities: they not only serve as a means to improve performance, they also serve as a safeguard against pathological propagation order. 6.4 Dynamic Priorities As evaluation proceeds, variables become fixed and propagators can be replaced by more specialized versions. If a propagator is replaced by a more specialized version, also its priority should change. Example 6.4 [Updating a propagator] Consider the propagator fO for updating x1 in the constraint x1 = x2 + x3 defined by fO (D)(x1 ) = fO (D)(x) = D(x1 ) ∩ [inf D (x2 ) + inf D (x3 ) .. supD (x2 ) + supD (x3 )] D(x) x 6= x1 might have initial priority ternary. When the variable x2 becomes fixed to d2 say, then the implementation for x1 can change to fO (D)(x1 ) = D(x1 ) ∩ [d2 + inf D (x3 ) .. d2 + supD (x3 )] and the priority can change to binary. ✷ Changing priorities is also relevant when a propagator with n > 3 variables with priority linear (or worse) reduces to a binary or ternary propagator. 6.5 Dynamic Priority Experiments Table 11 shows runtime and propagation steps for an engine using dynamic priorities compared to an engine using all optimizations introduced earlier and the full priority spectrum. Dynamically changing the priority of propagators as they become smaller due to fixed variables can lead to significant improvements. In effect, constraints that become smaller (and thus run at higher priority) are run first causing the still large constraints to be run less often. This is in particular true for alpha with initially only propagators for linear equalities with priority linear. When fixing variables during search many of these propagators are then run at priority levels binary and ternary. It is worth noting that using dynamic priorities can disturb the FIFO queue behavior: for sequence-500 it appears to be more important to run all exactly 32 Table 11: Dynamic priority experiments. Example alpha cars crowded-chess-7 o-latin-7-d picture sequence-500 average (above) average (all) dynamic time steps −25.5% −41.7% −5.9% −13.4% −5.0% −26.5% −7.3% −7.4% −1.9% ±0.0% +6.0% +34.8% −7.1% −12.1% −1.7% −3.0% propagators at the same priority level. Running some of the exactly propagators at priorities binary and ternary is not beneficial and disturbs the queue behavior. Dynamic priorities incur the overhead to compute the priority based on the number of not yet fixed variables. However, the overhead is still small enough to make dynamic priorities worthwhile overall. 7 Combining Propagation There are many ways to define a correct propagator f for a single constraint c: the art of building propagators is to find good tradeoffs in terms of speed of execution versus strength of propagation. Typically a single constraint may have a number of different propagator implementations: the cheapest simple propagator, a more complex bounds propagator, and a more complex domain propagator, for example. Example 7.1 [alldifferent propagators] Consider the propagator fP (D) for the alldifferent constraint. E := ∅ for i ∈ [1 .. n] if (∃d.D(xi ) = {d}) if (d ∈ E) return D⊥ else E := E ∪ {d} for i ∈ [1 .. n] if (|D(xi )| > 1) D(xi ) := D(xi ) − E return D The propagator does a linear number of set operations in each invocation and is checking. It can be made idempotent by testing that no variable becomes fixed. Another propagator for the same constraint is the domain propagator fN introduced in [29] with complexity O(n2.5 ). ✷ 33 Given two propagators, say f1 and f2 in prop(c), where f1 is strictly stronger than f2 (f1 (D) ⊑ f2 (D) for all domains D), we could choose to implement c by just f1 or just f2 trading off pruning versus execution time. Without priorities there is no point in implementing the constraint c using both propagators, since f1 will always be run and always compute stronger domains than f2 . We could possibly merge the implementation of the propagators to create a new propagator f12 (D) = f1 (f2 (D)). By running the cheaper propagator immediately first we hope that we can (a) quickly determine failure in some cases and (b) simplify the domains before applying the more complicated propagator f1 . While this immediate combination of two propagators in essence is simply building a new propagator, once we have priorities in our propagation engine we can use two or more propagators for the same constraint in different ways. 7.1 Multiple Propagators Once we have priorities it makes sense to use multiple propagators to implement the same constraint. We can run the weaker (and presumably faster) propagator f2 with a higher priority than f1 . This makes information available earlier to other propagators. When the stronger propagator f1 is eventually run, it is able to take advantage from propagation provided by other cheaper propagators. Note that this is essentially different from having a single propagator f12 that always first runs the algorithm of f2 and then the algorithm of f1 . Example 7.2 [Multiple alldifferent] Consider the two propagators fP and fN defined in Example 7.1 above. We can use both propagators: fP with priority linear, and fN with priority quadratic. This means that we will not invoke fN until we have reached a fixpoint of fP and all linear and higher priority propagators. Consider the additional propagator fE for the constraint 3x1 = 2x2 , which has priority binary. Consider the domain D where D(x1 ) = {4, 6}, D(x2 ) = {6, 9}, D(x3 ) = {6, 7} and D(x4 ) = · · · = D(xn ) = [1 .. n], which is a fixpoint for fE , fP and fN . Now assume the domain of x3 is reduced to 6. Propagator fP is placed in queue linear and fN is placed in queue quadratic. Applying fP removes 6 from the domain of all the domains of x1 , x2 , x4 , . . . , xn , and this causes fE to be placed in queue binary. This is the next propagator considered and it causes failure. Propagator fN is never executed. If we just use fN then we need to invoke the more expensive fN to obtain the same domain changes as fP , and then fail. ✷ 7.2 Staged Propagators Once we are willing to use multiple propagators for a single constraint it becomes worth considering how to more efficiently manage them. Instead of using two (or more) distinct propagators we can combine the several propagators into a single propagator with more effective behavior. 34 We assume that a propagator has an internal state variable, called its stage. When it is invoked, the stage determines what form of propagation applies. Example 7.3 [Staged alldifferent] Consider the alldifferent constraint with implementations fP and fN discussed in Example 7.1. We combine them into a staged propagator as follows: • On a fix(x) event, the propagator is moved to stage A, and placed in the queue with priority linear. • On a dmc(x) event, unless the propagator is in stage A already, the propagator is put in stage B, and placed in the queue with priority quadratic. • Execution in stage A uses fP , the propagator is put in stage B, and placed in the queue with priority quadratic, unless it is subsumed. • Execution in stage B uses fN , afterwards the propagator is removed from all queues (stage NONE). The behavior of the staged propagator is identical to the multiple propagators for the sample execution of Example 7.1. In addition to the obvious advantage of having a single staged propagator, another advantage comes from avoiding the execution of fN when the constraint is subsumed. ✷ In addition to giving other propagators with higher priority the opportunity to run before the expensive part of a staged propagator, the first stage of a propagator can already determine that the next second does not need to be run. This is illustrated by the following example. Example 7.4 [Staged linear equations] Consider the unit coefficient linear equation Σni=1 ai xi = d constraint where |ai | = 1, 1 ≤ i ≤ n. We have two implementations, fQ , which implements bounds(R) consistency (considering real solutions, with linear complexity) for the constraint, and fR , which implements domain consistency (with exponential complexity). We combine them into a staged propagator as follows: • On a bc(x) (or depending on the event types available: lbc(x) or ubc(x)) event, the propagator is moved to stage A, and placed in the queue with priority linear. • On a dmc(x) event, unless the propagator is in stage A already, the propagator is put in stage B, and is placed in the queue with priority veryslow. • Execution in stage A uses fQ , afterwards the propagator is put in stage B, and placed in the queue with priority veryslow, unless each xi has a range domain in which case it is removed from all queues (stage NONE). • Execution in stage B uses fR , afterwards the propagator is removed from all queues (stage NONE). 35 Table 12: Combination experiments. Example donald-b donald-d golomb-10-b golomb-10-d graph-color o-latin-7-d partition-32 photo picture square-5-d square-7-b average (above) average (all) immediate time steps +0.7% ±0.0% −1.6% −2.4% +0.3% ±0.0% −2.7% +0.2% −0.6% −0.6% −1.2% +1.0% −0.6% ±0.0% ±0.0% ±0.0% +0.3% ±0.0% −29.6% −7.4% −0.1% ±0.0% −3.6% −0.9% −1.6% −0.4% multiple time steps −15.4% +10.4% ±0.0% +111.9% −10.1% +9.2% −14.5% +8.6% +2.0% +23.0% −9.6% +14.3% −4.3% +7.4% −0.9% +7.8% −0.1% ±0.0% −38.3% +28.8% −17.5% −11.0% −10.7% +16.1% −4.8% +6.8% staged time steps −16.9% +10.1% −1.6% +88.1% −9.8% +9.2% −16.1% +8.6% −14.4% +12.3% −14.0% +10.9% −6.2% +4.2% −1.5% +7.8% −3.4% ±0.0% −42.8% +56.0% −18.6% −10.9% −14.0% +15.3% −6.5% +6.5% The staged propagator is advantageous since the “fast” propagator fQ can more often determine that its result D′ = fQ (D) is also a fixpoint for fR . ✷ Staged propagators are widely applicable. They can be used similarly for the bounds(Z) version of the alldifferent constraint. Another area where staged propagators can be used is constraint-based scheduling, where typically different propagation methods with different strength and efficiency are available [2]. Staging is not limited to expensive propagators, it is already useful for binary (for example, combining bounds and domain propagation for the absolute value constraint abs(x) = y) and ternary constraints (for example, combining bounds and domain propagation for the multiplication constraint x × y = z). It is important to note that staging requires a sufficiently rich spectrum of priorities. For example, to use staging for binary or ternary propagators as mentioned above, at least two different priority levels must be available for staging. This explains why the full priority spectrum is useful: here, for binary propagators two priorities binary-high and binary-low are available. Likewise, ternary-high and ternary-low are available for ternary propagators. 7.3 Combining Propagation Experiments Table 12 presents runtime and propagation steps of different propagator combination schemes compared to a propagation engine using the full priority spectrum and all optimizations presented so far. The experiment “immediate” uses a single propagator that always runs the first stage immediately followed by the second stage. For experiment “multiple”, multiple propagators for different stages (as discussed in Section 7.1) are used, whereas for experiment “staged” full staging is used (as described in Section 7.2). A quite surprising result is that “immediate” offers only modest or even 36 no speedup. The only exception is square-5-d using bounds(R) propagation immediately before domain propagation for several linear equation propagators. Using multiple propagators leads to an average reduction in runtime by 10% with a slowdown for just a single example (graph-color). As to be expected, the number of propagation steps rises sharply. This is due to the fact that more propagators need to be run and that, similar to the introduction of priorities, propagators with high priority are run more often. The exceptional case of square-7-b where the number of propagation steps decreases appears to be a fortunate change in propagation order. Staged propagation offers another level of improvement over using multiple propagators: all examples now achieve speedup. As fewer propagators must be executed compared to “multiple”, also the number of propagation steps decreases (apart from square-5-d being another case of changing propagation order). Due to the reduced overhead compared to “multiple”, even small examples such as graph-color are able to benefit from staged execution. The exact improvement in runtime of donald-d for “immediate” and “staged” is due to early fixpoint detection for a big linear equation propagator as discussed in Example 7.4. The memory requirements for “immediate” and “staged” are unchanged. The use of multiple propagators for “multiple” leads to an average increase of 6.4% in allocated memory for the examples shown in Table 12. In summary, staged propagation is very effective for all examples, so it should clearly be used. 8 Experiment Summary In Table 13 we summarize the effect of all improvements suggested in this paper. The naive propagation engine is compared to an engine featuring all techniques introduced in this paper: dynamic fixpoint reasoning, {dmc, fix, bc} fully dynamic events, dynamic priority based LIFO queuing with the full priority spectrum, and staged propagators. It is interesting to note that all examples but warehouse show an improvement in runtime and that almost 75% of the examples show an improvement of at least 10%. The improvement in runtime does not incur a large increase in memory: the largest increases are for the three donald-* problems, where the increase is actually negligible in absolute terms and due to the underlying memory allocation strategy (as discussed in Section 5.2). The effects of the individual optimizations discussed in this paper could be summarized as follows. Dynamic fixpoint reasoning subsumes static reasoning and is easy to implement, it provides a modest improvement in execution times. Events, while used in all finite domain propagation engines, have less benefit than perhaps was assumed by developers. Using dynamic events again leads to a modest improvement in execution times. The fairness of a FIFO queue strategy is essential for scheduling propagators. While priorities by themselves are not that important they provide a protection against worst case behavior and enable 37 Table 13: Experiment summary. Example all-interval-500 alpha bibd-7-3-60 cars crowded-chess-7 donald-b donald-d donald-v golomb-10-b golomb-10-d graph-color grocery knights-10 minsort-200 o-latin-7-d partition-32 photo picture queens-400 queens-400-a sequence-500 square-5-d square-7-b square-7-v warehouse average (all) no optimizations time (ms) mem (KB) 118.31 385.4 106.56 22.2 2 279.36 6 688.6 4.64 41.7 624.25 196.9 0.70 7.4 30.37 3.2 0.38 5.4 1 347.48 40.0 2 430.00 37.0 35.87 832.4 55.41 7.7 7.46 770.3 342.48 32 454.5 574.36 242.9 8 571.24 160.4 108.87 37.0 1 553.42 450.5 4 433.12 30 286.1 16.15 566.3 517.96 6 081.5 33 391.24 43.5 10 166.24 160.3 5 690.00 144.2 0.74 29.4 — — 38 all optimizations time memory −36.1% +25.0% −31.2% +9.8% −11.0% +5.8% −7.7% +1.2% −8.1% −6.4% −25.7% +19.0% −13.0% +68.2% −3.3% +44.4% −38.5% +9.3% −43.7% +4.8% −19.9% +9.0% −5.9% +7.9% −14.7% +4.2% −58.8% −5.1% −32.5% +5.5% −40.4% +9.2% −23.8% +10.1% −3.0% +18.0% −87.6% +0.2% −10.3% +4.4% −79.8% −49.4% −44.2% +11.9% −41.2% +8.7% −3.9% +11.7% +1.2% +1.0% −33.3% +7.2% the use of multiple propagators. Staging is an important optimization that can significantly improve performance. 9 Conclusion and Future Work We have given a formal definition of propagation systems including idempotence, events, and priorities used in current propagation systems and have evaluated their impact. We have introduced dynamically changing event sets which are shown to improve efficiency considerably. The paper has introduced multiple and staged propagators which are shown to be an important optimization in particular for improving the efficiency of costly global constraints. While the improvements to an engine of a propagation based constraint solver have been discussed for integer constraints, the techniques readily carry over to arbitrary constraint domains such as finite sets and multisets. A rather obvious way to further speed up constraint propagation is to consider not only cost but also estimated impact for a propagator. However, while computing cost is straightforward it is currently not clear to us how to accurately predict propagation impact. A Examples Used in Experiments All variants of constraint propagation discussed in the paper are experimentally evaluated. The characteristics of the examples used in evaluation are summarized in Table 14. The column “variables” gives the number of variables in the example, whereas the column “propagators” shows the number of propagators as implementations of constraints in the example. The column “search” shows which search strategy is used to search for a solution (“first” is simple backtracking search for the first solution, “all” is search for all solutions, “best” is branch-and-bound search for a best solution). The two last columns describe how many failed nodes are explored during search (column “failures”) and how many solutions are found (column “solutions”). A -d at the end of the example name means that domain propagation is used for all occurring alldifferent and linear equation constraints. Likewise, -b means that bounds(Z) propagation is used for all alldifferent and bounds(R) for all linear equation constraints. In contrast, for -v bounds(R) propagation is used for all linear constraints, whereas naive propagation (eliminating assigned values as in Example 7.1) is used for alldifferent. If not otherwise mentioned, bounds consistency is used for arithmetic constraints (including linear constraints) and naive propagation for alldifferent. • all-interval-500 computes a series of numbers where the distances between adjacent numbers are pairwise distinct (prob007 in [10]). The model uses a single bounds(Z) consistent alldifferent propagator and many binary absolute value (abs(x) = y) and ternary minus propagators. 39 Table 14: Example characteristics. Example all-interval-500 alpha bibd-7-3-60 cars crowded-chess-7 donald-b donald-d donald-v golomb-10-b golomb-10-d graph-color grocery knights-10 minsort-200 o-latin-7-d partition-32 photo picture queens-400 queens-400-a sequence-500 square-5-d square-7-b square-7-v warehouse variables 1 498 26 11 760 60 163 10 10 10 46 46 201 7 2 028 399 147 128 61 625 400 400 500 25 49 49 81 propagators 1 002 21 9 693 93 275 2 2 2 46 46 566 7 2 981 398 133 134 54 50 239 400 3 502 15 19 19 76 40 search first all first all first first first first best best first first first first first first best first first first all first first first best failures 0 7 435 1 306 107 30 396 79 5 79 19 929 19 929 37 37 2 0 2 188 160 258 6 995 3 242 10 10 250 41 272 245 208 481 301 20 solutions 1 1 1 6 1 1 1 1 10 10 1 1 1 1 1 1 7 1 1 1 1 1 1 1 4 • alpha and donald are crypto-arithmetic puzzles involving linear equation propagators and a single alldifferent propagator. • bibd-7-3-60 is an instance of a balanced incomplete block design problem with parameters (v, k, l) = (7, 3, 60) (prob028 in [10]). The model involves Boolean-sum propagators and lex propagators for symmetry breaking. • cars models the well known car sequencing problem from [35] using element, exactly, and linear equation propagators (prob001 in [10]). • crowded-chess-7 places several different chess pieces on a 7 × 7 chessboard [11]. It uses exactly, element, domain consistent alldifferent, and bounds(R) consistent linear equation propagators. • golomb-10 finds an optimal Golomb ruler of size 10 (prob006 in [10]) with the usual model. • graph-color performs clique-based graph coloring for a graph with 200 nodes. Coloring each clique uses a domain consistent alldifferent propagator. • grocery is a small crypto-arithmetic puzzle using in particular bounds(R) consistent multiplication propagators. • knights-10 finds a sequence of knight moves on a 10×10 chess board such that each field is visited exactly once and that the moves return the knight to the starting field. The model uses a naive alldifferent propagator and a large number of reified binary propagators. • minsort-200 sorts 200 variables using 200 minimum propagators. • o-latin-7 finds an orthogonal latin square of size 7 and mostly uses domain consistent alldifferent propagators. • partition-32 partitions two 32 number blocks such that their products match. Uses several bounds(R) multiplication propagators, a single domain consistent alldifferent propagator, and few linear equation propagators. • photo places 9 persons on a picture such that as many preferences as possible are satisfied. Uses a large bounds(Z) consistent alldifferent propagator, a large bounds(R) consistent linear propagator, and many reified binary propagators. • picture models a 25×25 picture-puzzle (prob012 in [10]) using 50 regular propagators. • queens-400 and queens-400-a places 400 queens on a 400 × 400 chess board such that the queens do not attack each other. queens-400 uses quadratically many binary disequality propagators, while queens-400-a uses three naive alldifferent-propagators. 41 • sequence-500 computes a magic sequence with 500 elements using 500 exactly propagators (prob019 in [10]). • square-5 (square-7) computes a magic square of size 5 × 5 (7 × 7) using linear equation propagators and a single alldifferent propagator (prob019 in [10]). • warehouse solves a warehouse location problem following [32]. B Evaluation Platform All experiments use Gecode, a C++-based constraint programming library [12]. Gecode is one of the fastest constraint programming systems currently available, benchmarks comparing Gecode to other systems are available from Gecode’s webpage. The version used in this paper corresponds to Gecode 1.3.0 (albeit slightly modified to ease the numerous experiments in this paper). Gecode has been compiled with Microsoft Visual Studio Express Edition 2005. All examples have been run on a Laptop with a 2 GHz Pentium M CPU and 1024 MB main memory running Windows XP. Runtimes are the average of 25 runs with a coefficient of deviation less than 4% for all benchmarks. Acknowledgments Christian Schulte is partially funded by the Swedish Research Council (VR) under grant 621-2004-4953. We thank Mikael Lagerkvist and Guido Tack for many helpful suggestions that improved the paper. References [1] Krzysztof Apt. Principles of Constraint Programming. Cambridge University Press, Cambridge, United Kingdom, 2003. [2] Philippe Baptiste, Claude Le Pape, and Wim Nuijten. Constraint-based Scheduling. Kluwer Academic Publishers, Dordrecht, The Netherlands, 2001. [3] Nicolas Beldiceanu, Warwick Harvey, Martin Henz, François Laburthe, Eric Monfroy, Tobias Müller, Laurent Perron, and Christian Schulte. Proceedings of TRICS: Techniques foR Implementing Constraint programming Systems, a post-conference workshop of CP 2000. Technical Report TRA9/00, School of Computing, National University of Singapore, September 2000. [4] Frederic Benhamou. Heterogeneous Constraint Solving. In Proceedings of the Fifth International Conference on Algebraic and Logic Programming, volume 1139 of LNCS, pages 62–76, Aachen, Germany, 1996. SpringerVerlag. 42 [5] Mats Carlsson and Nicolas Beldiceanu. Revisiting the lexicographic ordering constraint. Technical Report T2002-17, Swedish Institute of Computer Science, Stockholm, Sweden, 2002. [6] Mats Carlsson, Greger Ottosson, and Björn Carlson. An open-ended finite domain constraint solver. In Programming Languages: Implementations, Logics, and Programs, 9th International Symposium, PLILP’97, volume 1292 of LNCS, pages 191–206, Southampton, United Kingdom, September 1997. Springer-Verlag. [7] Andre Chamard, Annie Fischler, Dominique-Benoit Guinaudeau, and Andre Guillard. CHIC lessons on CLP methodology. Technical report, Dassault Aviation, 1995. [8] Chiu Wo Choi, Warwick Harvey, Jimmy Ho-Man Lee, and Peter J. Stuckey. Finite domain bounds consistency revisited. Technical report, http://arxiv.org/abs/cs.AI/0412021, 2004. [9] Philippe Codognet and Daniel Diaz. Compiling constraints in clp(FD). Journal of Logic Programming, 27(3):185–226, June 1996. [10] CSPLib. CSPLib: a problem library for constraints, 2006. Available from http://www.csplib.org. [11] Henry E. Dudeney. Amusements in Mathematics. Dover, New York, NY, USA, 1958. [12] Gecode Team. Gecode: Generic constraint development environment, 2006. Available from http://www.gecode.org. [13] Ian P. Gent, Chris Jefferson, and Ian Miguel. Watched literals for constraint propagation in Minion. In Frédéric Benhamou, editor, Twelfth International Conference on Principles and Practice of Constraint Programming, volume 4204 of LNCS, pages 182–197. Springer-Verlag, Nantes, France, September 2006. [14] Laurent Granvilliers and Eric Monfroy. Implementing constraint propagation by composition of reductions. In Logic Programming: Proceedings of the 19th International Conference, volume 2916 of LNCS, pages 300–314, Mumbai, India, 2003. Springer-Verlag. [15] Warwick Harvey. Personal communication, April 2004. [16] Warwick Harvey and Peter J. Stuckey. Improving linear constraint propagation by changing constraint representation. Constraints, 8(2):173–207, 2003. [17] ILOG S.A. ILOG Solver 5.0: Reference Manual. Gentilly, France, August 2000. 43 [18] Intelligent Systems Laboratory. SICStus Prolog user’s manual, 3.11.1. Technical report, Swedish Institute of Computer Science, Box 1263, 164 29 Kista, Sweden, 2004. [19] François Laburthe. CHOCO: implementing a CP kernel. In Beldiceanu et al. [3], pages 71–85. [20] Olivier Lhomme, Arnaud Gotlieb, and Michel Rueher. Dynamic optimization of interval narrowing algorithms. Journal of Logic Programming, 37(1– 3):165–183, 1998. [21] Alan K. Mackworth. Consistency in networks of relations. Artificial Intelligence, 8(1):99–118, 1977. [22] Kim Marriott and Peter J. Stuckey. Programming with Constraints: an Introduction. The MIT Press, Cambridge, MA, USA, 1998. [23] Roger Mohr and Thomas C. Henderson. Arc and path consistency revisited. Artificial Intelligence, 28:225–233, 1986. [24] Roger Mohr and Gérald Masini. Good old discrete relaxation. In Yves Kodratoff, editor, Proceedings of the 8th European Conference on Artificial Intelligence (ECAI 88), pages 651–656, Munich, Germany, 1988. Pitmann Publishing. [25] Matthew W. Moskewicz, Conor F. Madigan, Ying Zhao, Lintao Zhang, and Sharad Malik. Chaff: Engineering an efficient SAT solver. In Proceedings of the 38th Design Automation Conference, DAC 2001, pages 530–535, Las Vegas, NV, USA, 2001. ACM. [26] Mozart Consortium. The Mozart programming system, 1999. Available from www.mozart-oz.org. [27] Gilles Pesant. A regular language membership constraint for finite sequences of variables. In Mark Wallace, editor, Tenth International Conference on Principles and Practice of Constraint Programming, volume 3258 of LNCS, pages 482–495. Springer-Verlag, Toronto, Canada, September 2004. [28] Jean-Francois. Puget. A fast algorithm for the bound consistency of alldiff constraints. In Proceedings of the 15th National Conference on Artificial Intelligence (AAAI-98), pages 359–366, Madison, WI, USA, July 1998. AAAI Press/The MIT Press. [29] Jean-Charles Régin. A filtering algorithm for constraints of difference in CSPs. In Proceedings of the Twelfth National Conference on Artificial Intelligence, volume 1, pages 362–367, Seattle, WA, USA, 1994. AAAI Press. [30] Pierre Savéant. Constraint reduction at the type level. In Beldiceanu et al. [3], pages 16–29. 44 [31] Christian Schulte and Peter J. Stuckey. When do bounds and domain propagation lead to the same search space? Transactions on Programming Languages and Systems, 27(3):388–425, May 2005. [32] Pascal Van Hentenryck. The OPL Optimization Programming Language. The MIT Press, Cambridge, MA, USA, 1999. [33] Pascal Van Hentenryck, Vijay Saraswat, and Yves Deville. Constraint processing in cc(FD). Draft, 1991. [34] Pascal Van Hentenryck, Vijay Saraswat, and Yves Deville. Design, implementation and evaluation of the constraint language cc(FD). Journal of Logic Programming, 37(1–3):139–164, 1998. [35] Pascal Van Hentenryck, Helmut Simonis, and Mehmet Dincbas. Constraint satisfaction using constraint logic programming. Artificial Intelligence, 58:113–159, 1992. [36] Mark Wallace, Stefano Novello, and Joachim Schimpf. Eclipse: A platform for constraint logic programming. Technical report, IC-Parc, Imperial College, London, GB, August 1997. [37] Neng-Fa Zhou. Programming finite-domain constraint propagators in action rules. Theory and Practice of Logic Programming, 6(5):483–508, September 2006. 45
6cs.PL
arXiv:1802.05324v1 [cs.IT] 14 Feb 2018 1 Advancing System Performance with Redundancy: From Biological to Artificial Designs Anh Tuan Nguyen1∗ , Jian Xu1 , Diu Khue Luu1 , Qi Zhao2 , and Zhi Yang1 1 Biomedical Engineering, University of Minnesota, MN, USA. 2 Computer Science and Engineering, University of Minnesota, MN, USA. ∗ Email: [email protected]. Keywords: Representational redundancy, entangled redundancy, precision enhancement, redundant sensing, muscle redundancy, deep residual networks, bio-inspired designs Abstract Redundancy is a fundamental characteristic of many biological processes such as those in the genetic, visual, muscular and nervous system; yet its function has not been fully understood. The conventional interpretation of redundancy is that it serves as a fault- tolerance mechanism, which leads to redundancy’s de facto application in man-made systems for reliability enhancement. On the contrary, our previous works have demonstrated an example where redundancy can be engineered solely for enhancing other aspects of the system, namely accuracy and precision. This design was inspired by the binocular structure of the human vision which we believe may share a similar operation. In this paper, we present a unified theory describing how such utilization of redundancy is feasible through two complementary mechanisms: representational redundancy (RPR) and entangled redundancy (ETR). Besides the previous works, we point out two additional examples where our new understanding of redundancy can be applied to justify a system’s superior performance. One is the human musculoskeletal system (HMS) - a biological instance, and one is the deep residual neural network (ResNet) - an artificial counterpart. We envision that our theory would provide a framework for the future development of bio-inspired redundant artificial systems as well as assist the studies of the fundamental mechanisms governing various biological processes. 1 Introduction Redundancy is a well-known characteristic of many biological processes from the molecular to the systematic level. For example, the human’s genome is highly redundant: a particular gene can be duplicated at various regions of DNA while multiple genes can encode the same or similar biochemical functions and phenotype expressions. These genetic redundancy and functional redundancy are observed in many crucial pathways 2 of the developmental, signaling, and cell cycle processes (Tautz, 1992; Nowak, 1997; Kafri, 2009). High level of redundancy can also be found in the nervous system. The neuronal architecture and synaptic interconnections have been shown to be highly redundant which allows them to facilitate complex processes of information processing, learning, memorizing, and self-repairing. In fact, it is believed that the human brain is at least twice the size as necessary for its function as a result of neural redundancy (Glassman, 1987). In many scenarios, the redundant structure of a biological system can be seen as a consequence of the evolutionary process. Under the pressure of natural selection, living organisms develop multiple different strategies that achieve the same goal: survival. It is not uncommon for distinct strategies that emerge from entirely different evolutionary pathways to resolve the same biological problem. These strategies could co-exist in the same ecosystem or even the same organism’s genome creating observable repeated evolutional behaviors such as functional redundancy, parallel evolution, and convergent evolution (York, 2017). Redundancy also serves as a defence mechanism against failures which contribute to a higher survival rate. For example, gene duplication has been shown to mitigate effects of mutations and reduce the chance of catastrophic phenotype expression (Kafri, 2009). Redundancy also helps the human brain tolerate significant damages and loss of mass due to injuries or diseases. Damaged neurons and brain tissue generally do not regrow, yet their redundant structures allow reorganization of the neuronal circuits to recover many basic brain functions (Glassman, 1987). Lastly, redundancy increases the organism’s adaptivity. For example, genetic and functional duplication has been shown to be the basis of phenotypic plasticity which allows an 3 organism to adapt and survive rapidly-changing endogenous and exogenous environmental conditions (Kafri, 2009). Many of these principles find their application in designing and engineering of artificial systems. However, almost all intentional utilization of redundancy in man-made systems focus on enhancing reliability, which importance is often overshadowed by the system’s performance. Also, existing methods for incorporating redundancy involves the replication of partial or entire systems which require large resources overhead. As a result, redundant designs such as dual modular redundancy (DMR) or triple modular redundancy (TMR) are mostly found in specialized systems that perform critical functions such as aircraft controllers, biomedical implants, and computer servers, etc. In this paper, we argue two counter-intuitive arguments. First, redundancy can be engineered solely for enhancing systems’ performance regarding accuracy and precision, instead of reliability and plasticity. Secondly, a practical implementation of redundancy is feasible without replication and excessive resource overhead, thus mitigating the trade-off encountered by conventional designs. The performance boost in our proposed framework is achieved by employing two complementary mechanisms, namely RPR and ETR. RPR describes how information is redundantly encoded and processed, while ETR allows realizing of a RPR scheme in actual applications. In (Nguyen, 2015, 2016), we have shown a simple but practical application where redundancy resembling the binocular structure of the human vision is applied to enhance the precision of a man-made sensor without incurring compromises often seen in conventional architectures. In theory, the RPR and ETR principles utilized in our design can be generalized to different applications, and also serve as a fundamentally structural 4 characteristic of more complex systems. This argument is further asserted in this paper by examining empirical evidence in two different systems from two distinct fields of science and engineering. One is the HMS - a biological system where redundancy contributes to generating complex and precise muscle movements; another is the ResNet - an artificial deep learning architecture where redundancy helps accomplish superior predicting accuracy compared to conventional methods. By understanding subtle yet sophisticated roles of redundancy in these systems, we believe that the findings would not only enrich our knowledge of biological processes but also inform the derivation of new methods for advancing the performance of man-made designs. The remains of the paper are organized as follows. Section 2 consolidates our redundant model comprised of RPR and ETR mechanism. Section 3 examines the evidence suggesting the implication of our model in biological and artificial systems, which include the proposed sensor design, the HMS, and the ResNet. Finally, section 4 concludes our findings and gives discussions on the future development of the proposed theory. 2 Advancing Performance with Redundancy Representational redundancy: The vast majority of artificial systems are designed upon an orthogonal scheme of information representation where each entry of information is encoded by a unique configuration of the system. An entry of information can be an input value, a desirable output, an intermediate instance or an operation of the information processing pathway. Such orthogonal systems excel in efficiency because 5 they allow rapidly and unambiguously acquiring, processing and storing of information. However, any encoding/decoding scheme in practice suffers from an inevitable level of error resulting in the limitation of its accuracy. In many computational models, this limitation is described by Shannon’s theorem. Because of the uniqueness of the representation scheme, any error acquired during the sampling, processing and storing of information cannot be easily corrected without an overhead in term of resources such as power, bandwidth, and memory, etc. The RPR concept is designed to overcome conventional limitations by embracing a non-orthogonal scheme of information representation. Subsequently, every entry of information can be encoded by numerous distinct system configurations, including the conventional one. These configurations are referred as the system’s microstates. If the microstates are designed such that their response to error are non-homologous, in any given instance, provided a sufficient number of distinct microstates, there exist with asymptotic certainty one or more microstates that have a smaller error than the conventional representation. Therefore, an overall RPR-system would have a theoretical accuracy almost always superior to the conventional counterpart with similar structure. Entangled redundancy: The number of microstates represents the information capacity - an abstract property of the design that is not necessarily proportional to its physical size. In order to effectively deploy a RPR-system in practice, the microstates must be designed so that they do not incur excessive resource overhead. As a result, the statistical distribution of the microstates with respect to error cannot be independent, but partially correlated or entangled. This concept is known as ETR. The level of entanglement should be engineered just sufficient to create excessive redundancy 6 without trading off large amounts of resource. ETR should be differentiated from the conventional method of creating redundancy by replication where the distribution of repeated instances are independent of each other and the resource utilization is linearly proportional to the level of redundancy. Figure 1 illustrates the distinction between a conventional orthogonal system (COS), a conventional redundant system (CRS) and a proposed RPR+ETR system (RES). An entry of information in this illustration is a processing pathway that takes an input xi and produce a corresponding output yi (i = 1, 2, ...). In the COS, every input/output (I/O) pair (xi , yi ) is represented by a unique pathway which has a determined error that cannot be easily removed. The pathways in the CRS are partially or entirely replicated, which requires a proportional resource overhead. Although in practice, the replication is mostly used for fault-tolerance, a marginal accuracy gain is feasible by selecting the pathway with the least error for each input instance. The RES incorporates redundancy by having the pathways of different I/O pairs share certain elements. Each (xi , yi ) pathways can now be represented by multiple system’s pathways, i.e. microstates, which number increases exponentially with the number of shared elements. The RES is superior compared to COS because there almost always exists a pathway with a lower error for any given I/O pair. The RES is also superior compared to CRS because an exponential level of redundancy can be achieved with minimal additional resources. Challenges: A proper implementation of RPR and ETR in the same architecture is essential to achieve the performance boost. The goal is to create an excessive number of microstates while utilizing their entanglement to allow the microstates to co-exist in superposition thus requiring minimal additional resources as shown in Figure 1(c). Un- 7 ࢞૚ ࢞૛ = ‫ݔ‬ଵ , ‫ݕ‬ଵ elements = ‫ݔ‬ଶ , ‫ݕ‬ଶ elements = shared elements Inputs Outputs ࢞૚ ࢞૛ ࢟૚ ࢟૛ ࢞૚ ࢞૛ ࢞૚ ࢞૛ (a) Conventional orthogonal system (ROS) ࢞૚ ࢞૛ ࢟૚ ࢟૛ (b) Conventional redundant system (CRS) ࢞૚ ࢞૛ ࢟૚ ࢟૛ Optimal pathway for (‫ݔ‬ଵ , ‫ݕ‬ଵ ) ࢟૚ ࢟૛ ࢟૚ ࢟૛ Optimal pathways for (‫ݔ‬ଶ , ‫ݕ‬ଶ ) ࢟૚ ࢟૛ (c) Proposed representational & entangled redundancy system (RES) Figure 1: Illustration of the differences among a conventional orthogonal system (COS), a conventional redundant system (CRS) and a proposed RPR+ETR system (RES). An entry of information is a processing pathway that takes an input xi and produce a corresponding output yi (i = 1, 2, ...). (a) Every input/output (I/O) pair in the COS is represented by a unique pathway. (b) The pathways in the CRS are partially or entirely replicated which give the system fault-tolerance properties and a marginal accuracy gain. (c) The proposed RES achieves redundancy by having different pathways share certain elements. The entanglement allows exponential level of redundancy with minimal additional resources. For each I/O pair, the pathway with the least error can be selected resulting in major accuracy enhancement. fortunately, there is no universal solution that can be applied to all types of system. In our proof-of-concept system described in (Nguyen, 2015, 2016), redundancy is realized by integrating two similar binary-weighted arrays, which structure is speculated to re8 semble the human’s binocular vision. In the subsequent sections, the HMS and ResNet provide additional examples where redundancy elegantly emerges in entirely different manners. Furthermore, provided a redundant non-orthogonal structure of information representation, there is no universal solution to identify the optimal microstate given a particular input. In fact, in almost all examples of RES, it appears to be an NP-optimization problem that can only be resolved by the mean of approximation. Biological processes such as the visual and musculoskeletal system overcome this challenge by harnessing the computational capacity of the nervous system, which is exceptionally adequate at approximation. A similar mechanism could be utilized by the ResNet which itself is a neural network. For engineering systems such as our redundant sensor (Nguyen, 2015), an approximation method need to be derived, which consists of a one-shot unsupervised error estimation and a simplified calibration algorithm. 3 From Biological to Artificial Systems 3.1 Redundant Sensing The work of (Nguyen, 2015) shows a proof-of-concept implementation of a RPR+ETR system: a sensor that converts analog to digital signals. A entry of information is a digital code xD ∈ {0, 1, ..., 2N − 1} (N = resolution) representing an input analog voltage. In practice, each code is generated by assembling a set of components which are miniature capacitors embedded on a silicon chip which number is proportional to the required physical resources and cost. The random error occurred during the fabrication 9 Component Set Conventional Redundant Sensing { , , Digital Codes 1 2 3 4 5 6 7 } { , , , , } = Physical unit-component Figure 2: Illustration of the RPR and ETS properties of the proposed redundant sensing (RS) architecture (Nguyen, 2015). The device converts an analog input to a digital output by assembling a set of physical components. While utilizing the same number of unit-components (2N − 1 = 7, N: sensor’s resolution) as a conventional design, the component set of a RS architecture allows each digital code to be created by multiple different assemblies, i.e. microstates. By selecting the microstate with the least error for every code, a significant boost of the accuracy can be achieved. This example illustrates a simplified case of N = 3. The RS is most effective for high resolution because the number of microstates increases exponentially with N. process of these capacitors, i. e. mismatch error, has been shown to be a major factor limiting the device’s accuracy. Figure 2 compares the differences between a conventional and a RS architecture in a simplified case of N = 3. The conventional system utilizes a binary-weighted set of components which is the most efficient encoding scheme yet vulnerable to mismatch 10 error. On the other hand, the proposed RS architecture employs a non-orthogonal component set which satisfies both RPR and ETR requirements. With the name number of unit-component (2N − 1 = 7), RS allows each digital code to be generated by multiple different component assemblies, i.e. microstates. The number of microstates increases exponentially with N resulting in major accuracy enhancement of high-resolution devices. Interestingly, the RS component set resembles exchanging and integrating the information between two smaller conventional binary-weighted sub-arrays, which is inspired by the binocular structure of the human visual system. Thus, we ask the question: whether RPR and ETR are fundamental properties that facilitate visual acuity? The spatial distribution of photoreceptors on the retina is notably irregular, which echoes the impact of mismatch error. It is therefore conjectured that binocular vision effectively creates a form of static redundancy allowing the brain to collect sufficient information to remedy the error and produce the images we perceive. In fact, the binocular vision has been shown to help differentiation of fine details, even exceeding the diffraction limit of the photoreceptors - a phenomenon known as hyperacuity (Beck, 1979). Our theory is further supported by the fact that human and many higher-order animals only have two eyes. During the development of our RS sensor, we found out that the amount of computational power required to process redundant information increases rapidly with the number of sub-arrays. Two sub-arrays or two eyes is the minimum number necessary to create a redundant structure. Despite dedicating 30-60% of its mass for visual processing, the brain simply lacks the capacity to process information from three or more eyes. 11 Furthermore, as a complement to the binocular structure, we conjecture that eyes’ micro-fixational movement or microsaccade (Martinez-Conde, 2013) creates a form of dynamic redundancy. During microsaccades, the field of vision of each eye is sampled multiple times by different spatial configurations of photoreceptors, which resemble entangled redundant microstates and facilitate visual acuity. This observation is supported by both experiments with human subjects (Hicheur, 2013) and mathematical modeling (Hennig, 2004) where microsaccades have been shown to play an important role in the visual precision and could lead to hyperacuity. 3.2 Muscle Redundancy The HMS has more muscles and joints than the necessary mechanical degrees-offreedom even though are energetically expensive to produce and maintain. This paradoxical phenomenon of muscle redundancy (MS) presents a long-standing problem in human kinesiology of understanding how and why the human brain coordinates all muscles and joints to achieve complex movements with precision (Bernstein, 1967). By examining this biological process from the perspective of our model, we hope to unravel the principles underlying the behavior of MS. A conventional interpretation would suggest that redundancy contributes to the reliability of the HMS allowing compensation for the loss or dysfunction of individual muscles. However, emerging empirical evidence suggests this is not true. Even a mild dysfunction of a few critical muscles due to disorders, injuries or aging can significantly weaken the force production and overall functions of the whole HMS (Forssberg, 1991; Schreuders, 2006). The results are supported by Kutch & Valero-Cuevas works 12 1. glmed/min 2. glmax 3. hamstr 4. bfsh 5. gastroc 6. tibpost 7. soleus 8. perbrev 9. tibant 10. vasti 11. tensfl 12. rectfem 13. addlong 14. iliacus 14 13 1 12 11 2 3 10 4 5 5 14 6 12 3 7 8 9 2 10 (a) (b) (c) Figure 3: (a, b) A sagittal view of a human leg’s mechanical model consisting of 14 muscles and muscle groups (Kutch & Valero-Cuevas, 2011). (c) Any specific movement trajectory and force can be achieved by multiple distinct muscles and joints combinations. Also, different muscles have overlapping but not exclusive mechanical functions, and all contribute with different degrees in generating force and movement. These characteristics resemble a RPR+ETR system. (Kutch & Valero-Cuevas, 2011; Valero-Cuevas, 2015). Using both computational models and empirical experiments with cadaver specimens, the authors point out that less than 5% of the feasible forces and movements in their models are robust to a loss of any muscle, so it is clear that reliability is not an inherited characteristic of MS. Figure 3 presents a sagittal view of a human leg’s mechanical model used by Kutch & Valero-Cuevas (Kutch & Valero-Cuevas, 2011) which consists of 14 muscles and 13 muscle groups1 . At the kinematic and muscular level, any specific movement trajectory and force can be achieved by virtually infinite combinations of muscles and joints. While at the control level, each muscle consists of numerous units that can be activated by different motor neurons and patterns while resulting in the same behavior. Furthermore, the muscles have overlapping but not exclusive mechanical functions, and all contribute with different degrees in generating force and movement. Clearly, these characteristics of the HMS resemble ones of a RPR+ETR system, thus our model predicts that MR plays a major role in enhancing the accuracy and precision of muscle movements. Indeed, the hypothesis is supported by a number of studies. In (Cleather, 2010), the authors examine two different muscular models, namely Delp and Horsman, in predicting the patellofemoral force during standing, jumping, and weightlifting. They conclude that higher level of redundancy in the Horsman model contributes to its higher predictive accuracy and closer realistic approximation in all activities. The authors’ conjecture is consistent with our theory which implies redundancy effectively increases the variability and number of independent musculoskeletal movements (i.e. microstates), so an optimal solution is more likely to be found. The argument is further strengthened in (Moissenet, 2016) where an increased level of redundancy correlates to a better pre1 List of 14 muscles/muscle groups and their abbreviation: (1) gluteus medialis and minimus (glmed/min); (2) gluteus maximus (glmax); (3) semimembranoseus, semitendenosis and biceps femoris long head (hamstr); (4) biceps femoris short head (bfsh); (5) medial and lateral gastrocnemius (gastroc); (6) tibialis posterior (tibpost); (7) soleus (soleus); (8) peroneus brevis (perbrev); (9) tibialis anterior (tibant); (10) vastus intermedius, lateralis and medialis (vasti); (11) tensor facia lata (tensfl); (12) rectus femoris (rectfem); (13) adductor longus (addlong); (14) iliacus (iliacus). 14 dicting accuracy of tibiofemoral contact forces in all gait patterns. 3.3 Deep Residual Networks Input Layer 1 … Layer 2 Layer ܰ Output Layer ܰ Output (a) Conventional feedforward network Input Layer 1 … Layer 2 = skip connection/identity mapping (b) Deep residual network Layer 1 Layer 1 No. of distinct paths ൎ 2ே Layer 2 Layer 1 Input Layer 1 … Layer 2 Layer ܰ Output (c) “Unraveled” deep residual network Figure 4: (a) A conventional feedforward DNN produces a prediction by convoluting the input through multiple feature layers. (b) A ResNet achieves superior predictive accuracy with the incorporation of skip connections/identity mappings which allow information to bypass an entire layer. (c) It has been shown that the behavior of the ResNet is similar to a collection of shallower networks, resembling a RPR+ETR system (Veit, 2016). There exist several prominent uses of redundancy for enhancing classification accuracy in machine learning. In a “committee machine” or “ensemble learning”, multiple predictions are generated simultaneously by a collection of discrete instances that are based on the same or distinct predictive models. Because each instance produces a re15 sult with a different degree of error, an appropriate integration of these outcomes could lead to a higher overall accuracy (Bishop, 2006). Another approach involves replication of individual neurons or sub-circuits of an artificial neural network (ANN). Using mathematical models, (Izui, 1990; Tanaka, 1988) conclude that replication can fundamentally alter the computation carried out by an ANN resulting in quantitative enhancement of convergence speed, solution accuracy, interconnection stability. The findings were utilized to design redundant ANNs simulating a robotic arm grasping an object in 2D space and a pattern-classification task with improved accuracy and convergence time (Medler, 1994b,a). These are prime examples of CRS as shown in Figure 1(b). Even though a marginal accuracy boost can be accomplished, the replication-based implementation prevents these systems from effectively employing redundancy without incurring excessive resource overhead. Recently, deep learning has emerged as a leading field of machine learning (LeCun, 2015). A feedforward deep neural network (DNN) produces a prediction by convoluting the inputs through various feature layers encoding the acquired knowledge (Figure 4(a)). One of the breakthroughs in DNN design - the ResNet (He, 2016a,b) - modifies the conventional structure by including “skip connections” or “identity mapping” that allow information to occasionally bypass an entire layer (Figure 4(b)). Empirical experiments have demonstrated the superior predictive accuracy of ResNet compared to conventional networks with the same number of layers and parameters (He, 2016a,b; Huang, 2016; Wu, 2016; Zagoruyko, 2017). Although the advantage of ResNet is evident, many are baffled by how a subtle yet critical modification of the DNN could fundamentally alter its properties. It becomes 16 clear as Veit et al. (Veit, 2016) show that the ResNet’s behaviors resemble characteristics of an ensemble of shallower networks. As illustrated in Figure 4(c), the network can be “unraveled” as a sum of smaller sub-circuits where information can flow through any one of the 2N distinct pathways (N: number of layers) and is integrated at the last step. The structure resembles a proposed RPR+ETR system where each of pathway corresponds to a microstate. Because of the entanglement among microstates, an excessive level of redundancy which is exponentially proportional to the number of layers can be formulated without compromising the size of the network. Therefore, we argue that by including the skip connections, the conventional DNN has been transformed into a redundant system with both RPR and ETR properties which leads to major enhancement of performance. Discussion & Conclusion Although redundancy is no doubt an essential property of many biological processes, there are reasons to believe that its functions have not been fully appreciated resulting in the absence in artificial designs. While the conventional interpretation ties redundancy with fault-tolerance, we propose a new model arguing that it can be engineered to advance the performance regarding accuracy and precision. Our theory highlights two fundamental mechanisms enabling such function: (i) RPR facilitates redundant encoding of information, and (ii) ETR facilitates practical implementation of redundancy. Besides suggesting the presence of these mechanisms in biological processes such as the human visual and musculoskeletal systems, we present two state-of-the-art man-made 17 designs, the RS sensor (Nguyen, 2016) and the ResNet (He, 2016a), where redundancy is successfully employed. Clearly, there are future works needed to be done to demonstrate the feasibility of such redundant architectures. Firstly, under the guidelines of our framework, new engineering solutions should be derived to integrate redundancy into other designs for accuracy and precision enhancement. Although the principles of RPR and ETR are universal, their actual implementations vary drastically. The examples in electrical engineering and computer pointed out in this paper are merely the tip of the iceberg. Secondly, a new technique should be investigated to evaluate the information capacity of redundant systems which correlates to its upper bound of performance. A brute force approach utilized in the RS design (Nguyen, 2016) certainly cannot be applied to more complex systems such as the ResNet. Finally, new methods should be developed to harness the full capacity of redundant systems. Redundant representation of information is irrelevant without an effective way to extract the optimal configuration. In almost all examples shown in this work, they present NP-optimization problems which solutions can be adequately obtained by the mean of approximation. References Beck, J. and Schwartz, T. (1979) Vernier Acuity with Dot Test Objects. Vision Research, 19(3), 313-9 Bernstein, N. A. (1967) The Co-ordination and Regulation of Movements. Psyccritiques. 18 Bishop, C. M. (2006) Pattern Recognition And Machine Learning. Springer. Cleather, D. J. and Bull, A. M. (2010) Lower-extremity Musculoskeletal Geometry Affects the Calculation of Patellofemoral Forces in Vertical Jumping and Weightlifting. Journal of Engineering in Medicine, 224(9), 1073-83. Forssberg, H., Eliasson, A., Kinoshita, H., Johansson, R. and Westling, G. (1991) Development of Human Precision Grip I: Basic Co-ordination of Force. Experimental Brain Research, 85(2), 451-7. Glassman, R. B. (1987) An Hypothesis About Redundancy And Reliability In The Brains Of Higher Species: Analogies With Genes, Internal Organs, And Engineering Systems. Neuroscience and Biobehavioral Reviews, 11(3), 275-85. He, K., Zhang, X., Ren, S. and Sun, J. (2016a) Deep Residual Learning For Image Recognition. IEEE Conference on Computer Vision and Pattern Recognition, 770778. He, K., Zhang, X., Ren, S. and Sun, J. (2016b) Identity Mappings In Deep Residual Networks. European Conference on Computer Vision, 630-45. Hennig, M. H. and Worgotter, F. (2004) Eye Micro Movements Improve Stimulus Detection Beyond The Nyquist Limit In The Peripheral Retina. Advances in Neural Information Processing Systems, 1475-82. Hicheur, H., Zozor, S., Campagne, A. and Chauvin, A. (2013) Microsaccades Are Modulated By Both Attentional Demands Of A Visual Discrimination Task And Background Noise. Journal of Vision, 13(13), 18. 19 Huang, G., Sun, Y., Liu, Z., Sedra, D. and Weinberger, K. Q. (2016) Deep Networks With Stochastic Depth. European Conference on Computer Vision, 646-61. Izui, Y. and Pentland, A. (1990) Analysis Of Neural Networks With Redundancy. Neural Computation, 2(2), 226-38. Kafri, R., Springer, M. and Pilpel, Y. (2009) Genetic Redundancy: New Tricks for Old Genes. Cell, 136(3), 389-92. Kutch, J. J. and Valero-Cuevas, F. J. (2011) Muscle redundancy does not imply robustness to muscle dysfunction. Journal of Biomechanics, 44(7), 1264-70. LeCun, Y., Bengio, Y. and Hinton, G. (2015) Deep Learning. Nature Neuroscience, 521(7553), 436-44. Martinez-Conde, S., Otero-Millan, J. and Macknik, S. L. (2013) The Impact Of Microsaccades On Vision: Towards A Unified Theory Of Saccadic Function. Nature Reviews Neuroscience, 14(2), 83-96. Medler, D. A. and Dawson, M. R. W. (1994a) Training Redundant Artificial Neural Networks: Imposing Biology on Technology. Psychological Research, 57(1), 54-62. Medler, D. A. and Dawson, M. R. W. (1994b) Using Redundancy to Improve The Performance of Artificial Neural Networks. Biennial Conference of the Canadian Society for Computational Studies of Intelligence on Advances in Artificial Intelligence, 131-8. Moissenet, F., Cheze, L. and Dumas, R. (2016) Influence of the Level of Muscular 20 Redundancy on the Validity of a Musculoskeletal Model. Journal of Biomechanical Engineering, 138(2), 021019. Nguyen, A. T., Xu, J. and Yang, Z. (2015) A 14-Bit 0.17mm2 SAR ADC In 0.13µm CMOS for High Precision Nerve Recording. IEEE Custom Integrated Circuits Conference, 1-4. Nguyen, A. T., Xu, J. and Yang, Z. (2016) A Bio-Inspired Redundant Sensing Architecture. Advances in Neural Information Processing Systems, 2379-87. Nowak, M. A., Boerlijst, M. C., Cooke, J. and Smith, J. M. (1997) Evolution Of Genetic Redundancy. Nature Neuroscience, 388(6638), 167-171. Schreuders, T. A., Selles, R. W., Roebroeck, M. E. and Stam, H. J. (2006) Strength Measurements of the Intrinsic Hand Muscles: A Review of the Development and Evaluation of the Rotterdam Intrinsic Hand Myometer. Journal of Hand Therapy, 19(4), 393-402. Tanaka, H., Matsuda, S., Ogi, H., Izui, Y., Taoka, H. and Sakaguchi, T. (1988) Redundant Coding for Fault Tolerant Computing on Hopfield Network. Neural Networks, 1, 141. Tautz, D. (1992) Redundancies, Development and The Flow of Information. Bioessays, 14(4), 263-6. Valero-Cuevas, F. J., Cohn, B. A., Yngvason, H. F. and Lawrence, E. L. (2015) Exploring the High-Dimensional Structure of Muscle Redundancy via Subject-Specific and Generic Musculoskeletal Models. Journal of Biomechanics, 48(11), 2887-96. 21 Veit, A., Wilber, M. and Belongie, S. (2016) Residual Networks Behave Like Ensembles Of Relatively Shallow Networks. Advances in Neural Information Processing Systems, 550-8. Wu, Z., Shen, C. and Hengel, A. V. D. (2016) Wider Or Deeper: Revisiting The Resnet Model For Visual Recognition. arXiv preprint arXiv:1611.10080. York, R. A. and Fernald, R. D. (2017) The Repeated Evolution Of Behavior. Frontiers in Ecology and Evolution, 4(143), 1-10. Zagoruyko, S. and Komodakis, N. (2017) Wide Residual Networks. arXiv preprint arXiv:1605.07146. 22
7cs.IT
arXiv:1511.03171v3 [math.QA] 16 Mar 2016 SKEW BRACES AND THE YANG–BAXTER EQUATION L. GUARNIERI AND L. VENDRAMIN Abstract. Braces were introduced by Rump to study non-degenerate involutive set-theoretic solutions of the Yang–Baxter equation. We generalize Rump’s braces to the non-commutative setting and use this new structure to study not necessarily involutive non-degenerate set-theoretical solutions of the Yang–Baxter equation. Based on results of Bachiller and Catino and Rizzo, we develop an algorithm to enumerate and construct classical and non-classical braces of small size up to isomorphism. This algorithm is used to produce a database of braces of small size. The paper contains several open problems, questions and conjectures. Introduction The Yang–Baxter equation first appeared in theoretical physics and statistical mechanics in the works of Yang [42] and Baxter [4, 5] and it has led to several interesting applications in quantum groups and Hopf algebras, knot theory, tensor categories and integrable systems, see for example [27], [30] and [39]. In [14], Drinfeld posed the problem of studying this equation from the set-theoretical perspective. Recall that a set-theoretical solution of the Yang–Baxter equation is a pair (X, r), where X is a set and r : X × X → X × X, r(x, y) = (σx (y), τy (x)), x, y ∈ X, is a bijective map such that (r × id)(id × r)(r × id) = (id × r)(r × id)(id × r). Such a map r is usually called a braiding. A solution (X, r) is said to be non-degenerate if the maps σx and τx are bijective for each x ∈ X, and (X, r) is said to be involutive if r2 = idX×X . The seminal works of Etingof, Schedler and Soloviev [15], and Gateva-Ivanova and Van den Bergh [24], discussed algebraic and geometrical interpretations and introduced several structures associated with the class of non-degenerate involutive solutions. Such solutions have been intensively studied, see for example [17, 18, 19], [21, 22, 23], [25, 26], [20], [32, 34], [6], [10], [11], [13], [28], and [40]. It was in studying involutive solutions that Rump introduced in [34] the brace structure. In [12], Cedó, Jespers and Okniński, defined a left brace as an abelian group (A, +) with another group structure, defined via (a, b) 7→ ab, such that the compatibility condition a(b + c) + a = ab + ac holds for all a, b, c ∈ A. This definition is equivalent to that of Rump. This work is partially supported by CONICET, PICT-2014-1376, MATH-AmSud and ICTP. 1 2 L. GUARNIERI AND L. VENDRAMIN Many of the problems related to involutive solutions can be restated in terms of braces. Two prominent examples are the following: • Is every finite solvable group an involutive Yang–Baxter group? Recall that an involutive Yang–Baxter group is a group isomorphic to the group generated by the set {σx : x ∈ X}, where r : X × X → X × X, r(x, y) = (σx (y), τy (x)), is a non-degenerate involutive solution of the Yang–Baxter equation. Based on a sketch of proof of Rump [36], Bachiller [2] found a solvable finite group that is not an involutive Yang–Baxter group. • Are there good methods to contruct all finite non-degenerate involutive solutions to the Yang–Baxter equation? Brute force seems not to be good enough. In [3], Bachiller, Cedó and Jespers, give a method to construct all finite solutions of a given size. For it to work, one needs the classification of left braces. Non-involutive solutions were studied by Soloviev [38] and Lu, Yan and Zhu [29]. Such solutions have applications in knot theory, since they produce powerful knot and virtual knots invariants, see for example [31] and the references therein. The following question naturally arises: Is there an algebraic structure similar to the brace structure useful for studying non-involutive solutions? This paper introduces the notion of skew brace and provides an affirmative answer to the above question. Remarkably, this new structure provides the right algebraic framework to study involutive and non-involutive braidings and allows us to restate the main results of [29], [38] and [41]. As in the case of involutive solutions, the classification of finite skew braces is one of the main steps needed for constructing finite solutions of the Yang–Baxter equation. One of the main results of this paper is an explicit classification of classical and skew braces of small size. An algorithm to construct all non-isomorphic classical and skew braces of a given size is described. This heavily depends on results of Bachiller [2] and Catino and Rizzo [9]. This algorithm was used to build a database of classical and skew braces, a good source of examples that gives an explicit and direct way to approach some of the problems related to the Yang–Baxter equation. The database is available as a library for GAP [16] and Magma [8] immediately from the authors on request. The paper is organized as follows. In Section 1 we extend braces to the noncommutative setting by defining skew braces, and state their main properties. We prove in Proposition 1.11 that skew braces are equivalent to bijective 1-cocycles. Section 2 is devoted to a study of quotients of skew braces. It is worth mentioning that the proofs in Section 1 and 2 are basically the same as for classical braces. In Section 3 the connection between skew braces and the Yang–Baxter equation is explored. In Theorem 3.1 we generalize a result of Rump and produce a canonical solution for each skew left brace. Some reconstruction theorems similar to those of Etingof, Schedler and Soloviev [15], Lu, Yan and Zhu [29] and Soloviev [38] are given at the end of this section. The method for constructing classical and skew braces is given in Section 4. Section 5 discusses the algorithm that produces and enumerates classical and skew left braces and some consequences. Problems, questions and conjectures are discussed in Section 6. SKEW BRACES AND THE YANG–BAXTER EQUATION 3 1. Skew left braces Braces were introduced by Rump in [34] to study set-theoretical involutive solutions of the Yang–Baxter equation. The following definition generalizes braces to the non-commutative setting. Definition 1.1. A skew left brace is a group A (written multiplicatively) with an additional group structure given by (a, b) 7→ a ◦ b such that (1.1) a ◦ (bc) = (a ◦ b)a−1 (a ◦ c) holds for all a, b, c ∈ A, where a−1 denotes the inverse of a with respect to the group structure given by (a, b) 7→ ab. Of course Rump’s left braces are examples of skew braces. These are braces where the group (A, ·) is abelian. Definition 1.2. A homomorphism between two skew left braces A and B is a map f : A → B such that f (ab) = f (a)f (b) and f (a ◦ b) = f (a) ◦ f (b) for all a, b ∈ A. The kernel of f is ker f = {a ∈ A : f (a) = 1}, where 1 denotes the identity of the group (A, ·) with multiplication a · b = ab for all a, b ∈ A. Example 1.3. Let (A, ·) be a group. Then A is a skew left brace with a ◦ b = ab for all a, b ∈ A. Similarly, a ⋆ b = ba defines a skew left brace structure over A. These braces are isomorphic if and only if (A, ·) is abelian. Example 1.4. Let A and B be groups and let α : A → Aut(B) be a group homomorphism. Then A × B has a skew left brace structure given by (a, b)(a′ , b′ ) = (aa′ , bb′ ), (a, b) ◦ (a′ , b′ ) = (aa′ , bαa (b′ )), where a, a′ ∈ A and b, b′ ∈ B. Example 1.5. Let A and B be groups and let α : A → Aut(B) be a group homomorphism. Assume that A is abelian. Then A × B has a skew left brace structure given by (a, b)(a′ , b′ ) = (aa′ , bαa (b′ )), (a, b) ◦ (a′ , b′ ) = (aa′ , bb′ ), where a, a′ ∈ A and b, b′ ∈ B. Example 1.6. This example is motivated by the paper of Weinstein and Xu on the Yang–Baxter equation, see [41]. Let A be a group and A+ , A− be subgroups of A such that A admits a unique factorization as A = A+ A− . Thus each a ∈ A can be written in a unique way as a = a+ a− for some a+ ∈ A+ and a− ∈ A− . The map A+ × A− → A, (a+ , a− ) 7→ a+ (a− )−1 , is bijective. Using this map we transport the group structure of the direct product A+ × A− into the set A. For a = a+ a− ∈ A and b = b+ b− ∈ A let a ◦ b = a+ ba− . Then (A, ◦) is a group. Furthermore, A is a skew left brace. 4 L. GUARNIERI AND L. VENDRAMIN Lemma 1.7. Let A be a skew left brace. Then the following properties hold: (1) 1 = 1◦ , where 1◦ denotes the unit of the group (A, ◦). (2) a ◦ (b−1 c) = a(a ◦ b)−1 (a ◦ c) for all a, b, c ∈ A. (3) a ◦ (bc−1 ) = (a ◦ b)(a ◦ c)−1 a for all a, b, c ∈ A. Proof. The first claim follows from (1.1) with c = 1◦ . To prove the second claim let d = bc. Then (1.1) becomes a ◦ d = (a ◦ b)a−1 (a ◦ b−1 d) and the claim follows. The third claim is proved similarly.  Remark 1.8. Let A be a skew left brace. For each a ∈ A the map λa : A → A, b 7→ a−1 (a ◦ b), is bijective with inverse λ−1 a : A → A, b 7→ a ◦ (ab), where a is the inverse of a with respect to ◦. It follows that a ◦ b = aλa (b), ab = a ◦ λ−1 a (b) hold for all a, b ∈ A. The following proposition extends results of Rump [34] and Gateva-Ivanova into the non-commutative setting, see [17, Proposition 3.3]. Proposition 1.9. Let A be a set and assume that A has two operations such that (A, ·) and (A, ◦) are groups. Assume that λ : A → SA , a 7→ λa , is given by λa (b) = a−1 (a ◦ b). The following are equivalent: (1) A is a skew left brace. (2) λa◦b (c) = λa λb (c) for all a, b, c ∈ A. (3) λa (bc) = λa (b)λa (c) for all a, b, c ∈ A. Proof. Let us first prove that (1) =⇒ (2). Let a, b, c ∈ A. Since A is a brace and a ◦ b−1 = a(a ◦ b)−1 a by Lemma 1.7, λa λb (c) = a−1 (a ◦ λb (c)) = a−1 (a ◦ (b−1 (b ◦ c))) = a−1 (a ◦ b−1 )a−1 (a ◦ b ◦ c) = (a ◦ b)−1 (a ◦ b ◦ c) = λa◦b (c). Now we prove (2) =⇒ (3). Since ab = a ◦ λ−1 a (b) for all a, b ∈ A, −1 λa (bc) = λa (b ◦ λ−1 (a ◦ b ◦ λ−1 b (c)) = a b (c)) = a−1 (a ◦ b)(a ◦ b)−1 (a ◦ b ◦ λ−1 b (c)) −1 = λa (b)λa◦b λ−1 b (c) = λa (b)λa λb λb (c) = λa (b)λa (c). Finally we prove that (3) =⇒ (1). Let a, b, c ∈ A. Then a−1 (a ◦ (bc)) = λa (bc) = λa (b)λa (c) = a−1 (a ◦ b)a−1 (a ◦ c), and hence a ◦ (bc) = (a ◦ b)a−1 (a ◦ c).  Corollary 1.10. Let A be a skew left brace and λ : (A, ◦) → Aut(A, ·), a 7→ λa (b) = a−1 (a ◦ b). Then λ is a group homomorphism. Proof. It follows immediately from Proposition 1.9.  SKEW BRACES AND THE YANG–BAXTER EQUATION 5 Let A and G be groups and assume that G× A → A, (g, a) 7→ g ·a, is a left action of G on A by automorphisms. A bijective 1-cocyle is a bijective map π : G → A such that (1.2) π(gh) = π(g)(g · π(h)) for all g, h ∈ G. Proposition 1.11. Over any group (A, ·) the following data are equivalent: (1) A group G and a bijective 1-cocycle π : G → A. (2) A skew left brace structure over A. Proof. Consider on A a second group structure given by a ◦ b = π(π −1 (a)π −1 (b)) for all a, b ∈ A. Since π is a 1-cocycle and G acts on A by automorphisms, a ◦ (bc) = π(π −1 (a)π −1 (bc)) = a(π −1 (a) · (bc)) = a((π −1 (a) · b)(π −1 (a) · c)) = (a ◦ b)a−1 (a ◦ c) holds for all a, b, c ∈ A. Conversely, assume that A is a skew left brace. Set G = A with the multiplication (a, b) 7→ a◦ b and π = id. By Corollary 1.10, a 7→ λa , is a group homomorphism and hence G acts on A by automorphisms. Then (1.2) holds and therefore π : G → A is a bijective 1-cocycle.  Remark 1.12. The construction of Proposition 1.11 is categorical. 2. Ideals and quotients Definition 2.1. Let A be a skew left brace. A normal subgroup I of (A, ◦) is said to be an ideal of A if Ia = aI and λa (I) ⊆ I for all a ∈ A. Example 2.2. Let f : A → B be a skew brace homomorphism. Then ker f is an ideal of A since f (λa (x)) = λf (a) (f (x)) = 1 for all x ∈ ker f and a ∈ A. Lemma 2.3. Let A be a skew left brace and I ⊆ A be an ideal. Then the following properties hold: (1) I is a normal subgroup of (A, ·). (2) a ◦ I = aI for all a ∈ A. (3) I and A/I are skew braces. Proof. Let a, b ∈ I. Then a−1 b = λa (a ◦ b) ∈ I and hence I is a subgroup of (A, ·). Remark 1.8 implies aI = a ◦ I = I ◦ a = Ia for all a ∈ A. Thus I is a normal subgroup of (A, ·) and hence it follows that I is a skew left brace. Since the quotient groups A/I for both operations are the same, A/I is a skew left brace.  Definition 2.4. Let A be a skew left brace. The socle of A is Soc(A) = {a ∈ A : a ◦ b = ab, b(b ◦ a) = (b ◦ a)b for all b ∈ A}. 6 L. GUARNIERI AND L. VENDRAMIN Lemma 2.5. Let A be a skew left brace. Then Soc(A) is an ideal of A contained in the center of (A, ·). Proof. Let us first prove that Soc(A) is a subgroup of (A, ◦). Clearly 1 ∈ Soc(A). Let a, a′ ∈ A and b ∈ A. Then a ◦ a′ ∈ Soc(A) since (a ◦ a′ ) ◦ b = a ◦ (a′ ◦ b) = a ◦ (a′ b) = a(a′ b) = (aa′ )b = (a ◦ a′ )b. Now since a = a−1 ∈ Soc(A) and b = (aa−1 ) ◦ b = a ◦ (a−1 ◦ b) = a(a−1 ◦ b), it follows that ab = a−1 b = a−1 ◦ b = a ◦ b. Hence Soc(A) is a subgroup of (A, ◦). A direct calculation proves that (2.1) λb (a) = b ◦ a ◦ b for all a ∈ Soc(A) and b ∈ A. Then it follows that Soc(A) ⊆ {a ∈ A : a ◦ b = ab, λb (a) ◦ b = b ◦ a for all b ∈ A}. Let a ∈ Soc(A) and b, c ∈ A. Then λc λb (a) = λc◦b (a) = (c ◦ b) ◦ a ◦ c ◦ c = c ◦ λb (a) ◦ c, λb (a)c = b−1 (b ◦ a)c = (b ◦ a)b−1 c = b ◦ (a(b ◦ c)) = b ◦ a ◦ b ◦ c = λb (a) ◦ c. Hence λb (Soc(A)) ⊆ Soc(A) for all b ∈ A and Soc(A) is a normal subgroup of (A, ◦) by (2.1). Now we prove that Soc(A) is central in (A, ·). Let a ∈ Soc(A), b ∈ A and c = b. Since c ◦ (ba) = (c ◦ b)c−1 (c ◦ a) = c−1 (c ◦ a) = (c ◦ a)c−1 = c ◦ (ab), it follows that ba = ab.  3. Braces and the Yang–Baxter equation We turn our attention to the connection between skew left braces and settheoretic solutions of the Yang–Baxter equation. The following theorem generalizes a result of Rump to the non-commutative setting, see [12, Lemma 2]. Theorem 3.1. Let A be a skew left brace. Then (3.1) rA : A × A → A × A, −1 rA (a, b) = (λa (b), λ−1 a(a ◦ b)), λa (b) ((a ◦ b) is a non-degenerate solution of the Yang–Baxter equation. Furthermore, rA is involutive if and only if ab = ba for all a, b ∈ A. Remark 3.2. Recall from [29] that a braiding operator over a group (A, ◦) with multiplication m : (a, b) 7→ a ◦ b is a bijective map r : A × A → A × A such that (1) r(a ◦ b, c) = (id × m)r12 r23 (a, b, c) for all a, b, c ∈ A, (2) r(a, b ◦ c) = (m × id)r23 r12 (a, b, c) for all a, b, c ∈ A, (3) r(a, 1) = (1, a) and r(1, a) = (a, 1) for all a ∈ A, and (4) mr(a, b) = a ◦ b for all a, b ∈ A. Braiding operators are equivalent to bijective 1-cocycles by [29, Theorem 2], and bijective 1-cocycles are equivalent to skew left braces by Proposition 1.11. One can prove that (3.1) is the braiding operator corresponding to the skew left brace A under this equivalence. Proof of Theorem 3.1. Every braiding operator is a non-degenerate solution of the Yang–Baxter equation by [29, Corollary 3]. Thus it is enough to prove that rA is a braiding operator on (A, ◦). Set r = rA . Since λa−1 (b) = a ◦ (ab) for all a, b ∈ A, λλ−1 ((a ◦ b)−1 a(a ◦ b)) = λa (b) ◦ (λa (b)(a ◦ b)−1 a(a ◦ b)) = λa (b) ◦ (a ◦ b) a (b) SKEW BRACES AND THE YANG–BAXTER EQUATION 7 holds for all a, b ∈ A. Thus mr(a, b) = a ◦ b for all a, b ∈ A. Clearly r(a, 1) = (1, a) and r(1, a) = (a, 1) for all a ∈ A. Let a, b, c ∈ A. By Corollary 1.10 one obtains (id × m)r12 r23 (a, b, c) = (id × m)r12 (a, λb (c), λb (c) ◦ b ◦ c) = (id × m)(λa λb (c), λa λb (c) ◦ a ◦ λb (c), λb (c) ◦ b ◦ c) = (λa λb (c), λa λb (c) ◦ a ◦ b ◦ c) = r(a ◦ b, c). From Remark 1.8 and Proposition 1.9 one obtains that λa (b ◦ c) = λa (b)λa◦b (c) holds for all a, b, c ∈ A. From this formula one deduces that λa (b) ◦ λλa (b)◦a◦b (c) = λa (b) ◦ λ−1 λa (b) λa λb (c) = λa (b)λa◦b (c) = λa (b ◦ c). holds for all a, b, c ∈ A. Then (m × id)r23 r12 (a, b, c) = (m × id)r23 (λa (b), λa (b) ◦ a ◦ b, c) = (m × id)(λa (b), λλa (b)◦a◦b (c), λλa (b)◦a◦b ◦ λa (b) ◦ a ◦ b ◦ c) = (λa (b) ◦ λλa (b)◦a◦b (c), λλa (b)◦a◦b ◦ λa (b) ◦ a ◦ b ◦ c) = (λa (b ◦ c), λa (b ◦ c) ◦ a ◦ b ◦ c) = r(a, b ◦ c). for all a, b, c ∈ A.  Corollary 3.3. Let A be a skew left brace and X ⊆ A be a subset of A. Assume bλa (x)b−1 ∈ X for all x ∈ X and a, b ∈ A. Then rA |X×X is a non-degenerate solution of the Yang–Baxter equation. Proof. Clearly λa (x) ∈ X and bxb−1 ∈ X for all a, b ∈ A and x ∈ X. Then it −1 follows that λ−1 x(x ◦ y)) ∈ X for all x, y ∈ X. Now Theorem 3.1 λx (y) ((x ◦ y) implies the claim.  Example 3.4. Let A and B be groups and α : A → Aut(B) be a group homomorphism. The skew left brace of Example 1.4 yields the following solution: r : (A × B) × (A × B) → (A × B) × (A × B), −1 r((a1 , b1 )(a2 , b2 )) = ((a2 , αa1 (b2 )), (a−1 2 a1 a2 , b2 αa−1 (b1 αa1 (b2 )))). 2 Example 3.5. Let A be an abelian group, B be a group and α : A → Aut(B) be a group homomorphism. The skew left brace of Example 1.5 yields the following solution: r : (A × B) × (A × B) → (A × B) × (A × B), r((a1 , b1 )(a2 , b2 )) = ((a2 , αa−1 (b2 )), (a1 , αa−1 (b−1 2 )b1 b2 )). 1 1 Example 3.6. Let A be the skew left brace constructed in Example 1.6. The solution of Theorem 3.1 is similar to the solution constructed by Weinstein and Xu in terms of factorizable Poisson groups [41, Theorem 9.2]. The latter is τ rA τ , where rA is the solution of Theorem 3.1 and τ (x, y) = (y, x) for all x, y. Based on [29], for each skew left brace A we relate the solution r given by Theorem 3.1 to the so-called Venkov solution, i.e. s(a, b) = (b, b−1 ab), a, b ∈ A. 8 L. GUARNIERI AND L. VENDRAMIN Proposition 3.7. Let A be a skew left brace. For each n ∈ N the map Tn given by Tn (a1 , . . . , an−1 , an ) = (a1 , λa1 (a2 ), λa1 ◦a2 (a3 ), . . . , λa1 ◦···◦an−1 (an )) is invertible and satisfies (3.2) Tn ri,i+1 = si,i+1 Tn for all n ≥ 2 and i ∈ {1, . . . , n− 1}, where ri,i+1 and si,i+1 denote the actions of the braid group Bn on An = A × · · · × A (n-times) induced from r and s respectively. Proof. A direct calculation shows that Tn is invertible with inverse −1 −1 Tn−1 (a1 , . . . , an ) = (a1 , λ−1 a1 (a2 ), λa1 a2 (a3 ), . . . , λa1 ...an−1 (an )). To prove (3.2) we proceed by induction on n. The case n = 2 follows from a direct calculation since −1 T2 r12 (a, b) = T2 (λa (b), λ−1 a(a ◦ b))) = (λa (b), (a ◦ b)−1 a(a ◦ b)), λa (b) ((a ◦ b) = (λa (b), λa (b)−1 aλa (b)) = s12 (a, λa (b)) = s12 T2 (a, b) holds for all a, b ∈ A. So assume that the claim holds for n−1. Since Tn r1,2 = s1,2 Tn is the same as T2 r = sT2 , we need to prove (3.2) for all i ∈ {2, . . . , n − 1}. Write Tn = Un (id × Tn−1 ), where Un (a1 , . . . , an−1 , an ) = (a1 , λa1 (a2 ), . . . , λa1 (an−1 ), λa1 (an )). Since each λa is an automorphism of (A, ·), it follows that Un si,i+1 = si,i+1 Un for i ≥ 2 and hence (3.2) holds for all i ≥ 2.  Remark 3.8. Proposition 3.7 also follows from [28, Proposition 6.2]. The map Tn is the so-called guitar map, see for example [28, §6]. The universal construction of Lu, Yan and Zhu, given in [29, Theorem 9] can be restated in the language of skew left braces. This was done by Rump in the case of involutive solutions, see [34]. Recall that the enveloping (or structure) group of a solution (X, r) is the group G(X, r) generated by the elements of X with relations x ◦ y = σx (y) ◦ τy (x), x, y ∈ X. Let ι : X → G(X, r) be the canonical map. Theorem 3.9. Let X be a set, r : X × X → X × X, r(x, y) = (σx (y), τy (x)) be a non-degenerate solution of the Yang–Baxter equation. Then there exists a unique skew left brace structure over G(X, r) such that its associated solution rG satisfies rG (ι × ι) = (ι × ι)r. Furthermore, if B is a skew left brace and f : X → B is a map such that (f × f )r = rB (f × f ), then there exists a unique group homomorphism φ : G(X, r) → B such that f = φι and (φ × φ)rG = rB (φ × φ). Proof. The claim follows from the universal construction of [29, Theorem 9] and the equivalence between braiding operators and skew braces, see Remark 3.2.  The following corollary is essentially [38, Theorem 2.6]. Corollary 3.10. Let (X, r) be a finite non-degenerate solution of the Yang–Baxter equation. Then G(X, r)/Soc(G(X, r)) is a finite skew left brace. SKEW BRACES AND THE YANG–BAXTER EQUATION Proof. It follows from Theorem 3.9 and Lemma 2.5. 9  4. Constructing skew braces Let A be a group. The holomorph of A is the group Hol(A) = Aut(A)⋉ A, where the product is given by (f, a)(g, b) = (f g, af (b)) for all a, b ∈ A and f, g ∈ Aut(A). Any subgroup H of Hol(A) acts on A (4.1) (f, x) · a = π2 ((f, x)(id, a)) = xf (a), a, x ∈ A, f ∈ Aut(A), where π2 : Hol(A) → A, (f, a) 7→ a. In particular Hol(A) acts transitively on A and the stabilizer of any a ∈ A is isomorphic to Aut(A). Recall that a subgroup H of Hol(A) is regular if for each a ∈ A there exists a unique (f, x) ∈ H such that xf (a) = 1. The following result is well-known. Lemma 4.1. Let A be a group and H be a regular subgroup of Hol(A). Then π2 |H : H → A, (f, a) 7→ a, is bijective. Proof. We first prove that π2 |H is injective. Let (f, a), (g, b) ∈ H be such that π2 (f, a) = π2 (g, b). Then a = b. Since H is a subgroup, (f, a)−1 = (f −1 , f −1 (a−1 )) ∈ H, (g, a)−1 = (g −1 , g −1 (a−1 )) ∈ H, and hence f = g since f −1 (a)f −1 (a−1 ) = g −1 (a)g −1 (a−1 ) = 1 and H is a regular subgroup. Now we prove that π2 |H is surjective. Let a ∈ A. The regularlity of H implies the existence of an automorphism f ∈ Aut(A) such that (f, f (a−1 )) ∈ H. Then (f −1 , a) ∈ H and the claim follows.  The following theorem goes back to Bachiller [2]. The proof in our case is the same as for braces. It is a generalization of a result of Catino and Rizzo [9]. Theorem 4.2. Let A be skew left brace. Then {(λa , a) : a ∈ A} is a regular subgroup of Hol(A, ·). Conversely, if (A, ·) is a group and H is a regular subgroup of Hol(A, ·), then A is a skew left brace with (A, ◦) ≃ H, where a ◦ b = af (b) −1 and (π2 |H ) (a) = (f, a) ∈ H. Proof. Since λ is a group homomorphism and aλa (b) = a ◦ b for all a, b ∈ A, it follows that {(λa , a) : a ∈ A} is a subgroup of Hol(A, ·). Since (A, ◦) is a group, the regularlity also follows. Assume now that H is a regular subgroup. By Lemma 4.1, π2 |H is bijective. Use the bijection π2 |H to transport the product of H into A:  a ◦ b = π2 |H (π2 |H )−1 (a)(π2 |H )−1 (b) = af (b), where a, b ∈ A and (π2 |H )−1 (a) = (f, a) ∈ H. Then (A, ◦) is a group and A is a skew left brace since a ◦ (bc) = af (bc) = af (b)f (c) = af (b)a−1 af (c) = (a ◦ b)a−1 (a ◦ c) holds for all a, b, c ∈ A.  10 L. GUARNIERI AND L. VENDRAMIN Proposition 4.3. Let A be a group. There exists a bijective correspondence between skew left brace structures over A and regular subgroups of Hol(A). Moreover, isomorphic skew braces structures over A correspond to conjugate subgroups of Hol(A) by elements of Aut(A). Proof. Assume that the group A has two skew left brace structures given by (a, b) 7→ a ◦ b and (a, b) 7→ a × b and that φ ∈ Aut(A, ·) satisfies φ(a ◦ b) = φ(a) × φ(b) for all a, b ∈ A. We claim that {(λa , a) : a ∈ A} and {(µa , a) : a ∈ A}, where λa (b) = a−1 (a ◦ b) and µa (b) = a−1 (a × b), are conjugate by φ. Since φλa φ−1 (b) = φ(a−1 (a ◦ φ−1 (b)) = φ(a)−1 (φ(a) × b) = µφ(a) (b), one obtains that φ(λa , a)φ−1 = (µφ(a) , φ(a)) and hence the claim follows. Conversely, let H and K be regular subgroups of Hol(A) and asssume that there exists φ ∈ Aut(A, ·) such that φ−1 Hφ = K. Let (f, a) = (π2 |H )−1 (a) ∈ H, (g, a) = (π2 |K )−1 (a) ∈ K and write a ◦ b = af (b) and a × b = ag(b). Since φ(f, a)φ−1 = (φf φ−1 , φ(a)) ∈ K, it follows that (π2 |K )−1 (φ(a)) = (φf φ−1 , φ(a)). Then, since φ ∈ Aut(A, ·), φ(a) × φ(b) = φ(a)(φf φ−1 )(φ(b)) = φ(a)φ(f (b)) = φ(af (b)) = φ(a ◦ b) and hence the skew left braces corresponding to H and K are isomorphic.  5. Computational results We first present the algorithm used to enumerate skew left brace structures over a given group A. The algorithm uses Theorem 4.2. Algorithm 5.1. Let A be a finite group. To construct all skew left brace structures over A we proceed as follows: (1) Compute the holomorph Hol(A) of A. (2) Compute the list of regular subgroups of Hol(A) of order |A| up to conjugation by elements of Aut(A). (3) For each representative H of regular subgroups of Hol(A) construct the map p : A → H given by a 7→ (f, f (a)−1 ), where (f, f (a)−1 ) ∈ H. The triple (H, A, p : A → H) yields a skew left brace structure over A with multiplication given by a ◦ b = p−1 (p(a)p(b)) for all a, b ∈ A. Remark 5.2. To enumerate all skew left brace structures over A the third step of Algorithm 5.1 is not needed. Remark 5.3. Recall that a left brace is an abelian group (A, +) with another group structure, defined via the multiplication (a, b) 7→ ab such that a(b + c) + a = ab + ac holds for all a, b, c ∈ A. Left braces with additive group isomorphic to a given group A can be constructed applying Algorithm 5.1 to the abelian group A. In the second step of Algorithm 5.1 it is enough to compute the list of regular solvable subgroups of Hol(A), since the multiplicative group of a left brace is solvable by [15, Proposition 2.5]. Algorithm 5.1 was implemented both in GAP and Magma with different performances and were run on a Intel(R) Core(TM) i5-4440 CPU @3.10GHz with 16gb of RAM, under Linux. SKEW BRACES AND THE YANG–BAXTER EQUATION 11 5.1. Skew left braces. For n ∈ N let c(n) be the number of non-isomorphic skew left braces of size n. The number of skew left braces of size n ≤ 30 has been determined using Algorithm 5.1. Table 5.1 shows some values of c(n). The calculation took about twenty minutes. Table 5.1. The number of non-isomorphic skew left braces. n 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 c(n) 1 1 1 4 1 6 1 47 4 6 1 38 1 6 1 n 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 c(n) 1605 1 49 1 43 8 6 1 855 4 6 101 29 1 36 5.2. Left braces. For n ∈ N let b(n) be the number of non-isomorphic left braces of size n. The number of left braces (up to isomorphism) of size n ≤ 120 has been determined using Algorithm 5.1. Table 5.3 shows some values of b(n) and Table 5.2 gives runtimes for our Magma implementation for some examples. The construction of left braces requires considerably more CPU time, see Table 5.4 for some examples. Table 5.2. Some runtimes for enumerating left braces of size n. n CPU time b(n) 16 1 hour 357 48 18 hours 1708 54 5 minutes 80 72 1 hour 489 80 17 hours 1985 100 15 secs 51 108 28 hours 494 112 12 hours 1671 With current computational resources, we were not able to compute the number of non-isomorphic left braces of orders 32, 64, 81 and 96. 5.3. Two-sided left braces (radical rings). Recall that a brace B is a two-sided brace if (a + b)c + c = ac + bc holds for all a, b, c ∈ B. Two-sided braces are in bijective correspondence with radical rings [33]. Recall that a non-zero radical ring is a ring R without identity such that for each x ∈ R there is y ∈ R such that x + y + xy = 0. Assume that R is a radical ring. Then the circle operation, a ◦ b = ab + a + b, a, b ∈ R, makes (R, +, ◦) into a two-sided brace. Conversely, if A is a two-sided brace, the operation a ∗ b = ab − a − b, a, b ∈ A makes (A, +, ∗), into a radical ring. To test whether a left brace is a two-sided brace one has the following lemma of Gateva-Ivanova, see [17, Corollary 3.5]. Lemma 5.4 (Gateva-Ivanova). Let A be a left brace. Then A is a two-sided brace if and only if −1 bcλabc (c) = cλ−1 ac (λa (b)c) 12 L. GUARNIERI AND L. VENDRAMIN Table 5.3. The number of non-isomorphic left braces. n 1 2 3 4 5 6 7 8 9 10 11 12 b(n) 1 1 1 4 1 2 1 27 4 2 1 10 n 13 14 15 16 17 18 19 20 21 22 23 24 b(n) 1 2 1 357 1 8 1 11 2 2 1 96 n 25 26 27 28 29 30 31 32 33 34 35 36 b(n) 4 2 37 9 1 4 1 ? 1 2 1 46 n 37 38 39 40 41 42 43 44 45 46 47 48 b(n) 1 2 2 106 1 6 1 9 4 2 1 1708 n 49 50 51 52 53 54 55 56 57 58 59 60 b(n) 4 8 1 11 1 80 2 91 2 2 1 28 n 61 62 63 64 65 66 67 68 69 70 71 72 b(n) 1 2 11 ? 1 4 1 11 1 4 1 489 n 73 74 75 76 77 78 79 80 81 82 83 84 b(n) 1 2 5 9 1 6 1 1985 ? 2 1 34 n 85 86 87 88 89 90 91 92 93 94 95 96 b(n) 1 2 1 90 1 16 1 9 2 2 1 ? n 97 98 99 100 101 102 103 104 105 106 107 108 b(n) 1 8 4 51 1 4 1 106 2 2 1 494 n 109 110 111 112 113 114 115 116 117 118 119 120 b(n) 1 6 2 1671 1 6 1 11 11 2 1 395 Table 5.4. Some runtimes for constructing left braces of size n. n CPU time b(n) 16 3 hours 357 54 40 minutes 80 72 24 hours 489 112 5 days 1671 for all a, b, c ∈ A. For n ∈ N let t(n) be the number of non-isomorphic two-sided braces of size n. Using the database of left braces constructed with Algorithm 5.1 and Lemma 5.4 one computes t(n). Table 5.5 shows the value of t(n) for n ≤ 24. Table 5.5. The number of non-isomorphic two-sided braces. n 1 2 3 4 5 6 7 8 9 10 11 12 t(n) 1 1 1 4 1 1 1 22 4 1 1 4 n 13 14 15 16 17 18 19 20 21 22 23 24 t(n) 1 1 1 221 1 4 1 4 1 1 1 22 Remark 5.5. For information on square-free two-sided braces, see [12]. These braces are defined by nilpotent groups of class ≤ 2. SKEW BRACES AND THE YANG–BAXTER EQUATION 13 6. Further questions In this section we collect some questions and conjectures that appear naturally after inspecting Table 5.3. 6.1. Left braces. We first collect some problems and conjectures related to the number of left braces. Problem 6.1. Compute b(32), b(64), b(81) and b(96). Table 5.3 suggests the following conjectures. Conjecture 6.2. Let p > 3 be a prime number. Then ( 11 if m ≡ 1 mod 4, b(4p) = 9 if m ≡ 3 mod 4. Conjecture 6.3. Let p > 3 be a prime. Then   14 if p ≡ 1 mod 9, b(9p) = 4 if p ≡ 2, 5 mod 9,   11 if p ≡ 4, 7 mod 9. Conjecture 6.4. Let p, q be prime numbers such that p < q and q 6≡ 1 mod p. Then b(p2 q) = 4. We have used [7] and computer calculations to show that Conjectures 6.2 and 6.3 are true up to p = 997. In [37], Agata Smoktunowicz proved that Conjecture 6.4 is true. 6.2. Quaternionic braces. We now consider an important family of braces. Recall that for m ∈ N the generalized quaternion group is the group Q4m = ha, b : am = b2 , a2m = 1, b−1 ab = a−1 i. Definition 6.5. A brace is a quaternion brace if its multiplicative group is isomorphic to some quaternion group. Conjecture 6.6. For m ∈ N let q(4m) be the number of isomorphism classes of quaternion braces of size 4m. Then for m > 2  2 if m is odd,    7 if m ≡ 0 mod 8, q(4m) =  9 if m ≡ 4 mod 8,    6 if m ≡ 2 mod 8 or m ≡ 6 mod 8. We have checked Conjecture 6.6 for all m ≤ 512. It seems natural to ask the following questions. Question 6.7. Which finite abelian groups appear as the additive group of a quaternion brace? For m ∈ {2, . . . , 512} the additive group of a quaternion brace of size m is isomorphic to one of the following groups: Z4m , Z2m × Z2 , Zm × Z2 × Z2 , Zm × Z4 , Zm/2 × Z2 × Z2 × Z2 . By inspection, one sees that the groups Zm ×Z22 appear whenever m ≡ 2, 4, 6 mod 8 and the groups Zm × Z4 and Zm/2 × Z32 appear whenever m ≡ 4 mod 8. 14 L. GUARNIERI AND L. VENDRAMIN Question 6.8. For m > 2 let A be a finite abelian group size 4m. Compute the number of isomorphism classes of quaternion braces of size 4m with additive group isomorphic to A. In [3, §5] quaternion braces of size 2k are mentioned as an important class of braces which could be useful to classify a certain family of involutive non-degenerate solutions of the Yang–Baxter equation. Conjecture 6.6 implies the following: Conjecture 6.9. There are seven classes of isomorphism of quaternion braces of size 2k for k > 4. Conjecture 6.9 was verified for all k ∈ {5, 6, 7, 8, 9}. Table 6.1 sums up our findings related to this important subclass of braces. Table 6.1. Number of braces with multiplicative group isomorphic to the quaternion group Q2k with k > 4. Additive Group Number of Braces Z2k 1 Z2k−1 × Z2 6 Remark 6.10. The classification of left braces over cyclic groups was done by Rump in [35]. He proved that if a left brace A has additive group isomorphic to Z/pk , where p > 2 is a prime number, then (A, ·) ≃ Z/pk . According to [3], the converse holds for all p. In [1], Bachiller classified left braces of size p2 and p3 , where p is a prime number. The techniques used in these papers might prove useful to address the questions, problems and conjectures in this section. Acknowledgements We thank Leandro del Pezzo for the computer where some calculations were performed, David Bachiller for his suggestions, and Victoria Lebed for several useful comments and corrections. We also thank the referees for their careful review of our manuscript and valuable suggestions. References [1] D. Bachiller. Classification of braces of order p3 . J. Pure Appl. Algebra, 219(8):3568–3603, 2015. [2] D. Bachiller. Counterexample to a conjecture about braces. J. Algebra, 453:160–176, 2016. [3] D. Bachiller, F. Cedo, and E. Jespers. Solutions of the Yang-Baxter equation associated with a left brace. arXiv:1503.02814. [4] R. J. Baxter. Partition function of the eight-vertex lattice model. Ann. Physics, 70:193–228, 1972. [5] R. J. Baxter. Exactly solved models in statistical mechanics. Academic Press, Inc. [Harcourt Brace Jovanovich, Publishers], London, 1989. Reprint of the 1982 original. [6] N. Ben David and Y. Ginosar. On groups of central type, non-degenerate and bijective cohomology classes. Israel J. Math., 172:317–335, 2009. [7] H. U. Besche, B. Eick, and E. A. O’Brien. A millennium project: constructing small groups. Internat. J. Algebra Comput., 12(5):623–644, 2002. [8] W. Bosma, J. Cannon, and C. Playoust. The Magma algebra system. I. The user language. J. Symbolic Comput., 24(3-4):235–265, 1997. Computational algebra and number theory (London, 1993). SKEW BRACES AND THE YANG–BAXTER EQUATION 15 [9] F. Catino and R. Rizzo. Regular subgroups of the affine group and radical circle algebras. Bull. Aust. Math. Soc., 79(1):103–107, 2009. [10] F. Cedó, E. Jespers, and Á. del Rı́o. Involutive Yang-Baxter groups. Trans. Amer. Math. Soc., 362(5):2541–2558, 2010. [11] F. Cedó, E. Jespers, and J. Okniński. Retractability of set theoretic solutions of the YangBaxter equation. Adv. Math., 224(6):2472–2484, 2010. [12] F. Cedó, E. Jespers, and J. Okniński. Braces and the Yang-Baxter equation. Comm. Math. Phys., 327(1):101–116, 2014. [13] P. Dehornoy. Set-theoretic solutions of the Yang–Baxter equation, RC-calculus, and Garside germs. Adv. Math., 282:93–127, 2015. [14] V. G. Drinfel′ d. On some unsolved problems in quantum group theory. In Quantum groups (Leningrad, 1990), volume 1510 of Lecture Notes in Math., pages 1–8. Springer, Berlin, 1992. [15] P. Etingof, T. Schedler, and A. Soloviev. Set-theoretical solutions to the quantum YangBaxter equation. Duke Math. J., 100(2):169–209, 1999. [16] The GAP Group. GAP – Groups, Algorithms, and Programming, Version 4.7.8, 2015. [17] T. Gateva-Ivanova. Set-theoretic solutions of the Yang-Baxter equation, Braces, and Symmetric groups. arXiv:1507.02602. [18] T. Gateva-Ivanova. A combinatorial approach to the set-theoretic solutions of the YangBaxter equation. J. Math. Phys., 45(10):3828–3858, 2004. [19] T. Gateva-Ivanova. Quadratic algebras, Yang-Baxter equation, and Artin-Schelter regularity. Adv. Math., 230(4-6):2152–2175, 2012. [20] T. Gateva-Ivanova and P. Cameron. Multipermutation solutions of the Yang-Baxter equation. Comm. Math. Phys., 309(3):583–621, 2012. [21] T. Gateva-Ivanova and S. Majid. Set-theoretic solutions of the Yang-Baxter equation, graphs and computations. J. Symbolic Comput., 42(11-12):1079–1112, 2007. [22] T. Gateva-Ivanova and S. Majid. Matched pairs approach to set theoretic solutions of the Yang-Baxter equation. J. Algebra, 319(4):1462–1529, 2008. [23] T. Gateva-Ivanova and S. Majid. Quantum spaces associated to multipermutation solutions of level two. Algebr. Represent. Theory, 14(2):341–376, 2011. [24] T. Gateva-Ivanova and M. Van den Bergh. Semigroups of I-type. J. Algebra, 206(1):97–112, 1998. [25] E. Jespers and J. Okniński. Monoids and groups of I-type. Algebr. Represent. Theory, 8(5):709–729, 2005. [26] E. Jespers and J. Okniński. Noetherian semigroup algebras, volume 7 of Algebras and Applications. Springer, Dordrecht, 2007. [27] C. Kassel. Quantum groups, volume 155 of Graduate Texts in Mathematics. Springer-Verlag, New York, 1995. [28] V. Lebed and L. Vendramin. Homology of left non-degenerate set-theoretic solutions to the yang-baxter equation. arXiv:1509.07067. [29] J.-H. Lu, M. Yan, and Y.-C. Zhu. On the set-theoretical Yang-Baxter equation. Duke Math. J., 104(1):1–18, 2000. [30] S. Majid. Foundations of quantum group theory. Cambridge University Press, Cambridge, 1995. [31] S. Nelson. The combinatorial revolution in knot theory. Notices Amer. Math. Soc., 58(11):1553–1561, 2011. [32] W. Rump. A decomposition theorem for square-free unitary solutions of the quantum YangBaxter equation. Adv. Math., 193(1):40–55, 2005. [33] W. Rump. Modules over braces. Algebra Discrete Math., (2):127–137, 2006. [34] W. Rump. Braces, radical rings, and the quantum Yang-Baxter equation. J. Algebra, 307(1):153–170, 2007. [35] W. Rump. Classification of cyclic braces. J. Pure Appl. Algebra, 209(3):671–685, 2007. [36] W. Rump. The brace of a classical group. Note Mat., 34(1):115–144, 2014. [37] A. Smoktunowicz. A note on set-theoretic solutions of the Yang-Baxter equation. arXiv:1512.95542. [38] A. Soloviev. Non-unitary set-theoretical solutions to the quantum Yang-Baxter equation. Math. Res. Lett., 7(5-6):577–596, 2000. 16 L. GUARNIERI AND L. VENDRAMIN [39] M. Takeuchi. Survey on matched pairs of groups—an elementary approach to the ESS-LYZ theory. In Noncommutative geometry and quantum groups (Warsaw, 2001), volume 61 of Banach Center Publ., pages 305–331. Polish Acad. Sci., Warsaw, 2003. [40] L. Vendramin. Extensions of set-theoretic solutions of the Yang–Baxter equation and a conjecture of Gateva-Ivanova. J. Pure Appl. Algebra, 220(5):2064–2076, 2016. [41] A. Weinstein and P. Xu. Classical solutions of the quantum Yang-Baxter equation. Comm. Math. Phys., 148(2):309–343, 1992. [42] C. N. Yang. Some exact results for the many-body problem in one dimension with repulsive delta-function interaction. Phys. Rev. Lett., 19:1312–1315, 1967. Departamento de Matemática – FCEN, Universidad de Buenos Aires, Pab. I – Ciudad Universitaria (1428) Buenos Aires – Argentina E-mail address: [email protected] E-mail address: [email protected]
4math.GR
Hypothesis Testing for High-Dimensional Multinomials: A Selective Review Sivaraman Balakrishnan† Larry Wasserman† arXiv:1712.06120v1 [stat.ML] 17 Dec 2017 Department of Statistics† Carnegie Mellon University, Pittsburgh, PA 15213. {siva,larry}@stat.cmu.edu In memory of Stephen E. Fienberg. December 19, 2017 Abstract The statistical analysis of discrete data has been the subject of extensive statistical research dating back to the work of Pearson. In this survey we review some recently developed methods for testing hypotheses about high-dimensional multinomials. Traditional tests like the χ2 -test and the likelihood ratio test can have poor power in the high-dimensional setting. Much of the research in this area has focused on finding tests with asymptotically Normal limits and developing (stringent) conditions under which tests have Normal limits. We argue that this perspective suffers from a significant deficiency: it can exclude many high-dimensional cases when — despite having non-Normal null distributions — carefully designed tests can have high power. Finally, we illustrate that taking a minimax perspective and considering refinements of this perspective can lead naturally to powerful and practical tests. 1 Introduction Steve Fienberg was a pioneer in the development of theory and methods for discrete data. His textbook (Bishop et al. (1995)) remains one of the main references for the topic. Our focus in this review is on high-dimensional multinomial models where the number of categories d can grow with, and possibly exceed the sample-size n. Steve’s paper (Fienberg and Holland (1973)), written with with Paul Holland, was one of the first to consider multinomial data in the high-dimensional case. In Fienberg (1976), Steve provided strong motivation for considering the high-dimensional setting: “The fact remains . . . that with the extensive questionnaires of modern-day sample-surveys, and the detailed and painstaking inventory of variables measured by biological and socialscientists, the statistician is often faced with large sparse arrays full of 0’s and 1’s, in need of careful analysis”. In this review we focus on hypothesis testing for high-dimensional multinomials. In the context of hypothesis testing, several works (see for instance Read and Cressie (1988); Holst (1972) and references therein) have considered the high-dimensional setting. Hoeffding (1965) (building on an unpublished result of Stein) showed that for testing goodness-of-fit, in sharp contrast to the fixed-d setting, in the high-dimensional setting the likelihood ratio test can be dominated by the χ2 test. In traditional asymptotic testing theory, the power of tests are 1 often investigated at local alternatives which approach the null as the sample-size grows. In the high-dimensional setting, considering local alternatives, Ivchenko and Medvedev (1978) showed that neither the χ2 or the likelihood ratio test are uniformly optimal. These results show some of the difficulties of using classical theory to identify optimal tests in the highdimensional regime. Morris (1975) studied the limiting distribution of a wide-range of multinomial test statistics and gave relatively stringent conditions under which these statistics have asymptotically Normal limiting distributions. In general, as we illustrate in our simulations, carefully designed tests can have high power under much weaker conditions, even when the null distribution of the test statistics are not Gaussian or χ2 . In many cases, understanding the limiting distribution of the test statistic under the null is important to properly set the test threshold, and indeed this often leads to practical tests. However, in several problems of interest, including goodness-of-fit, two-sample testing and independence testing we can determine practical (nonconservative) thresholds by simulation. In the high-dimensional setting, rather than rely on asymptotic theory and local alternatives, we advocate for using the minimax perspective and developing refinements of this perspective to identify and study optimal tests. Such a minimax perspective has been recently developed in a series of works in different fields including statistics, information theory and theoretical computer science and we provide an overview of some important results from these different communities in this paper. 2 Background Suppose that we have data of the form Z1 , . . . , Zn ∼ P where P is a d-dimensional multinomial and Zi ∈ {1, . . . , d}. We denote the probability mass function for P by p ∈ Rd . The set of all multinomials is then denoted by   X M = p = (p(1), . . . , p(d)) : p(j) ≥ 0, for all j, p(j) = 1 . (1) j We are interested in the case where d can be large, possibly much larger than n. In this paper, we focus on two hypothesis testing problems, and defer a discussion of other testing problems to Section 6. The problems we consider are: 1. Goodness-of-fit testing: In its most basic form, in goodness-of-fit testing we are interested in testing the fit of the data to a fixed distribution P0 . Concretely, we are interested in distinguishing the hypotheses: H0 : P = P0 versus H1 : P 6= P0 . 2. Two-sample testing: In two-sample testing we observe Z1 , . . . , Zn1 ∼ P, W1 , . . . , Wn2 ∼ Q. In this case, the hypotheses of interest are H0 : P = Q versus H1 : P 6= Q. Notation: Throughout this paper, we write an  bn if both an /bn is bounded away from 0 and ∞ for all large n. 2 2.1 Why Hypothesis Testing? As with any statistical problem, there are many inferential tasks related to multinomial models: estimation, constructing confidence sets, Bayesian inference, prediction and hypothesis testing, among others. Our focus on testing in this paper is not meant to downplay the importance of these other tasks. Indeed, many would argue that hypothesis testing has received too much attention: over-reliance on hypothesis testing is sometimes cited as one of the causes of the reproducibility crisis. However, there is a good reason for studying hypothesis testing. When trying to understand the theoretical behavior of statistical problems in difficult cases — such as in high dimensional models — hypothesis testing provides a very clean, precise framework. Hypothesis testing is a good starting point for theoretical investigations into difficult statistical models. As an example, in Section 3.2 we will see that the power of goodness-of-fit tests can vary drastically depending on where the null sits in the simplex, a phenomenon that we refer to as local minimaxity. This local minimax phenomenon is very clear and easy to precisely capture in the hypothesis testing framework. 2.2 Minimax and Local Minimax Testing In traditional asymptotic testing theory, local measures of performance are often used to assess the performance of various hypothesis tests. In the local approach, one typically examines √ the power at a sequence of alternatives at θ0 + C/ n where θ0 denotes the null value of the parameter. The local approach is well-suited to well-behaved, low dimensional models. It permits very precise power comparisons for distributions which are close to the null hypothesis. Generally, the tools for local analysis are tied to ideas like contiguity and asymptotic Normality and in the high dimensional setting these tools often break down. Furthermore, as we discussed earlier, results of Ivchenko and Medvedev (1978) suggest that the local perspective does not provide a clear overall picture in the high-dimensional case. For these reasons, we will use the minimax perspective. For goodness-of-fit testing, we can refine the minimax perspective to obtain results that also have a local nature, but in a very different sense than the local results described above. Formally, a test is a map from the samples to {0, 1}. We let Φn denote all level α tests, i.e. φ ∈ Φn if φ(Z1 , . . . , Zn ) ∈ {0, 1} and sup P n (φ = 1) ≤ α, P ∈P0 where P0 denotes the (possibly composite) collection of possible null distributions. Let n o M = p : d(P0 , p) ≥  where P0 is the set of null distributions, d(P0 , p) = inf q∈P0 d(q, p) and d(p, q) is some distance. The maximum type II error of a test φ ∈ Φn is Rn, (φ, P0 ) = sup P n (φ = 0). P ∈M The minimax risk is † Rn, (P0 ) = inf Rn, (φ, P0 ). φ∈Φn † A test φ ∈ Φn is minimax optimal if Rn, (φ) = Rn, (P0 ). It is common to study the minimax risk via a coarse lens by studying instead the minimax separation, also called the critical radius. 3 The minimax separation n is defined by n o † n (P0 ) = inf  : Rn, (P0 ) ≤ 1/2 which is the smallest  such that the power is non-trivial. The choice of 1/2 is not important and any sufficiently small, non-zero number will suffice. We need to choose a distance d. We will focus on the total variation (TV) distance defined by TV(P, Q) = max |P (A) − Q(A)| A where the maximum is over all events A. The reason we use total variation distance is because it has a clear probabilistic meaning and is invariant to natural transformations (Devroye and Gyorfi, 1985): if TV(P, Q) =  then |P (A) − Q(A)| ≤  for every event A. The total variation distance is equivalent to the L1 distance: TV(P, Q) = 1X 1 |p(j) − q(j)| ≡ kp − qk1 2 2 j where p and q are the probability functions corresponding to the distributions P and Q. Other distances, such as L2 , Hellinger and Kullback-Leibler can be used too, but in some cases can be less interpretable and in other cases lead to trivial minimax rates. We revisit the choice of metric in Section 3.4. Typically we characterize the minimax separation by providing upper and lower bounds on it: upper bounds are obtained by analyzing the minimax separation for practical tests, while lower bounds are often obtained via an analysis of the likelihood ratio test for carefully constructed pairs of hypotheses (see for instance the pioneering work of Ingster and co-authors Ingster and Suslina (2003); Ingster (1997)). The Local Minimax Separation: Focusing on the problem of goodness-of-fit testing with a simple null, we observe that the minimax separation n (p0 ) is a function of the null distribution. Classical work in hypothesis testing Ingster and Suslina (2003); Ingster (1997) has focused on characterizing the global minimax separation, i.e. in understanding the quantity: n o † n = inf  : sup Rn, (p0 ) ≤ 1/2 , (2) p0 ∈M where M is defined in (1). In typical non-parametric problems, the local minimax risk and the global minimax risk match up to constants and this has led researchers in past work to focus on the global minimax risk. Recent work by Valiant and Valiant (2017) showed that for goodness-of-fit testing in the TV metric for high-dimensional multinomials, the critical radius can vary considerably as a function of the null distribution p0 . In this case, the local minimax separation, i.e. n (p0 ) provides a much more refined notion of the difficulty of the goodness-of-fit problem. Valiant and Valiant (2017) further provided a locally minimax test, i.e. a test that is nearly-optimal for every possible null distribution. Developing refinements to the minimax framework in problems beyond goodness-of-fit testing is an active area of research. For the problem of two-sample testing for multinomials, a recent proposal appears in the work of Acharya et al. (2012). Other works developing a local perspective in testing and estimation include Donoho and Johnstone (1994); Goldenshluger and Lepski (2011); Cai and Low (2015); Chatterjee et al. (2015); Wei and Wainwright (2017). 4 3 Goodness-of-Fit Let Z1P , . . . , Zn ∼ P where Zi ∈ {1, . . . , d}. Define the vector of counts (X1 , . . . , Xd ) where Xj = ni=1 I(Zi = j). We consider testing the simple null hypothesis: versus H1 : P 6= P0 . H0 : P = P0 The most commonly used test statistics are the chi-squared statistic, Tχ2 d X (Xj − np0 (j))2 = , np0 (j) (3) j=1 and the likelihood ratio test (LRT) TLRT = d X  pb(j) log j=1 pb(j) p0 (j)  , (4) where pb(j) = Xj /n. See the book of Read and Cressie (1988) for a variety of other popular multinomial goodness-of-fit tests. As we show in Section 5, when d is large, these tests can have poor power. In particular, they are not minimax optimal. Much of the research on tests in the large d setting has focused on establishing conditions under which these statistics have convenient limiting distributions (see for instance Morris (1975)). Unfortunately, these conditions are generally not testable, and they rule out many interesting cases, when test statistics despite not having a convenient limiting distribution can have high power (see Section 5). 3.1 Globally Minimax Optimal Tests The global minimax separation rate was characterized in the works of Paninski (2008); Valiant and Valiant (2017). In particular, these works show that the global minimax separation rate (see (2)) is given by: d1/4 n  √ . n (5) This implies, surprisingly, √ that we can have non-negligible power even when n  d. In the regime when n  d most categories of the multinomial are unobserved, but we can still distinguish any multinomial from alternatives separated in `1 with high power. p In start contrast, it can be shown that the minimax estimation rate in the `1 distance, is d/n which is much slower than the testing rate. This is a common phenomenon: hypothesis testing is often easier than estimation. An important fact, elucidated by the minimax perspective, is that none of the traditional tests are minimax. A very simple minimax test, from Balakrishnan and Wasserman (2017) is the truncated χ2 test defined by Ttrunc = X (Xj − np0 (j))2 − Xj . 1 max{p (j), } 0 d j The α level critical value tα is defined by n o tα (p0 ) = inf t : P0n (T > t) ≤ α . 5 (6) Normal approximations or χ2 approximations cannot be used to find tα since the asymptotics are not uniformly valid over M. However, the critical value tα for the test can easily be found by simulating from P0 . In Section 5 we report some simulation studies that illustrate the gain in power by using this test. 3.2 Locally Minimax Optimal Tests In goodness-of-fit testing, some nulls are easier to test than others. For example, when p0 is uniform the local minimax risk is quite large and scales as in (5). However, when p0 is sparse the problem effectively behaves as a much lower dimensional multinomial testing problem and the minimax separation can be much smaller. This observation has important practical consequences. Substantial gains in power can be achieved, by adapting the test to the shape of the null distribution p0 . Roughly, Valiant and Valiant (2017) showed that the local minimax rate is given by r V (p0 ) n (p0 )  n for a functional V that depends on p0 as, V (p0 ) ≈ kp0 k2/3  3/2 d X 2/3 = p0 (j) . j=1 We provide a more precise statement in the Appendix. The fact that the local minimax rate depends on the 2/3 norm is certainly not intuitive and is an example of the surprising nature of the results in the world of high dimensional multinomials. When p0 is uniform the 2/3-rd √ norm is maximal and takes the value kp0 k2/3 = d whereas when p0 = (1, 0, . . . , 0) the 2/3rd norm is much smaller, i.e. kp0 k2/3 = 1. This means that a test tailored to p0 can have dramatic gains in power. Valiant and Valiant (2017) constructed a test that achieves the local minimax bound. To describe the test we need a few definitions. First, without loss of generality, assume that p0 (1) ≥ p0 (2) ≥ · · · ≥ p0 (d). Let σ ∈ [0, 1] and define the tail and bulk by d o n X Qσ (p0 ) = i : p0 (j) ≤ σ j=i and n o Bσ (p0 ) = i > 1 : i ∈ / Qσ (p0 ) . The test is φ = φ1 ∨ φ2 where φ1 = I(T1 (σ) > t1 ), φ2 = I(T2 (σ) > t2 ), r X nP0 (Qσ ) T1 (σ) = (Xj − np0 (j)), t1 (α, σ) = , α j∈Qσ sP 2/3 2 X (Xj − np0 (j))2 − Xj j∈Bσ 2n p0 (j) T2 (σ) = , t (α, σ) = . 2 2/3 α p (j) j∈Bσ 0 The test may appear to be somewhat complicated but all the quantities are easy to compute. Furthermore, in practice the thresholds are easily computed by simulation. Other near-local 6 minimax tests for testing multinomials appear in Diakonikolas and Kane (2016); Balakrishnan and Wasserman (2017). A problem with the above test is that there is a tuning parameter σ. Valiant and Valiant (2017) suggested using σ = /8. While this choice is useful for theoretical analysis it is not useful in practice as it would require knowing how far P is from P0 if H0 is false. In Balakrishnan and Wasserman (2017) we propose ways to select the tuning parameter σ in a data-driven fashion. For instance, one might consider a Bonferroni corrected test. More precisely, let Σ = {σ1 , . . . , σN } be a grid of values for σ. Let φj be the test using tuning parameter σj and significance level α/N . We then use the Bonferroni corrected test φ = maxj {φj }. It can be shown that, if Σ is chosen carefully, there is only a small loss of power from the Bonferroni correction. 3.3 Implications for Continuous Data Although the focus of this paper is on discrete data, we would like to briefly mention the fact that these results have implications for continuous data. This discussion is based on Balakrishnan and Wasserman (2017). Suppose that X1 , . . . , Xn ∼ p where p is a density on [0, 1]. We want to test H0 : p = p0 . As shown in LeCam (1973) and Barron (1989), the power of any test over the set {p : TV(p, p0 ) > } is trivial unless we add further assumptions. For example, suppose we restrict attention to densities p that satisfy the Lipschitz constraint: |p(y) − p(x)| ≤ L|x − y|. In this case, Ingster (1997) showed that, when p0 is the uniform density, the minimax separation rate is n  n−2/5 . The optimal rate can be achieved by binning the data and using a χ2 test. However, if p0 is not uniform and the Lipschitz constant L is allowed to grow with n, Balakrishnan and Wasserman (2017) showed that the local minimax rate is √ 2/5 Ln T (p0 ) n (p0 ) ≈ n Rp where T (p0 ) ≈ p0 (x)dx. This rate can be achieved by using a very careful, adaptive binning procedure, and then invoking the test from Section 3.2. The proofs make use of some of the tools for high dimensional multinomials described in the previous sections. The main point here is that the theory for multinomials has implications for continuous data. It is worth noting that Fienberg and Holland (1973) was one of the first papers to explicitly link the high dimensional multinomial problem to continuous problems. 3.4 Testing in Other Metrics A natural question is to characterize the dependence of the local minimax separation and the local minimax test on the choice of metric. We have focused thus far on the TV metric. The paper Daskalakis et al. (2018) considers goodness-of-fit testing in other metrics. They provide results on the global minimax separation for the Hellinger, Kullback-Leibler and χ2 metric. In particular, they show that while the global minimax separation is identical for Hellinger and TV, this separation is infinite for the Kullback-Leibler and χ2 distance because these distances can be extremely sensitive to small perturbations of small entries of the multinomial. In forthcoming work (Balakrishnan and Wasserman, 2018) we characterize the local minimax rate in the Hellinger metric for high-dimensional multinomials as well as for continuous 7 distributions. The optimal choice of test, as well as the local minimax separation can be sensitive to the choice of metric and (in the continuous case) to the precise nature of the smoothness assumptions. Despite this progress, developing a comprehensive theory for minimax testing of highdimensional multinomials in general metrics, which provides useful practical insights, remains an important open problem. 3.5 Composite Nulls and Imprecise Nulls Now we briefly consider the problem of goodness-of-fit testing for a composite null. Let P0 ⊂ M be a subset of multinomials and consider testing H0 : P ∈ P0 verus H1 : P ∈ / P0 . A complete minimax theory for this case is not yet available, but many special cases have been studied. In particular, the work of Acharya et al. (2015), provides some results for testing monotonicity, unimodality and log-concavity of a high-dimensional multinomial. Here, we briefly outline a general approach due to Acharya et al. (2015). A natural approach to hypothesis testing with a composite null is to split the sample, estimate the null distribution using one sample, and then to test goodness-of-fit to the estimated null distribution using the second sample. In the high-dimensional setting, we cannot assume that our estimate of the null distribution is very accurate (particularly in the TV metric). However, as highlighted in Acharya et al. (2015) even in the high-dimensional setting we can often obtain sufficiently accurate estimates of the null distribution in the χ2 distance. This observation motivates the study of the following two-stage approach. Use half the data to get an estimate pb0 assuming H0 is true. Now use the other half to test the imprecise null of the form: H0 : d1 (p, pb0 ) ≤ θn verus H1 : d(p, pb0 ) ≥ n . Here, pb0 is treated as fixed. Acharya et al. (2015) refer to this as “robust testing” but they are not using the word robust in the usual sense. This imprecise null testing problem has been studied for a variety of metric choices in Valiant and Valiant (2011); Acharya et al. (2015) and Daskalakis et al. (2018). Towards developing practical tests for general composite nulls, an important open problem is to provide non-conservative methods for determining the rejection threshold for imprecise null hypothesis tests. In the high-dimensional setting we can no longer rely on limiting distribution theory, and it seems challenging to develop simulation based methods in general. Some alternative proposals have been suggested for instance in Berger and Boos (1994), but warrant further study in the high-dimensional setting. More specific procedures can be constructed based on the structure of P0 , and important special cases of composite null testing such as two-sample testing and independence testing have been studied in the literature. We turn our attention towards two-sample testing next. 4 Two Sample Testing In this case the data are Z1 , . . . , Zn1 ∼ P, W 1 , . . . , W n2 ∼ Q 8 and the hypotheses are H0 : P = Q versus H1 : P 6= Q. Let X and Y be the corresponding vectors of counts. First, suppose that n1 = n2 := n. In this case, Chan et al. (2014) showed that the minimax rate is ) ( d1/2 d1/4 n  max , . (7) n3/4 n1/2 The second term in the maximum is identical to the goodness-of-fit rate. In the high1/2 dimensional case d ≥ n, the minimax separation rate is nd 3/4 , which is strictly slower than the goodness-of-fit rate. This highlights that, in contrast to the low-dimensional setting, there can be a price to pay for testing when the null distribution is not known precisely (i.e. for testing with a composite null). Chan et al. (2014) also showed that the (centered) χ2 statistic T = X (Xj − Yj )2 − Xj − Yj Xj + Yj (8) j is minimax optimal. The critical value tα can be obtained using the usual permutation procedure (Lehmann and Romano, 2006). It should be noted, however, that the theoretical results do not apply to the data-based permutation cutoff but, rather, to a cutoff based on a loose upper bound on the variance of T . In the remainder of this section we discuss some extensions: 1. Unequal Sample Sizes: The problem of two-sample testing with unequal sample sizes has been considered in Diakonikolas and Kane (2016) and Bhattacharya and Valiant (2015), and we summarize some of their results here. Without loss of generality, assume that n1 ≥ n2 . The minimax rate is ( ) d1/2 d1/4 n  max (9) , 1/2 . 1/4 1/2 n1 n2 n2 Note that this rate is identical to the minimax goodness of fit rate from Section 3 when n1 ≥ d. This makes sense since, when n1 is very large, P can be estimated to high precision and we are essentially back in the simple goodness-of-fit setting. From a practical perspective, while the papers (Diakonikolas and Kane, 2016; Bhattacharya and Valiant, 2015) propose tests that are near-minimax they are not tests in the usual statistical sense. They contain a large number of unspecified constants and it is unclear how to choose the test threshold in such a way that the level of the test is α. We could choose the constants somewhat loosely then use the permutation distribution to get a level α test, but it is not known if the resulting test is still minimax, highlighting an important gap between theory and practice. 2. Refinements of Minimaxity: In two-sample testing, unlike in goodness-of-fit testing, it is less clear how precisely to define the local minimax separation. Roughly, we would expect that distinguishing whether two samples are drawn from the same distribution or not should be more difficult if the distributions of the samples are nearly uniform, than if the distributions are concentrated on a small number of categories. Translating this intuition into a satisfactory refined minimax notion is more involved than in the goodness-of-fit problem. 9 One such refinement appears in the work of Acharya et al. (2012), who restrict attention to so-called “symmetric” test statistics (roughly, these statistics are invariant to re-labelings of the categories of the multinomial). Their proposal is in the spirit of classical notions of adaptivity and oracle inequalities in statistics (see for instance van de Geer (2015); Donoho et al. (1996) and references therein), where they benchmark the performance of a test/estimator against an oracle test/estimator which is provided some side-information about the local structure of the parameter space. Concretely, they compare the separation achieved by χ2 -type tests to the minimax separation achieved by an oracle that knows the distributions P, Q up to a permutation. 3. Testing Continuous Distributions: Finally, we note that results for two-sample testing of high-dimensional multinomials have implications for two-sample testing in the continuous case. The recent paper of Arias-Castro et al. (2016) building on work by Ingster (1997), considers two-sample testing of smooth distributions by reducing the testing problem to an appropriate high-dimensional multinomial testing problem. Somewhat surprisingly, they observe that at least under sufficiently strong smoothness assumptions, the minimax separation rate for two-sample testing matches that of goodness-of-fit testing. 5 Simulations In this section, we report some simulation studies performed to illustrate that tests can have high power even when their limiting distributions are not Gaussian and to illustrate the gains from using careful modifications to classical tests for testing high-dimensional multinomials. 5.1 Limiting distribution of test statistics One of the main messages of our paper is that tests can have high-power even in regimes where their null distributions are not Gaussian (or more generally well-behaved). As a result, restricting attention to regimes where the null distribution of a test statistic is well-behaved can be severely limiting. As an illustration, we consider goodness-of-fit testing where the null distribution is a power law, i.e. we take p0 (i) ∝ 1/i. We will consider a high-dimensional setting where d = 1000 and n = 400. In this setting, as we will show in Section 5.2, the χ2 -statistic performs poorly but the truncated statistic in (6) has high power. However, as illustrated in Figure 1 in this high-dimensional regime the limiting distributions of both statistics are quite far from Normal. We also observe that the classical χ2 statistic has a huge variance, which explains its poor power and motivates our introduction of the truncated χ2 statistic. The truncated χ2 statistic has a high-power, and achieves the minimax rate for goodness-of-fit testing, and as illustrated in this simulation has a much better behaved distribution under the null. 5.2 Testing goodness-of-fit In this section, we compare the performance of several goodness-of-fit test statistics. Throughout we take n = 400 and d = 1000. Closely related simulations appear in our prior work Balakrishnan and Wasserman (2017). In particular, we compare the classical χ2 statistic in (3), 10 6 5 4 3 2 1 0 -1 -2 -3 -4 -2 0 2 4 -2 0 2 4 5 4 3 2 1 0 -1 -2 -3 -4 -4 Figure 1: A plot of the distribution of the classical and truncated χ2 test statistics under a power law null distribution, in the high-dimensional setting where n = 400, d = 1000, obtained via simulation. the likelihood-ratio test in (4), the truncated χ2 statistic in (6) and the two-stage locally minimax 2/3rd and tail test described in Section 3.2, with the `1 and `2 tests given as T`1 = d X |Xi − np0 (i)|, and T`2 = i=1 d X (Xi − np0 (i))2 . i=1 We examine the power of these tests under various alternatives: 1. Minimax Alternative: We perturb each entry by an amount proportional to p0 (i)2/3 with a randomly chosen sign. This is close to the worst-case perturbation used in Valiant and Valiant (2017) in their proof of the local-minimax lower bound. 2. Uniform Dense Alternative: We perturb each entry of the null distribution by a scaled Rademacher random variable. (A Rademacher random variable takes values +1 and −1 with equal probability.) 3. Sparse Alternative: In this case, we essentially only perturb the first two entries of the null multinomial. We increase the two largest entries of the multinomial and then 11 1 1 0.9 0.9 0.8 0.8 0.7 0.7 Chi-sq. L2 L1 Truncated chi-sq LRT 2/3rd and tail 0.6 0.5 0.4 0.5 0.4 0.3 0.3 0.2 0.2 0.1 0.1 0 0 0.2 0.4 0.6 0.8 Chi-sq. L2 L1 Truncated chi-sq LRT 2/3rd and tail 0.6 0 1 0 0.2 0.4 0.6 0.8 Figure 2: A comparison between the truncated χ2 test, the 2/3rd + tail test (Valiant and Valiant, 2017), the χ2 -test, the likelihood ratio test, the `1 test and the `2 test. The null is chosen to be uniform, and the alternate is either a dense or sparse perturbation of the null. The power of the tests are plotted against the `1 distance between the null and alternate. Each point in the graph is an average over 1000 trials. Despite the high-dimensionality (i.e. n = 200, d = 2000) the tests have high-power, and perform comparably. re-normalize the resulting distribution, this results in a large perturbation to the two largest entries and a relatively small perturbation to the other entries of the multinomial. 4. Alternative Proportional to Null: We perturb each entry of the null distribution by an amount proportional to p0 (i), with a randomly chosen sign. We observe that the truncated χ2 test and the 2/3rd + tail test from Valiant and Valiant (2017) are remarkably robust. All tests are comparable when the null is uniform but the two-stage 2/3rd + tail test suffers a slight loss in power due to the Bonferroni correction. The distinctions between the classical tests and the recently proposed modified tests are clearer for the power law null. In particular, from the simulation testing a power-law null against a sparse alternative it is clear that the χ2 and likelihood ratio test can have very poor power in the high-dimensional setting. The `2 test appears to have high-power against sparse alternatives but performs poorly against dense alternatives suggesting potential avenues for future investigation. 5.3 Two-sample testing Finally, we turn our attention to the problem of two-sample testing for high-dimensional multinomials. We compare three different test statistics, the two-sample χ2 statistic (8), the `1 and `2 statistics: T`1 d X Xi Yi = − , n1 n2 T`2 = i=1 d  X Xi i=1 12 Yi − n1 n2 2 , 1 1 Chi-sq. L2 L1 Truncated chi-sq LRT 2/3rd and tail 0.9 0.8 0.7 0.9 0.8 0.7 0.6 0.6 0.5 0.5 0.4 0.4 0.3 0.3 0.2 0.2 0.1 0.1 0 0 0.1 0.2 0.3 0.4 0.5 0 0.6 1 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 1 Chi-sq. L2 L1 Truncated chi-sq LRT 2/3rd and tail 0.9 0.8 0.7 0.8 0.7 0.6 0.5 0.5 0.4 0.4 0.3 0.3 0.2 0.2 0.1 0.1 0 0.1 0.2 Chi-sq. L2 L1 Truncated chi-sq LRT 2/3rd and tail 0.9 0.6 0 Chi-sq. L2 L1 Truncated chi-sq LRT 2/3rd and tail 0.3 0.4 0.5 0.6 0 0.7 0 0.2 0.4 0.6 0.8 1 Figure 3: A comparison between the truncated χ2 test, the 2/3rd + tail test (Valiant and Valiant, 2017), the χ2 -test, the likelihood ratio test, the `1 test and the `2 test. The null is chosen to be a power law with p0 (i) ∝ 1/i. We consider four possible alternates, the first uniformly perturbs the coordinates, the second is a sparse perturbation only perturbing the first two coordinates, the third perturbs each co-ordinate proportional to p0 (i)2/3 and the final setting perturbs each coordinate proportional to p0 (i). The power of the tests are plotted against the `1 distance between the null and alternate. Each point in the graph is an average over 1000 trials. and an oracle goodness-of-fit statistic. The oracle has access to the distribution P (and ignores the first sample) and tests goodness-of-fit using the second sample. In our simulations, we use the truncated χ2 test for goodness-of-fit. Motivated by our simulations in the previous section, we consider the following pairs of distributions in the two-sample setup: 1. Uniform P , Dense Perturbation Q: We take the distribution P to be uniform and the distribution Q to be the distribution where we perturb each entry of P by a scaled Rademacher random variable. 2. Power-Law P , Sparse Perturbation Q: Noting the difficulty faced by classical tests for goodness-of-fit testing of a power law versus a sparse perturbation (see Figure 3) we 13 1 1 0.9 0.9 0.8 0.8 0.7 0.7 0.6 0.6 0.5 0.5 0.4 0.4 0.3 0.3 Chi-Sq. L1 Oracle GoF L2 0.2 0.1 0 Chi-Sq. L1 Oracle GoF L2 0 0.2 0.4 0.6 0.8 0.2 0.1 0 1 0 0.2 0.4 0.6 0.8 1 1 Chi-Sq. L1 Oracle GoF L2 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 Figure 4: A comparison between the χ2 test, the `1 test, the `2 test, and the (oracle) goodnessof-fit test. In the three settings, the two distributions are chosen as described in the text (the distribution P is chosen to be either uniform, power-law or minimax). The power of the tests are plotted against the `1 distance between P and Q. The sample sizes from P and Q are taken to be balanced and are each equal to 200. Each point in the graph is an average over 1000 trials. consider a similar setup in the two-sample setting. We take each entry p(i) ∝ 1/i and take q(i) to be the sparse perturbation described previously (where the two largest entries are perturbed by a relatively large magnitude). 3. Minimax P, Q: This construction is inspired by the work of Batu et al. (2000), and is used in their construction of a minimax lower bound for two-sample testing in the high-dimensional setting (i.e. when d  max{n1 , n2 }). For a prescribed separation , with probability n1 /2d we choose p(i) = q(i) = 1/n1 and with probability 1 − n1 /2d we choose p(i) = 1/(2d) and q(i) = 1/(2d) + Ri /(2d), where the Ri denote independent Rademacher random variables. Both distributions are then normalized. Roughly, the two distributions contain a mixture of heavy elements of mass 1/n1 and light elements of mass close to 1/d. The two distributions have `1 distance close to  and the insight of Batu et al. (2000) is that in the two-sample setting is quite difficult to distinguish between variations in observed frequencies due to the perturbation of the 14 entries and due to the random mixture of heavy and light entries. In each case, the cut-off for the tests is determined via the permutation method. The balanced case: In this case, we set n1 = n2 = 200 and d = 400. We observe in Figure 4 that there is a clear and significant loss in power relative to the goodness-of-fit oracle, indicating the increased complexity of two-sample testing in the high-dimensional setup. We note that, as is clear from the minimax separation rate we do not expect any loss in power in the low-dimensional setting. The loss in power is exacerbated when we consider the minimax two-sample pair (P, Q) described above. We also note that the loss in power is negligible for the power law pair of distributions: due to the rapid decay of their entries these multinomials can be well estimated from a small number of samples. The imbalanced case: In this case, we set n1 = 2000, n2 = 200 and d = 400. The χ2 statistic for two-sample testing in the imbalanced case, is given by: T = d X (n2 Xi − n1 Yi )2 − n2 Xi − n2 Yi 2 i=1 1 Xi + Yi where we follow Bhattacharya and Valiant (2015) and use a slightly modified centering of the usual χ2 statistic. Since the χ2 -statistic is minimax optimal in the balanced case, one might conjecture that this continues to be the case in the imbalanced case. However, as our simulations suggest this is not the case. Somewhat surprisingly, the performance of the χ2 statistic can degrade when one of the sample sizes is increased (see Figure 5). The `1 statistic on the other hand appears to be perform as expected, i.e. its power is close to that of the oracle goodness-of-fit test in the case when one of the sample sizes is very large, and we believe that this statistic warrants further study. 6 Discussion Despite the fact that discrete data analysis is an old subject, it is still a vibrant area of research and there is still much that we don’t know. Steve Fienberg showed prescience in drawing attention to one of the thorniest issues: high-dimensional multinomials. Much of the statistical literature has dealt with the high-dimensional case by imposing assumptions on the distribution so that simple limiting distributions can be obtained. Doing so gives up the most appealing property of multinomial inference: it is completely distributionfree. As we have seen in this paper, recent work by a variety of communities has developed new and rather surprising theoretical results. What is often missing in the recent literature is the appreciation that statisticians want tests with precise control of the type I error rate. As a result, there remain gaps between theory and practice. We have focused on goodness of fit and two sample problems. There is a rich literature on other problems such as independence testing and testing shape constraints (Diakonikolas and Kane, 2016; Acharya et al., 2015). As we discussed earlier, Balakrishnan and Wasserman (2017) showed that these new results for high-dimensional discrete data have implications for continuous data. There is much more to say about this and this is a direction that we are actively pursuing. Finally, we have restricted attention to hypothesis testing. In future work, we will report results on high dimensional inference using confidence sets and point estimation. 15 1 1 0.9 0.9 0.8 0.8 0.7 0.7 0.6 0.6 0.5 0.5 0.4 0.4 0.3 Chi-Sq. L1 Oracle GoF L2 0.3 Chi-Sq. L1 Oracle GoF L2 0.2 0.1 0 0 0.2 0.4 0.6 0.8 0.2 0.1 0 1 0 0.2 0.4 0.6 0.8 1 1 0.9 0.8 0.7 0.6 Chi-Sq. L1 Oracle GoF L2 0.5 0.4 0.3 0.2 0.1 0 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 Figure 5: A comparison between the χ2 test, the `1 test, the `2 test, and the (oracle) goodnessof-fit test. In the three settings, the two distributions are chosen as described in the text (the distribution P is chosen to be either uniform, power-law or minimax). The power of the tests are plotted against the `1 distance between P and Q. The sample sizes from P and Q are taken to be imbalanced, i.e. we take n1 = 2000 and n2 = 200. Each point in the graph is an average over 1000 trials. 7 Acknowledgements This research was supported by NSF grant DMS1713003. All of our simulation results and figures can be reproduced using code made available at (http://www.stat.cmu.edu/~siva/ multinomial). References J. Acharya, H. Das, A. Jafarpour, A. Orlitsky, S. Pan, and A. Suresh. Competitive classification and closeness testing. In Proceedings of the 25th Annual Conference on Learning Theory, volume 23, pages 22.1–22.18. 2012. J. Acharya, C. Daskalakis, and G. Kamath. Optimal testing for properties of distributions. In Advances in Neural Information Processing Systems, pages 3591–3599. 2015. E. Arias-Castro, B. Pelletier, and V. Saligrama. Remember the curse of dimensionality: The 16 case of goodness-of-fit testing in arbitrary dimension. arXiv preprint arXiv:1607.08156, 2016. S. Balakrishnan and L. Wasserman. Hypothesis testing for densities and high-dimensional multinomials: Sharp local minimax rates. arXiv preprint arXiv:1706.10003, 2017. S. Balakrishnan and L. Wasserman. Hypothesis testing for densities and high-dimensional multinomials II: Sharp local minimax rates. Forthcoming, 2018. A. R. Barron. Uniformly powerful goodness of fit tests. Ann. Statist., 17(1):107–124, 1989. T. Batu, L. Fortnow, R. Rubinfeld, W. D. Smith, and P. White. Testing that distributions are close. In 41st Annual Symposium on Foundations of Computer Science, FOCS 2000, 12-14 November 2000, Redondo Beach, California, USA, pages 259–269. 2000. R. L. Berger and D. D. Boos. P values maximized over a confidence set for the nuisance parameter. Journal of the American Statistical Association, 89(427):1012–1016, 1994. B. Bhattacharya and G. Valiant. Testing closeness with unequal sized samples. In Advances in Neural Information Processing Systems, pages 2611–2619. 2015. Y. M. Bishop, S. E. Fienberg, and W. Paul. Holland. 1975. Discrete Multivariate Analysis: Theory and Practice, pages 57–122, 1995. T. Cai and M. Low. A framework for estimation of convex functions. Statistica Sinica, 2015. S.-O. Chan, I. Diakonikolas, G. Valiant, and P. Valiant. Optimal algorithms for testing closeness of discrete distributions. In Proceedings of the twenty-fifth annual ACM-SIAM symposium on Discrete algorithms, pages 1193–1203. Society for Industrial and Applied Mathematics, 2014. S. Chatterjee, A. Guntuboyina, and B. Sen. On risk bounds in isotonic and other shape restricted regression problems. Ann. Statist., 43(4):1774–1800, 2015. C. Daskalakis, G. Kamath, and J. Wright. Which distribution distances are sublinearly testable? Symposium on Discrete Algorithms, 2018. L. Devroye and L. Gyorfi. Nonparametric Density Estimation: The L1 View. Wiley Interscience Series in Discrete Mathematics. Wiley, 1985. I. Diakonikolas and D. M. Kane. A new approach for testing properties of discrete distributions. In Foundations of Computer Science (FOCS), 2016 IEEE 57th Annual Symposium on, pages 685–694. IEEE, 2016. D. L. Donoho and I. M. Johnstone. Ideal spatial adaptation by wavelet shrinkage. Biometrika, 81:425–455, 1994. D. L. Donoho, I. M. Johnstone, G. Kerkyacharian, and D. Picard. Density estimation by wavelet thresholding. Ann. Statist., 24(2):508–539, 1996. S. E. Fienberg. The analysis of cross-classified categorical data. Springer, 1976. S. E. Fienberg and P. W. Holland. Simultaneous estimation of multinomial cell probabilities. Journal of the American Statistical Association, 68(343):683–691, 1973. 17 A. Goldenshluger and O. Lepski. Bandwidth selection in kernel density estimation: Oracle inequalities and adaptive minimax optimality. Ann. Statist., 39(3):1608–1632, 2011. W. Hoeffding. Asymptotically optimal tests for multinomial distributions. Ann. Math. Statist., 36(2):369–401, 1965. L. Holst. Asymptotic normality and efficiency for certain goodness-of-fit tests. Biometrika, 59(1):137–145, 1972. Y. Ingster and I. Suslina. Nonparametric Goodness-of-Fit Testing Under Gaussian Models. Lecture Notes in Statistics. Springer, 2003. Y. I. Ingster. Adaptive chi-square tests. Zapiski Nauchnykh Seminarov POMI, 244:150–166, 1997. G. Ivchenko and Y. Medvedev. Decomposable statistics and hypotheses testing: The case of small samples. Teoriya Veroyatnostej i Ee Primeneniya, 23, 1978. L. LeCam. Convergence of estimates under dimensionality restrictions. Ann. Statist., 1(1):38– 53, 1973. E. Lehmann and J. Romano. Testing Statistical Hypotheses. Springer Texts in Statistics. Springer New York, 2006. C. Morris. Central limit theorems for multinomial sums. Ann. Statist., 3(1):165–188, 1975. L. Paninski. A coincidence-based test for uniformity given very sparsely sampled discrete data. IEEE Transactions on Information Theory, 54(10):4750–4755, 2008. T. R. C. Read and N. A. C. Cressie. Goodness-of-fit statistics for discrete multivariate data. Springer-Verlag Inc, 1988. G. Valiant and P. Valiant. Estimating the unseen: An n/log(n)-sample estimator for entropy and support size, shown optimal via new clts. In Proceedings of the Forty-third Annual ACM Symposium on Theory of Computing, STOC ’11, pages 685–694. ACM, New York, NY, USA, 2011. G. Valiant and P. Valiant. An automatic inequality prover and instance optimal identity testing. SIAM Journal on Computing, 46(1):429–455, 2017. S. van de Geer. Estimation and Testing Under Sparsity: Saint-Flour XLV - 2015. Springer, 1st edition, 2015. Y. Wei and M. J. Wainwright. The local geometry of testing in ellipses: Tight control via localized Kolomogorov widths. arxiv preprint arXiv:1712.00711, 2017. Appendix Here we describe the local minimax results for goodness of fit testing more precisely. Without loss of generality we assume that the entries of the null multinomial p0 are sorted so that 18 p0 (1) ≥ p0 (2) ≥ . . . ≥ p0 (d). For any 0 ≤ σ ≤ 1 we denote σ-tail of the multinomial by:   d  X  (10) Qσ (p0 ) = i : p0 (j) ≤ σ .   j=i The σ-bulk is defined to be Bσ (p0 ) = {i > 1 : i ∈ / Qσ (p0 )}. (11) Note that i = 1 is excluded from the σ-bulk. The minimax rate depends on the functional: 3/2  Vσ (p0 ) =  X p0 (i)2/3  . (12) i∈Bσ (p0 ) Define, `n and un to be the solutions to the equations: ) ( r ) ( r V`n (p0 ) (p0 ) Vun (p0 )/16 (p0 ) 1 1 , , un (p0 ) = max , . `n (p0 ) = max n n n n (13) With these definitions in place, we are now ready to state the result of Valiant and Valiant (2017). We use c1 , c2 , C1 , C2 > 0 to denote positive universal constants. Theorem 1 (Valiant and Valiant (2017)). The local critical radius n (p0 , M) for multinomial testing is upper and lower bounded as: c1 `n (p0 ) ≤ n (p0 , M) ≤ C1 un (p0 ). Furthermore, the global critical radius n (M) is bounded as: c2 d1/4 C2 d1/4 √ ≤ n (M) ≤ √ . n n 19 (14)
7cs.IT
A macro placer algorithm for chip design Endre Csóka, Attila Deák December 13, 2017 arXiv:1509.01867v1 [cs.DS] 6 Sep 2015 Abstract There is a set of rectangular macros with given dimensions, and there are wires connecting some pairs (or sets) of them. We have a placement area where these macros should be placed without overlaps in order to minimize the total length of wires. We present a heuristic algorithm which utilizes a special data structure for representing two dimensional stepfunctions. This results in fast integral computation and function modification over rectangles. Our heuristics, especially our data structure for two-dimensional functions, may be useful in other applications, as well. 1 Introduction A chip is composed of basic elements called cells, circuits, boxes or modules. They usually have a rectangular shape, contain several transistors and internal connections, and have (at least two) fixed pins. There is a netlist describing which pin should be connected to which other pins. The goal is to place the cells legally – without overlaps – in the chip area so as to minimize the total (weighted) length of the wires connecting the pins. This problem is also called the VLSI placement problem. Finding the optimum is NP-hard, therefore, we present a heuristic algorithm based on primal-dual optimization inspired by the Hungarian Algorithm [6] for the minimum weight maximum matching problem. Namely, we use a cost function as dual function on the placement area, and we are looking for a placement minimizing the sum of the total netlength and the total costs of the areas covered by the macros. We try to find a non-negative cost function by which an almost optimal placement is legal even if we allow overlaps, and costs are counted with multiplicity. We will use an iterated algorithm on the space of primal-dual pairs based on the following two steps: 1. For every overlap, we increase the cost function under intersecting areas. 2. We try to find a better placement with respect to the new cost function. We tried to focus on typical instances in practice, and we found that these have the following properties. 1. The placement area is not very large compared to the total size of the macros, but it is still easy to find a legal placement. 2. There are about a few hundreds of macros and every macro is contained in at most 10 nets. 3. Most of the nets connect two, sometimes three, and rarely more than three macros to each other. Our method is optimized for such inputs. This paper is organized as follows. In Section 2, we introduce some notations and give a formal definition of the macro placement problem. In Section 3, we describe the basic idea behind our algorithm and in Section 4, we present the algorithm. In Section 5, we describe some additional heuristics used in our placer. 2 The macro placement problem Now we give a formal definition of the simplified macro placement problem. Let us denote by M the set of macros. We assume that all pins of each macro are in the center of the macro. The place of a macro is identified with the 1 place of its center pin. For a macro M , denote its horizontal and vertical size by sizex(M ), sizey (M ), respectively. For a macro M at (x, y), we denote the area occupied by M by     sizex(M ) sizey (M ) sizex(M ) sizey (M ) , x+ , y+ S(M, (x, y)) = x − × y− . 2 2 2 2 A net N is a subset of the macros that are connected. Definition 1. A netlist is a pair (M, N ) where M is a finite set of macros and N ⊆ P(M) is a set of subsets of M. One can think of N as a hypergraph on M, where each N ∈ N is a hyperedge. We assume |N | ≥ 2 for each N ∈ N. Definition 2. The placement area is a rectangle denoted by A. This contains a set of rectangular blockages B (where ∀B ∈ B, B ⊂ A). The sides of all rectangles are parallel to the axis. A blockage is a part of the placement area where no macro can be placed. Definition 3. A placement is a map p : M 7→ A. The placement p is legal if all of the followings hold. • Every macro M ∈ M is placed in the placement area:  S M, p(M ) ⊆ A. • The places of any two macros M, M ′ ∈ M are disjoint:   S M, p(M ) ∩ S M ′ , p(M ′ ) = ∅. • None of the macros M ∈ M are placed on a blockage B ∈ B:  S M, p(M ) ∩ B = ∅. The macros have to be placed in the given orientation, these cannot be rotated. Let (M, N ) be a netlist and p a legal placement to the placement area A with blockages B.  Define p on the set of nets N as follows. For N = {M1 , M2 , . . . , Mk } ∈ N , let p(N ) = p(M1 ), p(M2 ), . . . , p(Mk ) . We have a function L : A2 ∪A3 ∪A4 ∪. . . 7→ R+ which evaluates the length of a net. L is also called the net (or netlength) model. One commonly used net model is the bounding-box model:   BB (x1 , y1 ), (x2 , y2 ), . . . , (xk , yk ) = max{xi } − min{xi } + max{yi } − min{yi } (1) i i i i This is the half perimeter of the smallest rectangle with sides parallel to the axis, containing all pins of the macros contained in the net N . The Simplified Placement Problem: Given a netlist (M, N ), a placement area A, the set of blockages B and a net model L, find a legal placement p : M 7→ A which minimizes the total netlength: X  L p(N ) . N ∈N 3 Basic tools of the placer The initial problem is to place macros in the placement area (avoiding the blocked areas) so that the total netlength is minimal (or close  to the minimum). As finding the optimum is NP hard, we present a heuristic algorithm with O log(n) log(m)s running time, where the placement area is a discrete n × m grid and we run the algorithm for s rounds. We introduce our algorithm in several steps. 2 Problem 1. We have a set of macros M and disjoint slots A. There is a cost function c : M × A 7→ R+ which assigns costs to every possible macro-slot assignment. Find an injective assignment p : M 7→ A with minimum total cost X  c M, p(M ) . M∈M Solution. This scenario can be represented by a bipartite weighted graph. The two set of points are M and A and the cost of an edge (M, A) is c(M, A). The task is to cover M with a minimum cost maximum matching. This is a well known optimisation problem, and it is usually solved by primal-dual methods (e.g. the Hungarian Method [6]). However, we choose the following method instead, because we will generalize this in the later steps. We try to find a primal-dual solution by the following market simulation: if there is an area which is the best possible choice for at least two macros, then we increase the cost of that area. Problem 2. For a macro M ∈ M and a given netlist N , let E(M ) be the set of nets containing M :  E(M ) = N ∈ N M ∈ N , and let N (M ) be the set of its neighbors:  N (M ) = M ′ ∈ M ∃N ∈ E(M ) : M ′ ∈ N . Let L(N ) be the netlength model. Given a set of macros M, disjoint slots A and netlist N , find an injective assignment p : M 7→ A which minimizes X  L p(N ) . N ∈N Solution. We try to use the solution of Problem 1, where the cost of the placement of one macro is replaced by its marginal contribution to the total cost. Now, the cost of one macro depends on the placement of its neighbors, but there are not too many neighbors, therefore, we expect the cost function to change rather slowly. This allows us to use a variation of the above described market simulation: 1. Take an arbitrary macro-area assignment p. 2. For each macro M ∈ M, fix the other macros at their current position. For every A ∈ A, we get a placement p(M,A) from p by changing the assignment of the macro M to A. Let us define the marginal contribution of M placed at A by X  L p(M,A) (N ) . cp (M, A) = Cost(A) + N ∈E(M) 3. Use the method described in the solution of Problem 1 with cost function cp for M, A to get a better assignment p′ . 4. Continue with step 2 using the assignment p′ given in 3. We run this procedure for a number of rounds. Remark 1. With no further adjustment, the algorithm can easily result in an infinite loop as the following example shows: Consider two macros and let the netlist be one single net connecting the two macros. During the run of the algorithm if the two macros are at different position, the macro with the higher cost would move to the area where the other macro is, because this decreases the total netlength and the total cost of the macros. The cost of this area increases until one of them moves to another place. As before the net connecting this macro to the other causes the other macro to move as well to the same area. Therefore the same process starts again. This shows that increasing the cost under the overlaps alone is not enough. After each round in the algorithm if there are at least two macros at the same area, we increase the cost of that area. At the beginning of the algorithm we allow overlaps to get a better placement, basically allowing not only better, but slightly worse placements to prevent the algorithm to get stuck early in some local minimum. Later, we increasingly punish overlaps to prevent the loop in Remark 1. This is a kind of cooling process. If we set the increment rate properly, the macros will have the time to distribute evenly in the placement area, with small netlength. Later, this punishment goes to infinity, hereby enforcing a legal solution. 3 Problem 3. There is a set of macros M, a netlist N , a placement area A which is a discrete n × m grid and a netlength model L given. Each edge length of each macro is the multiple of the edge length of the grid. A placement p : M 7→ A is legal if S(M1 , p(M1 )) ∩ S(M2 , p(M2 )) = ∅, M1 6= M2 . During the run of the algorithm we allow non-legal placements. We only require that the final placement p is legal. Our task is to find a legal placement which minimizes X  L p(N ) . N ∈N Solution. Here the places are not disjoint as in Problem 2, so during the run of the algorithm the macros can overlap partially as well. In this case we increase the cost under the intersection proportional to its size. Problem 4. In the general setting the sizes can be real numbers. Solution. To use the solution of Problem 3, we divide the placement area to a sufficiently fine discrete grid and use only natural numbers for approximation. We round up the edge length of each macro to the nearest multiple of the edge length of the grid. 4 Our global placer The algorithm receives an initial placement (e.g. random with many overlaps) and then refines it to a global placement with minimized total netlength. 4.1 The structure of the algorithm Our algorithm consists of 4 steps as follows: At the beginning, we generate an initial placement, or we use the given one. Then, for a given number of rounds, we do the following. 1. We choose a macro M randomly with original position X0 . 2. We generate t possible new positions X1 , . . . , Xt around its original position, with move macro(M) 3. We move the macro M to the positon Xi that minimizes  weight (M , Xi ) + N etLength EXi (M ) + penalty(M, Xi), (2) where EXi (M ) is obtained by moving the macro M to Xi . 4. We increase the weights under the overlaps of M with every other macros. 4.2 Notations To discretize the problem, we consider the placement area to be a finite n × m grid. We can assume that n = 2p , m = 2q . These parameters are free to choose according to the available computing resources. Denote the size of the placement area by Ax and Ay (for the horizontal and vertical size). After we set n, m, we divide the placement A area to an n × m grid. Our grid will consist of nm squares of dimensions x × y = Anx × my . We record the cost as a stepfunction on the placement area which is constant on the cells of the grid. In other words we define the cost on the cells of the grid and not as a function on the placement area. Let Pi,j be the weight under the ith square of the jth row. Denote by Mn,m the set of all n × m matrices. Define the inner product of two matrices (say A, B ∈ Mn,m ) as follows: m n X X ai,j bi,j . A ⋆ B := i=1 j=1  We represent a rectangle with its top-left and bottom-right corners. For a given rectangle R̃ = (x1 , y1 ), (x2 , y2 ) , x1 < x2 , y1 < y2 , we consider the slightly larger rectangle j k j k  l m l m !   x1 y1 x2 y2 R= x, y , x, y = (a1 x, b1 x), (a2 x, b2 x) . x y x y 4 This is the smallest rectangle of the grid covering R̃. From now on let every rectangle be given in the form:   R = (a1 x, b1 y), (a2 x, b2 y) = (a1 , b1 ), (a2 , b2 ) .  The characteristic function of R = (a1 , b1 ), (a2 , b2 ) is defined as the following n × m matrix.  1 if a1 < i ≤ a2 and b1 < j ≤ b2 AR = (ai,j )n,m , a = i,j i,j=1 0 otherwise 4.3 Data structure for the weights  We introduce a data structure by which we can calculate (2) in O log(n) log(m) time, andalso, we can increase the cost function by a constant under any rectangle R (as in Problem 4) in O log(n) log(m) time. Remark 2. We have two operations on P . • f (R, P ) = AR ⋆ P returns the total cost under a given rectangle R. • g(R, P, w) increases each entry of P by w under the rectangle R. (P := P + wAR ) In our algorithm, we use these operations in every round, therefore, we need to compute them fast. We construct an orthogonal basis {B1 , B2 , . . . , Bk } in this space (k = nm). For a given rectangle R, in order to compute AR ⋆PP , we only need to know the products Bi ⋆ AR for every i = 1, . . . , k. Increasing the entries under R by w in P = i αi Bi can be done by increasing the coefficients of the expansion αi = αi + wAR ⋆ Bi . We construct a base such that for every rectangle R, there are only a few basis elements which are not orthogonal to R, and hence the inner product can be computed in constant time. First, consider the one dimensional array P = (pi )ni=1 and let n = 2p . Define Bka as follows.  (2k − 2)2a < j ≤ (2k − 1)2a  1 a Bk (j) = −1 (2k − 1)2a < j ≤ 2k2a  0 else where a = 0, . . . , p, k = 1, . . . , 2p−a−1 , j = 1 . . . , n. We also consider the basis element B1p = 1. For example, the elements for n = 8 are         0 0 1 0  0   0   −1   0           0   0   0   1                0    , B20 =  −1  , B30 =  0  , B40 =  0  , B10 =   1   0   0   0           −1   0   0   0           0   1   0   0  0 0 −1 0       1 B1 =       1 1 −1 −1 0 0 0 0              , B21 =            0 0 0 0 1 1 −1 −1              , B12 =            1 1 1 1 −1 −1 −1 −1              , B13 =            1 1 1 1 1 1 1 1             Lemma 1. Let s, t ∈ N, s < t. For a given Rs,t , there are at most 2 log(n) elements of the basis Bka for which Rs,t ⋆ Bka 6= 0. Proof: It is easy to check that Bka is an orthogonal basis in Rn . Let Rs,t ∈ Rn as in the Lemma:  1 s<j≤t Rs,t (j) = 0 else 5 If Bka ⋆ Rs,t 6= 0 then either (3) or (4) or both holds. (2k − 2)2a < s ≤ 2k2a (3) (2k − 2)2a < t ≤ 2k2a (4) For a given Rs,t , the number of Bka for which (3),(4) or both holds, is at most 2 log(n). This completes the proof of the lemma. It is easy to compute the scalar product of Rs,t and Bka :  Starx (Rs,t , Bka ) = − min s − (2k − 2)2a , 2k2a − s ,  Stary (Rs,t , Bka ) = min t − (2k − 2)2a , 2k2a − t . Then the scalar product of Rs,t and Bka is:  if only (3) holds  Starx (Rs,t , Bka ) a Stary (Rs,t , Bka ) if only (4) holds Rx,y ⋆ Bk =  Starx (Rs,t , Bka ) + Stary (Rs,t , Bka ) if (3) and (4) holds (5) Now we can get a basis in Rn×m from the one dimensional case as follows. Let a,b Bk,l (i, j) = Bka (i) · Blb (j), a,b where Bka corresponds to the basis in Rn and Blb to the basis in Rm . It is not hard to check that {Bk,l } is a basis in  Mn,m . Following the argument of Lemma 1, for any rectangle R, there are at most O log(n) log(m) basis elements a,b a,b (Bk,l ) not orthogonal to AR . Furthermore, from (5), the scalar product A(x1 ,x2 )×(y1 ,y2 ) ⋆ Bk,l can be computed in constant time. a,b It is easy to see that Bk,l satisfies:      a,b a,b • ∀R rectangle, Bk,l : AR ⋆Bk,l 6= 0 = O log(n) log(m) . Furthermore, we can find them in O log(n) log(m) time. a,b • ∀R rectangle AR ⋆ Bk,l can be computed in constant time. 4.4 Inflation During the run of the algorithm, the cost of crowded areas may get too high, causing that all macros will avoid that area. Rather than waiting for the costs of all the other places to increase, we implement a cost reducer. It will reduce the differences between the high- and low-cost areas. We chose the method below because it can be easily implemented without further computation time. The best rate of inflation should be adjusted. 4.5 The increase(R,value) subroutine a,b Let α = (αa,b k,l ) be a global variable denoting the coefficients of the basis elements Bk,l in the expansion of P = P a,b a,b a,b k,l,a,b αk,l Bk,l . The increase(R,value) subroutine computes the scalar product of the basis elements Bk,l and AR , a,b a,b and increases the current coefficient of Bk,l with this product multiplied by value. We repeat this for all Bk,l : Algorithm 1 increase(R,value) for {a = 0, . . . , log(n)} do for {b = 0, . . . , log(m)} do a,b for {k, l : Bk,l ⋆ AR 6= 0} do a,b a,b αa,b k,l = αk,l + scalar(AR , Bk,l ) ∗ value end for end for end for 6 In line 3, we can find the pairs (k, l) in constant time as follows. For a given R there are at most 4 pairs (k, l) a,b such that scalar(AR , Bk,l ) 6= 0. The possible pairs (k, l) can be found easily from the coordinates of R. Fix a, b and a rectangle R = ((x1 , y1 ), (x2 , y2 )), where x1 < x2 , y1 < y2 . Let ki , lj be such that (2k1 − 2)2a < x1 ≤ 2k1 2a , (2k2 − 2)2a < x2 ≤ 2k2 2a , and (2l1 − 2)2a < y1 ≤ 2l1 2a , (2l2 − 2)2a < y2 ≤ 2l2 2a . , Bka,b , Bka,b , Bka,b holds. The basis elements (with fixed a, b) possibly not orthogonal to AR are Bka,b 2 ,l2 1 ,l2 2 ,l1 1 ,l1 4.6 The cost(R) subroutine Here, Round ∈ N is a global variable denoting the current round of the algorithm. The cost(R) function receives a rectangle R and returns the total cost of the cells inside this rectangle. This routine uses the basis expansion for the cost matrix P in order to compute the scalar product as follows: Algorithm 2 cost(R) cost = 0; for {a = 0, . . . , log(n)} do for {b = 0, . . . , log(m)} do a,b for {k, l : Bk,l ⋆ AR 6= 0} do a,b cost = cost + αa,b k,l ∗ scalar(AR , Bk,l ) end for end for end for cost = cost + penalty(Round, R); return cost; 5 Heuristics In this section, we discuss further parameters of the algorithm. We make suggestions for all parameters, but these should be experimentally adjusted. 5.1 The move macro(M) subroutine This routine returns a new possible place for M . As before, let Ax , Ay denote the horizontal and vertical size of the placement area A. The location of a macro M is given by its placement coordinates (x, y). For a macro M ∈ M, let us denote the largest and smallest possible x coordinates for the macro M by xmax (M ) = Ax − sizex(M ) , 2 sizex(M ) . 2  We define ymin (M ), ymax (M ) analogously. Let γ(x) = exp log(x) · U [0, 1] where U [0, 1] is a uniformly distributed random variable in [0, 1]. This distribution is our heuristic choice. The subroutine: xmin (M ) = Algorithm 3 move macro(M ) a = Rand{-1,1} b = Rand{-1,1}  if  x − γ(x + 1) xnew =   x + γ(xmax − x) if if  y − γ(y + 1) ynew =  y + γ(ymax − y) if Return xnew , ynew a=1 a = −1 b=1 b = −1 7 5.2 The penalty(Step,R) function Algorithm 4 penalty(Step, R) cost = 0 for {M ∈ M, M 6= R} do cost = cost + c ∗ δStep ∗ Circ(M ∩ R) end for Return cost Here, Circ(R) denotes the circumference of the rectangle R, c is a constant and δStep is a parameter. 5.3 The smooth edge(E) function We will consider the bounding-box model only. During the earlier stages of the optimization, when we compare different positions of a macro and we calculate the total distance of the wires, then we should consider that the positions of the neighbors are still rough. Therefore, it turns out to be useful to consider the positions of the neighboring pins with some uncertainty, namely, as distributions around their present positions. This can be expressed by using a smoothed version of the absolute value function of the difference in each coordinate. This tool was already used in the literature, it is common to approximate the bounding box model (1) with strictly convex functions which converges to the bounding-box netlength. One of them is the log-sum-exp function (see [2], [3], [4]): X X   LSEx (N ) := α log exp x(p)/α + α log exp − x(p)/α , p∈N p∈N and LSE(N ) := LSEx (N ) + LSEy (N ). It is easy to see that LSE(N ) → BB(N ), as α → 0. An alternative way is to approximate with Lp norms (see [5]): 1/p X  p LPx (N ) := x(p) − x(q) + α , p,q∈N and LP (N ) := LPx (N ) + LPy (N ). LP (N ) → BB(N ) holds again, if α1 → ∞, p → ∞. We used exponential functions, in a way similar to the log-sum-exp model, as follows:    1 X N Lx (N ) = log exp βx(p) + exp − βx(p) , β p∈N and N L(N ) = N Lx (N ) + N Ly (N ). It is clear that N L(N ) → BB(N ) holds if β → ∞. We use β= M axRounds , M axRounds − Round + 1 where M axRounds is the number of rounds for which we want to run the algorithm. Formally the code of this subroutine is as follows: Algorithm 5 smooth edge(E) Cx = β1 log(exp(βx(E)) + exp(β(−x(E)))) Cy = β1 log(exp(βy(E)) + exp(β(−y(E)))) Return Cx + Cy Notice that after many rounds, the edge length tends to the actual Bounding-box netlength. 5.4 Possible remaining overlaps It is usually useful to stop the global placement before it removes all the overlaps. Our placer is ineffective in the very final stages of the algorithm, when the actual placement is almost legal, and only a few small overlaps should be eliminated. Therefore, we can get slightly better results if we stop the algorithm before the very final steps, and we use some other final legalization method, even a simple naive one. In our case, these final minor modifications were performed by hand. 8 6 Conclusions In this paper we gave a heuristic algorithm for the NP-hard macro placement problem. The design of the algorithm is based on a primal-dual approach to a matching problem (see Section 3, Problem 1). First, we implemented a special data structure to handle the dual (cost) function efficiently during the algorithm. This can records a multidimensional (in our case, 2-dimensional) discrete function, and performs efficiently the following two operations. It returns with the sum (integral) of the values in any rectangle, and it can increase the function with any constant in any rectangle. This data structure can also be useful for other purposes. The second part includes the heuristics (see Section 5) inspired by the Hungarian Algorithm. We suggest an algorithm that iteratively revises the primal and the dual functions. Despite a pair of optimal primal-dual solutions do not exists, this causes problems only around the finalization of the placement. Our this heuristics seemed to perform well for finding good rough positions for the macros. Therefore, we used a natural continuous transition of the primal-dual method to a simple algorithm which just enforces disjointness. There were many minor details where we found nontrivial solutions which can be used in other problems, as well. All these together provide a flexible and robust algorithm for the VLSI placement problem, which can be easily optimized for different scenarios. References [1] B. Korte, D. Rautenbach, J. Vygen, BonnTools: Mathematical Innovation for Layout and Timing Closure of Systems on a Chip, Proceedings of the IEEE (2007), 95 (3), 555-572 [2] T.F. Chan, J. Cong, J.R. Shinnerl, K. Sze, M. Xie, mPL6: enhanced multilevel mixed-size placement, Proceedings of the International Symposium on Physical Design (2006), 212-214. [3] J. Cong, G. Luo, Highly efficient gradient computation for desity-constrained analytical placement methods, Proceedings of the International Symposium on Physical Design (2008), 39-46. [4] A.R. Agnihotri, P.H. Madden, Fast Analytic Placement using Minimum Cost Flow, Proceedings of the Asia and South Pacific Design Automation Conference (2007), 128-134. [5] C.J. Alpert, T.F Chan, D.J. Huang, A.B Kahng, I.L. Markov, P. Mulet, K. Yan, Faster minimization of linear wirelength for global placement, Proceedings of the International Symposium on Physical Design (1997), 4-11. [6] H. W. Kuhn, The Hungarian Method for the assignment problem, Naval Research Logistic Quarterly, 2 (1955) 83-97. 9
8cs.DS
Markov Chain Lifting and Distributed ADMM Guilherme França∗ Boston College, Computer Science Department and Johns Hopkins University, Center for Imaging Science arXiv:1703.03859v1 [stat.ML] 10 Mar 2017 José Bento† Boston College, Computer Science Department Abstract The time to converge to the steady state of a finite Markov chain can be greatly reduced by a lifting operation, which creates a new Markov chain on an expanded state space. For a class of quadratic objectives, we show an analogous behavior where a distributed ADMM algorithm can be seen as a lifting of Gradient Descent algorithm. This provides a deep insight for its faster convergence rate under optimal parameter tuning. We conjecture that this gain is always present, as opposed to the lifting of a Markov chain which sometimes only provides a marginal speedup. ∗ [email protected][email protected] 1 I. INTRODUCTION Let M and M̂ be two finite Markov chains with states V and V̂, of sizes |V| < |V̂|, and with transition matrices M and M̂ , respectively. Let their stationary distributions be π and π̂. In some cases it is possible to use M̂ to sample from the stationary distribution of M. A formal set of conditions under which this happen is known as lifting. We say that M̂ is a lifting of M if there is a row stochastic matrix S ∈ R|V̂|×|V| with elements Sij ∈ {0, 1} and a single nonvanishing element per line, where 1|V| = S > 1|V̂| , and 1n is the all-ones n-dimensional vector, such that π = S > π̂, Dπ M = S > Dπ̂ M̂ S. (1) We denote S > the transpose of S, and for any vector v ∈ Rn , Dv = diag(v1 , . . . , vn ). Intuitively, M̂ contains copies of the states of M and transition probabilities between the extended sates V̂ such that it is possible to collapse M̂ onto M. This is the meaning of relation (1). See Fig. 1 for an illustration. (We refer to [1] for more details on Markov chain lifting.) The mixing time H is a measure of the time it takes for the distribution of a Markov chain M to approach stationarity. We follow the definitions of [1] but, up to multiplicative factors and slightly loser bounds, the reader can think of H = min{t : max |pti − πi | < 1/4}, 0 {i,p } (2) where pti is the probability of being on state i after t steps, starting from the initial distribution p0 . Lifting is particularly useful when the mixing time Ĥ of the lifted chain is much √ smaller than H. There are several examples where Ĥ ≈ C H, for some constant C ∈ (0, 1) which depends only on π. However, there is a limit on how much speedup can be achieved. √ If M is irreducible, then Ĥ ≥ C H. If M and M̂ are reversible, then the limitation is even stronger, Ĥ ≥ CH. Consider the undirected and connected graph G = (V, E), with vertex set V and edge set E. Let z ∈ R|V| with components zi , and consider the quadratic problem n o 1 X min f (z) = qij (zi − zj )2 . 2 z∈R|V| (3) (i,j)∈E We also write qij = qe for e = (i, j) ∈ E. There is a connection between solving (3) by Gradient Descent (GD) algorithm and the evolution of a Markov chain. To see this, 2 M̂ M x y x̂ ŷ x̂ collapse ẑ ẑ ŷ FIG. 1. The base Markov chain M over the cycle graph C4 and its lifted Markov chain M̂ with duplicate states. Each state in V (green nodes) is expanded into two states in V̂ (blue and red nodes above each other). consider qe = 1 for simplicity. The GD iteration with step-size α > 0 is given by z t+1 = (I − α∇f ) z t = (I − αDd (I − W )) z t (4) where W = Dd−1 A is the transition matrix of a random walk on G, A is the adjacency matrix, and Dd is the degree matrix, where d = diag(d1 , . . . , d|V| ). This connection is specially clear for d-regular graphs. Choosing α = 1/d, equation (4) simplifies to z t+1 = W z t . In particular, the convergence rate of GD is determined by the spectrum of W , which is connected to the mixing time of M. More precisely, when W is irreducible and aperiodic, and denoting λ2 (W ) its second largest eigenvalue in absolute value, the mixing time of the Markov chain and the convergence time of GD are both equal to H= C C ≈ log(1/|λ2 |) 1 − |λ2 | (5) where the constant C comes from the tolerance error, which in (2) is 1/4. In the above approximation we assumed λ2 ≈ 1. Therefore, at least for GD, we can use the theory of Markov chains to analyze the convergence rate when solving optimization problems. For this example, and whenever there is linear convergence, the convergence rate τ and the convergence time H are related by τ H = Θ(1). For an introduction on Markov chains, mixing times, and transition matrix eigenvalues, we refer the reader to [2]. The main goal of this paper is to extend the above connection to the over-relaxed Alternating Direction Method of Multipliers (ADMM) algorithm, and the concept of lifting will play an important role. Specifically, for problem (3), we show that a distributed implementation of over-relaxed ADMM can be seen as a lifting of GD, in the same way that M̂ is a lifting of the Markov chain M. More precisely, there is a matrix MA with stationary vector 3 Lifted Markov Chain ADMM lifting lifting GD Markov Chain FIG. 2. GD is the analogue of a Markov chain, while distributed ADMM is the analogue of a lifted version of this Markov chain, which mixes faster. vA associated to distributed ADMM, and a matrix MG with stationary vector vG associated to GD, such that relation (1) is satisfied. This duality is summarized in Fig. 2. In some cases, MA might have a few negative entries preventing it from being the transition matrix of a Markov chain. However, it always satisfies all the other properties of Markov matrices. As explained in the example preceding (5), the convergence time of an algorithm can be related to the mixing time of a Markov chain. Let HA be the convergence time of ADMM, and HG the convergence time of GD. The lifting relation between both algorithms strongly suggest that, for problem (3) and optimally tuned parameters, ADMM is always faster than GD. Since lifting can speed mixing times of Markov chains up to a square root factor, we ? ? conjecture that the optimal convergence times HA and HG are related as ∗ HA ≤C p ∗ HG , (6) where C > 0 is a universal constant. Moreover, we conjecture that (6) holds for any connected graph G. Note that (6) is much stronger than the analogous relation for lifted of Markov chains, where for some graphs, e.g. with low conductance, the gain is marginal. The outline of this paper is the following. After mentioning related works in Section II, we state our main results in Section III, which shows that distributed implementations of over-relaxed ADMM and GD obey the lifting relation (1). The proofs can be found in the Appendix. In Section IV we support conjecture (6) with numerical evidence. We present our final remarks in Section V. II. RELATED WORK AND AN OPEN PROBLEM We state conjecture (6) for the relatively simple problem (3), but, to the best of our knowledge, it cannot be resolved through the existing literature. We compare the exact 4 asymptotic convergence rates after optimal tuning of ADMM and GD, while the majority of previous papers focus on upper bounding the global convergence rate of ADMM and, at best, optimize such an upper bound. Furthermore, to obtain linear convergence, strong convexity is usually assumed [3], which does not hold for problem (3). Most results not requiring strong convexity focus on the convergence rate of the objective function, as opposed to this paper which focus on the convergence rate of the variables; see [4] for example. Few papers consider a consensus problem with an objective function different than (3). P P For instance, [5] considers f (z) = i∈V kzi − ci k2 , subject to zi = zj if (i, j) ∈ E, where ci > 0 are constants. This problem is strongly convex and does not reduce to (3), and P vice-versa. Other branch of research consider f (z) = i fi (z) with ADMM iterations that are agnostic to whether or not fi (z) depends on a subset of the components of z; see [6] and references therein. These are in contrast with our setting where decentralized ADMM is a message-passing algorithm [7], and the messages between agents i and j are only associated to the variables shared by functions fi and fj . For quadratic problems, there are explicit results on the convergence rate and optimal parameters of ADMM [8–10]. However, their assumptions do not hold for the non strongly convex distributed problem considered in this paper. Moreover, there are very few results comparing the optimal convergence rate of ADMM as a function of the optimal convergence rate of GD. For a centralized setting, an explicit comparison is provided in [11], but it assumes strong convexity. Finally, and most importantly, there is no prior result connecting GD and ADMM to lifted Markov chains. Lifted Markov chains were previously employed to speedup convergence time of distributed averaging and gossip algorithms [12–14], but these do not involve ADMM algorithm. III. ADMM AS A LIFTING OF GRADIENT DESCENT We now show that the lifting relation (1) holds when distributed implementations of over-relaxed ADMM and GD are applied to problem (3) defined over the graph G = (V, E). ˆ Let us introduce the extended set of variables x ∈ R|E| , where Ê = {(e, i) : e ∈ E, i ∈ e, and i ∈ V}. 5 (7) Note that |Ê| = 2|E|. Each component of x is indexed by a pair (e, i) ∈ Ê. For simplicity we denote ei = (e, i). We can now write (3) as n o 1 X min f (x) = qe (xei − xej )2 x,z 2 (8) e=(i,j)∈E subject to xei = zi , xej = zj , for all e = (i, j) ∈ E. The new variables are defined according to the following diagram: e = (i, j) zi zj 1 > x Qx 2 Notice that we can also write f (x) = edge e = (i, j), in the form Qe = qe zi  +1 −1 −1 +1 x ei Qe x ej zj where Q is block diagonal, one block per . Let us define the matrix S ∈ R|Ê|×|V| with components Sei ,i = Sej ,j =   1 if e = (i, j) ∈ E, (9)  0 otherwise. The distributed over-relaxed ADMM is a first order method that operates on five variables: x and z defined above, and also u, m and n introduced below. It depends on the relaxation parameter γ ∈ (0, 2), and several penalty parameters ρ ∈ R|Ê| . The components of ρ are ρei > 0 for ei ∈ Ê; see [7, 11] and also [15] for details on multiple ρ’s. We can now write ADMM iterations as xt+1 = Ant , mt+1 = γxt+1 + ut , st+1 = (1 − γ)st + Bmt+1 , (10) ut+1 = ut + γxt+1 + (1 − γ)st − st+1 , nt+1 = st+1 − ut+1 , where st = Sz t , B = S(S > Dρ S)−1 S > Dρ , and A = (I + Dρ−1 Q)−1 . The next result shows that these iterations are equivalent to a linear system in |Ê| dimensions. (The proofs of the following results are in the Appendix.) Theorem 1 (Linear Evolution of ADMM). Iterations (10) are equivalent to nt+1 = TA nt , TA = I − γ(A + B − 2BA), with st = Bnt and ut = −(I − B)nt . All the variables of ADMM depend only on nt . 6 (11) We can also write GD update z t+1 = (I − α∇f )z t to problem (3) as TG = I − αS > QS. z t+1 = TG z t , (12) In the following, we establish lifting relations between distributed ADMM and GD in terms of matrices MA and MG , which are very closely related but not necessarily equal to TA and TG . They are defined as MG = (I − DG )−1 (TG − DG ), (13) MA = (I − DA )−1 (TA − DA ), (14) where DG 6= I and DA 6= I are, for the moment, arbitrary diagonal matrices. Let us also introduce the vectors vG = (I − DG )1, (15) vA = (I − DA )ρ. (16) As shown below, these matrices and vectors satisfy relation (1). Moreover, MG can be interpreted as a probability transition matrix, and the rows of MA sum up to one. We only lack the strict non-negativity of MA , which in general is not a probability transition matrix. Thus, in general, we do not have a lifting between Markov chains, however, we still have lifting in the sense that MA can be collapsed onto MG according to (1). Theorem 2. For (DG )ii < 1 and sufficiently small α, MG in (13) is a doubly stochastic matrix. Lemma 3. The rows of MG and MA sum up to one, i.e. MG 1 = 1 and MA 1 = 1. Moreover, > > vG MG = vG and vA> MA = vA> . These properties are shared with Markov matrices. Theorem 4 (ADMM as a Lifting of GD). MA and MG defined in (13) and (14) satisfy relation (1), namely, vG = S > vA , DvG MG = S > DvA MA S, (17) provided DG , DA , α, γ, and ρ are related according to S > Dρ (I − DA )S = I − DG , γ qe ρei ,i ρej ,j , α= ρei ,i ρej ,j + qe ρei ,i + ρej ,j (18) (19) for all e = (i, j) ∈ E. Equation (19) restricts the components of ρ, and (17) is an equation for DA and DG . 7 Theorem 5 (Negative Probabilities). There exists a graph G such that, for any diagonal matrix DA , ρ and γ, the matrix MA has at least one negative entry. Thus, in general, MA is not a probability transition matrix. For concreteness, let us consider some explicit examples illustrating Theorem 4. Regular Graphs. Let us consider the solution to equations (18) and (19) for d-regular graphs. Fix qe = 1 and ρ = ρ1 for simplicity. Equation (18) is satisfied with DA = (1 − (ρ|Ê|)−1 )I, DG = (1 − |V|−1 )I, (20) since d|V| = |Ê| = 2|E|, while (19) requires α= γρ . 2+ρ (21) Notice that (DG )ii < 1 for all i, so choosing γ or ρ small enough we can make MG positive. > 1= Moreover, the components of (15) and (16) are non-negative and sum up to one, i.e. vG vA> 1 = 1, thus these vectors are stationary probability distributions of MG and MA . Cycle Graph. Consider solving (3) over the 4-node cycle graph G = C4 shown in Fig. 1. By direct computation and upon using (20) we obtain  x̂ 0 0 0 0   0 x̂ ẑ ŷ 0     ŷ ẑ x̂ 0 0 x y 0 y      0 0 0 x̂ ẑ y x y 0     , M = MG =    A  0 0 ŷ ẑ x̂ 0 y x y       0 0 ŷ 0 0 y 0 y x    0 0 0 0 ŷ  ẑ ŷ 0 0 0 0 ŷ ẑ 0 0 0 0 ŷ 0 0 0 x̂ ẑ ẑ x̂   0   0   0  , 0   ŷ    0  (22) 0 0 x̂ where the probabilities of MG are given by x = 1 − 8α and x + 2y = 1, and the probabilities of MA are x̂ = 1 − 4γρ, ŷ = 8γρ/(2 + ρ) and x̂ + ŷ + ẑ = 1. The stationary probability vectors are π = 41 1 and π̂ = 18 1. Now (17) holds provided the parameters are related as (21). Moreover, in this particular case the matrix MA is strictly non-negative, thus ADMM is a lifting of GD in the Markov chain sense. Based on the above theorems we propose conjecture (6). The convergence rate τ is related to the convergence time, for instance H ∼ (1 − τ )−1 if τ ≈ 1. Thus, let τG? and τA? be the 8 optimal convergence rates of GD and ADMM, respectively. Then, at least for objective (3), and for any G, we conjecture that there is some universal constant C > 0 such that 1 − τA? ≥ C IV. p 1 − τG? . (23) NUMERICAL EVIDENCE For many graphs, we observe very few negative entries in MA , which can be further reduced by adjusting the parameters ρ and γ. Nonetheless, in general, the lack of strict non-negativity of MA prevents us from directly applying the theory of lifted Markov chains to prove (23). However, there is compelling numerical evidence to (23) as we now show. Consider a sequence of graphs {Gn }, where n = |V|, such that τG? → 1 and τA? → 1 as n → ∞. Denote RG (n) = (1 − τG? )−1 and RA (n) = (1 − τA? )−1 . We look for the smallest β such that RA (n) ≤ C RG (n)β , for some C > 0, and all large enough n. If (23) was false, there would exist sequences {Gn } for which β > 1/2. For instance, if {Gn } have low conductance it is well-known that lifting does not speedup the mixing time and we could find β = 1. To numerically find β, we plot β̂1 = log RA (n) log RG (n) and β̂2 = RG (n) ∆RA (n) RA (n) ∆RG (n) (24) against n, where ∆h(n) = h(n + 1) − h(n) for any function h(n). The idea behind this is very simple. Let f (x) = Cg(x)β , and f, g → ∞ as x → ∞. Then, log f /log g → β and also ∂x log f /∂x log g = (g ∂x f )/(f ∂x g) → β as x → ∞. Thus, we analyze (24) which are their discrete analogue. Given a graph Gn , from (12) and (11) we numerically compute τ = maxj {|λj (T )| : |λj (T )| < 1}. The optimal convergence rates are thus given by τG? = minα τG and τA? = min{γ,ρ} τA , where we consider ρ = ρ1 with ρ > 0. In Fig. 3 we show the three different graphs considered in the numerical analysis contained in the respective plots of Fig. 4. We show the values of (24) versus n, and also the curves log RA and log RG against n, which for visualization purposes are scaled by the factor −0.03. In Fig. 4a we see that (6), or equivalently (23), holds for the cycle graph G = Cn . The same is true for the periodic grid, or torus grid graph G = Tn , as shown in Fig. 4b. Surprisingly, as shown in Fig. 4c, we get the same square root speedup for a barbell graph, whose random 9 (a) (b) (c) We consider the following graphs for numerical analysis. (a) Cycle graph, G = Cn . (b) FIG. 3. Torus or periodic grid graph, G = Tn = C√n × C√n . (c) Barbel graph, obtained by connecting two complete graphs Kn by a bridge. 0.5 0.5 0.5 β̂2 0.4 β̂1 0.4 −0.03 log RG 0.3 0.2 β̂2 β̂1 0.3 0.3 0.2 −0.03 log RA 0.1 0.0 0.2 500 1000 1500 2000 2500 (a) 3000 3500 −0.03 log RG −0.03 log RG 0.1 0.1 −0.03 log RA 0.0 0 β̂2 β̂1 0.4 0 2000 4000 6000 (b) 8000 10 000 −0.03 log RA 0.0 0 50 100 150 200 (c) FIG. 4. Plot of (24) versus n, and also log RA and log RG versus n, scaled by −0.03 for visualization purposes only. The sequence of graphs {Gn } in each plot are of the types indicated in Fig. 3, in the same respective order. Notice that β̂1 , β̂2 ≤ 1/2, and β̂1 and βˆ2 gets very close to 1/2 for large n. (a) Cycle graph. (b) Torus grid graph. The two green curves occur because odd and even n behave differently. (c) Barbell graph. A Markov chain over this graph does not speedup via lifting, however, (23) still holds. walk is known to not speedup via lifting. We find similar behavior for several other graphs but we omit these results due to the lack of space. V. CONCLUSION For a class of quadratic problems (3) we established a duality between lifted Markov chains and two important distributed optimization algorithms, GD and over-relaxed ADMM; see Fig. 2. We proved that precisely the same relation defining lifting of Markov chains (1), is satisfied between ADMM and GD. This is the content of Theorem 4. Although the lifting 10 relation holds, in general, we cannot guarantee that the matrix MA associated to ADMM is a probability transition matrix, since it might have a few negative entries. Therefore, in general, Theorem 4 is not a Markov chain lifting, but it is a lifting in a graph theoretical sense. These negative entries actually make this parallel even more interesting since (6), or equivalently (23), do not violate theorems of lifted Markov chains where the square root improvement is a lower bound, thus the best possible, and in (6) it is an upper bound. For graphs with low conductance, the speedup given by Markov chain lifting is negligible. On the other hand, the lifting between ADMM and GD seems to always give the best possible speedup achieved by Markov chains, even for graphs with low conductance. This is numerically confirmed in Fig. 4c. Due to the strong analogy with lifted Markov chains and numerical evidence, we conjectured the upper bound (6), or (23), which was well supported numerically. However, its formal explanation remains open. Finally, although we considered a simple class of quadratic objectives, when close to the minimum the leading order term of more general convex functions is usually quadratic. In the cases where the dominant term is close to the form (3), the results presented in this paper should still hold. An attempt to prove our conjecture (23) is under investigation1 . ACKNOWLEDGMENT We would like to thank Andrea Montanari for his guidance and useful discussions. We also would like to thank the anonymous referees for careful reading of the manuscript and useful suggestions. This work was partially supported by an NIH/NIAID grant U01AI124302. Appendix A: Proof of Main Results In the main part of the paper we introduced the extended edge set Ê which essentially duplicates the edges of the original graph, |Ê| = 2|E|. This is the shortest route to state our results concisely but it complicates the notation in the following proofs. Therefore, we first introduce the notion of a factor graph for problem (3). 1 Note added: soon after the acceptance of this paper, we found a proof of (23) for a class of quadratic problems. These results will be presented elsewhere. 11 x34 z4 f3 z3 x53 x44 f4 x23 f5 x41 z1 x33 f2 x22 x51 f1 x11 z2 x12 FIG. 5. Example of a factor graph Ḡ for problem (3), and (8), where G is the complete graph K4 with one edge removed. 1. Factor Graph The factor graph Ḡ = (F̄, V̄, Ē) for problem (3) is a bipartite graph that summarizes how different variables are shared across different terms in the objective. This is illustrated in Fig. 5, where for this case (3) is given by f (z) = q 1 (z1 − z2 )2 + q 2 (z2 − z3 )2 + q 3 (z3 − z4 )2 (A1) + q 4 (z4 − z1 )2 + q 5 (z4 − z2 )2 while (8) is given by f (x) = q 1 (x12 − x11 )2 + q 2 (x23 − x22 )2 3 2 4 2 5 (A2) 2 + q (x34 − x33 ) + q (x41 − x44 ) + q (x45 − x52 ) where x11 = x41 , x12 = x22 , x23 = x33 , and x44 = x34 . The factor graph Ḡ has two sets of vertices, F̄ and V̄. The circles in Fig. 5 represent the nodes in V̄ = V, and the squares represent the nodes in F̄ = E, where G = (V, E) is the original graph. Note that each a ∈ F̄ is uniquely associated to one edge e ∈ E, and uniquely associated to one term in the sum of the objective. In equation (8) we referred to each term as fe = qe (xei − xej )2 , but now we refer to it by fa . With a slightly abuse of notation we indiscriminately write a ∈ F̄ or fa ∈ F̄. Each node b ∈ V̄ is uniquely associated to one node i ∈ V, and uniquely associated to one component of z. Before we referred to this variable by zi , but now we refer to it by zb , and indiscriminately write b ∈ F̄ or zb ∈ F̄. Each edge 12 (a, b) ∈ Ē must have a ∈ F̄ and b ∈ V̄, and its existence implies that the function fa depends on variable zb . Moreover, each edge (a, b) ∈ Ē is also uniquely associated to one component of x in the equivalent formulation (8). In particular, if a ∈ Ē is associated to e ∈ E, and b ∈ V̄ is associated to i ∈ V, then (a, b) ∈ Ē is associated to xei . Here, we denote xei by xab . Thus, we can think of Ē as being the same as Ê. Another way of thinking of Ē and x is as follows. If (a, b) ∈ Ē then xab = zb appears as a constraint in (8). Let us introduce the neighbor set of a given node in Ḡ. For a ∈ F̄, the independent variables of fa are in the set Na = {b ∈ V̄ : (a, b) ∈ Ḡ}. (A3) Analogously, for b ∈ V̄, the functions that depend on zb are in the set Nb = {a ∈ F̄ : (a, b) ∈ Ḡ}. (A4) In other words, N• denotes the neighbors of either circle or square nodes in Ḡ. For a ∈ F̄ we define Ia = {e ∈ Ē : e is incident on a}. (A5) Ib = {e ∈ Ē : e is incident on b}. (A6) For b ∈ V̄ we define If we re-write problem (8) using this new notation, which indexes variables by the position they the take on Ḡ, the objective function takes the form 1X > a 1 x Q xa f (x) = x> Qx = 2 2 a∈F a (A7) where Q ∈ RĒ×Ē is block diagonal and each block, now indexed by a ∈ F̄, takes the form  −1 a > a Qa = q a +1 −1 +1 , where q > 0, and xa = (xab , xac ) for (a, b) ∈ Ē and (a, c) ∈ Ē. Here, q is the same as qe in the main text. We also have the constraints xab = xa0 b = zb for each a, a0 ∈ Nb and b ∈ V̄. The row stochastic matrix S introduced in the ADMM iterations is now expressed as S ∈ R|Ē|×|V̄| and has a single 1 per row such that Seb = 1 if and only if edge e ∈ Ē is incident on b ∈ V̄. Notice that S > S = Dd is the degree matrix of the original graph G. With this notation at hands, we now proceed to the proofs. 13 2. Proof of Theorem 1 Recall that B = S(S > Dρ S)−1 S > Dρ , thus B 2 = B is a projection operator, and B ⊥ = I − B its orthogonal complement. Consider updates (10). Substituting xt+1 and mt+1 into the other variables we obtain       t+1 I 0 0 s (1 − γ)I B γBA st              I I 0 ut+1  = (1 − γ)I I γA  ut        nt+1 nt −I I I 0 0 0 which can be easily inverted yielding st+1 = (1 − γ)st + But + γBAnt , (A8) ut+1 = B ⊥ ut + γB ⊥ Ant , (A9) nt+1 = (1 − γ)st + (B − B ⊥ )ut + γ(B − B ⊥ )Ant . (A10) Note the following important relations: Bnt = st , B ⊥ nt = −ut , (A11) Bst = st , B ⊥ st = 0, (A12) B ⊥ ut = ut , But = 0. (A13) Equation (A12) is a simple consequence of the definition of B, i.e. B st = S(S > Dρ S)−1 (S > Dρ S)z t = st , (A14) which also implies B ⊥ st = 0. Since BB ⊥ = 0, acting with B over (A9) implies But = 0 for every t, and also B ⊥ ut = ut , which shows (A13). Now (A11) follows from these facts and the own definition nt = st − ut . Finally, applying (A11) on (A10) we obtain nt+1 = TA nt where TA = I − γ(A + B − 2BA). 3. Proof of Theorem 2 Write Q = Q+ + Q− where Q+ is diagonal and has only positive entries, and Q− only has off-diagonal and negative entries. First, notice that (S > Q+ S) is also diagonal. Indeed, 14 for b ∈ V̄ and c ∈ V̄, (S > Q+ S)bc = P e∈Ē Seb Q+ ee Sec = δbc P e∈Ib Q+ ee where δ is the Kronecker delta. By a similar argument, S > Q− S is off-diagonal. Hence, if b 6= c we have (TG )bc = −α XX e∈Ib e0 ∈Ic Q− ee0 ≥ 0. (A15) Recall that MG = (I − DG )−1 (TG − DG ), where DG 6= I is diagonal. For MG to be nonnegative we first impose that (DG )bb < 1 for all b ∈ V̄. Then, since the off-diagonal elements of TG are automatically positive by (A15), we just need to consider the diagonal elements of TG − DG . Thus we require that for every b ∈ V̄, 1−α Denoting Qmax = maxb∈V̄ P e∈Ib X e∈Ib Qee + (DG )bb ≥ 0. (A16) Qee and DG,min the smallest element of DG , the matrix MG will be non-negative provided α ≤ (1 + DG,min )/Qmax . Notice that S1|V̄| = 1|Ē| and Q1 = 0. Thus S > QS1 = 0, implying TG 1 = 1, and 1> TG = 1> . From this we have MG 1 = 1 and 1> MG = 1> , so all the rows and columns of MG sum up to one. 4. Proof of Lemma 3 We proved above that MG is a doubly stochastic matrix. Now let us consider MA . Recall the definition of B = S > (S > Dρ S)−1 S > Dρ . Note that the action of B on a vector v ∈ R|Ē| is to take a weighted average of its components, namely, if (a, b) ∈ Ē then P c∈N ρcb vcb (Bv)ab = P b . c∈Nb ρcb (A17) Therefore, B1 = 1. Recall that Q1 = 0, thus A1 = 1, where A = (I + Dρ−1 Q)−1 , which implies TA 1 = 1, and in turn MA 1 = 1. Now the other relations follow trivially. 5. Proof of Theorem 4 Due to the block diagonal structure of Q it is possible write A explicitly as A = I − F Q, 15 (A18) where F is a block diagonal matrix with |F̄| blocks. Each block F a , for a ∈ F̄, is of the form  a Fa =  ρ 0 q  ac , a ρab ρac + q (ρab + ρac ) 0 ρab (A19) where b, c ∈ Na . Now by the definition of B we have S > Dρ B = S > Dρ . Hence, S > DvA MA S = S > Dρ (I − DA )S − γS > Dρ F QS, DvG MG = (I − DG ) − αS > QS. (A20) (A21) Equating the first term of (A20) to the first term of (A21), and also the second terms to each other, on using (A18) we obtain S > Dρ (I − DA )S = I − DG , (A22) α= (A23) γ q a ρab ρac , ρab ρac + q a (ρab + ρbc ) where (A23) must hold for all a ∈ F̄ and b, c ∈ Na . This gives the second equality in (17) together with relations (18) and (19). Finally, since diagonal matrices commute, S > vA = S > (I − DA )Dρ S1|V̄| = (I − DG )1|V̄| = vG , which gives the first relation in (17). 6. Proof of Theorem 5 It suffices to show one example with at least one negative entry. Let G be the complete graph K4 with one edge removed, as shown in Fig. 5. By direct inspection one finds the following sub-matrix of TA :  T (S) =  (TA )21 (TA )24 (TA )31 (TA )34   (A24) whose elements are explicitly given by (TA )21 = (TA )24 = (TA )31 = γ ρ11 (ρ12 −ρ22 ) , (ρ12 +ρ22 )(ρ11 +ρ12 +ρ11 ρ12 ) 2γ −1 (ρ12 +ρ22 ) 1+ρ−1 22 +ρ23 2γ −1 (ρ12 +ρ22 ) 1+ρ−1 11 +ρ12 , (A26) , (A27) 23 (ρ12 −ρ22 ) . (TA )34 = − (ρ12 +ργ22ρ)(ρ 22 +ρ23 +ρ22 ρ23 ) 16 (A25) (A28) First notice that subtracting DA from TA does not affect T (S) . Now recall that all components of ρ must be strictly positive. The elements (A25) and (A28) have opposite signs, so one of them is negative. Since (A26) and (A27) are both positive, one cannot remove the negative entries of an entire row of TA by multiplying TA by the diagonal matrix (I − DA )−1 . Therefore, MA = (I − DA )−1 (TA − DA ) has at least one negative entry. [1] F. Chen, L. Lovász, and L. Pak. Lifting Markov Chains to Speed up Mixing. In Proceedings of the thirty-first annual ACM symposium on Theory of computing, pages 275–281, 1999. [2] J. Norris. Markov Chains. Cambridge University Press, Cambridge, 1998. [3] W. Shi, Q. Ling, K. Yuan, G. Wu, and W. Yin. On the Linear Convergence of the ADMM in Decentralized Consensus Optimization. IEEE Transactions on Signal Processing, 62(7):1750– 1761, 2014. [4] D. Davis and W. Yin. Convergence Rate Analysis of Several Splitting Schemes. arXiv preprint arXiv:1406.4834, 2014. [5] T. Erseghe, D. Zennaro, E. Dall’Anese, and L. Vangelista. Fast Consensus by the Alternating Direction Multipliers Method. IEEE Transactions on Signal Processing, 59(11):5523–5537, 2011. [6] E. Wei and A. Ozdaglar. Distributed Alternating Direction Method of Multipliers. In 2012 IEEE 51st IEEE Conference on Decision and Control (CDC), pages 5445–5450. IEEE, 2012. [7] N. Derbinsky, J. Bento, V. Elser, and J. Yedidia. An Improved Three-Weight Message Passing Algorithm. arXiv:1305.1961v1 [cs.AI], 2013. [8] André Teixeira, Euhanna Ghadimi, Iman Shames, Henrik Sandberg, and Mikael Johansson. Optimal Scaling of the ADMM Algorithm for Distributed Quadratic Programming. In 52nd IEEE Conference on Decision and Control, pages 6868–6873. IEEE, 2013. [9] E. Ghadimi, A. Teixeira, I. Shames, and M. Johansson. Optimal Parameter Selection for the Alternating Direction Method of Multipliers (ADMM): Quadratic Problems. IEEE Transactions on Automatic Control, 60(3):644–658, 2015. [10] F. Iutzeler, P. Bianchi, P. Ciblat, and W. Hachem. Explicit Convergence Rate of a Distributed Alternating Direction Method of Multipliers. IEEE Transactions on Automatic Control, 61(4):892–904, 2016. 17 [11] G. França and J. Bento. An Explicit Rate Bound for Over-Relaxed ADMM. In IEEE International Symposium on Information Theory, ISIT 2016, Barcelona, Spain, July 10-15, 2016, pages 2104–2108, 2016. [12] K. Jung, D. Shah, and J. Shin. Fast Gossip Through Lifted Markov Chains. In Proc. Allerton Conf. on Comm., Control, and Computing, Urbana-Champaign, IL, 2007. [13] W. Li, H. Dai, and Y. Zhang. Location-Aided Fast Distributed Consensus in Wireless Networks. IEEE Transactions on Information Theory, 56(12):6208–6227, 2010. [14] K. Jung, D. Shah, and J. Shin. Distributed averaging via lifted markov chains. IEEE Transactions on Information Theory, 56(1):634–647, 2010. [15] J. Bento, N. Derbinsky, J. Alonso-Mora, and J. Yedidia. A Message-Passing Algorithm for Multi-Agent Trajectory Planning. In C. J. C. Burges, L. Bottou, M. Welling, Z. Ghahramani, and K. Q. Weinberger, editors, Advances in Neural Information Processing Systems 26, pages 521–529. Curran Associates, Inc., 2013. 18
8cs.DS
arXiv:1711.02233v1 [cs.IT] 7 Nov 2017 RUDIN-SHAPIRO-LIKE POLYNOMIALS WITH MAXIMUM ASYMPTOTIC MERIT FACTOR DANIEL J. KATZ AND STANISLAV A. TRUNOV Abstract. Borwein and Mossinghoff investigated the Rudin-Shapirolike polynomials, which are infinite families of Littlewood polynomials, that is, polynomials whose coefficients are all in {−1, 1}. Each family of Rudin-Shapiro-like polynomials is obtained from a starting polynomial (which we call the seed) by a recursive construction. These polynomials can be regarded as binary sequences. Borwein and Mossinghoff show that the asymptotic autocorrelation merit factor for any such family is at most 3, and found the seeds of length 40 or less that produce the maximum asymptotic merit factor of 3. The definition of RudinShapiro-like polynomials was generalized by Katz, Lee, and Trunov to include polynomials with arbitrary complex coefficients, with the sole condition that the seed polynomial must have a nonzero constant coefficient. They proved that the maximum asymptotic merit factor is 3 for this larger class. Here we show that a family of such Rudin-Shapiro-like polynomials achieves asymptotic merit factor 3 if and only if the seed is the interleaving of a pair of Golay complementary sequences. In this paper, we assume that all the definitions from the introduction and from Section 2 (up to Lemma 2.2) of the paper of Katz, Lee, and Trunov [3] are in force, so one should read that first. Recall that a sequence (f0 , f1 , . . . , fℓ−1 ) ∈ Cℓ of length ℓ is identified with the polynomial f (z) = f0 + f1 z + · · · + fℓ−1 z ℓ−1 ∈ C[x]. Recall from the introduction of [3] that if f is a sequence, then ADF(f ) is the autocorrelation demerit factor of f , which is the sum of the squared magnitudes of the autocorrelation values of f at all nonzero shifts divided by the squared length of f . The autocorrelation merit factor of f is the reciprocal of its demerit factor, and our goal is to obtain sequences with high merit factor, or equivalently, low demerit factor, which indicates low mean square magnitude autocorrelation. Recall from [3, Theorem 1.2] that if (f0 , f1 , . . .) is a sequence of RudinShapiro-like polynomials generated from the seed f0 ∈ C[z] with nonzero constant coefficient, then (1) lim ADF(fn ) = −1 + n→∞ 2 kf0 k44 + kf0 fe0 k22 1 · ≥ . 4 3 3 kf0 k2 Date: 06 November 2017. This paper is based on work of the two authors supported in part by the National Science Foundation under Grant DMS 1500856. 1 2 DANIEL J. KATZ AND STANISLAV A. TRUNOV This is a generalization of the result of Borwein-Mossinghoff [1, Corollary 1], who prove the special case when the Rudin-Shapiro polynomials are Littlewood polynomials, that is, polynomials whose coefficients are all in {−1, 1}. We are interested when the inequality becomes an equality, that is, when the asymptotic autocorrelation demerit factor is precisely 1/3, or equivalently, when the asymptotic autocorrelation merit factor is precisely 3. To give a criterion for this, we need to explain two more concepts: interleaving and Golay complementary pairs. If f (z), g(z) ∈ C[z] are a pair of polynomials, then the interleaving of f and g is f (z 2 )+zg(z 2 ). If f (z) and g(z) both represent sequences of length ℓ, then their interleaving represents the sequence (f0 , g0 , f1 , g1 , . . . , fℓ−1 , gℓ−1 ) of length 2ℓ. We say that a pair of polynomials f (z), g(z) ∈ C[z] with nonzero constant coefficients is a Golay complementary pair when f (z)f (z) + g(z)g(z) is a constant. These were first used by Golay in [2]. In terms of autocorrelation, this means that Cf,f (s) + Cg,g (s) = 0 for every nonzero shift s. In our notation from Section 2 of [3], the condition for (f, g) to be a Golay pair is that |f (z)|2 + |g(z)|2 be a constant polynomial, which means that |f (z)|2 + |g(z)|2 is constant for z on the complex unit circle. Note that if f and g have different degrees, then (f, g) cannot be a Golay pair: the polynomial of higher degree d will have a nonzero correlation value at shift d, while the shorter one will have a zero correlation value at that shift, and so the sum of these correlations cannot be zero. Now we can state our theorem. Theorem 1. Let (f0 , f1 , . . .) be a sequence of Rudin-Shapiro polynomials generated from seed f0 ∈ C[z]. Then limn→∞ ADF(fn ) = 1/3 if and only either f0 is constant or is the interleaving of a Golay complementary pair. Proof. By (1), we autocorrelation demerit factor is 1/3  see that the limiting  4 2 if and only if kf0 k4 + kf0 fe0 k2 /kf0 k42 = 2. If f0 is a constant, this is clearly true, so we shall assume that f0 is nonconstant henceforth. Recall that since the definitions of the introduction of [3] are in force, f0 has a nonzero constant coefficient. We select polynomials g(z), h(z) ∈ C[z] such that f is the interleaving of g and h, that is, f (z) = g(z 2 ) + zh(z 2 ). For any a(z) ∈ C[z], we note that kak22 is the sum of the squared magnitudes of the coefficients of a(z). Therefore, since the coefficients of f0 (z) are just the coefficients of g and h interleaved, we have kf0 k22 = kgk22 + khk22 . (2) Also kf0 k44 + kf0 fe0 k22 = Z |f0 (z)|2 |g(z 2 ) + zh(z 2 )|2 + |g(z 2 ) − zh(z 2 )|2 Z  = 2 |f0 (z)|2 |g(z 2 )|2 + |zh(z 2 )|2 .  RUDIN-SHAPIRO-LIKE POLYNOMIALS 3 Now note that |zh(z 2 )|2 = |h(z 2 )|2 since |z| = 1 on the complex unit circle. We set a(z) = |g(z)|2 + |h(z)|2 , and so Z 4 2 e kf0 k4 + kf0 f0 k2 = 2 |g(z 2 ) + zh(z 2 )|2 a(z 2 ) Z   a(z 2 ) + g(z 2 )z −1 h(z 2 ) + g(z 2 )zh(z 2 ) a(z 2 ), =2 R and since z j = 0 when j 6= 0, we can drop the terms that have odd degree to obtain Z 4 2 e kf0 k4 + kf0 f0 k2 = 2 a(z 2 )2 Z (3) = 2 a(z)2 = 2k|g(z)|2 + |h(z)|2 k22 , R R where we have used the fact that z 2j = z j for every j ∈ Z in the second equality. Note that kgk22 + khk22 is the constant term of |g(z)|2 + |h(z)|2 , and since k|g(z)|2 + |h(z)|2 k22 is the sum of the squared magnitudes of all the coefficients of |g(z)|2 + |h(z)|2 , this means that 2 k|g(z)|2 + |h(z)|2 k22 ≥ kgk22 + khk22 , with equality if and only if |g(z)|2 + |h(z)|2 is a constant, that is, if and only if (g, h) is a Golay pair. We use our equalities (2) and (3) above to express the left and right hand sides in terms of f0 , and see that  2 1 kf0 k44 + kf0 fe0 k22 ≥ kf0 k22 , 2 with equality if and only if (g, h) is a Golay pair. Or equivalently (since kf0 k22 6= 0 because it is the sum of the squared magnitudes of the coefficients of f0 , which is nonzero), kf0 k44 + kf0 fe0 k22 ≥ 2, kf0 k42 with equality if and only if (g, h) is a Golay pair. So by (1), our nonconstant seed f0 gives rise to a sequence (f0 , f1 , . . .) of Rudin-Shapiro-like polynomials with asymptotic autocorrelation demerit factor 1/3 if and only if it is an interleaving of a Golay pair.  This tells us something about the possible lengths of optimal seeds for binary Rudin-Shapiro-like sequences. Corollary 2. There exists a Littlewood polynomial f0 (z) of length ℓ giving rise to a sequence (f0 , f1 , . . .) of Rudin-Shapiro-like polynomials with asymptotic autocorrelation merit factor 3 if and only if either ℓ = 1 or else ℓ = 2m for an m such that there exists a Golay complementary pair of binary sequences, each of length m. 4 DANIEL J. KATZ AND STANISLAV A. TRUNOV In particular, there are Littlewood seeds of length ℓ = 1 and ℓ = 2a 10b 26c for every a ≥ 1 and every b, c ≥ 0. The last statement is a consequence of the Corollary to Lemma 5 in [4], which gives values of m such that there are known to be Golay pairs of binary sequences of length m. References [1] P. Borwein and M. Mossinghoff. Rudin-Shapiro-like polynomials in L4 . Math. Comp., 69(231):1157–1166, 2000. [2] M. J. E. Golay. Static multislit spectrometry and its application to the panoramic display of infrared spectra. J. Opt. Soc. Am., 41(7):468–472, 1951. [3] D. J. Katz, S. Lee, and S. A. Trunov. Crosscorrelation of Rudin-Shapiro-like polynomials. arXiv:1702.07697, 2017. [4] R. J. Turyn. Hadamard matrices, Baumert-Hall units, four-symbol sequences, pulse compression, and surface wave encodings. J. Combinatorial Theory Ser. A, 16:313–333, 1974. Department of Mathematics, California State University, Northridge, United States
7cs.IT
Published as a conference paper at ICLR 2015 T ECHNIQUES FOR L EARNING B INARY S TOCHASTIC F EEDFORWARD N EURAL N ETWORKS arXiv:1406.2989v3 [stat.ML] 9 Apr 2015 Tapani Raiko & Mathias Berglund Department of Information and Computer Science Aalto University Espoo, Finland {tapani.raiko,mathias.berglund}@aalto.fi Guillaume Alain & Laurent Dinh Department of Computer Science and Operations Research Université de Montréal Montréal, Canada [email protected], [email protected] A BSTRACT Stochastic binary hidden units in a multi-layer perceptron (MLP) network give at least three potential benefits when compared to deterministic MLP networks. (1) They allow to learn one-to-many type of mappings. (2) They can be used in structured prediction problems, where modeling the internal structure of the output is important. (3) Stochasticity has been shown to be an excellent regularizer, which makes generalization performance potentially better in general. However, training stochastic networks is considerably more difficult. We study training using M samples of hidden activations per input. We show that the case M = 1 leads to a fundamentally different behavior where the network tries to avoid stochasticity. We propose two new estimators for the training gradient and propose benchmark tests for comparing training algorithms. Our experiments confirm that training stochastic networks is difficult and show that the proposed two estimators perform favorably among all the five known estimators. 1 I NTRODUCTION Feedforward neural networks, or multi-layer perceptron (MLP) networks, model mappings from inputs x to outputs y through hidden units h. Typically the network output defines a simple (unimodal) distribution such as an isotropic Gaussian or a fully factorial Bernoulli distribution. In case the hidden units are deterministic (using a function x → h as opposed to a distribution P (h|x)), the conditionals P (y|x) belong to the same family of simple distributions. Stochastic feedforward neural networks (SFNN) (Neal, 1990; 1992) have the advantage when the conditionals P (y|x) are more complicated. While each configuration of hidden units h produces a simple output, the mixture over them can approximate any distribution, including multimodal distributions required for one-to-many type of mappings. In the extreme case of using empty vectors as the input x, they can be used for unsupervised learning of the outputs y. Another potential advantage of stochastic networks is in generalization performance. Adding noise or stochasticity to the inputs of a deterministic neural network has been found useful as a regularization method (Sietsma & Dow, 1991). Introducing multiplicative binary noise to the hidden units (dropout, Hinton et al., 2012) regularizes even better. Binary units have additional advantages in certain settings. For instance conditional computations require hard decisions (Bengio et al., 2013). In addition, some harwdare solutions are restricted to binary outputs (e.g. the IBM SyNAPSE, Esser et al., 2013). The early work on SFNNs approached the inference of h using Gibbs sampling (Neal, 1990; 1992) or mean field (Saul et al., 1996), which both have their downsides. Gibbs sampling can mix poorly and 1 Published as a conference paper at ICLR 2015 the mean-field approximation can both be inefficient and optimize a lower bound on the likelihood that may be too loose. More recent work proposes simply drawing samples from P (h|x) during the feedforward phase (Hinton et al., 2012; Bengio et al., 2013; Tang & Salakhutdinov, 2013). This guarantees independent samples and an unbiased estimate of P (y|x). We can use standard back-propagation when using stochastic continuous-valued units (e.g. with additive noise or dropout), but back-propagation is no longer possible with discrete units. There are several ways of estimating the gradient in that case. Bengio et al. (2013) proposes two such estimators: an unbiased estimator with a large variance, and a biased version that approximates back-propagation. Tang & Salakhutdinov (2013) propose an unbiased estimator of a lower bound that works reasonably well in a hybrid network containing both deterministic and stochastic units. Their approach relies on using more than one sample from P (y|x) for each training example, and in this paper we provide theory to show that using more than one sample is an important requirement. They also demonstrate interesting applications such as mapping the face of a person into varying expressions, or mapping a silhouette of an object into a color image of the object. Tang & Salakhutdinov (2013) argue for the choice of a hybrid network structure based on the finite (and thus limited) number of hidden configurations in a fully discrete h. However, we offer an alternate hypothesis: It is much easier to learn a deterministic network around a small number of stochastic units, so that it might not even be important to train the stochastic units properly. In an extreme case, the stochastic units are not trained at all, and the deterministic units do all the work. In this work, we take a step back and study more rigorously the training problem with fully stochastic networks. We compare different methods for estimating the gradient and propose two new estimators. One is an approximate back-propagation with less bias than the one by Bengio et al. (2013), and the other is a modification of the estimator by Tang & Salakhutdinov (2013) with less variance. We propose a benchmark test setting based on the well-known MNIST data and the Toronto Face Database. 2 S TOCHASTIC FEEDFORWARD NEURAL NETWORKS We study a model that maps inputs x to outputs y through stochastic binary hidden units h. The equations are given for just one hidden layer, but the extension to multiple layers is easy1 . The activation probability is computed just like the activation function in deterministic multilayer perceptron (MLP) networks: P (hi = 1 | x) = σ(ai ) = σ(Wi: x + bi ), (1) where Wi: denotes the ith row vector of matrix W and σ(·) is the sigmoid function. For classification problems, we use softmax for the output probability exp(Vi: h + ci ) P (y = i | h) = P . (2) j exp(Vj: h + cj ) For predicting binary vectors y, we use a product of Bernoulli distributions P (yi = 1 | h) = σ(Vi: h + ci ). (3) The probabilistic training criterion for deterministic MLP networks is log P (y|x). Its gradient with respect to model parameters θ = {W, V, b, c} can be computed using the back-propagation algorithm, which is based on the chain rule of derivatives. Stochasticity brings difficulties in both estimating the training criterion and in estimating the gradient. The training criterion of the stochastic network X X C = log P (y | x) = log P (y, h | x) = log P (y | h)P (h | x) (4) h h = log EP (h|x) P (y | h) (5) requires summation over an exponential number of configurations of h. Also, derivatives with respect to discrete variables cannot be directly defined. We will review and propose solutions to both problems below. 1 Apply P (h|x) separately for each layer such that x denotes the layer below instead of the original input. 2 Published as a conference paper at ICLR 2015 2.1 P ROPOSED ESTIMATOR OF THE TRAINING CRITERION We propose to estimate the training criterion in Equation (4) by M 1 X CˆM = log P (y | h(m) ) M m=1 h(m) ∼ P (h | x). (6) (7) This can be interpreted as the performance of a finite mixture model over M samples drawn from P (h|x). One could hope that using just M = 1 sample just like in many other stochastic networks (e.g. Hinton et al., 2012) would work well enough. However, here we show in that case the network always prefers to minimize the stochasticity, for instance by increasing the input weights to a stochastic sigmoid unit such that it behaves as a deterministic step-function nonlinearity. Theorem 1. When maximizing the expectation of Cˆ1 in Equation (6) using M = 1, a hidden unit hi never prefers a stochastic output over a deterministic one. However, when maximizing the expectation of C in Equation (4), the hidden unit hi may prefer a stochastic output over any of the deterministic ones. Proof. The expected Cˆ1 over the data distribution can be upper-bounded as h i EPd (x,y) EP (h|x) Cˆ1 = EPd (x,y) EP (h|x) log P (y | h) h i = EPd (x) EP (hi |x) EPd (y|x) EP (h\i |x,hi ) log P (y | h) (8) (9) = EPd (x) EP (hi |x) f (hi , x) (10) ≤ EPd (x) max f (hi , x), (11) hi where Pd denotes the data distribution. The value in the last inequality is achievable by selecting the distribution of P (hi |x) to be a Dirac delta around the value hi which maximizes the deterministic function f (hi , x). This can be done for every x under the expectation in an independent way. This is analogous to a idea from game theory: since the performance achieved with P (hi |x) is a linear combination of the performances f (hi , x) of the deterministic choices hi , any mixed strategy P (hi |x) cannot be better than the best deterministic choice. Let us now look at the situation for the expectation C and see how it differs from the case of C1 that we had with one particle. We can see that the original training criterion can be written as the expectation of a KL-divergence. EPd (x,y) [C] = EPd (x) EPd (y|x) log P (y | x) = EPd (x) [−KL (Pd (y | x)kP (y | x)) + const] (12) (13) The fact that this expression features a negative KL-divergence means that the maximum is achieved when the conditionals match exactly. That is, it it maximized when we have that P (y|x) = Pd (y|x) for each value of x. We give a simple example in which (x, h, y) each take values in {0, 1}. We define the following conditions on Pd (y|x) and P (y|h), and we show how any deterministic P (h|x) is doing a bad job at maximizing (12).     0.5 0.5 0.9 0.1 Pd (y | x) = , P (y | h) = 0.5 0.5 0.1 0.9   a b A deterministic P (h | x) = is one in which a, b take values in {0, 1}. 1−a 1−b Criterion (12) is maximized by (a, b) = (0.5, 0.5), regardless of the distribution Pd (x). For the purposes of comparing solutions, we can simply take Pd (x) = [0.5 0.5]. In that case, we get that the expected C takes the value 0.5 log(0.5) + 0.5 log(0.5) ≈ −0.30. On the other hand, all the deterministic solutions yield a lower value 0.5 log(0.9) + 0.5 log(0.1) ≈ −0.52. 3 Published as a conference paper at ICLR 2015 2.2 G RADIENT FOR TRAINING P (y|h) We will be exploring five different estimators for the gradient of a training criterion wrt. parameters θ. However, all of them will share the following gradient for training P (y|h). Let o = Vh + c be the incoming signal to the activation function φ(·) in the final output layer. For training P (y|h), we compute the gradient of the training criterion CˆM in Equation (6) M M 1 X 1 X CˆM = log P (y | h(m) ) = log φ(o(m) ) M m=1 M m=1 G(o(m) ) := φ0 (o(m) ) φ(o(m) ) ∂ log φ(o(m) ) ∂ CˆM = = P P M M (m0 ) ) (m0 ) ) ∂o(m) ∂o(m) m0 =1 φ(o m0 =1 φ(o P (y | h(m) ) ∂ log φ(o(m) ) ∂ log φ(o(m) ) w(m) = PM = PM , 0 0 (m) (m ) ) (m ) ∂o ∂o(m) m0=1 P (y | h m0 =1 w (14) (15) (16) where w(m) = P (y|h(m) ) are unnormalized weights. In other words, we get the gradient in the mixture by computing the gradient of the individual contribution m and multiplying it with normalPM 0 ized weights w̄(m) = w(m) / m0 =1 w(m ) . The normalized weights w̄(m) can be interpreted as responsibilities in a mixture model (see e.g. Bishop et al., 2006, Section 2.3.9). The gradients G(V), G(h), and G(c) are computed from G(o) using the chain rule of derivatives just like in standard back-propagation. 2.3 F IRST ESTIMATORS OF THE GRADIENT FOR TRAINING P (h|x) Bengio et al. (2013) proposed two estimators of the gradient for P (h|x). The first one is unbiased but has high variance. It is defined as G1 (ai ) := (hi − σ(ai ))(L − L̄i )   E (hi − σ(ai ))2 L , L̄i = E [(hi − σ(ai ))2 ] (17) (18) where we plug in L = CˆM as the training criterion. We estimate the numerator and the denominator of L̄i with an exponential moving average. The second estimator is biased but has lower variance. It is based on back-propagation where we set ∂hi ∂ai := 1 resulting in G2 (ai ) := G(hi ) = (V:i )T G(o). 2.4 (19) P ROPOSED BIASED ESTIMATOR OF THE GRADIENT FOR TRAINING P (h|x) We propose a new way of propagating the gradient of the training criterion through discrete hidden units hi . Let us consider hi continuous random variables with additive noise i hi = σ(ai ) + i  1 − σ(ai ) i ∼ −σ(ai ) (20) with probability σ(ai ) with probability 1 − σ(ai ) (21) Note that hi has the same distribution as in Equation (1), that is, it only gets values 0 and 1. With this formulation, we propose to back-propagate derivatives through hi by G3 (ai ) := σ 0 (ai )G(hi ) = σ 0 (ai )(V:i )T G(o) (22) This gives us a biased estimate of the gradient since we ignore the fact that the structure of the noise i depends on the input signal ai . One should note, however, that the noise is zero-mean with any input ai , which should help keep the bias relatively small. 4 Published as a conference paper at ICLR 2015 2.5 VARIATIONAL TRAINING Tang & Salakhutdinov (2013) use a variational lower bound L(Q) on the training criterion C as X P (y, h | x) X P (y, h | x) C = log P (y | x) = P (h | y, x) log ≥ Q(h) log =: L(Q). P (h | y, x) Q(h) h h (23) The above inequality holds for any distribution Q(h), but we get more usefulness out of it by choosing Q(h) so that it serves as a good approximation of P (h | y, x). We start by noting that we can use importance sampling to express P (h | y, x) in terms of a proposal distribution R(h|y, x) from which we can draw samples. P (h | y, x) ∝ P (y | h)P (h | x) = P (y | h)P (h | x) R(h | y, x) R(h | y, x) (24) Let δ(h) be the Dirac delta function centered at h. We construct Q(h) based on this expansion: Q(h) = M X w̄(m) δ(h(m) ) (25) m=1 h(m) ∼ R(h | y, x) (m) w(m) = (26) (m) P (y | h )P (h | x) R(h(m) | y, x) w(m) w̄(m) = PM (m0 ) m0 =1 w (27) (28) where w(m) and w̄(m) are called the unnormalized and normalized important weights. It would be an interesting line of research to train an auxiliary model for the proposal distribution R(h|x, y) following ideas from Kingma & Welling (2013); Rezende et al. (2014); Mnih & Gregor (2014) that call the equivalent of R the recognition model or the inference network. However, we do not pursue that line further in this paper and follow Tang & Salakhutdinov (2013) who chose R(h|x, y) := P (h|x), in which case the importance weights simplify to w(m) = P (y|h(m) ). Tang & Salakhutdinov (2013) use a generalized EM algorithm, where they compute the gradient for the lower bound L(Q) given that Q(h) is fixed ∂ X P (y, h | x) G4 (θ) := Q(h) log (29) ∂θ Q(h) h = ∂ ∂θ M X h i w̄(m) log P (y | h(m) ) + log P (h(m) | x) . (30) m=1 Thus, we train P (h(m) |x) using h(m) as target outputs. It turns out that the resulting gradient for P (y|h) is exactly the same as in Section 2.2, despite the rather different way of obtaining it. The importance weights w̄(m) have the same role as responsibilities w̄(m) in the mixture model, so we can use the same notation for them. Proposed Unbiased Estimator of the Gradient We propose a new gradient estimator by applying a variance reduction technique (Weaver & Tao, 2001; Mnih & Gregor, 2014) to the estimator by Tang & Salakhutdinov (2013). First we note that   Z Z ∂ ∂ ∂ ∂ ∂θ P (h | x) EP (h|x) log P (h | x) = P (h | x) dh = 1 = 0. P (h | x)dh = ∂θ P (h | x) ∂θ ∂θ (31) That is, when training P (h|x) with samples h(m) ∼ P (h|x) drawn from the model distribution, the gradient is on average zero. Therefore we can change the estimator of P (h|x) by subtracting any 5 30 −50 25 −60 20 −70 ĈM norm of gradient Published as a conference paper at ICLR 2015 15 −80 10 −90 5 0 −0.5 0 0.5 cM 1 −100 1.5 0 20 40 60 Number of particles M 80 100 Figure 1: Left: The norm of the gradient for the weights of the first hidden layer as a function of cM 1 where the proposed c = M in Equation (32) corresponds to cM = 1. The norm is averaged over a mini-batch, after {1,7,50} epochs of training (curves from top to bottom) with G5 in the MNIST classification experiment (see Appendix A). Varying c only changes the variance of the estimator, so the minimum norm corresponds to the minimum variance. Right: CˆM as a function of the number of particles used during test time for the MNIST structured prediction task for the two proposed models trained with M = 20.   1 constant c from the weights w̄(m) without introducing any bias. We choose c = E w̄(m) = M which is empirically shown to be sufficiently close to the optimum (see Figure 1 (left)). Finally, the proposed estimator becomes    M  ∂ X 1 (m) (m) (m) (m) G5 (θ) := log P (h | x) . w̄ log P (y | h ) + w̄ − ∂θ m=1 M 3 (32) E XPERIMENTS We propose two experiments as benchmarks for stochastic feedforward networks based on the MNIST handwritten digit dataset (LeCun et al., 1998) and the Toronto Face Database (Susskind et al., 2010). In both experiments, the output distribution is likely to be complex and multimodal. In the first experiment, we predicted the lower half of the MNIST digits using the upper half as inputs. The MNIST dataset used in the experiments was binarized as a preprocessing step by sampling each pixel independently using the grey-scale value as its expectation. In the second experiment, we followed Tang & Salakhutdinov (2013) and predicted different facial expressions in the Toronto Face Database (Susskind et al., 2010). As data, we used all individuals with at least 10 different facial expression pictures, which we do not binarize. We set the input to the mean of these images per subject, and as output predicted the distribution of the different expressions of the same subject2 . We randomly chose 100 subjects for the training data (1372 images) and the remaining 31 subjects for the test data (427 images). As the data in the second problem is continuous, we assumed unit variance Gaussian noise and thus trained the network using the sum of squares error. We used a network structure of 392-200-200-392 and 2304-200-200-2304 in the first and second problem, respectively. Before running the experiments, we did a simple viability check of the gradient estimators by training a network to do MNIST classification. Based on the results, we kept G3 to G5 that performed significantly better than G1 and G2 . The results of the viability experiment can be found in Appendix A. For comparison, we also trained four additional networks (labeled A-D) in addition to the stochastic feedforward networks. Network A is a deterministic network (corresponding to G3 with i = 0 in Equation (21)). In network B, we used the weights trained to produce deterministic values for the hidden units, but instead of using these deterministic values at test time we use their stochastic equivalent. We therefore trained the network in the same way as network A, but ran the tests as 2 We hence discarded the expression labels 6 Published as a conference paper at ICLR 2015 the network would be a stochastic network. Network C is a hybrid network inspired by Tang & Salakhutdinov (2013), where each hidden layer consists of 40 binary stochastic neurons and 160 deterministic neurons. However, the stochastic neurons have incoming connections from the deterministic input from the previous layer, and outgoing connections to the deterministic neurons in the same layer. As in the original paper, the network was trained using the gradient estimator G4 . Network D is the same as the hybrid network C with one difference: the stochastic neurons have a constant activation probability of 0.5, and do hence not have any incoming weights or biases to learn. In all of the experiments, we used stochastic gradient descent with a mini-batch size of 100 and momentum of 0.9. We used a learning rate schedule where the learning rate increases linearly from zero to maximum during the first five epochs and back to zero during the remaining epochs. The maximum learning rate was chosen among {0.0001, 0.0003, 0.001, . . . , 1} and the best test error for each method is reported.3 The models were trained with M ∈ {1, 20}, and during test time we always used M = 100. As can be seen in Table 1, excluding the comparison methods, the proposed biased estimator G3 performs the best in both tasks. It is notable that the performance of G3 increased significantly when using more than M = 1 particles, as could be predicted from Theorem 1. In Figure 1 (right) we plot the objective CM at test time based on a number of particles M = 1, . . . , 100. In theory, a larger number of particles M is always better (if given infinite computational resources), but here Figure 1 (right) shows how the objective CM is estimated very accurately with only M = 20 or M = 40. Of all the networks tested, the best performing network in both tasks was however comparison network D, i.e. the deterministic network with added binary stochastic neurons that have a constant activation probability of 0.5. It is especially interesting to note that this network also outperformed the hybrid network C where the output probabilities of the stochastic neurons are learned. Network D seems to gain from being able to model stochasticity without the need to propagate errors through the binary stochastic variables. The results give some support to the hypothesis that a hybrid network outperforms a stochastic network because it is easier to learn a deterministic network around a small number of stochastic units than learning a full stochastic network, although the stochastic units are not trained properly. The results could possibly be improved by making the networks larger and continuing training longer if given enough computational capacity. This might be the case especially in the experiments with the Toronto Face Dataset, where the deterministic network A outperforms some of the stochastic networks. However, the critical difference between the stochastic networks and the deterministic network can be be observed in Figure 2, where the stochastic networks are able to generate reconstructions that correspond to different digits for an ambiguous input. Clearly, the deterministic network cannot model such a distribution. 4 D ISCUSSION In the proposed estimator of the gradient for P (h|x) in Equation (32), there are both positive and negative weights for various particles h(m) . Positive weights can be interpreted as pulling probability mass towards the particle, and negative weights as pushing probability mass away from the particle. Although we showed that the variance of the gradient estimate is smaller when using both positive and negative weights (G5 vs. G4 ), the difference in the final performance of the two estimators was not substantial One challenge with structured outputs y is to find samples h(m) that give a reasonably large probability P (y|h(m) ) with a reasonably small sample size M . Training a separate R(h|x, y) 6= P (h|x) as a proposal distribution looks like a promising direction for addressing that issue. It might still be useful to use a mix of particles from R and P (h|x), and subtract a constant from the weights of the latter ones. This approach would yield both particles that explain y well, and particles that have negative weights. 3 In the MNIST experiments we used a separate validation set to select the learning rate. However, as we chose just one hyperparameter with a fairly sparse grid, we only report the best test error in the TFD experiments without a separate validation set. 7 Published as a conference paper at ICLR 2015 Figure 2: Samples drawn from the prediction of the lower half of the MNIST test data digits based on the upper half with models trained using G3 (left), G5 (middle), and for the deterministic network (right). The leftmost column is the original MNIST digit, followed by the masked out image and ten samples. The figures illustrate how the stochastic networks are able to model different digits in the case of ambiguous inputs. Table 1: Results obtained on MNIST and TFD structured prediction using various number of samples M during training and various estimators of the gradient Gi . Error margins are ± two standard deviations from 10 runs. MNIST Neg. test TFD test Sum of Squared Errors log-likelihood (Cˆ100 ) M =1 M = 20 M =1 M = 20 G3 (proposed biased) 59.8 ± 0.1 53.8 ± 0.2 31.7 ± 0.7 26.3 ± 3.7 na 64.0 ± 1.7 na 51.4 ± 0.1 G4 (Tang et al., 2013) G5 (proposed unbiased) na 63.2 ± 1.2 na 51.3 ± 0.1 deterministic (A) 68.4 ± 0.1 na 35.3 ± 0.4 na deterministic as stochastic (B) 59.1 ± 0.2 na 48.3 ± 7.5 na hybrid (C) na 58.4 ± 0.8 na 35.5 ± 1.0 deterministic, binary noise (D) 67.9 ± 1.1 52.0 ± 0.2 33.4 ± 0.6 21.4 ± 0.6 5 C ONCLUSION Using stochastic neurons in a feedforward network is more than just a computational trick to train deterministic models. The model itself can be defined in terms of stochastic particles in the hidden layers, and we have shown many valid alternatives to the usual gradient formulation. These proposals for the gradient involve particles in the hidden layers with normalized weights that represent how well the particles explain the output targets. We showed both theoretically and experimentally how involving more than one particle significantly enhances the modeling capacity. We demonstrated the validity of these techniques in three sets of experiments: we trained a classifier on MNIST that achieved a reasonable performance, a network that could fill in the missing information when we deleted the bottom part of the MNIST digits, and a network that could output individual expressions of face images based on the mean expression. We hope that we have provided some insight into the properties of stochastic feedforward neural networks, and that the theory can be applied to other contexts such as the study of Dropout or other important techniques that give a stochastic flavor to deterministic models. ACKNOWLEDGEMENTS The authors would like to acknowledge NSERC, Nokia Labs and the Academy of Finland as sources of funding, in addition to the developers of Theano (Bastien et al., 2012; Bergstra et al., 2010) 8 Published as a conference paper at ICLR 2015 R EFERENCES Bastien, Frédéric, Lamblin, Pascal, Pascanu, Razvan, Bergstra, James, Goodfellow, Ian J., Bergeron, Arnaud, Bouchard, Nicolas, and Bengio, Yoshua. Theano: new features and speed improvements. Deep Learning and Unsupervised Feature Learning NIPS 2012 Workshop, 2012. Bengio, Yoshua, Léonard, Nicholas, and Courville, Aaron. Estimating or propagating gradients through stochastic neurons for conditional computation. arXiv preprint arXiv:1308.3432, 2013. Bergstra, James, Breuleux, Olivier, Bastien, Frédéric, Lamblin, Pascal, Pascanu, Razvan, Desjardins, Guillaume, Turian, Joseph, Warde-Farley, David, and Bengio, Yoshua. Theano: a CPU and GPU math expression compiler. In Proceedings of the Python for Scientific Computing Conference (SciPy), June 2010. Oral Presentation. Bishop, Christopher M et al. Pattern recognition and machine learning, volume 1. Springer New York, 2006. Esser, Steve K, Andreopoulos, Alexander, Appuswamy, Rathinakumar, Datta, Pallab, Barch, Davis, Amir, Arnon, Arthur, John, Cassidy, Andrew, Flickner, Myron, Merolla, Paul, et al. Cognitive computing systems: Algorithms and applications for networks of neurosynaptic cores. In Neural Networks (IJCNN), The 2013 International Joint Conference on, pp. 1–10. IEEE, 2013. Hinton, Geoffrey E, Srivastava, Nitish, Krizhevsky, Alex, Sutskever, Ilya, and Salakhutdinov, Ruslan R. Improving neural networks by preventing co-adaptation of feature detectors. arXiv preprint arXiv:1207.0580, 2012. Kingma, Diederik P and Welling, Max. arXiv:1312.6114, 2013. Auto-encoding variational Bayes. arXiv preprint LeCun, Yann, Bottou, Léon, Bengio, Yoshua, and Haffner, Patrick. Gradient-based learning applied to document recognition. Proceedings of the IEEE, 86(11):2278–2324, 1998. Mnih, Andriy and Gregor, Karol. Neural variational inference and learning in belief networks. arXiv preprint arXiv:1402.0030, 2014. Neal, Radford M. Learning stochastic feedforward networks. Department of Computer Science, University of Toronto, 1990. Neal, Radford M. Connectionist learning of belief networks. Artificial intelligence, 56(1):71–113, 1992. Raiko, Tapani, Valpola, Harri, and LeCun, Yann. Deep learning made easier by linear transformations in perceptrons. In International Conference on Artificial Intelligence and Statistics, pp. 924–932, 2012. Rezende, Danilo Jimenez, Mohamed, Shakir, and Wierstra, Daan. Stochastic back-propagation and variational inference in deep latent Gaussian models. arXiv preprint arXiv:1401.4082, 2014. Saul, Lawrence K, Jaakkola, Tommi, and Jordan, Michael I. Mean field theory for sigmoid belief networks. arXiv preprint cs/9603102, 1996. Sietsma, Jocelyn and Dow, Robert JF. Creating artificial neural networks that generalize. Neural Networks, 4(1):67–79, 1991. Susskind, Joshua, Anderson, Adam, and Hinton, Geoffrey. The Toronto face database. Technical report, University of Toronto, UTML TR 2010001, 06 2010. Tang, Yichuan and Salakhutdinov, Ruslan. Learning stochastic feedforward neural networks. In Advances in Neural Information Processing Systems, pp. 530–538, 2013. Weaver, Lex and Tao, Nigel. The optimal reward baseline for gradient-based reinforcement learning. In Proceedings of the Seventeenth conference on Uncertainty in artificial intelligence, pp. 538– 545. Morgan Kaufmann Publishers Inc., 2001. 9 Published as a conference paper at ICLR 2015 A C LASSIFICATION EXPERIMENT MNIST classification is a well studied problem where performances of a huge variety of approaches are known. Since the output y is just a class label, the advantage of being able to model complex output distributions is not applicable. Still, the benchmark is useful for comparing training algorithms against each other, and was used in this paper to test the viability of the gradient estimators. We used a network structure with dimensionalities 784-200-200-10. The input data was first scaled to the range of [0, 1], and the mean of each pixel was then subtracted. As a regularization method, Gaussian noise with standard deviation 0.4 was added to each pixel separately in each epoch (Raiko et al., 2012). The models were trained for 50 epochs. Table 2 gives the test set error rate for each method. As can be seen from the table, deterministic networks give the best results. Excluding the comparison networks, the best result is obtained with the proposed biased gradient G3 followed by the proposed unbiased gradient G5 . Based on the results, gradient estimators G1 and G2 were left out from the structured prediction experiments. Table 2: Results obtained on MNIST classification using various number of samples M during training and various estimators of the gradient Gi . Test error (%) G1 (Bengio et al., 2013, unbiased) G2 (Bengio et al., 2013, biased) G3 (proposed biased) G4 (Tang et al., 2013) G5 (proposed unbiased) deterministic (A) deterministic as stochastic (B) hybrid (C) deterministic, binary noise (D) 10 M =1 7.85 7.97 1.82 na na 1.51 1.80 na 1.80 M = 20 11.30 7.86 1.63 3.99 2.72 na na 2.19 1.92
9cs.NE
Image matting with normalized weight and semisupervised learning Ping Li, Tingyan Duan, Yongfeng Cao* Big data and computer science school Guizhou Normal University Guizhou China [email protected], [email protected], [email protected] Abstract—Image matting is an important vision problem. The main stream methods for it combine sampling-based methods and propagation-based methods. In this paper, we deal with the combination with a normalized weighting parameter, which could well control the relative relationship between information from sampling and from propagation. A reasonable value range for this parameter is given based on statistics from the standard benchmark dataset[1]. The matting is further improved by introducing semi-supervised learning iterations, which automatically refine the trimap without user’s interaction. This is especially beneficial when the trimap is coarse. The experimental results on standard benchmark dataset have shown that both the normalized weighting parameter and the semi-supervised learning iteration could significantly improve the matting performance. Keywords—image matting; sampling-based propagation-based method; semi-supervised learning method; I. INTRODUCTION A. Background and related work Matting is an important image processing technology for accurately estimating foreground objects in images and videos. It is often used in image processing software, virtual studio, film post-production and so on[2]. Mathematically, for a given image I , any pixel can be expressed as a linear combination of foreground color F and background color B : I z   z F  1   z  B , (1) where z  ( x, y ) represents the pixel coordinates in the image, and  z  [0,1] is the foreground opacity of the pixel at z[3]. If  z  1 , the pixel is the foreground; if  z  0 , then the pixel is the background; when 0   z  1 , the pixel is a mixed pixel, which means the pixel is affected by the foreground pixel and the background pixel at the same time. Usually the most pixels of a natural image are foreground and background, and only a small number of them are mixed pixels[2]. Most matting algorithms need a trimap as input[2]. In a trimap, there are three areas: the foreground area  F (  z =1 ), the background area  B (  z =0 ) and the unknown area U ( 0   z  1 ). The main purpose of the matting is to accurately classify the pixels in the unknown area. Recently, many deep learning methods were used for image matting[4, 5]. Xu etc[4]. first predicted the initial alpha matte with an deep convolutional encoder-decoder neural network, then made a further refinement for the initial alpha matte with an small convolution neural network. Shen etc[5]. Proposed an automatic matting method for portrait using convolution neural network. Except for above deep-learning-based ones, most of the image matting methods could be categorized into samplingbased methods[3, 6], propagation-based methods[7] and combination of the two methods[8, 9]. Sampling-based methods need to collect sample pairs similar to the unknown pixels from the foreground area and the background area based on pixel color similarity. If the input image has no obvious foreground color and background color or has highly textured regions, this kind of methods are less effective. The latest work [6] makes up for this shortcoming by applying local smoothing as a post-processing step to further improve the quality of alpha matte. Propagation-based methods propagate alpha values of the known pixels to the unknown pixels through local smoothing. They could work on texture images, but still not on images with complex structures. More effective methods are those combining sampling and propagation. The robust matting method[8] selects high confident samples to estimate alpha value and propagates alpha values of known pixels to unknown pixels with a local window. The local and nonlocal smooth priors method[9] adds nonlocal smoothing information, except for the information from sampling and propagation. These methods have achieved good matting effects. But they did not give a reasonable way to balance the data term from sampling and the local smooth term from propagation, setting only an empirical weight on the data term. B. The main contributions of this paper There are two points accounting for the main contributions of this paper:  A normalized weight parameter is used to well control the relative role of the data term and the local smooth term in matting, and a reasonable value range for setting the parameter is given based on experiments on the standard data set[1]. from propagation-based methods. We calculate these two term as in[8]. In contrast to the Laplacian construction formula L   W  W lap of the robust matting method[8], it can be seen that our normalized parameter  can more clearly control the relative weight between the two items. The experiment section will suggest a range for setting  . Original Image Trimap Image Local Smooth Term W lap Data Term W Constructing Laplacian Matrix L=λW+(1-λ) W lap Spectral Clustering Optimization Semi-Supervised Learning B. Optimization method Image matting can be treated as a graph partition problem which aims at optimally dividing a weighted graph into two or more sub graphs. The spectral clustering method[10] solve this problem as : 1 arg min( qT Lq ) , q 2 (3) where L is the Laplacian matrix constructed in Section A, the vector q records the alpha values of all pixels in the image (where the foreground is 1, the background is 0, and the others to be solved). Rewrite matrix L and vector q as Result Alpha  Lk L T R R , Lu  (4) q   qk qu  , (5) Fig.1. Method flow chart  Semi-supervised learning iterations are introduced into matting to increase the labeled pixels in the trimap incrementally. It could improve matting effect without increasing the trimap-making burden of users. C. Paper content arrangement The contents of this paper are arranged as follows: The first section introduces the research background, related works and the main contributions of this paper. The second section is the method part of this paper. In the third section, the method is experimented and analyzed based on the standard data set[1]. The fourth section summarizes this paper and points out the future research direction. II. MATTING METHOD Our method mainly includes three steps as in Fig.1. First, the Laplacian Matrix L is constructed by combining data term W and local smooth term W lap with a normalized weight parameter. Second, alpha matte is got with spectral clustering optimization based on L . Third, based on current alpha matte, semi-supervised learning is used to refine the trimap. This makes a loop in the process and enables our method iterating many times to achieve good resulting matte. A. Normalized weight parameter In order to well control the relatively relationship between data term and local smooth term in the matting process, this paper constructs the Laplacian matrix with a normalized weight parameter   [0,1] as follow: L  W  (1   )W lap , (2) where W is the data item that is contributed by sampling-based methods, and W lap is the local smooth term that is contributed where Lk is the Laplacian matrix of the known region (foreground area and background area), Lu is the Laplacian matrix of the unknown region, qk is the alpha vector of the known region and qu is the alpha vector of the unknown region. By substituting (4) (5) into (3) and expanding it, it can be seen that qu can be got by solving following linear optimization problem: Lu qu   RT qk , (6) in this paper, we use the conjugate gradient method to obtain qu C. Semi-supervised learning In the trimap given by users, the more detailed the foreground and background be delineated, the better the result of matting is. However, users want to pay as little effort as possible, so we usually obtain very rough trimap, where a large number of pixels are unknown. In this section, we will introduce semi-supervised learning[11] to automatically increase the number of pixels with known labels in the trimap. The specific process is shown in Fig.2. Firstly, based on the current alpha matte, some pixels with high confidence are chosen from the unknown area and labeled automatically. For example, if the alpha value of a selected pixel is close to zero, it will be labeled as the background; if the alpha value is close to one, it will be labeled as the foreground. Then we update the trimap with these newly-labeled pixels and do the matting process again to produce a new alpha matte. Because there are more pixels with known labels in the updated trimap, the resulting alpha matte will be improved this time. To get the maximum i- Alpha matte trimap Label prediction unknown area pixels (a) (b) (c) Fig.3 Example images from the online benchmark for image matting. (a) original image; (b) trimap of coarse level 1; (c) trimap of coarse level 2. In the trimaps, the foreground is white, the background is black, and the unknown area is gray. Pixels label Fig.2. Semi-supervised learning for matting mprovement, this semi-supervised learning process can be iterated several times. It does not increase workload of users but computers. The wrongly labeled pixels will bring error information into data term and local smooth term, and thus make the alpha matte go wrong. Considering this error, we select pixels from the unknown area with three strict constraints, trying to make sure the predicted labels of these pixels are correct. Namely, for each pixel x that will be updated its label in the trimap by semi-supervised learning, it needs to meet the following conditions at the same time. space constraint: x  U and y  K , makes x   y , (7) where U is the set of unknown pixels in current trimap, K is the set of foreground and background pixels in current trimap, and  y is the spatial neighborhood of pixel y (In this paper, we choose the 4-connected pixels). confidence constraint: x  t _  , (8) where  x is the alpha value of pixel x and t _  is a threshold. proportion constraint: x  U t _ percent , (9) where t _ percent is a proportion threshold (In this paper, we use 10%), U t _ percent is the set formed by the top t _ percent pixels of a list that was got by sorting all pixels in current unknown area in descending order according to 0.5   x . III. EXPERIMENT AND ANALYSIS The online benchmark for image matting on www.alphamatting.com is used here to evaluate our methods. We choose the low resolution image set which includes 27 input images of size from 490×800 to 719×800, their ground truth and two set of trimaps of different coarse levels. Fig.3 shows sample images in the online benchmark. The mean square error(MSE) is used as the indicator of m- Fig.4. The MSE of proposed matting method (  =0.001 ) and robust matting. atting performance in all experiments. The local window used for calculating the local smooth term is set to 3×3. A. Normalized weight parameter Fig.4 shows the MSE of our proposed matting method with the normalized parameter   0.001 and the robust matting method[8] with parameter   0.1 . It can be seen that our method outperforms the robust matting method in almost all test images. It is important to know how this normalized weight parameter affect matting performance. Fig.5 shows how MSE indicator changes with parameter  . It can be seen that MSE indicator is quite stable when parameter  is bigger than 0.05 and all best MSEs for testing images are got with  in [0,0.01]. A rule that the smaller the  is, the better the matting performance is works for all values of  but near zero where the matting performance goes bad when  approaching zero. So we suggest a value range [0.001, 0.01] for setting parameter  in practice. B. Semi-supervised learning In this section, we analyze how semi-supervised learning affect the matting performance and how to choose a good number of iterations. In all experiments, the normalized weight parameter  is set to 0.001. Because semi-supervised learning is especially worth doing when labeled pixels are not enough, for experiments in this section, we use trimaps of coarse level 2(see Fig.3 for the example). Fig.6 shows the MSE of our proposed matting method without and with semi-supervised learning(iterating 4 times). It can be seen that semi-supervised iterations could improve the matting Fig.7. The percentage increase of matting performace(PIMP) changes with the number of iterations (a) of matting results increase first and then begin to decrease after a certain number of iterations. In the forepart of iterations, those automatically given labels to originally unknown pixels are correct, so that the matting results are improved by the additional information. When the number of iterations become big, those left unknown pixels are less and tend to be mixed pixels (near the boundary of foreground and background). This makes predicting their correct label very difficult and once some pixels are wrongly labeled, the matting results began to go bad. (b) Fig.5 MSE indicator changes with parameter level 1. (b) using trimaps of coarse level 2.  . (a) using trimaps of coarse This observation enlightens us not using too big iteration numbers and the best iteration number for an image is related not only with the coarseness of its trimap but also some other characteristics (we need to find out in future research). IV. CONCLUSION This paper proposed a matting method based on normalized weight and semi-supervised learning. The normalized parameter can well control the relative weight between data term and local smooth term in matting. A experimental value range has been suggested for setting this parameter. Semi-supervised learning iterations could significantly reduce users’ burden to delineate a refined trimap and get good matting result from a coarse trimap. But the best number of iterations depend not only on the roughness of the trimap, and so is not easy to set. Generally, the more rough the trimap, the more semi-supervised leaning iterations could be taken. Fig.6.The MSE of proposed matting methos with and without semi-supervised learning. Fig.7 shows the percentage increase of matting performance(PIMP), on each image by the use of semi-supervised learning iterations. The specific formula for defining PIMP is, MUSL  PIMP  0 1  PIMP   MWUSL , 0 PIMP  0 (10) where MUSL is the MSE of using semi-supervised learning, MWUSL is the MSE of without using semi-supervised learning. It can be seen that with the increase of iterations, the PIMP Our future research will focus on adaptively selecting the optimal weight coefficient and the number of semi-supervised learning iterations. ACKNOWLEDGMENT This work was partially supported by NSF of China (41161065), NSF of Guizhou (GZKJ [2017]1128) and Educational Commission of Guizhou (KY[2016]027) REFERENCES [1] [2] http://www.alphamatting.com. G. L. Yao, "A Survey on Pre-Processing in Image Matting," JCST, vol. 32, pp. 122-138, 2017. [3] [4] [5] [6] [7] L. Karacan, A. Erdem, and E. Erdem, "Alpha Matting with KLDivergence Based Sparse Sampling," in ICCV 2016, pp. 424-432. N. Xu, B. Price, S. Cohen, and T. Huang, "Deep Image Matting," arXiv preprint arXiv:1703.03872, 2017. X. Shen, X. Tao, H. Gao, C. Zhou, and J. Jia, "Deep automatic portrait matting," in ECCV, 2016, pp. 92-107. J. Johnson, D. Rajan, and H. Cholakkal, "Sparse codes as alpha matte," in BMVC, 2014. Y. Shi, O. C. Au, J. Pang, K. Tang, W. Sun, H. Zhang, et al., "Color clustering matting," in in ICME, 2013, pp. 1-6. [8] J. Wang and M. F. Cohen, "Optimized color sampling for robust matting," in CVPR, 2007, pp. 1-8. [9] X. Chen, D. Zou, S. Zhiying Zhou, Q. Zhao, and P. Tan, "Image matting with local and nonlocal smooth priors," in CVPR, 2013, pp. 1902-1907. [10] D. R. DeFord and S. D. Pauls, "Spectral Clustering Methods for Multiplex Networks," arXiv preprint arXiv:1703.05355, 2017. [11] Z. Yu, Y. Lu, J. Zhang, J. You, H. S. Wong, Y. Wang, et al, "Progressive Semisupervised Learning of Multiple Classifiers," IEEE Trans.Cybern, in press.
7cs.IT
1 Neural Component Analysis for Fault Detection Haitao Zhao arXiv:1712.04118v1 [cs.LG] 12 Dec 2017 Key Laboratory of Advanced Control and Optimization for Chemical Processes of Ministry of Education, School of Information Science and Engineering, East China University of Science and Technology Abstract—Principal component analysis (PCA) is largely adopted for chemical process monitoring and numerous PCAbased systems have been developed to solve various fault detection and diagnosis problems. Since PCA-based methods assume that the monitored process is linear, nonlinear PCA models, such as autoencoder models and kernel principal component analysis (KPCA), has been proposed and applied to nonlinear process monitoring. However, KPCA-based methods need to perform eigen-decomposition (ED) on the kernel Gram matrix whose dimensions depend on the number of training data. Moreover, prefixed kernel parameters cannot be most effective for different faults which may need different parameters to maximize their respective detection performances. Autoencoder models lack the consideration of orthogonal constraints which is crucial for PCAbased algorithms. To address these problems, this paper proposes a novel nonlinear method, called neural component analysis (NCA), which intends to train a feedforward neural work with orthogonal constraints such as those used in PCA. NCA can adaptively learn its parameters through backpropagation and the dimensionality of the nonlinear features has no relationship with the number of training samples. Extensive experimental results on the Tennessee Eastman (TE) benchmark process show the superiority of NCA in terms of missed detection rate (MDR) and false alarm rate (FAR). The source code of NCA can be found in https://github.com/haitaozhao/Neural-Component-Analysis.git. Note to Practitioner: Online monitoring for chemical process has been considered as a critical and hard task in real industrial applications. In this paper, an innovative method called neural component analysis (NCA) is proposed for fault detection. NCA is a unified model including a nonlinear encoder and a linear decoder. Due to its simple and intuitive format, NCA has superior performance in both computational efficiency and fault detection which makes it suitable for process monitoring in real industrial applications. Moreover, the experimental results presented can be reproduced effortlessly. Index Terms—Process monitoring, Fault detection, Feedforward neural network, Autoencoder I. I NTRODUCTION Monitoring process conditions is crucial to its normal operation [1]. Over last decades, data-driven multivariate statistical process monitoring (MSPM) has been widely applied to fault diagnosis for industrial process operations and production results [2], [3]. Due to the data-based nature of MSPM, it is relatively convenient to apply to real processes of large scale comparing to other methods based on theoretical modelling or rigorous derivation of process systems [4], [5]. The task of MSPM is challenging mainly due to the “curse of dimensionality” problem and the “data rich but information poor” problem. Many methods have been proposed to transform original high dimensional process data into a lower dimensional feature space and then performing fault detection or fault diagnosis in that feature space [6]. Principal component analysis (PCA) [7], [8], [9] is one of the most widely used linear techniques for fault detection. Due to orthogonal linear projection, PCA separates data information into two subspaces: a significant subspace which contains most variation in training data and a residual subspace which includes noises or outliers in training data. PCA-based methods to inherently nonlinear processes may lead to unreliable and inefficient fault detection, since a linear transformation is hard to tackle the nonlinear relationship between different process variables [10], [11]. To deal with this problem, various nonlinear extensions of PCA have been proposed for fault detection. These extensions can be divided into 3 categories. The first category is kernel approaches. Kernel PCA (KPCA) is one of the mostly used kernel approaches for fault detection [12]. KPCA implicitly maps the data from an input space into some high dimensional nonlinear feature sapce, where linear PCA can be applied. KPCA need to perform eigen decomposition (ED) on the kernel Gram matrix whose size is the square of the number of data points. When there are too many data points, the calculation of ED becomes hard to perform [13]. Moreover, KPCA need to determine the kernel and the associated parameters in advance. The second category is based on linear approximation of nonlinear process. In the linear approximation, several local linear models are constructed and then integrated by Bayesian inference [14]. Linear approximation is simple and easy to realize, but it may not be able to handle strong nonlinearities in the process. The third category is neural-network-based models, such as robust autoencoder (RAE) [13] and autoassociative neural network [15]. These models train a feedforward neural network to perform the identity encoding, where the inputs and the outputs of the network are the same. The network contains an internal “bottleneck” layer (containing fewer nodes than the output and input layers) for feature extraction. In autoassociative neural network [15], the mapping from the input layer to the “bottleneck” layer can be considered as encoding, while de-mapping from the “bottleneck” layer to the output layer can be considered as decoding. Although the encoding can deal with the nonlinearities present in the data, it has no consideration of the orthogonal constraints used in PCA. Recent years, a new trend in neural-network-based techniques known as deep learning has become popular in artificial intelligence and machine learning [16]. Deep-learning-based models are widely used in unsupervised training to learn the representation of original data. Although these models are often derived and viewed as extensions of PCA, all of them 2 'HFRGHU n output nodes p hidden nodes (a) Illustration of Vector X on two orthogonal directions. n input nodes (b) Illustration of Vector X on two non-orthogonal directions. (QFRGHU Figure 1: Projections of Vector X on non-orthogonal and orthogonal directions respectively. Figure 2: The autoencoder model. lack the consideration of the orthogonal constraints used in PCA. The orthogonal constraints are quite important, since they can largely reduce the correlations between extracted features. Figure 1 shows simple plots of features of Vector V obtained by orthogonal projections and non-orthogonal projections respectively. From Figure 1b it is easy to find PC1 and PC2 are largely correlated. It means that the extracted features contain redundant information and may distort the reconstruction of the original vector [17]. Motivated by the above analysis, this paper proposes a novel unified model, called neural component analysis (NCA), for fault detection. NCA firstly utilizes a nonlinear neural network as an encoder to extract features. Then linear orthogonal transformation is adopted to decode the features to the original data space. Finaly, this unified model is trained by minimizing the reconstruction error between original data and the decoded data. After training, NCA can be used as an unsupervised learning method to extract the key features of process data. In this paper, Hotelling T 2 statistic and the squared prediction error (SPE) statistic are used for fault detection. The merits of the proposed NCA method is demonstrated by both theoretical analysis and case studies on the Tennessee Eastman (TE) benchmark process. II. AUTOENCODER AND PCA An autoencoder model is an artificial neural network adopted for unsupervised feature extraction [18]. An autoencoder model tries to learn a representation (encoding) for original data, specifically for the purpose of dimensionality reduction. Recently, due to the research works in deep learning, the autoencoder concept has be widely accepted for generative models of data [19]. We assume that there are N input samples xi = [xi1 , xi2 , · · · , xin ] ∈ R1×n (i = 1, 2, · · · , N ). The simplest structure of an autoencoder model is a feedforward neural network which consists of one input layer with n inputs, one hidden layer with p (p < n) units and one output layer with the same number of nodes as the input layer (see Figure 2). The purpose of this structure is to reconstruct its own inputs. Therefore, an autoencoder model belongs to unsupervised learning. An autoencoder model includes both the encoder part and the decoder part, which can be defined as transitions α and β, such that: α : R1×n → F β : F → R1×n α, β = arg min α,β N X 2 kxi − β (α (xi ))k . (1) i=1 In this paper, we only consider the case F =R1×p . The encoder part takes the input x and maps it to z ∈ R1×p : z = α(x) , σ (W x + b) . This feature z is usually referred to as latent code, latent feature or latent representation. Here, σ(·) is an element-wise activation function such as a sigmoid function or a hyperbolic tangent function. Matrix W is a parameter matrix and b is a bias vector. The decoder part maps the feature vector z to the reconstruction x̃ of the same dimensionality as x:   x̃ = β(z) , σ̃ W̃ z + b̃ where σ̃, W̃ and b̃ for the decoder part may be different from the corresponding σ, W and b for the encoder part, depending on the applications of the autoencoder model. In order to learn the parameters in the activation functions, an autoencoder model is often trained to minimize reconstruction error: N   X W, b; W̃ , b̃ = arg min xi − σ̃ W̃ σ (W x + b) + b̃ W,b;W̃ ,b̃ i=1 If linear activation functions are used, the optimal solution to an autoencoder is strongly related to PCA [20]. In this case, Equation (1) can be written as A, B = arg min A,B N X xi − xi AB T 2 i=1 or A, B = arg min X − XAB T A,B 2 F (2) 2 . 3    where X =   x1 x2 .. .   n output nodes    and k·kF is the Frobenius norm.  xN A ∈ Rn×p and B ∈ Rn×p are two linear transformation matrices. Baldi and Hornik [21] showed that, if the covariance matrix Σx associated with the data X is invertible, a unique local and global minimum to Equation (2) corresponding to an orthogonal projection onto the subspace spanned by the first principal eigenvectors of the covariance matrix Σx . More precisely, the optimal solutions to (2) can be obtain by A = B = Un×p , where Un×p = [u1 , u2 , · · · , up ] are the p eigenvectors corresponding to the first p largest eigenvalues of the covariance matrix Σx . In PCA, u1 , u2 , · · · , up are defined as loading vectors or principal components and T = XU is the score matrix corresponding to the loading matrix U . Although there is no orthogonal constraints of the transformation matrices A or B, the solutions to Equation (2) are composed by orthogonormal bases. Due to the orthogonal decomposition, PCA can transform an original data space into two orthogonal subspaces, a principal subspace which contains most variation in original data and a residual subspace which includes noises or outliers. T 2 statistic and SPE statistic are often adopted as indicators for fault detection corresponding to the principal subspace and the residual subspace respectively. The orthogonal decomposition minimizes the correlations between these two subspaces and makes the linear reconstruction of original data with the least distortion [22], [23]. Because of this orthogonal property, PCA is widely used in process monitoring and many other fault detection methods can be considered as the extensions of PCA [1]. III. N EURAL C OMPONENT A NALYSIS A nonlinear autoencoder model can be trained to extract latent features. However, due to the lacking of the orthogonal property, the significant information of original data and the information of noises or outliers are largely combined in this model. An autoencoder model turns to overfit original data and learns to capture as much information as possible rather than reducing correlations in original data and extracting the significant information. Because of this problem, nonlinear autoencoder models are not used as widely as PCA. In the section, we propose a novel unified model, called neural component analysis (NCA), for fault detection. NCA firstly utilizes a nonlinear neural network as a encoder to extract features. Then linear orthogonal transformation is adopted to decode the features to the original data space. In this way, NCA can be considered as a combination of nonlinear and linear models. In NCA, we use linear transformation B instead of nonlinear transition β used in Equation (1). The optimization problem of NCA is W, b, B = arg min W,b,B N X xi − g (xi ; W, b) B T i=1 subject to B T B = Ip×p 2 (3) %   n input nodes Figure 3: Illustration of neural component analysis (NCA). where g (xi ; W, b) is a neural network with p outputs. Assume B = [b1 , b2 , · · · , bp ] where bi ∈ Rn×1 , then the orthogonormal constraint, B T B = I, means ( 1 i=j bTi bj = (i, j = 1, 2, · · · , p). 0 otherwise Figure 3 illustrates the structure of NCA. Here B contains three orthogonal bases (plotted in red, blue, and green), i.e. B = [b1 , b2 , b3 ]. Equation (3) shows the difference between NCA and autoencoder. Firstly, NCA is a unified model of nonlinear encoding and linear decoding. For the linear decoding, it will be shown later that the computation of the transformation matrix B is quite simple and no gradient-descent-based optimization is needed. Secondly, the orthogonormal constraints B T B = Ip×p are added to NCA. It means that the decoding from latent features is an orthogonal reconstruction, which can largely reduce the correlation of different variables. Let   g (x1 ; W, b)  g (x2 ; W, b)    G= (4)  ∈ RN ×p , ..   . g (xN ; W, b) the optimization problem of NCA in Equation (3) can also be written as W, b, B = arg min W,b,B X − GB T 2 F (5) subject to B T B = Ip×p . Matrix G, corresponding to the score matrix of PCA, is the key features which we want to obtain for further analysis, such as fault detection and diagnosis. However, it is difficult to compute the optimal W , b and B simultaneously since the 4 optimization problem in Equation (5) is nonconvex. In this paper, we compute W , b and B iteratively as follows. We firstly fix W , b and obtain G, then B can be computed by optimizing B = arg min X − GB T B 2 F (6) subject to B T B = Ip×p . variable; Then NCA is performed to obtain the neural network g (x; W, b) for nonlinear feature extraction. Finally Hotelling T 2 and the squared prediction error (SPE) statistics are used for fault detection. Let gi = g (xi ; W, b) be the nonlinear latent features of xi (i = 1, 2, · · · , N ) and Σg is the covariance matrix associated   T T with the features G = g1T , g2T , · · · , gN . T 2 statistic of gi is computed as follows: T Ti2 = gi Σ−1 g gi . Once B is obtained, W and b can be updated by solving the following optimization problem: W, b = arg min X − GB T W,b 2 F . Theorem 1. [26] Reduced Rank Procrustes Rotation. Let MN ×n and Nn×p be two matrices. Consider the constrained minimization problem Ĥ = arg min M − N H T 2 H subject to SPE statistic of feature gi can be calculated as follows: SP Ei = xi − gi B T (7) The solution to the optimization problem in Equation (7) can be obtained by the backpropagation algorithm [24] which is widely adopted in training feedforward neural networks. The solution to Equation (6) is to determine an orthogonal matrix, that rotates G to fit original data matrix X. In linear algebra and statistics [25], Procrustes analysis is a standard technique for geometric transformations between two matrices. The orthogonal Procrustes problem can be viewed as a matrix approximation problem which tries to find the optimal rotation or reflection for the transformation of a matrix with respect to the other. Theorem 1 shows how to solve the reduced rank Procrustes rotation problem. H T H = Ip×p . Suppose the singular value decomposition (SVD) of M T N is U DV T , then Ĥ = U V T . According to Theorem 1, we can design iterative procedures of NCA to obtain W , b and B as follows: 1) Perform PCA on original data X to obtain the loading matrix U ∈ Rn×p and let B = U . 2) Fix B, solve the optimization problem in Equation (7) by the backpropagation algorithm. 3) Form G by Equation (4) and perform SVD on X T G, i.e. X T G = U DV T . 4) Compute B̂ = U V T . 5) If B − B̂ < , break; else, let B = B̂ and go to Step 2. 6) Output W , b and B. After training, g (x; W, b) can be used for further feature extraction. IV. FAULT DETECTION BASED ON NCA A novel fault detection method based on NCA is developed in this section. The implementation procedures are given as follows. Firstly in the modeling stage, the process data are collected under normal process conditions and scaled by each (8) 2 (9) Because of no prior information available about the distribution of gi , we compute the confidence limit for T 2 and SP E statistics approximately by kernel density estimation (KDE) [27]. Let T12 , T22 , · · · , TN2 with an unknown density ρ(·) are the T 2 statistics of g1 , g2 , · · · , gN . The kernel density estimator of T 2 statistic is  2  N N T − Ti2 1 X 1 X 2 2 2 Kh (T − Ti ) = K ρ̂h (T ) = N i=1 hN i=1 h where K(·) is a non-negative function that integrates to one and has zero mean and h > 0 is a bandwidth parameter. In this paper, we take the RBF kernel for density estimation, which is given by 2 ! N X T 2 − Ti2 1 2 exp . ρ̂h (T ) = √ 2h2 2πhN i=1 2 After estimating ρ̂h (T 2 ), for the testing statistic Tnew , the 2 ) < τ then xnew following condition is checked: If ρ̂h (Tnew is normal else xnew is abnormal. The threshold τ is assigned globally and could be adjusted in order to lower the percentage of false alarm. Practically, τ is often equal to 0.01. Similarly, we also can obtain ! N 2 X 1 (SP E − SP Ei ) %̂h (SP E) = √ exp 2h2 2πhN i=1 where SP E1 , SP E2 , · · · , SP EN with an unknown density %(·) are the SP E statistics of X1 , X2 , · · · , XN . For the testing statistic SP Enew , the following condition is checked: If %̂h (SP Enew ) < τ then xnew is normal else xnew is abnormal. The offline modeling and online monitoring flow charts are shown in Figure 4. The procedures of offline modeling and online monitoring are as follows: Offline modeling: 1) Collect normal process data as the training data. 2) Normalize the training data by each variable with zero mean and unit variance. 3) Initialize B as the loading matrix which contains the first p eigenvectors of the covariance matrix of the training data. • 5 Training samples Scale the testing g sample Next Scale each variable Obtain the feature Compute B according to Eq. (5) No Compute aand according to Eq. (6) Whether convergent? Compute and SPE of the feature Whether exceed the control limit˛ No Yes Yes Fault alarm Determine the control limit of and SPE using KDE Offline modeling Figure 5: A diagram of the TEP simulator. Online monitoring Figure 4: The steps of the proposed NCA method for fault detection. 4) Fix B to compute W and b by training a neural network optimizing Equation (7). 5) Fix W and b to compute B by Reduced Rank Procrustes Rotation solving Equation (6). 6) Compute T 2 and SPE statistics of xi by Equation (8) and (9) respectively. 7) Determine the control limit of T 2 and SPE by KDE respectively. • Online monitoring: 1) Sample a new testing data point xnew . Normalize it according to the parameters of the training data. 2) Extract the feature gi = g (xnew ; W, b). 3) Compute T 2 and SPE statistics of the feature gi . 4) Alarm if T 2 (or SPE) of the extracted feature exceed the control limit; Otherwise, view xnew as a normal data. V. S IMULATION AND DISCUSSION The Tennessee Eastman process (TEP) has been widely used by process monitoring community as a source of publicly available data for comparing different algorithms. The simulated TEP is mainly based on an practical industrial process in which the kinetics, operation and units have been altered for specific reasons. The data generated by TEP are nonlinear, strong coupling and dynamic [28], [29]. There are five major units in TEP: a chemical reactor, condenser, recycle compressor, vapor/liquid separator, and stripper. A flow sheet of TEP with its implemented control structure is shown in Figure 5. The MATLAB codes can be downloaded from http://depts.washington.edu/control/LARRY/TE/download.html. Besides normal data, the simulator of TEP can also generate 21 different types of faults in order to test process monitoring algorithms. A total of 52 variables including 22 continuous process measurements, 19 compositions and 11 manipulated variables1 1 the agitation speed was not included because it was not manipulated Table I: TEP fault modes. Fault 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 Description A/C Feed ratio, B composition constant (Stream 4) B composition, A/C ratio constant (Stream 4) D feed temperature (Stream 2) Reactor cooling water inlet temperature Condenser cooling water inlet temperature A feed loss (Stream 1) C header pressure loss (Stream 4) A, B, C feed composition (Stream 4) D feed temperature (Stream 2) C feed temperature (Stream 4) Reactor cooling water inlet temperature Condenser cooling water inlet temperature Reaction kinetics reactor cooling water valve Condenser cooling water valve Unknown Unknown Unknown Unknown Unknown Valve (Stream 4) Type Step Step Step Step Step Step Step Random variation Random Variation Random Variation Random Variation Random Variation Slow drift Sticking Sticking Unknown Unknown Unknown Unknown Unknown Constant position were selected as the monitoring variables in our experiments. The training data set contained 500 normal data. Twenty-one different faults were generated and 960 data for each fault were chosen for testing, in which the fault happened from 161th data to the end of the data. The 21 fault modes are listed in Table I. In this paper, we compare our proposed NCA method with PCA, KPCA and autoencoder. For KPCA, we use the most widely used Gaussian kernel k(xi , xj ) =  2 exp − kxi − xj k /c and select the kernel parameter c as 10nδ̄, where δ̄ is the mean of standard deviations of different variables [30]. A. Visualization of data of different methods In order to intuitively visualize the features of different methods, we extract 2 features for each method and plot them in Figure 6. In Figure 6, the blue “∗” indicates normal data, while the red “◦” indicates fault data from Fault 1. It can be found that normal data and fault data are largely overlapped in Figure 6a, 6b, and 6c. In this case, PCA, KPCA and 6 600 40 0.025 Normal data Fault data Normal data Fault data 0.02 30 500 0.015 20 0.005 0 0 -0.005 -10 -0.01 -20 -60 -40 -20 0 20 40 -0.015 -0.03 -0.02 -0.01 0 PC 1 0.02 0.03 400 300 200 PC 1 (a) Visualization plot of PCA. (b) Visualization plot of KPCA. 20 100 3 Normal data Fault data 15 0 Normal data Fault data 2 10 5 PC 2 -5 -2 -3 -15 -4 -15 -10 -5 0 5 10 15 20 20 25 30 -1 -10 -20 -20 15 Figure 8: Convergence plot of NCA. 0 0 10 Iteration No. 1 5 PC 2 0.01 Reconstruction error PC 2 PC 2 0.01 10 -5 -5 0 5 10 PC 1 15 20 25 30 PC 1 (c) Visualization plot of autoencoder. (d) Visualization plot of NCA. Figure 6: Visualization of the normal samples and samples of Fault 1 on the first two dimensions of 4 different methods. the training stage. It can be found that NCA converges very fast. Thanks for GPU-accelerated computing, the total training time of NCA is 2.58 seconds. We perform the experiment on a computer with Intel Core i7 3.4GHz, 16G RAM, and NVIDIA GeForce GTX 1080Ti. For comparison, KPCA is performed on the same computer and the training time is 1.53 seconds. B. Case studies 1.5 0.6 0.4 1 0.2 0.5 0 0 -0.2 -0.5 -0.4 20 20 20 10 PC No. 10 0 0 PC No. (a) Illustration of B T B. 20 10 PC No. 10 0 0 PC No. (b) Illustration of B T U . Figure 7: Illustration of the correlations of the columns of B and the correlations between the columns of B and those of U. autoencoder cannot find the significant information for fault detection. However, in Figure 6d, the overlapping of normal samples and fault samples is much less than those in Figure 6a, 6b, and 6c. Through the nonlinear feature extraction based on orthogonal constraints, NCA directly gives out the key features in a two-dimensional space which include significant information for fault detection. Figure 7 shows the difference between B of NCA and the loading matrix U of PCA. Figure 7a shows the result of B T B. It is easy to find that B contains orthogonormal columns, i.e. bTi bj = 1 if i = j, otherwise, bTi bj = 0. Moreover, the correlations between the columns of B and those of P are plotted in Figure 7b. Obviously with the nonlinear feature extract, the optimum solution B of NCA is utterly different from the loading matrix U of PCA. 2 Figure 8 plots the reconstruction errors X − GB T F in In this subsection, we investigate the performance of our proposed NCA. The performance is compared with PCA, KPCA, and autoencoder. The source codes of NCA and other methods can be found in https://github.com/haitaozhao/NeuralComponent-Analysis.git. According to the cumulative percentage variance (CPV) rule, the reduced dimensionality, p, was determined as 27 for PCA such that 85% of the energy in the eigenspetrum (computed as the sum of eigenvalues) was retained. In order to give a fair comparison, the same value p = 27 was used for KPCA, autoencoder and NCA. Missed detection rate (MDR) refers to the rate of the abnormal events being falsely identified as normal events in the monitoring process, which is only applied to the fault detection situation. For testing all the 21 faults, MDR is recorded together in Table II, where smaller values indicate better performances. False alarm rate (FAR) which refers to the normal process monitoring results of PCA, KPCA, autoencoder and NCA are shown in parentheses. The small FARs also indicate better performances. In Table II, the best achieved performance for each fault is highlighted in bold. In this study, we only consider the fault cases where MDR< 50% and FAR≤ 5%. Because if MDR≥ 50%, the detection performance would be even worse than random guess whose MDR is 50%. Moreover, we adopt the threshold value for FAR as 5% which is commonly used in fault detection. NCA outperforms PCA, KPCA and autoencoder in 11 cases with lower MDRs. Autoencoder gives the best performance with 5 cases, KPCA gives the best performance with 7 cases and PCA gives the best performance with 4 cases. Autoencoder, KPCA, and NCA provide better results than PCA 7 Table II: Missed Detection Rate (%) and False Alarm Rate (%) (shown in parentheses) of PCA, LPP, LPP_Markov and DGE in TEP No. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 PCA T2 SPE 0.50(4.38) 0.13(20.6) 1.63(2.50) 0.75(18.1) 92.0(0.63) 71.9(30.0) 39.1(2.50) 0.00(24.4) 73.8(0.63) 50.3(22.5) 1.00(0.00) 0.00(10.6) 0.00(0.00) 0.00(16.3) 2.50(0.63) 1.75(17.5) 96.4(5.00) 76.9(23.8) 58.4(0.00) 24.13(15) 47.9(0.63) 19.0(20.0) 1.25(0.63) 1.13(22.5) 4.88(0.00) 3.75(12.5) 0.13(0.63) 0.0(23.13) 95.1(0.00) 74.4(16.9) 76.8(6.88) 30.8(22.5) 19.9(1.25) 2.50(25.6) 10.9(0.0) 6.25(20.6) 93.25(0.0) 41.8(14.4) 62.63(0.0) 26.9(15.6) 62.3(1.25) 33.5(31.3) KPCA T2 SPE 0.5(7.50) 0.63(5.63) 1.63(5.00) 1.75(5.00) 88.5(1.25) 93.8(0.63) 51.1(5.00) 81.8(3.75) 70.5(5.00) 79.3(3.75) 0.88(2.50) 2.88(3.13) 0.00(0.63) 2.0(0.63) 2.50(2.50) 4.75(3.13) 89.0(15.0) 94.1(5.63) 48.9(1.88) 81.6(0.63) 38.6(4.38) 52.4(1.88) 1.00(3.13) 10.4(0.63) 4.63(1.25) 18.0(0.63) 0.00(1.25) 9.88(0.63) 86.9(3.13) 94.1(2.50) 64.4(20.6) 86.9(6.25) 13.5(0.63) 28.0(0.00) 10.0(2.50) 14.4(2.50) 82.5(1.88) 87.3(0.63) 52.1(2.50) 90.0(2.50) 59.5(5.63) 71.0(3.75) in more fault cases indicates that nonlinear extensions can generally obtain better fault detection results than linear PCA. Although both KPCA and NCA include orthogonal constraints in their feature extraction, the performances of NCA are much better than KPCA. The reason is that NCA adaptively learns the parameters of a neural network, while KPCA uses prefixed kernel and the associated parameter. NCA obtains different parameters for different variables with nonlinear combination through backpropagation strategy and should be much more suitable for nonlinear feature extraction and the following fault detection tasks. Figure 9, 10 and 11 illustrate the detailed fault detection results of Fault 2, 4 and 7. In these figures, the blue points indicate the first 160 normal samples, while the red points represent the following 800 fault samples. The black dash lines are the control limits according to the threshold τ . The blue points above control limits lead to false alarm, while the red points below control limits cause missed detection. According to Table II, all 4 methods can successfully detect Fault 2. For PCA, the FARs are 2.5% and 18.1% for T 2 statistic and SPE statistic respectively. The FARs of KPCA are 5% for both T 2 statistic and SPE statistic. Autoencoder achieves no false alarm for SPE statistic and its FAR for T 2 statistic is 1.88%. However, as for our proposed NCA, the FARs are zero for both two statistics. Figure 9 shows the plots the results of four methods on Fault 2. For each method, the subplot above is the results of T 2 statistic and the subplot below is the results of SPE statistic. The small overlay plots clearly show the results of the first 160 normal samples in each subplot. Based on Table II and Figure 9, for Fault 2, we can found that NCA have the lowest MDR with no false alarm. Figure 10 illustrates the results of Fault 4. In this experiment, neither KPCA nor autoencoder can detect this fault. the MDR of PCA is 39.1% using T 2 statistic. It means that PCA, KPCA, and autoencoder are not suitable for the detection of autoencoder T2 SPE 0.50(3.13) 0.75(0.00) 1.50(1.88) 2.00(0.00) 96.4(1.88) 99.9(0.00) 55.8(0.63) 96.3(0.00) 73.3(0.63) 77.9(0.00) 1.00(0.00) 1.13(0.00) 0.00(0.00) 30.1(0.63) 2.50(1.88) 4.38(0.00) 96.0(5.00) 99.38(1.88) 64.3(0.63) 77.38(0.00) 49.6(1.25) 71.9(0.00) 1.00(1.88) 2.63(0.00) 5.75(0.63) 5.88(1.25) 0.38(0.63) 4.88(0.00) 94.3(0.63) 98.1(0.00) 82.1(5.00) 91.0(1.88) 20.1(1.88) 27.4(0.00) 11.0(3.75) 11.63(0.63) 91.8(0.00) 99.8(0.00) 64.1(0.00) 78.1(0.00) 61.6(1.25) 79.6(0.63) NCA T2 SPE 0.50(0.00) 0.75(0.00) 1.75(0.00) 1.50(0.00) 98.4(0.00) 97.9(0.63) 63.3(1.25) 5.75(0.63) 75.4(1.25) 71.1(1.88) 0.50(0.00) 0.88(0.00) 0.00(0.00) 0.00(1.88) 2.75(0.00) 2.50(2.50) 97.9(2.50) 94.0(5.63) 66.3(0.00) 72.8(1.88) 52.0(0.63) 30.1(8.13) 1.00(1.25) 5.50(7.5) 5.13(1.25) 4.88(3.75) 0.38(0.63) 0.00(5.00) 97.5(0.00) 90.9(3.75) 85.6(1.88) 76.6(1.25) 15.4(0.00) 53.3(0.00) 9.88(0.63) 12.1(0.00) 100(0.00) 99.4(0.00) 69.1(0.00) 52.0(0.00) 64.8(0.00) 78.0(0.00) Fault 4. However, using SPE statistic, NCA obtains the MDR of 5.75% and the FAR of 0.63%. Obviously NCA is much more appropriate for detecting Fault 4. Figure 11 shows the detection results of four methods for Fault 7. For SPE statistic, the MDR of PCA is 0.00%, but the FAR is 16.3% which is greater than 5%. The reason for the high FAR is that the linear decomposition of PCA cannot obtain the appropriate residual subspace to determine the right control limit. KPCA can detect this fault with the MDR of 2.0% for SPE statistic and the FAR is 0.63%. As for autoencoder, the MDR for SPE statistic is 30.1% which is much higher than that of KPCA. NCA outperforms these two nonlinear methods with no missed detection for SPE statistic and the FAR is 1.88%. The cause for the high MDR of autoencoder for SPE statistic should be that autoencoder overfits the training data and becomes more prone to accept noises and outliers in the normal data to construct the significant subspace and residual subspace. Under this condition, the features of the residual subspace may not contain enough information to detect the fault samples. Thanks for orthogonal constraints in KPCA and NCA, both of them can successfully detect the fault data. We summarize the case studies below: 1) Although no single method gives optimal performance for all fault cases consisting of diverse numbers of fault conditions. NCA outperforms PCA, KPCA, and autoencoder with regard to the number of best performances and emerges as the clear winner. 2) Due to the incorporation of orthogonal constraints, NCA is less prone to overfit training data and performs better than autoencoder. 3) Since NCA considers both nonlinear feature extraction and orthogonal constraints for feature extraction, NCA becomes effective in fault detection. Although NCA is an iterative method and need more time for training, 4000 8 3000 6 T2 T2 8 2000 1000 4 2 0 0 0 200 400 600 800 1000 0 200 400 Sample SPE SPE 600 400 1000 600 800 1000 600 800 1000 600 800 1000 504 502 200 0 500 0 200 400 600 800 0 1000 200 400 Sample Sample (a) PCA (b) KPCA 1500 4000 3000 1000 T2 T2 800 506 800 2000 500 1000 0 0 0 200 400 600 800 1000 0 200 400 Sample 10 8 Sample -10 4000 3000 SPE 6 SPE 600 Sample 4 2000 1000 2 0 0 0 200 400 600 800 1000 Sample (c) Autoencoder 0 200 400 Sample (d) NCA Figure 9: Monitoring results of 4 different methods for Fault 2. given the superior performance of NCA, the trade-off between training time and performance seems justified. VI. C ONCLUSION In this paper, we propose a nonlinear feature extraction method, nerual component analysis (NCA), for fault detection. NCA is a unified model which includes a nonlinear encoder part and a linear decoder part. Orthogonal constraints are adopted in NCA which can alleviate the overfitting problem occurred in autoencoder and improve performances for fault detection. NCA takes the advantages of the backpropogation technique and the eigenvalue-based techniques. The convergence of the iteration scheme of NCA is very fast. The idea behind NCA is general and can potentially be extended to other detection or diagnosis problems in process monitoring. We compare NCA with other linear and nonlinear fault detection methods, such as PCA, KPCA, and autoencoder. Based on the case studies, it is clear that NCA outperforms PCA, KPCA, and autoencoder. NCA can be considered as an alternative to the prevalent data driven fault detection techniques. Future works will be contributed to the design of new regularization terms to the optimization problem of NCA in Equation (5). Reconstruction-based feature extraction methods, such as PCA, KPCA, autoencoder, and NCA, are mainly focus on the global Euclidean structure of process data and overlook the latent local correlation of process data. In the future, we will try to design new constraints to ensure the local information is considered in nonlinear feature extraction. ACKNOWLEDGMENT This research is sponsored by National Natural Science Foundation of China (61375007) and Basic Research Programs of Science and Technology Commission Foundation of Shanghai (15JC1400600). R EFERENCES [1] S. J. Qin, “Survey on data-driven industrial process monitoring and diagnosis,” Annual Reviews in Control, vol. 36, no. 2, pp. 220–234, 2012. [2] J. MacGregor and A. Cinar, “Monitoring, fault diagnosis, fault-tolerant control and optimization: Data driven methods,” Computers & Chemical Engineering, vol. 47, pp. 111–120, 2012. 9 200 0.4 T2 0.6 T2 300 100 0.2 0 0 0 200 400 600 800 1000 0 200 400 600 800 1000 600 800 1000 600 800 1000 600 800 1000 Sample 80 500.4 60 500.3 SPE SPE Sample 40 500.2 500.1 20 0 500 0 200 400 600 800 0 1000 200 400 Sample Sample (a) PCA (b) KPCA 100 200 T2 T2 150 100 50 50 0 0 0 200 400 600 800 1000 0 200 400 Sample 10 200 150 4 SPE SPE 6 Sample -11 100 2 50 0 0 0 200 400 600 800 1000 0 Sample 200 400 Sample (c) Autoencoder (d) NCA Figure 10: Monitoring results of 4 different methods for Fault 4. [3] S. Yin, S. X. Ding, A. Haghani, H. Hao, and P. Zhang, “A comparison study of basic data-driven fault diagnosis and process monitoring methods on the benchmark tennessee eastman process,” Journal of Process Control, vol. 22, no. 9, pp. 1567–1581, 2012. [4] Z. Q. Ge, Z. H. Song, and F. Gao, “Review of recent research on data-based process monitoring,” Industrial and Engineering Chemistry Research, vol. 52, no. 10, pp. 3543–3562, 2013. [5] T. Feital, U. Kruger, J. Dutra, J. C. Dutra, and E. L. Lima, “Modeling and performance monitoring of multivariate multimodal processes,” AIChE Journal, vol. 59, no. 5, pp. 1557 – 1569, 2013. [6] M. Askarian, G. Escudero, M. Graells, R. Zarghami, F. Jalali-Farahani, and N. Mostoufi, “Fault diagnosis of chemical processes with incomplete observations: A comparative study,” Computers & chemical engineering, vol. 84, pp. 104–116, 2016. [7] X. Gao and J. Hou, “An improved svm integrated gs-pca fault diagnosis approach of tennessee eastman process,” Neurocomputing, vol. 174, pp. 906–911, 2016. [8] Y. Wang, F. Sun, and B. Li, “Multiscale neighborhood normalizationbased multiple dynamic pca monitoring method for batch processes with frequent operations,” IEEE Transactions on Automation Science and Engineering, vol. PP, no. 99, pp. 1–12, 2017. [9] T. J. Rato, J. Blue, J. Pinaton, and M. S. Reis, “Translation-invariant multiscale energy-based pca for monitoring batch processes in semiconductor manufacturing,” IEEE Transactions on Automation Science and Engineering, vol. 14, pp. 894–904, April 2017. [10] L. Luo, S. Bao, J. Mao, and D. Tang, “Nonlinear process monitoring based on kernel global-local preserving projections,” Journal of Process Control, vol. 38, no. Supplement C, pp. 11–21, 2016. [11] N. Sheng, Q. Liu, S. J. Qin, and T. Chai, “Comprehensive monitoring [12] [13] [14] [15] [16] [17] [18] [19] [20] of nonlinear processes based on concurrent kernel projection to latent structures,” IEEE Transactions on Automation Science and Engineering, vol. 13, pp. 1129–1137, April 2016. M. Mansouri, M. Nounou, H. Nounou, and N. Karim, “Kernel pca-based glrt for nonlinear fault detection of chemical processes,” Journal of Loss Prevention in the Process Industries, vol. 40, no. Supplement C, pp. 334 – 347, 2016. L. Jiang, Z. Song, Z. Ge, and J. Chen, “Robust self-supervised model and its application for fault detection,” Industrial & Engineering Chemistry Research, vol. 56, no. 26, pp. 7503–7515, 2017. Z. Ge, M. Zhang, and Z. Song, “Nonlinear process monitoring based on linear subspace and bayesian inference,” Journal of Process Control, vol. 20, no. 5, pp. 676 – 688, 2010. M. A. Kramer, “Nonlinear principal component analysis using autoassociative neural networks,” AIChE Journal, vol. 37, no. 2, pp. 233–243, 1991. G. E. Hinton and R. R. Salakhutdinov, “Reducing the dimensionality of data with neural networks,” Science, vol. 313, no. 5786, pp. 504–507, 2006. D. Cai, X. He, J. Han, and H. J. Zhang, “Orthogonal laplacianfaces for face recognition,” IEEE Transactions on Image Processing, vol. 15, pp. 3608–3614, Nov 2006. C.-Y. Liou, W.-C. Cheng, J.-W. Liou, and D.-R. Liou, “Autoencoder for words,” Neurocomputing, vol. 139, no. Supplement C, pp. 84 – 96, 2014. D. P. Kingma and M. Welling, “Auto-Encoding Variational Bayes,” ArXiv e-prints, Dec. 2013. D. Chicco, P. Sadowski, and P. Baldi, “Deep autoencoder neural networks for gene ontology annotation predictions,” in Proceedings of the 10 3 1500 2 T2 T2 1000 1 500 0 0 0 200 400 600 800 0 1000 200 400 800 1000 600 800 1000 600 800 1000 600 800 1000 501 300 200 SPE SPE 600 Sample Sample 500.5 100 500 0 0 200 400 600 800 0 1000 200 400 Sample Sample (a) PCA (b) KPCA 800 800 600 T2 T2 600 400 400 200 200 0 0 0 200 400 600 800 0 1000 200 400 Sample Sample 10-10 8 300 200 SPE SPE 6 4 100 2 0 0 0 200 400 600 800 1000 Sample (c) Autoencoder 0 200 400 Sample (d) NCA Figure 11: Monitoring results of 4 different methods for Fault 7. [21] [22] [23] [24] [25] [26] [27] [28] [29] 5th ACM Conference on Bioinformatics, Computational Biology, and Health Informatics, BCB ’14, (New York, NY, USA), pp. 533–540, ACM, 2014. P. Baldi and K. Hornik, “Neural networks and principal component analysis: Learning from examples without local minima,” Neural Networks, vol. 2, no. 1, pp. 53 – 58, 1989. I. Jolliffe, Principal Component Analysis. Springer Verlag, 1986. I. T. Jolliffe, “A note on the use of principal components in regression,” Journal of the Royal Statistical Society, vol. 31, no. 3, pp. 300 – 303, 1982. Y. Li, Y. Fu, H. Li, and S. W. Zhang, “The improved training algorithm of back propagation neural network with self-adaptive learning rate,” in 2009 International Conference on Computational Intelligence and Natural Computing, vol. 1, pp. 73–76, June 2009. D. G. Kendall, “A survey of the statistical theory of shape,” Statistical Science, vol. 4, no. 2, pp. 87–99, 1989. J. M. F. Ten Berge, “Orthogonal procrustes rotation for two or more matrices,” Psychometrika, vol. 42, pp. 267–276, Jun 1977. R. T. Samuel and Y. Cao, “Nonlinear process fault detection and identification using kernel pca and kernel density estimation,” Systems Science & Control Engineering, vol. 4, no. 1, pp. 165–174, 2016. L. H. Chiang, R. D. Braatz, and E. L. Russell, Fault detection and diagnosis in industrial systems. Springer Science & Business Media, 2001. P. Lyman and C. Georgakis, “Plant-wide control of the tennessee eastman problem,” Computers and Chemical Engineering, vol. 19, no. 3, pp. 321 – 331, 1995. [30] H. Zhao, P. C. Yuen, and J. T. Kwok, “A novel incremental principal component analysis and its application for face recognition,” IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics), vol. 36, pp. 873–886, Aug 2006.
9cs.NE
Optimal Causal Imputation for Control arXiv:1703.07049v1 [cs.SY] 21 Mar 2017 Roy Dong, Eric Mazumdar, and S. Shankar Sastry Abstract— The widespread applicability of analytics in cyberphysical systems has motivated research into causal inference methods. Predictive estimators are not sufficient when analytics are used for decision making; rather, the flow of causal effects must be determined. Generally speaking, these methods focus on estimation of a causal structure from experimental data. In this paper, we consider the dual problem: we fix the causal structure and optimize over causal imputations to achieve desirable system behaviors for a minimal imputation cost. First, we present the optimal causal imputation problem, and then we analyze the problem in two special cases: 1) when the causal imputations can only impute to a fixed value, 2) when the causal structure has linear dynamics with additive Gaussian noise. This optimal causal imputation framework serves to bridge the gap between causal structures and control. I. I NTRODUCTION Recently, data analytics have achieved amazing levels of success. As analytics penetrate more and more industrial applications, they are increasingly used for decision-making and planning. In these applications, it is important to use estimators that are not only predictive, but estimate the causal structure of the underlying processes. Correlation is not the same as causation. However, in practice, it is not always easy to apply this principle. In many real-life applications, machine learning is used to determine the relationship between two variables. This analysis is often used as the basis for determining which actions to take. However, an algorithm with low test error does not necessarily mean that the causal effect has been estimated. For example, one may train a classifier to estimate the energy consumption of a household given the presence and absence of eco-friendly devices, and this may provide guidelines for which devices should be discounted through rebate programs. Unless the causal structures are explicitly accounted for, there could easily be confounding variables or incorrect causal relationships that change the behavior of the system under consideration. This has motivated new interest in causal inference techniques. Generally speaking, these techniques take experimental data and attempt to uncover the causal structure. (We defer a literature review of these methods to Section III, when a more formal model of causality has been developed.) In this paper, we consider the dual problem: we fix the causal structure and attempt to determine what causal actions will lead to system behaviors we desire at a minimal cost. R. Dong, E. Mazumdar, and S. S. Sastry are with the Department of Electrical Engineering and Computer Sciences, University of California, Berkeley, Berkeley, CA, 94707, USA {roydong,emazumdar,sastry}@eecs.berkeley.edu A. Outline The rest of the paper is organized as follows. We discuss the main paradigms for modeling causality in Section II. In Section III, we outline the mathematical formulation of a causal structure, discuss relevant literature in causal estimation, and define the problem of optimal causal imputation. In Section IV, we provide theoretical analysis of two special cases of the optimal causal imputation problem: the case where imputation can only be done to a single value, and the case where the dynamics are linear and the noise is Gaussian. Finally, we present closing remarks in Section V. II. BACKGROUND There are three main paradigms for the mathematical modeling of causality: 1) Rubin causality 2) Granger causality 3) Pearl’s structural equation modeling (SEM) Each of these paradigms has a vast literature in its own right; we will try to present a few representative samples from each field here. Note that each paradigm uses its own notation, so we will change notation as we switch from approach to approach. It should be noted that these paradigms are not mutually exclusive: for example, a problem that is modeled using Granger causality can be put into Pearl’s SEM if the underlying processes operate in discrete time. Rubin causality can often be phrased as an SEM problem, but in applications this will require more structural assumptions to learn the causal structure. A full exposition of the intersections and nonintersections of these three paradigms is outside the scope of this paper, but we note that these paradigms can often model the same phenomena and shed different insights on the causal behaviors observed. Rubin causality was first introduced in [1]. In the basic formulation of Rubin causality, we are given some control variable X taking values in {0, 1}. There are also two distinct random variables Y0 and Y1 . If X = 0, then we observe Y0 and not Y1 . If X = 1, then we only observe Y1 , and not Y0 . Another way to write this notationally is that we observe YX but do not observe Y1−X , which is often called the counterfactual. The fact that we can only observe one or the other, but not both, is the fundamental misery of causality. One of the key results that the Rubin causality paradigm provides is that if X is independent of Y0 and Y1 , then randomly assigning X ∈ {0, 1} yields a dataset that can provide valid estimates of the counterfactuals; thus, Rubin causality provides the theoretical foundation for randomized control trials. This paradigm has also been extended to consider many covariates [2], handle confounding variables and incorporate instrumental variables [2], and incorporate some machine learning approaches [3]. Sample applications include estimating the causal effect of residential demand response in the Western United States [4] or the causal effects of providing money, healthcare and education to the very poor in Ethiopia, Ghana, Honduras, India, Pakistan, and Peru [5]. Granger causality was first introduced in [6]. In this paradigm, we are given data from two stationary random processes X and Y , both indexed by time. First, let Ut denote all the information available in the universe at time t, and let (U − X)t denote all the information available at time t except for X. Then, let σ 2 (Y |U ) denote the error variance of the unbiased, least-squares estimator of Yt using Ut , and similarly let σ 2 (Y |U − X) denote the error variance of the unbiased, least-squares estimator of Yt using (U − X)t . Then, X Granger-causes (or G-causes, for short) Y if σ 2 (Y |U ) < σ 2 (Y |U −X), i.e. the estimator that utilizes X has lower variance on its error than the one that cannot. In other words, X has explanatory power for Y . Granger causality essentially relies on the relationship between causal effects and the arrow of time to distinguish it from general correlations. Although this framework does not address many of the more pernicious philosophical aspects of causality, oftentimes prior knowledge allows us to make the inductive leap from time-lagged correlations to causality. This paradigm is particularly appealing because it is easy to calculate in practice. Sample applications include determining which neuron assemblies Granger-cause other neuron assemblies to fire synapses [7] or finding that exchange rates Granger-cause stock market prices in Asia [8]. Pearl’s SEM approach to causality models the statistical relationship between random elements with a Bayesian network [9]. Bayesian networks are directed acyclic graphs, such that the distribution of a random element at node i only depends on the values taken at the parent nodes. This is meant to model causal relationships between nodes in the graph. Pearl defines the imputation operator as follows: if one imputes at a node i, one disconnects i from all its parents and deterministically sets its value to some fixed, predetermined constant. We will be building on this approach in this paper, so we will defer the formal development of Pearl’s SEM until Section III. At a high level, the imputation operator captures a lot of our intuitions about how the subjunctive conditional should function. When one says If it had rained today, I would have brought my umbrella, what does one mean? Intuitively, one often means: ‘If everything else were the same, only it is the case that it is raining today instead of sunny, these are the actions I would have taken.’ One does not mean that the world is structured in a way such that the necessary processes to induce rain today were instead the case. In other words: causal imputation does not travel upstream, e.g. backwards through time. This is captured in Pearl’s SEM. More practically, consider the question: What are the causal effects of this medication? If we wish to estimate this, we should ‘set’ medication taken to TRUE, and see the consequences of this imputation. If we do not explicitly ‘set’ this value, then the decision to take medication is a consequence of preceding factors. This makes it difficult to determine if the observed effects are a result of the medication or some other confounding variables1 . Again, this will be more formally discussed in Section III. Thus, we can think of these paradigms in terms of the central phenomenon it is designed to model. In summary: 1) Rubin causality is focused on the estimation of the counterfactual. 2) Granger causality is focused on the explanatory power one process provides over another process. 3) Pearl’s SEM is focused on the causal effects of the imputation operator. Throughout this paper, we use Pearl’s SEM. However, we note again that oftentimes problems framed in the Rubin causality or Granger causality paradigm often can be translated to an equivalent formulation in SEM. A. Notation For any set A, we denote the powerset of A as 2A , which can also be thought of as the set of functions mapping A → {0, 1}. For a collection of sets {Ai }i∈I , we denote Q the Cartesian product as i∈I Ai . Also, I will denote the identity matrix, where context will often be sufficient to determine its dimensions. We let U [a, b] denote the uniform distribution on the interval [a, b] and N (µ, Σ) to denote the multivariate Gaussian distribution with mean µ and covariance matrix Σ. III. C AUSAL F RAMEWORK In this section, we introduce our framework for modeling causal effects, and then define the problem of optimal causal imputation. A. Causal structure We build on the structural equation modeling framework presented in [9]. First, we will introduce Bayesian networks. Definition 1. A directed graph G = (V, E) is a set of nodes V and a set of edges E ⊂ V × V . Throughout this paper we will assume V is at most countably infinite. A path from v0 ∈ V to vN ∈ V is a finite sequence of edges (v0 , v1 ), (v1 , v2 ), . . . , (vN −1 , vN ) ∈ E. We define the parents of node i as pa(i) = {j : (j, i) ∈ E}. We can iterate this relationship to define the ancestor relationship: let pan (i) = {j : k ∈ pan−1 (i), (j, k) ∈ E}, where pa1 (i) = pa(i) defined above. Then, the ancestors of n a node i are given by anc(i) = ∪∞ n=1 pa (i). We say j is a descendant of i if i ∈ anc(j). A directed graph is acyclic if i ∈ / anc(i) for every i ∈ V . We will refer to such graphs as directed acyclic graphs (DAGs). 1 We note that similar reasoning can be done in the Rubin causality formulation as well. Definition 2. A random process X indexed by a set V is a collection of random elements (Xi )i∈V . Q We will let Xi denote the possible values of Xi , and X = i∈V Xi . When there is an associated graph G = (V, E), we will use the notation pa(Xi ) to denote the tuple (Xj )j∈pa(i) . Definition 3. A random process X indexed by V is Markov relative to a DAG G = (V, E) if its distribution factorizes: Y P (X) = P (Xi |pa(Xi )) i∈V We can also say that X and G are compatible, or G represents X. This formalization will serve as our model for causality. The interpretation is that if there is an edge going from i to j, then Xi causes Xj . Throughout this paper, we will treat the causal structure G = (V, E) as given. Estimation of this causal structure is a non-trivial task, and an active topic of research. Some approaches to the task of causal inference include: using metrics like directed information to estimate the causal strength between random variables [10], [11], graphicalmodel based methods for estimating structure between random variables [12], [13], [14], [15], and regression based approaches [16], [17], [18]. Again, this list is far from exhaustive as an extensive literature review of this general field is outside the scope of this paper. For a broader overview of various approaches to the problem of causal inference, see [12], [9]. Although the estimation of causal structures is never a simple task, the growing field of research promises more and more applications in which accurate estimation of causal structures is feasible. Previous work has focused on the estimation of causal structures. In contrast, our contribution is to consider the problem of control of causal structures. In other words, once we are given a causal structure, how can we impute causal effects to drive the overall system into a desirable state? For example, once we can estimate the causal effects of issuing rebates for energy-efficiency appliances, how do we best distribute these rebates to induce more energy-efficient consumption patterns? To the best of our knowledge, this is the first paper to consider the problem of when and where to impute on a causal structure. There is an equivalent formulation of the condition in Definition 3 which utilizes disintegration results in probability theory. This is referred to as the structural equation modeling framework in [9]. Proposition 1. [19], [9] A random process X indexed by V is Markov relative to G = (V, E) if and only if there exists a collection of functions (fi )i∈V and independent random elements (ξi )i∈V such that: Xi = fi (pa(Xi ), ξi ) (1) Furthermore, if Xi are Borel spaces2 , then ξi can be taken 2A measurable space S is Borel if there exists a measurable function S → [0, 1] with a measurable inverse. to be U [0, 1]. We note that Borel spaces are a very general category of measurable spaces: they include Polish spaces equipped with the Borel σ-algebra3 . This includes finite sets, R, Rn , Lp (Rn ), the set of p-integrable functions defined on Rn . Additionally, the space of probability distributions on any Borel space is also a Borel space. Assumption 1. Throughout the rest of this paper, we will always use X to denote a random process indexed by V that is Markov relative to a DAG G = (V, E), where Xi takes values in Xi . Similarly, fi shall denote the functions as specified in Equation 1, and similarly ξi . B. Causal imputation In this section, we will formally define the causal imputation operation. Intuitively, imputation of X produces a new random process Y . This random process Y is equal to X prior to the causal imputation, is forced to some value at the node of imputation, and experiences causal effects after the node of imputation. This is formally defined below. Definition 4. [9] A random process Y indexed by V is the imputation of X at i ∈ V to a constant xi ∈ Xi if: • Yi = xi . • For any j that is not a descendant of i, Yj = Xj . • For any j that is a descendant of i, Yj = fj (pa(Yj ), ξj ). If this is the case, we will write Y = do(X; i, xi ). The imputation operator produces a copy of the original process that is exactly equal at all nodes that do not causally depend on the node of imputation Xi . At the point of imputation, the node is disconnected from its parents and forced a constant value xi . The nodes Xj that causally depend on Xi are replaced with new values that depend on the causal effects of Xi , keeping the innovation terms ξ constant throughout. Referring back to the discussions in Section II, this can be thought of as manually setting the value of Xi to xi . This should be something that is done exogenously, as a control variable, rather than as a consequence of endogenous factors: this is why Yi is disconnected from pa(Yi ). From this definition, it immediately follows that the imputation operator commutes. Proposition 2. Let i, j ∈ V such that i 6= j and xi ∈ Xi and xj ∈ Xj . Then do(do(X; i, xi ); j, xj ) = do(do(X; j, xj ); i, xi ) almost surely. This allows us to define imputation on any set of nodes, rather than just at a single node. Q Definition 5. For any I ⊂ V and xI ∈ i∈I Xi , we define the imputation Y = do(X; I, xI ) as the sequential application of element-wise do operations. This is almost surely unique by Proposition 2. 3 A topological space T is Polish if it is separable and completely metrizable. The Borel σ-algebra of a topological space is the smallest σalgebra containing all the open sets. C. Optimal causal imputation In the previous section, we defined the causal imputation operator. We can think of our system designer as having the capacity of issuing control commands that have causal effects on the system downstream. When we can define the cost of imputation as well as a control objective, we can formulate the optimal causal imputation problem. We suppose we are Q given a collection of functions (cI )I⊂V where each cI : i∈I Xi → R. These functions can be interpreted as the cost of imputation at a set of nodes I ⊂ V . Drawing on our running example, c represents the cost of issuing rebates for eco-friendly refrigerators at a set of households. Furthermore, we suppose we are given an operational objective in the form of a cost function g : X → R. For example, g can be a penalty on energy-wasting consumption patterns. Definition 6. The problem of optimal causal imputation is given by: min min Q I⊂V xI ∈ i∈I Xi subject to cI (xI ) + EY [g(Y )] (2) Y = do(X; I, xI ) (3) IV. A PPLICATIONS In Section III, we defined the optimal causal imputation problem in its full generality. In this section, we shall provide methods to solve the optimal causal imputation problem in special cases. In particular, we consider two contexts: 1) situations where imputation is only allowed to a single value, 2) situations where the dynamics are linear-Gaussian. In both instances, we shall assume Xi = Rni for some ni . A. Single-value case In many applications where we can causally impute values, we can only impute to one particular value. For example, when issuing incentives, we may be able to only offer one form of rebate to consumers. Motivated by this context, we consider situations where the optimal causal imputation problem can be reduced to one of submodular optimization. Assumption 2. In this section, we assume V is a finite set and that for each I ⊂ V , there exists an xI such that cI (xI ) < ∞ and cI (x′I ) = ∞ for any x′I 6= xI . We shall refer to this as the single-value case. In the single-value case, we use the shorthand F (I) = c(I) + E[g(do(X; I))], where we drop dependencies on x as it can only take a single value. 1) Submodular minimization: Definition 7. The set mapping F : 2V → R is submodular if for any I1 ⊂ I2 ⊂ V and i ∈ G \ I2 , we have: F (I1 ∪ {i}) − F (I1 ) ≥ F (I2 ∪ {i}) − F (I2 ) (4) Intuitively, this definition is motivated by economies of scale. We often expect economies of scale from these imputations, e.g. the per-customer cost of a rebate is non-increasing as the number of customers increases, due to bulk-purchase discounts. In our running example, the additional cost of issuing a rebate to customer i is higher when you have issued few rebates than when you have issued a lot of rebates. (When I1 ⊂ I2 , then I2 corresponds to the situation where you have issued more rebates than I1 .) From a combinatorial optimization perspective, submodularity is a very well-behaved property that makes optimization, or approximate optimization, very tractable. We shall quickly outline the details now, but we refer the interested reader to [20] for more details. First, note that there is a very direct correspondence between a subset I ⊂ V and a tuple in {0, 1}V . For example, if V = {0, 1, 2}, then (0, 1, 1) corresponds to the subset {1, 2}. Thus, we can think of F : {0, 1}V → R. Now, we define the Lovász extension [21]. Definition 8. Let λ ∼ U [0, 1]. Then, for any set mapping F : {0, 1}V → R, we define the Lovász extension f : [0, 1]V → R as: f (z) = Eλ [F ({i : zi > λ})] For the rest of this section, an unindexed f will denote the Lovász extension of F . We note two nice properties of the Lovász extension immediately. Proposition 3. [21] For any z ∈ {0, 1}V , we have f (z) = F (z). Proposition 4. [21] F is submodular if and only if f is convex. Note that the optimal causal imputation problem can be written as: min F (z) z∈{0,1}V The Lovász extension provides us with an easy solution to the problem. Proposition 5. [21] If F is submodular, then the following is a convex optimization program. min f (z) z∈[0,1]V (5) Furthermore, there exist minimizers of (5) in {0, 1}V . In other words, the combinatorial optimization problem can be solved tractably with convex optimization if F is submodular. Thus, we are motivated in searching for conditions under which F (I) = c(I) + E[g(do(X; I))] is submodular. We provide a common sufficient condition for submodularity of F in the following theorem: Theorem 1. If: 2 • g(Y ) = kYi − EYi k2 for some i ∈ V . ξ • There exists functions fj such that, if Xj has no parents, ξ Xj = fj (ξj ) and otherwise Xj = pa(Xj ) + fjξ (ξj ). • For each j ∈ anc(i), there exists one unique path from j to i. c(I) is submodular. Then F (I) = c(I) + E[g(do(X; I))] is submodular. • Note here that we treat pa(Xi ) as a vector in Rni , where ni is the appropriate dimension. These assumptions encompass many graphical models where a node’s parents set a location parameter, and the control objective is the second moment of some feature. Proof. Note that the desired result will follow if we show that the set mapping G : I 7→ E[g(do(X; I))] is submodular, since the sum of submodular functions is submodular. Throughout this proof, we use i to refer to the index i pulled out by the function g. We can see that G(∅) = E[g(X)]. By the independence of the (ξi )i∈V and the form ofP the (Xi )i∈V relationships, we can write this as E[g(X)] = j∈anc(i) kfjξ (ξj )− Efjξ (ξj )k22 . (Note that the unique path assumption ensures that each variance is only counted once in this sum.) More generally, we can write an expression for G(I). Note that if we impute at a node j, all the uncertainty due to node j, and the ancestorsPof j, is zeroed out. Thus, we can write G(I) = E[g(X)]− j∈(I∪anc(I)) kfjξ (ξj )−Efjξ (ξj )k22 , where we define anc(I) = ∪j∈I anc(j). Now, we can verify the submodularity condition on G. Pick I1 ⊂ I2 and i′ ∈ V \ I2 . Then: G(I1 ∪ {i′ }) − G(I1 ) = X kfjξ (ξj ) − Efjξ (ξj )k22 − j∈(I1 ∪anc(I1 )) X kfjξ (ξj ) − Efjξ (ξj )k22 = j∈(I1 ∪{i′ }∪anc(I1 ∪{i′ })) − X kfjξ (ξj ) − Efjξ (ξj )k22 j∈{i′ }∪(anc(i′ )\anc(I1 )) In words, the change in G due to adding i′ to I1 is the variances due to the terms related to i′ and the ancestors of i′ that have not already been zeroed out due to imputation, i.e. the ancestors of i′ that are not already ancestors of I1 . A similar derivation can be done for I2 . Thus, we can verify that G(I1 ∪ {i′ }) − G(I1 ) ≥ G(I2 ∪ ′ {i }) − G(I2 ) by noting that anc(i′ ) \ anc(I2 ) ⊂ anc(i′ ) \ anc(I1 ), so the right-hand side of the inequality adds more negative terms. This concludes our proof. 2) Submodular maximization: Alternatively, suppose we are attempting to maximize a submodular function subject to a constraint, i.e. F (I) = c(I) + E[g(do(X; I))] subject to a constraint that I ∈ S ⊂ 2V and our objective is to solve maxI∈S F (I).4 First, consider the greedy method for submodular maximization. This is presented as Algorithm 1. At each iteration, it simply adds an element to I which maximizes F (I ∪ {i}), if one exists. If one does not exist, it terminates and returns 4 Strictly speaking, to remain consistent with the problem in Section III, we should be solving minI∈S −F (I), but we express it as a maximization for clarity of presentation. Algorithm 1 The greedy approach for combinatorial maximization. I←∅ while maxi:I∪{i}∈S F (I ∪ {i}) − F (I) ≥ 0 do Pick i∗ ∈ arg maxi:I∪{i}∈S F (I ∪ {i}) I ← I ∪ {i∗ } end while return I I. Under certain structural conditions, this algorithm yields approximate optimizers. Definition 9. A set mapping F : 2V → R is nondecreasing if F (S) ≤ F (T ) whenever S ⊂ T . The monotonicity condition effectively prevents the algorithm from straying too far from the optimum when taking the greedy approach, as shown in [22]. Note that if F is nondecreasing, then the condition maxi:I∪{i}∈S F (I ∪ {i}) − F (I) ≥ 0 is equivalent to the existence of i ∈ V such that I ∪ {i} ∈ S. Proposition 6. [22] If F is nondecreasing and submodular, then the greedy method presented in Algorithm 1 will return I ∗ ∈ S such that F (I ∗ ) ≥ e−1 maxI∈S F (I). e We now present a quick corollary of Theorem 1, which provides conditions under which we can leverage the existing results for maximization of nondecreasing submodular functions. Corollary 1. If: ′ 2 • g (Y ) = −kYi − EYi k2 for some i ∈ V . ξ • There exists functions fj such that, if Xj has no parents, Xj = fjξ (ξj ) and otherwise Xj = pa(Xj ) + fjξ (ξj ). • For each j ∈ anc(i), there exists one unique path from j to i. • c(I) is nondecreasing and submodular. Then F (I) = c(I) + E[g ′ (do(X; I))] is nondecreasing and submodular. Proof. This follows from Theorem 1 if we can show that G′ : I 7→ E[g(do(X; I))] is nondecreasing. Let Y = do(X; I), and note that adding elements to I can only decrease the variance of Yi . This can be formalized by noting, similar to the arguments in the proof of Theorem 1, G′ (I) = P ′ E[g (X)]+ j∈(I∪anc(I)) kfjξ (ξj )−Efjξ (ξj )k22 . Thus, G′ , the additive inverse of the variance of Yi , is nondecreasing. Note the minus sign in g ′ in Corollary 1: in most instances where you are maximizing a submodular cost, you would still wish to reduce uncertainty, i.e. have a lower variance. B. Linear-Gaussian case In this section, we consider causal imputation on a discrete-time linear dynamical system with Gaussian noise. That is, we analyze the special case of a random process with the form: Xt+1 = AXt + ǫt Where Xt ∈ Rn , ǫt ∼ N (0, σ 2 I) independently for t = 0, ..., T , and A ∈ Rn×n is a matrix representing the dependencies. This process can be represented as a causal graph in the form of a trellis, where the random variables are all Gaussian. More specifically, each node has its expected value equal to a linear combination of their parents, as described by a matrix A, and additive noise of the distribution N (0, σ 2 ). To analyze our optimal casual imputation problem, we first redefine the indices for this problem. Since our causal graph represents a process over time, we index into the process by state k, for k = 1, ...n as well as a time t for t = 0, ..., T . Thus Xkt indicates the value of state k at time t, and our graph has vertices V = {1, . . . , n} × {0, . . . , T }. As before, Xt represents the value of the vector of all the states of X at time t, and we can think of X as a vector in RnT . We assume that the cost of imputation cI (xI ) has the following form for some parameters δi , qi ≥ 0: X cI (xI ) = δi + qi x2i i∈I Further, we look at the case where the system cost of interest is minimizing the expected distance of the the random process from some target trajectory ȳ. Thus g(Y ) = kY − ȳk22 . Our optimal causal imputation problem in this case is thus: X    min min δi + qi x2i + E kY − ȳk22 S⊂V xS ∈RS (6) i∈S subject to Y = do(X; S, xS ) The summation term can be thought of as a cost of issuing control commands and the expectation term can be thought of as a trajectory tracking objective. Given our structure on the random process, we can rewrite this optimization problem more concretely. We first define Q ∈ RnT ×nT to be diagonal matrix with the qi ’s on the diagonal. We define δ ∈ RnT to be the vector of δi ’s. Further, let 1nT denote the column vector of all ones in RnT . Lastly, we define diag(S) to be the square matrix with the elements of S on the diagonal, and zeros everywhere else. The optimization in (6) now becomes: min S∈{0,1}nT x̄∈RnT subject to x̄⊤ (Q + D)x̄ + σ 2 trace(DIS ) + δ ⊤ S − 2ȳ ⊤ x̄ (Si − 1)x̄i = 0 for all i = 1, . . . , nT P = (1 − Ã)−1 D = P ⊤P IS = I − diag(S)  0 0 0 ... 0 0  A 0 0 . . . 0 0    0 A 0 . . . 0 0    à = IS   0 0 A . . . 0 0   . .. .. . . .. ..   .. . . . . . 0 0 0 ... A 0  We note that for any matrix A and any S, the matrix I − Ã, with à as defined above, is invertible, so P will always be well-defined. Additionally, for a fixed S, the optimization across x̄ is easy to solve. That is, D is entirely determined by S. If we let (Q + D)S denote the submatrix of (Q + D) indexed by the non-zero elements of S, and similarly x̄S and ȳS , then the optimizer is given by x̄∗S = (Q + D)−1 S ȳS , with the other entries of x̄∗ equal to 0. Thus, we can easily calculate a set mapping F (S) such that optimal causal imputation in the linear-Gaussian case is simply minS⊂V F (S). We can solve this when nT is relatively small, and are currently investigating properties of F (S) which would allow us to apply combinatorial optimization techniques [20]. V. C ONCLUSION AND F UTURE W ORK The previous literature on mathematical formulations of causality has been focused on the estimation of causal structures. In this paper, we presented the problem of control of causal structures. We formally defined the problem of optimal causal imputation, and formulate solutions for it in two cases: where imputation is allowed to only a single value, and the case where the dynamics are linear and the noise is Gaussian. In future work, we hope to apply this framework to real situations which allow both the estimation of causal structures, as well as verification of the consequences and costs of imputation. Additionally, we hope to generalize our results to consider dynamical systems whose behavior are influenced by different features. For example, we can consider the dynamics of the power grid, but also account for frequently used machine learning features as well, such as the zip code of different energy consumers and the age of deployed assets. We believe that considering the control aspects of causality is increasingly more relevant. In many smart infrastructure applications, we no longer have control commands that directly affect the dynamics, but rather our control actions act more like causal imputations. The optimal causal imputation framework is a promising direction to model these interactions between machine learning and control, and provides a model for closing the loop on analytics in cyber-physical systems. R EFERENCES [1] D. B. Rubin, “Estimating causal effects of treatments in randomized and nonrandomized studies,” Journal of Educational Psychology, vol. 66(5), pp. 688–701, 1974. [2] G. W. Imbens and D. B. Rubin, Causal Inference for Statistics, Social, and Biomedical Sciences: An Introduction. Cambridge University Press, 2015. [3] S. Athey and G. W. Imbens, “Machine learning methods for estimating heterogeneous causal effects,” arXiV, 2015. [4] D. Zhou, M. Balandat, and C. J. Tomlin, “Residential demand response targeting using machine learning with observational data,” in 55th IEEE Conference on Decision and Control (CDC), 2016. [5] A. Banerjee, E. Duflo, N. Goldberg, D. Karlan, R. Osei, W. Parienté, J. Shapiro, B. Thuysbaert, and C. Udry, “A multifaceted program causes lasting progress for the very poor: Evidence from six countries,” Science, vol. 348, no. 6236, 2015. [Online]. Available: http://science.sciencemag.org/content/348/6236/1260799 [6] C. W. J. Granger, “Investigating causal relations by econometric models and cross-spectral methods,” Econometrica, vol. 37, no. 3, pp. 424–438, 1969. [Online]. Available: http://www.jstor.org/stable/1912791 [7] A. Brovelli, M. Ding, A. Ledberg, Y. Chen, R. Nakamura, and S. L. Bressler, “Beta oscillations in a large-scale sensorimotor cortical network: Directional influences revealed by Granger causality,” Proceedings of the National Academy of Sciences of the United States of America, vol. 101, no. 26, pp. 9849–9854, 06 2004. [Online]. Available: http://www.ncbi.nlm.nih.gov/pmc/articles/PMC470781/ [8] C. W. Granger, B.-N. Huang, and C.-W. Yang, “A bivariate causality between stock prices and exchange rates: Evidence from recent Asian flu,” The Quarterly Review of Economics and Finance, vol. 40, no. 3, pp. 337 – 354, 2000. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S1062976900000429 [9] J. Pearl, Causality: Models, Reasoning and Inference. Cambridge University Press, 2009. [10] C. Gourieroux, A. Monfort, and E. Renault, “Kullback causality measures,” Annales d’conomie et de Statistique, no. 6/7, pp. 369–410, 1987. [Online]. Available: http://www.jstor.org/stable/20075662 [11] P. Amblard and O. J. J. Michel, “The relation between granger causality and directed information theory: a review,” CoRR, vol. abs/1211.3169, 2012. [Online]. Available: http://arxiv.org/abs/1211.3169 [12] J. Pearl, Graphical Models for Probabilistic and Causal Reasoning. Dordrecht: Springer Netherlands, 1998, pp. 367–389. [13] S. L. Lauritzen, “Causal inference from graphical models,” 2001. [14] J. Li, S. Ma, T. D. Le, L. Liu, and J. Liu, “Causal decision trees,” CoRR, vol. abs/1508.03812, 2015. [Online]. Available: http://arxiv.org/abs/1508.03812 [15] S. Athey and G. Imbens, “Recursive Partitioning for Heterogeneous Causal Effects,” ArXiv e-prints, Apr. 2015. [16] A. P. Dawid, “Causal inference without counterfactuals,” Journal of the American Statistical Association, vol. 95, no. 450, pp. 407–424, 2000. [Online]. Available: http://www.jstor.org/stable/2669377 [17] D. Heckerman, C. Meek, and G. Cooper, A Bayesian Approach to Causal Discovery. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006, pp. 1–28. [18] P. O. Hoyer, D. Janzing, J. M. Mooij, J. Peters, and P. B. Schölkopf, “Nonlinear causal discovery with additive noise models,” in Advances in Neural Information Processing Systems 21, D. Koller, D. Schuurmans, Y. Bengio, and L. Bottou, Eds. Curran Associates, Inc., 2009, pp. 689–696. [Online]. Available: http://papers.nips.cc/paper/3548-nonlinear-causal-discovery-with-additive-noise-models.pdf [19] O. Kallenberg, Foundations of Modern Probability. Springer, 2002. [20] A. Schrijver, Combinatorial Optimization: Polyhedra and Efficiency. Springer-Verlag Berlin Heidelberg, 2003. [21] L. Lovász, Submodular functions and convexity. Springer, 1983, pp. 235–257. [22] G. L. Nemhauser, L. A. Wolsey, and M. L. Fisher, “An analysis of approximations for maximizing submodular set functions,” Mathematical Programming, vol. 14, no. 1, pp. 265–294, 1978.
3cs.SY
Block-Diagonal Coding for Distributed Computing With Straggling Servers Albin Severinson† ‡ , Alexandre Graell i Amat† , and Eirik Rosnes‡ arXiv:1701.06631v3 [cs.IT] 15 Sep 2017 †Department of Electrical Engineering, Chalmers University of Technology, Gothenburg, Sweden ‡Simula@UiB, Bergen, Norway Abstract—We consider the distributed computing problem of multiplying a set of vectors with a matrix. For this scenario, Li et al. recently presented a unified coding framework and showed a fundamental tradeoff between computational delay and communication load. This coding framework is based on maximum distance separable (MDS) codes of code length proportional to the number of rows of the matrix, which can be very large. We propose a block-diagonal coding scheme consisting of partitioning the matrix into submatrices and encoding each submatrix using a shorter MDS code. We show that the assignment of coded matrix rows to servers to minimize the communication load can be formulated as an integer program with a nonlinear cost function, and propose an algorithm to solve it. We further prove that, up to a level of partitioning, the proposed scheme does not incur any loss in terms of computational delay (as defined by Li et al.) and communication load compared to the scheme by Li et al.. We also show numerically that, when the decoding time is also taken into account, the proposed scheme significantly lowers the overall computational delay with respect to the scheme by Li et al.. For heavy partitioning, this is achieved at the expense of a slight increase in communication load. I. I NTRODUCTION Distributed computing has emerged as one of the most effective ways of tackling increasingly complex computation problems. One of the main application areas is large-scale machine learning and data analytics. Google routinely performs computations using several thousands of servers in their MapReduce clusters [1]. Distributed computing systems bring significant challenges. Among them, the problems of straggling servers and bandwidth scarcity have recently received significant attention. The straggler problem is a synchronization problem characterized by the fact that a distributed computing task must wait for the slowest server to complete its computation. On the other hand, distributed computing tasks typically require that data is moved between servers during the computation, the so-called data shuffling, which is a challenge in bandwidth-constrained networks. Coding for distributed computing to reduce the computational delay and the communication load between servers has recently been considered in [2], [3]. In [2], a structure of repeated computation tasks across servers was proposed, enabling coded multicast opportunities that significantly reduce the required bandwidth to shuffle the results. In [3], the authors showed that maximum distance separable (MDS) codes can be This work was funded by the Swedish Research Council under grant 201604253 and the Research Council of Norway under grant 240985/F20. applied to a linear computation task (e.g., multiplying a vector with a matrix) to alleviate the effects of straggling servers and reduce the computational delay. In [4], a unified coding framework was presented and a fundamental tradeoff between computational delay and communication load was identified. The ideas of [2], [3] can be seen as particular instances of the framework in [4], corresponding to the minimization of the communication load or the computational delay. The distributed computing problem addressed in [4] is a matrix multiplication problem where a set of vectors x1 , . . . , xN are multiplied by a matrix A. In particular, as in [3], the authors suggest the use of MDS codes, whose dimension is equal to the number of rows of A, to generate some redundant computations. In practice, the size of A can be very large. For example, Google performs matrix-vector multiplications with matrices of dimension of the order of 1010 × 1010 when ranking the importance of websites [5]. Since the decoding complexity of MDS codes on the packet erasure channel is quadratic (for Reed-Solomon (RS) codes) in the code length [6], for very large matrix sizes the decoding complexity may be prohibitively high. In this paper, we introduce a block-diagonal encoding scheme for the distributed matrix multiplication problem. The proposed encoding is equivalent to partitioning the matrix and applying smaller MDS codes to each submatrix separately. The storage design for the proposed block-diagonal encoding can be cast as an integer optimization problem with a nonlinear objective function, whose computation scales exponentially with the problem size. We propose a heuristic solver for efficiently solving the optimization problem, and a branchand-bound approach for improving on the resulting solution iteratively. We exploit a dynamic programming approach to speed up the branch-and-bound operations. We prove that up to a certain partitioning level, partitioning does not increase the computational delay (as defined in [4]) and the communication load with respect to the scheme in [4]. Interestingly, when the decoding time is taken into account, the proposed scheme achieves an overall computational delay significantly lower than the one of the scheme in [4]. This is due to the fact that the proposed scheme allows using significantly shorter MDS codes, hence reducing the decoding complexity and the decoding time. Also, numerical results show that a high level of partitioning can be applied at the expense of only a slight increase in the communication load. II. S YSTEM M ODEL We consider the problem of multiplying a set of vectors with a matrix. In particular, given a matrix A ∈ Fm×n and N vectors x1 , . . . , xN ∈ Fn , where F is some field, we want to compute the N vectors y1 = Ax1 , . . . , yN = AxN . The computation is performed in a distributed fashion using K servers, S1 , . . . , SK , where each server stores µm matrix rows, 1 ≤ µ ≤ 1. Prior to distributing the rows among for some K the servers, A is encoded by an r × m encoding matrix Ψ, resulting in the coded matrix C = ΨA, of size r × n, i.e., the rows of A are encoded using an (r, m) linear code with r ≥ m. Let q = K m r , where we assume that r divides Km and hence q is an integer. cr,  The r coded rows of C, c1 , . . . , K K are divided into µq disjoint batches, each containing r/ µq coded rows. Each batch is assigned to µq servers. Correspondingly, a batch B is labeled by a unique set T ⊂ {S1 , . . . , SK }, of size |T | = µq, denoting the subset of servers that store that batch, and we write BT . Server Sk , k = 1, . . . , K, stores the coded rows of BT if and only if Sk ∈ T . A. Probabilistic Runtime Model We adopt the probabilistic model of the computation runtime of [3]. We assume that running a computation on a single server takes a random amount of time according to the shiftedexponential cumulative probability distribution ( t 1 − e−( σ −1) , for t ≥ σ F (t) = , 0, otherwise where σ is the number of multiplications and divisions required to complete the computation. We do not take addition and subtraction into account as those operations are orders of magnitude faster [7]. When the computation is split into K parallel subtasks running on separate servers, we assume that the runtimes of the subtasks are independent and identically distributed random variables with distribution F (Kt) [3]. Furthermore, the runtime of the g-th, g = 1, . . . , K, fastest server to complete its subtask is given by the g-th order statistic, F(g) , with expectation [8]   K X  1 f (σ, K, g) , E F(g) = σ 1 + . j j=K−g+1 B. Distributed Computing Model We consider the MapReduce framework described in [4], where we assume that the input vectors x1 , . . . , xN are known to all servers. The overall computation then proceeds in three phases: map, shuffle, and reduce. 1) Map Phase: In the map phase, we compute in a distributed fashion coded intermediate values, which will be later used to obtain vectors y1 , . . . , yN . Server S multiplies the input vectors xj , j = 1, . . . , N , by all the coded rows of matrix C it stores, i.e., it computes (S) Zj , {cxj : c ∈ {BT : S ∈ T }}, j = 1, . . . , N. The map phase terminates when a set of servers G ⊆ {S1 , . . . , SK } that collectively store enough values to decode the output vectors have finished their map computations. We denote the cardinality of G by g. The (r, m) linear code proposed in [4] is an MDS code for which y1 , . . . , yN can be obtained from any subset of q servers, i.e., g = q. We define the computational delay of the map phase as its average runtime per source row and vector y, i.e., σmap 1 f( K , K, g). Dmap is referred to simply as the Dmap = mN computational delay in [4]. As all K servers compute µm inner products, each requiring n multiplications for each of the N input vectors, we have σmap = KµmnN . After the map phase, the computation of y1 , . . . , yN proceeds using only the servers in G. We denote by Q ⊆ G the set of the first q servers to complete the map phase. Each of the q servers in Q is responsible to compute N/q of the vectors y1 , . . . , yN . Let WS be the set containing the indices of the vectors y1 , . . . , yN server S ∈ Q is responsible for. The remaining servers in G assist the servers in Q in the shuffle phase. 2) Shuffle Phase: In the shuffle phase, intermediate values calculated in the map phase are exchanged between servers in G until all servers in Q hold enough values to compute the vectors they are responsible for. As in [4], we allow creating and multicasting coded messages that are simultaneously useful for multiple servers. For a subset of servers S ⊂ Q and S ∈ Q\S, we denote the set of intermediate values needed by (S) server S and known exclusively by the servers in S by VS . More formally, (S) VS , {cxj : j ∈ WS and c ∈ {BT : T ∩ Q = S}}. K−q Pµq (q−1 j )(µq−j ) and sq , inf (s : l=s αl ≤ 1 − µ). q K K (µq ) For each j ∈ {µq, µq − 1, . . . , sq }, and every subset S ⊆ Q of size j + 1, the shuffle phase proceeds as follows. Let αj , (S) 1) For each S ∈ S, we evenly and arbitrarily split VS\S (S) (S) into j disjoint segments VS\S = {VS\S,S̃ : S̃ ∈ S \ S}, (S) and associate the segment VS\S,S̃ with server S̃ ∈ S \S. 2) Server S̃ ∈ S multicasts the bit-wise XOR of all the segments associated with it in S. More precisely, it (S) multicasts ⊕S∈S\S̃ VS\S,S̃ to the other servers in S \ S̃. For every pair of servers S, S̃ 0 ∈ S, since server S has (S ) computed locally the segments VS\S 0 ,S̃ for all S 0 ∈ S \{S̃, S}, it can cancel them from the message sent by server S̃, and recover the intended segment. We finish the shuffle phase by either unicasting any remaining needed values until all servers in Q hold enough intermediate values to decode successfully, or by repeating the above two steps for j = sq − 1, selecting the strategy achieving the lower communication load. Definition 1. The communication load, denoted by L, is the number of messages per source row and vector y exchanged during the shuffle phase, i.e., the total number of messages sent during the shuffle phase divided by mN . Depending on the strategy, the P communication load after Pµq α α µq completing the multicast phase is j=sq jj or j=sq −1 jj [4]. For the scheme in [4], the total communication load is  LMDS  µq µq µq X X X α α j j . = min  +1−µ− αj , j j j=s j=s j=s −1 q q (1) (1) (1) (1) (2) (2) c1 c5 c1 c3 c 5 (1) (2) (3) (3) (3) c2 c6 c2 c4 c6 Server S2 (1) (3) (4) (5) (5) c1 c3 c3 c1 c5 (2) (3) (4) (5) (5) c2 c4 c4 c2 c6 Server S5 c1 c3 c5 c 1 c3 (1) (1) (1) (2) (2) c2 c4 c6 c 2 c4 Server S1 c5 c1 c1 c1 c3 (1) (3) (4) (5) (5) c6 c2 c2 c2 c4 Server S4 (1) (2) (3) (3) (3) c3 c5 c1 c3 c5 (1) (2) (4) (4) (4) c4 c6 c2 c4 c6 Server S3 (2) (3) (4) (5) (5) c3 c5 c5 c3 c5 (2) (3) (4) (5) (5) c4 c6 c6 c4 c6 Server S6 (1) Definition 2. The overall computational delay, D, is the sum of the map and reduce phase delays, i.e., D = Dmap +Dreduce . III. B LOCK -D IAGONAL C ODING We introduce a block-diagonal encoding matrix of the form   ψ1   .. Ψ= , . ψT r m where ψ1 , . . . , ψT are Tr × m T encoding matrices of an ( T , T ) MDS code, for some integer T that divides m and r. Note that the encoding given by Ψ amounts to partitioning the rows of A into T disjoint submatrices A1 , . . . , AT and encoding each submatrix separately. We refer to an encoding Ψ with T disjoint submatrices as a T -partitioned scheme, and to the submatrix of C = ΨA corresponding to ψi as the ith partition. We remark that all submatrices can be encoded using the same encoding matrix, i.e., ψi = ψ, i = 1, . . . , T , reducing the storage requirements, and encoding/decoding can be performed in parallel if many servers are available. We further remark that the case Ψ = ψ (i.e., the number of partitions is T = 1) corresponds to the scheme in [4], which we will sometimes refer to as the unpartitioned scheme. A. Assignment of Coded Rows to Batches (t) For a block-diagonal encoding matrix Ψ, we denote by ci , t = 1, . . . , T and i = 1, . . . , r/T , the i-th coded row of C (2) within partition t. For example, c1 denotes the first coded row of the second partition. As described in Section II, the K coded rows are divided into µq disjoint batches. To formally describe the assignment of coded rows to batches we use a  K × T integer matrix P = [p ], where pi,j describes the i,j µq number of rows from partition j that are stored in batch i. Note that, due to the MDS property, any set of m/T rows of a partition is sufficient to decode the partition. Thus, without loss of generality, we consider a sequential assignment of rows of a partition into batches. For example, for the assignment P (2) (4) (4) (4) (2) (3) (4) (5) (5) Fig. 1. Storage design for m = 20, N = 4, K = 6, q = 4, µ = 1/2, and T = 5. q As in [4], we consider the cost of a multicast message to be equal to that of a unicast message. In real systems, however, it may vary depending on the network architecture. 3) Reduce Phase: Finally, in the reduce phase, the vectors y1 , . . . , yN are computed. More specifically, server S ∈ Q (S) (S) uses the locally computed sets Z1 , . . . , ZN and the received messages to compute the vectors in {yj : j ∈ WS }. The computational delay of the reduce phase is its average runtime per source row and output vector y, i.e., Dreduce = σreduce 1 mN f ( q , q, q), where σreduce is given in Section IV-B. (1) (1) (1) (2) (2) c1 c3 c5 c1 c3 (1) (1) (1) (2) (2) c2 c4 c6 c2 c4 Server S1 (1) (1) c1 x3 ⊕ c3 x2 (1) c2 x3 (1) (2) (2) ⊕ c5 x 1 (3) (3) (1) (2) c4 x2 ⊕ c6 x1 (1) (3) c1 c5 c1 c3 c5 (1) (2) (3) (3) (3) c2 c6 c2 c4 c6 Server S2 (2) (4) (4) (4) c3 c5 c1 c3 c 5 (1) (2) (4) (4) (4) c4 c6 c2 c4 c 6 Server S3 Fig. 2. Multicasting coded values between servers S1 , S2 , and S3 . (1) (1) in Example 1 (see (2)), rows c1 and c2 are assigned to batch (1) (1) 1, c3 and c4 are assigned to batch 2, and so on. The rows of P are labeled by the subset of servers the corresponding batch is stored at, and the columns are labeled by its partition index. We refer to the pair (Ψ, P ) as the storage design. The assignment matrix P must satisfy the following conditions. 1) The entries P must sumK to  the batch PTof each row of K size, i.e., j=1 pi,j = r/ µq , 1 ≤ i ≤ µq . 2) The entries of each column of P must sum to the K P(µq ) number of rows per partition, i.e., i=1 pi,j = Tr , 1 ≤ j ≤ T. Example 1 (m = 20, N = 4, K = 6, q = 4, µ = 1/2, T = 5). For these parameters, there are r/T = 6 coded rows per partition, of which m/T = 4 are sufficient for   decoding, K K and µq = 15 batches, each containing r/ µq = 2 coded rows. We construct the storage design shown in Fig. 1 with assignment matrix 1  (S1 , S2 ) 2 (S1 , S3 )  2  (S1 , S4 )  2 0 P = (S1 , S5 )   ..  .  (S , S )  0 4 6 (S5 , S6 ) 2 0 0 0 2 3 0 0 0 0 .. . 4 0 0 0 0 5  0 0  0 0 ,    0 0 0 2 0 0 0 0 2 (2) where rows are labeled by the subset of servers the batch is stored at, and columns are labeled by the partition index. For this storage design, any g = 4 servers collectively store at least 4 coded rows from each partition. However, some servers store more rows than needed to decode some partitions, suggesting that this storage design is suboptimal. Assume G = {S1 , S2 , S3 , S4 } is the set of g = 4 servers that finish their map computations first. Also, assign vector yi to server Si , i = 1, 2, 3, 4. We illustrate the coded shuffling scheme for S = {S1 , S2 , S3 } in Fig. 2. (1) (1) S1 multicasts c1 x3 ⊕ c3 x2 to S2 and S3 . Since S2 and (1) (1) S3 can cancel c1 x3 and c3 x2 , respectively, both servers receive one needed intermediate value. Similarly, S2 multicasts (1) (2) (1) (2) c2 x3 ⊕ c5 x1 , while S3 multicasts c4 x2 ⊕ c6 x1 . This process is repeated for S = {S2 , S3 , S4 }, S = {S1 , S3 , S4 }, and S = {S1 , S2 , S4 }. After the shuffle phase, we have sent 12 multicast messages and 30 unicast messages, resulting in a communication load of (12 + 30)/20/4 = 0.525, a 50% increase from the load of the unpartitioned scheme (0.35, given by (1)). In this case, S1 received additional intermediate values from partition 2, despite already storing enough, further indicating that the assignment in (2) is suboptimal. IV. P ERFORMANCE OF THE B LOCK -D IAGONAL C ODING In this section, we analyze the performance impact of partitioning. We have the following theorem.  K there exists an assignment matrix Theorem 1. For T ≤ r/ µq P such that the communication load and computational delay of the map phase are equal to those of the unpartitioned scheme. A. Communication Load For the unpartitioned scheme of [4], G = Q, and the number of remaining values that need to be unicasted after the multicast phase is constant, regardless which subset Q of servers finish first their map computations. However, for the block-diagonal (partitioned) coding scheme, both g and the number of remaining unicasts may vary. For a given assignment P and a specific Q, we denote (S) by UQ (P ) the number of remaining values needed after the multicast phase by server S ∈ Q, and by UQ (P ) , P (S) S∈Q UQ (P ) the total number of remaining values needed q by the servers in Q. Let QP denote the superset of all sets Q 1 1 and define LQ , mN Q∈Qq UQ (P ). Then, for a given |Qq | storage design (Ψ, P ), the communication load of the blockdiagonal coding scheme is given by  µq µq X X α α j j + LQ , + LQ  , LBDC (Ψ, P ) = min  j j j=s −1 j=s  q (3) q where LQ depends on the shuffling scheme (see Section II-B2) and is different in the first and second term of the minimization (S) in (3). To evaluate UQ , we count the total number of intermediate values that need to be unicasted to server S until it holds m/T intermediate values from each partition. For a given Ψ, the assignment of rows into batches can be formulated as an optimization problem, where one would like to minimize LBDC over all assignments P . More precisely, the optimization problem is minP ∈P LBDC (Ψ, P ), where P is the set of all assignments P , and where the dependence of LBDC on P is nonlinear. This is a computationally complex problem since both the complexity of evaluating the performance of a given assignment and the number of assignments scale exponentially in the problem size. B. Computational Delay We consider the delay incurred by both the map and reduce phases (see Definition 2). Note that in [4] only Dmap is considered, i.e., D = Dmap . However, one should not neglect the computational delay incurred by the reduce phase. Thus, one should consider D = Dmap + Dreduce . The reduce phase consists of decoding the N output vectors and hence the delay it incurs depends on the code and decoding algorithm. We assume that each partition is encoded using an RS code and is decoded using the Berlekamp-Massey algorithm. We measure the decoding complexity by its associated shifted-exponential parameter σ (see Section II-A). The number of field multiplications required to decode an (r/T, m/T ) RS code is (r/T )2 ξ [7], where ξ is the fraction q (the map of erased symbols. With ξ upperbounded by 1 − K q phase terminates when a fraction of at least K symbols from each partition is available) the complexity of decoding the T partitions for all N output vectors is at most q r2 (1 − K )N . (4) T The decoding complexity of the scheme in [4] is given by evaluating (4) for T = 1. By choosing T close to r, we can thus significantly reduce the delay of the reduce phase. σreduce = V. A SSIGNMENT S OLVERS We propose two solvers for the problem of assigning rows into batches: a heuristic solver that is fast even for large problem instances, and a hybrid solver combining the heuristic solver with a branch-and-bound solver. The branch-and-bound solver produces an optimal assignment but is significantly slower, hence it can be used as stand-alone only for small problem instances. We use a dynamic programming approach (S) to speed up the branch-and-bound solver by caching UQ for (S) all Q ∈ Qq , indexed by the batches each UQ is computed (S) from. This way we only need to update the affected UQ when assigning a row to a batch. For all solvers, we first label the batches lexiographically and then optimize LBDC in (3). The solvers are available under the Apache 2.0 license [9]. A. Heuristic Solver The heuristic solver creates an assignment jmatrix k  P in two K ·T , steps. We first set each entry of P to γ , r/ µq  K thus assigning the first µq γ rows of each partition to batches  K such that each batch is assigned γT rows. Let d = r/ µq −γT be the number of rows that still need to be assigned to each  K batch. The r/T − µq γ rows per partition not assigned yet are assigned in the second step as given in the algorithm below. Input : P , d, K, T , and µq K for 0 ≤ a < d µq do i ← ba/dc + 1 j ← (a mod T ) + 1 pi,j ← pi,j + 1 end return P B. Branch-and-Bound Solver The branch-and-bound solver finds an optimal solution by recursively branching at each batch for which there is more than one possible assignment and considering all options. For each branch, we lowerbound the value of the objective function of any assignment in that branch and only investigate branches with possibly better assignments. L 1.10 1.05 Heuristic Hybrid Random L 1.15 1.2 1.1 1.0 0.9 0.8 0.7 0.6 0 10 Heuristic Random D D 1.00 1.06 1.05 1.04 1.03 1.02 1.01 1.00 0.99 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0.0 0 10 101 102 103 104 T 101 102 103 K Fig. 3. The tradeoff between partitioning and performance for m = 6000, n = 6000, K = 9, q = 6, N = 6, and µ = 1/3. Fig. 4. Performance dependence on system size for µq = 2, n = 10000, µm = 2000, m/T = 10 rows per partition, and code rate m/r = 2/3. 1) Branch: For the first row of P with remaining assignments, branch on every available assignment for that row. (S) 2) Bound: We keep a record of all nonzero UQ for all Q and S, and index them by the batches they are computed from. An assignment to a batch can at most reduce LBDC by (S) 1/ (mN |Qq |) for each nonzero UQ indexed by that batch, and we lowerbound LBDC for a subtree by assuming that no (S) UQ will drop to zero for any subsequent assignment. partition, and code rate m/r = 2/3 as a function of the number of servers, K. The results shown are averages over 1000 randomly generated realizations of G as it is computationally unfeasible to evaluate the performance exhaustively in this case. The heuristic solver outperforms the random assignments for small K, but as K grows the performance of both solvers converge. The delay is an order of magnitude lower than that of the scheme in [4] for the largest system considered. C. Hybrid Solver We first find a candidate solution using the heuristic solver and then iteratively improve it using the branch-and-bound solver. In particular, we decrement by 1 a random set of elements of P and then use the branch-and-bound solver to reassign the corresponding rows optimally. We repeat this process until the average improvement between iterations drops below some threshold. VI. N UMERICAL R ESULTS In Figs. 3 and 4, we plot the performance of the proposed block-diagonal coding scheme with assignment P given by the heuristic and the hybrid solvers. We normalize the performance by that of the unpartitioned scheme of [4]. We also give the average performance over 100 random assignments. In Fig. 3, we plot the normalized communication load (L) and overall computational delay (D) as a function of the number of partitions T . The system parameters are m = 6000, n = 6000,  K = 9, q = 6, N = 6, and µ = 1/3. For up K to r/ µq = 250 partitions, the proposed scheme does not incur any loss in Dmap and communication load with respect to the unpartitioned scheme. However, the proposed scheme yields a significantly lower D compared to the scheme in [4] (about 40% speedup for T > 50). For heavy partitioning (around T = 800) a tradeoff between partitioning level, communication load, and map phase delay is observed. With 3000 partitions (the maximum possible), there is about a 10% increase in communication load. Note that the gain in overall computational delay saturates with the partitioning level, thus there is no reason to partition beyond a given level. In Fig. 4, we plot the normalized performance for a constant µq = 2, n = 10000, µm = 2000, m/T = 10 rows per VII. C ONCLUSION We introduced a block-diagonal coding scheme for distributed matrix multiplication based on partitioning the matrix into smaller submatrices. Compared to earlier (MDS) schemes, the proposed scheme yields a significantly lower computational delay with no increase in communication load up to a level of partitioning. For instance, for a square matrix with 6000 rows and columns, the proposed scheme reduces the computational delay by about 40% when the number of partitions T > 50. We have also considered fountain codes, and will present the results in an extension of this paper. R EFERENCES [1] J. Dean and S. Ghemawat, “MapReduce: Simplified data processing on large clusters,” in Proc. 6th Symp. Operating Systems Design & Implementation, San Francisco, CA, Dec. 2004, pp. 137–149. [2] S. Li, M. A. Maddah-Ali, and A. S. Avestimehr, “Coded MapReduce,” in Proc. Annual Allerton Conf. Commun., Control, and Computing, Monticello, IL, Sep./Oct. 2015, pp. 964–971. [3] K. Lee, M. Lam, R. Pedarsani, D. Papailiopoulos, and K. Ramchandran, “Speeding up distributed machine learning using codes,” in Proc. IEEE Int. Symp. Inf. Theory, Barcelona, Spain, Jul. 2016, pp. 1143–1147. [4] S. Li, M. A. Maddah-Ali, and A. S. Avestimehr, “A unified coding framework for distributed computing with straggling servers,” in Proc. Workshop Network Coding and Appl., Washington, DC, Dec. 2016. [5] H. Ishii and R. Tempo, “The PageRank problem, multiagent consensus, and web aggregation: A systems and control viewpoint,” IEEE Control Systems, vol. 34, no. 3, pp. 34–53, Jun. 2014. [6] G. Garrammone, “On decoding complexity of Reed-Solomon codes on the packet erasure channel,” IEEE Commun. Lett., vol. 17, no. 4, pp. 773–776, Apr. 2013. [7] Z. Li, J. Higgins, and M. Clement, “Performance of finite field arithmetic in an elliptic curve cryptosystem,” in Proc. Int. Symp. Model. Anal. Simul. Comput. Telecommun. Syst., Cincinnati, OH, Aug. 2001, pp. 249–256. [8] B. C. Arnold, N. Balakrishnan, and H. N. Nagaraja, A First Course in Order Statistics, 2nd ed. Philadelphia, PA, USA: Society for Industrial and Applied Mathematics, 2008. [9] A. Severinson, “Coded Computing Tools in Python,” Aug. 2017. [Online]. Available: https://doi.org/10.5281/zenodo.844866
7cs.IT
1 Estimating Dynamic Load Parameters from Ambient PMU Measurements arXiv:1703.03370v1 [cs.SY] 9 Mar 2017 Xiaozhe Wang, Member, IEEE. Abstract—In this paper, a novel method to estimate dynamic load parameters via ambient PMU measurements is proposed. Unlike conventional parameter identification methods, the proposed algorithm does not require the existence of large disturbance to power systems, and is able to provide up-to-date dynamic load parameters consistently and continuously. The accuracy and robustness of the method are demonstrated through numerical simulations. Index Terms—dynamic load identification, phasor measurement units, parameter estimation. I. I NTRODUCTION Load modelling and identification are of great importance to the security and stability of power systems. While the accurate models are available for generators, transmission lines and control devices, load modeling is still a challenging and open subject due to the fact that electric load at each substation is an aggregation of numerous individual loads with different behaviors [1]- [3]. In addition, the poor measurements, modeling, exchange information, as well as the uncertainties in customers behaviors/devices further result in load uncertainties [2]. Indeed, load uncertainty is one of the main factors that affect the accuracy of the power dynamic models implemented by system operators over the world [3]. Generally speaking, the load uncertainty comes from both model structure and parameter values. It has been shown in previous literature [4]- [6] that the use of different load models leads to different and even contradictory results for dynamic stability studies. Even though the applied model structure is verified, different parameter values may also yield different damping performances in small signal stability [2] [7] [8]. For instance, different time constants of loads may lead to either asymptotically stable system or systems experiencing oscillations (i.e., Hopf bifurcation occurs) [2]. Both load modelling and parameter identifications are essential in studying the dynamic behaviors of power systems. This paper mainly focuses on parameter identification for a generic dynamic load model that is suitable for small signal stability analysis. Different methods for dynamic load parameter identification have been proposed, which can be classified into two categories: component-based approach [9] and measurement-based approach [10]- [16]. The latter approach is more commonly applied because real-time load variations and dynamic characteristics can be taken into account [14]. Measurement-based model identification is typically solved through optimization Xiaozhe Wang is with the Department of Electrical and Computer Engineering, McGill University, Montreal, QC H3A 0G4, Canada. Email: [email protected]. methods that minimize the error between the measured output variables and the simulated ones. In particular, the nonlinear least-square curve fitting method has been implemented in [1] [10]- [12]. Genetic algorithms, neural network-based methods and other heuristic techniques have been applied in [13]- [16]. However, the optimization-based methods are time consuming and thus can not be implemented online [4]. More importantly, all those methods require measurement data from dynamic behaviors of system under big disturbances (e.g., during faults), which is not always available [17]. Indeed, the variation of load parameters may be much faster than the occurrence rate of natural disturbances [1]. In this paper, we propose a novel measurement-based method for dynamic load identification in ambient conditions, which does not require the existence of large disturbance. Particularly, the method combines the statistical properties extracted from PMU measurements and the inherent model knowledge, and is able to provide fairly accurate estimations for parameter values in near real-time. Note that a generic dynamic load model is implemented in this paper which is suitable for the purposes of small signal stability analysis and damping performance [2] [7] [8] [18]. The proposed method can be implemented in online security analysis to provide upto-date dynamic load parameters accurately. The rest of the paper is organized as follows. Section II introduces the power system stochastic dynamic model. Particularly, the generic dynamic load model used in small signal stability is presented. Section III elaborates the proposed method for estimating parameters of dynamic loads. Section IV presents the validation of the proposed method through numerical simulations. The impact of measurement noise is also investigated. Conclusions and perspectives are given in Section V. II. POWER SYSTEM STOCHASTIC DYNAMIC MODEL Although we focus on load models, generator models are also incorporated to provide more realistic simulations. Specifically, the classical generator model which can reasonably represent the dynamics of generator in ambient conditions is implemented. The power system buses are numbered as follows: load buses: k = 1, 2, ..., m, and generators: i = m + 1, ..., N . Particularly, to include the effects of the loads, the structure preserving model [19] [20] is used: δ̇i Mi ω̇i = = ωi Pmi − PGi (δi , θi , Vi ) − Di ωi (1) (2) 2 PGi (δi , θi , Vi ) = N X |Vi ||Vk |(Gik cos θik + Bik sin θik ) (3) k=1 QGi (δi , θi , Vi ) = N X k=1 where δi ωi Mi Pmi PGi (δi , θi , Vi ) QGi (δi , θi , Vi ) Di N θij |Vi | Gij Bij |Vi ||Vk |(Gik sin θik − Bik cos θik ) (4) To incorporate load variation, we apply a similar approach used in [21] [22] and modify the set of load equations (5)-(6) as follows: 1 ġk = − [Pk − Pks (1 + σkp ξkp )] (9) τgk 1 [Qk − Qsk (1 + σkq ξkq )] (10) ḃk = − τbk generator rotor angle where the steady-state real and reactive load demands are generator angular frequency perturbed with independent Gaussian noise from their initial inertial constant values. Specifically, ξkp and ξkq are standard Gaussian noise, mechanical power input and σkp and σkq represent the noise intensities for static real real power injection and reactive power, respectively. reactive power injection As discussed in [2] [18], this dynamic load model can damping coefficient naturally represent the most common types of loads in ambient total number of buses conditions such as thermostatic load, induction motor, power voltage angle difference between bus i and j electronic converter, aggregate effects of distribution load voltage magnitude tap changer (LTC) transformers, etc. However, the range of line conductance between bus i and j time constants is considerably large ranging from cycles to line susceptance between bus i and j several minutes, and even hours for different types of loads. For industrial plants, such as aluminum smelters, the time constants are in the range of 0.1s to 0.5s; for tap changers The detailed expressions of PGi (δi , θi , Vi ) and QGi (δi , θi , Vi ) and other control devices, they are in the range of minutes; for are neglected here for simplicity and can be found in many heating load, they may range up to hours [8]. As a result, the books (e.g., [19]). uncertainty of composition of different types of loads can be Regarding dynamic loads, we use the following first-order aggregated in time constants τ and τ [2]. This is reasonable g b load model proposed in [18] that can represent the common in the situations when the network characteristics are known, types of loads (e.g., induction motors, thermostatically congenerator models are validated and static load characteristics trolled loads) in ambient conditions: are understood better than their dynamic response which is the case in practical situations. In addition to a wide range of 1 s (Pk − Pk ) (5) ġk = − time constants, the variation of τg and τb can also be fast. For τgk example, τb may change from 0.1s to 24.1s in one day (see 1 s ḃk = − (Qk − Qk ) (6) Table I, II in [1]). τbk N Because of wide range and fast variation of time constants X |Vk ||Vj |(−Gkj cos θkj − Bkj sin θkj ) (7) τg and τb , they need to be updated frequently to ensure the Pk = gk Vk2 = j=1 accuracy of dynamic load models used in online security and N X stability analysis. Conventionally, τg and τb are estimated from 2 |Vk ||Vj |(−Gkj sin θkj + Bkj cos θkj ) (8) Q k = bk V k = dynamic data by perturbing the system, for example, through j=1 changing the transformer tap [23]. However it is impractical to perturb the system frequently for estimating parameter where values of loads. In this paper, we propose a novel method to estimate τg and τb for the loads of interests from ambient PMU gk effective conductance of the load measurements in daily operation. In particular, the estimation bk effective susceptance of the load process does not require the existence of disturbance to the τgk active power time constant of the load system. τbk reactive power time constant of the load Pk real power demand of the load III. M ETHODOLOGY Qk reactive power demand of the load s Pk steady-state real power demand of the load In ambient conditions, the stochastic dynamic load equaQsk steady-state reactive power demand of the load tions (9)-(10) can be linearized as below:      0 −Tg −1 ∂P ġ g ∂g = b ḃ 0 −Tb −1 ∂Q The values Pks and Qsk describe the static (steady-state) power ∂b   p  −1 s p characteristics of the loads achieved in equilibrium. The instant 0 Tg P Σ ξ + −1 s q real power and reactive power consumption can be characterξq Q Σ 0 T b    p  ized by the effective conductance Pk = gk Vk2 and susceptance g ξ Qk = bk Vk2 at any time. The time constants τgk and τbk that = A +B (11) b ξq typically depend on voltage and frequency represent the instant relaxation rate of the load. where 3 g = [g1 , ..., gm ]T , Tg = diag[τg1 , ..., τgm ], P = [P1 , ..., Pm ]T , s P s = diag[P1s , ..., Pm ], p p p Σ = diag[σ1 , ..., σm ], p T ξ p = [ξ1p , ..., ξm ] , b = [b1 , ..., bm ]T , Tb = diag[τb1 , ..., τbm ], Q = [Q1 , ..., Qm ]T , Qs = diag[Qs1 , ..., Qsm ], q Σq = diag[σ1q , ..., σm ], q q q T ξ = [ξ1 , ..., ξm ] . unbiased estimators—sample covariance matrixes Qgg and Qbb in practice, each entry of which is calculated as below: n Qgk gj It is observed that [g, b]T is a vector Ornstein-Uhlenbeck process that is stationary, Gaussian and Markovian [24] [25]. Particularly, if the state matrix A is stable, the stationary   Cgg Cgb can be shown to covariance matrix Cxx = Cbg Cbb satisfy the following Lyapunov equation [24] [26]: (12) which nicely combines the model knowledge and the statistical properties of state variables. Since Pk = gk Vk2 , we have: ( 2 k if j = k Vk2 + 2gj Vk ∂V ∂Pk ∂gj ≈ Vk (13) = ∂Vk if j 6= k 2gj Vk ∂gj ≈ 0 ∂gj under the assumption that △Vk ≈ 0 in ambient conditions. k Similar relation can be obtained for ∂Q ∂bj . As a result, the Jacobian matrix A satisfies:   0 −Tg −1 V 2 A≈ (14) 0 −Tb −1 V 2 where V = diag[V1 , ..., Vm ]. Substituting (14) and the detailed expression of Cxx and B into (12), and performing algebraic simplification, we have: 1 Cgg = Tg−1 (P s )2 (Σp )2 V −2 2 1 −1 s 2 q 2 −2 Cbb = Tb (Q ) (Σ ) V 2 Cgb = Cbg = 0 bk Ik } Vk Ik = Im{ } Vk = Re{ = 1 X (bk (i) − b̄k )(bj (i) − b̄j ) n − 1 i=1 (15) (16) (17) (18) (19) Regarding the covariance matrix Cgg = E[(g − E[g])(g − E[g])T ] and Cbb = E[(b − E[b])(b − E[b])T ], we use their (21) where ḡk and b̄k denote the sample mean of gk and bk , respectively, and n is the sample size. Therefore, the proposed algorithm can be summarized as follows. We assume that PMUs are installed at the substations that the (aggregated) loads of interests are connected to. We also assume that the static characteristics of loads are well understood such that P s , Qs , Σp and Σq are prior known, which is reasonable as shown in [21] [22]. Then the following algorithm provides an estimation of Tg and Tb for the dynamic loads from ambient PMU measurements: Step 1. Step 2. Step 3. Compute the sample mean V̄ and estimate g and b from PMU measurements by (18)-(19). Calculate the sample covariance matrix Qgg and Qbb by (20)-(21). Approximate Tg and Tb as blow: Tg = Tb = 1 s 2 p 2 −2 −1 (P ) (Σ ) V̄ Qgg 2 1 s 2 q 2 −2 −1 (Q ) (Σ ) V̄ Qbb 2 (22) (23) Note that (22)-(23) are acquired by a simple algebraic manipulation of (15)-(16). IV. Particularly, we utilize the relations (15)-(16) that link the measurements of stochastic load variation to the physical model, and provide an ingenious way to estimate the dynamic parameters Tg and Tb from measurements. In practical applications, V , Cgg , and Cbb need to be acquired or estimated from limited PMU measurements. A window size of 1000s is used in the examples of this paper where time constants are up to several seconds. Note that the larger the time constants, the longer the sample window is needed to ensure accuracy. First, the sample mean V̄ can be used as an estimation of V , then g and b can be estimated from PMU measurements (i.e., phasors Vk and Ik ) as follows: gk (20) n Qbk bj ACxx + Cxx AT = −BB T = 1 X (gk (i) − ḡk )(gj (i) − ḡj ) n − 1 i=1 CASE STUDIES In this section, the proposed algorithm to estimate time constants of dynamic loads are validated through numerical simulations. Furthermore, the robustness of the proposed method to measurement noise is also demonstrated via simulation. All case studies were done in PSAT-2.1.9 [27]. A. Validation of the Method We consider the standard WSCC 3-generator, 9-bus system model (see, e.g. [19]). The classical generator models (1)-(2) and the stochastic dynamic load models (9)-(10) are implemented in the structure preserving framework. The system parameters are available online: https://github.com/xiaozhew/PES-load-parameterestimation. Particularly, there are three dynamic loads at buses 1, 2 and 3, the time constants of which are τg = 1, 3, 0.2s and τb = 5, 7, 0.8s, respectively. The trajectories of some state variables and algebraic variables are shown in Fig. 1, from which we see that the state variables are fluctuating around their nominal values in ambient conditions, yet larger time constants lead to slower variations as expected (e.g., the variations of g2 and b2 are slower than g3 and b3 ). By the proposed algorithm, we firstly compute the sample mean V̄ = diag[0.9952, 1.0126, 1.0155]. Then we estimate the 4 0.94 0.34 g2 b2 0.92 TABLE I: A comparison between the actual and the estimated time constants in the 9-bus system 0.32 0.9 0.88 0.3 0.86 0.28 τg1 τg2 τg3 τb1 τb2 τb3 0.84 0.26 0.82 0.8 0 200 400 600 time(s) 800 0.24 0 1000 200 400 600 time(s) 800 1000 actual value (s) 1.0000 3.0000 0.2000 5.0000 7.0000 0.8000 estimated value (s) 0.9145 2.9867 0.2122 4.7974 6.9777 0.7462 error 8.55% 0.44% 6.1% 4.05% 0.32% 6.72% (a) Trajectory of g2 on [0s,1000s] (b) Trajectory of b2 on [0s,1000s] 1.4 g3 1.3 0.5 b3 0.45 1.2 0.4 1.1 1 0.35 0.9 0.3 0.8 0.25 0.7 0 200 400 600 time(s) 800 1000 0.2 0 200 400 600 time(s) 800 1000 (c) Trajectory of g3 on [0s,1000s] (d) Trajectory of b3 on [0s,1000s] 1.025 V2 1.06 Section IV-A according to the IEEE Standards [28] [29]. A comparison between the actual and the estimated time constants are presented in Table. II. It is observed that the proposed method provides similar accuracy to the case without the measurement noises, which indicates that the method is relatively robust under measurement noise. TABLE II: A comparison between the actual and the estimated time constants in the 9-bus system with the measurement noises V3 1.02 τg1 τg2 τg3 τb1 τb2 τb3 1.04 1.015 1.01 1.02 1.005 1 1 0.995 0 200 400 600 time(s) 800 1000 0.98 0 200 400 600 time(s) 800 actual value (s) 1.0000 3.0000 0.2000 5.0000 7.0000 0.8000 estimated value (s) 0.9144 2.9819 0.2121 4.7752 6.9426 0.7443 error 8.56% 0.60% 6.06% 4.50% 0.82% 6.97% 1000 (e) Trajectory of V2 on [0s,1000s](f) Trajectory of V3 on [0s,1000s] C. Further Validation Fig. 1: Trajectories of some dynamic conductances, susceptances, and voltages in the 9-bus system. For further validation, we apply the method to a larger system—the IEEE 39-bus 10-generator test system, the parameters of which are available online: https://github.com/xiaozhew/PES-load-parameter-estimation. In particular, 10 dynamic loads have been added to buses 1-10, and their corresponding time constants range from 0.1s to 5s. A comparison between the actual and the estimated time constants are presented in Table. III. The simulation results further demonstrate that the proposed method is able to provide good estimations for time constants of the dynamic loads. dynamic conductance, susceptances and their corresponding sample covariance matrixes:   1.41 × 10−3 9.84 × 10−5 2.24 × 10−4 Qgg =  9.84 × 10−5 4.16 × 10−4 6.57 × 10−5  (24) 2.24 × 10−4 6.57 × 10−5 5.75 × 10−3 Qbb  2.63 × 10−4  = −1.47 × 10−6 6.46 × 10−6 −1.47 × 10−6 1.75 × 10−4 −7.57 × 10−6  6.46 × 10−6 −7.57 × 10−6  (25) 1.62 × 10−3 It is expected that both Qgg and Qbb are nearly diagonal as the stochastic perturbations are independent. Since each entry of (P s )2 (Σp )2 and (Qs )2 (Σq )2 is set to be 0.0025, Tg and Tb can be readily estimated from (22)(23). A comparison between the estimated τg , τb and their actual values are shown in Table. I. It’s observed that the proposed algorithm provides fairly accurate estimation for time constants of each load. B. Impact of Measurement Noise Like other measurement-based methods, the performance of the proposed algorithm may be affected by PMU measurement noise. In order to investigate the potential influence, measurement noises with standard deviation of 10−3 have been added to g, b and V in the 9-bus example shown in V. CONCLUSIONS AND PERSPECTIVES In this paper, we have proposed a novel method to estimate parameter values of dynamic load from ambient PMU measurements. The accuracy and robustness of the method have been demonstrated through numerical studies. Unlike conventional methods, the proposed technique does not require the existence of large disturbance to systems, and thus can be implemented continuously in daily operation to provide up-todate dynamic load parameter values. In the future, we plan to further validate the method by using real PMU data and extend the method to estimate dynamic load parameters without knowing their static characteristics. R EFERENCES [1] D. Karlsson, and D. J. Hill, Modelling and identification of nonlinear dynamic loads in power systems. IEEE Transactions on Power Systems, vol. 9, no. 1, pp. 157-166. 5 TABLE III: A comparison between the actual and the estimated time constants in the 39-bus system τg1 τg2 τg3 τg4 τg5 τg6 τg7 τg8 τg9 τg10 τb1 τb2 τb3 τb4 τb5 τb6 τb7 τb8 τb9 τb10 actual value (s) 0.1000 0.6000 1.1000 1.6000 2.1000 2.6000 3.1000 3.6000 4.1000 4.6000 0.5000 1.0000 1.5000 2.0000 2.5000 3.0000 3.5000 4.0000 4.5000 5.0000 estimated value (s) 0.1225 0.5860 1.1086 1.6924 2.1323 2.6130 3.0715 3.3004 4.5080 4.6636 0.5277 0.9831 1.5325 2.0559 2.5784 3.3522 3.1273 4.1105 4.3084 5.1723 error 22.55% 2.33% 0.78% 5.78% 1.54% 0.50% 0.92% 8.32% 9.95% 1.38% 5.53% 1.69% 2.17% 2.79% 3.14% 11.74% 10.65% 2.76% 4.26% 3.45% [2] H. D. Nguyen, and K. Turitsyn, Robust Stability Assessment in the Presence of Load Dynamics Uncertainty. IEEE Transactions on Power Systems, vol. 31, no. 2, pp. 1579-1594. [3] I. A. Hiskens, and J. Alseddiqui, Sensitivity, approximation, and uncertainty in power system dynamic simulation. IEEE Transactions on Power Systems, vol. 21, no. 4, pp. 1808-1820. [4] A. M. Najafabadi, and A. T. Alouani, Real time estimation of sensitive parameters of composite power system load model. In Transmission and Distribution Conference and Exposition (T&D), 2012 IEEE PES (pp. 18). [5] A. Gebreselassie, and J. H. Chow, Investigation of the effects of load models and generator voltage regulators on voltage stability. International Journal of Electrical Power & Energy Systems, vol. 16, no. 2, pp. 83-89, 1994. [6] W. S. Kao, C. J. Lin, C. T. Huang, Y. T. Chen, and C. Y. Chiou,Comparison of simulated power system dynamics applying various load models with actual recorded data. IEEE Transactions on Power Systems, vol. 9, no. 1, pp. 248-254. [7] J. V. Milanovic, and I. A. Hiskens, Effects of load dynamics on power system damping. IEEE Transactions on Power Systems, vol. 10, no. 2, pp. 1022-1028, 1995. [8] I. A. Hiskens, and J. V. Milanovic, Load modelling in studies of power system damping. IEEE Transactions on Power Systems, vol. 10, no. 4, pp. 1781-1788, 1995. [9] W. W. Price, K. A. Wirgau, A. Murdoch, J. V. Mitsche, E. Vaahedi, and M. El-Kady, Load modeling for power flow and transient stability computer studies. IEEE Transactions on Power Systems, vol. 3, no. 1, pp. 180-187, 1988. [10] B. K. Choi, H. D. Chiang, Y. Li, H. Li, Y. T. Chen, D. H. Huang, and M. G. Lauby, Measurement-based dynamic load models: derivation, comparison, and validation. IEEE Transactions on Power Systems, vol. 21, no. 3, pp. 1276-1283, 2006. [11] Y. Li, H. D. Chiang, B. K. Choi, Y. T. Chen, D. H. Huang, and M. G. Lauby,Load models for modeling dynamic behaviors of reactive loads: Evaluation and comparison. International Journal of Electrical Power & Energy Systems, vol. 30, no. 9, pp. 497-503, 2008. [12] J. Ma, D. Han, R. M. He, Z. Y. Dong, and, D. J. Hill, Reducing identified parameters of measurement-based composite load model. IEEE Transactions on Power Systems, vol. 23, no. 1, pp. 76-83, 2008. [13] P. Ju, E. Handschin, and D. Karlsson, Nonlinear dynamic load modelling: model and parameter estimation. IEEE Transactions on Power Systems, vol. 11, no. 4, pp. 1689-1697, 1996. [14] H. Bai, P. Zhang, and V. Ajjarapu, V, A novel parameter identification approach via hybrid learning for aggregate load modeling. IEEE Transactions on Power Systems, vo. 24, no. 3, pp. 1145-1154, 2009. [15] T. Hiyama, M. Tokieda, W. Hubbi, and H. Andou, Artificial neural network based dynamic load modeling. IEEE transactions on Power Systems, vol. 12, no. 4, pp. 1576-1583, 1997. [16] J. Y. Wen, L. Jiang, Q. H. Wu, and S. J. Cheng, Power system load modeling by learning based on system measurements. IEEE Transactions on Power Delivery, vol. 18, no. 2, pp. 364-371, 2003. [17] D. Han, J. Ma, R. M. He, and Z. Y. Dong, A real application of measurement-based load modeling in large-scale power grids and its validation. IEEE Transactions on Power Systems, vol. 24, no. 4, pp. 1756-1764. [18] H. D. Nguyen, and K. Turitsyn, Voltage multistability and pulse emergency control for distribution system with power flow reversal. IEEE Transactions on Smart Grid, vol. 6, no. 6, pp. 2985-2996. [19] H. D. Chiang, Direct Methods for Stability Analysis of Electric Power Systems-Theoretical Foundation, BCU Methodologies, and Applications. New Jersey: John Wiley & Sons, Inc, 2011. [20] A. Pai, Energy function analysis for power system stability. Springer Science & Business Media, 2012. [21] H. Mohammed, and C. O. Nwankpa, Stochastic analysis and simulation of grid-connected wind energy conversion system. IEEE Transactions on Energy Conversion, vol. 15, no. 1, pp. 85-90. [22] C. O. Nwankpa, S. M. Shahidehpour, and Z. Schuss, A stochastic approach to small disturbance stability analysis. IEEE Transactions on Power systems, vol. 7, no. 4, pp. 1519-1528. [23] T. Van Cutsem, C. Vournas. Voltage Stability of Electric Power Systems. Springer Science & Business Media, 1998. [24] C. Gardiner, Stochastic Methods: A Handbook for the Natural and Social Sciences. Springer Series in Synergetics. Springer, Berlin, Germany, 2009. [25] X. Wang, K. Turitsyn, Data-driven diagnostics of mechanism and source of sustained oscillations. IEEE Transactions on Power Systems, to appear. [26] G. Ghanavati, P. D. H. Hines, and T. I. Lakoba, Identifying useful statistical indicators of proximity to instability in stochastic power systems. IEEE Transactions on Power Systems, in press, 2015. arXiv preprint arXiv:1410.1208 (2014). [27] F. Milano, An open source power system analysis toolbox. IEEE Transactions on Power Systems, vol. 20, no. 3, pp. 1199-1206. [28] IEEE Standard for Synchrophasor Measurements for Power Systems. IEEE Std C37.118.1-2001 (Revision of IEEE Std C37.118-2005), pp. 161, Dec. 2011. [29] IEEE Standard for Synchrophasor Measurements for Power SystemsAmendment 1: Modification of Selected Performance Requirements. IEEE Std C37.118.1a-2014 (Amendment to IEEE Std C37.118.1-2011), pp. 125, April 2014.
3cs.SY
Fast and Compact Exact Distance Oracle for Planar Graphs Vincent Cohen-Addad, Søren Dahlgaard∗, and Christian Wulff-Nilsen University of Copenhagen [vincent.v,soerend,koolooz]@di.ku.dk arXiv:1702.03259v3 [cs.DS] 2 May 2017 Abstract For a given a graph, a distance oracle is a data structure that answers distance queries between pairs of vertices. We introduce an Opn5{3 q-space distance oracle which answers exact distance queries in Oplog nq time for n-vertex planar edge-weighted digraphs. All previous distance oracles for planar graphs with truly subquadratic space (i.e., space Opn2´ q for some constant  ą 0) either required query time polynomial in n or could only answer approximate distance queries. Furthermore, we show how to trade-off time and space: for any S ě n3{2 , we show how 5{2 to obtain an S-space distance oracle that answers queries in time Op Sn3{2 log nq. This is a polynomial improvement over the previous planar distance oracles with opn1{4 q query time. ∗ Research partly supported by Mikkel Thorup’s Advanced Grant DFF-0602-02499B from the Danish Council for Independent Research under the Sapere Aude research career programme. 1 Introduction Efficiently storing distances between the pairs of vertices of a graph is a fundamental problem that has receive a lot of attention over the years. Many graph algorithms and real-world problems require that the distances between pairs of vertices of a graph can be accessed efficiently. Given an edge-weighted digraph G “ pV, Eq with n vertices, a distance oracle is a data structure that can efficiently answer distance queries between pairs of vertices u, v P V . A naive approach consists in storing an nˆn distance matrix, giving a distance query time of Op1q by a simple table lookup. The obvious downside is the huge Θpn2 q space requirement which is in many cases impractical. For example, several popular routing heuristics (e.g.: for the travelling salesman problem) require fast access to distances between pairs of vertices. Unfortunately the inputs are usually too big to allow to store an n ˆ n distance matrix (see e.g.: [1])1 . Fast and compact data structures for distances are also critical in many routing problems. One important challenge in these applications is to process a large number of online queries while keeping the space usage low, which is important for systems with limited memory or memory hierarchies. Therefore, the alternative naive approach consisting in simply storing the graph G and answering a query by running a shortest path algorithm on the entire graph is also prohibitive for many applications. Since road networks and planar graphs share many properties, planar graphs are often used for modeling various transportation networks (see e.g.: [26]). Therefore obtaining good space/query-time trade-offs for planar distance oracles has been studied thoroughly over the past decades [10, 3, 8, 12, 30, 4, 26]. If S represents the space usage and Q represents the query time, the trivial solutions described above would suggest a trade-off of Q “ n2 {S 2 . Up to logarithmic factors, this trade-off is achieved by the oracles of Djidjev [10] and Arikati, et al. ? [3]. The oracle of Djidjev further improves on this trade-off obtaining an oracle with Q “ n{ S for the range S P rn4{3 , n3{2 s suggesting that this trade-off might instead be the correct one. Extending this trade-off to the full range of S was the subject of several subsequent papers by Chen and Xu [8], Cabello [4], Fakcharoenphol and Rao [12], and finally Mozes of Nussbaum [27]) obtaining ? and Sommer [26] (see also the result 2 a query time of Q “ n{ S for the entire range of S P rn, n s (again ignoring constant and logarithmic factors). It is worth noting that the above mentioned trade-off between space usage and query time is no better than the trivial solution of simply storing the n ˆ n distance matrix when constant (or even polylogarithmic) query time is needed. In fact the best known result in this case due to Wulff-Nilsen [30] who manages to obtain very slightly subquadratic space of Opn2 polyloglogpnq{ logpnqq and constant query time. It has been a major open question whether an exact oracle with truly subquadratic (that is, Opn2´ε q for any constant ε ą 0) space usage and constant or even polylogarithmic query time exists. Furthermore, the trade-offs obtained in the literature suggest that this might not be the case. In this paper we break this quadratic barrier: Theorem 1. Let G “ pV, Eq be a weighted planar digraph with n vertices. Then there exists a data structure with Opn2 q preprocessing time and Opn5{3 q space and a data structure with Opn11{6 q space and Opn11{6 q expected preprocessing time. Given any two query vertices u, v P V , both oracles report the shortest path distance from u to v in G in Oplog nq time. In addition to Theorem 1 we also obtain a distance oracle with a trade-off between space and query time. 1 In these cases, the inputs are then embedded into the 2-dimensional plane so that the distances can be computed in Op1q time at the expense of working with incorrect distances. 2 Using the Opnq shortest path algorithm for planar graphs of Henzinger et al. [16]. 1 Theorem 2. Let G “ pV, Eq be a weighted planar digraph with n vertices. Let S denote the space, P denote the preprocessing time, and Q denote the query time. Then there exists planar distance oracles with the following properties: 5{2 • P “ Opn2 q, S ě n3{2 , and Q “ Op Sn3{2 log nq. 11{5 • P “ S, S ě n16{11 , and Q “ Op nS 6{5 log nq. In particular, this result improves on the current state-of-the-art [26] trade-off between space and query time for S ě n3{2 . The main idea is to use two r-divisions, where we apply our structure from Theorem 1 to one and do a brute-force search over the boundary nodes of the other. Recent developments We note that the main focus of this paper is on space usage and query time, and the the preprocessing time follows directly from our proofs (and by applying the result of [5] for subquadratic time). After posting a preliminary version of this paper on arXiv [9], the algorithm of Cabello [5] was improved by Gawrychowski et al. [15] to run in Õpn5{3 q deterministically. As noted in [15] this also improves the preprocessing time of our Theorem 1 to Õpn5{3 q while keeping the space usage at Opn5{3 q. It is also possible to use Gawrychowski et al. to speed-up the pre-processing time of our distance oracle described in Theorem 2. This yields a distance oracle (in the notation 5{2 of Theorem 2) with P “ ÕpSq, S ě n3{2 , and Q “ Op Sn3{2 log nq, thus eliminating entirely the need of the second bullet point of Theorem 2. Techniques We derive structural results on Voronoi diagrams for planar graphs when the centers of the Voronoi cells lie on the same face. The key ingredients in our algorithm are a novel and technical separator decomposition and point location structure for the regions in an r-division allowing us to perform binary search to find a boundary vertex w lying on a shortest-path between a query pair u, v. These structures are applied on top of weighted Voronoi diagrams, and our point location structure relies heavily on partitioning each region into small “easy-to-handle” wedges which are shared by many such Voronoi diagrams. More high-level ideas are given in Section 3. Our approach bears some similarities with the recent breakthrough of Cabello [5]. Cabello showed that abstract Voronoi diagrams [24, 25] studied in computational geometry combined with planar r-division can be used to obtain fast planar graphs algorithms for computing the diameter and wiener index. We start from Cabello’s approach of using abstract Voronoi diagrams. While Cabello focuses on developing fast algorithms for computing abstract Voronoi diagrams of a planar graph, we introduce a decomposition theorem for abstract Voronoi diagrams of planar graphs and a new data structure for point location in planar graphs. 1.1 Related work In this paper, we focus on distance oracles that report shortest path distances exactly. A closely related area is approximate distance oracles. In this case, one can obtain near-linear space and constant or near-constant query time at the cost of a small p1 ` q-approximation factor in the distances reported [28, 21, 19, 20, 32]. One can also study the problem in a dynamic setting, where the graph undergoes edge insertions and deletions. Here the goal is to obtain the best trade-off between update and query time. Fakcharoenphol and Rao [12] showed how to obtain Õpn2{3 q for both updates and queries 2 ? and a trade-off of Oprq and Opn{ rq in general. Several follow up works have improved this result to negative edges and shaving further logarithmic factors [22, 17, 18, 14]. Furthermore, Abboud and Dahlgaard [2] have showed that improving this bound to Opn1{2´ε q for any constant ε ą 0 would imply a truly subcubic algorithm for the All Pairs Shortest Paths (APSP) problem in general graphs. In the seminal paper of Thorup and Zwick [29], a p2k ´ 1q-approximate distance oracle is presented for undirected edge-weighted n-vertex general graphs using Opkn1`1{k q space and Opkq query time for any integer k ě 1. Both query time and space has subsequently been improved to Opn1`1{k q space and Op1q query time while keeping an approximation factor of 2k ´ 1 [31, 6, 7]. This is near-optimal, assuming the widely believed and partially proven girth conjecture of Erdős [11]. 2 Preliminaries and Notations Throughout this paper we denote the input graph by G and we assume that it is a directed planar graph with a fixed embedding. We assume that G is connected (when ignoring edge orientations) as otherwise each connected component can be treated separately. Section 4 will make use of the geometry of the plane and associate Jordan curves to cycle separators. Let H be a planar embedded edge-weighted digraph. We use V pHq to denote the set of vertices of H and we denote by H ˚ the dual of H (with parallel edges and loops) and view it as an undirected graph. We assume a natural embedding of H ˚ i.e., each dual vertex is in the interior of its corresponding primal face and each dual edge crosses its corresponding primal edge of H exactly once and intersects no other edges of G. We let dH pu, vq denote the shortest path distance from vertex u to vertex v in H. r-division We will rely on the notion of r-division introduced by Frederickson [13] and further developed by Klein et al. [23]. For a subgraph H of G, a vertex v of H is a boundary vertex if G contains an edge not in H that is incident to v. We let δH denote the set of boundary vertices of H. Vertices of V pHqzδH are called internal vertices of H. A hole of a subgraph H of G is a face of H that is not a face of G. Let c1 and c2 be constants. For a number r, an r-division with few holes of (connected) graph G (with respect to c1 , c2 ) is a collection R of subgraphs of G, called regions, with the following properties. 1. Each edge of G is in exactly one region. 2. The number of regions is at most c1 |V pGq|{r. 3. Each region contains at most r vertices. ? 4. Each region has at most c2 r boundary vertices. 5. Each region contains only Op1q holes. We make the simplifying assumption that each hole H of each region R is a simple cycle and that all its vertices belong to δR. We can always reduce to this case as follows. First, turn H into a simple cycle by duplicating vertices that are visited more than once in a walk of the hole. Then for each pair of consecutive boundary vertices in this walk, add a bidirected edge between them unless they are already connected by an edge of R; the new edges are embedded such that they respect the given embedding of R. We refer to the new simple cycle obtained as a hole and it replaces the old hole H. 3 We also make the simplifying assumption that each face of a region R is either a hole or a triangle and that each edge of R is bidirected. This can always be achieved by adding suitable infinite-weight edges that respect the current embedding of R. Non-negative weights and unique shortest paths As mentioned earlier, we may assume w.l.o.g. that G has non-negative edge weights. Furthermore, we assume uniqueness of shortest paths i.e., for any two vertices x, y of a graph G, there is a unique path from x to y that minimizes the sum of the weights of its edges. This can be achieved either with random perturbations of edge weights or deterministically with a slight overhead as described in [5]; we need the shortest paths uniqueness assumption only for the preprocessing step and thus the overhead only affects the preprocessing time and not the query time of our distance oracle. Voronoi diagrams We now define the key notion of Voronoi diagrams. Let G be a graph and r ą 0. Consider an r-division with few holes R of G and a region R P R and let H be a hole of R. Let u be a vertex of G not in R. Let RH be the graph obtained from R by adding inside each hole H 1 ‰ H of R, a new vertex in its interior and infinite-weight bidirected edges between this vertex and the vertices of H 1 (which by the above simplifying assumption all belong to δR), embedding the edges such that they are pairwise non-crossing and contained in H 1 . Some of the following definitions are illustrated in Figure 1. Consider the shortest path tree Tu in G rooted at u. For any vertex x P V pTu q, define Tu pxq to be the subtree of Tu rooted at x. For each vertex x P V pHq we define the Voronoi cell of x (w.r.t. u, R, and H) as the set of vertices of RH that belong to the subtree Tu pxq and not to any subtree Tu pyq for y P pV pHq ´ txuq X V pTu pxqq. The weighted Voronoi diagram of u w.r.t. R and H is the collection of all the Voronoi cells of the vertices in H. For each vertex x P H we say that its weight is the shortest path distance from u to x in G. Note that since we assume unique shortest paths and bidirectional edges, the weighted Voronoi diagram of u w.r.t. R and H is a partition of the vertices of RH . Furthermore, each Voronoi cell contains exactly one vertex of H. For any Voronoi cell C, we define its boundary edges to be the edges of RH that have exactly one ˚ be the subgraph of R˚ consisting of the (dual) boundary edges over endpoint in C. Let BH H ˚ is an all Voronoi cells w.r.t. u and RH ; we ignore edge orientations and weights so that BH ˚ unweighted undirected graph. We define VorH pR, uq to be the multigraph obtained from BH by replacing each maximal path whose interior vertices have degree two by a single edge whose embedding coincides with the path it replaces. When H is clear from context, we simply write VorpR, uq. 3 High-level description We now give a high-level description of our distance oracle where we omit the details needed to get our preprocessing time bounds. Our data structure is constructed on top of an r-division of the graph. For each region R of the r-division we store a look-up table of the distance in G between each ordered pair of vertices u, v P V pRq. We also store a look-up table of distances in G ? from each vertex u P V to the boundary vertices of R. In total this part requires Opnr ` n2 { rq space. The difficult case is when two vertices u and v from different regions are queried. To do this we will use weighted Voronoi diagrams. More specifically, for every vertex u, every region R, and every hole H of R, we construct a recursive separator decomposition of the weighted Voronoi diagram of u w.r.t. R and H. The goal is to determine the boundary vertex w such that v is contained in the Voronoi cell of u. If we can do this, we know that dG pu, vq “ 4 1 4 2 5 3 2 1 Figure 1: Illustration of the weighted Voronoi diagram of a vertex u (not shown) w.r.t. a region R (grey) and a hole H (dotted edges and seven grey vertices). Edges of R are bidirected and have weight 1. The number next to a vertex of H is the weight of that vertex. Vertices of the Voronoi diagram (which are dual vertices and hence faces of the primal) and its boundary are shown in black except the one embedded inside H. The graph VorH pR, uq has seven edges. Note that this illustration does not have unique shortest paths as assumed in this paper. Note also that the shortest path from u to the node with weight 5 goes through the nearby node with weight 2. Thus the rest of the shortest-path tree from u has been assigned to the node with weight 5. Note also that the illustration is not triangulated. dG pu, wq ` dRH pw, vq for one of the holes H of R. To determine this we use a carefully selected recursive decomposition. This decomposition is stored in a compact way and we show how it enables binary search to find w in Oplog rq time. In order to store all of the above mentioned parts efficiently we will employ the compact representation of the abstract Voronoi diagram (namely VorpR, uq as defined in the previous ? ? section). This requires only Op rq space for each choice of u, R, and H for a total of Opn2 { rq space. This also dominates the space for storing the recursive decompositions. Finally, we store for each graph RH and each possible separator of RH the set of vertices on one side of the separator, since this is needed to perform the binary search. This is done in a compact way requiring only Opr2 q space per region. Thus, the total space requirement of our ? distance oracle is Opnr ` n2 { rq. Picking r “ n2{3 gives the desired Opn5{3 q space bound. 4 Recursive Decomposition of Regions In this section, we consider a region R in an r-division of a planar embedded graph G “ pV, Eq, a vertex u P V ´V pRq, and a hole H of R which we may assume is the outer face of R. To simplify notation, we identify R with RH and let δR denote the boundary vertices of R belonging to H, i.e., δR “ V pHq (by our simplifying assumption regarding holes in the preliminaries). The dual vertex corresponding to H is denoted v8 pR, uq or just v8 . We assume that R contains at least three boundary vertices. Recall that each face of R other than the outer face is a triangle and so, each vertex of VorpR, uq other than v8 has degree 3. Moreover, every cell of VorpR, uq contains exactly one boundary vertex, therefore the boundary of each cell of VorpR, uq contains exactly one occurrence of v8 and contains at least one other vertex. Also note that the cyclic ordering of cells of VorpR, uq around v8 is the same as the cyclic ordering δR of boundary vertices of R. 5 Construct a plane multigraph R∆ puq from VorpR, uq as follows. First, for every Voronoi cell C, add an edge from v8 to each vertex of C other than v8 itself; these edges are embedded such that they are fully contained in C and such that they are pairwise non-crossing. For each such edge e, denote by Cpeq the cell it is embedded in. To complete the construction of R∆ puq, remove every edge incident to v8 belonging to VorpR, uq. The construction of R∆ puq is illustrated in Figure 2. v∞ Figure 2: Illustration of R∆ puq highlighted in bold black edges. To avoid clutter, most edges incident to v8 are only sketched. Recursive decomposition using a Voronoi diagram In this section, we show how to obtain a recursive decomposition of R∆ puq into subgraphs called pieces. A piece Q is decomposed into two smaller pieces by a cycle separator S of size 2 containing v8 . Each of the two subgraphs of Q is obtained by replacing the faces of Q on one side of S by a single face bounded by S. The separator S is balanced w.r.t. the number of faces of Q on each side of S. The recursion stops when a piece with at most six faces is obtained. It will be clear from our construction below that the collection of cycle separators over all recursive calls form a laminar family, i.e., they are pairwise non-crossing. We assume a linked list representation of each piece Q where edges are ordered clockwise around each vertex. Lemma 2 below shows how to find the cycle separators needed to obtain the recursive decomposition into pieces. Before we can prove it, we need the following result. Lemma 1. Let Q be one of the pieces obtained in the above recursive decomposition. Then for every vertex v of Q other than v8 , 1. v has at least two edges incident to v8 , 2. for each edge pv, wq of Q where w ‰ v8 , the edge preceding and the edge following pv, wq in the clockwise ordering around v are both incident to v8 , and 3. for every pair of edges e1 “ pv, v8 q and e2 “ pv, v8 q where e2 immediately follows e1 in the clockwise ordering around v, if both edges are directed from v to v8 then the subset of the plane to the right of e1 and to the left of e2 is a single face of Q. Proof. The proof is by induction on the depth i ě 0 in the recursion tree of the node corresponding to piece Q. Assume that i “ 0 and let v ‰ v8 be given. The first and third part of the 6 lemma follow immediately from the construction of R∆ puq and the assumption that |δR| ě 3. To show the second part, it suffices by symmetry to consider the edge e following pv, wq in the cyclic ordering of edges around v in Q “ R∆ puq. Since e and pv, wq belong to the same face of Q and since each face of Q contains v8 and at most three edges, the second part follows. Now assume that i ą 0 and that the claim holds for smaller values. Let v ‰ v8 be given. Consider the parent piece Q1 of Q in the recursive decomposition tree and let S be the cycle separator that was used to decompose Q1 . Then S contains v8 and one additional vertex v 1 . To show the inductive step, we claim that we only need to consider the case when v 1 “ v. This is clear for the first and second part since if v 1 ‰ v then v has the same set of incident edges in Q1 and in Q. It is also clear for the third part since Q is a subgraph of Q1 . It remains to show the induction step when v 1 “ v. The first part follows since the two edges of S are incident to v and to v8 and belong to Q. The second part follows by observing that the clockwise ordering of edges around v in Q is obtained from the clockwise ordering around v in Q1 by removing an interval of consecutive edges in this ordering; furthermore, the first and last edge in the remaining interval are both incident to v8 . Applying the induction hypothesis shows the second part. For the third part, if e2 immediately follows e1 in the clockwise ordering around v in Q1 then the induction hypothesis gives the desired. Otherwise, e1 and e2 must be the two edges of S and Q is obtained from Q1 by removing the faces to the right of e1 and to the left of e2 and replacing them by a single face bounded by S. In the following, let Q be a piece with more than six faces. The following lemma shows that Q has a balanced cycle separator of size 2 which can be found in Op|Q|q time. Lemma 2. Q as defined above contains a 2-cycle S containing v8 such that the number of faces of Q on each side of S is a fraction between 1{3 and 2{3 of the total number of faces of Q. Furthermore, S can be found in Op|Q|q time. Proof. We construct S iteratively. In the first iteration, pick an arbitrary vertex v1 ‰ v8 of Q and let S1 consist of two distinct arbitrary edges, both incident to v1 and v8 . This is possible by the first part of Lemma 1. Now, consider the ith iteration for i ą 1 and let vi´1 and v8 be the two vertices of the 2-cycle Si´1 obtained in the previous iteration. If Si´1 satisfies the condition of the lemma, we let S “ Si´1 and the iterative procedure terminates. Otherwise, one side of Si´1 contains more than 2{3 of the faces of Q. Denote this set of faces by Fi´1 and let Ei´1 be the set of edges of Q incident to vi´1 , contained in faces of Fi´1 , and not belonging to Si´1 . We must have Ei´1 ‰ H; otherwise, it follows from the third part of Lemma 1 that Fi´1 contains only a single face of Q (bounded by Si´1 ), contradicting our assumption that Q contains more than six faces and that Fi´1 contains more than 2{3 of the faces of Q. If Ei´1 contains an edge incident to v8 , pick an arbitrary such edge ei´1 . This edge partitions 1 Fi´1 into two non-empty subsets; let Fi´1 be the larger subset. We let vi “ vi´1 and let Si be the 2-cycle consisting of ei´1 and the edge of Si´1 such that one side of Si contains exactly the 1 . faces of Fi´1 Now, assume that none of the edges of Ei´1 are incident to v8 . Then by the second part of Lemma 1, Ei´1 contains exactly one edge ei´1 . We let vi ‰ vi´1 be the other endpoint of ei´1 and we let Si consist of the two edges incident to vi which belong to the two faces of Fi´1 incident to ei´1 . To show the first part of the lemma, it suffices to prove that the above iterative procedure terminates. Consider two consecutive iterations i ą 1 and i ` 1 and assume that the procedure 7 does not terminate in either of these. We claim that then Fi Ă Fi´1 . If we can show this, it follows that |F1 | ą |F2 | ą . . . which implies termination. 1 If Ei´1 contains an edge incident to v8 then Fi´1 contains more than 1{3 of the faces of Q. 1 Since the procedure does not terminate in iteration i ` 1, Fi´1 must in fact contain more than 1 2{3 of the faces so Fi “ Fi´1 Ă Fi´1 , as desired. Now, assume that none of the edges of Ei´1 are incident to v8 . Then one side of Si contains exactly the faces of Fi´1 excluding two. Since we assumed that Q contains more than six faces, this side of Si contains more than 2{3 of these faces. Hence, Fi Ă Fi´1 , again showing the desired. For the second part of the lemma, note that counting the number of faces of Q contained in one side of a 2-cycle containing v8 can be done in the same amount of time as counting the number of edges incident to v8 from one edge of the cycle to the other in either clockwise or counter-clockwise order around v8 . This holds since every face of Q contains v8 . It now follows easily from our linked list representation of Q with clockwise orderings of edges around vertices that the ith iteration can be executed in Op|Fi´1 | ´ |Fi |q time for each i ą 1. This shows the second part of the lemma. Corollary 1. Given VorpR, uq and R∆ puq, its recursive decomposition can be computed in ? Op r log rq time. ? Proof. VorpR, uq has complexity |VorpR, uq| “ Op rq and R∆ puq can be found in time linear in this complexity. Since the recursive decomposition of R∆ puq has Oplog rq levels and since the ? total size of pieces on any single level is Op|R∆ puq|q “ Op|VorpR, uq|q “ Op rq, the corollary follows from Lemma 2. ? Lemma 3. The recursive decomposition of R∆ puq can be stored using Op rq space. ? Proof. Observe that the number of nodes of the tree decomposition is Op rq and each separator consists of two edges and so takes Op1q space. Embedding of R∆ puq: We now provide a more precise definition of the embedding of R∆ puq. Let f8 be the face of R corresponding to v8 in R˚ , i.e., f8 is the hole H. Consider the graph R̃ that consists of R plus a vertex ṽ8 located in f8 and an edge between each vertex of f8 and ṽ8 . The rest of R̃ is embedded consistently with respect to the embedding of R. Now, consider the following embedding of R∆ puq. First, embed v8 to ṽ8 . We now specify the embedding of each edge adjacent to v8 . Recall that each edge e that is adjacent to v8 lies in a single cell Cpeq of VorpR, uq. For each such edge e going from v8 to a vertex w˚ of R∆ puq, we embed it so that it follows the edge from ṽ8 to the boundary vertex be of Cpeq, then the shortest path in R̃ from be to the vertex of Cpeq on the face corresponding to w˚ in R̃. Note that by definition of R∆ puq such a vertex exists. We also remark that since the edges follow shortest paths and because of the uniqueness of the shortest paths they may intersect but not cross (and hence do not contradict the definition of R∆ puq). It follows that there exists a 1-to-1 correspondence between 2-cycle separators going through v8 of R∆ puq and cycle separators of R̃ consisting of an edge pu, vq, the shortest paths between u and a boundary vertex b1 and v and a boundary vertex b2 and pb1 , ṽ8 q and pb2 , ṽ8 q. We call the set tb1 , u, v, b2 u the representation of this separator. This is illustrated in Figure 3. Thus, for any 2-cycle separator S going through v8 , we say that the set of vertices of R that is in the interior (resp. exterior) of S is the set of vertices of R that lie in the bounded region of the place defined by the Jordan curve corresponding to the cycle separator in R̃ that is in 1-1 correspondence with S. We can now state the main lemma of this section. 8 b2 v u b1 ~ v∞ Figure 3: Example of a 2-cycle separator of R∆ puq and its corresponding embedding into the actual graph. Lemma 4. Let w be a vertex of R. Assume there exists a data structure that takes as input a the representation tb1 , x, y, b2 u of a 2-cycle separator S of VorpR, uq going through v8 and answers in t time queries of the following form: Is w in the bounded closed subset of the plane with boundary S? Then there exists an algorithm running in time Opt log rq that returns a set of at most 6 Voronoi cells of VorpR, uq such that one of them contains w. Proof. The algorithm uses the recursive decomposition of R∆ puq described in this section. Note that the decomposition consists of 2-cycle separators going through v8 . Thus, using the above embedding, each of the 2-cycle of the decomposition corresponds to a separator consisting of an edge px, yq and the shortest paths PR px, b1 q and PR py, b2 q where b1 , b2 are boundary vertices of R. Additionally, y belongs to the Voronoi cell of b2 in VorpR, uq and x belongs to the Voronoi cell of b1 in VorpR, uq. Therefore, PR px, b1 q and PR py, b2 q are vertex disjoint and so the data structure can be used to decide on which side of such a separator w is. The algorithm is the following: proceed recursively along the recursive decomposition of R∆ puq and for each 2-cycle separator of the decomposition use the data structure to decide in t time in which side of the 2-cycle w is located and then recurse on this side. If w belongs to both sides, i.e., if w is on the 2-cycle separator, recurse on an arbitrary side. The algorithm stops when there are at most 6 faces of R∆ puq and then it returns the Voronoi cells of VorpR, uq intersecting those 6 faces. Observe that the separators do not cross. Thus, when the algorithm obtains at a given recursive call that w is in the interior (resp. exterior) of a 2-cycle S and in the exterior (resp. interior) of the 2-cycle separator S 1 corresponding to the next recursive call, we can deduce that w lies in the intersection of the interior of S and the exterior of S 1 and hence deduce that it belongs to a Voronoi cell that lies in this area of the plane. Note that by Lemma 2 the number of faces of R∆ puq in a piece decreases by a constant ? factor at each step. Thus, since the number of boundary vertices is Op rq, the procedure takes at most Opt log rq time. Finally, observe that each face of R∆ puq that is adjacent to v8 lies in a single Voronoi cell of VorpR, uq. Thus, since at the end of the recursion there are at most 6 faces in the piece, they correspond to at most 6 different Voronoi cells of VorpR, uq. Hence the algorithm returns at most 6 different Voronoi cells of VorpR, uq. 9 5 Preprocessing a Region Given a query separator S in a graph RH “ R and given a query vertex w in R, our data structure needs to determine in Op1q time the side of S that w belongs to. In this section, we describe the preprocessing needed for this. In the following, fix R as well as an ordered pair pu, vq of vertices of R such that either pu, vq or pv, uq is an edge of R. The preprocessing described in the following is done over all such choices of R and pu, vq (and all holes H). The vertices of δR are on a simple cycle and we identify δR with this cycle which we orient clockwise (ignoring the edge orientations of R). We let b0 , . . . , bk denote this clockwise ordering where bk “ b0 . It will be convenient to calculate indices modulo k so that, e.g., bk`1 “ b1 . Given vertices w and w1 in R, let P pw, w1 q denote the shortest path in R from w to w1 . Given two vertices bi , bj P δR, we let δpbi , bj q denote the subpath of cycle δR consisting of the vertices from bi to bj in clockwise order, where δpbi , bj q is the single vertex bi if i “ j and δpbi , bj q “ δR if j “ i ` k. We let ∆pw, bi , bj q denote the subgraph of R contained in the closed and bounded region of the plane with boundary defined by P pbi , wq, P pbj , wq, and δpbi , bj q. We refer to ∆pw, bi , bj q as a wedge and call it a basic wedge if bi and bj are consecutive in the clockwise order, i.e., if j “ i ` 1 pmod kq. We need the following lemma. Lemma 5. Let w be a given vertex of R. Then there is a data structure with Oprq preprocessing time and size which answers in Op1q time queries of the following form: given a vertex x P V pRq and two distinct vertices bi1 , bi2 P δR, does x belong to ∆pw, bi1 , bi2 q? Proof. Below we present a data structure with the bounds in the lemma which only answers restricted queries of the form “does x belong to ∆pw, b0 , bi q?” for query vertices x P V pRq and bi P δR. In a completely symmetric manner, we obtain a data structure for restricted queries of the form “does x belong to ∆pw, bi , bk q?” for query vertices x P V pRq and bi P δR. We claim that this suffices to show the lemma. For consider a query consisting of x P V pRq and bi , bj P δR. If b0 P δpbi , bj q then ∆pw, bi , bj q “ ∆pw, bi , bk q Y ∆pw, b0 , bj q and otherwise, δpw, bi , bj q “ ∆pw, b0 , bj q X ∆pw, bi , bk q. Hence, answering a general query can be done using two restricted queries and checking if b0 P δpb1 , b2 q can be done in constant time by comparing indices of the query vertices. It remains to present the data structure for restricted queries of the form “does x belong to ∆pw, b0 , bi q?”. In the preprocessing step, each v P V pRq is assigned the smallest index iv P t0, . . . , ku for which v P ∆pw, b0 , biv q. Clearly, this requires only Oprq space and below we show how to compute these indices in Oprq time. Consider a restricted query specified by a vertex x of R and a boundary vertex bi P δR where 0 ď i ď k. Since x P ∆pw, b0 , bi q iff ix ď i, this query can clearly be answered in Op1q time. It remains to show how the indices iv can be computed in a total of Oprq time. Let R1 be R with all its edge directions reversed. In Oprq time, a SSSP tree T 1 from w in R1 is computed. Let T be the tree in R obtained from T 1 by reversing all its edge directions; note that all edges of T are directed towards w and for each v P V pRq, the path from v to w in T is a shortest path from v to w in R. Next, ∆pw, b0 , b0 q “ P pb0 , wq is computed and for each vertex v P ∆pw, b0 , b0 q, set iv “ 0. The rest of the preprocessing algorithm consists of iterations i “ 1, . . . , k where iteration i assigns each vertex v P V p∆pw, b0 , bi qqzV p∆pw, b0 , bi´1 qq the index iv “ i. This correctly computes indices for all vertices of R. In the following, we describe how iteration i is implemented. First, the path P pbi , wq is traversed in T until a vertex vi is encountered which previously received an index. In other words, vi is the first vertex on P pbi , wq belonging to ∆pw, b0 , bi´1 q. Note that vi is well-defined since w P ∆pw, b0 , bi´1 q. Vertices that are in V pP pbi , vi qqztvi u or in 10 a subtree of T rooted in a vertex of V pP pbi , vi qqztvi u and extending to the right of this path are assigned the index value i. Furthermore, vertices belonging to a subtree of T rooted in a vertex of V pP pbi´1 , vi qqztvi u and extending to the left of this path are assigned the index value i, except those on P pbi´1 , vi q (as they belong to ∆pw, b0 , bi´1 q). Since R is connected, it follows that the vertices assigned an index of i are exactly those belonging to V p∆pw, b0 , bi qqzV p∆pw, b0 , bi´1 qq and that the running time for making these assignments is Op|V p∆pw, b0 , bi qqzV p∆pw, b0 , bi´1 qq| ` |P pbi´1 , vi q ´ vi | ` 1q. Over all i, total running time is Oprq; this follows by a telescoping sums argument and by observing that vertex sets V pP pbi´1 , vi qqztvi u are pairwise disjoint. Given distinct vertices bi1 , bi2 P δR, if P pbi1 , uq and P pbi2 , vq do not cross (but may touch and then split), let lpbi1 , bi2 , u, vq denote the subgraph of R contained in the closed and bounded region of the plane with boundary defined by P pbi1 , uq, P pbi2 , vq, δpbi1 , bi2 q, and an edge of R between vertex pair pu, vq. In order to simplify notation, we shall omit u and v and simply write lpbi1 , bi2 q. It follows from planarity that there is at most one bi P δR such that pu, vq belongs to Ep∆pu, bi , bi`1 qqzEpP pbi`1 , uqq when ignoring edge orientations. If bi exists, we refer to it as buv ; otherwise buv denotes some dummy vertex not belonging to R. The goal in this section is to determine whether a given query vertex belongs to a given query subgraph lpbi1 , bi2 q. The following lemma allows us to decompose this subgraph into three simpler parts as illustrated in Figure 4. We will show how to answer containment queries for each of these simple parts. v u bi bi 2 1 bi+1 bi Figure 4: Example of decomposing the region into three parts using bi : The dashed wedges represent shortest paths to u, the dotted edges represent shortest paths to v, and the dasheddotted box lpbi , bi`1 q. Lemma 6. Let bi1 and bi2 be distinct vertices of δR and assume that P pbi1 , uq and P pbi2 , vq are vertex-disjoint. Then lpbi1 , bi2 q “ ∆pu, bi1 , bi q Y lpbi , bi`1 q Y ∆pv, bi`1 , bi2 q where bi “ buv if buv P δpbi1 , bi2 ´1 q and bi “ bi2 ´1 otherwise. Proof. Figure 5 gives an illustration of the proof. We first show the following result: given a vertex bj P δpbi1 `1 , bi2 q such that buv R δpbi1 , bj´1 q, P pbj 1 , uq is contained in lpbi1 , bi2 q for each 11 bj 1 P δpbi1 , bj q. The proof is by induction on the number i of edges in δpbi1 , bj 1 q. The base case i “ 0 is trivial since then bj 1 “ bi1 so assume that i ą 0 and that the claim holds for i ´ 1. If pv, uq is the last edge on P pbj 1 , uq, the induction step follows from uniqueness of shortest paths. Otherwise, neither pu, vq nor pv, uq belong to ∆pu, bj 1 ´1 , bj 1 q (since bj 1 ´1 ‰ buv ). By the induction hypothesis, P pbj 1 ´1 , uq is contained in lpbi1 , bi2 q and since P pbj 1 , uq cannot cross P pbj 1 ´1 , uq, P pbj 1 , uq cannot cross P pbi1 , uq. Also, P pbj 1 , uq cannot cross P pbi2 , vq since then either pu, vq or pv, uq would belong to ∆pu, bj 1 ´1 , bj 1 q. Since bj 1 R tbi1 `1 , bi2 ´1 u, it follows that P pbj 1 , uq is contained in lpbi1 , bi2 q which completes the proof by induction. Next, assume that buv R δpbi1 , bi2 ´1 q so that bi “ bi2 ´1 . Note that ∆pv, bi`1 , bi2 q “ P pbi2 , vq. Picking bj “ bi2 above implies that ∆pu, bi1 , bi q is contained in lpbi1 , bi2 q and hence lpbi1 , bi2 q “ ∆pu, bi1 , bi q Y lpbi , bi`1 q Y ∆pv, bi`1 , bi2 q. Now consider the other case of the lemma where bi “ buv P δpbi1 , bi2 ´1 q. Picking bj “ bi above, it follows that ∆pu, bi1 , bi q is contained in lpbi1 , bi2 q. It suffices to show that P pbi`1 , vq is contained in lpbi1 , bi2 q since this will imply that lpbi , bi`1 q is well-defined and that lpbi , bi`1 q Y ∆pv, bi`1 , bi2 q is contained in lpbi1 , bi2 q and hence that ∆pu, bi1 , bi qYlpbi , bi`1 qY∆pv, bi`1 , bi2 q “ lpbi1 , bi2 q. Assume for contradiction that P pbi`1 , vq is not contained in lpbi1 , bi2 q. By uniqueness of shortest paths, P pbi`1 , uq does not cross P pbi , uq. Since bi “ buv , we have that when ignoring edge orientations, pu, vq belongs to Ep∆pu, bi , bi`1 qqzEpP pbi`1 , uqq Ď Ep∆pu, bi1 , bi`1 qqzEpP pbi`1 , uqq. Hence P pbi`1 , uq is not contained in lpbi1 , bi2 q so it crosses P pbi2 , vq. Let x be a vertex on P pbi`1 , uq X P pbi2 , vq such that the successor of x on P pbi ` 1, uq is not contained in lpbi1 , bi2 q. By our assumption above that P pbi`1 , vq is not contained in lpbi1 , bi2 q, there is a first vertex y on P pbi`1 , vq such that its successor y 1 does not belong to lpbi1 , bi2 q. By uniqueness of shortest paths, y cannot belong to P pbi2 , vq so it must belong to P pbi1 , uq. This also implies that y ‰ x since x P P pbi2 , vq and P pbi1 , uq and P pbi2 , vq are vertexdisjoint. Since P py, vq is a subpath of P pbi`1 , vq and y ‰ x, shortest path uniqueness implies that P py, vq and P pbi`1 , uq are vertex-disjoint. Since P pbi`1 , yq is contained in lpbi1 , bi2 q, v belongs to the subgraph of ∆pu, bi1 , bi`1 q contained in the closed region of the plane bounded by P pbi`1 , yq, P py, uq, and P pbi`1 , uq. Since P py, vq does not intersect P pbi`1 , uq, P py 1 , vq thus intersects either P pbi`1 , yq or P py, uq. However, it cannot intersect P pbi`1 , yq since then P pbi`1 , vq would be non-simple. By uniqueness of shortest paths, P py 1 , vq also cannot intersect P py, uq since P py 1 , vq is a subpath of P py, vq and y 1 R P py, uq. This gives the desired contradiction, concluding the proof. Let P be a collection of subpaths such that for each path δpbi1 , bi2 q in P, buv R δpbi1 , . . . , bi2 ´1 q and bvu R δpbi1 `1 , . . . , bi2 ´1 q. We may choose the paths such that |P| “ Op1q and such that all edges of δR except pbuv , bvu q (if it exists) belongs to a path of P. It is easy to see that this is possible by considering a greedy algorithm which in each step picks a maximum-length path which is edge-disjoint from previously picked paths and which satisfies the two stated requirements. The next lemma allows us to obtain a compact data structure to answer queries of the form “does face f belong to lpbi , bi`1 q” for given query face f and query index i. Lemma 7. Let P “ δpbi1 , bi2 q P P be given. Then 1. an index jpP q exists with i1 ď jpP q ď i2 such that lpbi , bi`1 q is undefined for i1 ď i ă jpP q and well-defined for jpP q ď i ă i2 , 2. for each face f ‰ δR of R, there is at most one index jf pP q with jpP q ď jf pP q ď i2 ´ 2 such that f Ď lpbjf pP q , bjf pP q`1 q and f Ę lpbjf pP q`1 , bjf pP q`2 q, and 12 v u y' x y bi bi 1 2 bi Figure 5: Illustration of the proof of Lemma 6. The figure shows how unique shortest paths imply a contradiction (highlighted with grey) if the path from bi`1 to v is not contained in lpbi1 , bi2 q. 3. for each face f ‰ δR of R, there is at most one index jf1 pP q with jpP q ď jf1 pP q ď i2 ´ 2 such that f Ę lpbjf1 pP q , bjf1 pP q`1 q and f Ď lpbjf1 pP q`1 , bjf1 pP q`2 q. Furthermore, there is an algorithm which computes the index jpP q and for each face f ‰ δR of R the indices jf pP q and jf1 pP q if they exist. The total running time of this algorithm is Opr log rq and its space requirement is Oprq. Proof. Let path P “ δpbi1 , bi2 q P P and face f ‰ δR of R be given. To simplify notation in the proof, we shall omit reference to P and write, e.g., j instead of jpP q. Let j be the smallest index such that lpbj , bj`1 q is well-defined; if j does not exist, pick instead j “ i2 . We will show that j satisfies the first part of the lemma. This is clear if j “ i2 so assume therefore in the following that j ă i2 . We prove by induction on i that lpbi , bi`1 q is well-defined for j ď i ă i2 . By definition of j, this holds when i “ j. Now, consider a well-defined subgraph lpbi , bi`1 q where j ď i ď i2 ´ 2. We need to show that lpbi`1 , bi`2 q is well-defined. Since bi ‰ buv , P pbi`1 , uq is contained in lpbi , bi`1 q and since bi`1 ‰ bvu , P pbi`2 , vq is contained in the closed region of the plane bounded by the boundary of lpbi , bi`1 q and not containing lpbi , bi`1 q. In particular, lpbi`1 , bi`2 q is welldefined. This shows the first part of the lemma. Next, we show that j can be computed in Opr log rq time. Checking that lpbi , bi`1 q is welldefined (i.e., that paths P pbi , uq and P pbi`1 , vq do not cross) for a given index i can be done in Oprq time. Because of the first part of the lemma, a binary search algorithm can be applied to identify j in Oplog rq steps where each step checks if lpbi , bi`1 q is well-defined for some index i. This gives a total running time of Opr log rq, as desired. Space is clearly Oprq. To show the second part of the lemma, assume that there is an index jf with i1 ď jf ď i2 ´ 2 such that f Ď lpbjf , bjf `1 q and f Ę lpbjf `1 , bjf `2 q. It follows from the observations in the inductive step above that ∆pu, bjf , bjf `1 q contains exactly the faces of R contained in lpbjf , bjf `1 q and not in lpbjf `1 , bjf `2 q which implies that f Ď ∆pu, bjw , bjw `1 q. Since no face of R belongs to more than one graph of the form ∆pu, bi , bi`1 q, jf must be unique, showing the second part of the lemma. 13 Next, we give an Oprq time and space algorithm that computes indices jf . Let T be constructed as in the proof of Lemma 5. Initially, vertices of P pbi2 ´1 , uq are marked and all other vertices of R are unmarked. The remaining part of the algorithm consists of iterations i2 ´2, . . . , j in that order. In iteration i, P pbi , uq is traversed until a marked vertex vi is visited and then the vertices of P pbi , vi q are marked. The faces of R contained in the bounded region of the plane defined by P pbi , vi q, P pbi`1 , vi q, and δpbi , bi`1 q are exactly those that should be given an index value of i. The algorithm performs this task by traversing each subtree of T emanating to the right of P pbi , vi q and each subtree of T emanating to the left of P pbi`1 , vi q; for each vertex visited, the algorithm assigns the index value i to its incident faces. We now show that the algorithm for computing indices jf has Oprq running time. Using the same arguments as in the proof of Lemma 5, the total time to traverse and mark paths P pbi , vi q is Oprq. The total time to assign indices to faces is Oprq; this follows by observing that the time spent on assigning indices to faces incident to a vertex of T is bounded by its degree and this vertex is not visited in other iterations. The third part of the lemma follows with essentially the same proof as for the second part. We can now combine the results of this section to obtain the data structure described in the following lemma. Lemma 8. Let pu, vq be a vertex pair connected by an edge in R. Then there is a data structure with Opr log rq preprocessing time and Oprq space which answers in Op1q time queries of the following form: given a vertex w P R and two distinct vertices bi , bj P δR such that P pbi , uq and P pbj , vq are vertex-disjoint, does w belong to lpbi , bj , u, vq? Proof. We present a data structure Dpu, vq satisfying the lemma. First we focus on the preprocessing. Boundary vertices buv and bvu and set P as defined above are precomputed and stored. Vertices of δR are labeled with indices b0 , . . . , b|V pδRq|´1 according to a clockwise walk of δR. Each path of the form δpbi1 , bi2 q (including each path in P) is represented by the ordered index pair pi1 , i2 q. Checking if a given boundary vertex belongs to such a given path can then be done in Op1q time. Next, two instances of the data structure in Lemma 5 are set up, one for u denoted Du , and one for v denoted Dv . Then the following is done for each path P “ δpbi1 , bi2 q P P. First, the algorithm in Lemma 7 is applied. Then if lpbjpP q , bjpP q`1 , u, vq is well-defined, its set of faces FjpP q is computed and stored; otherwise, FjpP q “ H. Similarly, if lpbi2 ´1 , bi2 , u, vq is welldefined, its set of faces Fi2 ´1 is computed and stored, and otherwise Fi2 ´1 “ H. If pbuv , bvu q P δR, Dpu, vq computes and stores the set Fuv of faces of R contained in lpbuv , bvu , u, vq. This completes the description of the preprocessing for Dpu, vq. It is clear that preprocessing time is Opr log rq and that space is Oprq. Now, consider a query specified by a vertex w P R and two distinct vertices bi1 , bi2 P δR such that P pbi1 , uq and P pbi2 , vq are pairwise vertex-disjoint. First, Dpu, vq identifies a boundary vertex bi such that lpbi1 , bi2 , u, vq “ ∆pu, bi1 , bi q Y lpbi , bi`1 q Y ∆pv, bi`1 , bi2 q; this is possible by Lemma 6. Then Du and Dv are queried to determine if w P ∆pu, bi1 , bi q Y ∆pv, bi`1 , bi2 q; if this is the case then w P lpbi1 , bi2 , u, vq and Dpu, vq answers “yes”. Otherwise, Dpu, vq identifies an arbitrary face f ‰ δR of R incident to w. At this point, the only way that w can belong to lpbi1 , bi2 , u, vq is if w belongs to the interior of lpbi , bi`1 , u, vq which happens iff f is contained in lpbi , bi`1 , u, vq. If pbi , bi`1 q “ pbuv , bvu q, Dpu, vq checks if f P Fuv and if so outputs “yes”. Otherwise, there exists a path P P P containing pbi , bi`1 q and Dpu, vq identifies this path. It follows from Lemma 7 and from the definition of P that f is contained in lpbi , bi`1 , u, vq iff at least one of the following conditions hold: 1. jf pP q and jf1 pP q are well-defined and jf1 pP q ă i ď jf pP q. 14 2. f P Fi2 ´1 , jf1 pP q is well-defined, and i ą jf1 pP q, 3. f P FjpP q , jf pP q is well-defined, and i ď jf pP q, 4. f P FjpP q and jf pP q is undefined, Data structure Dpu, vq checks if any one these conditions hold and if so outputs “yes”; otherwise it outputs “no”. Two of the cases are illustrated in Figure 6. bi 2 bjf(P) bi+1 bi bi bj'f(P) bi+1 bi 1 bi 1 bj(P) 2 bj'f(P) bi bj(P) Figure 6: Illustration of how to determine if the face f belongs to lpbi , bi`1 , u, vq. The illustration includes cases 1 and 4 in the proof of Lemma 8. The large gray subpath indicates the part, where f is contained in each box defined by consecutive boundary nodes. It remains to show that Dpu, vq has query time Op1q. By Lemma 6, identifying bk can be done in Op1q time. Querying Du and Dv takes Op1q time by Lemma 5. Checking whether f P Fuv can clearly be done in Op1q time since this set of faces is stored explicitly. With our representation of paths by the indices of their endpoints, identifying P takes Op1q time. Finally, since sets FjpP q and FjpP q are explicitly stored, the four conditions above can be checked in Op1q time. 6 The Distance Oracle In this section we give a detailed presentation of both our algorithm for answering distance queries and our distance oracle data structure. Combining Lemmas 9, 10 and 11 with r “ n2{3 directly implies Theorem 1. 6.1 The Data Structure We present the algorithm for building our data structure. Preprocessing G 1. Compute an r-division R of G. Let δ be the set of all boundary vertices. 2. Store for each internal vertex the region to which it belongs. 3. Compute and store the distances from each vertex to each boundary vertex. 4. For each region R P R, compute and store the distances between any pair of internal vertices of R. 15 5. For each region R, for each vertex u R R, for each hole H, compute VorH pR, uq and store a separator decomposition as described in Section 4. 6. For each region R, for each edge px, yq P R, for each hole H, compute and store the data structure described in Section 5. ? Lemma 9. The total size of the data structure computed by Preprocessing is Opn2 { r`n¨rq. ? Proof. Recall that by definition of the r-division, there are Opn{ rq boundary vertices and Opn{rq regions. Thus, the number of distances stored at step 3 of the algorithm is at most ? Opn2 { rq. For a given region, storing the pairwise distances between all its internal vertices takes Opr2 q space. Since there are Opn{rq regions in total, Step 4 takes memory Opn ¨ rq. We now bound the space taken by Step 5. There are n{r choices for R and n choices for ? u. By Lemma 3, each decomposition can be stored using Op rq space. Thus, this step takes ? Opn2 { rq total space. We finally bound the space taken by Step 6. There n{r choices for R and r choices for an edge px, yq.By Lemma 8, for a given edge px, yq, the data structure takes Oprq space. Hence, the total space taken by this step is Opn ¨ rq and the lemma follows. ? Theorem 3. The execution of Preprocessing takes Opn2 q time and Opn ¨ r ` n2 { rq space. Proof. We analyze the procedure step by step. Computing an r-division with Op1q holes can be done in linear time and space using the algorithm of Klein et al., see [23]. ? We now analyze Step 3. There are Opn{ rq boundary vertices. Computing single-source shortest paths can be done in linear time using the algorithm of Henzinger et al. [16]. Hence, ? Step 3 takes at most Opn2 { rq time and space. Step 4 takes Opn ¨ rq time and space using the following algorithm. The algorithm proceed region by region and hole by hole. For a given region and hole, the algorithm adds an edge between each pair of boundary vertices that are on the hole of length equal to the distance between these vertices in the whole graph. Note that this is already in memory and was computed at Step 3. Now, for each vertex of the region, the algorithm runs a shortest path algorithm. Since ? there are Op rq boundary vertices, the number of edges added is Oprq. Thus, the algorithm is run on a graph that has at most Oprq edges and vertices. The algorithm spends at most Oprq time per vertex of the region. Since there are Opn{rq regions and Oprq vertices per region, both the running time and the space are Opn ¨ rq. Step 5 takes Opn2 q using the following algorithm. The algorithm proceeds vertex by vertex, region by region, hole by hole. For a given vertex u, a given region R, and a given hole H the algorithm computes VorH pR, uq. This can be done by adding a “dummy” vertex reprensenting u and connecting it to each boundary vertex x of the hole by an edge of length distpu, xq. Thus, this takes time Oprq using the single-source shortest path algorithm of Henzinger et al [16]. Furthermore, by Lemma 3 and Corollary 1, computing the separator decomposition of Section 4 ? ? given VorH pR, uq takes Õp rq time and Op rq space. Thus, over all vertices, regions and holes, ? this step takes Opn2 q time and Opn2 { rq memory. Finally, we show that Step 6 takes Õpn ¨ rq time and Opn ¨ rq space. The algorithm proceeds region by region, hole by hole, and edge by edge. By Lemma 8, for a given edge of the region, computing the data structure of Section 5 takes Opr ¨ log rq time and space. Since the total number of region is Opn{rq and the total number of edges per region is Oprq, the proof is complete. Corollary 2. There exists a distance oracle with total space Opn11{6 q and expected preprocessing time Opn11{6 q. 16 Proof. We apply Procedure Preprocessing with r “ n1{3 . By Lemma 9, the total size of the data structure output is Opn11{6 q. We now analyse the total preprocessing time. For Steps 3, 4, and 6, we mimicate the analysis ? of the proof of Theorem 3 and obtain a total preprocessing time of Opn ¨ r ` n2 { rq. We now explain how to speed-up Step 5. We show that Step 5 can be done in time Opn ¨ r5{2 q using Cabello’s data structure [5] for computing weighted Voronoi diagrams of a given region. More formally, Cabello introduces a data structure that allows to compute weighted Voronoi ? diagrams of a given region in expected time Õp rq. This data structure has preprocessing time Opr7{2 q. Hence the total preprocessing time for computing the data structure for all the regions is Õpn ¨ r5{2 q. Then, for each vertex u, each region R, each hole H, the algorithm 1. uses the data structure to compute the weighted Voronoi diagram VorH pR, uq in expected ? time Õp rq and ? 2. computes the separator decomposition of Section 4 in time Õp rq (by Lemma 3 and Corollary 1). ? This results in an expected preprocessing time of Opn ¨ r5{2 ` n2 { rq. Choosing r “ n1{3 yields a bound of Opn11{6 q. 6.2 Algorithm for Distance Queries This section is devoted to the presentation of our algorithms for answering distance queries between pairs of vertices. We show that any distance query between two vertices u, v can be performed in Oplog rq time. In the following, let u, v be two vertices of the graph. The algorithm is the following. Distance Query u, v 1. If u, v belong to the same region or if either u or v is a boundary vertex, the query can be answered in Op1q time since the distances between vertices of the same region and between boundary vertices and the other vertices of the graph are stored explicitly. 2. If u and v are internal vertices that belong to two different regions we proceed as follows. Let R be the region containing v and δR be the set of boundary vertices ofŤregion R. The boundary vertices are partitioned into holes H “ tH0 , . . . , Hk u, such that HPH H “ δR. For each H P H, we apply the following procedure. Let V be the weighted Voronoi diagram where the sites are the vertices of H and the weight of x P H is the distance from u to x. We now aim at determining to which cell of V, v belongs. We use the binary search procedure of Lemma 4 on the decomposition of R induced by the separators of the weighted Voronoi diagram. More precisely, we use the algorithm described in Section 4, Lemma 4, and the query algorithm described in Section 5, Lemma 8 to identify a set of at most six Voronoi cells so that one of them contains v. This induces a set of at most six boundary vertices X “ tx0 , . . . , xk u that represent the centers of the cells. Finally, we have the distances from both u and v to all the boundary vertices in X. Let vpHq “ minxPX distpu, xq ` distpx, vq. The algorithm returns minHPH vpHq. Lemma 10 (Running time). The Distance Query takes Oplog rq time. 17 Proof. Consider a distance query from a vertex u to a vertex v and assume that those vertices are internal vertices of two different regions as otherwise the query takes Op1q time. Observe that we can determine in Op1q time to which region v belongs. Fix a hole H. Let V be the weighted Voronoi diagram where the sites are the vertices of H and the weight of x P δR is the distance from u to x. We consider the decomposition of the region of v of VorpR, uq. Lemma 8 shows that the query time for the data structure defined in Section 5 is t “ Op1q. Applying Lemma 4 with t “ Op1q implies that the total time to determine in which Voronoi cell v belongs is at most Oplog rq. Finally, computing minxPX distpu, xq ` distpx, vq takes Op1q time. By definition of the rdivision there are Op1q holes. Therefore, we conclude that the running time of the Distance Query algorithm is Oplog rq. We now prove that the algorithm indeed returns the correct distance between u and v. Lemma 11 (Correctness). The Distance Query on input u, v returns the length of the shortest path between vertices u and v in the graph. Proof. We remark that the distance from any vertex to a boundary vertex is stored explicitly and thus correct. Hence, we consider the case where u and v are internal vertices of different regions. Let P be the shortest path from u to v in G. Let x P P be the last boundary vertex of R on the path from u to v and let Hx be the hole containing x. Let V be the weighted Voronoi diagram where the sites are the boundary vertices of Hx and the weight of y P Hx is the distance from u to y. We need to argue that the data structure of Section 5, Lemma 8 satisfies the conditions of Lemma 4. Observe that the separators defined in Section 4 consist of two shortest paths PR pb1 , xq and PR pb2 , yq where b1 , b2 P δR and py, zqis an edge of R. Hence, the set of vertices of the subgraph lpb1 , b2 , y, zq correspond to the set of all the vertices that are one of the two sides of the separator. Thus, by Lemma 8 the data structure described in Section 5 satisfies the condition of Lemma 4, with query time t “ Op1q. We argue that v belongs to the Voronoi cell of x. Assume towards contradiction that v is in the Voronoi cell of y ‰ x, we would have distpy, vq ` wpyq ď distpx, vq ` wpxq, where w is the weight function associated with the Voronoi diagram. Thus, this implies that distpy, vq ` distpy, uq ď distpx, vq ` distpx, uq. Therefore, there exists a shortest path from u to v that goes through y. Now observe that if v belongs to the Voronoi cell of y, the shortest path from v to y does not go through x. Hence, assuming unique shortest paths between pairs of vertices, we conclude that the last boundary vertex on the path from u to v is y and not x, a contradiction. Thus, v belongs to the Voronoi cell of x. Combining with Lemma 8, it follows that the Voronoi cell of x is in the set of Voronoi cells X obtained at the end of the recursive procedure. Observe that for any x1 P X there exists a path (possibly with repetition of vertices) of length distpx1 , uq ` distpx1 , vq. Therefore, since we assume unique shortest paths between pairs of vertices, we conclude that distpu, vq “ distpx, uq ` distpx, vq “ minx1 PX distpx1 , vq ` distpx1 , uq “ vpHx q “ minH vpHq. 7 Trade-off We now prove Theorem 2. We first consider the case with P “ Opn2 q and then extend it to the case with efficient preprocessing time. Let r1 ď r2 be positive integers to be defined later. The case r1 ď r2 will correspond exactly ? to S ě n n. The data structure works as follows. 18 1. We compute an r1 -division and an r2 -division of G named R1 and R2 respectively. Let δ1 respectively δ2 denote all the boundary vertices of R1 resp. R2 . 2. For each region R of R1 and R2 , compute and store the pairwise distances of the nodes of R. 3. For each u P δ1 and v P δ2 , compute and store the distance between u and v in G. 4. For each u P δ1 , region R P R2 and hole H P R, compute VorH pR, uq and store a separator decomposition as described in Section 4. 5. For each Region R P R2 , for each edge px, yq P R, for each hole H, compute and store the data structure described in Section 5. We start by bounding the space. Lemma 12. The total size of the data structure described above is ˆ ˙ n2 O nr2 ` ? . r1 r2 Proof. Consider the steps above. By definition of R1 and R2 step 2 uses Opnr2 q space (since we ? assumed r1 ď r2 ) and step 4 uses ?nr1 ¨ ?nr2 space. By Lemma 3 step 5 takes Opn{ r2 q for each ? node of δ1 giving Opn2 { r1 r2 q in total. By Lemma 8 the total space of step 6 is Opnr2 q. Now consider a query pair u, v. If u and v belong to the same region in R1 or R2 we return the stored distance. Otherwise we iterate over each boundary node w in the region of u in R1 . For each such boundary node we compute the distance to v using the data structures of steps 5 and 6 above similar to the query algorithm from Section 6.2. This is possible since we have stored the distances between all the needed boundary nodes in step 4. The minimum distance returned over all such w is the answer to the query. ? From the description above it is clear that we get a query time of Op r1 logpr2 qq. The correctness follows immediately from the discussion in the proof of Theorem 1. What is left now is to balance the space to obtain Theorem 2. The expression of Lemma 12 is balanced when r2 “ n2{3 1{3 . r1 ? ? Now, since we assumed that S ě n n we can focus on the case when r2 ě n and thus we get r1 ď r2 as we required. Plugging into the definition of Q we get exactly ? n5{2 Q “ Op r1 log nq “ 3{2 log n , S which gives us Theorem 2. For pre-processing time, we consider two cases similar to Theorem 3 and Corollary 2. It follows directly from the discussion above and Theorem 3 that the preprocessing can be performed in Opn2 q. We may, however, also consider pre-processing time as a parameter similar to space and query time. This gives a 3-way trade-off. In Corollary 2 we showed how to lower pre-processing time by increasing the space. Here we discuss the case of lowering pre-processing time further by increasing the query time. It follows from the discussion above and Corollary 2 ? 5{2 that we can perform pre-processing of the above structure in Opnr1 ` nr2 ` n2 { r1 r2 q time 5{2 and get the same space bound. If we assume that r1 ď r2 we get a data structure with query 19 ? ? 5{2 time Q “ Op r1 log nq and space and pre-processing time S “ Opnr2 ` n2 { r1 r2 q. Up to logarithimic and constant factors, this gives us Q “ n11{5 {S 6{5 . For any S ě n16{11 this sat5{2 isfies the requirement that r1 ď r2 . As an example, we get a data structure with space and pre-processing time Opn16{11 q and a query time of Opn5{11 log nq. 20 References [1] The TSPLIB. http://comopt.ifi.uni-heidelberg.de/software/TSPLIB95/. Accessed: 2010-09-30. [2] Amir Abboud and Søren Dahlgaard. Popular conjectures as a barrier for dynamic planar graph algorithms. In Proc. 57th IEEE Symposium on Foundations of Computer Science (FOCS), pages 477–486, 2016. [3] Srinivasa Rao Arikati, Danny Z. Chen, L. Paul Chew, Gautam Das, Michiel H. M. Smid, and Christos D. Zaroliagis. Planar spanners and approximate shortest path queries among obstacles in the plane. In Proc. 4th European Symposium on Algorithms (ESA), pages 514–528, 1996. [4] Sergio Cabello. Many distances in planar graphs. Algorithmica, 62(1-2):361–381, 2012. See also SODA’06. [5] Sergio Cabello. Subquadratic algorithms for the diameter and the sum of pairwise distances in planar graphs. In Proc. 28th ACM/SIAM Symposium on Discrete Algorithms (SODA), pages 2143–2152, 2017. [6] Shiri Chechik. Approximate distance oracles with constant query time. In Proc. 46th ACM Symposium on Theory of Computing (STOC), pages 654–663, 2014. [7] Shiri Chechik. Approximate distance oracles with improved bounds. In Proc. 47th ACM Symposium on Theory of Computing (STOC), pages 1–10, 2015. [8] Danny Z. Chen and Jinhui Xu. Shortest path queries in planar graphs. In Proc. 22nd ACM Symposium on Theory of Computing (STOC), pages 469–478, 2000. [9] Vincent Cohen-Addad, Søren Dahlgaard, and Christian Wulff-Nilsen. Fast and compact exact distance oracle for planar graphs. CoRR, abs/1702.03259, 2017. [10] Hristo Djidjev. On-line algorithms for shortest path problems on planar digraphs. In Graph-Theoretic Concepts in Computer Science, 22nd International Workshop, WG ’96, Cadenabbia (Como), Italy, June 12-14, 1996, Proceedings, pages 151–165, 1996. [11] Paul Erdős. Extremal problems in graph theory. In IN “THEORY OF GRAPHS AND ITS APPLICATIONS,” PROC. SYMPOS. SMOLENICE. Citeseer, 1964. [12] Jittat Fakcharoenphol and Satish Rao. Planar graphs, negative weight edges, shortest paths, and near linear time. Journal of Computer and System Sciences, 72(5):868–889, 2006. See also FOCS’01. [13] Greg N. Frederickson. Fast algorithms for shortest paths in planar graphs, with applications. SIAM Journal on Computing, 16(6):1004–1022, 1987. [14] Pawel Gawrychowski and Adam Karczmarz. Improved bounds for shortest paths in dense distance graphs. CoRR, abs/1602.07013, 2016. [15] Paweł Gawrychowski, Haim Kaplan, Shay Mozes, Micha Sharir, and Oren Weimann. Voronoi diagrams on planar graphs, and computing the diameter in deterministic o (n5/3) time, 2017. arXiv preprint. 21 [16] Monika R Henzinger, Philip Klein, Satish Rao, and Sairam Subramanian. Faster shortestpath algorithms for planar graphs. Journal of Computer and System Sciences, 55(1):3–23, 1997. [17] Giuseppe F Italiano, Yahav Nussbaum, Piotr Sankowski, and Christian Wulff-Nilsen. Improved algorithms for min cut and max flow in undirected planar graphs. In Proc. 43rd ACM Symposium on Theory of Computing (STOC), pages 313–322, 2011. [18] Haim Kaplan, Shay Mozes, Yahav Nussbaum, and Micha Sharir. Submatrix maximum queries in monge matrices and monge partial matrices, and their applications. In Proc. 23rd ACM/SIAM Symposium on Discrete Algorithms (SODA), pages 338–355, 2012. [19] Ken-ichi Kawarabayashi, Philip N Klein, and Christian Sommer. Linear-space approximate distance oracles for planar, bounded-genus and minor-free graphs. In International Colloquium on Automata, Languages, and Programming, pages 135–146. Springer, 2011. [20] Ken-ichi Kawarabayashi, Christian Sommer, and Mikkel Thorup. More compact oracles for approximate distances in undirected planar graphs. In Proceedings of the Twenty-Fourth Annual ACM-SIAM Symposium on Discrete Algorithms, pages 550–563. SIAM, 2013. [21] Philip N. Klein. Preprocessing an undirected planar network to enable fast approximate distance queries. In Proc. 13th ACM/SIAM Symposium on Discrete Algorithms (SODA), pages 820–827, 2002. [22] Philip N Klein. Multiple-source shortest paths in planar graphs. In Proc. 16th ACM/SIAM Symposium on Discrete Algorithms (SODA), volume 5, pages 146–155, 2005. [23] Philip N Klein, Shay Mozes, and Christian Sommer. Structured recursive separator decompositions for planar graphs in linear time. In Proc. 45th ACM Symposium on Theory of Computing (STOC), pages 505–514. ACM, 2013. [24] Rolf Klein. Concrete and Abstract Voronoi Diagrams, volume 400 of Lecture Notes in Computer Science. Springer, 1989. [25] Rolf Klein, Elmar Langetepe, and Zahra Nilforoushan. Abstract voronoi diagrams revisited. Comput. Geom., 42(9):885–902, 2009. [26] Shay Mozes and Christian Sommer. Exact distance oracles for planar graphs. In Proc. 23rd ACM/SIAM Symposium on Discrete Algorithms (SODA), pages 209–222, 2012. [27] Yahav Nussbaum. Improved distance queries in planar graphs. In Proc. 12th Workshop on Algorithms and Data Structures (WADS), pages 642–653, 2011. [28] Mikkel Thorup. Compact oracles for reachability and approximate distances in planar digraphs. Journal of the ACM, 51(6):993–1024, 2004. See also FOCS’01. [29] Mikkel Thorup and Uri Zwick. Approximate distance oracles. Journal of the ACM, 52(1):1– 24, 2005. See also STOC’01. [30] Christian Wulff-Nilsen. Algorithms for Planar Graphs and Graphs in Metric Spaces. PhD thesis, University of Copenhagen, 2010. [31] Christian Wulff-Nilsen. Approximate distance oracles with improved preprocessing time. In Proceedings of the twenty-third annual ACM-SIAM symposium on Discrete Algorithms, pages 202–208. Society for Industrial and Applied Mathematics, 2012. 22 [32] Christian Wulff-Nilsen. Approximate distance oracles for planar graphs with improved query time-space tradeoff. In Proc. 27th ACM/SIAM Symposium on Discrete Algorithms (SODA), pages 351–362, 2016. 23
8cs.DS
Optimal Belief Approximation Reimar H. Leike, Torsten A. Enßlin arXiv:1610.09018v6 [math.ST] 3 Aug 2017 Max-Planck-Institut für Astrophysik, Karl-Schwarzschildstr. 1, 85748 Garching, Germany Ludwig-Maximilians-Universität München, Geschwister-Scholl-Platz 1, 80539 Munich, Germany In Bayesian statistics probability distributions express beliefs. However, for many problems the beliefs cannot be computed analytically and approximations of beliefs are needed. We seek a loss function that quantifies how “embarrassing” it is to communicate a given approximation. We reproduce and discuss an old proof showing that there is only one ranking under the requirements that (1) the best ranked approximation is the non-approximated belief and (2) that the ranking judges approximations only by their predictions for actual outcomes. The loss function that is obtained in the derivation is equal to the Kullback-Leibler divergence when normalized. This loss function is frequently used in the literature. However, there seems to be confusion about the correct order in which its functional arguments—the approximated and non-approximated beliefs—should be used. The correct order ensures that the recipient of a communication is only deprived of the minimal amount of information. We hope that the elementary derivation settles the apparent confusion. For example when approximating beliefs with Gaussian distributions the optimal approximation is given by moment matching. This is in contrast to many suggested computational schemes. Keywords: information theory, Bayesian inference, loss function, axiomatic derivation, machine learning I. INTRODUCTION In Bayesian statistics, probabilities are interpreted as degrees of belief. For any set of mutually exclusive and exhaustive events, one expresses the state of knowledge as a probability distribution over that set. The probability of an event then describes the personal confidence that this event will happen or has happened. As a consequence, probabilities are subjective properties reflecting the amount of knowledge an observer has about the events; a different observer might know which event happened and assign different probabilities. If an observer gains information, she updates the probabilities she had assigned before. If the set of possible mutually exclusive and exhaustive events is infinite, it is generally impossible to store all entries of the corresponding probability distribution on a computer or communicate it through a channel with finite bandwidth. One therefore needs to approximate the probability distribution which describes one’s belief. Given a limited set X of approximative beliefs q(s) on a quantity s, what is the best belief to approximate the actual belief as expressed by the probability p(s)? In the literature, it is sometimes claimed that the best approximation is given by the q ∈ X that minimizes the Kullback–Leibler divergence (“approximation” KL) [1]   X p(s) KL(p, q) = p(s) ln (1) q(s) s where q is the approximation and p is the real belief. We refer to this functional as “approximation” KL to emphasize its role in approximation, which will be derived in the course of this paper and to distinguish it from the same functional, with q being a prior belief and p being the posterior belief to which this KL is minimized in inference. We will refer to the functional with q being the input and p obtained through minimization as “inference KL”. In Equation (1), minimization is done with respect to its second argument. The derivation of this particular functional form varies from field to field. For example, in coding theory, one tries to minimize the amount of bandwidth needed to transmit a message. Given a prior q over the symbols that the message consists of, an optimal scheme can be derived. The approximation KL gives the expected amount of extra bits needed to transmit such a message if the symbols are actually drawn from the probability distribution p instead of q [2]. If we know that p is the real probability distribution, the best approximative probability distribution q ∈ X to base a coding on is therefore the one minimizing the approximation KL. However, it is not clear that minimizing the amount of bits transferred is the best or even only measure expressing how good such an approximation is in general. In machine learning and deep learning, neural networks are trained to understand abstract data d; for example, to assign a label s to it. This task can be viewed as fitting an approximative probability distribution q(s|d) to a true generating probability distribution p(s|d). For this, the approximative probability distribution is parametrized (to a neural network) and then matched to the true, generating probability distribution using a loss function and samples. The most frequently used loss function is the cross entropy, which is equivalent to the approximation KL. The reason to use this form is often either inspired from coding theory, or by experimental experience [3]. Another argument for minimizing the approximation KL is given in Chapter 13 of Reference [4], where it is claimed that this yields the maximum likelihood estimation to p(s) among the probability distributions in X and that it gives an unbiased and unique approximation. Interchanging the arguments of the Kullback–Leibler divergence (the inference KL used in variational Bayes) generally leads to a biased estimate and does not necessarily yield a unique result. These arguments undoubtedly give evidence for why minimizing the approximation KL gives a good estimate. However, this does not exclude all other methods. Having an unbiased estimate refers to getting the right mean. In our picture, this is a result of 2 optimal approximation and not a requirement for optimality. Additionally, this result was derived with the help of information geometry, whose applicability to non-local problems is criticized, for example, in References [5, 6]. Contrary to the evidence for minimizing the approximation KL, we find many examples where an approximation is made by minimizing other functionals; for example, minimizing the inference KL (e.g., [7–13]). For many but not all of them, this is because minimizing the approximation KL is not feasible in practice in their case due to the real distribution p not being accessible. In this paper, we seek to bring together the different motivations and give a full and consistent picture. The proof we present here is not new; it goes back to [14], where there is an exact mathematical derivation for probability densities analogously to our derivation. However, there are earlier publications dealing with the discrete case [15–17]. Although this proof dates back at least 40 years, its implication on approximating beliefs seem to be quite unknown—especially in the community of physicists applying Bayesian methods. In this paper, we reproduce a slightly modified version of this proof, give the result a new interpretation and add further justification for the prerequisites used, laying emphasis on why one has to accept the axioms necessary for the derivation if one is a Bayesian. We provide argumentation for why believe approximation is an important and omnipresent topic. We lay the emphasis of this paper more on interpretation of results and justification of prerequisites, and thus present an easy version of the proof where the loss function is assumed to be differentiable. The proof can however be extended to the general case of non-differentiable loss [18]. The argument we reproduce gives evidence that minimizing the approximation KL is the best approximation in theory. This argument does not rest on information geometry nor is it restricted to coding theory. By imposing two consistency requirements, one is able to exclude all ranking functions with the exception of one for ranking the approximative probability distributions q ∈ X. For this, one employs the principle of loss functions [19], also called cost functions, regret functions, (or with flipped sign, utility functions or score functions) and shows that the unique loss function for ranking approximated probability distributions is the approximation KL. For us, a ranking is a total order indicating preference, whereas a loss is a map to R, which induces a ranking but additionally gives an absolute scale to compare preferences. The presented axiomatic derivation does not give rise to any new method, but it enables a simple checking for whether a certain approximation is most optimally done through the approximation KL. There are many other examples of axiomatic derivations seeking to support information theory on a fundamental level. Some notable examples are Cox derivation [20] of Bayesian probability theory as a unique extension of Boolean algebra as well as a scientific discussion on the maximum entropy principle [21–23], establishing the inference KL as unique inference tool (which gave rise to the naming convention in this paper). Most of these arguments rely on page-long proofs to arrive at the Kullback– Leibler divergence. The proof that is sketched in this paper is only a few lines long, but nonetheless standard literature for axiomatic derivation in Bayesianism does not cite this “easy” derivation (e.g., the influential Reference [21]). As already discussed, approximation is an important and unavoidable part of information theory, and with the axiomatic derivation presented here we seek to provide orientation to scientists searching for a way to approximate probability distributions. In Section II, we introduce the concept of loss functions, which is used in Section III to define an optimal scheme for approximating probability distributions that express beliefs. We briefly discuss the relevance of our derivations for the scientific community in Section IV. We conclude in Section V. II. LOSS FUNCTIONS The idea to evaluate predictions based on loss functions dates back 70 years, and was first introduced by Brier [24]. We explain loss functions by the means of parameter estimation. Imagine that one would like to give an estimate of a parameter s that is not known, which value of s should be taken as an estimate? One way to answer this question is by using loss functions. For this note that p(s) is now formally ´ a probability measure, however we choose to write dsp(s) instead ´ of dp(s) as if p(s) would be a probability density. A loss function in the setting of parameter estimation is a function that takes an estimate σ for s and quantifies how “embarrassing” this estimate is if s = s0 turns out to be the case: L (σ, s0 ) The expected embarrassment can be computed by using the knowledge p(s) about s: ˆ hL (σ, s0 )ip(s0 ) = ds0 L (σ, s0 ) p(s0 ) The next step is to take the estimate σ that minimizes the expected embarrassment; that is, the expectation value of the loss function. For different loss functions, one arrives at different recipes for how to extract an estimate σ from the belief p(s); for example, for s ∈ R: L (σ, s0 ) =   Take σ such that   −δ(σ − s0 ) ⇒ p(s)| s=σ is maximal = (2)  |σ − s0 | ⇒ Take σ to be the median    (σ − s0 )2 ⇒ Take σ to be the mean In the context of parameter estimation, there is no general loss function that one should take. In many scientific applications, the third option is favored, but different situations might enforce different loss functions. In the context of probability distributions, one 3 has a mathematical structure available to guide the choice. In this context, one can restrict the possibilities by requiring consistent loss functions. III. THE UNIQUE LOSS FUNCTION How embarrassing is it to approximate a probability distribution by q(s) even though it is actually p(s)? We quantify the embarrassment in a loss function q  L , s0 (3) m which says how embarrassing it is to tell someone q(s) is one’s belief about s in the event that later s is measured to be s0 . Here m is introduced as reference measure to make L coordinate independent. For a finite set coordinate independence is trivially fulfilled and it might seem that having a reference measure m is superficial. Note however, that it is a sensible additional requirement to have the quantification be invariant under splitting of events, i.e. mapping to a bigger set where two now distinguishable events repq is inresent one former large event. The quotient m variant under such splitting of events, whereas q itself is not. The reference measure m can be any measure such that q is absolutely continuous with respect to m. Note further that we restrict ourselves to the case that we get to know the exact value of s. This does not make our approach less general; imagining that we would instead take a more general loss L(q, q̃(s)) where q̃ is the knowledge about  s at some later point, q then we may define L m , s0 = L(q, δss0 ) with δ denoting the Kronecker or Dirac delta function, and thus restrict ourselves again to the case of exact knowledge. This line of reasoning was spelled out in detail by John Skilling [25]: “If there are general theories, then they must apply to special cases”. To decide which belief to tell someone, we look at the expected loss ˆ D q E q  L , s0 = ds0 L , s0 p(s0 ) (4) m m p(s0 ) and try to find a q ∈ X that minimizes this expected loss. To sum up, if we are given a loss function, we have a recipe for how to optimally approximate the belief. Which loss functions are sensible, though? We enforce two criteria that a good loss function should satisfy. Criterion 1 (Locality) If s = s0 turned out to be the case, L only depends on the prediction q actually makes about s0 :   q  q(s0 ) L , s0 = L (5) m m(s0 ) Note that we make an abuse of notation here, denoting the function on both sides of the equation by the same symbol. The criterion is called locality because q should be evalit demands that the functional of m uated locally for every s0 . It also forbids a direct dependence of the loss L on s0 which excludes losses that are a priori biased towards certain outcomes s0 . This form of locality is an intrinsically Bayesian property. Consider a situation where one wants to decide which of two rivaling hypotheses to believe. In order to distinguish them, some data d are measured. To update the prior using Bayes theorem, one only needs to know how probable the measured data d are given each hypothesis, not how probable other possible data d˜ 6= d that were not measured are. This might seem intuitive, but there exist hypothesis decision methods (not necessarily based on loss functions) that do not fulfill this property. For example, the non-Bayesian p-value depends mostly on data that were not measured (all the data that are at least as “extreme” as the measured data). Thus, it is a property of Bayesian reasoning to judge predictions only by using what was predicted about things that were measured. The second criterion is even more natural. If one is not restricted in what can be told to others, then the best thing should be to tell them the actual belief p. Criterion 2 (Optimality of the actual belief, properness.) Let X be the set of all probability distributions over s. For all p and all m, the probability distribution q ∈ X with minimal expected loss is q = p:  0= E  ∂ D q L , s0 ∂q(s) m p q=p (6) The last criterion is also referred to as a proper loss (score) function in the literature; see Reference [26] for a mathematical overview of different proper scoring rules. Our version of this property is slightly modified to the version that is found in the literature as we demand this optimum to be obtained independently of a reference measure m. There is a fundamental Bayesian desiderata stating that “If there are multiple ways to arrive at a solutions, then they must agree.” We’d like to justify why this is a property that is absolutely important. If one uses statistics as a tool to answer some question, then if that answer would depend on how statistics is applied, then this statistic itself is inconsistent. In our case, where the defined loss function is dependent on an arbitrary reference measure m, the result is thus forced to be independent of that m. Note furthermore that although intuitively we want the global optimum to be at the actual belief p (referred to as strictly proper in the literature), mathematically we only need it to be an extreme value for our derivation. Having these two consistency requirements fixed, we derive which kind of consistent loss functions are possible. We insert Equation (5) into Equation (6), expand the domain of the loss function to not necessarily normalized positive vectors q(s) but introduce λ as a Lagrange multiplier to account for the fact that we minimize under the constraint of normalization. We 4 compute      ´ q(s0 ) ∂ ds L p(s ) + λ q(s ) 0 = 0 0 0 ∂q(s) m(s0 ) q=p   ´ p(s0 ) 0) = ds0 ∂L m(s0 ) δ(s−s p(s ) + λ δ(s − s ) 0 0 m(s0 )   p(s) p(s) = ∂L m(s) m(s) + λ   p(s) ⇒ ∂L m(s) = − λm(s) p(s) (7) Here ∂L denotes the derivative of L . In the next p(s) for the quotient. Note step we substitute x := m(s) that Equation (7) holds for all positive real values of x ∈ R+ since the requested measure independence of the resulting ranking permits to insert any measure m. We then obtain ∂L (x) = − λx ⇒ L (x) = −C ln (x) + D (8) where C > 0 and D are constants with respect to q. Note that through the two consistency requirements one is able to completely fix what the loss function is. In the original proof of [14], there arises an additional possibility for L if the sample space consists of 2 elements. In that case, the locality axiom, as it is used in the literature, does not constrain L at all. In our case, where we introduced m as a reference measure, we are able to exclude that possibility. Note that the constants C and D are irrelevant for determining the optimal approximation as they do not affect where the minimum of the loss function is. To sum up our result if one is restricted to the closed set X of probability distributions, one should take that q ∈ X that minimizes   ˆ D q E q(s0 ) L , s0 (9) = − ds0 p(s0 ) ln m m(s0 ) p(s0 ) in order to obtain the optimal approximation, where it is not important what m is used. If one takes m = 1, this loss is the cross entropy h−ln (q(s0 ))ip(s0 ) . If one desires a rating of how good an approximation is, and not only a ranking which approximation is best, one could go one step further and enforce a third criterion: Criterion 3 (zero loss of the actual belief) For all p, the expected loss of the probability distribution p is 0: D p E 0= L , s0 (10) m p This criterion trivially forces m = p and makes the quantification unique while inducing the same ranking. Thus we arrive at the Kullback-Leibler divergence   ˆ p(s0 ) KL(p, q) = ds0 p(s0 )ln q(s0 ) as the optimal rating and ranking function. To phrase the result in words, the optimal way to approximate the belief p is such that given the approximated belief q, the amount of information KL(p, q) that has to be obtained for someone who believes q to arrive back at the actual belief p is minimal. We should make it as easy as possible for someone who got an approximation q to get to the correct belief p. This sounds like a trivial statement, explaining why the approximation KL is already widely used for exactly that task. IV. DISCUSSION We briefly discuss the implications of these results. In comparison to Reference [2, 4], we presented another more elementary line of argumentation for the claim that the approximation KL is the correct ranking function for approximating which holds in a more general setting. Other works that base their results on minimizing the inference KL (KL(q, p)) for belief approximation are not optimal with respect to the ranking function we derived in Section III. One reason for preferring the for this purpose non-optimal inference KL is that it is computationally feasible for many applications, in contrast to the optimal approximation. As long as the optimal scheme is not computationally accessible, this argument has its merits. Another reason for minimizing the inference KL for approximation that is often cited (e.g., [27]) is that it gives a lower bound to the log-likelihood    p(d, s) ln(p(d|s)) = ln + KL(q, p) (11) q(s) q(s) which for example gives rise to the expectation maximization (EM- ) algorithm [28]. However, the method only gives rise to maximum a posteriori or maximum likelihood solutions, which corresponds to optimizing the δ-loss of Equation (2). In Reference [11], it is claimed that minimizing the inference KL yields more desirable results since for multi-modal distributions, individual modes can be fitted with a mono-modal distribution such as a Gaussian distribution, whereas the resulting distribution has a very large variance when minimizing the approximation KL to account for all modes. In Figure 1 there is an example of this behavior. The true distribution of the quantity s is taken to be a mixture of two standard Gaussians with means ±3. It is approximated with one Gaussian distribution by using the approximation KL and the inference KL. When using the approximation KL, the resulting distribution has a large variance to cover both peaks. Minimizing the inference KL leads to a sharply peaked approximation around one peak. A user of this method might be very confident that the value of s must be near 3, even though the result is heavily dependent on the initial condition of the minimization and could have become peaked around −3 just as well. We find that fitting a multi-modal distribution with a mono-modal one will yield suboptimal results irrespective of the fitting scheme. An approximation should always have the goal to be close to the target that is being approximated. If it is already apparent that this goal cannot be achieved, it is recommended 5 to rethink the set of approximative distributions and not dwell on the algorithm used for approximation. In Reference [12] an approximative simulation scheme called information field dynamics is described. There, a Gaussian distribution q is matched to a time-evolved version U (p) of a Gaussian distribution p. This matching is done by minimizing the inference KL. In this particular case (at least for information preserving dynamics), the matching can be made optimal without making the algorithm more complicated. Since for information preserving dynamics time evolution is just a change of coordinates and the Kullback–Leibler divergence is invariant under such transformations, one can instead match the Gaussian distribution p and U −1 (q) by minimizing KL(p, U −1 (q)) = KL(U (p), q), which is just as difficult in terms of computation. accordance to the behavior of other approximations. For example, when step-wise rounding the real number 1.49, one gets 2 if it is first rounded to one decimal and then to integer precision compared to being rounded to integer precision directly where one gets 1. If information is lost due to approximation, it is natural for further approximations to be less precise than if one were to approximate in one go. There also exist cases where we could not find any comments explaining why the arguments of the Kullback–Leibler divergence are in that particular order. In general, it would be desirable that authors provide a short argumentation for why they choose a particular order of the arguments of the KL divergence. V. probability density 0.35 0.30 target approximation KL inference KL 0.25 0.20 0.15 0.10 0.05 0.00 −10 −5 0 s 5 10 Figure 1: Results of approximating a target distribution in s with a Gaussian distribution. KL: Kullback–Leibler. In Reference [13] it is claimed that the inference KL yields an optimal approximation scheme fulfilling certain axioms. This result is the exact opposite of our result. This disagreement is due to an assumed consistency of approximations. In Reference [13], further approximations are forced to be consistent with earlier approximations; i.e., if one does two approximations, one gets the same result as with one joint approximation. Due to this requirement, the derived functional cannot satisfy some of the axioms that we used. In our picture, it is better to do one large approximation instead of many small approximations. This is in [1] S. Kullback and R. Leibler, Annals of Mathematical Statistics 22 (1), 79 (1951). [2] T. M. Cover and J. A. Thomas, (2006). [3] I. Goodfellow, Y. Bengio, and A. Courville, Deep Learning (MIT Press, 2016) http://www. deeplearningbook.org. [4] M. Opper and D. Saad, Advanced mean field methods: Theory and practice (MIT press, 2001). [5] J. Skilling, in BAYESIAN INFERENCE AND MAXIMUM ENTROPY METHODS IN SCIENCE AND ENGINEERING: Proceedings of the 33rd Interna- CONCLUSIONS Using the two elementary consistency requirements on locality and optimality, as expressed by Equations (5) and (6), respectively, we have shown that there is only one ranking function that ranks how good an approximation of a belief is, analogously to Reference [14]. By minimizing KL(p, q) with respect to its second argument q ∈ X, one gets the best approximation to p. This is claimed at several points in the literature. Nevertheless, we found sources where other functionals were minimized in order to obtain an approximation. This confusion is probably due to the fact that for the slightly different task of updating a belief q under new constraints, KL(p, q) has to be minimized with respect to p, its first argument [29, 30]. We do not claim that any of the direction of Kullback– Leibler divergence are wrong by themselves, but one should be careful of when to use which. We hope that for the case of approximating a probability distribution p by another q we have given convincing and conclusive arguments for why this should be done by minimizing KL(p, q) with respect to q, if this is feasible. VI. ACKNOWLEDGEMENTS We would like to thank A. Caticha, J. Skilling, V. Böhm, J. Knollmüller, N. Porqueres, and M. Greiner and six anonymous referees for the discussions and their valuable comments on the manuscript. tional Workshop on Bayesian Inference and Maximum Entropy Methods in Science and Engineering (MaxEnt 2013), Vol. 1636 (AIP Publishing, 2014) pp. 24–29. [6] J. Skilling, in Bayesian inference and maximum entropy methods in science and engineering (MAXENT 2014), eds. A. Mohammad-Djafari and F. Barbaresco, AIP Conference Proceedings, Vol. 1641 (2015) pp. 27– 42. [7] C. W. Fox and S. J. Roberts, Artificial intelligence review 38, 85 (2012). 6 [8] T. A. Enßlin and C. Weig, Phys. Rev. E 82, 051112 (2010), arXiv:1004.2868 [astro-ph.IM]. [9] D. M. Blei, A. Kucukelbir, and J. D. McAuliffe, ArXiv e-prints (2016), arXiv:1601.00670 [stat.CO]. [10] F. J. Pinski, G. Simpson, A. M. Stuart, and H. Weber, ArXiv e-prints (2014), arXiv:1408.1920 [math.NA]. [11] F. Pinski, G. Simpson, A. Stuart, and H. Weber, ArXiv e-prints (2013), arXiv:1310.7845 [math.PR]. [12] T. A. Enßlin, Phys. Rev. E 87, 013308 (2013), arXiv:1206.4229 [physics.comp-ph]. [13] C.-Y. Tseng and A. Caticha, Physica A Statistical Mechanics and its Applications 387, 6759 (2008), arXiv:0808.4160 [cond-mat.stat-mech]. [14] J. M. Bernardo, The Annals of Statistics , 686 (1979). [15] J. Aczél and J. Pfanzagl, Metrika 11, 91 (1967). [16] J. McCarthy, Proceedings of the National Academy of Sciences 42, 654 (1956). [17] I. J. Good, Journal of the Royal Statistical Society. Series B (Methodological) , 107 (1952). [18] P. Harremoës, arXiv preprint arXiv:1701.01010 (2017). [19] H. Cramér, On the mathematical theory of risk (Centraltryckeriet, 1930). [20] R. T. Cox, American Journal of Physics 14, 1 (1946). [21] E. T. Jaynes, Probability Theory, by E. T. Jaynes and Edited by G. Larry Bretthorst, pp. 758. ISBN [22] [23] [24] [25] [26] [27] [28] [29] [30] 0521592712. Cambridge, UK: Cambridge University Press, June 2003., edited by Bretthorst, G. L. (2003). J. Skilling, in Maximum-Entropy and Bayesian Methods in Science and Engineering (Springer, 1988) pp. 173–187. A. Caticha, in Bayesian Inference and Maximum Entropy Methods in Science and Engineering, American Institute of Physics Conference Series, Vol. 707, edited by G. J. Erickson and Y. Zhai (2004) pp. 75–96, physics/0311093. G. W. Brier, Monthly weather review 78, 1 (1950). J. Skilling, in Maximum entropy and Bayesian methods (Springer, 1989) pp. 45–52. T. Gneiting and A. E. Raftery, Journal of the American Statistical Association 102, 359 (2007). C. Bishop, Pattern Recognition and Machine Learning (Information Science and Statistics), 1st edn. 2006. corr. 2nd printing edn (2007). A. P. Dempster, N. M. Laird, and D. B. Rubin, Journal of the royal statistical society. Series B (methodological) , 1 (1977). I. Csiszar, The annals of statistics , 2032 (1991). A. Caticha, ArXiv e-prints (2014), arXiv:1412.5644.
10math.ST
arXiv:1508.03536v1 [cs.PL] 14 Aug 2015 Proceedings of the 3rd Workshop on Domain-Specific Language Design and Implementation DSLDI’15 Tijs van der Storm Centrum Wiskunde & Informatica (CWI) [email protected] Sebastian Erdweg TU Darmstadt [email protected] July 7th, 2015 2 3 DSLDI’15 Introduction DSLDI’15 is the 3rd workshop on Domain-Specific Language Design and Implementation, which was held at ECOOP 2015, on Tuesday, July 7th, 2015. DSLDI’15 was organized by: • Tijs van der Storm Centrum Wiskunde & Informatica (CWI) [email protected] • Sebastian Erdweg TU Darmstadt [email protected] The submitted talk proposal were reviewed by the following program committee: • Emilie Balland • Martin Bravenboer (LogicBlox) • Hassan Chafi (Oracle Labs) • William Cook (UT Austin) • Shriram Krishnamurthi (Brown University) • Heather Miller (EPFL) • Bruno Oliveira (University of Hong Kong) • Cyrus Omar (CMU) • Richard Paige (University of York) • Tony Sloane (Macquarie University) • Emma Söderberg (Google) • Emma Tosch (University of Massachusetts, Amherst) • Jurgen Vinju (CWI) The website of DSLDI’15 is: http://2015.ecoop.org/track/dsldi-2015-papers. Informal Post-Proceedings DSLDI’15 This document contains informal post-proceedings of DSLDI’15. It contains: • A snapshot of the home page of DSLDI’15 • The detailed program of the workshop • The accepted talk proposals. • A summary of the panel discussion on Language Composition. 4 5 Program 6 SCROLL - A Scala-based library for Roles at Runtime Max Leuthäuser Technische Universität Dresden Software Technology Group [email protected] 1 2 See: github.com/max-leuthaeuser/SCROLL See: scala-lang.org/api/current/#scala.Dynamic 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 26.                           SCROLL 2015                           JavaStage 2012 [3]                           NextEJ 2009 [8]                           ScalaRoles 2008 [10]                           Rumer 2007 [2]                           powerJava 2006 [1]                           Rava 2006 [5]                           OT/J 2005 [6] Chameleon 2003 [4] way, e.g. adding, removing and transferring roles or accessing role functions and attributes with the +-Operator (e.g. in line 14, right listing). The following limitation (apart from some role features not implemented yet, see table 1) is the major subject of the future work on SCROLL. The underlying technique (compiler rewrite rules) hides important typing information to the tooling typically used by most developers, i.e. IDEs with debugger and link tracers. Writing plugins for those (e.g. Eclipse, Intellij) overcoming this issue would be one solution and is currently under development. Finally, it is necessary to investigate how well this implementation blends into coeval approaches. We use a classification scheme established in two successive surveys on role-based modeling and programming languages, namely [9,11]. This revolves 26 classifying features of roles incorporating both the relational and the context-dependent nature of roles (see table 1). The most sophisticated, competing approach so far is ObjectTeams/Java [6]. It allows to override methods of their player by aspect weaving. Besides that, it introduces Teams to represent compartments whose inner classes automatically become roles. Supporting both the inheritance of roles and teams leads to family polymorphism [7]. On the downside, it does not support multiple unrelated player types for a role type. In sum SCROLL provides a simple and clean testing playground in an unmodified Scala for using roles at runtime. Feature [9] Today’s software systems always need to anticipate changing context. New business rules and functions should be implemented and adapted. The concept of role modeling and programming is frequently discussed for decades across many scientific areas. It allows the modeling and implementation of context dependent information w.r.t. dynamically changing context. Hence future software infrastructures have the intrinsic need to introduce such a role concept. Until now the implementation with existing object oriented languages always requires the generation of a specific runtime environment and management code. The expressiveness of these languages is not able to cope with essential role-specific features, such as true delegation or binding roles dynamically. In this work we present how a relatively simple implementation with Scala based on its Dynamic trait allows to augment an object’s type at runtime implementing dynamic (compound-) role types. It enables role-based implementations that lead to more reuse and better separation of concerns. Currently, only a handful, mostly unusable (e.g. because they are not providing a running compiler or have been abandoned by the developer) role-based programming languages exists. The field of research is highly fragmented, due to the fact that every research area relies on a different set of role-related features [9]. Therefore it is necessary to establish a basic role concept at runtime and build an appropriate tooling around it to make it more useful for developers. A prototypic Scala implementation for roles (SCROLL - SCala ROLes Language1 ) was developed as library approach, enabling the user to specify roles and context dependent behavior. A basic example of smart (autonomous) cars driving around demonstrates part of its capabilities (see page 2). Two persons (class Person) and two cars (Car) are bound to the roles Driver, Passenger and NormalCar, SmartCar respectively. Each role modifies the default behavior implemented in the players classes, as demonstrated at runtime in the console output listing. Dynamic role selection (like selecting an object playing the Source location role) supports filtering for attributes and evaluating function call results (e.g. line 17 and 26, right listing). Internally the following two technical aspects are the most considerable ones. First, making use of the Dynamic Trait. All calls to role functions (i.e. functions that are not natively available on the player object) are translated by the compiler using certain rules2 . These are adjustable resulting in customizable, dynamic role dispatch. Second, applying implicit conversions. Scala’s implicit classes allow for packing in player and role objects to compound dynamic types. All important role features are exposed this                           Table 1: Comparison of coeval approaches for etablishing roles at runtime based on 26 classifying features extracted from the literature [9,11]. It differentiates between fully (), partly () and not supported () features. 1 2 3 class Person(val name: String) class Car(val licenseID: String) class Location(val name: String) 4 5 6 7 8 9 10 11 12 13 14 15 16 17 1 2 3 4 class Transportation() extends Compartment { object AutonomousTransport extends Compartment { class SmartCar() { def drive() { info("I am driving autonomously!") } } class Passenger() { def brake() { info(s"I can’t reach the brake. I am ${+this name} ,→ and just a passenger!") } } } 18 5 val transportation = new Transportation { val peter = new Person("Peter") val harry = new Person("Harry") val googleCar = new Car("A-B-C-001") val toyota = new Car("A-B-C-002") 6 new Location("Munich") play new Source() new Location("Berlin") play new Source() new Location("Dresden") play new Target() 7 8 9 10 harry play new ManualTransport.Driver() toyota play new ManualTransport.NormalCar() 11 12 13 +toyota drive() ManualTransport play new TransportationRole( one[Source]("name" ==# "Berlin"), one[Target]()) travel() 14 15 16 17 18 19 object ManualTransport extends Compartment { class NormalCar() { def drive() { info(s"I am driving with a driver called ,→ ${+one[Driver]() name}.") } } class Driver() { def brake() { info(s"I am ${+this name} and I am hitting the ,→ brakes now!") } } } 19 20 21 22 23 24 25 26 27 28 29 30 31 class TransportationRole(source: Source, target: Target) { def travel() { val kindOfTransport = this player match { case ManualTransport => "manual" case AutonomousTransport => "autonomous" } info(s"Doing a $kindOfTransport transportation with ,→ the car ${one[Car]().licenseID} from ,→ ${+source name} to ${+target name}.") } } 32 33 34 35 36 37 38 39 40 peter play new AutonomousTransport.Passenger() googleCar play new AutonomousTransport.SmartCar() 20 21 22 +googleCar drive() AutonomousTransport play new TransportationRole( one[Source]("name" ==# "Munich"), one[Target]()) travel() 23 24 25 26 27 28 +peter brake(); +harry brake() 29 30 } Fig. 1: The SmartCar example (instance code, top) and the corresponding model code (left). 1 2 3 4 5 6 I am driving with a driver called Harry. Doing a manual transportation with the car A-B-C-002 from ,→ Berlin to Dresden. I am driving autonomously! Doing a autonomous transportation with the car A-B-C-001 ,→ from Munich to Dresden. I can’t reach the brake. I am Peter and just a passenger! I am Harry and I am hitting the brakes now! 41 class Target() class Source() 42 43 44 } Fig. 2: Running the SmartCar example generates the console output shown above. Acknowledgements This work is funded by the German Research Foundation (DFG) within the Research Training Group “Role-based Software Infrastructures for continuous-context-sensitive Systems” (GRK 1907). References 1. Baldoni, M., Boella, G., van der Torre, L.: Roles as a coordination construct: Introducing powerjava. Electr. Notes Theor. Comput. Sci 150(1), 9–29 (2006) 2. Balzer, S., Gross, T., Eugster, P.: A relational model of object collaborations and its use in reasoning about relationships. In: Ernst, E. (ed.) ECOOP. Lecture Notes in Computer Science, vol. 4609, pp. 323–346. Springer (2007) 3. Barbosa, F.S., Aguiar, A.: Modeling and programming with roles: introducing javastage. Tech. rep., Instituto Politécnico de Castelo Branco (2012) 4. Graversen, K.B., Østerbye, K.: Implementation of a role language for object-specific dynamic separation of concerns. In: AOSD03 Workshop on Software-engineering Properties of Languages for Aspect Technologies (2003) 5. He, C., Nie, Z., Li, B., Cao, L., He, K.: Rava: Designing a java extension with dynamic object roles. In: Engineering of Computer Based Systems, 2006. ECBS 2006. 13th Annual IEEE International Symposium and Workshop on. pp. 7–pp. IEEE (2006) 6. Herrmann, S.: Programming with roles in ObjectTeams/Java. Tech. rep., AAAI Fall Symposium (2005) 7. Herrmann, S., Hundt, C., Mehner, K.: Translation polymorphism in object teams. Tech. rep., TU Berlin (2004) 8. Kamina, T., Tamai, T.: Towards safe and flexible object adaptation. In: International Workshop on Context-Oriented Programming. p. 4. ACM (2009) 9. Kühn, T., Leuthäuser, M., Götz, S., Seidl, C., Aßmann, U.: A metamodel family for role-based modeling and programming languages. In: Combemale, B., Pearce, D., Barais, O., Vinju, J. (eds.) Software Language Engineering, Lecture Notes in Computer Science, vol. 8706, pp. 141–160. Springer International Publishing (2014), http://dx.doi.org/10. 1007/978-3-319-11245-9_8 10. Pradel, M., Odersky, M.: Scala Roles - A lightweight approach towards reusable collaborations. In: International Conference on Software and Data Technologies (ICSOFT ’08) (2008) 11. Steimann, F.: On the representation of roles in object-oriented and conceptual modelling. Data & Knowledge Engineering 35(1), 83–106 (2000) A case for Rebel A DSL for Product Specifications Jouke Stoel CWI, Amsterdam, The Netherlands [email protected] 1. Introduction Large service organisations like banks have a hard time keeping grips on their software landscape. This is not only visible while performing maintenance on existing applications but also when developing new applications. One of the problems these organisations face is that they often do not have a clear and uniform descriptions of their products like savings- and current account, loans and mortgages. This makes it hard to reason about changes to existing products and hampers the introduction of new ones. The specifications that are written down often contain ambiguities or are out-of-date. Next to this, specification are almost always written down using natural language which is known to lead to numerous deficiencies [1]. To counter these problems we introduce Rebel, a DSL for product specifications. Rebel lets users specify their product in a high-level, unambiguous manner. These specification can then be simulated which enables users to explore their products before they are build. We have created Rebel for a large Dutch bank and are currently in the process of specifying existing banking products. Since Rebel is in the early stages of development we would like to use DSLDI to gather feedback on its current design and proposed future directions. 2. Rebel Rebel is a domain specific language for product specifications. It is inspired on formal methods like Z [2], B [3] and Alloy [4]. It is aimed at helping a large Dutch bank in bridging the gap between informal specifications written down in natural language or passed on mouth-to-mouth towards unambiguous, machine interpretable specifications. The main idea behind Rebel is to present the user with a easy to understand syntax and interface while it exploits powerful tooling like verification to check whether the specifications hold under the hood. Rebel is implemented in R ASCAL [5] as a stand-alone DSL. 2.1 Requirements The language needed to fit the following requirements: • Flexibility - it should be possible to tune it to the problem of the bank we were working with. • Integration - it should be possible to integrate existing tools like model checkers and connect to existing systems in the banks application landscape. • Adaptation - it should be easy to learn and the tooling like an IDE should be similar to the tooling currently used. Considering these requirements we decided to create a new language. This new language needed to be a linguistic hybrid to be able to support both the definition of single products as well as the overlying process. 2.2 Design Rebel is a declarative language and centres around specifications. Figure 1 shows an example of such a specification. A specification describes one product. Specifications contain fields, events, invariants and life cycle. Fields declare the data used in the specification. Events describe the possible mutations on the data under certain conditions. Invariants describe global rules which should always hold and life cycle constrains the order of events. The definition of events and invariants is separated from usage in specifications. This is to promote reuse and to separate the responsibility of implementing an event from using an event in a specification. Defined fields can only be of built-in types. Events can only reference fields declared in the specification, not fields of other specifications. We made this choice so that the potential state space is smaller when applying verification techniques like model checking. Events are described using pre- and postconditions. An example event is shown in Figure 2. The semantics are straightforward; if the precondition holds then the postcondition will hold after the event is raised. Events contain runtime instance variables as well as configuration variables. Configuration variables are keyword parameters that can have a default value and can be set when the event is referenced by a particular specification. For instance, the us- specification SavingsAccount { fields { balance: Time -> Integer } events { openAccount[minimumDeposit=50] withdraw[] deposit[] close[] } invariants { positiveBalance } lifeCycle { initial new -> opened: openAccount opened -> opened: withdraw, deposit -> closed: close final closed } } Figure 1. Example Rebel specification initial event openAccount [minimumDeposit : Integer = 0] (accountNumber: String, initialDeposit : Integer) { preconditions { initialDeposit >= minimumDeposit; } postconditions { new this.balance(now) == initialDeposit; } } Figure 2. Example of an event definition age declaration of openAccount (Figure 1) sets the event configuration parameter minimumDeposit meaning that the SavingsAccount uses 50 as a minimumDeposit when an account is opened. Invariants are global rules. They use quantifiers over data to express certain constrains that should always hold. Figure 3 shows an example that states that at all time, saving accounts should have a balance equal to or above zero. invariant positiveBalance { all sa:SavingsAccount | all t:Time { sa.balance(t) >= 0 } } Figure 3. Example of an invariant 2.3 Simulating specifications The simulation is aimed at helping product owners and developers gain insight into their specified product. It can be used to check if the specification meets the expectations of the user. Figure 4 shows a screenshot of the simulation of Figure 4. Screenshot of simulating the SavingsAccount specification a SavingsAccount. The simulation is implemented with the use of the Z3 SMT solver [6]. 3. Future work The current version of Rebel supports the definition of single products. Next to this it is also needed to define composition of these products. In other words, the process. Since the specifications only contain fields of built-in types and can only reference themselves it is not possible to compose specifications. To overcome this we propose the use of process algebra [7] for specifying how the individual specification events should be composed. This will give us the ability to specify choices, sequencing, concurrency and communications between specifications. The question will be if we will still be able to reason about (certain parts of) the specifications since composing the specifications will have a large impact on the state space. An orthogonal aspect is the tooling for Rebel specifications. Next to the simulation we will explore the possibility of model checking. The model checker could be used to find event traces that lead to violations of the invariants. Earlier work has shown that it is possible to translate Rebel specification to Alloy. Alloys analyser was used to find traces which would break the specification. The problem with this approach was scalability. An alternative would be to exploit an SMT solver for the same purpose [8]. One of the challenges here will be how we can bound the data in a smart way to limit the state space. Ultimately, running systems should be generated from Rebel specifications. Since Rebel is a declarative language it will not always be straightforward to generate a correct system from this. Again SMT solvers might hold the key as shown in other work like [9]. References [1] B. Meyer. On Formalism in Specifications. IEEE Software, 2(1):6–26, 1985. [2] J.M. Spivey and J.R. Abrial. The Z notation: A Reference Manual. Prentice Hall Hemel Hempstead, second edition, 1992. [3] J.R. Abrail. The B-Book: Assinging programs to meaning. Cambridge University Press, 1996. [4] D. Jackson. Alloy: a lightweight object modelling notation. ACM Transactions on Software Engineering and Methodology, 11(2):256–290, 2002. [5] P. Klint, T. van der Storm, and J. Vinju. RASCAL: A Domain Specific Language for Source Code Analysis and Manipulation. In 2009 Ninth IEEE International Working Conference on Source Code Analysis and Manipulation, pages 168–177. IEEE, 2009. [6] L. De Moura and N. Bjorner. Z3: An efficient SMT solver. Tools and Algorithms for the Construction and Analysis of Systems, pages 337–340, 2008. [7] J. Baeten, T. Basten, and M.A. Reniers. Process algebra: equational theories of communicating processes. Cambridge university press, 2010. [8] A. Milicevic and H. Kugler. Model checking using SMT and theory of lists. In NASA Formal Methods, pages 282–297. Springer, 2011. [9] R. Alur, R. Bodik, G. Juniwal, M.M.K. Martin, M. Raghothaman, S. Seshia, R. Singh, A. Solar-Lezama, E. Torlak, and A. Udupa. Syntax-guided synthesis. 2013 Formal Methods in Computer-Aided Design, pages 1–17, October 2013. Flick: A DSL for middleboxes Network-as-a-Service (NaaS) project∗ We argue the need for specialised languages to program application-level middleboxes, and describe our design for such a language, through which we seek to make available suitable abstractions for middlebox programming, and constrain what kinds of programs can be expressed. A middlebox is a non-standard router; it carries out a computation on network traffic (beyond decrementing a TTL and recomputing a checksum) and the routing decision on that traffic may be influenced by the computation’s result. Examples of middleboxes include firewalls, protocol accelerators, VPN gateways, transcoders, load-balancers and proxies. Middleboxes perform a vital function in today’s Internet, in datacentres, and even in home and corporate networks. An application-level middlebox is one that does not deal solely in networklevel primitives or protocols, but also (and perhaps exclusively) in applicationlevel protocols and data. Examples include a memcached caching reverse-proxy, and a load-balancer that unsheaths an HTTP/SSL connection before passing the cleartext HTTP data to a backend server. Middleboxes are usually written in general-purpose languages—usually C. Such languages are sufficiently expressive, enjoy a broad developer population, and a compiler is likely to exist for the intended architecture. It has been observed that even for systems programming, the disadvantages of using a generalpurpose language sometimes outweigh the benefits [3, 5]. We believe that middlebox programming is an example of this. By their nature, general-purpose languages do not provide suitable abstractions for middlebox programming. Another disadvantage is that general-purpose languages are much too expressive for writing middleboxes, which often do not implement complex behaviour. Indeed middleboxes cannot implement complex behaviour if they are to operate at line rate at high bandwidth. This suggests the need for a framework in which to write middleboxes. This could be implemented in two ways: as a DSL, or as a library. Either approach could provide more suitable abstractions for middleboxes than is usually provided by a general-purpose language alone. Because of this, either approach could lead to shorter, more readable, code, without significant regression in performance. Work on both approaches has been described in the literature. DSLs for middlebox programming include Click [4], POF [6], and P4 [2]. All of these are designed for processing packets. (Click can also be regarded ∗ http://www.naas-project.org/ 1 as a library, but even there it is oriented towards the implementation of packet processors.) These languages seek to support the use of arbitrary protocols; part of the programmer’s task is to encode the packet format. But not all middleboxes are most naturally defined as packet processors— this is particularly the case for application-level middleboxes which we seek to support. We can think of middleboxes more generally as processors of arbitrary data extracted from byte streams. xOMB [1] is a library for programming middleboxes in C++. Unlike packet processors, xOMB elements can operate on higher-layer data. But a library does not allow us to impose suitable constraints on programs: using a middlebox library leaves you at liberty to write arbitrary functions in the host language. We therefore opted to design a DSL for implementing application-level middleboxes. Our language, called Flick, has the following features. First, it is statically typed, and features algebraic types. In addition to being used for type checking and inference, types can be used to synthesise serialisation and deserialisation code for values of a type. This is achieved by decorating a type’s declaration with serialisation annotations. These specify the precision of integers, for example, and byte ordering for multi-byte values. Second, Flick only allows bounded recursion. It is a Turing-incomplete language; only terminating computations can be expressed in Flick. This is an important constraint that middlebox DSLs enforce, but that libraries cannot, as mentioned earlier. Third, channels and processes are language primitives; such concepts seem native to middleboxes. Channels are typed, and connect processes to other processes, or to external (network) sources or destinations of data. Processes can run concurrently, and contain the middlebox’s logic. Fourth, processes encapsulate their own state, but middleboxes may also share state. That is, message-passing is the method used to both notify a process of new data, and to provide that data; but shared memory can be used when notification is not necessary. We found this useful for describing shared caches, such as in the encoding of a load-balancer for the memcached key-value database, shown below. proc Memcached: (cmd/cmd client, [cmd/cmd] backends) global cache := empty_dict client => test_cache(client, backends, cache) backends => update_cache(cache) => client Here the process Memcached has a channel client, and an array of channels backends with which it can communicate with other processes. All channels in this process can yield and accept values of type cmd, values of which are memcached commands. update_cache and test_cache are functions. The body of the process simply forwards requests from client to a backend unless the reply has been cached; and it forwards replies from backends to the client, after caching them locally. So far we have a formal semantics for the core expression language, and a partial compiler to a runtime of our devising. Future work involves language features such as exception handling and resource estimation, as well as extending the compiler to include more targets, including reconfigurable hardware. 2 References [1] James W. Anderson, Ryan Braud, Rishi Kapoor, George Porter, and Amin Vahdat. xOMB: Extensible Open Middleboxes with Commodity Servers. In Proceedings of the Eighth ACM/IEEE Symposium on Architectures for Networking and Communications Systems, ANCS ’12, pages 49–60, New York, NY, USA, 2012. ACM. [2] Pat Bosshart, Dan Daly, Glen Gibb, Martin Izzard, Nick McKeown, Jennifer Rexford, Cole Schlesinger, Dan Talayco, Amin Vahdat, George Varghese, and David Walker. P4: Programming Protocol-independent Packet Processors. SIGCOMM Comput. Commun. Rev., 44(3):87–95, July 2014. [3] Pierre-Evariste Dagand, Andrew Baumann, and Timothy Roscoe. Filet-ofish: Practical and Dependable Domain-specific Languages for OS Development. SIGOPS Oper. Syst. Rev., 43(4):35–39, January 2010. [4] Eddie Kohler, Robert Morris, Benjie Chen, John Jannotti, and M. Frans Kaashoek. The Click Modular Router. ACM Trans. Comput. Syst., 18(3):263–297, August 2000. [5] Adrian Schüpbach, Andrew Baumann, Timothy Roscoe, and Simon Peter. A Declarative Language Approach to Device Configuration. ACM Trans. Comput. Syst., 30(1):5:1–5:35, February 2012. [6] Haoyu Song. Protocol-oblivious Forwarding: Unleash the Power of SDN Through a Future-proof Forwarding Plane. In Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, HotSDN ’13, pages 127–132, New York, NY, USA, 2013. ACM. 3 Towards a Next-Generation Parallel Particle-Mesh Language∗ Sven Karol1 , Pietro Incardona2,3 , Yaser Afshar2,3 , Ivo F. Sbalzarini2,3 , and Jeronimo Castrillon1 1 Chair for Compiler Construction, Center for Advancing Electronics Dresden, TU Dresden, Dresden, Germany [sven.karol|jeronimo.castrillon]@tu-dresden.de MOSAIC Group, Chair of Scientific Computing for Systems Biology, Faculty of Computer Science, TU Dresden, Dresden, Germany Center for Systems Biology Dresden, Max Planck Institute of Molecular Cell Biology and Genetics, Dresden, Germany [afshar|incardon|ivos]@mpi-cbg.de 2 3 Abstract We present our previous and current work on the parallel particle-mesh language PPML—a DSL for parallel numerical simulations using particle methods and hybrid particle-mesh methods in scientific computing. 1 Introduction During the past years, domain-specific languages (DSLs) gained central importance in scientific high-performance computing (HPC). This is due to the trend towards HPC clusters with heterogeneous hardware—today, mainly using multi-core CPUs as well as streaming processors such as GPUs—in the future, using many-core CPUs, and potentially also reconfigurable processors or data-flow processing units. Writing programs for these machines is a challenging and time-consuming task for scientific programers, who do not only need to develop efficient parallel algorithms for the specific problem at hand, but also need to tune their implementations in order to take advantage of the cluster’s hardware performance. This does not only require experience in parallel programming, e.g. using OpenMP, OpenCL, or MPI, but also in computer architectures and numerical simulation methods, leading to the so-called “knowledge gap” in program efficiency [12]. Besides, it renders the simulation codes hardly portable. DSLs can help two-fold: First, they allow scientific programmers to write programs using abstractions closer to the original mathematical representation, e.g., partial differential equations. Second, they transparently encapsulate hardware-specific knowledge. In the proposed talk, we focus on the parallel particle-mesh language (PPML) [3]. This language provides a macro-based frontend to the underlying PPM library [13, 2] as a parallel run-time system. We analyze PPML’s implementation as well as its advantages and disadvantages w.r.t. state-of-the-art DSL implementation techniques. Based on this analysis, we discuss our early efforts in realizing the next version of PPML (Next-PPML) in conjunction with a redesign of the PPM library in C++. ∗ This work is partially supported by the German Research Foundation (DFG) within the Cluster of Excellence “Center for Advancing Electronics Dresden”. 2 Towards a Next-Generation Parallel Particle-Mesh Language 2 Particle and Mesh Abstractions In scientific computing, discrete models are naturally simulated using particles that directly represent the discrete entities of the model, such as atoms in a molecular-dynamics simulation or cars in a traffic simulation. These particles carry properties and interact with each other in order to determine the evolution of these properties and of their spatial location. But also continuous models, written as partial differential equations, can be simulated using particles. In this case, the particle interactions discretize differential operators, such as in the DC-PSE method [14]. This is often combined and complemented with mesh-based discretizations, such as the finite-difference method. Mesh and particle discretizations are equivalent in that they approximate the simulated system by a finite number of discrete degrees of freedom that are the particles or the mesh cells. When using particles together with meshes, it is sufficient to consider regular Cartesian (i.e., checkerboard) meshes, since all irregular and sub-grid phenomena are represented on the particles, which can arbitrarily distribute in the domain. Particles and meshes hence define data abstractions. A particle is a point abstraction that associates a location in space with arbitrary properties, like color, age, or the value of a continuous field at that location. These properties, as well as the particle locations, are updated at discrete time steps over the simulation period by computing interactions with surrounding particles within a given cut-off radius. Meshes are topological abstractions with defined neighborhood relations between cells. The properties are stored either on the mesh nodes or the mesh cells. The PPM library supports both types of abstractions, and also provides conversion operators between them (i.e., particle-mesh interpolation). 3 Current Status of PPM(L) Currently, PPM is implemented in object-oriented Fortran2003 [13, 2] and PPML is a macro system embedded in Fortran2003 [3]. PPML and PPM support transparently distributed mesh and particle abstractions, as well as parallel operations over them. This also includes properties and iterators. Different domain-decomposition algorithms allow for the automatic distribution of data over the nodes of an HPC cluster. Assigning data and work to processing elements is automatically done by a graph partitioning algorithm, and communication between processing elements in transparently handled by PPM “mappings”. The mathematical equations of the model to be simulated are written in LaTeX-like math notation with additional support for differential operators and dedicated integration loops [3]. Syntactically, PPML is an extension of Fortran2003 providing the aforementioned abstractions as domain-specific language concepts. Technically, the language is implemented as a source-to-source transformation relying on a mixture of macro preprocessing steps where macro calls are interspersed with standard Fortran2003 code. Besides C-style preprocessor directives, PPML also supports non-local macros. These are implemented in Ruby using eRuby as a macro language and the ANTLR parser generator for recognizing macro output locations, such as integration loops. Hence, PPML is partially realized using an island grammar [11]. In this preliminary form, PPML has already nicely demonstrated the benefits of embedded DSLs for scientific HPC. It has reduced both the size and the development time of scientific simulation codes by orders of magnitude [3]. It hides much of the parallelization intricacies (PPML automatically generates MPI) from scientific programmers without preventing them from using all features of the underlying programming language. The latter is essential since a DSL may not cover all potential corner cases, and may not always deliver top performance. However, the current light-weight implementation of PPML has severe disadvantages when S. Karol and Y. Afshar and P. Incardona and I. F. Sbalzarini and J. Castrillon Figure 1 Compiler and grammarware-based language processing chain of Next-PPML. it comes to code analysis algorithms targeting the whole program and domain-specific optimizations based thereon. Moreover, PPML programs are difficult to debug due to a lack of semantic error messages. We hence present our intended improvements addressing these issues in Next-PPML. 4 Approach to Next-PPML Next-PPML is a language extension using grammarware and compilerware. This allows us to analyze larger portions of the program code. Examples such as the universal form language (UFL) [1] for finite-element meshes, the Liszt language for mesh-based solvers [7], and the Blitz++ [15] stencil template library have shown that domain-specific analyses and built-in abstractions are beneficial for scientific computing DSLs. Hence, similar concepts will be considered in the Next-PPML language. Figure 1 conceptually illustrates the planned tool chain. First, the embedded DSL program is parsed to an AST-based intermediate representation. This representation already contains control-flow edges. After computing domain-specific static optimizations on this intermediate representation, including optimizations to the communication pattern of the parallel program, the Next-PPML compiler generates an executable (or source code) which is then used to run the simulation on a parallel HPC cluster. During the simulation run, the application continuously self-optimizes, e.g., for dynamic load balancing. While static optimizations are handled by the DSL compiler, dynamic runtime optimization are handled by the PPM library, which may rely on information provided by the DSL program. Ideally, the new language uses a declarative approach that bases on an existing programminglanguage grammar and extends it with new productions. Some well-known candidates for this are Stratego/XT [4], TXL [6], JastAdd [8] or EMFText [9]. However, the target language is C++11 which has no simple declarative specification. Hence, it is difficult to estimate if the above-mentioned tools would scale, and implementing a C++ frontend is a huge project on its own. Therefore, we prefer Clang [10] as an implementation framework, which already provides built-in analyses that can be adopted and extended. 5 Conclusions Hybrid particle-mesh simulations are the only scientific computing framework that is able to simulate models of all four kingdoms: continuous/deterministic, continuous/stochastic, discrete/deterministic, and discrete/stochastic. This versatility makes the hybrid particlemesh paradigm a prime target for a generic parallel HPC DSL for scientific computing. Prior work has shown the power of parallelization middleware libraries like PPM, and embedded DSLs like PPML. Over the past 10 years, they have reduced code development times for parallel scientific simulations from years to hours, and enabled unprecedented scalability 3 4 REFERENCES on large HPC machines [5]. The envisioned Next-PPML will address current shortcomings in code generation, static and dynamic optimization, and semantic error checking and reporting. It is co-developed with the next generation of the PPM library in C++ using a semi-declarative language design. References [1] Martin Sandve Alnæs et al. “Unified Form Language: A domain-specific language for weak formulations of partial differential equations.” In: CoRR abs/1211.4047 (2012). [2] Omar Awile, Ömer Demirel, and Ivo F. Sbalzarini. “Toward an Object-Oriented Core of the PPM Library.” In: Proc. ICNAAM, Numerical Analysis and Applied Mathematics, International Conference. AIP, 2010, pp. 1313–1316. [3] Omar Awile et al. “A domainspecific programming language for particle simulations on distributed-memory parallel computers.” In: Proceedings of the 3rd International Conference on Particle-based Methods. 2013. [4] Martin Bravenboer et al. “Stratego/XT 0.17. A Language and Toolset for Program Transformation.” In: Science of Computer Programming 72.1-2 (2008): Second Issue of Experimental Software and Toolkits (EST), pp. 52–70. issn: 0167-6423. [5] Philippe Chatelain et al. “Billion Vortex Particle Direct Numerical Simulations of Aircraft Wakes.” In: Comput. Method. Appl. Mech. Engrg. 197 (2008), pp. 1296–1304. [6] James R. Cordy. “The TXL Source Transformation Language.” In: Science of Computer Programming 61.3 (2006): Special Issue on The Fourth Workshop on Language Descriptions, Tools, and Applications (LDTA ’04), pp. 190–210. issn: 0167-6423. [7] Zachary DeVito et al. “Liszt: a domain specific language for building portable meshbased PDE solvers.” In: Proceedings of 2011 International Conference for High Performance Computing, Networking, Storage and Analysis. ACM. 2011, p. 9. [8] Torbjörn Ekman and Görel Hedin. “The JastAdd System—Modular Extensible Compiler Construction.” In: Science of Computer Programming 69.1-3 (2007): Special Issue on Experimental Software and Toolkits, pp. 14–26. issn: 0167-6423. [9] Florian Heidenreich et al. “Model-Based Language Engineering with EMFText.” In: GTTSE IV. Vol. 7680. LNCS. Springer, 2013, pp. 322–345. isbn: 978-3-642-35991-0. [10] Chris Lattner. “LLVM and Clang: Next generation compiler technology.” The BSD Conference. 2008. [11] Leon Moonen. “Generating Robust Parsers Using Island Grammars.” In: Proceedings of the Eighth Working Conference on Reverse Engineering 2001. Los Alamitos, CA, USA: IEEE Computer Society, 2001, pp. 13–22. isbn: 0-7695-1303-4. [12] I. F. Sbalzarini. “Abstractions and middleware for petascale computing and beyond.” In: Intl. J. Distr. Systems & Technol. 1(2) (2010), pp. 40–56. [13] I.F. Sbalzarini et al. “PPM – A highly efficient parallel particle–mesh library for the simulation of continuum systems.” In: Journal of Computational Physics 215.2 (2006), pp. 566–588. issn: 00219991. [14] Birte Schrader, Sylvain Reboux, and Ivo F. Sbalzarini. “Discretization Correction of General Integral PSE Operators in Particle Methods.” In: J. Comput. Phys. 229 (2010), pp. 4159–4182. [15] Todd L. Veldhuizen. “Blitz++: The Library that Thinks it is a Compiler.” In: Advances in Software Tools for Scientific Computing. Ed. by Hans Petter Langtangen, Are Magnus Bruaset, and Ewald Quak. Lecture Notes in Computational Science and Engineering 10. Berlin/Heidelberg: Springer, 2000, pp. 57–87. isbn: 978-3-642-57172-5. DSLs for Graph Algorithms and Graph Pattern Matching Proposal for DSLDI 2015 - submitted 8 April 2015 Oracle Labs Oskar van Rest Sungpack Hong Hassan Chafi While SQL and procedural languages like PL/SQL have proven very successful for relational-data-based applications, the increasing importance of graph-data-based applications is fueling the need for graph processing DSLs. On the one hand is the need for a procedural-like language that allows you to implement graph algorithms, like Dijkstra’s shortest path algorithm and Brandes’ Betweenness Centrality algorithm, while on the other hand is the need for a declarative graph pattern-matching DSL, much like SQL for graphs. We believe that our DSLs Green-Marl and GMQL are tailored for these two types of graph workloads and we aim at making the languages standards in the field of graph processing. Green-Marl is a procedural DSL for implementing graph algorithms for use cases such as product recommendation, influencer identification and community detection. The language allows you to intuitively define a wide set of graph algorithms by providing 1) graph-specific primitives like nodes and edges, 2) built-in graph traversals like BFS and DFS, and 3) built-in iterations over neighbors and incoming neighbors of nodes in the graph. Furthermore, Green-Marl algorithms can be automatically translated into parallel implementations in C++, Java or other general purpose languages. Thus, Green-Marl users can intuitively define their graph algorithms using high-level graph constructs, and then run their algorithms efficiently on large graphs. Our other language, GMQL, is a declarative graph pattern-matching query language that borrows syntax from Neo4j’s Cypher and from the SPARQL query language. It is like SQL for graphs, but instead allows you to query using concepts like nodes, edges and paths, instead of tables, rows and columns. A graph pattern can be defined in the form of a set of nodes that are connected via edges or arbitrary-length paths together with a set of constraints on (properties) of the nodes, edges and paths. More complicated patterns that are typical for query languages, such as negation and optional matching, are also supported. The execution of a GMQL query comes down to finding all the instances of the specified pattern inside the graph. Again, execution can be done in parallel to support the efficient processing of large graphs. The Green-Marl and GMQL compilers that we created, target our efficient, parallel, and in-memory graph analytic framework PGX. PGX supports loading graphs from various popular flat file graph formats and can also load graphs from an Oracle database. Graphs are efficiently stored in memory using the Compressed Sparse Row (CSR) format. This format allows for huge graphs to fit into the memory of a single machine, in such a way that they can be processed efficiently. Our framework is also very portable: The Green-Marl and GMQL compilers target both our Java-based and C++-based PGX backbends. Furthermore, we are working on a distributed backend that allows for the processing of even bigger graphs that do not fit into the memory of a single machine. In such distributed mode, graphs are partitioned across multiple machines and data is exchanged between machines using high-speed Infiniband or 10G-E. So far, we have seen great performance improvements with PGX, when comparing it to other graph frameworks: Green-Marl algorithms are processed one to two orders of magnitude faster than corresponding implementations with the popular machine learning framework GraphLab. Furthermore, GMQL queries are processed two to four orders of magnitude faster than corresponding Cypher queries with Neo4j. Because our PGX framework can process large graphs very efficiently, we decided to also create support for the popular RDF graph data model. This means we import RDF graphs into PGX and query them using either GMQL or the standard RDF query language SPARQL. In order to import RDF graphs, we created a translation from RDF graphs into PGX’ property graphs. Furthermore, in order to query using SPARQL, we have created a translation from SPARQL to GMQL. This translation currently supports a subset of W3C’s SPARQL 1.1. The Green-Marl, GMQL and SPARQL compilers were implemented using the Spoofax language workbench. Spoofax provides high-level DSLs for specifying grammars, name binding, type systems and transformations. By using these DSLs, we can keep our code base small and maintainable, while we obtain much compiler functionality, such Eclipse IDE integration, from Spoofax for free. Our Spoofax-based SPARQL implementation initially functioned merely as a building block for the SPARQLto-GMQL translation. However, the Eclipse editor that we obtained from Spoofax has become a product on its own and is useful for anyone who wants to write SPARQL queries. The editor has full support for W3C’s SPARQL 1.1 and provides editor features like formatting, code completion, syntax checking, namebased checks for variables and prefixes, and editor navigation from name uses to their definitions. Many of the features came with little implementation effort. For example, our SPARQL grammar definition in Spoofax’ grammar definition formalism SDF3, gave us a parser, a formatter, syntax-checks and error recovery rules, while our SPARQL name-binding definition in Spoofax’ name binding language NaBL gave us name-based code completion, name checks and editor navigation. We were even able to encode the more complicated name-binding rules needed for SPARQL constructs like NOT EXISTS, MINUS and for Subqueries in NaBL, in very few lines of code. Finally, we also allow our Green-Marl, GMQL and SPARQL compilers to be linked against a particular graph such that we can perform additional compile-time error checking. For example, our GMQL compiler is able to warn a user when they have misspelled a property name, based on the node and edge properties that are available in a particular graph. We also provide such kinds of checks when querying schema-less RDF graphs, by extracting schema information from an RDF graphs when it is loaded into PGX. In our Eclipse editors, such error checking even happens in real-time. DSLs of Mathematics, Theorems and Translations Cezar Ionescu∗ Patrik Jansson∗ In this talk, we present some of the ideas behind the course on DSLs of Mathematics (DSLM), currently in preparation in Chalmers. We view mathematics as a rich source of examples of DSLs. For example, the language of group theory, or the language of probability theory, embedded in that of measure theory. The idea that the various branches of mathematics are in fact DSLs embedded in the “general purpose language” of set theory was (even if not expressed in these words) the driving idea of the Bourbaki project, which exerted an enormous influence on present day mathematics. In DSLM, we consequently develop this point of view, aiming to show computer science students that they can use the tools from software engineering and functional programming in order to deal with the classical continuous mathematics they encounter later in their studies. In this talk, we’ll start with the simple example of the standard development of a calculus of derivatives. This can be seen as a DSL whose semantics are given in terms of limits of real sequences. We can try to give alternative semantics to this language, in terms of complex numbers. This leads to the notion of holomorphic function, and to an essentially different calculus than in the real case. Our second example is that of extending the language of polynomials to power series. This DSL can also be interpreted in various domains: real numbers, complex numbers, or intervals. In the case of complex numbers, a fundamental theorem creates a bridge between the DSL of derivatives and that of power series, through the identity of holomorphic and (regular) analytic functions. This leads to the discussion of translation between DSLs, an aspect which is fundamental in mathematics, but has been somewhat neglected by computer science. Thus, we believe that a closer examination of the DSLs of mathematics can also be relevant for practical software engineering. ∗ Chalmers University of Technology Check Syntax: An Out-of-the-Box Tool for Macro-Based DSLs Spencer Florence Northwestern University Ryan Culpepper Northeastern University Abstract Racket supports DSL construction through an open compiler, where the compiler is made open through its macro system. Programmers define new syntactic constructs by macro-expansion to existing constructs, using the Racket module system to hide the originals and rename the new ones as needed. Taken together, these facilities permit the definition of new languages, even enabling new languages to give new semantics to familiar syntax. In this world, all programs are compiled to a well-known intermediate language, and tools can operate on that structure to compute information about programs—including programs written in a DSL that the tool knows nothing about. Crucially, binding information and original source locations are available in the intermediate language. This information allows tools to provide keybindings to hop between bound and binding occurrences of identifiers and rename them. Since Racket’s documentation system is based on binding, tools can also conveniently access API documentation. 1. Building a Macro-based Language in Racket Programming tools typically support multiple languages by compiling all programs into a shared intermediate language. In Racket, the representation of the intermediate language is the same as for macro transformations: an enriched form of S-expressions that embeds source-location and binding information. This representation offers an especially convenient way to make new languages via macros, where the new languages inherit tools that operate on macro-expanded programs. For example, to build a DSL that uses call-by-need evaluation instead of Racket’s usual call-by-value convention, we start with a wait construct for delaying the evaluation of an expression. The wait form is defined using define-syntax-rule, which directs the compiler to replace expressions matching one subexpression with another. (define-syntax-rule (wait e) (Wait #t (λ () e))) The definition of wait specifies that the body e in any (wait e) is wrapped in a thunk (thus delaying the evaluation of e) and the thunk is packaged into a Wait structure: Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]. , . Copyright © ACM [to be supplied]. . . $15.00. http://dx.doi.org/10.1145/ Matthew Flatt Robert Bruce Findler University of Utah Northwestern University (struct Wait (waiting? TorV) #:mutable) This struct declaration indicates that the Wait structure has two mutable fields, waiting? and TorV, and it defines supporting functions: Wait-waiting?, which accepts a Wait structure and returns the value in the first field; set-Wait-waiting?!, which accepts a Wait structure and a value and a new waiting? field value and mutates the structure; Wait-TorV, which returns the value of a Wait structure’s second field; and set-Wait-TorV!, which mutates the value of a Wait structure’s second field. To force a delayed evaluation, we define an act function. It operates on a Wait structure, returning the result of the thunk encapsulated in the second field and caching the thunk’s result. (define (act w) (cond [(Wait? w) (when (Wait-waiting? w) (set-Wait-TorV! w ((Wait-TorV w))) (set-Wait-waiting?! w #f)) (act (Wait-TorV w))] [else w])) Next, we define macros that compile the various constructs of our new language into constructs that already exist in Racket. In this case, we’ll use the wait functionality and exploit Racket’s λ, a conditional form, and some simple arithmetic operations, lifting them into our lazy language. The following 8 lines provide the rest of a lazy language implementation, using a mixture of function definitions and macros. (define-syntax-rule (app f x ...) ((act f) (wait x) ...)) (define (multiply a b) (* (act a) (act b))) (define (subtract a b) (- (act a) (act b))) (define-syntax-rule (if0 e1 e2 e3) (if (= (act e1) 0) e2 e3)) Using these constructs directly would be awkward. They do not have the right names, and it is easy to accidentally step outside of the language and use, for example, Racket’s * operation instead of the multiply. To avoid those problems, we put the definitions into a module, we use provide’s rename-on-export capability to provide those operations with their expected names, and we hide everything else (by simply not providing anything else). The only subtle point here is that, when the Racket macro expander sees an open parenthesis with no macro following it, it inserts a reference to the #%app macro to make function application explicit, so we must export app as #%app to cooperate with this feature of macro expansion. Then, we can install the language as a Racket package, so that if the first line of a file is #lang mini-lazy, the rest of the file sees our bindings. For example, running the following program (using the call-by-name Y combinator) produces 3628800. #lang mini-lazy (((λ (f) ((λ (x) (f (x x))) (λ (x) (f (x x))))) (λ (fac) (λ (n) (if0 n 1 (* n (fac (- n 1))))))) 10) Even though this language has a radically different order of evaluation from Racket, it still compiles into Racket and, even better, scope is preserved by this compilation. 2. Check Syntax Check Syntax runs continuously as part of the DrRacket IDE. Each time the user edits a program, Check Syntax takes the content as a string, parses it using the current language’s parser, and hands it off to the macro system, resulting in a program where the macros have all been expanded away. In this state, programs are in a well-known language that contains functions, conditionals, variable binding, variable reference, and other core forms of Racket.1 Check Syntax traverses a program’s expansion, searching for bindings and references. The expanded form of a program is an enriched form of S-expressions known as syntax objects. A syntax object includes information about whether or not a form appeared in the original program and its location in the source, and identifiers extracted from an expanded program can be compared to determine whether they refer to the same binding. Check Syntax collects this information into pairs of source locations, which DrRacket uses to draw binding information in the editor window. For the example at the end of the previous section, these are the set of arrows that Check Syntax collects for the lexical variables:2 #lang mini-lazy (((λ (f) ((λ (x) (f (x x))) (λ (x) (f (x x))))) (λ (fac) (λ (n) (if0 n 1 (* n (fac (- n 1))))))) 10) Check Syntax uses this information in several ways. First, when the mouse is over a variable occurrence, Check Syntax draws arrows to the other occurrences. Second, Check Syntax provides keybindings to jump between the occurrences of a variable in a file. Finally, Check Syntax offers a bound-variable rename facility. The user selects a variable and supplies a new name, and Check Syntax follows the arrows to rename the variables. The technique of traversing expanded programs can support a myriad of different languages, even parenthesis-challenged languages like Datalog: #lang datalog ancestor(A, B) :parent(A, B). ancestor(A, B) :parent(A, C), ancestor(C, B). 1 http://docs.racket-lang.org/reference/ syntax-model.html#%28part._fully-expanded%29 2 Naturally, the figures in this paper are generated by running Check Syntax on the shown program text as the paper is typeset. and Algol 60: #lang algol60 begin integer procedure SIGMA(x, i, n); value n; integer x, i, n; begin integer sum; sum:=0; for i:=1 step 1 until n do sum:=sum+x; SIGMA:=sum; end; integer q; printnln(SIGMA(q*2-1, q, 7)); end 3. Scaling Up For many constructs, the process described in the previous section is enough to reconstruct the binding structure of a program. Other constructs appear to the programmer as binding forms and variable references, but they are compiled into data-structure accesses. For example, one of the modularity constructs in Racket, unit, turns variable definitions into the creation of a pointer and variable references into pointer dereferences. Similarly, the pattern-matching part of define-syntax-rule turns variable references into function calls that destructure syntax objects.3 To handle such forms, Check Syntax needs a little cooperation from the implementing macro. When producing an expanded form, a macro can add properties to the result syntax objects. These properties have no effect on how the code runs, but they are used by Check Syntax to draw additional arrows. More precisely, the macro can add a property indicating that some syntax object (i.e., a piece of the input to the transformation) was a conceptually a binding or a reference; Check Syntax uses those syntax objects for renaming and navigation, just like the program’s other syntax objects. Check Syntax also recognizes properties for tool-tip information. A macro can put an arbitrary string as a property on the result of a macro, and Check Syntax displays the string in a tooltip. For example, Typed Racket adds properties so that Check Syntax displays the types of expressions. In Racket, the build process for documentation creates a database that maps module names and exports to the file containing the documentation and to a function’s contract or a syntactic form’s grammar. Check Syntax can examine a variable in the fully expanded program and discover which module exported the variable. It uses that information to consult the database and can render the contract/grammar directly in the DrRacket window, including a link to the full documentation. In the following Typed Racket program, highlighting shows the locations where Check Syntax finds documentation in the database: #lang typed/racket (: fib (-> Integer Integer)) (define (fib n) (cond [(= n 0) 0] [(= n 1) 1] [else (+ (fib (- n 1)) (fib (- n 2)))])) Acknowledgments. Thanks to Matthias Felleisen for comments on earlier drafts and feedback on Check Syntax over the years. 3 The define-syntax-rule form is itself is a macro that expands into the primitive macro-building form with a compile-time syntax transformer that is synthesized from the specified pattern and template. Dynamic Compilation of DSLs Vojin Jovanovic and Martin Odersky EPFL, Switzerland {firstname}.{lastname}@epfl.ch Domain-specific language (DSL) compilers use domain knowledge to perform domain-specific optimizations that can yield several orders of magnitude speedups [4]. These optimizations, however, often require knowledge of values known only at program runtime. For example, in matrix-chain multiplication, knowing matrix sizes allows choosing the optimal multiplication order [2, Ch. 15.2] and in relational algebra knowing relation sizes is necessary for choosing the right join order [6]. Consider the example of matrix-chain multiplication: v a l (m1, m2, m3) = ... // matrices of unknown size m1 * m2 * m3 In this program, without knowing the matrix sizes, the DSL compiler can not determine the optimal order of multiplications. There are two possible orders (m1*m2)*m3 with an estimated cost c1 and m1*(m2*m3) with an estimated cost c2 where: c1 = m1.rows*m1.columns*m2.columns+m1.rows*m2.columns*m3.rows c2 = m2.rows*m2.columns*m3.columns+m1.rows*m2.rows*m3.columns Ideally we would change the multiplication order at runtime only when the condition c1 > c2 changes. For this task dynamic compilation [1] seems ideal. Yet, dynamic compilation systems—such as DyC [3] and JIT compilers— have shortcomings. They use runtime information primarily for specialization. In these systems profiling tracks stability of values in the user program. Then, recompilation guards and code caches are based on checking equality of current values and previously stable values. To perform domain-specific optimizations we must check stability, introduce guards, and code caches, based on the computation specified in the DSL optimizer—outside the user program. Ideally, the DSL optimizer should be agnostic of the fact that input values are collected at runtime. In the example stability is only required for the condition c1 > c2, while the values c1 and c2 themselves are allowed to be unstable. Finally, recompilation guards and code caches would recompile and reclaim code based on the same condition. An exception to existing dynamic compilation systems are Truffle [7] and Lancet [5]. They allow creation of user defined recompilation guards. However, with Truffle, language designers do not have the full view of the program, and thus, can not perform global optimizations (e.g., matrix-chain multiplication optimization). Further, recompilation guards must be manually introduced and the code in the DSL optimizer must be modified to specially handle decisions based on runtime values. 2 We propose a dynamic compilation system aimed for domain specific languages where: – DSL authors declaratively, at the definition site, state the values that are of interest for dynamic compilation (e.g., array and matrix sizes, vector and matrix sparsity). These values can regularly be used for making compilation decisions throughout the DSL compilation pipeline. – The instrumented DSL compiler transparently reifies all computations on the runtime values that will affect compilation decisions. In our example, the compiler reifies and stores all computations on runtime values in the unmodified dynamic programming algorithm [2] for determining the optimal multiplication order (i.e., c1 > c2). – Recompilation guards are introduced automatically based on the stored DSL compilation process. In the example the recompilation guard would be c1 > c2. – Code caches are automatically managed and addressed with outcomes of the DSL compilation decisions instead of stable values from user programs. In the example the code cache would have two entries addressed with a single boolean value computed with c1 > c2. The goal of this talk is to foster discussion on the new approach to dynamic compilation with focus on different policies for automatic introduction of recompilation guards: i) heuristic, ii) DSL author specified, and iii) based on domain knowledge. References 1. Joel Auslander, Matthai Philipose, Craig Chambers, Susan J Eggers, and Brian N Bershad. Fast, effective dynamic compilation. In International Conference on Programming Language Design and Implementation (PLDI), 1996. 2. Thomas H Cormen, Charles E Leiserson, Ronald L Rivest, Clifford Stein, et al. Introduction to algorithms, volume 2. MIT press Cambridge, 2001. 3. Brian Grant, Markus Mock, Matthai Philipose, Craig Chambers, and Susan J Eggers. DyC: an expressive annotation-directed dynamic compiler for C. Theoretical Computer Science, 248(1), 2000. 4. Tiark Rompf, Arvind K. Sujeeth, Nada Amin, Kevin J. Brown, Vojin Jovanović, HyoukJoong Lee, Manohar Jonnalagedda, Kunle Olukotun, and Martin Odersky. Optimizing data structures in high-level programs: New directions for extensible compilers based on staging. In Symposium on Principles of Programming Languages (POPL), 2013. 5. Tiark Rompf, Arvind K. Sujeeth, Kevin J. Brown, HyoukJoong Lee, Hassan Chafi, Kunle Olukotun, and Martin Odersky. Project Lancet: Surgical precision JIT compilers. In International Conference on Programming Language Design and Implementation (PLDI), 2013. 6. P Griffiths Selinger, Morton M Astrahan, Donald D Chamberlin, Raymond A Lorie, and Thomas G Price. Access path selection in a relational database management system. In International conference on Management of data (SIGMOD), pages 23– 34, 1979. 7. Thomas Würthinger, Christian Wimmer, Andreas Wöß, Lukas Stadler, Gilles Duboscq, Christian Humer, Gregor Richards, Doug Simon, and Mario Wolczko. One VM to rule them all. In Symposium on New Ideas, New Paradigms, and Reflections on Programming & Software (Onward!), 2013. A practical theory of language-integrated query —and— Everything old is new again Philip Wadler The University of Edinburgh [email protected] 15 April 2015 The proposed talk would consist of summaries of two recent pieces of work, both concerned with applying quotation and the subformula property to domainspecific languages. Both will also be the subject of an invited talk by the author at Curry On. A practical theory of language-integrated query James Cheney, Sam Lindley, Philip Wadler submitted to ICFP 2015 http://homepages.inf.ed.ac.uk/wadler/topics/recent.html#essence-of-linq Language-integrated query is receiving renewed attention, in part because of its support through Microsoft’s LINQ framework. We present a theory of language-integrated query based on quotation and normalisation of quoted terms. Our technique supports abstraction over values and predicates, composition of queries, dynamic generation of queries, and queries with nested intermediate data. Higher-order features prove useful even for constructing first-order queries. We prove that normalisation always succeeds in translating any query of flat relation type to SQL. We present experimental results confirming our technique works, even in situations where Microsoft’s LINQ framework either fails to produce an SQL query or, in one case, produces an avalanche of SQL queries. Everything old is new again: Quoted Domain Specific Languages. Shayan Najd, Sam Lindley, Josef Svenningsson, Philip Wadler ICFP 2013 http://homepages.inf.ed.ac.uk/wadler/topics/recent.html#qdsl We describe a new approach to domain specific languages (DSLs), called Quoted DSLs (QDSLs), that resurrects two old ideas: quotation, from McCarthy’s Lisp of 1960, and the subformula property, from Gentzen’s natural deduction of 1935. Quoted terms allow the DSL to share the syntax and type system of the host language. Normalising quoted terms ensures the subformula property, which 1 guarantees that one can use higher-order types in the source while guaranteeing first-order types in the target, and enables using types to guide fusion. We test our ideas by re-implementing Feldspar, which was originally implemented as an Embedded DSL (EDSL), as a QDSL; and we compare the QDSL and EDSL variants. 2 28 Panel Discussion Figure 1: Discussion Panel at DSLDI’15. From left to right: Matthew Flatt, Jonathan Aldrich, Andrzej Wąsowski Laurence Tratt and Sebastian Erdweg Position Statements of the Panelists Jonathan Aldrich Position: DSL frameworks should guarantee the absence of syntactic conflict, and support unanticipated interoperation between DSLs in the code and during typechecking, execution, and debugging, without losing aspects that are special to each DSL. Rationale: Programming today is all about composition; developers gain enormous leverage from libraries, and expect them to work together even if they were designed separately. Conflicts that prevent compilation when you merely import two different DSLs are completely unacceptable in this world. Furthermore, most of the value from DSLs comes when they work like ”real” languages, with checking, execution, and debugging facilities that are natural; an 80% solution is not going to convince most real-world developers to adopt a DSL. In a composition-based world, therefore, all these facilities must work even when multiple DSLs are used together. Concrete Illustration: Here’s a multi-part challenge problem for language composition in DSL frameworks: • (A) Have different developers independently design and build DSLs for state machines and structured synchronous programming 29 30 • (B) The DSL framework should guarantee that these DSLs can be used together without having to resolve any syntactic conflicts • (C) Write a state machine and a structured synchronous program that drives its state transitions, ideally with no visible role played by the DSL framework. • (D) Statically verify that the structured synchronous program does not misuse the state machine (e.g. by generating transitions that aren’t appropriate for the machine’s state) • (E) With respect to task D, report any errors in a way that is consistent with both the structured synchronous program and the state machine (rather than some translation of each). The two developers in A are not allowed to communicate or to anticipate tasks B-E. Tasks B–E must be done without changing the DSLs developed in A. Sebastian Erdweg The same language features reoccur in the design of many DSLs: operations on primitive data, operations on structured data, conditionals and backtracking, error handling, and many more. Yet, we have no principled way of composing basic language blocks into working DSLs and we have no way of detecting and eliminating interactions between language features. This is one of the big open challenges in the area of DSLs. Matthew Flatt How can language-composition tools mediate extensions that depend on (or, alternatively, adapt to) different semantics of shared constructs, such as function application? For example, what happens when a form whose implementation depends on eager evaluation is used in an otherwise lazy context? Or what happens when a from that implies a function application is used in a language where function application is meant to be syntactically restricted to first-order functions? Racket’s hygienic-macro approach reflects core constructs like function application through macros, such as #%app, whose use is typically implicit. A macro by default adopts its definitionsite implementation of such macros, which is usually the right approach. That means, however, that a macro that uses eager function application has questionable behavior in a lazy use context. Similarly, macros tend not to respect the function-application constraints of a context like Beginner Student Language. A macro can adapt to a use-site notion of #%app by non-hygienically referencing #%app from the use context, but that approach is relatively tedious not not commonly followed. Laurence Tratt Language composition challenge: Integrating existing languages into a language composition framework. Controversial statement: People have not shown themselves hugely interested in the forms of language composition we’ve given them thus far. Andrzej Wąsowski • I believe that language composition is not a language problem, but a software engineering problem. • If you are lucky then the DSLs are composed by framework designers, which are usually means very good programmers (or at least above-average). • More often languages are composed by framework *users*, who design systems (often average programmers or worse). You rarely find serious project using less than 5 languages, and 20 is a norm. Many of them DSLs. • The challenge is how to allow language composition (or integration) for non-language designers, but for system designers (the language users), so that they still get static checking, meaningful messages, across language testing, etc. 31 Summary of the Discussion • The practical value of a DSL does not grow linearly with the quality of the implementation. You need a to have really polished framework/ecosystem to deliver value. (80/20 or 20/80 (todo)). • The software engineering perspective on language composition is different from the programming language perspective. The software engineering perspective emphasizes language interopability, cross-language IDE support, and DSLs that are not necessarily like programming languages (e.g., config files, build files, deployment descriptors, data mapping files, etc.). • Is using different languages in the same file an essential aspect of language composition? Is language interopability an instance of language composition, and what are the consequences for performance? • Translating all language features down to a single virtual machine for execution, is possible, but there can be costs in terms of performance. Example: the JVM is a state-of-the-art virtual machine, but is not suitable for executing Prolog. • Modular language components seems to be an extremely hard to achieve goal, but it is necessary at the same time. Without it, the number of feature interactions quickly explodes. • There is a need for language interfaces: what features, services or constructs are exported from a language component? • Integrating syntax and semantics are only two language aspects that need to be composed for a realistic programming experience of a composed language. Examples include: name binding, type checking, IDE features, etc. • Cross language name analysis seems feasible and would solve real problems of programmers, now. A successful example is Jetbrains’ IntelliJ which integrates all references in Web framework configuration files with Java.
6cs.PL
Accelerated Methods for Deep Reinforcement Learning Adam Stooke 1 Pieter Abbeel 1 arXiv:1803.02811v1 [cs.LG] 7 Mar 2018 Abstract Deep reinforcement learning (RL) has achieved many recent successes, yet experiment turnaround time remains a key bottleneck in research and in practice. We investigate how to optimize existing deep RL algorithms for modern computers, specifically for a combination of CPUs and GPUs. We confirm that both policy gradient and Q-value learning algorithms can be adapted to learn using many parallel simulator instances. We further find it possible to train using batch sizes considerably larger than are standard, without negatively affecting sample complexity or final performance. We leverage these facts to build a unified framework for parallelization that dramatically hastens experiments in both classes of algorithm. All neural network computations use GPUs, accelerating both data collection and training. Our results include using an entire NVIDIA DGX-1 to learn successful strategies in Atari games in single-digit minutes, using both synchronous and asynchronous algorithms. 1. Introduction Research in deep reinforcement learning (RL) has relied heavily on empirical evaluation, making experiment turnaround time a key limiting factor. Despite this critical bottleneck, many reference implementations do not fulfill the potential of modern computers for throughput, unlike in supervised learning (see e.g. (Goyal et al., 2017)). In this work, we study how to adapt deep RL algorithms–without changing their underlying formulations–to better leverage multiple CPUs and GPUs. The result is a significant gain in efficiency and scale of hardware utilization and hence in learning speed. Today’s leading deep RL algorithms have roughly clustered into two families: (i) Policy gradient methods, which rely on on-policy samples for training. A representative example is Asynchronous Advantage Actor-Critic (A3C) (Mnih et al., 1 Department of Computer Science, University of California, Berkeley, California, USA. Correspondence to: Adam Stooke <[email protected]>. 2016), in which sampler-learner processes train a centralized neural network in parallel, using only a CPU. (ii) Q-value learning methods, which permit off-policy training. A representative example is Deep Q-Networks (DQN) (Mnih et al., 2015), in which a single simulator feeds a replay buffer of transitions, and this buffer is randomly sampled for training (with a GPU). Traditionally, implementations of policy gradient methods and Q-learning methods have differed from each other; in this paper we unify them under the same framework for scaling. Modern computers host many CPU cores and multiple GPUs on one motherboard, and we target this hardware mix. In deep RL the neural net participates both in learning and in data collection (to execute the agent’s current policy). We use GPUs for hardware acceleration of all neural network computations; to do so efficiently requires batched processing. During data collection, we run many simulator instances and batch calls to the policy or Q-function for inference. During learning, we use large batch sizes and/or asynchronous methods to expedite computation. Our contribution is a framework for parallelized deep RL including novel techniques for GPU acceleration. Within this framework, we demonstrate multi-GPU versions of the following algorithms: Advantage Actor-Critic (Mnih et al., 2016), Proximal Policy Optimization (PPO) (Schulman et al., 2017), DQN (Mnih et al., 2015), Categorical DQN (Bellemare et al., 2017), and Rainbow (Hessel et al., 2017). Our target hardware is an NVIDIA DGX-1, which contains 40 CPU cores and 8 P100 GPUs. To provide calibrated results, we test our implementations in the heavily benchmarked Atari-2600 domain via the Arcade Learning Environment (ALE) (Bellemare et al., 2013). We found that highly parallel sampling using batched inferences can accelerate experiment turn-around time of all algorithms without hindering training. We further found that neural networks can learn using batch sizes considerably larger than are standard, without harming sample complexity or final game score, and this dramatically speeds up learning. The primary benefit of our implementation is improved execution speed. Our policy gradient algorithms can leverage the entire DGX-1 to learn successful game strategies in under 10 minutes, rather than hours. We reduced the duration Accelerated Methods for Deep Reinforcement Learning of some standard Q-value-learning runs from 10 days to under 2 hours. We believe that these results promise to accelerate research in deep RL, and we suggest directions for further investigation and development. following the policy after first using action at to advance. With these definitions in hand, we briefly review the deep RL algorithms used in our experiments. 3.1. Policy Gradient Methods 2. Related Work Efforts to parallelize and accelerate deep RL algorithms have been underway for several years. Gorila (Nair et al., 2015) parallelized DQN using distributed computing. It achieved significant although sub-linear speedups using hundreds of computing units as samplers or learners, with central parameter servers for managing parameter updates. This effort suffered in sample complexity relative to singlethreaded DQN. More recently, (Horgan et al., 2018) showed that a distributed, prioritized replay buffer can support faster learning while using hundreds of CPU cores for simulation and a single GPU for training. The same work used increased batch sizes, with a brief study of the effect of learning rate. The policy gradient method A3C is itself a parallelized algorithm. In GA3C (Babaeizadeh et al., 2016), a speedup over CPU-only A3C was achieved by using a GPU. It was employed asynchronously, with “predictor” and “trainer” threads queuing observations and rewards for batched inferences and training updates. GA3C introduced a “policy lag” between generation and consumption of training data, worsening sample complexity. In independent work simultaneous to ours, (Espeholt et al., 2018) extended policy gradient methods to a distributed setting, enabling an alternative approach to multi-GPU training called IMPALA. They introduced a more heavily modified algorithm, V-trace, to mitigate policy lag–which we avoid–and did not employ GPU inference. In PAAC (Clemente et al., 2017), the authors explored the use of many simulators and increased batch sizes learning rates in (single-GPU) batched A2C– ideas central to our studies. Our contributions to actor-critic methods exceed this work in a number of ways, chiefly: improved sampling organization, tremendously enhanced scale and speed using multiple GPUs, and inclusion of asynchronous optimization. 3. RL Algorithm Background In reinforcement learning, an agent interacts with an environment and uses the experience to optimize a decision-making policy. In a standard RL formulation, the agent to maxPaims ∞ imize the sum of discounted rewards, Rt = k=0 γ k rt+k , in expectation, i.e. E [Rt ]. γ is the discount factor (e.g. 0.99), and rt is the reward received at time t. The value of a state, V (st ) = E [Rt |st ], is defined as the expected discounted return from that state under a given policy, π. The Q-value, Q(st , at ) = E [Rt |st , at ] is the same but for In policy gradient methods, the policy is directly parameterized in the form π(a|s; θ), where π is a probability distribution over actions a when observing state s, as parameterized by θ, a neural network. The agent exercises the policy in the environment, recording experiences. Periodically, it uses the samples to update θ by estimating the gradient ∇θ E [Rt ]. Typically, the agent then discards these samples and repeats, optimizing the policy iteratively. Advantage Actor-Critic: In advantage actorcritic, the policy gradient is computed as E [∇θ log π(at |st ; θ)(Rt − V (st ))]. The agent estimates V (st ) from the data, for instance using a separate output from the same network used for π. (Rt − Vt ) estimates the advantage: A(s, a) = Q(s, a) − V (s). Rt is computed using the discounted sum of as many future returns as are observed in a given batch, up to rtmax , and is bootstrapped with V (stmax +1 ), appropriately discounted. The estimator V (s; θ) is trained using e.g. a squared-error loss, simultaneously to π. Lastly, an entropy bonus is added to the gradient: ∇θ H(π(·|st ; θ)), to promote exploration and discourage premature convergence. In A3C (Mnih et al., 2016), separate actor-learner threads sample environment steps and update a centralized copy of the parameters asynchronously to each other. In (batched) A2C, which performs similarly to A3C (see, e.g. (Schulman et al., 2017)), separate environment instances are sampled, but the learner is single-threaded. It gathers all data into one minibatch to compute the gradient. Proximal Policy Optimization: Proximal Policy Optimization (PPO) (Schulman et al., 2017) is a closely related algorithm that improves sample complexity by increasing the training use of each sample. It maximizes a “surrogate” objective E [ρt (θ)At ], where ρt (θ) = π(at |st ; θ)/π(at |st ; θold ) is the likelihood ratio of the recorded action between the updated and original policies. We use the clipping-objective version of PPO, which optimizes the expression E [min (ρt (θ)At , clip(ρt (θ), 1 − , 1 + )At )], noting that ρt (θold ) = 1. Unlike A3C, PPO performs multiple parameter updates using (minibatches from) each set of samples; the clipping objective prevents excessive policy updates from destabilizing learning. 3.2. Q-Value-Learning Methods Instead of directly parameterizing a policy, Q-value learning methods estimate the Q-function as Q(s, a; θ). The greedy Accelerated Methods for Deep Reinforcement Learning policy selects the (discrete) action maximizing value: a∗ = argmaxa Q(s, a; θ). Exploration can be performed using an -greedy policy, which chooses a uniform random action with probability  and otherwise uses the greedy action. By its off-policy nature, Q-learning permits repeated training use of samples. Deep Q-Networks: Deep Q-Networks (DQN) (Mnih et al., 2015) optimize the Q-value estimator by repeated grah i 2 dient descent on the objective: E (yi − Q(si , ai ; θ)) , where yi is the data-estimated Q-value given by yi = ri + γ maxa Q(si+1 , a; θ− ) (although in practice the Huber loss is used). DQN gains stability by 1) using a separate “target” network θ− , periodically copied from θ, and 2) training from a replay buffer, to which it continually adds new experiences. Several enhancements to DQN have improved performance. Categorical DQN: Categorical DQN (Bellemare et al., 2017) discretizes the possible Q-values into a fixed range and number of “atoms” and learns a distribution for each Q(s, a; θ), so as to represent stochastic features of the environment. The squared-error loss function is replaced by the Kullback-Leibler divergence against a target distribution. The target is constructed by contracting the “future” atoms according to γ and shifting them by Rt . Action-selection is still performed greedily according to expected value over the distribution. -Rainbow: Recently, the use of distributional learning was combined with five other enhancements to DQN under a single name: Rainbow (Hessel et al., 2017). Without describing them here, the enhancements include: 1) DoubleDQN (Van Hasselt et al., 2016), 2) Dueling Networks (Wang et al., 2016), 3) Prioritized Replay (Schaul et al., 2016), 4) n-step learning (Peng & Williams, 1994), and 5) NoisyNets (Fortunato et al., 2018). In our experiments, we use the -greedy version of Rainbow, without parameter noise. 4. Parallel, Accelerated RL Framework We consider learning scenarios where the environment is a CPU-based simulator and the policy uses a deep neural network. We describe here a complete set of parallelization techniques that achieve high throughput during both sampling and optimization. It is applicable to many deep RL algorithms, including those outlined above. We treat GPUs homogeneously; each performs the same sampling-learning procedure. This strategy scales straightforwardly to various numbers of GPUs. 4.1. Synchronized Sampling We begin by associating multiple CPU cores with a single GPU. We run multiple simulators in parallel processes on the CPU cores, and these processes perform environment steps in a synchronized fashion. At each step, all individual observations are gathered into a batch for inference, which is called on the GPU once the last observation is submitted. The simulators step again once the actions are returned, and so on, as in (Clemente et al., 2017). System shared memory arrays provide fast communication between the action-server and simulator processes. The number of CPU cores might limit the inference batch size, so we use multiple simulator instances per process. These are stepped sequentially (within each process) and always all together in every inference batch. This arrangement adds the benefit that it mitigates synchronization losses. Variance in simulator stepping time arises from differing simulator states and other random fluctuations. The straggler effect worsens with increased number of parallel processes but diminishes with increased number of sequential simulators. A schematic is shown in Figure 1. Slowdowns caused by long environment resets can be avoided by resetting only during optimization pauses.1 Figure 1. Synchronized sampling schematic, showing multiple simulator processes, each with multiple simulator instances, interacting synchronously with a GPU-based action-server through time (alternating scheme not shown). When running this sampling engine, hardware component utilization reflects the relative load of each side of computation. If simulation and inference loads are balanced, this would cause each component to sit idle half of the time. We avoid this idleness by forming two alternating groups of simulator processes. While one group awaits an inference, the other steps, and the GPU alternates between servicing each group. Alternation keeps utilization high; moreover, it hides the execution time of whichever computation is the quicker of the two. We found it beneficial to fix the CPU assignment of each simulator process. To use multiple GPUs, we simply repeat the template, allocating available CPU cores evenly. We have found it sufficient to reserve one CPU core to run each 1 For example, one may either 1) ignore a simulator in need of reset or 2) immediately swap in a fresh instance held in reserve. Accelerated Methods for Deep Reinforcement Learning GPU. The experiments section contains measurements of sampling speed, which indeed increases with the number of environment instances. 4.2. Synchronous Multi-GPU Optimization In our synchronous algorithms, all GPUs maintain identical parameter values. We leverage the data-parallelism of stochastic gradient estimation and use the well-known update procedure, on every GPU: 1) compute a gradient using locally-collected samples, 2) all-reduce the gradient across GPUs, 3) use the combined gradient to update local parameters. We use the NVIDIA Collective Communication Library for fast communication among GPUs. 4.3. Asynchronous Multi-GPU Optimization In asynchronous optimization, each GPU acts as its own sampler-learner unit and applies updates to a central parameter store held in CPU memory. The training batch size does not aggregate across GPUs, thus avoiding a potential limit to scaling. Use of accelerators compels a choice of where to perform the parameter update. In our experience, applying common update rules to the network is faster on the GPU. Our general update procedure includes three steps: 1) compute the gradient locally and store it on the GPU, 2) pull current central parameters onto the GPU and apply the update rule to them using the pre-computed gradient, 3) write the updated parameters back to the central store. After this sequence, the local GPU parameters are in sync with the central values, and sampling proceeds again. Following (Mnih et al., 2016), we centralize the update rule parameters in addition to the network weights. Rather than add update increments to the central parameters, which requires CPU computation, we overwrite the values. Therefore, we employ a lock around steps (2) and (3) above, preventing other processes from reading or writing parameter values concurrently. Typically, we divide the parameters into a small number of disjoint chunks which are updated separately, each with its own lock (steps 2-3 become a loop over chunks). This balances update call efficiency against lock contention and can provide good performance. When large intermediate updates occur, it can be beneficial to pull the central network weights more frequently (e.g. during sampling and/or before gradient computation). In the surrogate loss of PPO, we use the action probabilities experienced during sampling. 5. Experiments We used the Atari-2600 domain to study the scaling characteristics of highly parallelized RL, addressing the following: 1) How efficient is our synchronized sampling engine, and what speeds can it achieve? 2) Can policy gradient and Qlearning algorithms be adapted to learn using many parallel simulator instances without diminishing learning performance? 3) Can large-batch training and/or asynchronous methods speed up optimization without worsening sample complexity? In all learning experiments, we maintained the original training intensity–meaning average number of training uses of each sampled data point. For A3C, PPO, and DQN+variants, the reference training intensities are 1, 4, and 8, respectively. All learning curves shown here are averages over at least two random seeds. For policy gradient methods, we tracked online scores, averaging over the most recent 100 completed trajectories. For DQN and variants, we paused every 1-million steps to evaluate for up to 125,000 steps, with maximum path length of 27,000 steps, as is standard. The appendices contain learning curves beyond those we highlight here. 5.1. Atari Frame Processing Our frame pre-processing closely resembles that originally described in (Mnih et al., 2015). The sole difference is that we abandon the square frame dimensions in favor of simply downsizing by a factor of 2, which provides crisp images at minimal computational cost. Before downsizing, we crop two rows, making the final image size 104 × 80. This simplifies selection of convolution size, stride, and padding. Otherwise, we kept all standard settings. For Q-learning experiments, we used the 3-convolutional-layer network as in (Mnih et al., 2015) (DQN-Net) or its algorithm-specific variants, and for policy gradients the 2-convolutional-layer feed-forward network of (Mnih et al., 2016) (A3C-Net). The second (and third) convolution layers have padding 1, so the convolution output is always 25 × 19. 5.2. Sampling A series of sampling-only measurements demonstrated that despite the potential for stragglers, the synchronized sampling scheme can achieve good hardware utilization. First, we studied the capacity of a single GPU at serving inferences for multiple environments. Figure 2 shows measurements running a trained A3C-Net policy on a P100 GPU while playing the game B REAKOUT. Aggregate sampling speed, normalized by CPU core count, is plotted as a function of the number of (sequential) Atari simulators running on each core.2 The minimum was 2 simulators per core by the alternating scheme. Different curves represent different numbers of CPU cores running simulations. For reference, we include the sampling speed of a single core 2 Intel Turboboost was disabled for this test only, keeping the clock speed of every core at 2.2 GHz. Accelerated Methods for Deep Reinforcement Learning Table 1. Sampling speeds on the DGX-1 with A3C-Net, by total simulator count, in thousands of samples per second. # S IMS ( PER C ORE ) S YNC A SYNC 64 (2) 128 (4) 256 (8) 512 (16) 29.6 33.0 35.7 35.8 31.9 34.7 36.7 38.4 running without inference–the dashed line for a single process, and the dotted line one process on each of the two Hyperthreads. Running with inferences and with a single core, the sampling speed increased with simulator count until the inference time was completely hidden. Synchronization losses appeared for higher core count. But at as little as 8 environments per core, the GPU supported even 16 CPU cores running at roughly 80% of the inference-free speed. Figure 2. Sampling speed vs number of simulators per core, playing B REAKOUT using 1 GPU. Curves are by number of cores performing simulations. Running multiple simulators per core mitigates synchronization losses and hides NN inference time, resulting in high throughput. Next, we measured the sampling-only speed of the same A3C-Net playing B REAKOUT parallelized across an entire NVIDIA DGX-1. Table 1 shows results for various total simulator counts. In the synchronized setting, a barrier was placed across all GPU processes every five steps (mimicking the optimization in A2C). Otherwise, each GPU and its associated cores ran independently. At simulator counts of 256 (8 per core) and above, our sampling engine achieved greater than 35,000 samples per second. This equates to 500 million emulator frames per hour, possibly the fastest reported Atari sampling rate using a single computer. 5.3. Learning with Many Simulator Instances To leverage the high throughput of parallel sampling, we attempted to adapt existing deep RL algorithms to learn with many simulator instances. The following results show that indeed all algorithms we considered can be adapted without losing performance, and with only minor changes. We experimented with different techniques for each algorithm, which we describe and evaluate here. Interestingly, scaling affects synchronous and asynchronous learning somewhat differently, looking across games. A2C: We experimented with A2C by letting the optimization batch size grow with the number of simulators while keeping the sampling horizon fixed (at 5 steps as in A3C). Correspondingly fewer parameter update steps were made per sample gathered. Unlike in (Clemente et al., 2017), we empirically determined that increasing the learning rate with the square root of the batch size worked best. A gradual decay in efficiency remained. The top panel of Figure 3 shows learning curves vs total sample count for a test set of games, with simulator count ranging from 16 to 512 (batch size 80 to 2,560). We used RMSProp with a base learning rate of 7 × 10−4 (scaled up to 3 × 10−3 here). A3C: An asynchronous adaptation we experimented with used a 16-environment A2C agent as the base samplerlearner unit. Figure 3 shows learning curves vs aggregate sample count for numbers of learners ranging from 1 to 32,3 corresponding to 16 to 512 total simulators. We found no hyperparameter adjustments to be necessary. The resulting learning curves were nearly indistinguishable in most cases, although some did degrade at the largest scales. PPO: The large batch size already used to benchmark PPO (8-simulator x 256-horizon = 2,048) provided a different route to using many simulators. We adapted PPO by decreasing the sampling horizon such that the total batch size remained fixed. Figure 3 shows learning curves vs sample count for simulator counts ranging from 8 to 512, with corresponding sampling horizons ranging from 256 down to 4 steps. We changed no optimization settings. Learning improved or worsened slightly on some test games. APPO: We also experimented with an asynchronous version of PPO. We used an 8-simulator PPO agent as the base learner unit, using the same sampling horizon and update sequence as original PPO. The bottom panel in Figure 3 shows learning curves from a study of 8 learners running on 8 GPUs, with varying communication frequency. Standard PPO uses 4 gradient updates per epoch, and 4 epochs per optimization; we experimented with 1-4 gradient updates between synchronizations (update rule provided in supplementary material). Relative to PPO, we introduced gradient-norm-clipping, reduced the learning rate by a factor of four, and removed the learning rate schedule, all of which benefited learning. We found it helpful to periodically pull the central policy parameters during sampling, and did this with a horizon of 64 steps in all cases. In several games, the learning remained fairly consistent; it may be possible to reduce communication in asynchronous settings. 3 Learner counts in excess of 8 were run with multiple separate learners sharing GPUs. Accelerated Methods for Deep Reinforcement Learning Figure 3. Scaling investigations for policy gradient algorithms: game scores vs aggregate sample count. Top) A2C with various batch sizes (proportional to environment count), Upper) A3C with various numbers of 16-environment learner processes, Lower) PPO with varied number of simulators, Bottom) Asynchronous PPO, 8 learners with varied communication period. In most but not all cases, the scaled/adapted versions match the baseline performance. DQN + Variants: To adapt DQN and variants to run with many simulator instances, we performed learning experiments using an experience replay buffer organized by simulator. The total buffer size remained at 1 million transitions, so a correspondingly shorter history was held for each simulator. We observed learning performance to be largely independent of simulator count up to over 200, provided the number of update steps per optimization cycle is not too high (large batch size ameliorates this). Start State Decorrelation: Learning failed very early in some many-simulator experiments. We attributed this to correlation in starting game states, which resulted in large but poorly informed learning signals. To correct this, all our experiments start by stepping every simulator through a random number of uniform-random actions. Once this measure is taken, we found learning rate warmup (Goyal et al., 2017) to have no effect. On commencing sampling for training, game resets proceed as usual. 5.4. Q-Value Learning with Large Training Batches We performed experiments to explore the effects of training batch size in Q-value learning. They confirm that sampleefficient, large-batch training is possible with DQN. Further, we begin to shed light on the optimization effects of batch size. 5.4.1. A LGORITHM P ERFORMANCE DQN: When growing the simulator count and batch size in DQN, we maintained training intensity by adjusting the sampling horizon and the number of update steps per optimization phase. We experimented with batch sizes ranging from the standard 32 up to 2,048, and found consistent learning performance up to 512. Beyond this batch size, it became increasingly difficult to find a single learning rate which performed well in all tested games, and some maximum scores suffered. Figure 4 shows DQN learning performance for the batch sizes 32, 512, and 1024, using learning rates 2.5, 7.5, 15 × 10−4 , respectively. Other hyperparameters were as in original DQN (Mnih et al., 2015). In several games, a larger batch size improved learning. We also found asynchronous DQN to learn well using up to 4 GPU learners, each using batch size 512, with no further adjustments. Categorical DQN: We found Categorical DQN to scale further than DQN. The lower panel of Figure 4 shows learning curves for batch sizes up to 2,048, with no diminution in maximum scores. This is possibly due to richer content of the gradient signal. We employed the published setting for epsilon in the Adam optimizer: 0.01/L, where L is the batch size. Notably, learning was delayed for the largest batch sizes in the game S EAQUEST, but greater maximum Accelerated Methods for Deep Reinforcement Learning scores were eventually reached. In contrast to previous algorithms, we found a single learning rate to apply broadly, using 4.2 × 10−4 at all batch sizes of 256 and above. We return to study this surprising result shortly. -Rainbow: Despite its use of distributional learning, we found -Rainbow to lose performance above batch size 512 in some games. Scores for batch size 512 appear in Figure 12 in an appendix. They roughly match (in some cases exceeding) those reported in the literature for batch size 32 (Hessel et al., 2017). We used the published hyperparameters without scaling the learning rate. We scaled epsilon in the Adam update rule as 0.005/L, with L the batch size. 5.4.2. E FFECTS OF BATCH S IZE ON O PTIMIZATION Some possible factors limiting training batch sizes include: 1) reduced exploration, since fewer different networks are exercised in the environment, and 2) difficulties in numerical optimization of network weights. We conducted experiments to begin to identify these factors. Secondary-Learner Experiment: We configured a secondary DQN learner to train using only the replay buffer of a normal DQN agent. The secondary learner was initialized with the same parameter values as the primary, “sampler-learner”, and the two networks trained simultaneously, at the same rate of data consumption. Each sampled its own training batches. In the game of B REAKOUT, 64and 2048-sampler-learners achieved the same score, but the 2048-learner required more samples, despite using the fastest stable learning rate (the number refers to training batch size). When training a 64-secondary-learner using a 2048-sampler-learner, the secondary learner’s score tracked that of the primary. In the reverse scenario, however, the 2048-secondary-learner failed to learn. We posit this was due to the slower optimization of the decreased number of parameter updates–it was unable to track the rapid changes to the Q-value estimates near initialization and became too off-policy to learn. In the same test using two 256-learners, their scores matched. Had the 2048-secondary-learner outpaced the 2048-sampler-learner, it would have suggested exploration to be a more important factor than optimization. See the supplementary materials for figures. Update Rule: We conducted another experiment to isolate the effect of update rule on optimization. We found the Adam (Kingma & Ba, 2014) formula to be superior to RMSProp (Tieleman & Hinton) in providing large-batch learners with capability to traverse parameter-space during learning. When comparing learners achieving the same learning curves, those using smaller batch sizes (and hence performing more update steps) tended to have larger parameter vector-norms at all points in training. Unlike RMSProp, the Adam rule resulted in a fairly tight spread in parameter norms between batch sizes without changing the learning Table 2. Hours to complete 50 million steps in policy gradient learning on the DGX-1, by GPU count. A2C/A3C used 16 environments per GPU, PPO/APPO used 8. A LGORITHM 1 (5) A2C A3C PPO APPO 3.8 – 4.4 – # GPU (# CPU) 2 (10) 4 (20) 8 (40) 2.2 2.4 2.6 2.8 1.2 1.3 1.5 1.5 0.59 0.65 1.1 0.71 rate. This explains the lack of need to scale the learning rate in Categorical DQN and -Rainbow, and indicates that the update rule plays an important role in scaling. Further details, including differences in trends between convolutional and fully connected layers, appear in an appendix. 5.5. Learning Speed Finally, we demonstrated the learning speeds our framework obtains when running an entire DGX-1 to learn a single game. Figure 5 shows results for well-performing configurations of the policy gradient methods A2C, A3C, PPO, and APPO. Several games exhibit a steep initial learning phase; all algorithms here completed that phase in under 10 minutes in all such games shown. Notably, PPO mastered Pong in 4 minutes. A2C with 256 environments reached a processing speed in excess of 25,000 samples per second, equating to over 90 million steps per hour (360 million frames). Scaling measurements are listed in Table 2, showing in excess of 6x speedup using 8 GPUs relative to 1. We ran synchronous versions of DQN and its variants, with training times shown in Table 3. Using 1 GPU and 5 CPU cores, DQN and -Rainbow completed 50 million steps (200 million frames) in 8 and 14 hours, respectively–a significant gain over the reference times of 10 days. We achieved comparable learning speeds to those in (Horgan et al., 2018), which used 1 GPU and 376 CPU cores (see e.g. Figure 2 therein for 10-hour learning curves). Using multiple GPUs and more cores sped up our implementations. By virtue of a larger batch size, Categorical-DQN scaled best and completed training in under 2 hours using the entire DGX-1, a speedup of over 6x relative to 1 GPU. DQN and -Rainbow, however, experienced diminishing returns beyond 2 GPUs. We were unable to find asynchronous configurations that further boosted learning speed without curbing performance in some games (we only tested fully-communicating algorithms). Opportunities may exist to improve on our scaling. 6. Conclusions and Discussion We have introduced a unified framework for parallelizing deep RL that uses hardware accelerators to achieve fast learning. The framework is applicable to a range of al- Accelerated Methods for Deep Reinforcement Learning Figure 4. Scaling investigations for DQN (top) and Categorical-DQN (bottom): game scores vs sample count. Both learn well using training batch sizes as large as 512; Categorical-DQN succeeds using up to 2,048. Figure 5. Policy gradient algorithms using an entire DGX-1 for a single learning run: game scores vs aggregate sample count and vs time, in minutes. Asynchronous and synchronous versions of A2C and PPO learn successful game strategies in under 10 minutes. Table 3. Hours to complete 50 million steps (200 million frames) in Q-learning on the DGX-1, by GPU count (synchronous). A LGORITHM -B.S. DQN-512 -R AINBOW-512 C AT-DQN-2048 * 1 (5) 8.3 14.1 10.7 # GPU (# CPU) 2 (10) 4 (20) 4.8 8.6 6.0 3.1/3.9 6.6 2.8 * 8 (40) 2.6 6.4 1.8 Asynchronous gorithms, including policy-gradient and Q-value learning methods. Our experiments show that several leading algorithms can learn a variety of Atari games in highly parallel fashion, without loss of sample complexity and at unprecedented wall-clock times. This result indicates a promising direction to significantly boost experiment scale. We will release the code-base. We note several directions for extension of this framework. First is to apply it to domains other than Atari, especially ones involving perception. Second, our framework is likely to scale favorably to more sophisticated neural network agents, due to GPU acceleration of both inference and training. Moreover, as network complexity increases, scaling could become easier, as GPUs may run efficiently with smaller batch sizes, although communication overhead would worsen. Reduced-precision arithmetic could hasten learning–a topic yet to be explored in deep RL due to use of CPU-based inference. Larger RL problems may use the current, single-node implementation as a building block for distributed algorithms. Questions remain as to the extent of parallelization possible in deep RL. We have not conclusively identified the limiting factor to scaling, nor if it is the same in every game and algorithm. Although we have seen optimization effects in large-batch learning, we do not know their full nature, and other factors remain possible. Limits to asynchronous scaling remain unexplored; we did not definitively determine the best configurations of these algorithms, but only presented some successful versions. Better understanding may enable further gains in scaling, which is a promising direction for the advancement of deep RL. Accelerated Methods for Deep Reinforcement Learning Acknowledgements Adam Stooke gratefully acknowledges the support of the Fannie & John Hertz Foundation. The DGX-1 used for this research was donated by the NVIDIA Corporation. We thank Frédéric Bastien and the Theano development team (Theano Development Team, 2016) for their framework and helpful discussions during development of GPU-related methods. Thanks to Rocky Duan et al for the rllab codebase (Duan et al., 2016) out of which this work evolved. References Babaeizadeh, Mohammad, Frosio, Iuri, Tyree, Stephen, Clemons, Jason, and Kautz, Jan. GA3C: gpu-based A3C for deep reinforcement learning. arXiv preprint arXiv: 1611.06256, 2016. Bellemare, Marc G, Naddaf, Yavar, Veness, Joel, and Bowling, Michael. The arcade learning environment: An evaluation platform for general agents. Journal of Artificial Intelligence Res., 47:253–279, 2013. Bellemare, Marc G, Dabney, Will, and Munos, Rémi. A distributional perspective on reinforcement learning. arXiv preprint arXiv: 1707.06887, 2017. Clemente, Alfredo V., Martı́nez, Humberto Nicolás Castejón, and Chandra, Arjun. Efficient parallel methods for deep reinforcement learning. CoRR, abs/1705.04862, 2017. URL http://arxiv.org/abs/1705.04862. Duan, Yan, Chen, Xi, Houthooft, Rein, Schulman, John, and Abbeel, Pieter. Benchmarking deep reinforcement learning for continuous control. CoRR, abs/1604.06778, 2016. URL http://arxiv.org/abs/1604.06778. Espeholt, L., Soyer, H., Munos, R., Simonyan, K., Mnih, V., Ward, T., Doron, Y., Firoiu, V., Harley, T., Dunning, I., Legg, S., and Kavukcuoglu, K. IMPALA: Scalable Distributed Deep-RL with Importance Weighted ActorLearner Architectures. ArXiv e-prints, February 2018. Fortunato, Meire, Azar, Mohammad Gheshlaghi, Piot, Bilal, Menick, Jacob, Hessel, Matteo, Osband, Ian, Graves, Alex, Mnih, Volodymyr, Munos, Remi, Hassabis, Demis, Pietquin, Olivier, Blundell, Charles, and Legg, Shane. Noisy networks for exploration. In International Conference on Learning Representations, 2018. Goyal, Priya, Dollr, Piotr, Girshick, Ross, Noordhuis, Pieter, Wesolowski, Lukasz, Kyrola, Aapo, Tulloch, Andrew, Jia, Yangqing, and He, Kaiming. Accurate, large minibatch sgd: Training imagenet in 1 hour, 2017. Hessel, Matteo, Modayil, Joseph, van Hasselt, Hado, Schaul, Tom, Ostrovski, Georg, Dabney, Will, Horgan, Dan, Piot, Bilal, Azar, Mohammad, and Silver, David. Rainbow: Combining improvements in deep reinforcement learning. arXiv preprint arXiv: 1710.02298, 2017. Horgan, D., Quan, J., Budden, D., Barth-Maron, G., Hessel, M., van Hasselt, H., and Silver, D. Distributed Prioritized Experience Replay. ArXiv e-prints, March 2018. Kingma, Diederik P. and Ba, Jimmy. Adam: A method for stochastic optimization. CoRR, abs/1412.6980, 2014. URL http://arxiv.org/abs/1412.6980. Mnih, Volodymyr, Kavukcuoglu, Koray, Silver, David, Rusu, Andrei A, Veness, Joel, Bellemare, Marc G, Graves, Alex, Riedmiller, Martin, Fidjeland, Andreas K, Ostrovski, Georg, Petersen, Stig, Beattie, Charles, Sadik, Amir, Antonoglou, Ioannis, King, Helen, Kumaran, Dharshan, Wierstra, Daan, Legg, Shane, and Hassabis, Demis. Human-level control through deep reinforcement learning. Nature, 518(7540):529–533, 2015. Mnih, Volodymyr, Badia, Adrià Puigdomènech, Mirza, Mehdi, Graves, Alex, Lillicrap, Timothy P, Harley, Tim, Silver, David, and Kavukcuoglu, Koray. Asynchronous methods for deep reinforcement learning. In International Conference in Machine Learning, 2016. Nair, Arun, Srinivasan, Praveen, Blackwell, Sam, Alcicek, Cagdas, Fearon, Rory, De Maria, Alessandro, Panneershelvam, Vedavyas, Suleyman, Mustafa, Beattie, Charles, Petersen, Stig, Legg, Shane, Mnih, Volodymyr, Kavukcuoglu, Koray, and Silver, David. Massively parallel methods for deep reinforcement learning. arXiv preprint arXiv: 1507.04296, 2015. Peng, Jing and Williams, Ronald J. Incremental multi-step q-learning. In Machine Learning Proceedings 1994, pp. 226–232. Elsevier, 1994. Schaul, Tom, Quan, John, Antonoglou, Ioannis, and Silver, David. Prioritized experience replay. In International Conference on Learning Representations, 2016. Schulman, John, Wolski, Filip, Dhariwal, Prafulla, Radford, Alec, and Klimov, Oleg. Proximal policy optimization algorithms. arXiv preprint arXiv: 1707.06347, 2017. Theano Development Team. Theano: A Python framework for fast computation of mathematical expressions. arXiv e-prints, abs/1605.02688, May 2016. URL http:// arxiv.org/abs/1605.02688. Tieleman, T. and Hinton, G. RMSprop Gradient Optimization. URL http://www.cs.toronto. edu/˜{}tijmen/csc321/slides/lecture_ slides_lec6.pdf. Accelerated Methods for Deep Reinforcement Learning Van Hasselt, Hado, Guez, Arthur, and Silver, David. Deep reinforcement learning with double q-learning. In AAAI, volume 16, pp. 2094–2100, 2016. Wang, Ziyu, Schaul, Tom, Hessel, Matteo, van Hasselt, Hado, Lanctot, Marc, and de Freitas, Nando. Dueling network architectures for deep reinforcement learning. In International Conference on Machine Learning, 2016. Accelerated Methods for Deep Reinforcement Learning Supplementary Materials A. Update Rule for Multi-Step Asynchronous Adam Our asynchronous PPO experiments used the update rule described here, which permits multiple local gradient steps per synchronization with the central parameters. The usual Adam update rule (Kingma & Ba, 2014) is the following. It has fixed hyperparameters r, β1 , β2 , and ; g stands for the gradient; and all other values except the network parameters θ are initialized at 0: t←t+1 p 1 − β2t a←r 1 − β1t m ← β1 m + (1 − β1 )g v ← β2 v + (1 − β2 )g 2 am s← √ v θ ←θ−s . We kept these rules for making local updates and introduced the additional, local accumulation variables, also zero-initialized: ag ← β1 ag + g ag2 ← β2 ag2 + g 2 as ← as + s . When applying an update to the central parameters, denoted with a tilde, we used the following assignments: θ, θ̃ ← θ̃ − as m, m̃ ← β1n m̃ + (1 − β1 )ag v, ṽ ← β2n ṽ + (1 − β2 )ag2 ag , ag2 , as ← 0 where n is the number of local gradient steps taken between synchronizations. This rule reduces to the usual Adam update rule in the case of a single learner thread. Accelerated Methods for Deep Reinforcement Learning B. Figures for Secondary-Learner Experiment (DQN) (a) (b) Figure 6. Learning the game B REAKOUT with a secondary-learner using only the replay buffer of the normal, sampler-learner, both using DQN. a) The 64-batch-size secondary-learner kept pace with its 2048-batch-size sampler-learner, but b) the 2048-batch-size secondary learner failed to track its 64-batch-size sampler-learner or even learn at all. (Curves averaged over two random trials.) (a) (b) Figure 7. Neural network parameter vector-norms (l-2) during training. In both cases, the large-batch learner lagged behind the small batch learner. In b) the parameters of large-batch secondary-learner continued to grow while its game score remained nil. Figure 8. Learning the game B REAKOUT, where a secondary-learner using the same batch-size as the sampler-learner tracked (albeit imperfectly) the game score, learning successfully. (Curves averaged over two random trials.) Accelerated Methods for Deep Reinforcement Learning C. Observations on Update Rules and Batch Size Scaling We present observations of the effects of scaling the training batch size on neural net optimization under two different parameter update rules: Adam and RMSProp (RMSProp without momentum and only direct accumulation of the squared gradients, see e.g. https://github.com/Lasagne/Lasagne/blob/master/lasagne/updates.py). We trained agents on the game Q*B ERT with learning rates adjusted to yield very similar performance curves for all settings, and we tracked the L-2 vector-norms of several quantities during learning. These included the gradients, parameter update steps, and the parameter values themselves. As in all DQN experiments in this paper, the training intensity was fixed at 8, so that the number of parameter update steps during learning scaled inversely with the batch size. Two random seeds were run for each setting. Although the game scores roughly matched throughout training, the exact solutions found at any point did not, as evidenced by the differing parameter norms. No regularization was used. The following paragraphs follow the panels in Figure 9, where curves are labeled by batch-size and learning rate. When viewing the network as a whole (i.e. norms of all weights and biases as a single vector), trends reflected those seen in FC-0, where most of the weights are. i) Learning Curves: We controlled for game score, adjusting the learning rate as needed. For the case of RMSProp with batch-size 64, we included a learning rate that was slightly too low (1 × 10−4 ), yielding slow learning and lower final score, and a learning rate that was slightly too high (5 × 10−4 ), yielding lower final score due to instability–these are the dashed lines in all panels. ii) Fully-Connected-0 Weights-Norm: The Adam optimizer yielded fairly tight grouping despite using the same learning rate for all settings. The RMSProp learner, on the other hand, needed to scale the learning rate by 20x between batch sizes 64 and 1,024, which then produced very similar norms. At batch-size 64, slow / unstable learning was characterized by small / large norms, respectively. The large norm of the batch-size 256 runs suggests this learning rate was likely near the upper limit of stability. iii) Fully-Connected-0 Gradients-Norm: Under both update rules, large batch sizes always produced smaller gradient vectors–reduced variance led to reduced magnitudes. We also observed this pattern in policy gradient methods, when looking at the total gradient norm. Here, the magnitude of the gradients depended inversely on the parameter norm; see the RMSProp 64-batch-size curves. This effect was opposed and outweighed by the effect of batch size. iv) Fully-Connected-0 Step-Norm: The Adam optimizer yielded significantly bigger step sizes for the bigger batch learners, despite the smaller gradients. RMSProp required an adjusted learning rate to produce the same effect. Under both update rules, the amount of step size increase did not fully compensate for the reduction in step count, indicating that the larger batch learners followed straighter trajectories through parameter space. RMSProp led to significantly larger steps overall, but despite this ended learning at smaller weights–its learning trajectories were apparently less direct, more meandering. v) Convolution-0 Weights-Norm: The Adam optimizer gave much greater spread in norms here than in the FC-0 layer; as batch size increased, the learning emphasis shifted away from Conv-0. But in RMSProp the increased learning rate led the first convolution layer to grow larger for larger batch sizes, placing more emphasis on this layer. vi) Convolution-0 Gradients-Norm: The Adam update rule produced an intriguing cross-over in gradient norm; the large batch learner actually started higher, bucking the trend seen in other cases. The pattern under RMSProp matched that for FC-0. vii) Convolution-0 Step-Norm: Unlike for FC-0, the step norm did not change significantly with batch size under Adam. RMSProp yielded a similar pattern as in FC-0. Overall, the Adam optimizer appeared to compensate for batch size in the FC-0 layer, but less so in the Conv-0 layer, leading to de-emphasized learning in Conv-0 for large batches. The increased learning rate in RMSProp compensated for batch size in the FC-0 layer and increased the emphasis on learning in Conv-0. This sort of pattern could have implications for learning representations vs game strategies. Further study of these clear trends could yield insights into the causes of learning degradation and possible solutions for large batch RL. Accelerated Methods for Deep Reinforcement Learning Figure 9. L-2 vector-norms of the parameters, gradients (average), and parameter steps (average) for the first convolution layer and the first fully connected layer while learning to play Q*B ERT with Categorical DQN at various batch sizes: Adam vs RMSProp. Accelerated Methods for Deep Reinforcement Learning D. Additional Learning Curves Figure 10. Learning curves for Advantage Actor-Critic: baseline (A2C-16env) and scaled configurations, including synchronous and asynchronous. Only in ATLANTIS, G OPHER, and possibly K RULL does the baseline stand out above both scaled versions. Accelerated Methods for Deep Reinforcement Learning Figure 11. Learning curves for Proximal Policy Optimization: baseline (PPO-8env) and scaled configurations, including synchronous and asynchronous. Only in A STEROIDS and B OWLING does the baseline stand out above both scaled versions. Accelerated Methods for Deep Reinforcement Learning Figure 12. Learning curves for scaled versions of DQN (synchronous only): DQN-512, Categorical-DQN-2048, and -Rainbow-512, where the number refers to training batch size. The anomalously low scores for -Rainbow in B REAKOUT also appeared for smaller batch sizes, but was remedied when setting the reward horizon to 1 or with asynchronous optimization (cause unknown; reward horizon 3 usually helped).
2cs.AI
Formal Concept Analysis for Knowledge Discovery from Biological Data arXiv:1506.00366v1 [cs.AI] 1 Jun 2015 Khalid Raza Abstract Due to rapid advancement in high-throughput techniques, such as microarrays and next generation sequencing technologies, biological data are increasing exponentially. The current challenge in computational biology and bioinformatics research is how to analyze these huge raw biological data to extract biologically meaningful knowledge. This chapter presents the applications of formal concept analysis for the analysis and knowledge discovery from biological data, including gene expression discretization, gene co-expression mining, gene expression clustering, finding genes in gene regulatory networks, enzyme/protein classifications, binding site classifications, and so on. It also presents a list of FCA-based software tools applied in biological domain and covers the challenges faced so far. 1 Introduction After Human Genome Project, there is unprecedented growth in biological data. Due to technological advancement in high throughput technologies, such as Microarray and Next Generation Sequencing, it is possible to produce high quality biological data with rapid speed. The biological data can be broadly classified as Genomics, Transcriptomic and Proteomics. For example, gene expressions are transcriptomic data that quantify the state of genes in a cell. When these gene expression data are analyzed properly, it may reveal many hidden cellular processes and biological knowledge. These knowledge discoveries from biological data may lead to better understanding of disease mechanism and further it guide for better diagnosis and therapy of the disease. Formal Concept Analysis (FCA), introduced by R. Wille in early 1980s [1], is a method based on lattice theory for the analysis of binary relational data. Since its Khalid Raza Department of Computer Science, Jamia Millia Islamia (Central University), New Delhi, India e-mail: [email protected] 1 2 Khalid Raza inception, FCA has been found to have potential applications in many areas including data mining, knowledge discovery and machine learning. Like other computational technique, FCA has also been applied in microarray analysis, gene expression mining, gene expression clustering, finding genes in gene regulatory networks, enzyme/protein classifications, binding site classifications, and so on. In this chapter, we will present the current status of FCA for the analysis and knowledge discovery from biological data and also cover challenges faced so far. 2 Biological Databases Due to availability of high-throughput techniques, biological database are being generated exponentially and the modern biology has turned into a data-rich science. Some of the important biological data are nucleotide and protein sequences, protein 3D structure produced by X-ray crystallography and NMR, metabolic pathways, complete genomes and maps, gene expression and protein-protein interaction, and so on. Biological databases are broadly divided into sequences databases and structure databases. Sequence data are applicable for both DNA and protein, but structural databases are applicable for proteins only. Today, most of the biological databases are freely available to the researchers. In general, biological databases can be classified as primary, secondary and composite databases. A primary databases stores information of either sequence or structure. For example, Uni-PROT and PIR for protein sequence, GenBank and DDBJ for Genome sequence and the Protein Databank for protein structure. Secondary database stores information which are derived from the primary database source, such as conserved sequence information, active site residues of the protein families arrived by multiple sequence alignment of a set of related proteins, etc. The SCOP, CATCH, PROSITE are few examples of secondary databases. A composite database is a collection of variety of different primary database sources that avoid the need for searching into multiple database sources. The National Centre for Biotechnology Information (NCBI) is the main central host that links multiple database sources and makes these resources freely available to us. For more information about biological databases, refer tutorials in [2] and [3]. 3 Microarray Analysis 3.1 Mining gene expression data Due to rapid advancement in high throughput technology such as Microarray and Next Generation Sequencing, transcriptomic data has been produced in unprece- Formal Concept Analysis for Knowledge Discovery from Biological Data 3 dented way. But analysis and interpretation of these data remains a challenge for the researchers due to complexity of the biological systems. The motivation and biological background that need to be considered for gene expression mining are: i) mostly single gene participates in many biological processes, i.e., it has several functions, ii) a biological process implies a small subset of genes, iii) a biological process of interest may be active in many, all or none situation for a given dataset, and iv) differentially expressed genes over different samples are not frequent. In transcriptomic, researchers routinely analyze expression level of genes in different situations such as in tumor samples versus normal samples. Formal Concept Analysis (FCA) has been successfully applied in the field of transciptomics. Some of the studies identified set of genes that are sharing same transcriptional behavior using FCA [4, 5, 6]. Due to availability of large gene expression datasets, it is possible to apply data mining tools to identify patterns of interest in the gene expression data. One of the most widely used data mining technique is association rules which can be applied for the analysis of gene expression data. Association rules may uncover biologically relevant associations between genes, or between different environmental conditions and gene expression. An association rules can be written in the form S1 → S2 , where S1 and S2 are disjoint sets of data items. The set S2 is likely to occur whenever the set S1 occurs. Here, the data items may include highly expressed or repressed genes, or other relevant facts stating the cellular environment of genes such as diagnosis of a disease samples. Association rules mining has been applied for gene expression data mining by many researchers including [8]. In this section, we have discussed only the application of different variants of FCA for gene expression data mining, especially extracting co-expressed groups of genes sharing similar expression. Most of the methods for co-expressed genes mining are based on binary biclustering methods. Here, scaling of data is done using a single threshold and one expression value. The expression values above this threshold are considered as over-expressed and represented by 1; otherwise it is considered as under-expressed and represented by 0. Once, the gene expression values are discretized to binary table then strong relationships can be extracted having biologically meaningful information. Kaytoue-Uberall et al. (2008) [9] proposed intervalbased FCA to extract groups of co-expressed genes. Given a set of genes G, a set of relationships S, and set of ordered intervals T, (g, (s,t)) ∈ I, where g ∈ G, s ∈ S,t ∈ T and I is binary relation means gene expression value of gene g is interval of index t for situation S. Hence, formal concept of the context (G, S × T, I) shows groups of genes having G ∈ V in same interval. Although a priori determination of these intervals are difficult. Messai et al. (2008) [14] proposed interval-free FCA based method to cluster gene expression values. However, this algorithm does not deal with large data set and also no link to interordinal scaling was done. To overcome these problems, Kaytoue-Uberall et al. (2009) [6] introduced two FCA-based methods for clustering gene expression data. The first method is based on interordinal scaling and second one is based on pattern structures that require adaptation of algorithm computed with interval algebra. Between these two algorithms by Kaytoue-Uberall et al. (2009) [6], second method has been proved to be more computationally efficient and provide 4 Khalid Raza more readable results. These algorithms have been tested on microarray gene expression data of fungus Laccaria biocolor taken from Gene Expression Omnibus databases (GSE9784) composed of 22,294 genes and five different conditions. For the dimension reduction, cyber-T [7] tool was used that filter dataset and returned 10,225 genes. DNA methylate affects the expression of genes and their regulation may cause several cancer-specific diseases. It is observed in many investigations that hypomethylation of DNA have been associated with many cancers including breast cancer. Amin et al., (2012) [10] applied FCA for mining the hypomethylated genes among breast cancer tumors. They constructed formal concepts lattices with significant hypomethylated genes for every breast cancer subtypes. The constructed lattice reflects the biological relationships among breast cancer tumor subtypes. The proposed filter method has two stages: non-specific filter and specific filters. The non-specific filtering step determines the hypomethlated CPGs by computing the difference between the mean of methylation level for the corresponding adjacent normal tissue. The second stage (specific filtering) receives the output of the first stage as input and performs one-sample Kolmogorov Smirnov test to check the normality of each breast cancer subtypes. If the given dataset follows normal distribution then paired t-test is applied, otherwise Wilcoxon signed ranked is applied. Once, the filtering of hypomethylated genes is done then FCA has been applied to determine breast cancer subtypes. Here, Java-based FCA analysis software tool, called ConExp [11] was used to generate the lattice diagram. 3.2 Clustering gene expression data For grouping set of genes and/or grouping experimental conditions having similar gene expression pattern, clustering algorithms are the most popularly applied method. Some of the most widely used clustering algorithms are hierarchical, kmeans, self organizing maps, fuzzy c-means, and so on [12]. However, FCA has also been used for grouping genes, as an alternative approach to clustering. Choi et al. (2008) [13] proposed FCA-based approach for grouping genes based on their gene expression pattern. FCA builds a lattice from the gene expression data together with some additional biological information, where each vertex corresponds to a subset of genes which are clubbed together based on their expression values and some other functional information. The lattice structures of gene sets are assumed to show biological relationship in the gene expression dataset. Here, similarities and dissimilarities between different experiments are determined by corresponding lattices. This approach consists of three main steps: i) building a binary relation, ii) construction of concept lattice, and iii) defining a distance measure and comparing the lattices. In the first step, the objects are genes, their discretized gene expression attributes and biological attributes. In the second step, for each experiment a binary relationship is constructed using concept lattice algorithm. Finally, third step calculates distance and compares the lattices. The work of Choi et al. (2008) [13] is an Formal Concept Analysis for Knowledge Discovery from Biological Data 5 attempt to apply FCA for gene clustering but the distance measure employed was quite fundamental and it did not properly exploit the properties of the lattice structure. Hence, other possible distance measures such as spectral distance, maximal common sublattice based distance, etc. can also be investigated [13]. In addition to global lattice comparison, local structure (sublattice) can also be investigated that may assist in identification of particular biological pathways. Melo and collaborators [15] proposed an FCA-based approach combined with association rule and visual analytics to find out overlapping groups of genes in gene expression and analyzed it in an analytical tool called CUBIST. The workflow of CUBIST involves querying a semantic databases and transforming the result into formal context and then it is visualized as a concept lattice and associated charts. The CUBIST tool address the challenges of gene expression analysis by filtering and grouping large amount of datasets, interactive exploration of data and presents various relevant statistics. 3.3 Clustering multi-experiment expression data Due to availability of high-throughput techniques, presently we have large number of gene expression datasets. Combining datasets taken from multiple microarray experiments is research question. It has been proved and suggested by many recent studies that the analysis and integration of multi-experiment datasets are expected to give more accurate, reliable and robust results. The reason is that integrated datasets would be based on large number of gene expression samples and the effects of individual study-specific biases are reduced. For the consensus integration of multi-experiment expression data, FCA has been successfully applied by Hristoskova and collaborators [16]. They proposed a generic consensus clustering which applied FCA for consolidation and analysis of clustering solutions taken from multiple microarray experiments. Initially, the datasets are broken into multiple groups of related experiments based on some predefined criteria. In the next step, a consensus clustering technique is deployed to each group that results on clustering solution per group. Further, these solutions are pooled together and analyzed by FCA that enables extracting valuable insights from the data and generate a gene partition over all the experiments. The FCA-enhanced consensus clustering algorithm proposed by Hristoskova and collaborators [16] is depicted in Fig. 1. The algorithm is divided into three steps: initialization, clustering and FCA-based analysis. In the initialization step, multi-experiment data are divided into r groups of related datasets. Clustering step applies consensus clustering that generates r different solutions. FCA-based analysis step construct concept lattice that partitions the genes into a set of disjoint clusters, as shown in Fig. 1. The advantages of FCAenhanced clustering approach proposed in [16] are as follows: i) Uses all data that allow each group of related experiments to have a different set of genes, i.e., total set of studies genes is not limited to those present in all the datasets, ii) it can be better tuned for each samples by identifying initial number of clusters for each 6 Khalid Raza Fig. 1 Schematic representation of the FCA-enhanced consensus clustering algorithm [16] group of related experiment, depending upon the number, composition and quality of expression profiles, and iii) the problem with ties is avoided by applying FCA to analyze together all partitioned results and find out the final clustering solution representation as the entire experiment collection. One another attempt for the application of FCA for knowledge discovery and knowledge integration from gene expression data has been done by Benabderrahmane (2014) [17]. Benabderrahmane [17] introduced a symbolic data mining approach based on FCA involving bi-clustering of genes, for knowledge discovery and knowledge integration. Firstly, datasets are represented as a formal context (objects attributes), where objects are genes and attributes are their expression profiles plus additional information was used such as GO terms that they annotate, the list of pathways they are involved and their genetic interactions. The algorithm has eight steps, the outline of the algorithm is depicted in Fig. 2. This algorithm integrates different kinds of datasets such as genes having similar expression profiles and share similar biological function (GO ontology), knowledge-base of pathways and interactors (KEGG, BioGrid, STRING, etc.) 3.4 Gene expression data comparison Finding and understanding the similarities among various diseases is an import research problem in translational bioinformatics. Understanding disease similarities Formal Concept Analysis for Knowledge Discovery from Biological Data 7 Fig. 2 An overview of the proposed framework proposed by Benabderrahmane (2014)[17] may help us in refining disease classification, identifying common etiology of comorbidities in genetic studies and finding analogies between closely related diseases and finally identify common treatments [18]. Bhavnani and collaborators [19] applied network analysis approach to find similarities among renal disease using gene expression data. In addition to many computational techniques, FCA has also been applied for finding disease similarities. The work of Keller et al., (2012) [18] shows the application of FCA for identification of disease similarity. They identified formal concepts using gene disease associations that indicate hidden relationship among diseases having same set of associated genes, and gene that are associated with same set of disease. The FCA approach has advantages over network analysis approach, such as i) FCA allows representation of relationships among several diseases, ii) it provide results in algebraic form allowing to consider relationship among concepts, and iii) additional gene annotation can be added to refine concepts that assist for the identification of functional gene relationships within disease groups. FCA has been applied on renal disease dataset that finds unexpected relationships among disease which are promising but it suffers from few disadvantages. The difficulty with FCA is that many of the formal concepts may not be useful because only a few formal concepts indicate relationships. 8 Khalid Raza 3.5 Identifying genes of gene regulatory networks Gene regulatory networks (GRNs) are the systematic biological networks describing interaction among set of genes in the form of a graph, where node represents genes and edges defines their regulatory interactions. Understanding the GRNs helps in understanding interactions among genes, biological and environmental effects and to identify the target genes for drug against the diseases. GRNs have been proved to be a very useful tool used to describe and explain complex dependencies between key developmental transcription factors (TFs), their target genes and regulators [20, 21]. For the better understanding of a gene regulatory network (GRN), it is necessary to know set of genes belonging to it. Identification of these set of genes correctly is a challenging task, even for a small subnetworks. In fact, only few genes of a GRN are known and rest of the genes are guessed based on experience or informed speculation [22]. Hence, it is better to rely on experimental data to support these guesses. Gebert and collaborators [22] presented a new FCA based method to detect unknown members of GRN using time-series gene expression data. Suppose that G = {g1 , g2 , , gn } is the set of all genes in an organism and S ⊆ G is set of seed genes. The goal is to find subset S0 ⊆ G\S of genes which interact strongly with GRN defined by set S. Let R ⊆ G × G be a relation having interactions and M an n × l matrix that consists of time-series gene expression profiles having length l. If pair (gi , g j ) ∈ R then it is known that gi and g j interaction to each other. The FCA-based approach proposed by Gebert et al., (2008) [22] has three main steps described as follows. First step is preprocessing step that uses the relation R to get an initial list of interesting genes. If interaction data are not available, this step is skipped and entire gene set G is taken as the initial list of genes. In the second step, concept lattice is constructed using gene expression data that reduces the number of genes on the initial list. The last step computes probabilities for the correlation coefficient between genes that result from the second step and genes of S in order to get list of significant interactions. 4 Classification and prediction of enzymes, ligand and domain-domain identification The classification and study of relations in FCA is focused on the basis of the objects and various types of related attributes (binary, nominal, ordinal etc.), therefore it is quiet helpful for computational scientist working on Biological data, who may wish to skip the inside details. With several advantages, including strong mathematical basis, FCA serves in several applications to explore biological data, enzyme classifications, identification of important protein domains (including protein binding sites) and related drug molecules. FCA is also reported useful in the integration of Biological activity with chemical spaces. This list is not exhaustive; FCA has Formal Concept Analysis for Knowledge Discovery from Biological Data 9 also been used to understand the structural classification of glasses [23] and several other studies. In this section, we discussed some important application of FCA for the classification of enyzmes, binding site identification and discovery of ligand as drug molecules and so on. 4.1 Enzyme classification Enzymes are proteins which catalyses biological reactions and they are named and classified according to the reaction they catalyse. For example, hydrolases are those types of enzymes which are involved in the reactions by addition or deletion of water molecules. Though the sequences of most of the enzymes are available in numerous biological databases, it is tedious task to predict the function of the enzymes from their respective sequences due to varied activity from small sequence combinations. Considering that the new enzyme family may emerge, an effort was made for enzyme classifications using FCA which classifies the enzymes that does not belong to known family [24]. They comment: it is easier to predict the super-families of the proteins as compared to the families of the proteins. In this study, the labelled and unlabelled enzyme sequences were objects whereas attributes represent the enzyme blocks. Enzyme blocks are formed by sequential arrangements of the amino acids, which correspond to specific functions like catalytic site, lining residues of important pockets or binding sites. In this method of classification, more than half unlabelled sequences were found to be correctly classified. Another attempt for the classification of protein using FCA has been done by Han and collaborators [25]. They proposed FCA-based approach for protein classification that uses protein domain and Gene-Ontology annotation information. Protein domains represent the evolutionary information forming a protein, while GeneOntology describes other properties of proteins that includes structure of protein, molecular interactions, etc. Han and collaborators [25] applied tripartite lattice for interpenetrations among protein, domain and GO terms. With the help of tripartite lattice, they classified protein from domain composite and their corresponding GO term description. They extracted concrete information using tripartite lattice in the corresponding domain that co-occur in proteins because they are more likely to exhibit common functions, as annotated in GO terms. 4.2 Binding site identification Protein binding sites (PBS) and ligand binding sites identification are vital to protein- protein and protein-ligand interactions, respectively. This eventually helps the medical science in identification of better drug or therapy for several important diseases. There are several ways to identify the binding sites. Most commonly, the 10 Khalid Raza protein docking protocol helps in identifying the binding site by forming complex with one protein to other protein or a ligand (which is a drug in most of the cases). Bresso et al., (2012) [26] in their report highlight: Majority of the reported methods utilising the structure based prediction methods for protein-protein interactions consider the attributes, which are physico-chemical properties like hydrophobicity, residue constituents but lack the representation of properties (e.g. accessible surface of a particular residue) of binding components or spatial relation between two components (residues). Considering these limitations and knowing the flexibility of FCA, Bresso et al., (2012) [26] utilised available protein 3D structures for characterizing PBS. In this concept, Inductive Logic Programming (ILP) was linked with FCA, which enabled identifications and discovery of distinct binding pockets of protein-protein interactions. 4.3 Discovering Ligand from database as a drug molecule Using FCA, several attempts have been made to identify suitable ligands from number of chemical database like IUPHAR, ZINC and many more. The reports suggest that FCA helps in the identification of drug molecules. Drug molecules can be either agonist (activators) or antagonist (inhibitors). For a given protein, these drug molecules, would likely act as agonist or antagonist. The one which do not binds and do not show the changes, are not considered as drug molecules. In addition to the ADMETox properties, the chemical molecules, which follow the Lipinski’s Rule, are considered as suitable drugs. Actually, when we talk about drugs, a chemical compound has number of physical properties: Hydrogen bond donors, acceptors; rotatable bonds; topological surface area; molecular weight; XlogP and chemical properties: absorption; digestion; metabolism; excretion; toxicity. Using these properties as attributes for the object ligand which could be possibly a drug molecule, one can identify and differentiate them from a bulk of chemical molecules in the database using FCA. To take an example, similar attempt was made by Sugiyama et al., in 2012 [27] . They considered the physical features discussed above, including the number of Lipinskis rule broken to set as attribute in order to identify the ligands from IUPHAR database. They designed an algorithm, LIFT (LIgand Finding via Formal ConcepT Analysis) for semi-supervised multi-labelled classification from mixed type data. Results of the algorithm were effective and proved to be efficient system of classification to identify the ligands from the training data. Fragment Formal Concept Analysis (FragFCA) introduced by Lounkine et al., (2008) [29] has the ability to identify the selective hits in high-throughput screening data sets. In the concept design of FragFCA, combinations of molecular fragments are the ’objects’ and their ’attributes’ includes the compound activity and potency information. The effectiveness of better drug identification can be improved, when the attributes classifying the ligands could be slightly updated, so as to filter non-peptide molecules from the bulk of drug molecules. It has been identified that the peptide Formal Concept Analysis for Knowledge Discovery from Biological Data 11 molecules have limited in vivo efficacy due to pharmacological constraints: solubility, stability and selectivity. Hence, for reliable and safer drug therapy, discovery and optimisation of non-peptide inhibitors/drugs is necessary [28]. Moreover, in a recent in silico identifications of the drug molecules for Cathepsin L (SmCL1) of the organism, Schistosoma mansoni responsible for the disease schistosomiasis, it was revealed that the non-peptide molecules could be better drug molecules as compared to peptide drugs molecules [30]. The list of popularly used software tool based on FCA is shown in Table 1. So, to conclude, FCA can set an excellent framework to deal with variety of problems. Before application of the concept on to the biological data minor optimisations and through understanding of the domain is the need in current study for better research. Table 1 List of FCA based software tools applied in biological domain S.No.Tool Name 1. ConExp Descriptions Java-based FCA analysis software tool used to generate the lattice diagram. 2. FcaStone Tool for format conversion and command-line lattice generation. 3. Contextual Role FCA tool that work with Eclipse modelEditor ing tool. 4. FcaBedrock A tool for creating context files for Formal Concept Analysis. It can convert existing data sets in flat-file CSV or 3-column CSV, to Burmeister (.cxt) or FIMI (.dat) context files. 5. Lattice Miner FCA tool for the construction, manipulation and visualization of concept lattices. 6. CUBIST Gene expression analysis tool that combines FCA with association rule and visual analytics. It provides filtering and grouping large data sets, its interactive exploration and provides various relevant statistics. 7. Galicia Galois lattice integrative constructor 8. OpenFCA This project comprises of a set of tools for performing FCA activities, including creation of context, visualization of lattice and attribute exploration 9. LIFT LIgand Finding via Formal ConcepT Analysis (LIFT) for semi-supervised multi-labelled classification from mixed type data. 10. FragFCA Fragment Formal Concept Analysis (FragFCA) identifies the selective hits in high-throughput screening data sets. References Serhiy (2000) [11] Priss (2008) [31] Mhle & Wende (2010) [32] Andrews & Orphanides (2010) [35] Lahcen & Kwuida (2010) ) [34] Melo et al., (2013) [15] Galicia [33] Borza et al., (2010) [36] Sugiyama et (2012) [27] al., Lounkine et (2008) [29] al., 12 Khalid Raza 5 Conclusions and Discussions Biological data are growing with unprecedented rate. High throughput technologies fuelled in the production of high quality biological data. These data when analyzed properly then one can discover several fruitful knowledge hidden inside biological data. Formal Concept Analysis (FCA) is a method based on lattice theory for the analysis of binary relational data and has been found to have potential applications in many areas of bioinformatics and computational biology, beside other applications. In this chapter, we presented the current status of FCA for the analysis and knowledge discovery from biological data including gene expression discretization, gene co-expression mining, gene clustering, finding genes in gene regulatory networks, enzyme/protein classifications, binding site classifications, and so on. It also presented a brief list of FCA-based software tools applied in biological domain and covered some challenges faced so far. References 1. Wille R (1982). Restructuring lattice theory: an approach based on hierarchies of concepts. In I. Rival (Ed.). Ordered sets. Reidel. Dordrecht-Boston, 445–470 2. Babu MM (1997) Biological databases and protein sequence analysis. Center for Biotechnology, Anna University, Chennai 3. Kraulis P (2001) Databases in bioinformatics. Available on: http://www.avatar.se/lectures/strbio2001/databases/index.html Accessed on May 20, 2015 4. Rioult F, Boulicaut J-F, Cremilleux B, Bessoner J (2003) Using transposition for pattern discovery from microarray data. In: Proceedings of DMKD, 73–79. 5. Rioult F, Robardet C, Blachon S, Cremilleux B, Olivier G, and Boulicaut J-F (2003) Mining concepts from large SAGE gene expression matrices. In: Proceedings of KDID03 co-located with ECML-PKDD 2003, Catvat- Dubrovnik (Croatia), 107–118. 6. Kaytoue-Uberall M, Duplessis S, Kuznetsov SO, Napoli A (2009) Two FCA-based methods for mining gene expression data. In Sebastien Ferre and Sebastian Rudolph, editors, ICFCA, Lecture Notes in Computer Science, Springer 5548:251–266. 7. Kayala MA, Baldi P (2012) Cyber-T web server: differential analysis of high-throughput data. Nucleic acids research, 40(W1):W553–W559. 8. Creighton C, Hanash S (2003) Mining gene expression databases for association rules. Bioinformatics 19(1):79-86. 9. Kaytoue-Uberall M, Duplessis S, Napoli A (2008) Using formal concept analysis for the extraction of groups of co-expressed genes. In Modelling, Computation and Optimization in Information Systems and Management Sciences 439–449, Springer Berlin Heidelberg. 10. Amin I, Kassim SK, Hassanien A, Hefny HA (2012) Using formal concept analysis for mining hyomethylated genes among breast cancer tumors subtypes. In IEEE 12th International Conference on Intelligent Systems Design and Applications (ISDA) 764–769. 11. Serhiy A. Yevtushenko (2000) System of data analysis Concept Explorer (In Russian). In Proceedings of the 7th national conference on Artificial Intelligence KII-2000 Russia, 127– 134. 12. Raza K (2014) Clustering analysis of cancerous microarray data. Journal of Chemical and Pharmaceutical Research, 6(9):488–493. 13. Choi V, Huang Y, Lam V, Potter D, Laubenbacher R, Duca K (2008) Using formal concept analysis for microarray data comparison. Journal of bioinformatics and computational biology, 6(01):65–75 Formal Concept Analysis for Knowledge Discovery from Biological Data 13 14. Messai N, Devignes MD, Napoli A, Smail-Tabbone M (2008) Many-valued concept lattices for conceptual clustering and information retrieval. In ECAI 178:127–131 15. Melo C, Aufaure MA, Orphanides C, Andrews S, McLeod K, Burger A (2013) A conceptual approach to gene expression analysis enhanced by visual analytics. In Proceedings of the 28th Annual ACM Symposium on Applied Computing, ACM, 1314–1319 16. Hristoskova A, Boeva V, Tsiporkova E (2014) A formal concept analysis approach to consensus clustering of multi-experiment expression data. BMC Bioinformatics 15(151):1–16 17. Benabderrahmane S (2014) Formal concept analysis and knowledge integration for highlighting statistically enriched functions from microarrays data. International Work-Conference on Bioinformatics and Biomedical Engineering, IWBBIO 2014, Granda, Spain, 1. 18. Keller BJ, Eichinger F, Kretzler M (2012) Formal concept analysis of disease similarity. AMIA Summits on Translational Science Proceedings, 42–51 19. Bhavnani SK, Eichinger F, Martini S, Saxman P, Jagadish HV, Kretzler M (2009) Network analysis of genes regulated in renal diseases: implications for a molecular-based classification. BMC Bioinformatics 10(Suppl 9):S3 20. Raza K, Parveen R (2012) Soft computing approach for modeling genetic regulatory networks. Advances in Computing and Information Technology, Springer-Verlag, 178:1–12, doi: 10.1007/978-3-642-31600-5 1 21. Raza K, Jaiswal R (2013) Reconstruction and analysis of cancer-specific gene regulatory networks from gene expression profiles. International Journal on Bioinformatics & Biosciences 3(2):25–34, doi: 10.5121/ijbb.2013.3203 22. Gebert J, Motameny S, Faigle U, Forst CV, Schrader R (2008) Identifying genes of gene regulatory networks using formal concept analysis. Journal of Computational Biology 15(2):185– 194 23. Bartel HG, Nofz M (1997) Exploration of NMR data of glasses by means of formal concept analysis. Chemometrics and Intelligent Laboratory Systems, 36(1):53–63. 24. Coste F, Garet G, Groisillier A, Nicolas J, Tonon T (2014) Automated enzyme classification by formal concept analysis. In Formal Concept Analysis, Springer International Publishing, 235–250. 25. Han1 M-R, Chung H-J , Kim Jihun, Noh D-Y, Kim JH (2007) Protein classification from protein-domain and gene-ontology annotation information using formal concept analysis. Y. Shi et al. (Eds.): ICCS 2007, Part II, Springer-Verlag Berlin Heidelberg, LNCS 4488:347– 354. 26. Bresso E, Grisoni R, Devignes MD, Napoli A, Tabbone M (2012) Formal concept analysis for the interpretation of relational learning applied on 3D protein-binding sites. In Proceeding of 4th International Conference on Knowledge Discovery and Information Retrieval - KDIR 2012, Barcelona, Spain, 12. 27. Sugiyama M, Imajo K, Otaki K, Yamamoto A (2012) Semi-supervised ligand finding using formal concept analysis. IPSJ Transactions on Mathematical Modeling and Its Applications 5(2):39–48, doi: 10.2197/ipsjtrans.5.114 28. Mugumbate G, Newton AS, Rosenthal PJ, Gut J, Moreira R, Chibale K, et al. (2013) Novel anti-plasmodial hits identified by virtual screening of the ZINC database. J Comput Aided Mol Des. 27:859–71, doi: 10.1007/s10822-013-9685-zPMID:24158745 29. Lounkine E, Auer J, and Bajorath J (2008) Formal concept analysis for the identification of molecular fragment combinations specific for active and highly potent compounds. J. Med. Chem. 51:5342–5348, doi: 10.1021/jm800515r 30. Zafar A, Ahmad S, Rizvi A, Ahmad M (2015) Novel non-peptide inhibitors against SmCL1 of schistosoma mansoni: In silico elucidation, implications and evaluation via knowledge based drug discovery. PLoS ONE 10(5):e0123996, doi:10.1371/journal.pone.0123996 31. Priss U (2008) FcaStone - FCA file format conversion and interoperability software. Conceptual Structures Tool Interoperability Workshop (CS-TIW 2008). 32. Mhle H, Wende C (2010) Describing role-oriented software models in terms of formal concept analysis. In Proceedings of the 8th International Conference on Formal Concept Analysis, 241–254. Springer. 14 Khalid Raza 33. Galicia: Galois lattice interactive constructor. http://www.iro.umontreal.ca/galicia/features.html, Accessed on May 15, 2015. 34. Lahcen B, Kwuida L (2010) Lattice Miner: A tool for concept lattice construction and exploration. In Suplementary Proceeding of International Conference on Formal concept analysis (ICFCA’10). 35. Andrews S, Orphanides C (2010) FcaBedrock, a formal context creator. In Conceptual Structures: From Information to Intelligence, Springer Berlin Heidelberg, 181–184. 36. Borza PV, Sabou O, Sacarea C (2010) OpenFCA, an open source formal concept analysis toolbox. In Automation Quality and Testing Robotics (AQTR), 2010 IEEE International Conference on, 3:1–5.
5cs.CE
arXiv:1104.2835v3 [math.AC] 13 Oct 2013 Combinatorial properties and characterization of glued semigroups J. I. Garcı́a-Garcı́a∗ M.A. Moreno-Frı́as† A. Vigneron-Tenorio‡ Abstract This work focuses on the combinatorial properties of glued semigroups and provides its combinatorial characterization. Some classical results for affine glued semigroups are generalized and some methods to obtain glued semigroups are developed. Keywords: Gluing of semigroups, semigroup, semigroup ideal, simplicial complex, toric ideal. MSC-class: 20M14 (Primary), 20M05 (Secondary). Introduction Let S = hn1 , . . . , nl i be a finitely generated commutative semigroup with zero element which is reduced (i.e. S ∩ (−S) = {0}) and cancellative (if m, n, n0 ∈ S and m+n = m+n0 then n = n0 ). Under these settings if S is torsion-free then it is isomorphic to a subsemigroup of Np which means it is an affine semigroup (see [11]). From now on assume that all the semigroups appearing in this work are finitely generated, commutative, reduced and cancellative, but not necessarily torsion-free. Let k be a field and k[X1 , . . . , Xl ] the polynomial ring in l indeterminates. This polynomial ring is obviously an S−graded ring (by assigning the S-degree Pl ni to the indeterminate Xi , the S-degree of X α = X1α1 · · · Xlαl is i=1 αi ni ∈ S). It is well known that the ideal IS generated by ( ) l l X X α β X −X | α i ni = βi ni ⊂ k[X1 , . . . , Xl ] i=1 i=1 ∗ Departamento de Matemáticas, Universidad de Cádiz, E-11510 Puerto Real (Cádiz, Spain). E-mail: [email protected]. Partially supported by MTM2010-15595 and Junta de Andalucı́a group FQM-366. † Departamento de Matemáticas, Universidad de Cádiz, E-11510 Puerto Real (Cádiz, Spain). E-mail: [email protected]. Partially supported by MTM2008-06201-C02-02 and Junta de Andalucı́a group FQM-298. ‡ Departamento de Matemáticas, Universidad de Cádiz, E-11405 Jerez de la Frontera (Cádiz, Spain). E-mail: [email protected]. Partially supported by the grant MTM2007-64704 (with the help of FEDER Program), MTM2012-36917-C03-01 and Junta de Andalucı́a group FQM-366. 1 is an S−homogeneous binomial ideal called semigroup ideal (see [6] for details). If S is torsion-free, the ideal obtained defines a toric variety (see [12] and the references therein). By Nakayama’s lemma, all the minimal generating sets of IS have the same cardinality and the S−degrees of its elements can be determinated. The main goal of this work is to study the semigroups which result from the gluing of others two. This concept was introduced by Rosales in [10] and it is closely related with complete intersection ideals (see [13] and the references therein). A semigroup S minimally generated by A1 t A2 (with A1 = {n1 , . . . , nr } and A2 = {nr+1 , . . . , nl }) is the gluing of S1 = hA1 i and S2 = hA2 i if there exists a set of generators ρ of IS of the form ρ = ρ1 ∪ 0 ρ2 ∪ {X γ − X γ }, where ρ1 , ρ2 are generating sets of IS1 and IS2 respectively, γ γ0 X − X ∈ IS and the supports of γ and γ 0 verify supp (γ) ⊂ {1, . . . , r} and supp (γ 0 ) ⊂ {r + 1, . . . , l}. Equivalently, S is the gluing of S1 and S2 if 0 IS = IS1 + IS2 + hX γ − X γ i. A semigroup is a glued semigroup when it is the gluing of others two. As seen, glued semigroups can be determinated by the minimal generating sets of IS which can be studied by using combinatorial methods from certain simplicial complexes (see [1], [4] and [7]). In this work the simplicial complexes used are defined as follows: for any m ∈ S, set Cm = {X α = X1α1 · · · Xlαl | l X αi ni = m} (1) i=1 and the simplicial complex ∇m = {F ⊆ Cm | gcd(F ) 6= 1}, (2) with gcd(F ) the greatest common divisor of the monomials in F. Furthermore, some methods which require linear algebra and integer programming are given to obtain examples of glued semigroups. The content of this work is organized as follows. Section 1 presents the tools to generalize to non torsion-free semigroups a classical characterization of affine gluing semigroups (Proposition 2). In Section 2, the non-connected simplicial complexes ∇m associated to glued semigroups are studied. By using the vertices of the connected components of these complexes we give a combinatorial characterization of glued semigroups as well as their glued degrees (Theorem 6). Besides, in Corollary 7 we deduce the conditions in order the ideal of a glued semigroup to be uniquely generated. Finally, Section 3 is devoted to the construction of glued semigroups (Corollary 10) and affine glued semigroups (Subsection 3.1). 1 Preliminaries and generalizations about glued semigroups A binomial of IS is called indispensable if it is an element of all system of generators of IS (up to a scalar multiple). This kind of binomials were introduced in [9] and they have an important role in Algebraic Statistics. In [8] the authors characterize indispensable binomials by using simplicial complexes ∇m . Note 2 that if IS is generated by its indispensable binomials, it is uniquely generated up to a scalar multiples. With the above notation, the semigroup S is associated Pl to the lattice ker S formed by the elements α = (α1 , . . . , αl ) ∈ Zl such that i=1 αi ni = 0. Given G a system of generators of IS , the lattice ker S is generated by the elements α − β with X α − X β ∈ G and ker S also verifies that ker S ∩ Nl = {0} if and only if S is reduced. If M(IS ) is a minimal generating set of IS , denote by M(IS )m ⊂ M(IS ) the set of elements whose S−degree is equal to m ∈ S and by Betti(S) the set of the S−degrees of the elements of M(IS ). When IS is minimally generated by rank(ker S) elements, the semigroup S is called a complete intersection semigroup. Let C(∇m ) be the number of connected components of ∇m . The cardinality of M(IS )m is equal to C(∇m ) − 1 (see Remark 2.6 in [1] and Theorem 3 and Corollary 4 in [7]) and the complexes associated to the elements in Betti(S) are non-connected. Construction 1. ([4, Proposition 1]). For each m ∈ Betti(S) the set M(IS )m is obtained by taking C(∇m ) − 1 binomials with monomials in different connected components of ∇m satisfying that two different binomials have not their corresponding monomials in the same components and fulfilling that there is at least a monomial of every connected component of ∇m . This let us construct a minimal generating set of IS in a combinatorial way. Let S be minimally1 generated by A1 t A2 with A1 = {a1 , . . . , ar } and A2 = {b1 , . . . , bt }. From now on, identify the sets A1 and A2 with the matrices (a1 | · · · |ar ) and (b1 | · · · |bt ). Denote by k[A1 ] and k[A2 ] the polynomial rings k[X1 , . . . , Xr ] and k[Y1 , . . . , Yt ], respectively. A monomial is a pure monomial if it has indeterminates only in X1 , . . . , Xr or only in Y1 , . . . , Yt , otherwise it is a mixed monomial. If S is the gluing of S1 = hA1 i and S2 = hA2 i, then the binomial X γX −Y γY ∈ IS is a glued binomial if M(IS1 )∪M(IS2 )∪{X γX −Y γY } is a generating set of IS and in this case the element d = S-degree(X γX ) ∈ S is called a glued degree. It is clear that if S is a glued semigroup, the lattice ker S has a basis of the form {L1 , L2 , (γX , −γY )} ⊂ Zr+t , (3) where the supports of the elements in L1 are in {1, . . . , r}, the supports of the elements in L2 are in {r + 1, . . . , r + t}, ker Si = hLi i (i = 1, 2) by considering only the coordinates in {1, . . . , r} or {r+1, . . . , r+t} of Li , and (γX , γY ) ∈ Nr+t . Moreover, since S is reduced, one has that hL1 i ∩ Nr+t = hL2 i ∩ Nr+t = {0}. Denote by {ρ1i }i the elements in L1 and by {ρ2i }i the elements in L2 . The following Proposition generalizes [10, Theorem 1.4] to non-torsion free semigroups. Proposition 2. The semigroup S is the gluing of S1 and S2 if and only if there exists d ∈ (S1 ∩ S2 ) \ {0} such that G(S1 ) ∩ G(S2 ) = dZ, where G(S1 ), G(S2 ) and dZ are the associated commutative groups of S1 , S2 and {d}, respectively. 1 We consider a minimal generator set of S, in the other case S is trivially the gluing of the semigroup generated by one of its non minimal generators and the semigroup generated by the others. 3 Proof. Assume that S is the gluing of S1 and S2 . In this case, ker S is generated by the set (3). Since (γX , −γY ) ∈ ker S, the element d is equal to A1 γX = A2 γY ∈ S and d ∈ S1 ∩ S2 ⊂ G(S1 ) ∩ G(S2 ). Let d0 be in G(S1 ) ∩ G(S2 ), then there exists (δ1 , δ2 ) ∈ Zr × Zt such that d0 = A1 δ1 = A2 δ2 . Therefore (δ1 , −δ2 ) ∈ ker S because (A1 |A2 )(δ1 , −δ2 ) = 0 and so there exist λ, λρi 1 , λρi 2 ∈ Z satisfying  P ρ1  (δ1 , 0) = i λi ρ1i + λ(γX , 0)  (0, δ2 ) − = P i λρi 2 ρ2i + λ(0, γY ), P and d0 = A1 δ1 = i λρi 1 (A1 |0)ρ1i + λA1 γX = λd. We conclude that G(S1 ) ∩ G(S2 ) = dZ with d ∈ S1 ∩ S2 . Conversely, suppose there exists d ∈ (S1 ∩S2 )\{0} such that G(S1 )∩G(S2 ) = dZ. We see IS = IS1 +IS2 +hX γX −Y γY i. Trivially, IS1 +IS2 +hX γX −Y γY i ⊂ IS . Let X α Y β −X γ Y δ be a binomial in IS . Its S−degree is A1 α+A2 β = A1 γ +A2 δ. Using A1 (α − γ) = A2 (β − δ) ∈ G(S1 ) ∩ G(S2 ) = dZ, there exists λ ∈ Z such that A1 α = A1 γ + λd and A2 δ = A2 β + λd. We have the following cases: • If λ = 0, X αY β − X γ Y δ = X αY β − X γ Y β + X γ Y β − X γ Y δ = = Y β (X α − X γ ) + X γ (Y β − Y δ ) ∈ IS1 + IS2 . • If λ > 0, X αY β − X γ Y δ = = X α Y β −X γ X λγX Y β +X γ X λγX Y β −X γ X λγY Y β +X γ X λγY Y β −X γ Y δ = = Y β (X α − X γ X λγX ) + X γ Y β (X λγX − Y λγY ) + X γ (Y λγY Y β − Y δ ). Using that X λγX −Y λγY = (X γX −Y γY ) λ−1 X ! X (λ−1−i)γX Y iγY , i=0 the binomial X α Y β − X γ Y δ belongs to IS1 + IS2 + hX γX − Y γY i. • The case λ < 0 is solved similarly. We conclude that IS = IS1 + IS2 + hX γX − Y γY i. From above proof it is deduced that given the partition of the system of generators of S the glued degree is unique. 2 Glued semigroups and combinatorics Glued semigroups by means of non-connected simplicial complexes are characterized. For any m ∈ S, redefine Cm from (1), as Cm = {X α Y β = X1α1 · · · Xrαr Y1β1 · · · Ytβt | r X i=1 4 αi ai + t X i=1 βi bi = m} and consider the sets of vertices and the simplicial complexes A1 Cm = {X1α1 · · · Xrαr | r X A1 1 αi ai = m}, ∇A m = {F ⊆ Cm | gcd(F ) 6= 1}, i=1 A2 Cm = {Y1β1 · · · Ytβt | t X A2 2 βi bi = m}, ∇A m = {F ⊆ Cm | gcd(F ) 6= 1}, i=1 where A1 = {a1 , . . . , ar } and A2 = {b1 , . . . , bt } as in Section 1. Trivially, the A2 1 relations between ∇A m , ∇m and ∇m are A1 A2 A2 1 ∇A m = {F ∈ ∇m |F ⊂ Cm }, ∇m = {F ∈ ∇m |F ⊂ Cm }. (4) The following result shows an important property of the simplicial complexes associated to glued semigroups. Lemma 3. Let S be the gluing of S1 and S2 , and m ∈ Betti(S). Then all the connected components of ∇m have at least a pure monomial. In addition, all mixed monomials of ∇m are in the same connected component. Proof. Suppose that there exists C, a connected component of ∇m only with mixed monomials. By Construction 1 in all generating sets of IS there is at least a binomial with a mixed monomial, but this does not occur in M(IS1 ) ∪ M(IS2 ) ∪ {X γX − Y γY } with X γX − Y γY a glued binomial. Since S is a glued semigroup, ker S has a system of generators as (3). Let X α Y β , X γ Y δ ∈ Cm be two monomials such that gcd(X α Y β , X γ Y δ ) = 1. In this case, (α, β) − (γ, δ) ∈ ker S and there exist λ, λρi 1 , λρi 2 ∈ Z satisfying:  P ρ1  (α − γ, 0) = i λi ρ1i + λ(γX , 0)  (0, β − δ) = P i λρi 2 ρ2i − λ(0, γY ) • If λ = 0, α − γ ∈ ker S1 and β − δ ∈ ker S2 , then A1 α = A1 γ, A2 β = A2 δ and X α Y δ ∈ Cm . P • If λ > 0, (α, 0) = i λρi 1 ρ1i + λ(γX , 0) + (γ, 0) and X ρ A1 α = λi 1 (A1 |0)ρ1i + λA1 γX + A1 γ = λd + A1 γ, i then X λγX X γ Y β ∈ Cm . • The case λ < 0 is solved likewise. In any case, X α Y β and X γ Y δ are in the same connected component of ∇m . We now describe the simplicial complexes that correspond to the S−degrees which are multiples of the glued degree. Lemma 4. Let S be the gluing of S1 and S2 , d ∈ S the glued degree and d0 ∈ S \ {d}. Then CdA0 1 6= ∅ = 6 CdA0 2 if and only if d0 ∈ (dN) \ {0}. Furthermore, the simplicial complex ∇d0 has at least one connected component with elements in CdA0 1 and CdA0 2 . 5 Pr Pt Proof. If there exist X α , Y β ∈ Cd0 , then d0 = i=1 αi ai = i=1 βi bi ∈ S1 ∩S2 ⊂ G(S1 ) ∩ G(S2 ) = dZ. Hence, d0 ∈ dN. Conversely, let d0 = jd with j ∈ N and j > 1 and take X γX − Y γY ∈ IS be a glued binomial. It is easy to see that X jγX , Y jγY ∈ Cd0 and thus {X jγX , X (j−1)γX Y γY } and {X (j−1)γX Y γY , Y jγY } belong to ∇d0 . The following Lemma is a combinatorial version of [5, Lemma 9] and it is a necessary condition of Theorem 6. Lemma 5. Let S be the gluing of S1 and S2 , and d ∈ S the glued degree. Then the elements of Cd are pure monomials and d ∈ Betti(S). Proof. The order S defined by m0 S m if m − m0 ∈ S is a partial order on S. Assume there exists a mixed monomial T ∈ Cd . By Lemma 3, there exists a pure monomial Y b in Cd such that {T, Y b } ∈ ∇d (the proof is analogous if we consider X a with {T, X a } ∈ ∇d ). Now take T1 = gcd(T, Y b )−1 T and Y b1 = gcd(T, Y b )−1 Y b . Both monomials are in Cd0 , where d0 is equal to d minus the S−degree of gcd(T, Y b ). By Lemma 4, if CdA0 1 6= ∅ then d0 ∈ dN, but since d0 ≺S d this is not possible. So, if T1 is a mixed monomial and CdA0 1 = ∅, then CdA0 2 6= ∅. If there exists a pure monomial in CdA0 2 connected to a mixed monomial in Cd0 , we perform the same process obtaining T2 , Y b2 ∈ Cd00 with T2 a mixed monomial and d00 ≺S d0 . This process can be repeated if there exist a pure monomial and a mixed monomial in the same connected component. By degree reasons this cannot be performing indefinitely, an element d(i) ∈ Betti(S) verifying that ∇d(i) is not connected having a connected component with only mixed monomials is found. This contradicts Lemma 3. After examining the structure of the simplicial complexes associated to glued semigroups, we enunciate a combinatorial characterization by means of the nonconnected simplicial complexes ∇m . Theorem 6. The semigroup S is the gluing of S1 and S2 if and only if the following conditions are fulfilled: 1. For all d0 ∈ Betti(S), any connected component of ∇d0 has at least a pure monomial. 2. There exists a unique d ∈ Betti(S) such that CdA1 6= ∅ 6= CdA2 and the elements in Cd are pure monomials. 3. For all d0 ∈ Betti(S) \ {d} with CdA0 1 6= ∅ = 6 CdA0 2 , d0 ∈ dN. Besides, the above d ∈ Betti(S) is the glued degree. Proof. If S is the gluing of S1 and S2 , the result is obtained from Lemmas 3, 4 and 5. Conversely, by hypothesis 1 and 3, given d0 ∈ Betti(S)\{d} the set M(IS1 )d0 is constructed from CdA0 1 and M(IS2 )d0 from CdA0 2 as in Construction 1. Analogously, if d ∈ Betti(S), the set M(IS )d is obtained from the union of M(IS1 )d , M(IS2 )d and the binomial X γX −Y γY with X γX ∈ CdA1 and Y γY ∈ CdA2 . Finally   G M(IS1 )m t M(IS2 )m t {X γX − Y γY } m∈Betti(S) is a generating set of IS and S is the gluing of S1 and S2 . 6 From Theorem 6 we obtain an equivalent property to Theorem 12 in [5] by using the language of monomials and binomials. Corollary 7. Let S be the gluing of S1 and S2 , and X γX − Y γY ∈ IS a glued binomial with S−degree d. The ideal IS is minimally generated by its indispensable binomials if and only if the following conditions are fulfilled: • The ideals IS1 and IS2 are minimally generated by their indispensable binomials. • The element X γX − Y γY is an indispensable binomial of IS . • For all d0 ∈ Betti(S), the elements of Cd0 are pure monomials. Proof. Suppose that IS is generated by its indispensable binomials. By [8, Corollary 6], for all m ∈ Betti(S) the simplicial complex ∇m has only two vertices. By Contruction 1 ∇d = {{X γX }, {Y γY }} and by Theorem 6 for all A2 1 d0 ∈ Betti(S) \ {d} the simplicial ∇d0 is equal to ∇A d0 or ∇d0 . In any case, γX γY X −Y ∈ IS is an indispensable binomial, and IS1 , IS2 are generated by their indispensable binomials. Conversely, suppose that IS is not generated by its indispensable binomials. Then, there exists d0 ∈ Betti(S) \ {d} such that ∇d0 has more than two vertices in at least two different connected components. By hypothesis, there are not mixed monomials in ∇d0 and thus: A2 1 • If ∇d0 is equal to ∇A d0 (or ∇d0 ), then IS1 (or IS2 ) is not generated by its indispensable binomials. • Otherwise, CdA0 1 6= ∅ = 6 CdA0 2 and by Lemma 4, d0 = jd with j ∈ N, therefore (j−1)γX γY X Y ∈ Cd0 which contradicts the hypothesis. We conclude IS is generated by its indispensable binomials. The following example taken from [13] illustrates the above results. Example 8. Let S ⊂ N2 be the semigroup generated by the set {(13, 0), (5, 8), (2, 11), (0, 13), (4, 4), (6, 6), (7, 7), (9, 9)} . In this case, Betti(S) is {(15, 15), (14, 14), (12, 12), (18, 18), (10, 55), (15, 24), (13, 52), (13, 13)}. Using the appropriated notation for the indeterminates in the polynomial ring k[x1 , . . . , x4 , y1 , . . . , y4 ] (x1 , x2 , x3 and x4 for the first four generators of S and y1 , y2 , y3 , y4 for the others), the simplicial complexes associated to the elements in Betti(S) are those that appear in Table 1. From this table and by using Theorem 6, the semigroup S is the gluing of h(13, 0), (5, 8), (2, 11), (0, 13)i and h(4, 4), (6, 6), (7, 7), (9, 9)i and the glued degree is (13, 13). From Corollary 7, the ideal IS is not generated by its indispensable binomials (IS has only four indispensable binomials). 7 C(15,15) = {y12 y3 , y2 y4 } C(14,14) = {y12 y2 , y32 } C(12,12) = {y13 , y22 } C(10,55) = {x21 x4 , x53 } ∇(15,15) ∇(14,14) ∇(12,12) ∇(10,55) Ys Ys Ys Xs C(18,18) = {y12 y2 , y23 , y1 y32 , y42 } ∇(18,18) C(15,24) = {x1 x2 x3 , x32 , x3 y1 y4 , x3 y2 y3 } ∇(15,24) C(13,52) = {x2 x43 , x1 x44 , x34 y1 y4 , x34 y2 y3 } ∇(13,52) C(13,13) = {x1 x4 , y1 y4 , y2 y3 } ∇(13,13) Ys Xs Ys Xs Ys Ys Table 1: Non-connected simplicial complexes associated to Betti(S). 3 Generating glued semigroups In this section, an algorithm to obtain examples of glued semigroups is given. Consider A1 = {a1 , . . . , ar } and A2 = {b1 , . . . , bt } two minimal generator sets of the semigroups T1 and T2 and let Lj = {ρji }i be a basis of ker Tj with j = 1, 2. Assume that IT1 and IT2 are nontrivial proper ideals of their corresponding polynomial rings. Consider γX and γY be two nonzero elements in Nr and Nt respectively2 , and the integer matrix   L1 0 L2  . (5) A= 0 γX −γY Let S be a semigroup such that ker S is the lattice generated by the rows of the matrix A. This semigroup can be computed by using the Smith Normal Form (see [11, Chapter 3]). Denote by B1 , B2 two sets of cardinality r and t respectively satisfying S = hB1 , B2 i and ker(hB1 , B2 i) is generated by the rows of A. The following Proposition shows that the semigroup S satisfies one of the necessary conditions to be a glued semigroup. Proposition 9. The semigroup S verifies G(hB1 i) ∩ G(hB2 i) = (B1 γX )Z = (B2 γY )Z with d = B1 γX ∈ hB1 i ∩ hB2 i. Proof. Use that ker S has a basis as (3) and proceed as in the proof of the necessary condition of Proposition 2. Due to B1 ∪ B2 may not be a minimal generating set, this condition does not assure that S is a glued semigroup. For instance, taking the numerical semigroups T1 = h3, 5i, T2 = h2, 7i and (γX , γY ) = (1, 0, 2, 0), the matrix obtained 2 Note that γX ∈ / ker T1 and γY ∈ / ker T2 because these semigroups are reduced. 8 Xs from formula (5) is  5  0 1 −3 0 0 7 0 −2  0 −2  0 and B1 ∪ B2 = {12, 20, 6, 21} is not a minimal generating set. The following result solve this issue. Corollary 10. The semigroup S is a glued semigroup if r X γXi > 1 and i=1 t X γY i > 1. (6) i=1 Proof. Suppose that the set of generators B1 ∪ B2 of S is non-minimal, thus one of its elements is a natural combination of the others. Assume that this element is the first of B1 ∪ B2 , then there exist λ2 , . . . , λr+t ∈ N such that B1 (1, −λ2 , . . . , −λr ) = B2 (λr+1 , . . . , λr+t ) ∈ G(hB1 i)∩G(hB2 i). By Proposition 9, there exists λ ∈ Z satisfying B1 (1, −λ2 , . . . , −λr ) = B2 (λr+1 , . . . , λr+t ) = B1 (λγX ). Since B2 (λr+1 , . . . , λr+t ) ∈ S, λ ≥ 0 and thus ν = (1 − λγX1 , −λ2 − λγX2 , . . . , −λr − λγXr ) ∈ ker(hB1 i) = ker T1 , {z } | ≤0 with the following cases: • If λγX1 = 0, then T1 is not minimally generated which it is not possible by hypothesis. • If λγX1 > 1, then 0 > ν ∈ ker T1 , but this is not possible due to T1 is a reduced semigroup. • If λγX1 = 1, then λ = γX1 = 1 and ν = (0, −λ2 − γX2 , . . . , −λr − γXr ) ∈ ker T1 . {z } | ≤0 If λi + γXi 6= 0 for some i = 2, . . . , r, then T1 is not a reduced semigroup. This implies λi = γXi = 0 for all i = 2, . . . , r. We have just proved that γX = (1, 0, . . . , 0). In the general case, if S is not minimally generated it is because either γX or γY are elements in the canonical bases of Nr or Nt , respectively. To avoidPthis situation, it is sufficient to take Pr t γX and γY satisfying i=1 γXi > 1 and i=1 γY i > 1. From the above result we obtain a characterization of glued semigroups: S is a glued semigroup if and only if ker S has a basis as (3) satisfying Condition (6). Example 11. Let T1 = h(−7, 2), (11, 1), (5, 0), (0, 1)i ⊂ Z2 and T2 = h3, 5, 7i ⊂ N be two reduced affine semigroups. We compute their associated lattices ker T1 = h(1, 2, −3, −4), (2, −1, 5, −3)i and ker T2 = h(−4, 1, 1), (−7, 0, 3)i. 9 If we take γX = (2, 0, 2, 0) and γY = (1, 2, 1), the matrix A is   1 2 −3 −4 0 0 0  2 −1 5 −3 0 0 0     0 0 0 0 −4 1 1     0 0 0 0 −7 0 3  2 0 2 0 −1 −2 −1 and the semigroup S ⊂ Z4 × Z2 is generated by {(1, −5, 35), (3, 12, −55), (1, 5, −25), (0, 1, 0), (2, 0, 3), (2, 0, 5), (2, 0, 7)}. | {z } | {z } B1 B2 The semigroup S is the gluing of the semigroups hB1 i and hB2 i and ker S is generated by the rows of the above matrix. The ideal IS ⊂ C[x1 , . . . , x4 , y1 , . . . , y3 ] is generated3 by {x1 x83 x4 − x32 , x1 x22 − x33 x44 , x21 x53 − x2 x34 , x31 x2 x23 − x77 , y1 y3 − y22 , y13 y2 − y32 , y14 − y2 y3 , x21 x23 − y15 y2 }, {z } | glued binomial then S is really a glued semigroup. 3.1 Generating affine glued semigroups From Example 11 it be can deduced that the semigroup S is not necessarily torsion-free. In general, a semigroup T is affine (or equivalently it is torsionfree) if and only if the invariant factors4 of the matrix whose rows are a basis of ker T are equal to one. Assume zero-columns of the Smith Normal Form of a matrix are located on its right side. We now show conditions for S being torsion-free. Take L1 and L2 the matrices whose rows form a basis of ker T1 and ker T2 , respectively and let P1 , P2 , Q1 and Q2 be some matrices with determinant ±1 (i.e. unimodular matrices) such that D1 = P1 L1 Q1 and D2 = P2 L2 Q2 are the Smith Normal Form of L1 and L2 , respectively. If T1 and T2 are two affine semigroups, the invariant factors of L1 and L2 are equal to 1. Then        D1 0 P1 0 0 L1 0 Q1 0  0 D2  =  0 P2 0   0 L2  , (7) 0 Q2 0 γX γY0 0 0 1 γX −γY {z } | =:A 0 where γX = γX Q1 and γY0 = −γY Q2 . Let s1 and s2 be the numbers of zerocolumns of D1 and D2 (s1 , s2 > 0 because T1 and T2 are reduced, see [11, Theorem 3.14]). Lemma 12. The semigroup S is an affine semigroup if and only if   0 gcd {γXi }ri=r−s1 ∪ {γY0 i }ti=t−s2 = 1. 3 See [14] to compute IS when S has torsion. invariant factors of a matrix are the diagonal elements of its Smith Normal Form (see [2, Chapter 2] and [11, Chapter 2]). 4 The 10 Proof. With the conditions fulfilled by T1 , T2 and (γX , γY ), the necessary and sufficient condition for the invariant factors of A to be all equal to one is   0 t 0 r gcd {γXi }i=r−s1 ∪ {γY i }i=t−s2 = 1. The following Corollary gives the explicit conditions that γX and γY must satisfy to construct an affine semigroup. Corollary 13. The semigroup S is an affine glued semigroup if and only if: 1. T1 and T2 are two affine semigroups. 2. (γX , γY ) ∈ Nr+t . Pr Pt 3. i=1 γXi , i=1 γY i > 1. 4. There exist fr−s1 , . . . , fr , gt−s2 , . . . , gt ∈ Z such that 0 0 , . . . , γXr (fr−s1 , . . . , fr )·(γX(r−s )+(gt−s2 , . . . , gt )·(γY0 (t−s2 ) , . . . , γY0 t ) = 1. 1) Proof. It is trivial by the given construction, Corollary 10 and Lemma 12. Therefore, to obtain an affine glued semigroup it is enough to take two affine semigroups and any solution (γX , γY ) of the equations of the above corollary. Example 14. Let T1 and T2 be the semigroups of Example 11. We compute two elements γX = (a1 , a2 , a3 , a4 ) and γY = (b1 , b2 , b3 ) in order to obtain an affine semigroup. First of all, we perform a decomposition of the matrix as (7) by computing the integer Smith Normal Form of L1 and L2 :  1 0 0 0  0 1 0 0   0 0 0 0   0 0 0 0 a1 a1 − 2a2 − a3 −7a1 + 11a2 + 5a3 2a1 + a2 + a4  0 0 0  0 0 0  = 1 0 0   0 1 0 −b1 b1 + 2b2 + 3b3 −3b1 − 5b2 − 7b3   1 0  2 −1  0 0  0 0 0 0 0 0 0 0 −2 1 7 −4 0 0  0 1 2 −3 −4  2 −1 5 −3 0   0  0 0 0 0 0  0 0 0 0 1 a1 a2 a3 a4 0 0 0 0 −4 1 −7 0 −b1 −b2 1 1 −7 2  0 −2 11 1 0   0    0 −1 5 0  1  0 0 0 1 3  0 0 0 0 −b3  0 0 0 0 0 0 0 0   0 0 0 0 0 0  0 0 0  0 0 0  1 −1 3   0 −2 5  0 −3 7 Second, by Corollary 13, we must find a solution to the system:  a1 + a2 + a3 + a4 > 1    b1 + b2 + b3 > 1 f1 , f2 , g1 ∈ Z    f1 (−7a1 + 11a2 + 5a3 ) + f2 (2a1 + a2 + a4 ) + g1 (−3b1 − 5b2 − 7b3 ) = 1 with a1 , a2 , a3 , a4 , b1 , b2 , b3 ∈ N. Such solution is computed (in less than a second) using FindInstance of Wolfram Mathematica (see [15]): FindInstance[(−7a1 +11a2 +5a3 )∗f1 +(2a1 +a2 +a4 )∗f2 +(−3b1 −5b2 −7b3 )∗g1 == 1 && a1+a2+a3+a4 > 1&& b1 +b2 +b3 > 1&& a1 ≥ 0&& a2 ≥ 0&& a3 ≥ 0&& a4 ≥ 0 11 && b1 ≥ 0&& b2 ≥ 0&& b3 ≥ 0, {a1 , a2 , a3 , a4 , b1 , b2 , b3 , f1 , f2 , g1 }, Integers ]  {{a1 → 0, a2 → 0, a3 → 3, a4 → 0, b1 → 1, b2 → 1, b3 → 0, f1 → 1, f2 → 0, g1 → 0}} We now take γX = (0, 0, 3, 0) and γY = (1, 1, 0), and construct the matrix   1 2 −3 −4 0 0 0  2 −1 5 −3 0 0 0    0 0 0 0 −4 1 1  A= .   0 0 0 0 −7 0 3  0 0 3 0 −1 −1 0 We have the affine semigroup S ⊂ Z2 which is minimally generated by {(2, −56), (1, 88), (0, 40), (1, 0), (0, 45), (0, 75), (0, 105)} | {z } | {z } B1 B2 satisfies that ker S is generated by the rows of A and it is the result of gluing the semigroups hB1 i and hB2 i. The ideal IS is generated by {x1 x83 x4 − x32 , x1 x22 − x33 x44 , x21 x53 − x2 x34 , x31 x2 x23 − x74 , y1 y3 − y22 , y13 y2 − y32 , y14 − y2 y3 , x33 − y1 y2 }, | {z } glued binomial therefore, S is a glued semigroup. All glued semigroups have been computed by using our programm ecuaciones which is available in [3] (this programm requires Wolfram Mathematica 7 or above to run). References [1] E. Briales, A. Campillo, C. Marijuán, P. Pisón. Minimal Systems of Generetors for Ideals of Semigroups. J. Pure Appl. Algebra 124 (1998), 7–30. [2] H. Cohen. A Course in Computational Algebraic Number Theory, Graduate Texts in Mathematics, 138, Springer-Verlag, 1996. [3] Ecuaciones. http://www.uca.es/dpto/C101/pags-personales/ alberto.vigneron/1ecuaciones.rar [4] S. Eliahou. Courbes monomiales et algébre de Rees symbolique. PhD Thesis. Université of Genève, 1983. [5] P. A. Garcia-Sanchez, I. Ojeda. Uniquely presented finitely generated commutative monoids. Pacific J. Math. 248(1) (2010), 91–105. [6] J. Herzog. Generators and relations of abelian semigroups and semigroup rings. Manuscripta Math. 3 (1970) 175–193. 12 [7] I. Ojeda, A. Vigneron-Tenorio. Simplicial complexes and minimal free resolution of monomial algebras. J. Pure Appl. Algebra 214 (2010), 850–861. [8] I. Ojeda, A. Vigneron-Tenorio. Indispensable binomials in semigroup ideals. Proc. Amer. Math. Soc. 138 (2010), 4205–4216. [9] H. Ohsugi, T. Hibi. Toric ideals arising from contingency tables. Commutative Algebra and Combinatorics. Ramanujan Mathematical Society Lecture Notes Series, Vol. 4, Ramanujan Mathematical Society, Mysore, India, 2007, pp. 91-115. [10] J.C. Rosales. On presentations of subsemigroups of Nn . Semigroup Forum 55 (1997), no. 2, 152–159. [11] J.C. Rosales, P.A. Garcı́a-Sánchez. Finitely generated commutative monoids. Nova Science Publishers, Inc., New York, 1999. [12] B. Sturmfels. Gröbner bases and convex polytopes, volume 8 of University Lecture Series. American Mathematical Society, Providence, RI, 1996. [13] A. Thoma. Construction of Set Theoretic Complete Intersections via Semigroup Gluing. Beiträge Algebra Geom. 41(1) (2000), 195–198. [14] A. Vigneron-Tenorio. Semigroup Ideals and Linear Diophantine Equations. Linear Algebra and its Applications 295 (1999), 133–144. [15] Wolfram Mathematica. http://www.wolfram.com/mathematica/ 13
0math.AC
September 12, 2014 The Distributed Language V1.0.3 ( alpha ) White Paper Boris Burshteyn [email protected] Hello White Paper V1.0.3 (alpha) One Solution Abstract Hello is a general-purpose, object-oriented, protocol-agnostic distributed programming language. This paper explains the ideas that guided design of Hello. It shows the spirit of Hello using two brief expressive programs and provides a summary of language features. In addition, it explores historical parallels between the binary programming of early computers and the distributed programming of modern networks. Hello documentation, translator and runtime engine are freely available at [14]. 1 Preface “Whether oratory is a creation of rules, or of training, or of natural gifts, it is the most difficult of all things to achieve.” Cicero, “The Brutus,” 46 B.C.E. Cicero – the most gifted orator of all times – had realized the extreme difficulty of communication more than two thousand years ago. Obviously, there were no computers when he made his famous speeches in the Roman Courts, Assemblies, and Senate, and wrote treatises about the oratory art. At that time, his talents flourished in the area of oneway human communication. Today computers exchange code and data across the networks with the help of sophisticated hardware devices, intricate networking protocols and elaborate software systems. This immensely complex communication infrastructure makes creation of networking software an extremely difficult and costly enterprise. Thus, the Cicero’s quote remains true when applied to modern computer networking – distributed software is one of the hardest fields of software engineering. The distributed applications orchestrate computations across the network while utilizing a multitude of collaborating computers. Their development demands significant investments in labor, time, and finances. Therefore, a relentless quest for a silver bullet that would reduce the development efforts continues. This paper presents Hello -- a general-purpose, objectoriented, imperative, protocol-agnostic programming language for writing distributed software. Its unique first-class distributed language features put Hello in an excellent position to cut the costs and ease the pain of the distributed software development. 2 Background The idea to create a distributed programming language emerged during the long experience of designing and implementing commercial-grade networking applications as diverse as a Distributed Database, High Availability Cluster Monitor, MAPI-based Email Server (via wire-level protocol discovery), and a Video-Conferencing Server. During that work, communication libraries implemented abstractions that hid the underlying network protocol. These abstractions represented interconnected servers communicating over the network between themselves and with clients. Page 2 September 12, 2014 3 Three Problems Although the applications were quite different, they abstracted the distributed hardware and software in a similar way. Still, the abstractions had to be implemented each time anew as all systems had re-invented many of the same building blocks: the re-programming involved remote objects, connections, messages, queues, jobs, replies, timeouts, state changes, failures, and others. Because the language in hand had no first-class distributed features, it needed help of extraneous distributed libraries. However, since the language knew nothing about the libraries, which offered only low level networking interface, the coding and debugging were difficult for programmers while the optimization was impossible for a translator. At the end, there were no time and project resources left to improve efficiency and reliability of the communication components. In summary, the following three problems characterized many distributed systems: 1) Repeated re-coding of the same distributed primitives. 2) Challenging development process due to the combination of a programming language and extraneous library. 3) Inefficient and unreliable distributed code. 4 One Solution Those repetitive efforts had built determination to develop distributed primitives for reuse in a diverse spectrum of applications. To embed them in the language was a logical choice because it offered simultaneous simplicity of thought and efficiency of code1. The distributed programming language has nicely solved all three problems mentioned above: 1) Since the first-class distributed language features are always available, there is no need to re-implement them for every new application. 2) These protocol-agnostic features, being higher level than the library interfaces, cut the need for extraneous tools while simplifying development and debugging. 3) The distributed object-oriented language architecture and the optimizing translator raise the efficiency, reliability, and security of the distributed code. The distributed elements, implemented in both the language translator and its runtime system, become as ubiquitous as are the local primitives like heap, stack, method, class, variable, and object. Therefore, one does not need extraneous libraries, but can rely only on the language translator, and runtime to achieve the productive software development combined with the efficient and reliable distributed code. Thus, the distributed programming language Hello was born to blend the protocol-agnostic network model into the fabric of an object-oriented paradigm. 1 It was also natural because the author had extensive experience with parser generators and a variety of language frontends. V1.0.3 (alpha) Hello, World! 5 Language Design Goals One of the primary goals set during the Hello design was its future widespread adoption by the software engineering community. Therefore, it was crucial to come up with a general-purpose language, avoiding the danger of falling into a niche of specialized languages [20]. Another goal was to abstract in the language the components of the entire network and its protocols. The abstraction level should be high enough to conceal the mundane intricacies of the rigid protocol interfaces, yet not too high to make the language overly specialized. In addition, distributed primitives were meant to become a crucial part of the language, but not its dominant part: the language core should remain filled with general-purpose abstractions for sequential computations, which are running on a single host. Towards these goals, the lower-level distributed abstractions embedded into the language’s type system, augmented by a few imperative operations, had been invented. Any particular distributed semantics can now be derived from a combination of the Hello distributed primitives -engines, hosts, queues, partitions, groups, messages, events, and remote references -- and their operations. 6 Language Design Principle Historically, single-host general-purpose languages abstract the computer memory, memory-stored programs, and CPU from the computer hardware architecture first articulated in 1945 by J. von Neumann in [21]. However, distributed abstractions should differ from single-host abstractions because of the following fundamental differences between the single-host and distributed architectures. As J. Backus explained in [1], imperative single-host languages are designed so that their programs reflect the linear structure of the von Neumann machine: variables and statements from the source text of a program are translated into data and CPU instructions stored in the contiguous memory of a single host. Moreover, the linear textdescending control flow (with occasional gotos and loops) in the source program corresponds to the linear addressascending control flow (with occasional jumps and branches) in its translated machine code, which is stored in a single piece of memory at runtime. However, distributed software does not run in a single memory piece – its components execute on different computers with separate memory units. The computers connect, communicate and compute in a network of any structure: from linear – to hierarchical -- to the full graph. Network topology and connections between application’s components often change with time. Thus, the linear text-tomemory mapping idea that guided design of the imperative single-host languages fails for distributed languages. At the same time, a distributed language should abstract the networked components such as computers, processes, threads, Page 3 September 12, 2014 objects, messages, events, and code packages. It shall provide first-class language features to manage distributed operations with inevitable timeouts and failures, and to hide the underlying networking protocol. Therefore, Hello design principle was to implement the distributed abstractions inside the language’s type system: 1) Hello provides several built-in classes augmented with a few operations and statements, organically interwoven into the language’s imperative syntax and objectoriented semantics. Instances of these classes represent hosts, runtime engines, memory partitions, and execution queues spread out around the network; their purpose is to support first-class distributed language features transparently to Hello programs. At runtime, host instances self-organize into distributed groups, which graph structures reflect dynamic network connections. 2) The instances of user-defined classes – objects – reside in memory partitions and engine heaps around the network referring to each other through local and remote references. The runtime engines, with the help of the translator and the instances of the built-in classes, transparently navigate object references. The navigation allows Hello programs to manipulate and transfer data, code and control flow over the network. 7 Hello, World! The following example shows how Hello first-class distributed features and sequential core allow for a simple design. In addition, it demonstrates fast coding of the short and efficient distributed programs. This example highlights Hello advantages over the single-host languages C [4], C++ [5] and Java [18] augmented with extraneous distributed libraries. The program “Hello, World!” shows just some firstclass distributed features of the Hello language, which set it apart from any single-host programming language. The whole program is a class named HelloWorld. It contains a function main() that invokes a function print() on the hosts referred to from the built-in group hosts: package Hello_World; class HelloWorld { // Broadcast to all known hosts public static void main() { hosts.+print("Hello, World!\n" + this_host.name() + ":-)\n"); } }; The two Hello concepts illustrated by this example are a group, which is a graph-ordered collection of objects, and operator of bottom-up iteration .+, which invokes, in the graph order, an iterator function on each of the group's objects. In particular, the built-in group named hosts, has its objects distributed across the network -- each object is a separate instance of class host_group, residing within the virtual or physical host, which this object describes. At runtime, Hello engines maintain this group automatically: two objects are connected in the group if their hosts can V1.0.3 (alpha) Distributed Architecture communicate over the network. The definition of host_group is located in the Hello package standard; here is its relevant abbreviated fragment: public external group class host_group { public external host current_host; public external copy host_group[] children(); public external iterator void print(copy char[] str) { current_host.print(str); } }; When main() is started on a runtime engine, it begins iterating function print() on the objects from the group hosts. Because each host object resides on a different host, print() is invoked on different hosts -- once locally on the current host referred to by current_host and once remotely on each of the remote children hosts referred to by references from the array returned by the function with the reserved name children(). During the iteration, at each invocation print() writes a greeting signed with the name of the host where main() has been started and kept waiting for the iteration to finish; this name is a character array returned by the method current_host.name(). At each invocation, print() writes to the standard output of the host where print() is invoked, local or remote. Its argument is a string combined, with the operator concatenation +, from the three portions of the greeting: two literal strings and one character array. It is copied across the network during iteration and passed to print() at each invocation. Package standard is an internal part of the Hello runtime – it contains types that support distributed architecture (e.g. classes host and host_group). A programmer may want to learn a general functionality of some standard types and operations described in Hello Programming Guide [14]. However, there is no need to understand its details or even import it into any package. 7.1 Hello, C++ & Java! The simple imperative and object-oriented features coupled with the distributed abstractions distinguish general-purpose Hello architecture from the specialized distributed architectures2. In addition, the following code snippets present “Hello, World!” broadcasts in Java and C++ as seen at [13] and [3]. Since neither Java nor C++ has distributed features, both resort to extraneous libraries: Java to RMI, C++ to BOOST.mpi. The difference with the “Hello, World!” written in Hello is apparent – the latter has no setup while both C++ and Java use most of their code (in red) for setting up translation and runtime contexts. At the same time, Hello code is much shorter than either C++ or Java. Moreover, the Java source shows only the 2 Like the object mobility in Emerald [11], actors in Salsa [25], or process-orientation of Erlang [9]. Page 4 September 12, 2014 server part – the client portion from [13] adds even more Java code while Hello broadcast does not distinguish between client and server. package example.hello; import java.rmi.registry.Registry; import java.rmi.registry.LocateRegistry; import java.rmi.RemoteException; import java.rmi.server.UnicastRemoteObject; public class Server implements Hello { public Server() {} public String sayHello() { return "Hello, world!"; } public static void main(String args[]) { try { Server obj = new Server(); Hello stub = (Hello) UnicastRemoteObject. exportObject(obj, 0); // Bind the remote object stub in the registry Registry registry = LocateRegistry. getRegistry(); registry.bind("Hello", stub); System.err.println("Server ready"); } catch (Exception e) { System.err.println("Server exception: " + e.toString()); e.printStackTrace(); } } } Figure 1 Java broadcasting server program as seen at [13] #include <boost/mpi.hpp> #include <iostream> #include <boost/serialization/string.hpp> namespace mpi = boost::mpi; int main(int argc, char* argv[]) { mpi::environment env(argc, argv); mpi::communicator world; std::string value; if (world.rank() == 0) { value = "Hello, World!"; } broadcast(world, value, 0); std::cout << "Process #" << world.rank() << " says " << value << std::endl; return 0; } Figure 2 C++ broadcasting program as seen at [3] 8 Distributed Architecture In order to be useful, any distributed language should provide first-class features that reflect the program’s runtime distributed environment. They can manifest themselves through particular fundamental data types and their operations, as well as through a runtime context. In order to make software development productive and programs runtime efficient, such architecture should reflect general functionality of the major components of modern networks. At the same time, it should be precise enough for the translator and runtime system to be able to map that architecture on the runtime environment, and to optimize it. To be accepted among software engineers, the distributed primitives should augment, but not overwhelm the sequential language elements. These elements must remain its central part. Therefore, the Hello networking components are designed in order to blend with the main sequential core of the language, which resembles a simplified Java subset. V1.0.3 (alpha) Translation The following list presents the essential elements of the Hello distributed architecture: 1) Sourcepack is a set of all source files with Hello programs under a single directory that together constitute a Hello package. Sources define hierarchies of related classes and interfaces. Each class represents both data that are instantiated as objects and functions which operate on objects at runtime. Interface defines shared data and function prototypes implemented by derived classes. Each source file must have extension .hlo, like HelloWorld.hlo. 2) Runpack is a shared library built from all sources of a source package by Hello translator: a sourcepack abc becomes runpack abc.so. Hello runtime engine loads and executes multiple runpacks at runtime. Engines from different computers exchange runpacks at runtime on demand, following the program control flow. Runpack code accesses data from memory partitions located on the same or different hosts. Runpacks contain machine instructions rather than intermediary code – they are binary libraries, which execute their code directly on CPU. 3) Hello translator is an executable /usr/bin/het, this translates Hello sourcepack into a runpack. The translator also archives and installs Hello sourcepacks. 4) Computer is a physical or virtual computing machine that may persistently store Hello packages in its directories, capable of running Hello packages, translator, hosts and runtime engines. A computer may reside on a network, which is used by runtime engines in order to transfer the Hello data, control flow, and runpacks between different hosts. 5) Host is a uniquely named set of runtime engines and partitions running on a computer. Each computer may run a single primary host and a number of secondary hosts. Engines from the same host directly access data from all partitions of their host. Engines from different hosts access each other’s data through the network even if they run on the same computer. 6) Partition is a piece of virtual memory that holds shared runtime data – objects, as well as arrays of references to objects and primitive data. Each host may contain several partitions created by its engines. The partition data is available for multiple programs executing concurrently on either local or remote hosts. 7) Runtime engine is an executable /usr/bin/hee, this loads and executes runpacks. Runtime engine maintains its data heap accessible only to programs executed on its behalf. In addition, engines are responsible for automatic and transparent transferring of code, data and control flow between the hosts across the network. An engine accesses partitions from its host by mapping its virtual memory onto the partitions. Page 5 September 12, 2014 8) Network is a physical or virtual medium, which connects hosts from the same or different computers. Hello does not impose any particular operational characteristics on the network as long as the network is capable of maintaining locally unique computer addresses and of transferring code, data and control flow between the engines from the connected hosts. Hello is a protocolagnostic language, as it imposes no requirements on the underlying network protocol; neither has it exposed any of the protocol elements to Hello programs 3. 9) Queue is a system object that queues up execution requests and subsequently dispatches them onto an execution thread; each Hello program executes on behalf of a thread designated to a particular queue. 10) Event is a call to a method with partially supplied arguments. Events accumulate on the queues, which execute events when subsequent calls complete the method’s argument list. Events serve for delayed method invocation as well as for synchronization between local and remote queue threads. 11) SID and Privilege protect distributed data from unauthorized access. A Security Id (SID) is a 16-byte globally unique identifier that represents, via a bitmask, a set of privileges at runtime. Every queue has a set of pairs (SID, privilege) that determines operations allowed for the programs executed on behalf of the queue. In addition, an individual remote object may also have a set of such pairs to control operations allowed on the object. Finally, each host maintains a map of such pairs in order to determine the kinds of permissible remote requests executed on the host. 12) Neighborhood and Path assist in reaching distributed code and data across the network. A host neighborhood contains connected hosts that communicate directly, without any help from intermediary hosts. A host path is a sequence of connected hosts between two disconnected hosts; disconnected hosts communicate through the connected hosts from the path. The runtime engines build neighborhoods, accumulate host paths, and use them, transparently to Hello programs, while navigating the network between the hosts. Hello programs can control the neighborhood and paths formation as well as the path navigation policies. 9 Translation The following figure illustrates how Hello translator het translates a source package into a runpack: 3 However, the current runtime engine implementation requires the network to support the TCP protocol from IPV4. V1.0.3 (alpha) Hello sourcepack (package in source text) Language Features 10.1 Hello Translator C++ sources Hello runpack (shared binary library) C++ Compiler Figure 3 Hello Translation Note that all source files from a given package participate in this operation. Although het can translate individual source files, it does not build the runpack unless it successfully translates all sources from the package. Another important feature of the Hello translation process is that het first translates Hello sources into C++ sources, and then automatically invokes the C++ compiler that further translates the C++ sources into a runpack – a shared binary library. 10 Sample Code – Remote Shell The Appendix at the end of this paper presents a sample Hello code -- Remote Shell -- a program that executes a UNIX shell command on a remote host. Its code contains extensive comments in order to assist in the detailed understanding. In addition, here is a brief high-level explanation of its workings. From the command line, the program accepts the name of the remote host, the number of buffers to parallelize data transfer, the UNIX command to execute on the remote host, and the arguments required for the execution. The program works in a remarkably simple way: it creates two instances of class Shell – one on the local host and one on the remote host. After that, the local engine passes command arguments to the remote instance, which executes the command. Then the local engine enters a loop that catches portions of the command’s stdout output one after another and transfers it back to the local Shell instance. That instance dumps the data on the stdout of the local Hello runtime engine. All three (potentially massive) data operations of reading data from the command stdout, transferring that data back to the original host, and dumping it on the stdout of the local host are performed in parallel. They involve Hello built-in asynchronous queuing operators and passing method parameters by value. This program also utilizes other distributed facilities such as creating instances of external classes on remote hosts, and synchronizing local expressions via queues. Together, these first-class distributed language features make Hello Shell simple to design and easy to develop while the resulting binary ends up being as efficient as its C counterpart rsh. Page 6 September 12, 2014 Hello, C! It is fascinating to compare the amount of code from the Hello Shell program and the C code from the widely known UNIX remote shell rsh [24]. After deleting empty lines and all comments from the source code of both programs, running word count on both C rsh.c and Hello Shell_World/Shell.hlo produces this output: hellouser@think:~/hem$ wc rsh.c 390 1047 7606 rsh.c hellouser@think:~/hem$ wc Shell.hlo 116 427 2929 Shell.hlo hellouser@think:~/hem$ Clearly, Hello Shell code is more than two times smaller than C rsh code. Obviously, some rsh code processes authentication and encryption while Shell code has no such functionality (although one can still tunnel Hello traffic through an SSL [22] proxy like stunnel [26]). However, even after deleting encryption and authentication from rsh.c, the word count still shows rsh code being significantly larger than Hello code: hellouser@think:~/hem$ wc rsh.c.clear 243 680 4724 rsh.c.clear hellouser@think:~/hem$ 11 Language Features A full description of the Hello programming language, its translator, the runtime engine, and a number of working code examples are free and available for download from [14]. Here is the condensed digest of the language features. The Hello distributed architecture had emerged from the practical experience of programming diverse distributed applications such as databases, cluster monitors, protocol discovery, email and video servers. Because of that, Hello design pursues the following two goals:  The general-purpose distributed language should provide superior productivity for developing a variety of efficient and reliable distributed software.  A mainstream programmer should be able to adopt this language in a short amount of time. Achieving these goals could facilitate the widespread transition from distributed tools, packages, and libraries to this distributed language. Therefore, Hello combines the following unique properties, which set it apart from other distributed systems: 1) The first such property is the ability to create objects, access their data, and invoke their methods anywhere on the network, using simple Java-like syntax and semantics, which is also reminiscent of the RPC [23]. 2) The second property is the language-embedded distributed architecture, whose elements directly represent the graph-structured underlying networking resources. These elements augment the single-host imperative language constructs, which represent the linearly structured components of a von Neumann machine. V1.0.3 (alpha) Conclusion 3) In addition, Hello offers abstractions for distributed operations such as queued asynchronous and synchronous requests for remote synchronization, first-class bulk operations like group traversals and intelligent, deep copy algorithms, as well as asynchronous queued event processing. Other Hello unique properties are safe data sharing in memory partitions and automatic transfer of packages across the network. Hello offers object-level security identifiers and privileges. It handles distributed failures via monitoring state label transitions, catching exceptions, and timeouts. In addition, Hello translator parallelizes distributed operations for runtime efficiency. Finally, Hello packages do not run inside a virtual machine. Hello translator converts them into shared binary libraries through the intermediary C++ invocation; the C++ translator can harness the power of its optimizer to optimize generated C++ code. Hello translator allows for embedding into Hello programs any C++ code and linking with any C++ library. Hello programs are written inside object-oriented type hierarchies organized in packages. Hello translator translates Hello programs into C++ programs and then calls a C++ compiler to compile the generated C++ code into a 64bit binary dynamic shared library. Hello runtime engine dynamically loads the libraries and executes them; it also transfers the libraries on demand across the network. Engines manage memory in partitions where the programs share runtime data. All this happens while executing concurrent threads under control of the queues. A runtime engine belongs to a host – a named collection of engines running on a single computer; any computer can run multiple hosts. Hello programs manipulate strongly typed primitive data, arrays, strings, and class instances (objects). Local operations are performed on data from a thread stack, the engine heap and host partitions; remote operations are performed by navigating references to objects from other hosts. Method arguments and return values are transferred to any host by reference or value following an intelligent, deep copy algorithm. Remote and local objects assemble in groups for automated traversals. Hosts connect and engines transfer data, code, and control flow across the network transparently to the Hello programs. Hello programs can build neighbourhoods and paths of connected hosts and use them for better reliability, efficiency and security. Currently, Hello v1.0.3 (alpha) is available on 64-bit Centos [6], Fedora [10] and Ubuntu [27] versions of the Linux OS [19] on Intel x86_64 architecture [17]. 12 Conclusion In conclusion, we discover a historical precedent for the emergence of the widely adopted distributed programming languages by drawing an analogy with the development of Page 7 September 12, 2014 FORTRAN [12], which was the first high-level programming language that had alleviated the difficulties of binary programming. In addition, we rationalize the need for a widely accepted distributed language by drawing parallels between the difficulties of distributed and assembler software development [11]. Finally, we uncover the deeper currents carrying on its waves the distributed programming from the past -- through today -- into the future. 12.1 Historical Precedent On the highest level, most general-purpose programming languages, in the context of a single computer, abstract the fundamental elements of software programs. Examples of these are code modules, data types, operations, and control flow. However, these languages do not provide first-class features for another significant programming component – automatic transfer of and access to code modules, data types, runtime data, operations, and control flow across the network between collaborating computers. Instead, they delegate such networking services to tools, libraries and packages outside the language proper. In order to realize the importance of the first-class language features (i.e. those presented by language syntax and semantics), one should recall that programming languages serve as a bridge between a human understanding and the hardware realization of the algorithm. This bridge is extremely valuable: it provides a much easier path for human beings to control computers via high-level algorithmic abstractions rather than via low-level processor instructions. Ultimately, it saves precious time and money while developing software systems. For example, the first high-level programming language FORTRAN developed in 1954--1957 at IBM [1], enjoyed tremendous success because it was able to express algorithms with the imperative control flow primitives, and centuries tested mathematical notation [15]. The language had freed programmers from the daunting burden of programming machine codes and auto-codes. The FORTRAN translator was able to translate program sources, check for programming errors, and compile efficient binaries from the program libraries without human intervention. At the same time, programmers, empowered with FORTRAN, were able to devote more time to solving application problems, instead of coding binary programs. After FORTRAN invention, a plethora of programming languages had evolved [20]. However, despite immense richness of purposes and features, most of them share a single property inherited from the first language – they provide a bridge to only a single computer. Although many traditional languages allow for developing distributed applications, they still delegate network operations to extraneous tools, libraries and packages. This is simply because the V1.0.3 (alpha) Appendix – Remote Shell Source languages lack the features to communicate over the network. However, such extraneous software is complicated to use since its interface, being rich in complex low-level details, exposes the rigidity of the networking protocol to the application level. As a result, the quality of networking applications suffers because developers must spend significant efforts at a low-level coding in order to adhere to the subtleties of the networking interfaces. While the language itself has little or no knowledge of the networking operations, it is hard for a language translator to optimize network access; this, in turn, results in reduced efficiency and higher traffic of the networking applications. As in 1950-s, today software engineers still lack an essential tool to address an exceptionally hard problem. While back then such problem was the low-level binary coding for a single computer, the today’s problem is the low-level networking coding for distributed applications. Therefore, as the programming language FORTRAN solved the former problem more than half a century ago by providing firstclass features to simplify single-host programming, another programming language might also solve the latter problem today. The solution could provide in the language the firstclass features to simplify multi-host networking operations. 12.2 Technical Parallels Anyone who had experienced binary or assembler programming and, in addition, had been involved in a distributed software project, can think of the binary coding problems facing programmers of early 1950’s being quite similar to the networking coding problems of today. The following list enumerates the exact parallels: 1) A well-defined central processing element: a CPU versus a server on the network; 2) A program that needs service from the central element: an assembler, auto-code or binary program in memory, executing CPU instructions versus a client program on the network, submitting server requests; 3) A hard to use interface: assembler language, auto-code or binary code versus networking interface; 4) A pattern of failure: crash of CPU or server usually causes termination of assembler or client program; 5) Programming, debugging, and optimization: in both cases, techniques are manual and complicated [11], [28]. Obviously, it should be of no surprise that a similar solution could solve a similar problem. In other words, a distributed programming language might improve networking programming today the same way FORTRAN had improved binary coding more than half a century ago. Page 8 12.3 September 12, 2014 Connecting Past and Future During millennia-long mathematical development [16] and centuries-long technological progress [7], human beings performed calculations individually. When needed, they used to carry out computational and mathematical interactions through inter-personal collaboration, education, written correspondence, manuscripts, books and magazines. It is only recently, after the invention of the computer networks some 50 years ago [8], the automated distributed computations had become possible. Therefore, it is not surprising that the area of distributed programming is less mature than the field of single-host programming, which takes its roots in the individual computational techniques evolved through thousands of years. One might speculate that it might take more centuries for human civilization to develop (yet unknown) automated paradigm for distributed computations. However, it appears that the movement towards that goal can be started today. Its first step should abandon a hodgepodge of single-host languages and distributed tools in favour of widely accepted general-purpose distributed programming languages. Appendix – Remote Shell Source 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 // each source must begin with // the package directive package Shell_World; // this class is declared external because // its instances can be created on a remote host // and also because once created they can // be accessed from a remote host external class Shell { // this is constructor of Shell class external public Shell() {} // entry point to the program -- must // be called main; accepts command line // arguments as an array of strings static public int main(char [][]argv) { // built-in method sizear() returns // the number of elements in an array int argc = sizear(argv, 1); // quit program if not enough arguments if ( argc <= 1 ) return 0; // first argument must be a host // name were to execute command // specified on the Shell command line; // the built-in method hello() returns a // reference (ref for short) to a host on // the network with the given name host hst = hello(argv[0]); // if host not found then quit if ( hst == null ) { #C { cout << "host not found\n"; } return -1; } // the 'create' expression is similar // to 'new' expression, except it creates // an instance not in the engine heap // but in a partition from the specified // host; if the host is remote, then an // instance of class Shell is created // on that host Shell shl = create (hst) Shell(); // this line executes a method run() from // class Shell on the just created // remote object referred to by ref shl; // after run() completes, this program exits shl.run(argv, this_host); V1.0.3 (alpha) 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 Appendix – Remote Shell Source } // this defines the size of a buffer for data // to be transferred from the stdout of the // command executed on the remote host to // the local host -- this data will be printed // on stdout of the program main() running on // the local host enum { BUFSIZE = 1024 * 1024 * 4 } // this method executes on the remote host: // it accepts command and its parameters // in the character array [][]argv, and a ref to // the remote host 'back' -- the host from where // remote Shell command has been started public external void run(copy char [][]argv, host back) { Page 9 // get the count of arguments int argc = sizear(argv, 1); // // // // // // // // // // // // // // // if -the first argument is the name of this remote host; -the second argument specifies how many buffers to fill in with the stdout data in parallel: this argument is for experimentation, just to see how the speed of data transfer depends on the amount of buffers being filled in parallel -the third argument is the remote command name -the rest are the arguments for the remote command If no command is specified then quit ( argc <= 2 || back == null ) return; // set the count of buffers from // command line int BUFCNT; char []bc = argv[1]; #C { $BUFCNT = atoi($bc().__adc()); } if ( BUFCNT < 0 ) BUFCNT = 0; // create another Shell instance, this time // on the source host from where the Shell // has been launched Shell rso = create (back) Shell(); // on that same host create a queue // for dumping command stdout output on // the Shell command output in parallel // with accepting the next portion of // stdout from the remote host queue rsq = create (back) queue(); // create a queue on this host for // sending portions of stdout back to the // source host in parallel with accepting // stdout from the command stdout queue rtq = create queue(); // create a character array and // fill it with the command and its // arguments using operations // concatenation + and += char []line = create char[0]; for ( int i = 2; i < argc; i++ ) line += argv[i] + " "; // also append redirection of stderr // to make sure that any error messages // are transferred back to the source host line += "2>&1"; // create buffers in shared memory: // the count of buffers 'buc' is set from // command line, the size of each buffer // is set from the enum BUFSIZE int buc = BUFCNT?BUFCNT:1; char [][]output = create char[buc][BUFSIZE]; // this is command exit code int res = 0; // this holds the length of data // in the buffer int len = 0; // this indicates if all data has been // received from the command stdout bool done = false; // this executes the command using C++ code: // enclosed in the embedded block denoted // by '#D' -- a UNIX system call popen() 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 // // // // #D September 12, 2014 is called and the command with all arguments is launched; a file descriptor 'pipe' is filled by this call: it is used below to receive the command stdout { FILE *pipe = popen($line().__adc(), "r"); if ( pipe == NULL ) $done = true; } // now the program enters a loop that reads // command stdout; counter ‘i’ indicates // which buffer to use; boolean 'done' // is set inside the loop when all // stdout data has been received int i = 0; while ( !done ) { // check if all buffers have been used if ( i >= BUFCNT ) { // if all buffers are filled in // by stdout data, then the // constant expression '1' is // evaluated on the local queue // 'rtq' using the queued // expression evaluation // operator '<=>'; this operator // places an expression at the // end of the queue -- when // that expression reaches the // head of the queue then control // returns back to the current // thread rtq <=> 1; // because queue 'rtq' contained // requests to send data to the // remote source host, control // reaches this point only after // all such requests have // finished; then the current // buffer number is reset back // to 0 i = 0; } // get next buffer and advance // buffer count char []outbuf = output[i++]; // remember the address of that buffer #D { char *b = $outbuf().__adc(); } // this is the count of bytes // left to read into the buffer // from command stdout int toread = BUFSIZE; // keep reading from command stdout // until this buffer is full #D { char *o = b; while ( $toread > 0 ) { $len = fread(o, 1, $toread, pipe); $toread -= $len; o += $len; if ( feof(pipe) ) { $done = true, $res = 0; break; } else if ( ferror(pipe) ) { $done = true, $res = -1; break; } } } // this is the count of bytes read // from the command stdout; it is // supposed to be equal to BUFSIZE // for all buffers except possibly // the last one for which it can // be less than BUFSIZE len = BUFSIZE - toread; // // // // // // // // // // if if no buffers were ordered then do not transfer any data back to the source host; otherwise send the method message named 'send()' to 'this' Shell object on the queue 'rtq'; pass the data buffer and the length, and the refs to the remote Shell object 'rso' and to remote queue 'rsq', and the completion indicator 'done' ( BUFCNT == 0 ) ; V1.0.3 (alpha) 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 Appendix – Remote Shell Source else rtq #> (this, send(rso, rsq, outbuf, len, res, done)); // at this point the sent message 'send' // begins the transfer of the // accumulated data from 'outbuf' // back to the source host via a // invocation of external method // 'rcv' which has a 'copy' parameter // 'data' to which 'outbuf' buffer // is passed as an argument; meanwhile, // this loop continues to receive the // rest of command stdout } // this queued constant expression // evaluation is needed to wait until // remote source Shell object completes // its work, so that this target Shell // object exits afterwards; premature exit // of the target Shell will result in an // exception on the source shell rtq <=> 1; } // this method 'send' is declared as // 'message' so that it can be placed on // the queue for asynchronous execution public message void send(Shell rso, queue rsq, char []data, int len, int res, bool done) { // after this message reaches the head // of the queue it has been placed upon, // it calls method 'rcv' on the remote // source Shell instance 'rso'; the buffer // 'data' is copied remotely by the // runtime engine back onto the // remote source host rso.rcv(rsq, data, len, res, done); } // this method is declared 'external' because // it is called remotely from the target host // on a shell object from the source host; // parameter 'data' is declared 'copy' // for passing array of data by value across // the host public external void rcv(queue rsq, copy char []data, References [1] John Backus, “The history of FORTRAN I, II and III”, 1981, http://www.softwarepreservation.org/projects/FORTRAN/paper/p25 -backus.pdf. [2] Andrew P. Black, Norman C. Hutchinson, Eric Jul, Henry M. Levy, “The development of the Emerald programming language”, HOPL III Proceedings of the third ACM SIGPLAN conference on History of programming languages, 2007. [3] Boost Tutorial, http://www.boost.org/doc/libs/1_38_0/doc/html/mpi/tutorial.html. [4] C (programming language), http://en.wikipedia.org/wiki/C_(programming_language). [5] C++, http://en.wikipedia.org/wiki/C++. [6] Centos, http://www.centos.org/. [7] Computer History Museum, “Timeline of Computer History”, http://www.computerhistory.org/timeline/. [8] Computer network (History), http://en.wikipedia.org/wiki/Computer_network#History. [9] Erlang (programming language), https://en.wikipedia.org/wiki/Erlang_(programming_language). [10] Fedora, https://fedoraproject.org/. [11] Anger Fog, “Optimizing subroutines in assembly language”, Technical University of Denmark, 1996-2014, http://www.agner.org/optimize/optimizing_assembly.pdf. 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 }; September 12, 2014 int len, int res, bool done) { // when the source host receives the // command stdout in the 'copy' parameter // 'data', it sends method 'dump' to // 'this' object (which is actually 'rso' // on the source host; method 'dump' // actually writes command stdout from // remote target host on the local // source host) rsq #> (this, dump(data, len, res, done)); // // // // if when all data has been received, this queued expression waits until all output completes to avoid abrupt interrupt of the output ( done ) rsq <=> 1; } // this method 'dump' just prints // the data received from remote target host // on stdout of the runtime engine from // the local source host public message void dump(char []data, int len, int res, bool done) { // output data using embedded C++ block #C { char *buf = $data().__adc(); int wrt = 0; while ( $len > 0 ) { wrt = write(1, buf, $len); if ( wrt == -1 ) break; len -= wrt, buf += wrt; } } // if exit code indicated a failure (!=0) // then dump that exit code if ( done && res ) #C { cout << "exit code " << $res; } } [14] Hello Programming Guide for Orchestrating Local and Remote Computations, http://www.amsdec.com/download.html. [15] History of mathematical notation, http://en.wikipedia.org/wiki/History_of_mathematical_notation. [16] History of Mathematics, http://en.wikipedia.org/wiki/History_of_mathematics. [17] Intel 64 Architecture. http://www.intel.com/content/www/us/en/architecture-andtechnology/microarchitecture/intel-64-architecture-general.html. [18] Java, http://www.java.com/en/. [19] Linux, http://www.linux.com/. [20] Leo A. Meyerovich, Ariel S. Rabkin, “Empirical Analysis of Programming Language Adoption”, ACM SIGPLAN NOTICES – OOPSLA 2013, V. 48-10, 2013. [21] John von Neumann, “First Draft of a Report on the EDVAC”, 1945, http://en.wikipedia.org/wiki/First_Draft_of_a_Report_on_the_EDV AC. [22] OpenSSL, https://www.openssl.org/. [23] Remote Procedure Call, https://en.wikipedia.org/wiki/Remote_procedure_call. [24] rsh.c, http://www.opensource.apple.com/source/network_cmds/network_c mds-77/rsh.tproj/rsh.c. [25] Salsa, http://wcl.cs.rpi.edu/salsa/. [26] stunnel, https://www.stunnel.org/index.html. [12] FORTRAN, http://en.wikipedia.org/wiki/FORTRAN. [27] Ubuntu, http://www.ubuntu.com/. [13] Getting Started Using Java RMI, http://docs.oracle.com/javase/1.5.0/docs/guide/rmi/hello/helloworld.html. [28] Carlos A. Varela, “Programming Distributed Computing Systems”, MIT Press, 2013. Page 10
6cs.PL
Cooperative Task Planning of Multi-Agent Systems Under Timed Temporal Specifications arXiv:1509.09137v1 [cs.SY] 30 Sep 2015 Alexandros Nikou, Jana Tumova and Dimos V. Dimarogonas Abstract— In this paper the problem of cooperative task planning of multi-agent systems when timed constraints are imposed to the system is investigated. We consider timed constraints given by Metric Interval Temporal Logic (MITL). We propose a method for automatic control synthesis in a twostage systematic procedure. With this method we guarantee that all the agents satisfy their own individual task specifications as well as that the team satisfies a team global task specification. I. I NTRODUCTION Cooperative control of multi-agent systems has traditionally focused on designing local control laws in order to achieve tasks such as consensus, formation, network connectivity, and collision avoidance ([1]–[7]). Over the last decade or so, the field of control of multi-agent systems with complicated behavior under complex high-level task specifications has been gaining significant research attention. Such high-level tasks may have the form of “Periodically survey regions A, B, C while avoiding region D”, or “Visit regions A, B, C, in this order”, and many others. Multiple robotic vehicles then may perform these types of tasks faster and more efficiently than a single robot. In this work, we aim to introduce specific time bounds into the complex tasks, such as “Periodically survey regions A, B, C, avoid region D and always keep the longest time between two consecutive visits to A below 5 time units”, or “Visit regions A, B, C, in this order within 10 time units”. The team of agents is usually associated with a set of tasks that should be fulfilled by the group of agents as a whole at the discrete level. A three-step hierarchical procedure to address such a problem is described as follows ([8], [9]): First the robot dynamics is abstracted into a finite or countable, discrete transition system using sampling or cell decomposition methods based on triangulations, rectangular or other partitions. Second, invoking ideas from verification methods, a discrete plan that meets the high-level task is synthesized. Third, the discrete plan is translated into a sequence of continuous controllers for the original system. The specification language that has extensively been used to express the tasks is the Linear Temporal Logic (LTL) (see, e.g., [10]). LTL has proven a valuable tool for controller synthesis, because it provides a compact mathematical formalism for specifying desired behaviors of a system. There is a rich body of literature containing algorithms for verification and synthesis of system obeying temporal logic specifications ([11], [12]). A common approach in multi-agent planning under LTL specifications is the consideration of a centralized, The authors are with the ACCESS Linnaeus Center, School of Electrical Engineering, KTH Royal Institute of Technology, SE-100 44, Stockholm, Sweden and with the KTH Centre for Autonomous Systems. Email: {anikou,tumova,dimos}@kth.se. This work was supported by the H2020 ERC Starting Grant BUCOPHSYS and the Swedish Research Council (VR). global task specification for the team of agents which is then decomposed into local tasks to be accomplished by the individual agents. For instance, the authors in [13] utilized the parallel composition (synchronous products) of multirobot systems in order to decompose a global specification that is given to a team of robots into individual specifications. This method has been proven computationally expensive due to state space explosion problem and in order to relax the computational burden the authors in [14], [15] proposed a method that does not require the computation of the parallel composition. This method, however, is restrictive to specifications that can be expressed in certain subclasses of LTL. In [16], the specification formula was given in LTL in parallel with the problem of minimum inter-robot communication. Explicit time constraints in the system modeling have been included e.g., in [17], where a method of automated planning of optimal paths of a group of agents satisfying a common high-level mission specification was proposed. The mission was given in LTL and the goal was the minimization of a cost function that captures the maximum time between successive satisfactions of the formula. Authors in [18], [19] used a different approach, representing the motion of each agent in the environment with a timed automaton. The composition of the team automaton was achieved through synchronization and the UPPAAL verification tool ([20]) was utilized for specifications given in Computational Tree Logic (CTL). In the same direction, authors in [21] modeled the multi-robot framework with timed automata and weighted transition systems considering LTL specifications and then, an optimal motion of the robots satisfying instances of the optimizing proposition was proposed. Most of the previous works on multi-agent planning consider temporal properties which essentially treat time in a qualitative manner. For real applications, a multi-agent team might be required to perform a specific task within a certain time bound, rather than at some arbitrary time in the future (quantitative manner). Timed specifications have been considered in [22]–[25]. In [22], the authors addressed the problem of designing high-level planners to achieve tasks for switching dynamical systems under Metric Temporal Logic (MTL) specification and in [23], the authors utilized a counterexample-guided synthesis to cyber-physical systems subject to Signal Temporal Logic (STL) specifications. In [24], the MTL formula for a single agent was translated into linear constraints and a Mixed Integer Linear Programming (MILP) problem was solved. However, these works are restricted to single agent motion planning and are not expendable to multi-agent systems in a straightforward way. In [25], the vehicle routing problem was considered under the presence of MTL specifications. The approach does not rely on automata-based approach to verification, as it constructs a set of linear inequalities from MTL specification formula in order to solve an MILP problem. In this work, we aim at designing automated planning procedure for a team of agents that are given an individual, independent timed temporal specification each and a single global team specification. This constitutes the first step towards including time constraints to temporal logic-based multi-agent control synthesis. We consider a quantitative logic called Metric Interval Temporal Logic (MITL) ([26]) in order to specify explicit time constraints. The proposed solution is fully automated and completely desynchronized in the sense that a faster agent is not required to stay in a region and wait for the slower one. It is decentralized in handling the individual specifications and centralized only in handling the global team specification. To the best of the authors’ knowledge this is the first work that address the cooperative task planning for multi-agent systems under individual and global timed linear temporal logic specifications. The remainder of the paper is structured as follows. In Sec. II a description of the necessary mathematical tools, the notations and the definitions are given. Sec. III provides the model of the multi-agent system, the task specification, several motivation examples as well as the formal problem statement. Sec. IV discusses the technical details of the solution. Sec. V is devoted to an illustrative example. Finally, the conclusions and the future work directions are discussed in Sec. VI. II. N OTATION AND P RELIMINARIES Given a set S, we denote by |S| its cardinality and by 2S the set of all its subsets. An infinite sequence of elements of S is called a infinite word over the set S and it is denoted by w = w(0)w(1) . . . The i-th element of a sequence is denoted with w(i). We denote by Q+ , N the set of positive rational and natural numbers including 0, respectively. Let us also define T∞ = T ∪ {∞} for a set of numbers T. Definition 1. ([27]) A time sequence τ = τ (0)τ (1) · · · is a infinite sequence of time values τ (j) ∈ T = Q+ , satisfying the following constraints: • Monotonicity: τ (j) < τ (j + 1) for all j ≥ 0. • Progress: For every t ∈ T, ∃ j ≥ 1, such that τ (j) > t. An atomic proposition p is a statement over the problem variables and parameters that is either True (⊤) or False (⊥) at a given time instance. Definition 2. ([27]) Let AP be a finite set of atomic propositions. A timed word w over the set AP is an infinite sequence w = (w(0), τ (0))(w(1), τ (1)) · · · where w(0)w(1) . . . is an infinite word over the set 2AP and τ (0)τ (1) . . . is a time sequence with τ (j) ∈ T, j ≥ 0. A timed language Lang T over AP is a set of timed words over AP . A. Weighted Transition System Definition 3. A Weighted Transition System (WTS) is a tuple (S, S0 , −→, d, AP, L) where S is a finite set of states; S0 ⊆ S is a set of initial states; −→⊆ S × S is a transition relation; d :−→−→ T is a map that assigns a positive weight to each transition; AP is a finite set of atomic propositions; and L : S −→ 2AP is a labeling function. For simplicity, we use s → s′ to denote the fact that (s, s′ ) ∈→. Definition 4. A timed run of a WTS is an infinite sequence rt = (r(0), τ (0))(r(1), τ (1)) . . ., such that r(0) ∈ S0 , and for all j ≥ 1, r(j) ∈ S and r(j) → r(j + 1). The time stamps τk (j), j ≥ 0 are inductively defined as 1) τ (0) = 0. 2) τ (j + 1) = τ (j) + d(r(j), r(j + 1)), ∀ j ≥ 1. Every timed run rt generates a timed word w(rt ) = (L(r(0)), τ (0)) (L(r(1)), τ (1)) . . . over the set 2AP where w(j) = L(r(j)), ∀ j ≥ 0 is the subset of atomic propositions that are true at state r(j) at time τ (j). B. Metric Interval Temporal Logic and Timed Automata The syntax of Metric Interval Temporal Logic (MITL) over a set of atomic propositions AP is defined by the grammar ϕ := p | ¬ϕ | ϕ1 ∧ ϕ2 | I ϕ | ♦I ϕ | I ϕ | ϕ1 UI ϕ2 (1) where p ∈ AP , and , ♦,  and U is the next, future, always and until temporal operator, respectively. I ⊆ T is a non-empty time interval in one of the following forms: [i1 , i2 ], [i1 , i2 ), (i1 , i2 ], (i1 , i2 ), [i1 , ∞], (i1 , ∞) where i1 , i2 ∈ T with i1 < i2 . MITL can be interpreted either in continuous or point-wise semantics. We utilize the latter one and interpret MITL formulas over timed runs such as the ones produced by a WTS (Def. 4). Definition 5. ([28], [29]) Given a run rt = (r(0), τ (0))(r(1), τ (1)) . . . of a WTS and an MITL formula ϕ, we define (rt , i) |= ϕ, for i ≥ 0 (read rt satisfies ϕ at position i) as follows (rt , i) |= p ⇔ p ∈ L(r(i)) (rt , i) |= ¬ϕ ⇔ (rt , i) 6|= ϕ (rt , i) |= ϕ1 ∧ ϕ2 ⇔ (rt , i) |= ϕ1 and (rt , i) |= ϕ2 (rt , i) |= I ϕ ⇔ (rt , i + 1) |= ϕ and τ (i + 1) − τ (i) ∈ I (rt , i) |= ♦I ϕ ⇔ ∃j, i ≤ j, s.t. (rt , j) |= ϕ, τ (j) − τ (i) ∈ I (rt , i) |= I ϕ ⇔ ∀j, i ≤ j, τ (j) − τ (i) ∈ I ⇒ (rt , j) |= ϕ (rt , i) |= ϕ1 UI ϕ2 ⇔ ∃j, i ≤ j, s.t. (rt , j) |= ϕ2 , τ (j) − τ (i) ∈ I and (rt , k) |= ϕ1 for every i ≤ k < j Timed Büchi Automata (TBA) were introduced in [27] and in this work, we also partially adopt the notation from [30], [31]. Let X = {x1 , x2 , . . . , xM } be a finite set of clocks. The set of clock constraints Φ(X) is defined by the grammar φ := ⊤ | ¬φ | φ1 ∧ φ2 | x ⊲⊳ c (2) where x ∈ X is a clock, c ∈ T is a clock constant and ⊲⊳∈ {<, >, ≥, ≤, =}. A clock valuation is a function ν : X → T that assigns a real value to each clock. A clock xi has valuation νi for i ∈ {1, . . . , M }, and ν = (ν1 , . . . , νM ). We denote by ν |= φ the fact that the valuation ν satisfies the clock constraint φ. Definition 6. A TBA is a tuple A = (S, S init , X, I, E, F, AP, L) where S is a finite set of locations; S init ⊆ S is the set of initial locations; X is a finite set of clocks; I : S → Φ(X) is the invariant; E ⊆ S × Φ(X) × 2X × S gives the set of transitions; F ⊆ S is a set of accepting locations; AP is a finite set of atomic propositions; and L : S → 2AP labels every state with a subset atomic propositions. A state of A is a pair (s, ν) where s ∈ S and ν satisfies the invariant I(s), i.e., ν |= I(s). The initial state of A is (s(0), (0, . . . , 0)), where s(0) ∈ S0 . Given two states (s, ν) and (s′ , ν ′ ) and an edge e = (s, γ, R, s′ ), there exists a e discrete transition (s, ν) − → (s′ , ν ′ ) iff ν satisfies the guard of the transition γ, i.e., ν |= γ, ν ′ |= I(s′ ), and R is the reset set, i.e., νi′ = 0 for xi ∈ R and νi′ = νi for xi ∈ / R. Given a δ ∈ T, there exists a time transition δ (s, ν) − → (s′ , ν ′ ) iff s = s′ , ν ′ = ν + δ and ν ′ |= I(s). An infinite run of A starting at state (s(0), ν) is an infinite δ0 sequence of time and discrete transitions (s(0), ν(0)) −→ δ1 e0 (s(1)′ , ν(1)′ ) . . ., where (s(1), ν(1)) −→ (s(0)′ , ν(0)′ ) −→ (s(0), ν(0)) is an initial state. This run produces the timed word w = (L(s(0)), τ (0))(L(s(1)), τ (1)) . . . with τ (0) = 0 and τ (i+1) = τ (i)+δi , ∀ i ≥ 1. The run is called accepting if s(i) ∈ F for infinitely many times. A timed word is accepted if there exists an accepting run that produces it. The problem of deciding the emptiness of the language of a given TBA A is PSPACE-complete [27]. In other words, we can synthesize an accepting run of a given a TBA A, if one exists. Remark 1. Traditionally, the clock constraints and the TBAs are defined with T = N, however, they can be extended to accommodate T = Q+ ∪ {0}. By multiplying all the rational numbers that are appearing in the state invariants and the edge constraints with their least common multiple, we have equivalently only natural numbers occurring to the TBA. For the sake of physical understanding of the timed properties of the under investigation framework, we will be working with T = Q+ ∪ {0}. Any MITL formula ϕ over AP can be algorithmically translated to a TBA with the alphabet 2AP , such that the language of timed words that satisfy ϕ is the language of timed words produced by the TBA [26], [32], [33]. III. P ROBLEM F ORMULATION A. System Model Consider a multi-agent team composed by N agents operating in a bounded workspace W0 ⊆ Rn . Let I = {1, . . . , N } denote the index set of the agents. We assume that the workspace W0 is partitioned into a finite number (assume W ) of regions of interest π1 , . . . , πW where [ W0 = πi and πi ∩πj 6= ∅, ∀ i 6= j with i, j ∈ W (3) i∈W for the index set W = {1, . . . , W }. We denote by πik the agent k being at region πi , where k ∈ I, i ∈ W. In this work, we focus on interaction and high-level control strategies rather than on nonlinear models, and we assume that the dynamics of each agent is given by a single integrator ẋi = ui , i ∈ I. (4) The partitioned environment (3) is a discretization that allows us to control the agents with dynamics (4) using finite models such as finite transition systems (e.g., [9], [34]–[36]). We define a weighted transition system (see Def. 7) so that • if there exists a controller ui , i ∈ I such that the agent k can be driven from any point within the region π i to a neighboring region π j , then we allow for a transition πki →k πkj between the respective system states, and • the weight of each transition estimates the time each agent needs in order to move from one region to another. In particular, the travel time is here determined as the worst-case shortest time needed to travel from an arbitrary point of the current region to the boundary of the following region. This estimate is indeed conservative, however, it is sufficient for specifications that we are generally interested in within multi-agent control. Namely, it is suitable for scenarios where tasks are given deadlines and upper rather than lower bound requirements are associated with events along the agents’ runs. Definition 7. The motion of each agent k ∈ I in the workspace is modeled by a WTS Tk = (Πk , Πinit k , →k , dk , APk , Lk ) where  k k k • Πk = π1 , π2 , . . . , πW is the set of states of agent k. Any state of an agent k can be denoted as πjk ∈ Πk for k ∈ I, j ∈ W. The number of states for each agent is |Πk | = W . init • Πk ⊆ Πk is the initial states of agent k, i.e. the set of regions where agent k may start. • →k ⊆ Πk × Πk is the transition relation. For example, by π33 →3 π53 we mean that the agent 3 can move from region π3 to region π5 . • dk :→k → T is a map that assigns a positive weight (duration) to each transition. For example, d2 (π22 , π52 ) = 0.7, where π22 →2 π52 , means that agent 2 needs at most 0.7 time units to move from any point of region π2 to the boundary of the neighboring region π5 . • AP k is a finite set of atomic propositions known to agent k. Without loss of generality, we assume that AP k ∩ AP k′ = ∅ for all k 6= k ′ ∈ I. AP k • Lk : Πk → 2 is a labeling function that assigns to each state πjk ∈ Πk a subset of atomic propositions APk that are satisfied when agent k is in region πj . 1) Individual Timed Runs and Words: The behaviors of the individual agents can be captured through their timed runs and timed words. The timed run rkt = (rk (0), τk (0))(rk (1), τk (1)) · · · , k ∈ I of each WTS Tk , k ∈ I and the corresponding timed words w(rkt ) = (Lk (rk (0)), τk (0)) (Lk (rk (1)), τk (1)) · · · are defined by using the terminology of Def. 4. 2) Collective Timed Run and Word: At the same time, the agents form a team and we are interested in their global, collective behaviors, which we formalize through the following definition. t be individual timed runs of the Definition 8. Let r1t , . . . , rN agents 1, . . . , N , respectively, as defined above. Then, the collective timed run rG = (rG (0), τG (0))(rG (1), τG (1)) . . . of the team of agents is defined inductively as follows 1) (rG (0), τG (0)) = ((r1 (0), . . . , rN (0)), τG (0)). 2) Let (rG (i), τG (i)) = ((r1 (i1 ), . . . , rN (iN )), τG (i)), where i ≥ 0 be the current state and time stamp of the collective timed run. Then the next state and time stamp (rG (i + 1), τG (i + 1)) = ((r1 (j1 ), . . . , rN (jN )), τG (i + 1)) are given by the following ℓ = argmin{τk (ik + 1)}. • τG (i + 1)( = τℓ (iℓ + 1). rℓ (iℓ + 1) if k = ℓ rk (jk ) = rk (iℓ ) if k 6= ℓ. t In what follows, rG = (rG (0), τG (0))(rG (1), τG (1)) . . . , where rG (i) = (r1 (i1 ), . . . , rN (iN )), i, ik ≥ 0 and k ∈ I denotes the collective timed run. Definition 9. We define the global set of atomic propoN [ AP k and for every state rG (i) = sitions AP G = k=1 (r1 (i1 ), . . . , rN (iN )) of a collective timed run, where i, ik ≥ 0 and k ∈ I, we define the labeling SN function LG : Π1 . . . ΠN → AP G as LG (rG (i)) = k=1 Lk (rk (ik )). t A collective timed run rG thus naturally produces a timed t word wG = (LG (rG (0)), τG (0))(LG (rG (1)), τG (1)) . . . over AP G . Example 1. Consider N = 2 robots operating in a workspace with W = π1 ∪ π2 ∪ π3 , W0 = 3 and I = {1, 2} modeled as the WTSs illustrated in Fig. 1. Let AP 1 = {green}, and AP 2 = {red}. The labeling functions are L1 (π11 ) = {green}, L1(π21 ) = L1 (π31 ) = ∅, and L2 (π12 ) = L2 (π22 ) = ∅, L2 (π32 ) = {red}. 1.0 1.5 π21 2.0 π12 π31 0.5 2.0 WTS T2 : 0.5 π22 1.5 (r1 (4) = π11 , τ1 (4) = 5.0) . . . r2t =(r2 (0) = π12 , τ2 (0) = 0.0)(r2 (1) = π22 , τ2 (1) = 2.0) Given r1t and r2t the collective run rG is given according to Def. 8 as follows: Intuitively, given the current states r1 (i1 ), . . . , rN (iN ) and the next states r1 (i1 + 1), . . . , rN (iN + 1) of the individual agents at time τG (i), ℓ is the index of the agent k who will finish its current transition from rℓ (iℓ ) to rℓ (iℓ + 1) the soonest amongst all. The time of agent ℓ’s arrival to its next state rℓ (iℓ + 1) becomes the new time stamp τG (i + 1) of the collective timed run. The next state of the collective timed run reflects that each agent k which cannot complete its transition from rk (ik ) to rk (ik + 1) before τG (i + 1) remains in rk (ik ). π11 (r1 (2) = π31 , τ1 (2) = 2.5)(r1 (3) = π21 , τ1 (3) = 3.0) (r2 (4) = π32 , τ2 (4) = 5.0) . . . k∈I WTS T1 : r1t =(r1 (0) = π11 , τ1 (0) = 0.0)(r1 (1) = π21 , τ1 (1) = 1.0) (r2 (2) = π32 , τ2 (2) = 2.5)(r2 (3) = π22 , τ2 (3) = 4.5) • • Examples of the agents’ runs are: π32 2.0 Fig. 1. WTSs T1 , T2 representing two agents in W. Π1 = {π11 , π21 , π31 }, Πinit = {π11 }, Π2 = {π12 , π22 , π32 }, Πinit = {π12 }, the transitions are 1 2 depicted as arrows which are annotated with the corresponding weights. t rG =((π11 , π12 ), τG (0) = 0.0)((π21 , π12 ), τG (1) = 1.0) | {z } | {z } rG (0) ((π21 , π22 ), τG (2) | {z } rG (2) ((π21 , π32 ), τG (4) | {z } rG (4) = rG (1) 2.0)((π31 , π32 ), τG (3) = 2.5) = rG (3) 3.0)((π21 , π22 ), τG (5) = 4.5) | {z } | {z } rG (5) ((π11 , π32 ), τG (6) = 5.0) . . . | {z } rG (6) The produced collective timed word is t wG =({green}, 0.0)(∅, 1.0)(∅, 2.0)({red}, 2.5) ({red}, 3.0)(∅, 4.5)({green, red}, 5.0) . . . . B. Specification Several different logics have been designed to express timed properties of real-time systems, such as MTL [37] that extends the until operator of LTL with a time interval. Here, we consider a fragment of MTL, called MITL (see Sec. II for definition) which has been proposed in [26]. Namely, we utilize its point-wise semantics and interpret its formulas over timed runs. Unlike MTL, MITL excludes punctual constraints on the until operator. For instance, the formula (a ⇒ ♦=1 b) saying that every a is followed by a b precisely 1 time unit later, is not allowed in MITL, whereas (a ⇒ ♦(0,1] b), saying that every a is followed by a b at most after 1 time unit later, is. While MTL formulas cannot be generally translated into TBAs, MITL formulas can [26]. 1) Local Agent’s Specification: Each agent k, k ∈ I is given an individual, local, independent specification in the form of a MITL formula ϕk over the set of atomic propositions AP k . The satisfaction of ϕk is decided from the agent’s own perspective, i.e., on the timed run rkt . 2) Global Team Specification: In addition, the team of agents is given a global team specification, which is a MITL formula ϕG over the set of atomic propositions AP G . The team specification satisfaction is decided on the collective t timed run rG . Example 1 (Continued). Recall the two agents from Example 1. Each of the agents is given a local, independent, specification and at the same time, the team is given an overall goal that may require collaboration or coordination. Examples of local specification formulas are ϕ1 = ♦≤10 (green) and ϕ2 = (red ⇒ ≤5 (¬red )) stating that “The green region is periodically visited with at most 10 time units between two consecutive visits” and “Whenever a red region is visited, it will not be visited for the following 5 time units again”, respectively. While ϕ1 is satisfied on r1t , ϕ2 is not satisfied on r2t . An example of the global specification is ϕG = ♦≤5 (green ∧ red ) that imposes requirement on the agents’ collaboration; it states that agents 1 and 2 will periodically simultaneously visit the green and the red region, respectively, with at most 5 time units between two consecutive visits. C. Problem Statement Problem 1 (Run Synthesis). Given N agents governed by dynamics as in (4), a task specification MITL formula ϕG for the team of robots, over a set of atomic propositions APG and N local task specifications ϕk over APk , k ∈ I, t synthesize a sequence of individual timed runs r1t , . . . , rN such that the following hold   t t rG |= ϕG ∧ r1t |= ϕ1 ∧ . . . ∧ rN |= ϕN . (5) Though it might seem that the satisfaction of the individual specificationsVϕ1 , . . . , ϕN can be treated as the satisfaction of t , this is the formula k∈I ϕk on the collective timed run rG generally not the case, as demonstrated through the following example: Example 1 (Continued). Recall the two agents from Example 1 and a local specification ϕ2 = (red ⇒ ≤2 (¬red )). While this = specification is satisfied on r2t since w(r2t ) (∅, 0.0)(∅, 2.0)({red}, 2.5)(∅, 4.5)({green, red}, 5.0) . . ., it t can be easily seen that it is not satisfied on rG . Formally, we have ^ t t rG |= ϕk < r1t |= ϕ1 ∧ . . . ∧ rN |= ϕN . 4) We construct a global Büchi WTS TeG = TG ⊗AG . The accepting timed runs of the TeG are the timed runs of the TG that satisfy the team formula ϕG (Sect. IV-D). t 5) We find an accepting timed run reG of the global f Büchi WTS TG and project it onto timed runs of the product Büchi WTS TG , then onto timed runs of the local Büchi WTSs Te1 , . . . , TeN , and finally t onto individual timed runs r1t , . . . , rN of the original t WTSs T1 , . . . , TN . By construction, r1t , . . . , rN are guaranteed to satisfy ϕ1 , . . . , ϕN , respectively, and t furthermore rG satisfies ϕG (Sec. IV-E). A. Construction of TBAs As stated in Sec. II, every MITL formula ϕ can be translated into a language equivalent TBA. Several approaches are proposed for that purpose, for instance [26], [32], [33], [38]. Here, we translate each local specification ϕk , where k ∈ I into a TBA Ak = (Sk , Skinit , Xk , Ik , Ek , Fk , APk , Lk ), and the global specification ϕG into a TBA AG = init (SG , SG , XG , IG , EG , FG , APG , LG ). B. Construction of the local Büchi WTSs Te1 , . . . , TeN Definition 10. Given a WTS Tk = , → , AP , L , d ), and a TBA A = (Πk , Πinit k k k k k k (Sk , Skinit , Xk , Ik , Ek , Fk , APk , Lk ) with Mk = |Xk | and Ckmax being the largest constant appearing in Ak , we define their local Büchi WTS Tek = Tk ⊗ Ak = e e e (Qk , Qinit k , dk , Fk , APk , Lk ) as follows: k , M • Qk ⊆ {(rk , sk ) ∈ Πk × Sk : Lk (rk ) = Lk (sk )} × T∞k . init init init • Qk = Πk × Sk × {0} × . . . × {0}. {z } | Mk products (6) • k∈I Hence, Problem 1 may not be treated in a straightforward, fully centralized way. We propose a two-stage solution that first pre-computes all timed runs of the individual agents in a decentralized way and stores them efficiently in weighted transition systems enhanced with a Büchi acceptance condition. Second, these are combined and inspected with respect to guaranteeing the satisfaction of the team specification by the collective timed run. IV. P ROPOSED S OLUTION In this section, we introduce a systematic solution to Problem 1. Our overall approach builds on the following steps: 1) We construct TBAs Ak , k ∈ I and AG that accept all the timed words satisfying the specification formulas ϕk , k ∈ I and ϕG , respectively (Sec. IV-A). 2) We construct a local Büchi WTS Tek = Tk ⊗ Ak , for all k ∈ I. The accepting timed runs of Tek are the timed runs of the Tk that satisfy the corresponding local specification formula ϕk , k ∈ I (Sec. IV-B). 3) We construct a product Büchi WTS TG = Te1 ⊗· · ·⊗ TeN such that its timed runs are collective timed runs of the team and their projections onto the agents’ individual timed runs are admissible by the local Büchi WTSs Te1 , . . . TeN respectively (Sec. IV-C). • • q q ′ iff ◦ q = (r, s, ν1 , . . . , νMk ) ∈ Qk , ′ q ′ = (r′ , s′ , ν1′ , . . . , νM ) ∈ Qk , k ◦ r →k r′ , and ◦ there exists γ, R, such that (s, γ, R, s′ ) ∈ Ek , ′ ν1 , . . . , νMk |= γ, ν1′ , . . . , νM |= Ik (s′ ), and for k all i ∈ {1, . . . , Mk }   0, if xi ∈ R   ν + d (r, r′ ), if x 6∈ R and i k i νi′ =  νi + dk (r, r′ ) ≤ Ckmax    ∞, otherwise. k Then dek (q, q ′ ) = dk (r, r′ ). Fek = {(rk , sk , ν1 , . . . , νMk ) ∈ Qk : sk ∈ Fk }. e k (rk , sk , ν1 , . . . , νM ) = Lk (rk ). L k Each local Büchi WTS Tek , k ∈ I is in fact a WTS with a Büchi acceptance condition Fek . A timed run of Tek can be written as rekt = (qk (0), τk (0))(qk (1), τk (1)) . . . using the terminology of Def. 4. It is accepting if qk (i) ∈ Fek for infinitely many i ≥ 0. An accepting timed run of Tek projects onto a timed run of Tk that satisfies the local specification formula ϕk by construction. Formally, the following lemma, whose proof follows directly from the construction and and the principles of automata-based LTL model checking (see, e.g., [39]), holds: Lemma 1. Consider an accepting timed run rekt = (qk (0), τk (0))(qk (1), τk (1)) . . . of the local Büchi WTS Tek defined above, where qk (i) = (rk (i), sk (i), νk,1 , . . . , νk,Mk ) denotes a state of Tek , for all i ≥ 1. The timed run rekt projects onto the timed run rkt = (rk (0), τk (0))(rk (1), τk (1)) . . . of the WTS Tk that produces the timed word w(rkt ) = (Lk (rk (0)), τk (0))(Lk (rk (1)), τk (1)) . . . accepted by the TBA Ak via its run ρk = sk (0)sk (1) . . . Vice versa, if there exists a timed run rkt = (rk (0), τk (0))(rk (1), τk (1)) . . . of the WTS Tk that produces a timed word w(rkt ) = (Lk (rk (0)), τk (0))(Lk (rk (1)), τk (1)) . . . accepted by the TBA Ak via its run ρk = sk (0)sk (1) . . . then there exist the accepting timed run rekt = (qk (0), τk (0))(qk (1), τk (1)) . . . of Tek , where qk (i) denotes (rk (i), sk (i), νk,1 (i), . . . , νk,Mk (i)) in Tek . C. Construction of the product Büchi WTS TG Now we aim to construct a finite product WTS TG whose timed runs represent the collective behaviors of the team and whose Büchi acceptance condition ensures that the accepting timed runs account for the local specifications. In other words, TG is a product of all the local WTS Tek built above. In the construction of TG , we need to specifically handle the cases when transitions of different agents are associated with different time durations, i.e, different transition weights. To this end, we introduce a vector b = (b1 , . . . , bN ) ∈ TN . Each element of the vector is a rational number bk ∈ T, k ∈ I which can be either 0, when the agent k has just completed its transition, or the time elapsed from the beginning of the agent’s current transition, if this transition is not completed, yet. The state of the team of agents is then in the form qG = (q1 , . . . , qN , b1 , . . . , bN , ℓ) where qk is a state of Tek , for all k ∈ I, and ℓ ∈ I has a special meaning in relation to the acceptance condition of TG that will become clear shortly. Taking the above into consideration we define the global model TG as follows: Definition 11. Given N local Büchi WTSs Te1 , . . . , TeN from Def. 10, their product Büchi WTS TG = Te1 ⊗ . . . ⊗ TeN = (QG , Qinit G , →G , dG , FG , AP G , LG ) is defined as follows: N • QG ⊆ Q1 × · · · × QN × T × {1, . . . , N }. init init init • QG = Q1 × . . . × QN × {0} × . . . × {0} ×{1}. {z } | • • k=1 • where dmin = e k (qk ). L D. Construction of the global Büchi WTS TeG Definition 12. Finally, given the product Büchi WTS TG = (QG , Qinit G , →G , dG , FG , APG , LG ), and a TBA AG = init (SG , SG , XG , IG , EG , FG , APG , LG ) that corresponds to the team specification formula ϕG with MG = |XG | and max CG being the largest constant appearing in AG , we define eG , Q e init , G , their product WTS TeG = TG ⊗ AG = (Q G e e e dG , FG , APG , LG ) as follows: G e G ⊆ {(q, s) ∈ QG × SG : LG (q) = LG (s)} × TM • Q ∞ . e init = Qinit × S init × {0} × . . . × {0} ×{1, 2}. • Q G G G {z } | MG −products • q q ′ iff ◦ q = (r, s, ν1 , . . . , νMG , ℓ) ∈ QG , ′ q ′ = (r′ , s′ , ν1′ , . . . , νM , ℓ′ ) ∈ QG , G ′ ◦ r →G r , and ◦ there exists γ, R, such that (s, γ, R, s′ ) ∈ EG , ′ ν1 , . . . , νMG |= γ, ν1′ , . . . , νM |= IG (s′ ), and for G all i ∈ {1, . . . , MG }   if xi ∈ R 0,  ν + d (r, r′ ), if x 6∈ R and i G i νi′ = max  νi + dG (r, r′ ) ≤ CG   ∞, otherwise G ◦ − bk ) is (loosely speaking) the smallest time step that can be applied, and ◦ ( ℓ, if qℓ 6∈ Feℓ ′ ℓ = ((ℓ + 1) mod N ), otherwise N [ The product WTS TG is again a WTS with a Büchi acceptance condition. Informally, the index ℓ in a state qG = (q1 , . . . , qN , b1 , . . . , bN , ℓ) ∈ QG allows to project an accepting timed run of TG onto an accepting run of every one of the local Büchi WTS. The construction is based on the standard definition of Büchi automata intersection (see, e.g., [39]). The following lemma follows directly from the construction and and the principles of automata-based LTL model checking (see, e.g., [39]): t Lemma 2. For all k ∈ I, an accepting timed run rG of the product Büchi WTS TG projects onto an accepting timed run rkt of the local Büchi WTS Tek that produces a timed word w(rkt ) accepted by the corresponding TBA Ak . Vice versa, if there exists a timed run rkt of the local Büchi WTS Tek that produces a timed word w(rkt ) accepted by the TBA Ak for t each k ∈ I, then there exist an accepting timed run rG of TG . ′ qG →G qG iff ◦ qG = (q1 , . . . , qN , b1 , . . . , bN , ℓ) ∈ QG , ′ ′ qG = (q1′ , . . . , qN , b′1 , . . . , b′N , ℓ′ ) ∈ QG , ′′ ◦ ∃ qk ∈ Qk : qk k qk′′ , for some k ∈ I, ◦   0, if bk + dmin = dek (qk , qk′′ )    and qk′ = qk′′ b′k =  bk + dmin , if bk + dmin < dek (qk , qk′′ )    and qk′ = qk min (dek (qk , qk′′ ) k∈{1,...,N } LG ((q1 , . . . , qN , b1 , . . . , bN , ℓ) = k=1 N products • ′ Then dG (qG , qG ) = dmin . FG = {(q1 , . . . , qN , b1 , . . . , bN , N ) ∈ QG : qN ∈ FeN }. N [ APk . APG = ′ ℓ = • • ( 1 if ℓ = 1 and r 6∈ FG , or ℓ = 2 and s ∈ FG 2 otherwise Then deG (q, q ′ ) = dG (r, r′ ). FeG = {(r, s, ν1 , . . . , νMG , 1) ∈ QG : r ∈ FG }. e G (rG , sG , ν1 , . . . , νMG ) = LG (rG ). L Analogously to above, the global Büchi WTS TeG is a WTS with a Büchi acceptance condition. An accepting timed run of TeG guarantees the satisfaction of the team specification formula ϕG by construction. Furthermore, the projected individual timed runs of the original T1 , . . . , TN satisfy their respective local specifications. The following lemma follows directly from the construction and and the principles of automata-based LTL model checking (see, e.g., [39]): t Lemma 3. An accepting timed run reG of the global Büchi t WTS TeG projects onto an accepting timed run rG of the t product Büchi WTS TG that produces a timed word w(rG ) accepted by the TBA AG . Vice versa, if there exists a timed t run rG of the product Büchi WTS TG that produces a timed t word w(rG ) accepted by the TBA AG then there exist an t accepting timed run reG of TeG . E. Projection to the desired timed runs of T1 , . . . , TN t An accepting run reG of the global Büchi WTS TeG can be found efficiently leveraging ideas from automata-based LTL model checking [39]. Namely, TeG is viewed as a graph that is searched for a so-called accepting lasso; a cycle containing an accepting state that is reachable from the initial state. t Once reG is obtained, Lemmas 3, 2, and 1 directly provide t guidelines for projection of reG onto the individual timed runs t of T1 , . . . , TN . In particular, reG is projected onto a timed run t t rG of TG , which is projected onto timed runs re1t , . . . , reN e of T1 , . . . , TN , which are finally projected onto timed runs t r1t , . . . , rN of T1 , . . . , TN , respectively. Such a projection t guarantees that r1t , . . . , rN are a solution to Problem 1. V. I LLUSTRATIVE E XAMPLE For an illustrative example, consider 2 robots in the shared workspace of Fig. 2. The workspace is partitioned into W = 21 cells and a robot’s state is defined by the cell it is currently present at. Agent 1 (R1) is depicted in green and it is two times faster than Agent 2 (R2) which is depicted in red. We assume that the environment imposes such moving constraints that the traveling right and up is faster than left and down. Let Agent 1 need 1 time unit for up and right moves and 2 time units for down and left moves. Let also Agent 2 need 2 time units for up and right moves and 4 time units for down and left moves. We consider a scenario where the robots have to eventually meet at yellow regions (global team task), and at the same time, they have to recharge within a certain time interval in recharge locations (blue squares with the circles in the respective color). The individual specifications are ϕ1 = ♦≤6 (recharge1 ) and ϕ2 = ♦≤12 (recharge2 ) stating that agent 1 has to recharge within 5 time units and agent 2 within 10 units, respectively, and the team task is ϕG = ♦≤30 {(meet1A ∧meet2A )∨(meet1B ∧meet2B )} stating that the agents have to meet either in yellow region A or B within 30 time units. By following the process that was described in Section t = IV step by step we have that an accepting timed run is reG 1 2 1 2 1 2 1 2 ((π4 , π18 ), 0)((π11 , π18 ), 2) . . . ((π9 , π10 ), 6)((π16 , π3 ), 8) . . . 1 ((π13 , π52 ), 13)((π61 , π62 ), 14) . . . with corresponding timed t 2 word w(e rG ) = (∅, 0)(∅, π18 ), 2) . . . ({recharge1 }, 6) 2 A ({recharge2 }, 8) . . . (∅, π5 ), 13)(({meet A 1 , meet 2 }, 14) . . . t can be projected which satisfies formula φG . The run reG R1 π1 2 A 1 2 π14 π8 1 π21 B R2 Fig. 2. An illustrative example with 2 robots evolving in a common workspace. Let W0 = π1 ∪ . . . ∪ π21 . We enumerate the regions starting from the left region in every row and ending in the right. The initial positions of robots R1 , R2 are depicted by a green and a red circle, respectively, the desired meeting points in yellow and the recharging spots by the agents’ respective colors inside a blue box. The accepting runs for task specifications φ1 , φ2 , φG are depicted with green and red arrows for agent 1 and agent 2 respectively. 1 1 onto individual the timed runs re1 t = (π41 , 0)(π11 , 2)(π10 , 4) 1 1 1 1 1 1 (π91 , 6)(π16 , 8)(π17 , 9)(π18 , 10)(π19 , 11)(π20 , 12)(π13 , 13) 2 2 2 (π61 , 14) . . . and re2 t = (π18 , 0)(π17 , 4)(π10 , 6)(π32 , 8)(π42 , 10) 2 2 (π5 , 12)(π6 , 14) . . . (they are depicted in Fig. 2 with green and red arrows respectively) with corresponding timed words w(e r1t ) = (∅, 0)(∅, 2)(∅, 4)({recharge1 }, 6)(∅, 8)(∅, 9)(∅, 10)(∅, 11) t (∅, 12)(∅, 13)({meet A 1 }, 14) . . . and w(r2 ) = (∅, 0)(∅, 4) (∅, 6)({recharge2 }, 8)(∅, 10)(∅, 12)({meet A 2 }, 14) . . . which satisfy formulas φ1 and φ2 respectively. All conditions from (5) are satisfied. The runs and the words of the illustrative example are depicted in Fig. 3. Consider now the alternative runs of the agents, where they first meet in the meeting point A (after 8 time units) and then recharge in the region π7 (after 9 and 10 time units, respectively). Regardless of how the agents continue, they have accomplished the untimed formulas ϕ′1 = ♦(recharge1 ), ϕ′2 = ♦(recharge2 ), and ϕ′G = ♦{(meet1A ∧ meet2A ) ∨ (meet1B ∧ meet2B )}. Although this is in fact a more efficient way to satisfy the untimed formulas ϕ′1 , ϕ′2 , and ϕ′G than the one described above, the formula ϕ1 is violated due to its time constraint. VI. C ONCLUSIONS AND F UTURE W ORK We have proposed a systematic method for multi-agent controller synthesis aiming cooperative planning under highlevel specifications given in MITL formulas. The solution involves a sequence of algorithmic automata constructions such that not only team specifications but also individual specifications should be fulfilled. Future research directions include the consideration of more complicated dynamics than the fully actuated ones in (4), the decentralized solution such that every agent has information only from his neighbors as well as the modeling of the system with Markov Decision Processes (MDPs) and probabilistic verification. R EFERENCES [1] W. Ren and R. Beard, “Consensus Seeking in Multi-agent Systems under Dynamically Changing Interaction Topologies,” IEEE Transactions on automatic control, vol. 50, no. 5, pp. 655–661, 2005. [2] R. Olfati-Saber and R. Murray, “Consensus Problems in Networks of Agents with Switching Topology and Time-Delays,” IEEE Transactions on Automatic Control, vol. 49, no. 9, pp. 1520–1533, 2004. [3] A. Jadbabaie, J. Kin, and S. Morse, “Coordination of Groups of Mobile Autonomous Agents Using Nearest Neighbor Rules,” IEEE Transactions on Automatic Control, vol. 48, no. 6, pp. 988–1001, 2003. 1 , π 2 ), 0) ((π4 18 1 , π 2 ), 4) ((π10 17 1 , π 2 ), 2) ((π11 18 1 , π 2 ), 8)((π 1 , π 2 ), 10)((π 1 , π 2 ), 12)((π 1 , π 2 ), 14) ((π16 3 18 4 20 5 6 6 1 , π 2 ), 6) ((π9 10 1 , π 2 ), 9) ((π 1 , π 2 ), 11)((π 1 , π 2 ), 13) ((π17 3 9 4 13 5 Team 2 (π18 , 0) 2 (π10 , 6) (π42 , 10) 2 (π17 , 4) (π62 , 14) (π32 , 8) (π52 , 12) Agent 2 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 Agent 1 1 (π11 , 2) (π41 , 0) (π91 , 6) 1 (π10 , 4) 1 (π17 , 9) 1 (π16 , 8) 1 (π19 , 11) 1 (π18 , 10) 1 (π13 , 13) 1 (π20 , 12) (π61 , 14) t and the corresponding timed stamps. We denote with red dashed lines the times that both agents Fig. 3. The accepting runs re1t , re2t , the collective run reG have the same time stamps [4] M. Zavlanos and G. Pappas, “Distributed Connectivity Control of Mobile Networks,” IEEE Transactions on Robotics, vol. 24, no. 6, pp. 1416–1428, 2008. [5] M. Egerstedt and X. Hu, “Formation Constrained Multi-Agent Control,” IEEE Transactions on Robotics and Automation, vol. 17, no. 6, pp. 947–951, 2001. [6] H. Tanner, A. Jadbabaie, and G. Pappas, “Flocking in Fixed and Switching Networks,” IEEE Transactions on Automatic Control, vol. 52, no. 5, pp. 863–868, 2007. [7] D. Dimarogonas and K. J. Kyriakopoulos, “On the Rendezvous Problem for Multiple Nonholonomic Agents,” IEEE Transactions on Automatic Control, vol. 52, no. 5, pp. 916–922, 2007. [8] A. Bhatia, M. Maly, L. Kavraki, and M. Vardi, “Motion Planning with Complex Goals,” IEEE Robotics and Automation Magazine,, vol. 18, no. 3, pp. 55–64, 2011. [9] H. Kress-Gazit, G. Fainekos, and G. Pappas, “Temporal-Logic-Based Reactive Mission and Motion Planning,” Robotics, IEEE Transactions on, vol. 25, no. 6, pp. 1370–1381, 2009. [10] S. Loizou and K. Kyriakopoulos, “Automatic Synthesis of Multi-Agent Motion Tasks Based on LTL Specifications,” IEEE Conference on Decision and Control (CDC), vol. 1, pp. 153–158, 2004. [11] M. Guo and D. Dimarogonas, “Multi-Agent Plan Reconfiguration Under Local LTL Specifications,” The International Journal of Robotics Research, vol. 34, no. 2, pp. 218–235, 2015. [12] S. Karaman and E. Frazzoli, “Linear Temporal Logic Vehicle Routing with Applications to Multi-UAV Mission Planning,” International Journal of Robust and Nonlinear Control, vol. 21, no. 12, pp. 1372– 1395, 2011. [13] M. Kloetzer and C. Belta, “Automatic Deployment of Distributed Teams of Robots From Temporal Logic Motion Specifications,” IEEE Transactions on Robotics, vol. 26, no. 1, pp. 48–61, 2010. [14] Y. Chen, X. Ding, A. Stefanescu, and C. Belta, “A Formal Approach to Deployment of Robotic Teams in an Urban-Like Environment,” Distributed Autonomous Robotic Systems, pp. 313–327, 2013. [15] Y. Chen, Ding, X. Chu, A. Stefanescu, and C. Belta, “Formal Approach to the Deployment of Distributed Robotic Teams,” IEEE Transactions on Robotics, vol. 28, no. 1, pp. 158–171, 2012. [16] M. Kloetzer, X. C. Ding, and C. Belta, “Multi-Robot Deployment from LTL Specifications with Reduced Communication,” IEEE Conference o Decision and Control (CDC), pp. 4867–4872, 2011. [17] A. Ulusoy, S. Smith, X. Ding, C. Belta, and D. Rus, “Optimality and Robustness in Multi-Robot Path Planning with Temporal Logic Constraints,” The Int. Jour. of Rob. Res., vol. 32, no. 8, pp. 889–911. [18] M. Quottrup, T. Bak, and R. Zamanabadi, “Multi-Robot Planning: A Timed Automata Approach,” IEEE International Conference on Robotics and Automation (ICRA), vol. 5, pp. 4417–4422, 2004. [19] M. Andersen, R. Jensen, T. Bakand, and M. Quottrup, “Motion Planning in Multi-Robot Systems Using Timed Automata,” 5th IFAC/EURON, 2004. [20] K. Larsen, P. Pettersson, and W. Yi, “UPPAAL in a Nutshell,” International Journal on Software Tools for Technology Transfer (STTT), vol. 1, no. 1, pp. 134–152, 1997. [21] A. Ulusoy, S. Smith, X. Ding, C. Belta, and D. Rus, “Optimal MultiRobot Path Planning with Temporal Logic Constraints,” 2011 IROS, pp. 3087–3092, 2011. [22] J. Liu and P. Prabhakar, “Switching Control of Dynamical Systems from Metric Temporal Logic Specifications,” 2014 ICRA, pp. 5333– 5338, 2014. [23] V. Raman, A. Donzé, D. Sadigh, R. Murray, and S. Seshia, “Reactive Synthesis from Signal Temporal Logic Specifications,” pp. 239–248. [24] Y. Zhou, D. Maity, and J. S. Baras, “Optimal Mission Planner with Timed Temporal Logic Constraints,” European Control Conference (ECC), 2015. [25] S. Karaman and E. Frazzoli, “Vehicle Routing Problem with Metric Temporal Logic Specifications,” IEEE Conference on Decision and Control (CDC), pp. 3953–3958, Dec 2008. [26] R. Alur, T. Feder, and T. A. Henzinger, “The Benefits of Relaxing Punctuality,” Journal of the ACM (JACM), vol. 43, no. 1, pp. 116– 146, 1996. [27] R. Alur and D. Dill, “A Theory of Timed Automata,” Theoretical Computer Science, vol. 126, no. 2, pp. 183–235, 1994. [28] D. D. Souza and P. Prabhakar, “On the Expressiveness of MTL in the Pointwise and Continuous Semantics,” International Journal on Software Tools for Technology Transfer, vol. 9, no. 1, pp. 1–4, 2007. [29] J. Ouaknine and J. Worrell, “On the Decidability of Metric Temporal Logic,” IEEE Symposium on Logic in CS, pp. 188–197, 2005. [30] P. Bouyer, “From Qualitative to Quantitative Analysis of Timed Systems,” Mémoire D ’ habilitation, Université Paris, vol. 7, pp. 135– 175, 2009. [31] S. Tripakis, “Checking Timed Buchi Automata Emptiness on Simulation Graphs,” ACM TCL, vol. 10, no. 3, 2009. [32] O. Maler, D. Nickovic, and A. Pnueli, “From MITL to Timed Automata,” Formal Modeling and Analysis of Timed Systems, pp. 274– 289, 2006. [33] T. Brihaye, M. Estivenart, and G. Geeraerts, “On MITL and Alternating Timed Automata,” Formal Modeling and Analysis of Timed Systems, vol. 8053, pp. 47–61, 2013. [34] P. Tabuada, Verification and Control of Hybrid Systems: a Symbolic Approach. Springer Science and Business Media, 2009. [35] A. Girard and G. J. Pappas, “Approximation Metrics for Discrete and Continuous Systems,” IEEE Transactions on Automatic Control, vol. 52, no. 5, pp. 782–798, 2007. [36] R. Alur, T. Henzinger, G. Lafferriere, and G. Pappas, “Discrete Abstractions of Hybrid Systems,” Proceedings of the IEEE, vol. 88, no. 7, pp. 971–984, 2000. [37] R. Koymans, “Specifying Real-Time Properties with Metric Temporal Logic,” Real-time systems, vol. 2, no. 4, pp. 255–299, 1990. [38] D. Ničković and N. Piterman, “From MTL to Deterministic Timed Automata,” Formal Modeling and Analysis of Timed Systems, pp. 152– 167, 2010. [39] C. Baier and J. Katoen, Principles of Model Checking. MIT Press, 2008.
3cs.SY
Splitting schemes with respect to physical processes for double-porosity poroelasticity problemsI A.E. Kolesova , P.N. Vabishchevichb,∗ arXiv:1601.06368v1 [cs.CE] 24 Jan 2016 b Nuclear a North-Eastern Federal University, 58, Belinskogo, 677000 Yakutsk, Russia Safety Institute, Russian Academy of Sciences, 52, B. Tulskaya, 115191 Moscow, Russia Abstract We consider unsteady poroelasticity problem in fractured porous medium within the classical Barenblatt double-porosity model. For numerical solution of doubleporosity poroelasticity problems we construct splitting schemes with respect to physical processes, where transition to a new time level is associated with solving separate problem for the displacements and fluid pressures in pores and fractures. The stability of schemes is achieved by switching to three-level explicit-implicit difference scheme with some of the terms in the system of equations taken from the lower time level and by choosing a weight parameter used as a regularization parameter. The computational algorithm is based on the finite element approximation in space. The investigation of stability of splitting schemes is based on the general stability (well-posedness) theory of operator-difference schemes. A priori estimates for proposed splitting schemes and the standard two-level scheme are provided. The accuracy and stability of considered schemes are demonstrated by numerical experiments. Keywords: poroelasticity, double-porosity, operator-difference schemes, splitting scheme, regularization 1. Introduction Some aquifer and reservoir systems are formed by fractured rocks, which contain both pores and interconnected fractures. The fluid flow in such porous medium is most frequently modeled by the Barenblatt double-porosity model [4, 6], where we consider two diffusion processes coupled by an exchange term. Also, the pressures of fluid in both pores and fractures contribute to deformation of porous medium. Therefore, we incorporate Biot poroelasticity model [8] into Barenblatt model. The mathematical model of double-porosity poroelasticity problem includes the Lame equation for the displacement and two nonstationary parabolic equations for the I This work was supported by the Russian Foundation for Basic Research (projects 14-01-00785). author. Email addresses: [email protected] (A.E. Kolesov), [email protected] (P.N. Vabishchevich) ∗ Correspondibg Preprint submitted to arXiv.org March 15, 2018 fluid pressures in pores and fractures [7, 40]. Note that the displacement equation contains body forces, which are proportional to the gradient of pressures. In turn, the pressure equations includes dilation terms described by the divergence of the displacement velocity. The numerical solution of poroelasticity problems is usually based on a finite element approximation in space [33, 38]. It is well-known that in order to satisfy LBBcondition (inf-sup condition) [13] we must use mixed finite elements, where the order of approximation for pressure is lower then the order of approximation for displacement. The finite element formulation of poroelasticity problem with double-porosity is presented in [23]. For the time approximation the standard two-level finite difference schemes with weights are used. In [11] the stability and convergence of two-level schemes for double-porosity poroelasticity problems with finite-difference approximations in space were analyzed using the general stability (correctness) theory of operator-difference schemes [34, 35]. The numerical implementation of two-level schemes is associated with solving coupled system of equations, which requires the use of special algorithms [1, 19] or additive operator-difference schemes (splitting schemes) [30, 36]. Splitting schemes are designed for the efficient computational realization of various unsteady problems by switching to a chain of simpler problems. The simplest example of such schemes is splitting with respect to spatial variables (alternating direction methods). Regionally additive schemes or domain decomposition methods are widely used for computations on parallel computers. For poroelasticity problems we use splitting with respect to physical processes, when the transition to a new time level is performed by sequentially solving separate problems for displacement and pressure. Number of splitting schemes for poroelasticity problems are constructed and used in [3, 14, 15, 22, 24, 25, 27, 31, 39]. The analysis of stability and performance of these schemes is usually conducted using methodical computations without a theoretical study. Rigorous mathematical results concerning the stability of splitting schemes for poroelasticity problems are described in [37]. In this work, using Samarskii’s regularization principle for operator-difference schemes we construct splitting schemes with respect to physical processes for doubleporosity poroelasticity problems. The paper is organized as follows. After a brief description of the mathematical problem in Section 2, we introduce the variational formulation of problem in Section 3. Here, we obtain a priori estimate that ensures the stability of the solution of problem. Discretization in space and time are performed in Sections 4 and 5, respectively. Splitting schemes are constructed in Sections 6 and 7. Numerical experiments that test the convergence and stability of considered schemes are shown in Section 8. Conclusions follow. 2. Mathematical Model We consider double-porosity poroelasticity problems arising when a fluid flows through homogeneous and isotropic fractured medium where fractures and porous matrix represent two overlapping continua [4, 6]. In these continua two fluid flow processes with two different pressure fields occur. Therefore, the poroelasticity equations 2 can be expressed as β1 ∂p ∂t β2 ∂p ∂t div σ(u) − α1 grad p1 − α2 grad p2 = 0, ! ∂ div u k1 + α1 − div grad p1 + γ(p1 − p2 ) = f1 (x, t), ∂t η ! ∂ div u k2 + α2 − div grad p2 + γ(p2 − p1 ) = f2 (x, t). ∂t η (1) (2) (3) Here, u is the displacement vector, p1 is the fluid pressure in pores, and p2 is fluid pressure in fractures. The stress tensor σ is defined by the expression σ = 2µε(u) + λ div uI, where µ is the shear modulus, λ are the Lame coefficient, I is the unit tensor, and ε is the strain tensor: 1 ε = (grad u + grad uT ). 2 The other notation is as follows: α is Biot coefficients, β = 1/M, M is the Biot modulus, k1 , k2 are the permeability tensors, η is the viscosity of the fluid, γ is the exchange parameter, and f1 , f2 are the functions describing given fluid sources (sinks). The subscripts 1 and 2 represent notation associated with pores and fractures, respectively. The system (1)–(3) is considered in a bounded domain Ω with a boundary Γ, on which, for simplicity, we set the following homogeneous conditions for displacements u = 0, x ∈ ΓD , σn = 0, x ∈ ΓN . (4) For pressures we set p1 = 0, x ∈ ΓN , − k1 ∂p1 = 0, η ∂n x ∈ ΓD , (5) k2 ∂p2 = 0, x ∈ ΓD . (6) η ∂n Here, n is the unit normal to the boundary, Γ = ΓD + ΓN . In addition, we specify the initial conditions for pressures as p2 = 0, x ∈ ΓN , p1 (x, 0) = s1 (x), − p2 (x, 0) = s2 (x), x ∈ Ω. (7) The initial-boundary problem (1)–(7) for coupled parabolic and elliptic equations is the basis for considering fluid flow in deformable fractured porous medium. 3. Variational Formulation For the numerical solution, we use finite element approximation in space [12, 26], so we need obtain a variational formulation of problem (1)–(7). For scalar quantities, let us introduce the Hilbert space L2 (Ω) with the scalar product and norm given as Z (u, v) = u(x)v(x), kuk = (u, u)1/2 . Ω 3 For vector quantities, we use L2 (Ω) = [L2 (Ω)]m , where m = 2, 3 is the dimension of domain Ω. Let H 1 (Ω) and H1 (Ω) be the Sobolev spaces. Next, we define the subspaces of scalar and vector functions Q = {q ∈ H 1 (Ω) : q(x) = 0, x ∈ ΓD }, V = {v ∈ H1 (Ω) : v(x) = 0, x ∈ ΓD }. After multiplying (1), (2), and (3) by test functions v ∈ V and q1 , q2 ∈ Q, respectively, and integrating by parts to eliminate the second order derivatives, we come to the following variational problem: Find u ∈ V, p1 , p2 ∈ Q such that a(u, v) + α1 g(p1 , v) + α2 g(p2 , v) = 0, ∀v ∈ V, (8) ! ∂u ∂p1 , q1 + α1 d , q1 + b1 (p1 , q1 ) + γ(p1 − p2 , q1 ) = ( f1 , q1 ), ∀q1 ∈ Q, (9) c1 ∂t ∂t ! ! ∂p2 ∂u c2 , q2 + α2 d , q2 + b2 (p2 , q2 ) + γ(p2 − p1 , q2 ) = ( f2 , q2 ), ∀q2 ∈ Q. (10) ∂t ∂t ! Here, the bilinear forms are defined as a(u, v) = g(p, v) = Z σ(u)ε(v) dx, Ω Z Ω d(u, q) = grad p v dx, c1 (p, q) = β1 Z Ω Z b2 (p, q) = Z Ω Ω Ω c2 (p, q) = β2 p q dx, b1 (p, q) = Z div u q dx, Z p q dx, Ω k1 grad p grad q dx, η k2 grad p grad q dx. η The initial conditions (7) are set as: (p1 (0), q1 ) = (s1 , q1 ), (p2 (0), q2 ) = (s2 , q2 ), q1 , q2 ∈ Q. (11) The bilinear form a(·, ·) is symmetric and positive definite: a(u, v) = a(v, u), a(u, u) ≥ δa kuk2 , δa > 0, u, v ∈ V. Taking into account this, the form is associated with a Hilbert space Ha with the following inner product and norm: (u, v)a = a(v, u), kuka = (a(u, u))1/2 . The norm of the adjoint of the space Ha is denoted by kuk∗,a . Note, that forms b1 (·, ·), b2 (·, ·), c1 (·, ·), and c2 (·, ·) are also symmetric and positive definite. 4 According to the Green’s formula, we have Z Z Z div u p dx = − grad p u dx + un p dx. Ω Ω Γ Then, in view of the boundary conditions (4)–(6), forms g(·, ·) and d(·, ·) are related as d(u, p) = − g(p, u), p ∈ Q, u ∈ V. Now, we derive the simplest a priori estimates for the solution of problem (8)–(11). Setting v = ∂u/∂t in (8), q1 = p1 in (9), and q2 = p2 in (10), summing up these equations and taking into account that, for example, ! ∂u 1d a u, = a(u, u), ∂t 2 dt we obtain  1d a(u, u) + c1 (p1 , p1 ) + c2 (p2 , p2 ) + b1 (p1 , p1 ) + b2 (p2 , p2 ) 2 dt + γkp1 − p2 k2 = ( f1 , p1 ) + ( f2 , q2 ). For the right-hand side we use the following inequalities 1 ( fl , pl ) ≤ kpl k2bl + k fl k2∗,bl , 4 l = 1, 2. Thus, we have  1 d (kuk2a + kp1 k2c1 + kp2 k2c2 ) ≤ k f1 k2∗,b1 + k f1 k2∗,b1 . dt 2 Using the initial condition (11), we compute the initial displacement u0 (x) a(u0 , v) + α1 g(s1 , v) + α2 g(s2 , v) = 0, v ∈ V. Integration with respect to time gives the estimate: |uk2a + kp1 k2c1 + kp2 k2c2 ≤ ku0 k2a + ks1 k2c1 Z  1 t + ks2 k2c2 + k f1 (ξ)k2∗,b1 + k f2 (ξ)k2∗,b2 dξ. 2 0 (12) using the notation f (·, t) = f (t). A priori estimate (12) ensures the stability of the solution of problem (8)– (11) with respect to the initial data and the right-hand side. Similar estimates can be obtained for the solution of discrete problem. 5 4. Finite Element Approximation Now, we approximate our problem in space using finite element methods. First, we construct a computational mesh Ωh = {ω1 , ω2 , . . . , ωN } of domain Ω. Here, N is the number of cells ω, h = maxω∈Ωh hω , where hω is the diameter of circle inscribed in a cell ω. Then, in the mesh we define spaces of conformal finite elements for scalar and vector functions Qh ⊂ Q and Vh ⊂ V and restrict the variational problem (8)–(11) to these spaces: find uh ∈ Vh and p1,h , p2,h ∈ Qh such that a(uh , v) + α1 g(p1,h , v) + α2 g(p2,h , v) = 0, ∀v ∈ Vh , ! ! ∂p1,h ∂uh , q1 + α1 d , q1 + b1 (p1,h , q1 ) c1 ∂t ∂t c2 + γ(p1,h − p2,h , q1 ) = ( f1 , q1 ), q1 ∈ Qh , ! ! ∂p2,h ∂uh , q2 + α2 d , q2 + b2 (p2,h , q2 ) ∂t ∂t (13) (14) (15) + γ(p2,h − p1,h , q2 ) = ( f2 , q2 ), q2 ∈ Qh , (p1,h (0), q1 ) = (s1 , q1 ), (p2,h (0), q2 ) = (s2 , q2 ), q1 , q2 ∈ Qh . (16) For further consideration, it is convenient to use the operator formulation of problem (13)– (16). We define finite-dimensional operators A, B1 , B2 , C1 , C2 , D, G related to the corresponding bilinear forms by setting, for example, (Auh , v) = a(uh , v), ∀uh , v ∈ Vh . As a result, we come from problem (13)–(16) to the following Cauchy problem for a system of equations: Auh + α1G p1,h + α2G p2,h = 0, (17) d p1,h duh + α1 D +B1 p1,h + γE(p1,h − p2,h ) = f1,h , dt dt d p2,h duh C2 + α2 D +B2 p2,h + γE(p2,h − p1,h ) = f2,h , dt dt p1,h (0) = s1,h , p2,h (0) = s2,h . C1 (18) (19) (20) where E is the identity operator and ( fl,h , ql ) = ( fl , ql ), (sl,h , q1 ) = (sl , q), ∀ql ∈ Qh , l = 1, 2. The operator A, B1 , B2 , C1 and C2 are self-adjoint and positive definite, for example, A = A∗ > 0, while D and G are adjoint with to each other with an opposite sign: D = −G∗ . 6 Note that for the operator formulation (17)–(20) we can derive a discrete analogue of estimate (12): kuh k2A +kp1,h kC2 1 + kp2,h kC2 2 ≤ ku0,h k2A + ks1,h kC2 1 + ks2,h kC2 2 Z  1 t + k f1,h (ξ)k2∗,B1 + k f2,h (ξ)k2∗,B2 dξ. 2 0 (21) Now, introducing a vector of pressures: ph = {p1,h , p2,h }, from (17)–(20) we obtain Auh + G ph = 0, C (22) d ph duh +D + B ph = fh , dt dt ph (0) = sh . (23) (24) Here  G = α1 G C C= 1 0  ! α1 D D= , α2 D α2 G , ! 0 B + γE , B= 1 C2 −γE ! −γE , B2 + γE (25) and fh = { f1,h , f2,h }, sh = {s1,h , s2,h }. The operators C and B are self-adjoint and positive definite, and G∗ = −D in the sense of the equality (G ph , uh ) = −( ph , Duh ). Then, the solution of problem (22)–(24) satisfies the a priori estimates Z 1 t kuh k2A + kph k2C ≤ ku0,h k2A + ksh k2C + k fh (ξ)k2∗,B dξ. 2 0 Note that this estimate is similar to the apriori estimates (12), (21). 5. Time Discretisation For the discretization in time we use a uniform grid with a step τ > 0. Let un = uh (x, tn ), pn = ph (x, tn ), where tn = nτ, n = 0, 1, . . . . To obtain an approximate solution of problem (17)–(20) we use the standard two-level scheme with weights: Aun+1 + G pn+1 = 0, C pn+1 − pn un+1 − un +D + B pn+1 = fθn+1 , θ τ τ (26) (27) where pn+1 = θ pn+1 + (1 − θ)pn , θ fθn+1 = fh (tθn+1 ) and 0 ≤ θ ≤ 1. The initial condition is written as ( p0 , q) = (s, q). 7 (28) Theorem 1. For θ ≥ 0.5 the solution of problem (26)–(28) satisfies the a priori estimate τ kun+1 k2A + kpn+1 k2C ≤ kun k2A +kpn k2C + k fθn+1 k2B−1 . 2 (29) un+1 − un and (27) by pn+1 θ , we get τ ! ! n+1 − un un+1 − un n+1 u + G p , = 0, Aun+1 , θ θ τ τ ! ! pn+1 − pn n+1 un+1 − un n+1 n+1 n+1 n+1 C , pθ + D , pθ + (B pn+1 θ , pθ ) = ( fθ , pθ ), τ τ Proof. In view if linearity, multiplying (26) by where un+1 = θun+1 + (1 − θ)un . θ Summing up these equations, we obtain ! ! n+1 − un pn+1 − pn n+1 n+1 u n+1 n+1 n+1 Auθ , + C , pθ + (B pn+1 θ , pθ ) = ( fθ , pθ ). τ τ Taking into account inequality 1 n+1 2 n+1 2 ( fθn+1 , pn+1 θ ) ≤ kpθ k B + k fθ k B−1 , 4 gives Aun+1 θ , ! ! pn+1 − pn n+1 1 un+1 − un + C , pθ ≤ || fθn+1 ||2B−1 . τ τ 4 Using the equality vn+1 = θvn+1 + (1 − θ)vn = θ ! 1 n+1 vn+1 + vn + θ− (v − vn ) 2 2 and taking into account that any self-adjoint operator A satisfies (A(u + v), u − v) = (Au, u) − (Av, v), we obtain  1  1  n+1 2 ||u ||A − ||un ||2A + || pn+1 ||2C − || pn ||2C 2 2 !  τ 1  n+1 + θ− ||u − un ||2A + ||pn+1 − pn ||2C ≤ || fθn+1 ||2B−1 . 2 4 For θ ≥ 0.5, this yields the required estimate (29). 8 Note that in the numerical implementation of weighted scheme (26)–(28) un+1 , and pn+1 are determined at each time level by solving the coupled system: 2 pn+1 1 , Aun+1 + α1G p1n+1 + α2G pn+1 = 0, 2 = ψn+1 + α1 Dun+1 + θτ(B1 + γE)p1n+1 − θτγE pn+1 C1 pn+1 1 , 2 1 C2 pn+1 + α2 Dun+1 + θτ(B2 + γE)p2n+1 − θτγE pn+1 = ψn+1 2 1 2 , with the corresponding ψn+1 and ψn+1 1 2 . Various special numerical algorithms can be used to solve this system [1, 19]. Another opportunity is to construct splitting schemes: Aun+1 = ϕn+1 u , C1 pn+1 + θτB1 pn+1 = ϕn+1 p1 , 1 1 C2 pn+1 + θτB2 pn+1 = ϕn+1 p2 , 2 2 where the transition to a new time level involves the solution of separate equations for displacements and pressures. 6. Incomplete Splitting Scheme To construct splitting schemes, we express u = uh from (22) and substitute the result into (23), which leads to a single equation for p = ph − DA−1 G dp dp +C + Bp = f. dt dt This equation can be written as ep = f , edp + A B dt (30) e = B, and the operator B e is equal to sum of two self-adjoint, positive definite where A operators: e=B e0 + B e1 , B e0 = C, B e1 = −DA−1 G. B (31) eB e are self-adjoint and positive definite. The operators A, Under the following constraint e1 ≤ γB B e0 , B γB > 0, (32) for the numerical solution of problem (24), (30), we can use a thee-level explicitimplicit scheme with weights [18]: n n n−1  n n−1  n+1 e0 θ p − p + (1 − θ) p − p e1 p − p + A epn+1 = f n+1 . +B B τ τ τ 9 (33) To calculate the first step, we can apply the two-level scheme p0 = p0 , 1 0 ep − p + A ep1 = f 1 . B τ (34) The value of θ is determined by the stability conditions for difference scheme (33), (34). Taking into account equalities pn+1 − pn pn+1 − pn−1 τ pn+1 − 2pn + pn−1 , = + τ 2τ 2 τ2 pn − pn−1 pn+1 − pn−1 τ pn+1 − 2pn + pn−1 = − , τ 2τ 2 τ2 pn+1 − pn + pn , τ we can write the scheme (33) in the canonical form of three-level operator-difference schemes pn+1 = τ n+1 ep C − pn−1 e pn+1 − 2 pn + pn−1 e n +D + A p = f n. 2τ τ2 (35) e e where C, D are the self-adjoint and positive definite operators given by e=B e + τ A, e C 2  τ e e0 − B e1 + τ A. e D= (2θ − 1) B 2 2 (36) Our subsequent analysis is based on the following general statement from the stability (well-posedness) theory of three-level operator-difference schemes [34, 35]. Lemma 1. For τ2 e e D > A, 4 scheme (35) is unconditionally stable and its solution satisfies the estimate En+1 ≤ En + where En = pn + pn−1 2 τ n+1 f 2 2 + e A 2 e−1 C pn − pn−1 τ (37) , 2 . 2 e e D− τ4 A Then, stability condition (37) holds if e0 − B e1 ≥ 0. (2θ − 1) B In view of inequalities (32), this is achieved if we choose 2θ ≥ 1 + δ, 10 (38) where δ is determined from (32) as the maximum eigenvalue of spectral problem δ = νmax : e1 p = ν B e0 p. B Taking into account (31) yields − DA−1 G p = νC p. We set u = −A−1 G p and come to the problem Au + G p = 0, Du = νC p. Excluding p, we have GC−1 Du + νAu = 0. Taking into account (25), we get the Cosserat spectrum problem [16, 32] (α21 + α22 )GC−1 Du + νAu = 0. (39) In principle, the maximum eigenvalue in (39) depends on the physical parameters of the differential problem (αi , βi , i = 1, 2, µ, λ) and the domain, but not on the time steps. Combining (31) and (33), we obtain the following incomplete splitting scheme: Aun+1 + G pn = 0, (40)  pn+1 − pn pn − pn−1  un+1 − un (41) Cθ + (1 − θ) +D + B pn+1 = f n+1 , τ τ τ where the solution is determined by solving separately the elasticity problem (40) and the double porosity problem (41). The stability of this splitting scheme can be described by the following theorem: Theorem 2. Scheme (40), (41) is unconditionally stable for 2θ ≥ 1 + δ, where δ = νmax is the maximum eigenvalue of spectral problem (39). 7. Full Splitting Scheme In the splitting scheme with respect to physical processes (40), (41) on each time level we solve two separate problems: the displacement problem (40) and the coupled problem for pressures in pores and fractures (41). It makes sense to build a splitting scheme, where we have separate problems for pressures as well. e as We can split the scheme (30) further separating the diagonal part of operator A follows e= A e0 + A e1 , A (42) where e0 = B1 + γE A 0 ! 0 , B2 + γE e1 = A 0 −γE ! −γE . 0 Under the assumption e0 − A e1 ≥ 0 A 11 (43) e we can use the following which follows from positive-definiteness of the operator A, explicit-implicit scheme n n n−1   n+1 e0 θ p − p + (1 − θ) p − p B τ τ n n−1 p − p e1 e0 pn+1 + A e1 pn = f n+1 . +B +A τ (44) Similar to (33) scheme (44) can be written in the canonical form of three-level operator difference schemes (35) with e=B e + τA e0 , C 2  τ e0 − B e1 + τ A e0 , e (2θ − 1) B D= 2 2 and the analysis of the resulting scheme can be based on Lemma 1. In this case, the stability condition (37) takes the form   e0 − B e1 + τ(2 A e0 − A) e > 0. 2 (2θ − 1) B Taking into account (42), (43), the stability condition becomes 2θ ≥ 1 + δ, where δ is determined from (39). Finally, combining (31), (42), and (44), we have the full splitting scheme: Aun+1 + α1G pn1 + α2G pn2 = 0, α1 D un+1 − un + B1 pn+1 + γ(pn+1 − pn2 ) 1 1 τ  pn+1 − pn1  pn − pn−1 1 + C1 θ 1 + (1 − θ) 1 = f1n+1 , τ τ (45) (46) un+1 − un + B2 pn+1 + γ(pn+1 − pn1 ) 2 2 τ (47)   pn+1 − pn2 pn − pn−1 2 + (1 − θ) 2 = f2n+1 . + C2 θ 2 τ τ Here, the solution is determined by solving each equation separately. We can formulate a similar theorem, which describes the stability of this scheme: α2 D Theorem 3. Splitting scheme (45)–(47) is unconditionally stable for 2θ ≥ 1 + δ, where δ = νmax is the maximum eigenvalue of spectral problem (39). 8. Numerical Experiment We consider a two-dimensional double-porosity poroelasticity problem in a unit square domain Ω subjected to a surface load g as in Fig. 1. At some centered upper part of the domain Γ1 the load g = −sin(πt)n is applied in strip of length 0.2 m. The remaining of the top boundary Γ2 is traction free. On the vertical boundaries Γ3 we set zero horizontal displacement and vertical surface traction. The bottom of the domain Γ4 is assumed to be fixed, i.e. the displacement vector is taken as zero. For pressures, 12 we prescribe both pore and fracture pressure to be zero at Γ2 , while the remaining boundaries are impermeable. More precisely, the boundary conditions are given as follows p1 = 0, p2 = 0, σn = 0, x ∈ Γ1 , ∂p2 ∂p1 = 0, = 0, σn = g, x ∈ Γ2 , ∂n ∂n ∂p1 ∂p2 = 0, = 0, (σn) × n = 0, un = 0, x ∈ Γ3 , ∂n ∂n ∂p2 ∂p1 = 0, = 0, u = 0, x ∈ Γ4 . ∂n ∂n Similar mathematical model is commonly used to test computational algorithms for numerical solution of poroelasticity problems [9, 10, 17]. Γ2 Γ2 Γ1 Γ3 Ω Γ3 Γ4 Figure 1: Computational domain To analyze the considered numerical schemes and to identify the dependence of the stability of splitting schemes from the problem parameters we use three sets of input parameters presented in Table 1. For convenience, we vary only values of the β1 and β2 , and other parameters are the same for all sets. For the numerical solution we use four computational meshes of different quality with the local refinement in the area of application of the traction. The numbers of vertices, cells, and degrees of freedom (dof) of u, p1 , p2 , and w = {u, p1 , p2 } for each mesh are given in Table 2. Fig 2 shows the coarse mesh 1. Here, the quadratic vector element and the linear scalar element are used for discretization of the displacement and pressures, respectively. Therefore, the number of dofs for the the displacement u is much higher than the dofs number for the pressures p1 and p2 . The numerical implementation is performed using the DOLFIN library, which is a part of the FEniCS project for automated solution of differential equations by finite element methods [2, 28, 29]. The computational meshes are generated using the Gmsh 13 Table 1: Problem properties Parameter η µ λ β1 β2 k1 k2 α1 α2 γ Unit Pa·s MPa MPa GPa−1 GPa−1 10−15 m2 10−15 m2 − − 10−10 kg/(m·s) Set 1 0.001 4.2 2.4 54 14 6.18 27, 2 0.95 0.12 5 Set 2 0.001 4.2 2.4 108 24 6.18 27.2 0.95 0.12 5 Set 3 0.001 4.2 2.4 216 48 6.18 27.2 0.95 0.12 5 software [20]. To solve systems of linear equations we use LU solver provided by PETSc [5]. Table 2: Parameters of meshes Vertices Cells Number of u dof Number of p1 dof Number of p2 dof Number of w dof mesh 1 881 1654 6830 881 881 8592 mesh 2 3409 6604 26842 3409 3409 33660 mesh 3 13398 26370 106330 13398 13398 133126 mesh 4 52366 103884 417230 52366 52366 521962 Fig. 3 – 5 show the displacement and pressures in pores and fractures, respectively, at time t = 0.5 s, which are obtained using the two-level scheme (26)–(28) with θ = 1.0 on the finest mesh 4 and time step τ = 0.0025 s. The displacement is presented on the deformed domain (overstated for visual contrast). We see that the pressure in fractures declines more rapidly than in pores. These results will be used as etalon solutions ue , p1,e , and p2,e to evaluate errors as εu = ||ue − u||, ε p1 = ||p1,e − p1 ||, ε p2 = ||p2,e − p2 ||. We analyze the dependence of the accuracy of two-level scheme with weights (26)– (28) from computational parameters: mesh and time step sizes. On this stage, we employ only the first set of input parameters (Table. 1), because they do not have an impact on the computational character of two-level scheme. Fig. 6 illustrates the dynamics of errors of the pressure in pores ε p1 for different meshes 1, 2, and 3 with τ = 0.0025 s, while errors for different time steps τ = 0.02, 0.01, and 0.005 s on mesh 3 are shown in Fig. 7. The weight θ = 1.0 is used. We 14 Figure 2: Computational mesh 1 observe the convergence of solution when increasing quality of mesh and reducing time step τ. Now, we conduct experiments to demonstrate the efficiency of incomplete splitting scheme (40)–(41). First, using the SLEPs library [21] we solve the eigenvalue problem (39) and find the value of δ = νmax and estimate the minimum value of the weight θ using (38), when three-level scheme is unconditionally stable. The results are presented in Table 3. Note that the eigenvalues νmax are virtually independent from mesh size and depend only on the problem properties. In Figs. 8 – 10 we present the dynamics of errors ε p1 for different values of θ for sets 1, 2, and 3, respectively. In all cases, if the condition (38) is not satisfied, then the Table 3: Parameter δ and weight θ δ θ Set 1 2.49 1.75 Set 2 1.25 1.12 15 Set 3 0.62 0.81 Figure 3: Distribution of displacement Figure 4: Distribution of pressures in pores 16 Figure 5: Distribution of pressures in fractures Figure 6: Coupled scheme: comparison of the errors ε p1 for different meshes solution is unstable. When the value of the weight is taken according to Table 3, the solution is regularized. 17 Figure 7: Coupled scheme: comparison of the errors ε p1 for different time steps Table 4: Solve time for different meshes and numerical schemes mesh 1 mesh 2 mesh 3 mesh 4 Full splitting scheme 6.894 27.578 154.824 866.452 Incomplete splitting scheme 7.045 28.452 165.958 1033.207 Coupled scheme 12.684 55.892 305.932 2488.546 Next, we consider the full splitting scheme (45)–(47). The dynamics of errors of the pressure in fractures ε p2 for different meshes and time steps are shown in Figs. 11 and 12. Here, we use the first set of input parameters (Table 1) and θ = 1.8. We also see good convergence of solution. Finally, in Table 4 we present the dependence of solve time of coupled scheme (26), (27), incomplete splitting scheme (40), (41), and full splitting scheme (45)–(47) from mesh size. Here, the first set of input parameters and τ = 0.005 are used. We see that splitting schemes are significantly faster than coupled scheme. When mesh is small, the solve times of the incomplete and full splitting schemes differ little from each other. When mesh is big, the full splitting scheme is much faster than incomplete scheme. 9. Conclusion In this paper, we constructed unconditionally stable three-level splitting schemes with weights for numerical solution of double-porosity poroelasticity problems. The 18 Figure 8: Incomplete splitting scheme: comparison of the errors ε p1 for different θ and Set 1 Figure 9: Incomplete Splitting scheme. Comparison of the errors ε p1 for different θ and Set 2 19 Figure 10: Incomplete splitting scheme: comparison of the errors ε p1 for different θ and Set 3 Figure 11: Full splitting scheme: comparison of the errors ε p2 for different meshes analysis was based on the general theory of stability and correctness of operatordifference schemes. The finite element method was used approximation in space. The efficiency of considered schemes were verified by numerical experiments. 20 Figure 12: Full splitting scheme: comparison of the errors ε p2 for different time steps References [1] Alexsson, O., Blaheta, R., Byczanski, P.: Stable discretization of poroelastiicty problems and efficient preconditioners for arising saddle point type matrices. Comput. Vissualizat. in Sci. 15(4), 191–2007 (2013) [2] Alnæs, M.S., Blechta, J., Hake, J., Johansson, A., Kehlet, B., Logg, A., Richardson, C., Ring, J., Rognes, M.E., Wells, G.N.: The fenics project version 1.5. Archive of Numerical Software 3(100), 9–23 (2015) [3] Armero, F., Simo, J.C.: A new unconditionally stable fractional step method for non-linear coupled thermomechanical problems. International Journal for Numerical Methods in Engineering 35(4), 737–766 (1992) [4] Bai, M., Elsworth, D., Roegiers, J.C.: Multiporosity/Multipermeability Approach to the Simulation of Naturally Fractured Reservoirs. Water Resources Research (29), 1621–1633 (1993) [5] Balay, S., Abhyankar, S., Adams, M.F., Brown, J., Brune, P., Buschelman, K., Dalcin, L., Eijkhout, V., Gropp, W.D., Kaushik, D., Knepley, M.G., McInnes, L.C., Rupp, K., Smith, B.F., Zampini, S., Zhang, H.: PETSc Web page. http: //www.mcs.anl.gov/petsc (2015) [6] Barenblatt, G.I., Zheltov, I.P., Kochina, I.N.: Basic concepts in the theory of seepage of homogeneous liquids in fissured rocks [strata]. Journal of Applied Mathematics and Mechanics 24(5), 1286–1303 (1960) 21 [7] Beskos, D.E., Aifantis, E.C.: On the theory of consolidation with double porosityII. International Journal of Engineering Science 24(11), 1697–1716 (1986) [8] Biot, M.A.: General theory of three dimensional consolidation. Journal of Applied Physics 12(2), 155–164 (1941) [9] Boal, N., Gaspar, F.J., Lisbona, F.J., Vabishchevich, P.N.: Finite-difference analysis of fully dynamic problems for saturated porous media. Journal of Computational and Applied Mathematics 236(6), 1090–1102 (2011) [10] Boal, N., Gaspar, F.J., Lisbona, F.J., Vabishchevich, P.N.: Finite-difference analysis for the linear thermoporoelasticity problem and its numerical resolution by multigrid methods. Mathematical Modelling and Analysis 17(2), 227–244 (2012) [11] Boal, N., Gaspar, F.J., Lisbona, F.J., Vabishchevich, P.N.: Finite difference analysis of a double-porosity consolidation model. Numerical Methods for Partial Differential Equations 28(1), 138–154 (2012) [12] Brenner, S.C., Scott, L.R.: The mathematical theory of finite element methods. Springer, New York (2008) [13] Brezzi, F., Fortin, M.: Mixed and hybrid finite element methods. Springer (1991) [14] Bukač, M., Yotov, I., Zakerzadeh, R., Zunino, P.: Partitioning strategies for the interaction of a fluid with a poroelastic material based on a nitsches coupling approach. Computer Methods in Applied Mechanics and Engineering 292, 138– 170 (2015) [15] Bukač, M., Yotov, I., Zunino, P.: An operator splitting approach for the interaction between a fluid and a multilayered poroelastic structure. Numerical Methods for Partial Differential Equations 31(4), 1054–1100 (2015) [16] Bychenkov, Y.V., Chizhonkov, E.V.: Iterative methods for solving saddle problems (in Russian). Binom, Moscow (2010) [17] Gaspar, F.J., Gracia, J.L., Lisbona, F.J., Vabishchevich, P.N.: A stabilized method for a secondary consolidation biot’s model. Numerical Methods for Partial Differential Equations 24(1), 60–78 (2008) [18] Gaspar, F.J., Grigoriev, A.V., Vabishchevich, P.N.: Explicit-implicit splitting schemes for some systems of evolutionary equations. Internat. J. of Num. Analys. Model. 11(2), 346–357 (2014) [19] Gaspar, F.J., Lisbona, F.J.: An efficient multigrid solver for a reformulated version of the poroelasticity system. Computer Methods in Applied Mechanics and Engineering 196(8), 1447–1457 (2007) [20] Geuzaine, C., Remacle, J.F.: Gmsh: A 3-d finite element mesh generator with built-in pre-and post-processing facilities. International Journal for Numerical Methods in Engineering 79(11), 1309–1331 (2009) 22 [21] Hernandez, V., Roman, J.E., Vidal, V.: SLEPc: A scalable and flexible toolkit for the solution of eigenvalue problems. ACM Trans. Math. Software 31(3), 351–362 (2005) [22] Jha, B., Juanes, R.: A locally conservative finite element framework for the simulation of coupled flow and reservoir geomechanics. Acta Geotechnica 2(3), 139– 153 (2007) [23] Khaled, M.Y., Beskos, D.E., Aifantis, E.C.: On the theory of consolidation with double porosity–III A finite element formulation. International journal for numerical and analytical methods in geomechanics 8(2), 101–123 (1984) [24] Kim, J., Tchelepi, H., Juanes, R.: Stability and convergence of sequential methods for coupled flow and geomechanics: Drained and undrained splits. Computer Methods in Applied Mechanics and Engineering 200(2324), 2094 – 2116 (2011) [25] Kim, J., Tchelepi, H., Juanes, R.: Stability and convergence of sequential methods for coupled flow and geomechanics: Fixed-stress and fixed-strain splits. Computer Methods in Applied Mechanics and Engineering 200(1316), 1591 – 1606 (2011) [26] Knabner, P., Angermann, L.: Numerical methods for elliptic and parabolic partial differential equations. Springer Verlag, New York (2003) [27] Kolesov, A.E., Vabishchevich, P.N., Vasileva, M.V.: Splitting schemes for poroelasticity and thermoelasticity problems. Computers & Mathematics with Applications 67(12), 2185–2198 (2014) [28] Logg, A., Mardal, K.A., Wells, G.N., et al.: Automated Solution of Differential Equations by the Finite Element Method. Springer (2012) [29] Logg, A., Wells, G.N.: Dolfin: Automated finite element computing. ACM Transactions on Mathematical Software 37(2) (2010) [30] Marchuk, G.I.: Splitting and alternating direction methods. In: P. Ciarlet, J.L. Lions (eds.) Handbook of Numerical Analysis, pp. 197–462. North-Holland (1990) [31] Mikelić, A., Wheeler, M.F.: Convergence of iterative coupling for coupled flow and geomechanics. Computational Geosciences 17(3), 455–461 (2012) [32] Mikhlin, S.G.: The spectrum of a family of operators in the theory of elasticity. Russian Mathematical Surveys 28(3), 45 (1973) [33] Phillips, P., Wheeler, M.: Overcoming the problem of locking in linear elasticity and poroelasticity: an heuristic approach. Computational Geosciences 13(1), 5– 12 (2008) [34] Samarskii, A.A.: The theory of difference schemes. Marcel Dekker, New York (2001) 23 [35] Samarskii, A.A., Matus, P.P., Vabishchevich, P.N.: Difference schemes with operator factors. Kluwer (2002) [36] Vabishchevich, P.N.: Additive operator-difference schemes. Splitting schemes. de Gruyter (2014) [37] Vabishchevich, P.N., Vasileva, M.V., Kolesov, A.E.: Splitting scheme for poroelasticity and thermoelasticity problems. Computational Mathematics and Mathematical Physics 54(8), 1305–1315 (2014) [38] Wheeler, M., Xue, G., Yotov, I.: Coupling multipoint flux mixed finite element methodswith continuous galerkin methods for poroelasticity. Computational Geosciences 18(1), 57–75 (2013) [39] Wheeler, M.F., Gai, X.: Iteratively coupled mixed and galerkin finite element methods for poro-elasticity. Numerical Methods for Partial Differential Equations 23(4), 785–797 (2007) [40] Wilson, R.K., Aifantis, E.C.: On the theory of consolidation with double porosity. International Journal of Engineering Science 20(9), 1009–1035 (1982) 24
5cs.CE
Model Selection as a Multiple Testing Procedure: Improving Akaike’s Information Criterion Adrien Saumard Fabien Navarro CREST, CNRS-ENSAI, Université Bretagne Loire arXiv:1803.02078v2 [math.ST] 13 Apr 2018 Abstract By interpreting the model selection problem as a multiple hypothesis testing task, we propose a modification of Akaike’s Information Criterion that avoids overfitting, even when the sample size is small. We call this correction an over-penalization procedure. As a proof of concept, we show nonasymptotic optimality of our procedure for histogram selection in density estimation, by establishing sharp oracle inequalities for the Kullback-Leibler divergence. A strong feature of our theoretical results is that they include the estimation of unbounded log-densities. To do so, we prove several analytical and probabilistic lemmas that are of independent interest. In an experimental study, we also demonstrate state-of-the-art performance of our over-penalization procedure for bin size selection. MSC 2010 subject classifications: 62G07, 62G09, 62G10. Key words and phrases: model selection, multiple testing, AIC, maximum likelihood, density estimation, bin size, over-penalization, small sample size. 1 Introduction Since its introduction by Akaike in the early seventies [1], the celebrated Akaike’s Information Criterion (AIC) is an essential tool for the statistician and its use is nearly systematic in problems of model choices and estimator selection for prediction. When selecting among estimators or models constructed from finite degrees of freedom, AIC more precisely recommends maximizing the loglikelihood of the estimators penalized by their corresponding degrees of freedom. This procedure has found pathbreaking applications in density estimation, regression, time series or neural networks analysis, to name but a few ([26]). Due to its simplicity and negligible computational cost—whenever the estimators are given—,it is also far from being outdated and continues to serve as one of the most useful devices for model selection in high dimensional statistics. For instance, it can be used to efficiently tune the Lasso ([45]). Any substantial and principled improvement of AIC is likely to have a significant impact on the practice of model choices and we bring in this paper an efficient and theoretically grounded solution to the problem of overfitting that can occur when using AIC on samples of small to moderate sample sizes. The fact that AIC tends to be unstable and thus is perfectible in case of small sample sizes is well-known from practitioners and has been noticed for a long time. Suguira [42] and Hurvich and Tsai [29] have proposed the so-called AICc (for AIC corrected), which tends to penalize more than AIC. However, the derivation of AICc comes from an asymptotic analysis where the dimension of the models are considered to be fixed compared to the sample size. In fact, such an assumption does not fit the usual practice of model selection, where the largest models are of dimensions close to the sample size. Another drawback related to AICc is that it has been legitimated through a mathematical analysis only in the linear regression model and for autoregressive models ([26]). However, to the best of our knowledge, outside these frameworks, there is no theoretical ground for using AICc. Building on considerations coming from the general nonasymptotic theory of model selection developed during the nineties (see for instance [9] and [35]) and in particular building on the analysis 1 2 Saumard and Navarro of Castellan [24], Birgé and Rozenholc [17] have considered a modification of AIC specifically designed for the selection of the bin size in histogram selection for density estimation. Indeed, results of [24]— and more generally results of [9]—advocate to take into account in the design of penalty the number of models to be selected. The importance of the cardinality of the collection of models for model selection is in fact a very general phenomenon and one of the main outcomes of the nonasymptotic model selection theory. In the bin size selection problem, this corresponds to adding a small amount to AIC. Unfortunately, the theory does not specify uniquely the term to be added to AIC. On the contrary, infinitely many corrections are accepted by the theory and in order to choose a good one, intensive experiments were carried in [17]. The resulting correction of AIC has thus still the drawback to be specifically designed for the task on which it has been tested. We propose a general approach, based on a multiple testing formulation of the model selection task, that surpasses the limits of the Unbiased Risk Estimation principle. The latter principle is indeed at the core of Akaike’s model selection procedure and is more generally the main principle of model selection, underlying procedures such as Stein’s Unbiased Risk Estimator (SURE, [40]) or cross-validation ([6]). We point out that, from the multiple testing point of view that we develop, unbiased risk estimation does not allow to control the sizes of the considered tests. In a nutshell, it is more efficient to estimate a quantile of the risk of the estimators–the level of the quantile depending on the size of the collection of models–than its mean. This is thus a new, very general model selection principle that we put forward. We call it an over-penalization procedure, because it systematically implies to add small terms to classical penalties such as AIC. Our procedure amounts to building an estimator from multiple tests. From this perspective, our work shares strong connections with recent breakthroughs obtained in robust estimation by designing estimators from tests ([15], [16], [8], [31]). However, our focus and our perspectives are noticeably different from this exiting line of works. Indeed, estimators such as T-estimators ([15]) or ρ-estimators ([8]) are quasi-universal estimator in the sense that they have very strong statistical guarantees, but they have the drawback to be very difficult—if feasible—to compute. Here, we rather keep the tractability of AIC procedure, but we don’t look particularly at robustness properties (for instance against outliers). Our focus is on an improvement of AIC for small and moderate sample sizes, that we explain in terms of the control of the sizes of our tests. Lets us now detail our contributions. • We propose a general formulation of the model selection task for prediction in terms of a multiple testing procedure (understood in a non-classical way to be detailed in Section 2.3.2), thus making a link between two major topics of contemporary research. In particular, we put forward a generic property that the collection of tests should satisfy in order to ensure an oracle inequality for the selected model. We call this property the “transitivity property” and show that it generalizes penalization procedures together with T-estimators and ρ-estimators. • Considering the problem of estimating a density by selecting an histogram, we prove a sharp and fully nonasymptotic oracle inequality for our procedure. Indeed, we describe a control of Kullback-Leibler (KL) divergence—also called excess risk—of the selected histogram as soon as we have one observation. We highlight that this very strong feature may not be possible by considering AIC. We also put on emphasis that up to our knowledge our oracle inequality is the first nonasymptotic result comparing the KL divergence of the selected model to the KL divergence of the oracle in an unbounded setting. Indeed, oracle inequalities in density estimation are generally expressed in terms of Hellinger distance—which is much easier to handle than the KL divergence, because it is bounded—for the selected model. • In order to prove our oracle inequality, we improve upon the previously best known concentration inequality for the chi-square statistics (Castellan [24], Massart [35]) and this allows us to gain an order of magnitude in the control of the deviations of the excess risks of the estimators. Our result on the chi-square statistics is general and of independent interest. • We also prove new Bernstein-type concentration inequalities for log-densities that are unbounded. Again, these probabilistic results, that are naturally linked to information theory, are general and of independent interest. • We generalize previous results of Barron and Sheu [10] related to the existence of margin rela- Model Selection as a Multiple Testing Procedure 3 tions in maximum likelihood estimation (MLE). Indeed, related results of [10] where established under boundedness of the log-densities and we extend them to unbounded log-densities with moment conditions. • Finally, from a practical perspective, we bring a nonasymptotic improvement of AIC that has, in its simplest form, the same computational cost as AIC. Furthermore, we show that our over-penalization procedure largely outperforms AIC on small and moderate sample sizes, but also outperforms existing corrections of AIC such as AICc or Birgé-Rozenholc’s procedure. Let us conclude this introduction by detailing the organization of the paper. We present our over-penalization procedure in Section 2. More precisely, we detail in Sections 2.1 and 2.2 our model selection framework related to MLE via histograms. Then in Section 2.3 we define formally over-penalization procedures and highlight their generality. We explain then from three different angles the ideas underlying over-penalization: estimation of the ideal penalty, multiple testing and a geometric point of view. Section 3 is devoted to the statistical guarantees related to over-penalization. In particular, as concentration properties of the excess risks are at the core of the design of an over-penalization, we detail them in Section 3.1. Then we derive a general and sharp oracle inequality in Section 3.2 and highlight the theoretical benefits compared to an analysis of AIC. New mathematical tools that are of probabilistic and analytical nature and of independent interest are presented in Section 4. Section 5 contains the experiments, with the practical procedures detailed. We consider two different practical variants of over-penalization and compare them to existing penalization procedures. The superiority of our method is in particular transparent. The proofs are gathered in Section 6, as well as in the Appendix A which provides further theoretical developments that extend the description of our over-penalization procedure. 2 Statistical Framework and Notations The over-penalization procedure, described in Section 2.3, is legitimated at a heuristical level in a generic setting of selection of M-estimators. We put to emphasis in Section 2.1 a maximum likelihood estimation (MLE) setting since, as a proof of concept for our over-penalization procedure, our theoretical and experimental results will address the case of bin size selection for maximum likelihood histogram selection in density estimation. In order to be able to discuss in Section 2.3 the generality of our approach in an M-estimation setting, our presentation of MLE brings notations that directly extend to M-estimation with a general contrast. 2.1 Maximum Likelihood Density Estimation We are given n independent observations (ξ1 , . . . , ξn ) with unknown common distribution P on a measurable space (Z, T ). We assume that there exists a known probability measure µ on (Z, T ) such that P admits a density f∗ with respect to µ: f∗ = dP/dµ. Our goal is to estimate the density f∗ . R For an integrable function f on Z, we set P f = P (f ) = Z f (z) dP (z) and µf = µ (f ) = R Pn f (z) dµ (z). If P = 1/n δ denotes the empirical distribution associated to the sample n ξ i=1 i Z P (ξ1 , . . . , ξn ), then we set Pn f = Pn (f ) = 1/n ni=1 f (ξi ). Moreover, taking the conventions ln 0 = −∞, 0 ln 0 = 0 and defining the positive part as (x)+ = x ∨ 0, we set   Z S = f : Z −→ R+ ; f dµ = 1 and P (ln f )+ < ∞ . Z We assume that the unknown density f∗ belongs to S. R Note that since P (ln f∗ )− = f∗ ln f∗ 1f∗ ≤1 dµ < ∞, the fact that f∗ belongs to S is equivalent to ln(f∗ ) ∈ L1 (P ), the space of integrable functions on Z with respect to P . We consider the MLE of the density f∗ . To do so, we define the maximum likelihood contrast γ to be the following functional, γ : f ∈ S 7−→ (z ∈ Z 7−→ − ln (f (z))) . 4 Saumard and Navarro Then the risk P γ (f ) associated to the contrast γ on a function f ∈ S is the following, P γ (f ) = P (ln f )− − P (ln f )+ ∈ R ∪ {+∞} . Also, the excess risk of a function f with respect to the density f∗ is classically given in this context by the KL divergence of f with respect to f∗ . Recall that for two probability distributions Pf and Pt on (Z, T ) of respective densities f and t with respect to µ, the KL divergence of Pt with respect to Pf is defined to be     (R R dPf f ln dP = f ln g dPg t dµ if Pf  Pg Z Z K (Pf , Pg ) = ∞ otherwise. By a slight abuse of notation we denote K (f, t) rather than K (Pf , Pt ) and by the Jensen inequality we notice that K (f, t) is a nonnegative quantity, equal to zero if and only if f = t µ-a.s. Hence, for any f ∈ S, the excess risk of a function f with respect to the density f∗ satisfies   Z f∗ P (γ(f )) − P (γ (f∗ )) = ln f∗ dµ = K (f∗ , f ) ≥ 0 (1) f Z and this nonnegative quantity is equal to zero if and only if f∗ = f µ − a.s. Consequently, the unknown density f∗ is uniquely defined by f∗ = arg min {P (− ln f )} f ∈S = arg min {P γ (f )} . f ∈S For a model m, that is a subset m ⊂ S, we define the maximum likelihood estimator on m, whenever it exists, by fˆm ∈ arg min {Pn γ (f )} f ∈m ( n ) 1X = arg min − ln (f (ξi )) . f ∈m n (2) i=1 2.2 Histogram Models The models m that we consider here to define the maximum likelihood estimators as in (2) are made of histograms defined on a fixed partition of Z. More precisely, for a finite partition Λm of Z of cardinality |Λm | = Dm + 1, Dm ∈ N, we set ( ) X X Dm +1 m= f = βI 1I ; (βI )I∈Λm ∈ R+ , f ≥ 0 and βI µ (I) = 1 . I∈Λm I∈Λm Note that the smallest affine space contained in m is of dimension Dm . The quantity Dm can thus be interpreted as the number of degrees of freedom in the (parametric) model m. We assume that any element I of the partition Λm is of positive measure with respect to µ: for all I ∈ Λm , µ (I) > 0 . As the partition Λm is finite, we have P (ln f )+ < ∞ for all f ∈ m and so m ⊂ S. We state in the next proposition some well-known properties that are satisfied by histogram models submitted to the procedure of MLE (see for example [35, Section 7.3]). Proposition 2.1 Let fm = X P (I) 1I . µ (I) I∈Λm Then fm ∈ m and fm is called the KL projection of f∗ onto m. Moreover, it holds fm = arg min P (γ(f )) . f ∈m Model Selection as a Multiple Testing Procedure 5 The following Pythagorean-like identity for the KL divergence holds, for every f ∈ m, K (f∗ , f ) = K (f∗ , fm ) + K (fm , f ) . (3) We also have the following formula fˆm = X Pn (I) 1I , µ (I) I∈Λm and so the maximum likelihood estimator on m is well-defined and corresponds to the so-called frequencies histogram associated to the partition Λm . Remark 2.2 Histogram models are special cases of general exponential families exposed for example in Barron and Sheu [10] (see also Castellan [24] for the case of exponential models of piecewise polynomials). The projection property (3) can be generalized to exponential models (see [10, Lemma 3] and Csiszár [27]). Remark 2.3 As by (1) we have P (γ(fm ) − γ (f∗ )) = K (f∗ , fm ) and for any f ∈ m, P (γ(f ) − γ (f∗ )) = K (f∗ , f ) we easily deduce from (3) that the excess risk on m is still a KL divergence, as we then have for any f ∈ m, P (γ(f ) − γ(fm )) = K (fm , f ) . 2.3 Over-Penalization Let us now define our model selection procedure. We provide three ways to understand the benefit of over-penalization. Of course the three point of views are related to each other but they bring different and complementary enlightening on the behavior of over-penalization. 2.3.1 Over-Penalization as Estimation of the Ideal Penalty We are given a collection of histogram models denoted Mn , with finite cardinality n depending on o the ˆ sample size n, and its associated collection of maximum likelihood estimators fm ; m ∈ Mn . By taking a (nonnegative) penalty function pen on Mn , pen : m ∈ Mn 7−→ pen (m) ∈ R+ , the output of the penalization procedure (also called the selected model) is by definition any model satisfying, n o m b ∈ arg min Pn (γ(fˆm )) + pen (m) . (4) m∈Mn We aim at selecting an estimator fˆm b with a KL divergence, pointed on the true density f∗ , as small as possible. Hence, we want our selected model to have a performance as close as possible to the excess risk achieved by an oracle model (possibly non-unique), defined to be, n o m∗ ∈ arg min K(f∗ , fˆm ) (5) m∈Mn n o = arg min P (γ(fˆm )) . (6) m∈Mn From (6), it is seen that an ideal penalty in the optimization task (4) is given by penid (m) = P (γ(fˆm )) − Pn (γ(fˆm )) , 6 Saumard and Navarro since in this case, the criterion critid (m) = Pn (γ(fˆm )) + penid (m) is equal to the true risk P (γ(fˆm )). However penid is unknown and, at some point, we need to give some estimate of it. In addition, penid is random, but we may not be able to provide a penalty, even random, whose fluctuations at a fixed model m would be positively correlated to the fluctuations of penid (m). This means that we are rather searching for an estimate of a deterministic functional of penid . But which functional would be convenient? The answer to this question is essentially contained in the solution of the following problem. Problem 1. For any fixed β ∈ (0, 1) find the deterministic penalty penid,β : Mn → R+ , that minimizes the value of C, among constants C > 0 which satisfy the following oracle inequality,  n o ≥1−β . (7) P K(f∗ , fˆm K(f∗ , fˆm ) b ) ≤ C inf m∈Mn The solution—or even the existence of a solution—to the problem given in (7) is not easily accessible and depends on assumptions on the law P of data and on approximation properties of the models, among other things. In the following, we give a reasonable candidate for penid,β . Indeed, let us set βM = β/Card(Mn ) and define n o penopt,β (m) = q1−βM P (γ(fˆm ) − γ(fm )) + Pn (γ(fm ) − γ(fˆm )) , (8) where qλ {Z} = inf {q ∈ R; P (Z ≤ q) ≥ λ} is the quantile of level λ for the real random variable Z. Our claim is that penopt,β gives in (7) a constant C which is close to one, under some general assumptions (see Section 3 for precise results). Let us explain now why penopt,β should lead to a nearly optimal model selection. We set o \ n P (γ(fˆm ) − γ(fm )) + Pn (γ(fm ) − γ(fˆm )) ≤ penopt,β (m) . Ω0 = m∈Mn We see, by definition of penopt,β and by a simple union bound over the models m ∈ Mn , that the event Ω0 is of probability at least 1 − β. Now, by definition of m, b we have, for any m ∈ Mn , Pn (γ(fˆm b ≤ Pn (γ(fˆm )) + penopt,β (m) . b )) + penopt,β (m) (9) By centering by P (γ (f∗ )) and using simple algebra, Inequality (9) can be written as, h i ˆ ˆ P (γ(fˆm ) − γ (f )) + pen ( m) b − (P (γ( f ) − γ(f )) + P (γ(f ) − γ( f ))) ∗ n b m b m b m b m b opt,β i h ≤P (γ(fˆm ) − γ (f∗ )) + penopt,β (m) − (P (γ(fˆm ) − γ(fm )) + Pn (γ(fm ) − γ(fˆm ))) + (Pn − P ) (γ(fm ) − γ(fm b )) . ˆb ))) ≥ 0, so we get on Ω0 , Now, on Ω0 , we have penopt,β (m) b − (P (γ(fˆm b ) − γ(fm b )) + Pn (γ(fm b ) − γ(fm P (γ(fˆm b ) − γ (f∗ )) h i ≤ P (γ(fˆm ) − γ (f∗ )) + penopt,β (m) − (P (γ(fˆm ) − γ(fm )) + Pn (γ(fm ) − γ(fˆm ))) + (Pn − P ) (γ(fm ) − γ(fm b )) . Specifying to the MLE context, the latter inequality writes, K(f∗ , fˆm b) h i ≤K(f∗ , fˆm ) + penopt,β (m) − (K(fm , fˆm ) + K(fˆm , fm )) + (Pn − P ) (γ(fm ) − γ(fm b )) . {z } | {z } | (a) (b) Model Selection as a Multiple Testing Procedure 7 In order to get an oracle inequality as in (7), it remains to control (a) and (b) in terms of the excess risks K(f∗ , fˆm ) and K(f∗ , fˆm b ). Quantity (a) is related to deviations bounds for the true and empirical excess risks of the M-estimators fˆm and quantity (b) is related to fluctuations of empirical bias around the bias of the models. Suitable controls of these quantities (as achieved in our proofs) will give sharp oracle inequalities (see Section 3 below). Remark 2.4 Notice that our reasoning is not based on the particular value of the contrast, so that to emphasize this point we choose to keep γ in most of our calculations rather than to specify to the KL divergence related to the MLE case. As a matter of fact, the penalty penopt,β given in (8) is a good candidate in the general context of M-estimation. We define an over-penalization procedure as follows. Definition 2.5 A penalization procedure as defined in (4) is said to be an over-penalization procedure if the penalty pen that is used satisfies pen (m) ≥ penopt,β (m) for all m ∈ Mn and for some β ∈ (1/2, 1). Based on concentration inequalities for the excess risks (see Section 3.1) we propose the following over-penalization penalty for histogram selection, r   s  D ln(n + 1) ln(n + 1) ln(n + 1)  Dm m pen+ (m) = 1 + C max ; ; , (10)  n Dm Dm  n where C is a constant that should be either fixed a priori (C = 1 or 2 are typical choices) or estimated using data (see Section 5 for details on the choice of C). We show below nonasymptotic accuracy of such procedure, both theoretically and practically. 2.3.2 Over-Penalization as a Multiple-Testing Procedure Let us now introduce a multiple testing point of view on the model selection problem. The goal is to infer the oracle model (5) in such a way that an oracle inequality of the type of (7) is ensured. This task can be formulated through the solving of iterative statistical tests. Indeed, set the following collection of null and alternative hypotheses indexed by pairs of models: for (m, m0 ) ∈ M2n ,  H0 (m, m0 ) : K(f∗ , fˆm ) > Cn · K(f∗ , fˆm0 ) H1 (m, m0 ) : K(f∗ , fˆm ) ≤ Cn · K(f∗ , fˆm0 ) , where the constant Cn > 1 is uniform in m, m0 ∈ Mn . To each pair (m, m0 ) ∈ M2n , let us assume that we are given a test T (m, m0 ) that is equal to one if H0 (m, m0 ) is rejected and zero otherwise. It is worth noting at this point that what we just called “test” does not fall directly in the classical theory of statistical testing, since the null and alternative hypotheses that we consider are random events. However, as we will see, the only notion related to our tests needed for our model selection study is the notion of the “size” of a test, that we will give in the following and that will provide a mathematically consistent analysis of the statistical situation. Furthermore, it seems that random hypotheses arise naturally in some statistical frameworks. For instance, in the context of variable selection operated along the Lasso path, Lockhart et al. [33] consider sequential random null hypotheses based on the active sets of the variable included up to a step on the Lasso path (see especially Section 2.6 of [33] as well as Section 2 of the discussion of Bühlmann et al. [14] and Section 2 of the rejoinder [32]). Finally, if the testing of random hypotheses is disturbing to the reader, we suggest to take our multiple testing interpretation of the model selection task in its minimal sense, that is as a mathematical description aiming at investigating tight conditions on the penalty, that would allow for near-optimal oracle guarantees for the penalization scheme (4). 8 Saumard and Navarro mi mj mj+1 T (mi , mj ) = 1 mi mj T (mi , mj ) = 0 mj+1 mi mj mj+1 Figure 1: Iteration of the tests along the collection of models. In order to ensure an oracle inequality such as in (7), we want to avoid as far as possible selecting a model whose excess risk is far greater than the one of the oracle. In terms of the preceding tests, we will see that this exactly corresponds to controlling the “size” of the tests T (m, m0 ). 0 ) = 1} the event where the test T (m, m0 ) rejects the null hyLet us note R (m, m0 ) = {T (m, mn o pothesis H0 (m, m0 ) and T (m, m0 ) = K(f∗ , fˆm ) > Cn · K(f∗ , fˆm0 ) the event where the hypothesis H0 (m, m0 ) is true. By extension with the classical theory of statistical testing, we denote α (m, m0 ) the size of the test T (m, m0 ), given by    . α m, m0 = P R m, m0 T m, m0 To explain how we select a model m b that is close to the oracle model m∗ , let us enumerate the models of the collection: Mn = {m1 , ..., mk }. Note that we do not assume that the models are nested. Now, we test T (m1 , mj ) for j increasing from 2 to k. If there exists i1 ∈ {2, .., k} such that T (m1 , mi1 ) = 0, then we perform the tests T (mi1 , mj ) for j increasing from i1 + 1 to k or choose mk as our oracle candidate if i1 = k. Otherwise, we choose m1 as our oracle candidate. In general, we can thus define a finite increasing sequence mil of models and a selected model m b =m b (T ) through 0 0 the use of the collection of tests {T (m, m ) ; m, m ∈ Mn }. Also, the number of tests that are needed to define m b is equal to Card (Mn ) − 1. Let us denote P the set of pairs of models that have effectively been tested along the iterative procedure. We thus have Card(P) = Card (Mn ) − 1. Now define the event ΩT under which there is a first kind error along the collection of tests in P, [ h \ i ΩT = R m, m0 T m, m0 (m,m0 )∈P and assume that the sizes of the tests are chosen such that X  β= α m, m0 < 1 . (11) (m,m0 )∈P Assume also that the selected model m b has the following Transitivity Property (TP): (TP) If for any (m, m0 ) ∈ M2n , T (m, m0 ) = 1 then T (m, b m0 ) = 1. We believe that the transitivity property (TP) is intuitive and legitimate as it amounts to assume that there is no contradiction in choosing m b as a candidate oracle model. Indeed, if a model m is thought to be better than a model m0 , that is T (m, m0 ) = 1, then the selected model m b should also be thought to be better that m0 , T (m, b m0 ) = 1. The power of the formalism that we just introduced lies on the fact that the combination of Assumptions (11) and (TP) automatically implies that an oracle inequality as in (7) is satisfied. Indeed, property (TP) ensures that T (m, b m∗ ) ⊂ R (m, b m∗ ) because on the event T (m, b m∗ ), we have m b 6= m∗ , so there exists m such that (m, m∗ ) ∈ P and T (m, m∗ ) = 1 (otherwise m b = m∗ ) Model Selection as a Multiple Testing Procedure 9 which in turn ensures T (m, b m∗ ) = 1. Consequently, T (m, b m∗ ) = T (m, b m∗ ) ∩ R (m, b m∗ ) ⊂ ΩT , which gives   ˆ P K(f∗ , fˆm b m∗ )) ≤ P (ΩT ) ≤ β , (12) b ) > Cn · K(f∗ , fm∗ ) = P (T (m, that is equivalent to (7). Let us turn now to a specific choice of tests corresponding to model selection by penalization. If we define for a penalty pen, the penalized criterion critpen (m) = Pn (γ(fˆm )) + pen (m), m ∈ Mn and take the following tests   T m, m0 = Tpen m, m0 = 1{critpen (m)≤critpen (m0 )} , then it holds m(T b pen ) ∈ arg min m∈Mn n o Pn (γ(fˆm )) + pen (m) and property (TP) is by consequence satisfied. It remains to choose the penalty pen such that the sizes of the tests Tpen (m, m0 ) are controlled. This is achieved by taking pen = penopt,β/2 as defined in (8). Indeed, in this case,    α m, m0 =P(Pn (γ(fˆm )) + pen (m) ≤ Pn (γ(fˆm0 )) + pen m0 T m, m0 ) h i ≈P(K(f∗ , fˆm ) + penopt,β/2 (m) − (K(fm , fˆm ) + K(fˆm , fm )) (13) h i   ≤ K(f∗ , fˆm0 ) + penopt,β/2 m0 − (K(fm0 , fˆm0 ) + K(fˆm0 , fm0 )) T m, m0 )  β ≤ + P K(f∗ , fˆm ) ≤ K(f∗ , fˆm0 ) 2Card (Mn ) h i   + penopt,β/2 m0 − (K(fm0 , fˆm0 ) + K(fˆm0 , fm0 )) T m, m0 . In line (13), the equality is only approximated since we neglected the centering of the biases of the model by their empirical counterparts, as these centered random variables should be small compared to the other quantities for models of interest. Now assume that  P penopt,β/2  ˆ ˆ ˆ 0 0 0 0 m − (K(f , fm ) + K(fm , fm )) ≥ εn K(f∗ , fm ) ≤ 0  m0 β , 2Card (Mn ) for some deterministic sequence εn not depending on m0 . Such result is obtained in Section 3.1 and is directly related to the concentration behavior of the true and empirical excess risks. Then we get  h i   P K(f∗ , fˆm ) ≤ K(f∗ , fˆm0 ) + penopt,β m0 − (K(fm0 , fˆm0 ) + K(fˆm0 , fm0 )) T m, m0   β ≤ + P K(f∗ , fˆm ) ≤ (1 + εn )K(f∗ , fˆm0 ) K(f∗ , fˆm ) > Cn K(f∗ , fˆm0 ) 2Card (Mn ) β = , 2Card (Mn ) where the last equality is valid if Cn ≥ 1 + εn . In this case,  α m, m0 ≤ β Card (Mn ) and as we only perform Card(Mn )−1 tests, inequality (11) is satisfied and so is the oracle inequality (12). Remark 2.6 The Transitivity Property (TP) allows to unify all the selection rules that we are aware of. Indeed, as soon as we want to select an estimator f˜ (or a model) that optimizes a criterion, f˜ ∈ arg min {crit (f )} , f ∈F 10 Saumard and Navarro Models that can be selected q1−α [Pn (γ(fˆm ))] + pen(m) E[P (γ(fˆm ))] ' E[Pn (γ(fˆm ))] + pen(m) qα [Pn (γ(fˆm ))] + pen(m) Pn (γ(fˆm )) + pen(m) m∗ m̂ m Figure 2: A schematic view of the situation cooresponding to a selection procedure based on the unbiased risk principle. The penalized empirical risk (in red) fluctuates around the expectation of the true risk. The size of the deviations typically increase with the model size, making the shape of the curves possibly flat for the largest models of the collection. Consequently, the selected model can potentially be very large and lead to overfitting. where F is a collection of candidate functions (or models), then f˜ is also defined by the collection of tests T (f, f 0 ) = 1{crit(f )≤crit(f 0 )} . In particular, in T-estimation ([15]) as well as in ρ-estimation [8]) the estimator is indeed a minimizer of a criterion that is interpreted as a diameter of a subset of functions in F. Note that in T-estimation, the criterion is itself constructed through the use of some (robust) tests, that by consequence do not act at the same level as our tests in this case. 2.3.3 Geometric insights on over-penalization Finally, let us bring a geometric point of view on our over-penalization procedure. If the penalty pen is chosen accordingly to the Unbiased Risk Estimation principle, then it should satisfy, for any model m ∈ Mn , h i h  i E Pn (γ(fˆm )) + pen (m) ∼ E P γ(fˆm ) . In other words, the curve Cn : m fˆm )) + pen (m) fluctuates around its mean, which is h 7→  Pn (γ(i essentially the curve CP : m → 7 E P γ(fˆm ) , see Figure 2. Furthermore, the largest is the model   m, the largest are the fluctuations of Pn (γ(fˆm )) = K fˆm , fm +Pn (γ(fm )). This is seen for instance through the   concentration inequalities established in Section A.1 below for the empirical excess risk ˆ K fm , fm . Consequently, it can happen that the curve Cn is rather flat for the largest models and that the selected model is among the largest of the collection, see Figure 2. By using an over-penalization procedure instead of the unbiased risk estimation principle, we will compensate the deviations for the largest models and thus obtain a thinner region of potential selected models, see Figures 3 and 4. In other words, we will avoid overfitting and by doing so, we will ensure a reasonable performance of our over-penalization procedure in situations where unbiased risk estimation fails. This is particularly the case when the amount of data is small to moderate. 3 Theoretical Guarantees We state here our theoretical results related to the behavior of our over-penalization procedure. As explained in Section 2.3, concentration inequalities for the true and empirical excess risks are essential tools to understand our model selection problem. As the theme of concentration inequalities for the excess risk constitutes a very recent and exciting line of research, these inequalities also have an interest by themselves and we state them in Section 3.1. Model Selection as a Multiple Testing Procedure 11 q1−α [Pn (γ(fˆm ))] + pen(m) E[P (γ(fˆm ))] Correction (over-penalization) qα [Pn (γ(fˆm ))] + pen(m) Pn (γ(fˆm )) + pen(m) m∗ m Figure 3: The correction that should be applied to an unbiased risk estimation procedure would ideally be of the size of the deviations of the risk for each model of the collection. q1−α [Pn (γ(fˆm ))] + pen(m) +corr(m) Models that can be selected E[P (γ(fˆm ))] + corr(m) qα [Pn (γ(fˆm ))] + pen(m) +corr(m) Pn (γ(fˆm )) + pen(m) + corr(m) m̂ m∗ m Figure 4: After a suitable correction, the minimum of the red curve has a better shape. In addition, the region of models that can be possibly selected is substantially smaller and in particular avoids the largest models of the collection. 12 Saumard and Navarro In Section 3.2, we give a sharp oracle inequality proving the optimality of our procedure. We also compare our result to what would be achieved for AIC, thus exhibiting the superiority of overpenalization in the nonasymptotic regime—that is for a small to moderate sample sizes. 3.1 True and empirical excess risks’ concentration In this section, we fix the linear model mmade of histograms and we are interested by concentration  ˆ inequalities for the true excess risk P γ(fm ) − γ(fm ) on m and for its empirical counterpart   Pn γ(fm ) − γ(fˆm ) . Theorem 3.1 Let n ∈ N, n ≥ 1 and let α, A+ , A− and AΛ be positive constants. Take m a model of histograms defined on a fixed partition Λm of Z. The cardinality of Λm is denoted by Dm . Assume that 1 < Dm ≤ A+ n/(ln(n + 1)) ≤ n and 0 < AΛ ≤ Dm inf {P (I)} . I∈Λm (14) √ √ If (α + 1) A+ /AΛ ≤ τ = 3 − 2 < 0.32, then a positive constant A0 exists, only depending on α, A+ and AΛ , such that by setting r  s  D ln(n + 1)  ln(n + 1) ln(n + 1) m ε+ (m) = max ; ; (15) n  n Dm Dm  and  r s   D ln(n + 1) ln(n + 1) m ; , ε− (m) = max n  n Dm  we have, on an event of probability at least 1 − 4(n + 1)−α ,    Dm  ˆm ≤ 1 + A0 ε+ (m) Dm , 1 − A 0 ε− (m) ≤ K f , f m n n 2n 2n    Dm  ˆm , fm ≤ 1 + A0 ε+ (m) Dm . 1 − A 0 ε− (m) ≤ K f n n 2n 2n (16) (17) In the previous theorem we achieve sharp upper and lower bounds for the true and empirical excess risk on m. They are optimal at the first order since the leading constants are equal in the upper and lower bounds. They show the concentration of the true and empirical excess risks around the value Dm /(2n). Moreover, Theorem 3.1 establishes the equivalence with high probability of the true and empirical excess risks for models of reasonable dimension. Concentration inequalities for the excess risks as in Theorem 3.1 is a new and exiting direction of research related to the theory of statistical learning and to high-dimensional statistics. Boucheron and Massart [20] obtained a pioneering result describing the concentration of the empirical excess risk around its mean, a property that they call a high-dimensional Wilks phenomenon. Then a few authors obtained results describing the concentration of the true excess risk around its mean [39], [25], [38] or around its median [11], [12] for (penalized) least square regression and in an abstract Mestimation framework [44]. In particular, recent results of [44] include the case of MLE on exponential models and as a matter of fact, on histograms. Nevertheless, Theorem 3.1 is a valuable addition to the literature on this line of research since we obtain here nonetheless the concentration around a fixed point, but an explicit value Dm /2n for this point. On the contrary, the concentration point is available in [44] only through an implicit formula involving local suprema of the underlying empirical process. The principal assumption in Theorem 3.1 is inequality (14) of lower regularity of the partition with respect to P . It is ensured as soon as the density f∗ is uniformly bounded from below and Model Selection as a Multiple Testing Procedure 13 the partition is lower regular with respect to the reference measure µ (which will be the Lebesgue measure in our experiments). No restriction on the largest values of f∗ are needed. In particular, we do not restrict to the bounded density estimation setting. Castellan [23] proved related, but weaker inequalities than in Theorem 3.1 above. She also asked for a lower regularity property of the partition, as in Proposition 2.5 [23], where she derived a sharp control of the KL divergence of the histogram estimator on a fixed model. More precisely, Castellan assumes that there exists a positive constant B such that inf µ (I) ≥ B I∈Λm (ln(n + 1))2 . n (18) This latter assumption is thus weaker than (14) for the considered model as its dimension Dm is less than the order n (ln(n + 1))−2 . We could assume (18) instead of (14) in order to derive Theorem 3.1. This would lead to less precise results for second order terms in the deviations of the excess risks but the first order bounds would be preserved. More precisely, if we replace assumption (14) in Theorem 3.1 by Castellan’s assumption (18), a careful look at the proofs show that the conclusions of Theorem 3.1 are still valid for εn = A0 (ln(n + 1))−1/2 , where A0 is some positive constant. Thus assumption (14) is not a fundamental restriction in comparison to Castellan’s work [23], but it leads to more precise results in terms of deviations of the true and empirical excess risks of the histogram estimator. The proof of Theorem 3.1, that can be found in Section A.1, is based on an improvement of independent interest of the previously best known concentration inequality for the chi-square statistics. See Section 4.1 for the precise result. 3.2 An Oracle Inequality Let us first state the set of five structural assumptions required to establish the nonasymptotic optimality of the over-penalization procedure. These assumptions will be further discussed at the end of this section, after the statement of a sharp oracle inequality. Set of assumptions (SA) (P1) Polynomial complexity of Mn : Card (Mn ) ≤ nαM . (P2) Upper bound on dimensions of models in Mn : there exists a positive constant AM,+ such that for every m ∈ Mn , n ≤n. Dm ≤ AM,+ (ln(n + 1))2 (Asm) The unknown density f∗ satisfies some moment condition and is uniformly bounded from below: there exist some constants Amin > 0 and p > 1 such that, Z   f∗p (ln f∗ )2 ∨ 1 dµ < +∞ Z and inf f∗ (z) ≥ Amin > 0 . z∈Z (19) (Alr) Lower regularity of the partition with respect to µ: there exists a positive finite constant AΛ such that, for all m ∈ Mn , Dm inf µ (I) ≥ AΛ ≥ AM,+ (αM + 6)/τ , I∈Λm √ √ where τ = 3 − 2 > 0. (Ap) The bias decreases like a power of Dm : there exist β− ≥ β+ > 0 and C+ , C− > 0 such that −β− −β+ C− D m ≤ K (f∗ , fm ) ≤ C+ Dm . We are now ready to state our main theorem related to optimality of over-penalization. 14 Saumard and Navarro Theorem 3.2 Take n ≥ 1 and r ∈ (0, p − 1). For some ∆ > 0, consider the following penalty, pen (m) = 1 + ∆ε+ n (m)  Dm , n for all m ∈ Mn . (20) Assume that the set of assumptions (SA) holds and that β− < p (1 + β+ ) /(1 + p + r) or p/(1 + r) > β− + β− /β+ − 1 . (21) Then there exists an event Ωn of probability at least 1 − (n + 1)−2 and some positive constant A1 depending only on the constants defined in (SA) such that, if ∆ ≥ A1 > 0 then we have on Ωn ,   n  o ˆ K f∗ , fˆm ≤ (1 + δ ) inf K f , f , (22) n ∗ m b m∈Mn where δn = L(SA),∆,r (ln(n + 1))−1/2 is convenient. We derive in Theorem 3.2 a pathwise oracle inequality for the KL excess risk of the selected estimator, with constant almost one. Our result thus establishes the nonasymptotic quasi-optimality of over-penalization with respect to the KL divergence. It is worth noting that three very strong features related to oracle inequality (22) significantly improve upon the literature. Firstly, inequality (22) expresses the performance of the selected estimator through its KL divergence and compare it to the KL divergence of the oracle. Nonasymptotic results pertaining to (robust) maximum likelihood based density estimation usually control the Hellinger risk of the estimator, [24], [35], [17], [15], [8]. The main reason is that the Hellinger risk is much easier to handle that the KL divergence from a mathematical point of view. For instance, the Hellinger distance is bounded by one while the KL divergence can be infinite. However, from a M-estimation perspective, the natural excess risk associated to likelihood optimization is indeed the KL divergence and not the Hellinger distance. These two risks are provably close to each other in the bounded setting [35], but may behave very differently in general. Secondly, nonasymptotic results describing the performance of procedures based on penalized likelihood, by comparing more precisely the (Hellinger) risk of the estimator to the KL divergence of the oracle, all deal with the case where the log-density to be estimated is bounded ([24], [35]). Here we substantially extend the setting by considering only the existence of a finite polynomial moment for the large values of the density to be estimated. Last but not least, the oracle inequality (22) is valid with positive probability - larger than 3/4 - as soon as one data is available. Up to our knowledge any other oracle inequality describing the performance of penalization for maximum likelihood density estimation is valid with positive probability only when the sample size n is greater than an integer n0 that depends on the constants defining the problem and that is thus unknown. We highlight the fact that we control the risk of the selected estimator for any sample size and that this property is essential in practice when dealing with small to moderate sample sizes. Based on the arguments developed in Section 2.3, we believe that such a feature of Theorem 3.1 is only accessible through the use of over-penalization and we conjecture in particular that it is impossible using AIC to have a control the KL divergence of the selected estimator for any sample size. The oracle inequality (22) is valid under conditions (21) relating the values of the bias decaying rates β− and β+ to the order p of finite moment of the density f∗ and the parameter r. In order to understand these latter conditions, let us assume for simplicity that β− = β+ =: β. Then the conditions (21) both reduce to β < p/(1 + r). As r can be taken as close to zero as we want, the latter inequality reduces to β < p. In particular, if the density to be estimated is bounded (p = ∞), then conditions (21) are automatically satisfied. If on the contrary the density f∗ only has finite polynomial moment p, then the bias should not decrease too fast. In light of the following comments, if f∗ is assumed to be α-Hölderian, α ∈ (0, 1], then β ≤ 2α ≤ 2 and the conditions (21) are satisfied, in the case where β− = β+ , as soon as p ≥ 2. To conclude this section, let us now comment on the set of assumptions (SA). Assumption (P1) states that the collection of models has a polynomially increasing complexity. This is well adapted Model Selection as a Multiple Testing Procedure 15 to bin size selection since in this case we usually select among a number of models that is strictly bounded from above by the sample size. In the same manner, Assumption (P2) is fairly legitimate for us and corresponds to practice, where we aim at considering bin sizes for which each element of the partition contains a few sample points. Assumption (Asm) imposes conditions on the density to be estimated. More precisely, Assumption (19) stating that the unknown density is uniformly bounded from below can also be found in the work of Castellan [23]. The author assumes moreover in Theorem 3.4 where she derives an oracle inequality for the (weighted) KL excess risk of the histogram estimator, that the target is of finite sup-norm. Furthermore, from a statistical perspective, the lower bound (19) is legitimate since, by Assumption (Alr), we use models of lower-regular partitions with respect to the Lebesgue measure. In the case where Inequality (19) would not hold, one would typically have to consider exponentially many irregular histograms to take into account the possibly vanishing mass of some elements of the partitions (for more details on this aspect that goes beyond the scope of the present paper, see for instance [35]). We require in (Ap) that the quality of the approximation of the collection of models is good enough in terms of bias. More precisely, we require a polynomially decreasing of excess risk of KL projections of the unknown density onto the models. For a density f∗ uniformly bounded away from zero, the upper bound on the bias is satisfied when for example, Z is the unit interval, µ = Leb is the Lebesgue measure on the unit interval, the partitions Λm are regular and the density f∗ belongs to the set H (H, α) of α-hölderian functions for some α ∈ (0, 1]: if f ∈ H (H, α), then for all (x, y) ∈ Z 2 |f (x) − f (y)| ≤ H |x − y|α . In that case, β+ = 2α is convenient and AIC-type procedures are adaptive to the parameters H and α, see Castellan [23]. In assumption (Ap) of Theorem 3.2 we also assume that the bias K (f∗ , fm ) is bounded from below by a power of the dimension Dm of the model m. This hypothesis is in fact quite classical as it has been used by Stone [41] and Burman [22] for the estimation of density on histograms and also by Arlot and Massart [7] and Arlot [3], [4] in the regression framework. Combining Lemma 1 and 2 of Barron and Sheu [10] - see also inequality (35) of Proposition 4.7 below – we can show that   Z 1 −3 ln ffm∗ (fm − f∗ )2 ∞ e dµ ≤ K (f∗ , fm ) 2 f∗ Z and thus assuming for instance that the target is uniformly bounded, kf∗ k∞ ≤ A∗ , we get Z A3min (fm − f∗ )2 dµ ≤ K (f∗ , fm ) . 2A4∗ Z Now, since in the case of histograms the KL projection fm is also the L2 (µ) projection of f∗ onto m, we can apply Lemma 8.19 in Section 8.10 of Arlot [2] to show that assumption (Ap) is indeed satisfied for β− = 1 + α−1 , in the case where Z is the unit interval, µ = Leb is the Lebesgue measure on the unit interval, the partitions Λm are regular and the density f∗ is a non-constant α-hölderian function. The proof of Theorem 3.2 and further descriptions of the behavior of the procedure can be found in the supplementary material, Section A.2. 4 Probabilistic and Analytical Tools We state in this section some general results that are of independent interest and that serve as tools for the mathematical description of our statistical procedure. The two first sections contain new or improved concentration inequalities, for the chi-square statistics (Section 4.1) and for general log-densities (Section 4.2). We established in Section 4.3 some results that are related to the so-called margin relation in statistical learning and that are of analytical nature. 16 Saumard and Navarro 4.1 Chi-Square Statistics’ Concentration The chi-square statistics plays an essential role in the proofs related to Section 3.1. Let us recall its definition. Definition 4.1 Given some histogram model m, the statistics χ2n (m) is defined by χ2n (m) = Z Z  fˆm − fm fm 2 dµ = X (Pn (I) − P (I))2 . P (I) I∈m The following proposition provides an improvement upon the previously best known concentration inequality for the right tail of the chi-square statistics, available in [24]—see also Proposition 7.8 in [35] and Theorem 12.13 in [19]. Proposition 4.2 For any x, θ > 0, it holds P χn (m) 1Ωm (θ) ≥ r r !  √ Dm 2x θ ≤ exp (−x) , + 1 + 2θ + n 6 n (23) T where we set Ωm (θ) = I∈m {|Pn (I) − P (I)| ≤ θP (I)}. More precisely, for any x, θ > 0, it holds with probability at least 1 − e−x , r r r r r  !   Dm 2x θ √ θ x x 1 xDm 1/4 χn (m) 1Ωm (θ) < + +2 + ∧√ . (24) x∧ n n n 2 3 n Dm 2 The proof of Theorem 4.2 can be found in Section 6.1. Let us detail its relationship with the bound in Proposition 7.8 in [35], which is: for any x, ε > 0, r r !! Dm 2x P χn (m) 1Ωm (ε2 /(1+ε/3)) ≥ (1 + ε) + ≤ exp (−x) . (25) n n p √ By taking θ = ε2 / (1 + ε/3) > 0, we get ε = θ/6 + θ2 /36 + θ > θ/6 + θ > 0. Assume that Dm ≥ 2x. We obtain by (23), with probability at least 1 − exp (−x), χn (m) 1Ωm (θ) r  r √ Dm 2x θ < + 1 + 2θ + n 6 n r r   √ Dm 2x + 1 + 2ε ≤ n n r r ! Dm 2x < (1 + ε) + . n n So in this case, inequality (23) improves upon (25). Notice that in our statistical setting (see Theorem 3.1) the restriction on Dm is as follows Dm ≤ A+ n (ln(n + 1))−1 . Furthermore, in our proofs we apply (23) with x proportional to ln(n + 1) (see the proof of Theorem 3.1). Hence, for a majority of models, we have x  Dm and so r r 2x Dm  . n n As a result, the bounds that we obtain in Theorem 3.1 by the use of Inequality (23) are substantially better than the bounds we would obtain by using Inequality (25) of [35]. More precisely, the term p Dm ln(n + 1)/n in (15) would be replaced by (Dm ln(n + 1)/n)1/4 , thus changing the order of magnitude for deviations of the excess risks. Model Selection as a Multiple Testing Procedure 17 Now, if Dm ≤ 2x then (23) gives that with probability at least 1 − e−x , r  r r r  Dm 2x θ xDm 1/4 θ 2x χn (m) 1Ωm (θ) < + + +2 n n n 2 6 n !r √ √ !r θ Dm θ θ 2x + 1 + 3/4 + ≤ 1 + 1/4 n 6 n 2 2 r r ! Dm 2x < (1 + ε) . + n n So in this case again, inequality (24) improves upon (25), with an improvement that can be substantial depending on the value of the ratio x/Dm . The following result describes the concentration from the left of the chi-square statistics and is proved in Section 6.1. Proposition 4.3 Let α, AΛ > 0. Assume 0 < AΛ ≤ Dm inf I∈m {P (I)}. Then there exists a positive constant Ag depending only on AΛ and α such that    r  s p ln(n + 1) ln(n + 1) D m  P χn (m) ≤ 1 − Ag  ∨ ≤ (n + 1)−α . Dm n n1/4 4.2 Bernstein type concentration inequalities for log-densities The following proposition gives concentration inequalities for the empirical bias at the right of its mean. Proposition 4.4 Consider a density f ∈ S. We have, for all z ≥ 0,  z ≤ exp (−z) . P Pn (ln ( f / f∗ )) ≥ n (26)   2 R dµ, we have Moreover, if we can take a finite quantity v which satisfies v ≥ (f ∨ f∗ ) ln ff∗ for all z ≥ 0, ! r 2vz 2z P (Pn − P ) (ln ( f / f∗ )) ≥ + ≤ exp (−z) . (27) n n One can notice, with Inequality (26), that the empirical bias always satisfies some exponential deviations at the right of zero. In the Information Theory community, this inequality is also known as the “No Hyper-compression Inequality” ([28]). Inequality (27) seems to be new and takes the form of a Bernstein-like inequality, even if the usual assumptions of Bernstein’s inequality are not satisfied. In fact, we are able to recover such a behavior by inflating the usual variance to the quantity v. We turn now to concentration inequalities for the empirical bias at the left of its mean. Proposition 4.5 Let r > 0. For any density f ∈ S and for all z ≥ 0, we have P (Pn (ln ( f / f∗ )) ≤ −z/nr − (1/r) ln (P [( f∗ / f )r ])) ≤ exp (−z) . (28)    2 R  f∗r+1 Moreover, if we can set a quantity wr which satisfies wr ≥ ∨ f ln ff∗ dµ , then we r ∗ f get, for all z ≥ 0, ! r 2wr z 2z P (Pn − P ) (ln ( f / f∗ )) ≤ − − ≤ exp (−z) . (29) n nr 18 4.3 Saumard and Navarro Margin-Like Relations Our aim in this section is to control the variance terms v and wr , appearing respectively in Lemma 4.4 and 4.5, in terms of the KL divergence pointed on the target f∗ . This is done in Lemma 4.6 below under moment assumptions for f∗ . Proposition 4.6 Let p > 1 and c+ , c− > 0. Assume that the density f∗ satisfies Z Z   (ln (f∗ ))2 ∨ 1 2 p f∗ (ln (f∗ )) ∨ 1 dµ < +∞ and Q := J := dµ < +∞ f∗p−1 Z Z (30) Take a density f such that 0 < c− ≤ inf z∈Z {f (z)} ≤ supz∈Z {f (z)} ≤ c+ < +∞. Then, for some AM R,d > 0 only depending on J, Q, p, c+ and c− , it holds "    2 # f f 1− 1 P ∨1 ln (31) ≤ AM R,d × K (f∗ , f ) p . f∗ f∗      1/p p 2 2 holds. For any 0 < r ≤ More precisely, AM R,d = 4c1−p (ln c ) ∨ 1 J + 4c (ln c ) ∨ 1 Q − + − + p − 1, we have the following inequality, " r   2 # f∗ f 1− r+1 p P ∨1 ln ≤ AM R,g × K (f∗ , f ) , (32) f f∗      r+1 p 2 2 available with AM R,g = 4c1−p (ln c ) ∨ 1 J + 2 (ln (c )) + J + Q . − + − Theorem 4.6 states that the variance terms, appearing in the concentration inequalities of Section 4.2, are bounded from above, under moment restrictions on the density f∗ , by a power less than one of the KL divergence pointed on f∗ . The stronger are the moment assumptions, given in (30), the closer is the power to one. One can notice that J is a restriction on large values of f∗ , whereas Q is related to values of f∗ around zero. We call these inequalities “margin-like relations” because of their similarity with the margin relations known first in binary classification ([34], [43]) and then extended to empirical risk minimization (see [36] and [5] for instance). Indeed, from a general point of view, margin relations relate the variance of contrasted functions (logarithm of densities here) pointed on the contrasted target to a function (in most cases, a power) of their excess risk. Now we strengthen the restrictions on the values of f∗ around zero. Indeed, we ask in the following lemma that the target is uniformly bounded away from zero. Proposition 4.7 Let p > 1 and Amin , c+ , c− > 0. Assume that the density f∗ satisfies Z   J := f∗p (ln (f∗ ))2 ∨ 1 dµ < +∞ and 0 < Amin ≤ inf f∗ (z) . Z z∈Z Then there exists a positive constant AM R,− only depending on Amin , J, r and p such that, for any m ∈ Mn , "    2 # fm fm P ∨1 ln ≤ AM R,− × K (f∗ , fm )1−1/p (33) f∗ f∗ and for any 0 < r ≤ p − 1, " r   2 # f∗ fm 1− r+1 p P ∨1 ln ≤ AM R,− × K (f∗ , fm ) . fm f∗ (34) If moreover ln (f∗ ) ∈ L∞ (µ), i.e. 0 < Amin ≤ inf z∈Z f∗ (z) ≤ kf∗ k∞ < +∞, then there exists à > 0 only depending on r, Amin and kf∗ k∞ such that, for any m ∈ Mn , " "    2 # r   2 # fm fm f∗ fm P ∨1 ln ∨P ∨1 ln ≤ Ã × K (f∗ , fm ) . (35) f∗ f∗ fm f∗ Model Selection as a Multiple Testing Procedure ∆m 0.20 â n −1 X n i=1 ln 0.10 fˆm (ξi) ! 30 Dm 0.15 19 20 0.05 10 0.00 0 25 50 Dm 75 100 0 α = 25% 25 50 75 100 Number of the bigest models Figure 5: Estimation of the over-penalization constant. It is worth noting that Lemma 4.7 is stated only for projections fm because we actually take advantage of their special form (as local means of the target) in the proof of the lemma. The benefit, compared to results of Lemma 4.6, is that Inequalities (33), (34) and (35) do not involve assumptions on the values of fm (and in particular they do not involve the sup-norm of fm ). 5 Experiments A simulation study is conducted in order to compare the numerical performances of the model selection procedures we have discussed. We demonstrate the usefulness of our procedure on simulated data examples. The numerical experiments have been carried out using R. 5.1 Experimental Setup We have compared the numerical performance of our procedure to state-of-the-art classical penalization methods of the literature on several densities. In particular we consider the estimator of [17] and AICc ([42, 29]). We also report AIC behavior. In the sequel, we name the procedure of [17] by BR, and our criterion AIC1 when the constant C = 1 in (10) and AICa for a fully adaptive procedure to be detailed below. More precisely, the performance of the following four model selection methods were compared: 1. AIC: m b AIC ∈ arg min {critAIC (m)} , m∈Mn with 2. AICc: with m b AICc Dm critAIC (m) = Pn (γ(fbm )) + . n n o ∈ arg min Pn (γ(fbm )) + penAICc (m) , m∈Mn penAICc (m) = 3. BR: m b BR ∈ arg min m∈Mn with Dm . n − Dm − 1 n o Pn (γ(fbm )) + penBR (m) , penBR (m) = (log Dm )2.5 n 20 Saumard and Navarro 4. AIC1 : m b AIC1 ∈ arg min n o Pn (γ(fbm )) + penAIC1 (m) , m b AICa ∈ arg min n o Pn (γ(fbm )) + penAICa (m) , m∈Mn with 5. AICa : r  s  D ln(n + 1) ln(n + 1) ln(n + 1)  Dm m penAIC1 (m) = 1 × max ; ; ,  n Dm Dm  n m∈Mn with  r s  D ln(n + 1) ln(n + 1) ln(n + 1)  Dm m ; penAICa (m) = Ĉ max ; ,  n Dm Dm  n where Ĉ = medianα∈P Ĉα , with Ĉα = medianm∈Mα |Ĉm |, where Ĉm = max q ∆m  , q Dm Dm 1 n ; Dm 2 ∆m is the least-squares distance between the opposite of the empirical risk −Pn (γ(fbm )) and a fitted line of equation y = xDm /n+â (see Figure 5), P is the set of proportions α corresponding to the longest plateau of equal selected models when using penalty (10) with constant C = Ĉα and Mα is the set of models in the collection associated to the proportion α of the largest dimensions. Let us briefly explain the ideas underlying the design of the fully adaptive procedure AICa . According to the definition of the penalty penopt,β given in (8) the constant C in our over-penalization procedure (10) should ideally estimate some normalized deviations of the sum of the excess risk and the empirical excess risk on the models of the collection. Based on Theorem 3.1, we may also assume that the deviations of the excess risk and the empirical excess risk are of the same order. Furthermore, considering the largest models of the collection allows to neglect bias issues and thus, the median of the normalized deviations of the empirical risk around its mean for the largest models should be a sensible estimator of the constant C. Now the problem is give a tractable definition to the "largest models" of the collection. To do that we pick a proportion α of the largest dimensions of the models at hand and calculate using these models an estimator Ĉα of the constant C in (10). We proceed then for each α in a grid of values between 0 and 1 to a model selection step by overpenalization using the constant C = Ĉα . This gives us a graph of the selected dimensions with respect to the proportions (see Figure 5) and we finally define our over-penalization constant Ĉ as the median of the values of the constants Ĉα , α ∈ P where P is the largest plateau in the graph of the selected dimensions with respect to proportions α. The models that we used along the experiments are made of histograms densities defined a on a regular partition of the interval [0, 1]. We show the performance of the proposed method for a set of four test distributions supported on the interval [0, 1] (see Figure 6) and described in the benchden 1 R-package [37] which provides an implementation of the distributions introduced in [13]. 5.2 Results We compared the procedures on N = 100 independent data sets of size n ranging from 50 to 1000. We estimate the quality of the model-selection strategies through the median KL divergence. Boxplots were made of the KL risk over the N trials. The horizontal lines of the boxplot indicate the 1 Available on the CRAN http://cran.r-project.org. Model Selection as a Multiple Testing Procedure Infinite peak -1.0 -0.5 0.0 0.5 1.0 (a) Isosceles triangle 1 0.0 0.2 0.4 0.6 0.8 (b) Bilogarithmic peak 1.0 0 0.0 0.0 0.0 0.2 0.5 0.5 0.4 2 1.0 0.6 3 1.0 1.5 0.8 4 1.5 Beta(2,2) 2.0 Bilogarithmic peak 1.0 Isosceles triangle 21 0.0 0.2 0.4 0.6 0.8 (c) Beta (2,2) 1.0 0.0 0.2 0.4 0.6 0.8 1.0 (d) Infinite peak Figure 6: Test densities f . 5%, 25%, 50%, 75%, and 95% quantiles of the error distribution. The median value of AIC (horizontal black line) is also overlayed for visualization purposes. It can be seen from Figure 7 that, as expected, for each method and in all cases, the KL divergence is decreasing as the sample size increases. We also clearly see that there is in general a substantial benefit in modifying AIC for sample sizes smaller than 1000. Furthermore, none of the methods outperforms the others in all cases. However, for virtually all cases, AIC1 consistently showed lower median KL than the others. We thus recommend the use of AIC1 rather than the commonly used AICc . Indeed, in comparison to AIC1 , it seems that AICc is not penalizing enough, which is seen through a worst performance for sample sizes equal to 50 and 100. In addition, the two procedures have the exact same computational costs. On the contrary, it seems that the criterion BR penalizes too much. Consequently, its performances are getting worst in comparison to the other methods when the sample size increases. Finally, the behaviour of AICa is quite good in general, but it is often a little less efficient than AIC1 . We interpret this fact by postulating that the extra computations that we engage in AICa to remove any hyper-parameter from the procedure actually induces extra variance in the estimation. Acknowledgements The first author warmly thanks Matthieu Lerasle for instructive discussions on the topic of estimation by tests and Alain Célisse for a nice discussion at a early stage of this work. He is also grateful to Pascal Massart for having pushed him towards obtaining better oracle inequalities than in a previous version of this work. Finally, we owe thanks to Amandine Dubois for a careful reading that helped to correct some mistakes and improve the presentation of the paper. 6 6.1 Proofs Proofs Related to Section 4.1 Proof of Theorem 4.2. We fix x, θ > 0 and we set z > 0 to be chosen later. Let us set for any I ∈ m, ϕI = (P (I))−1/2 1I . The family of functions (ϕI )I∈m forms an orthonormal basis of (m, k·k2 ). By Cauchy-Schwarz inequality, we have ! X (Pn − P ) aI ϕI , χn (m) = sup (aI )I∈m ∈B2 I∈m  P 2 where B2 := (aI )I∈m ; I∈m aI ≤ 1 . Furthermore, the case of equality in Cauchy-Schwarz inequality gives us ! X (Pn − P ) (ϕI ) χn (m) = (Pn − P ) a∞ with a∞ . I ϕI I = χn (m) I∈m 22 Saumard and Navarro n = 50 n = 100 n = 500 n = 1000 0.3 0.030 0.05 0.15 0.025 0.04 43 KL 0.10 36 25 11 16 19 0.1 KL KL KL 0.2 0.03 23 6 16 20 22 10 0 6 10 0.020 0.015 10 5 1 1 5 BR AIC1 AICa 0.02 0.05 0.010 AIC AICc BR AIC1 AICa AIC AICc methods BR AIC1 AICa AIC AICc methods BR AIC1 AICa AIC AICc methods methods (a) Isosceles triangle n = 50 n = 100 0.150 n = 500 0.05 n = 1000 0.030 0.16 0.125 0.04 0.025 14 0.08 0.075 6 AIC AICc 0 1 BR AIC1 2 8 0.03 4 1 4 1 0.050 AICa KL KL 0.12 KL KL 0.100 0 0 0 0 0.020 0 AIC AICc BR AIC1 AICa 0 AIC AICc 0 0 0 AIC1 AICa 0.015 0.02 methods 0 AIC AICc methods BR AIC1 AICa methods BR methods (b) Bilogarithmic peak n = 50 n = 100 n = 500 n = 1000 0.030 0.20 0.04 0.12 0.025 0.10 0.08 6 7 8 3 0.03 7 4 4 KL 25 KL 26 18 2 KL KL 0.15 0 3 1 0.020 4 0.015 7 6 AIC AICc 0 2 6 AIC1 AICa 0.02 0.04 0.05 0.010 AIC AICc BR AIC1 AICa AIC AICc methods BR AIC1 AICa AIC AICc methods BR AIC1 AICa methods BR methods (c) Beta (2,2) n = 50 n = 100 n = 500 0.28 0.35 0.30 n = 1000 0.14 0.10 0.24 0.09 0.20 25 11 2 5 6 AIC1 AICa 0.20 27 0.16 10 1 1 3 AIC1 AICa KL 0.25 KL KL KL 0.12 0.10 15 4 0 0.08 0 1 10 1 0 0 0 AIC1 AICa 0.07 0.08 0.15 AIC AICc BR 0.12 AIC AICc methods BR AIC methods AICc BR AIC1 AICa AIC AICc methods BR methods (d) Infinite peak AIC AICc BR AIC1 AICa Figure 7: KL divergence results. Box plots of the KL divergence to the true distribution for the estimated distribution. The solid black line corresponds to the AIC KL divergence median. The term inside the box is the number of time the KL divergence equals ∞ out of 100. Hence, by setting A (s) := B2 o Tn (aI )I∈m ; supI∈m aI (P (I))−1/2 ≤ s for any s ≥ 0, we get χn (m) 1Ωm (θ) 1{χn (m)≥z} ≤ sup (aI )I∈m ∈A(θ/z) (Pn − P ) X I∈m aI ϕI ! . (36) Model Selection as a Multiple Testing Procedure 23 By applying Bousquet’s inequality ([21]) to the supremum in the right-hand side of (36) then gives for any δ > 0, ! r   2 x 1 1 bm x 2σm (37) P χn (m) 1Ωm (θ) 1{χn (m)≥z} ≥ (1 + δ) Em + + + n δ 3 n ! ! r   2 x X 2σm 1 1 bm x ≤P sup (Pn − P ) aI ϕI ≥ (1 + δ) Em + + + n δ 3 n (aI )I∈m ∈A(θ/z) I∈m ≤ exp (−x) , with Em ≤ E [χn (m)] ≤ E 1/2   χ2n (m) = r Dm n ; and bm = 2 σm X sup ≤ sup (aI )I∈m ∈B2 aI ϕI (aI )I∈m ∈A(θ/z) I∈m ∞ ≤ V X ! aI ϕI (ξ1 ) I∈m ≤1 θ . z p p (Dm ) /n + 2x/n, we obtain that with Injecting the latter bounds in (37) and taking z = probability at least 1 − exp (−x), r r   Dm 2x 1 1 θx √ √ . χn (m) 1Ωm (θ) < (1 + δ) + + + (38) √ n n δ 3 Dm + 2x n By taking δ = √ −1/2 √ θx Dm + 2xDm , the right-hand side of (38) becomes r r r √ θx Dm θx p √ √ + √ √ n Dm + 2xDm 3 Dm + 2x n r r r r r    ! Dm 2x θ √ xDm 1/4 θ x x 1 ≤ , + +2 x∧ + ∧√ n n n 2 3 n Dm 2 Dm + n 2x +2 n which gives (24). Inequality (23) is a direct consequence of (24). Proof of Theorem 4.3. Let us set for any I ∈ m, ϕI = (P (I))−1/2 1I . The family of functions (ϕI )I∈m forms an orthonormal basis of (m, k·k2 ). By Cauchy-Schwarz inequality, we have ! X χn (m) = sup aI ϕI (Pn − P ) , (aI )I∈m ∈B2 I∈m  P where B2 = (aI )I∈m ; I∈m a2I ≤ 1 . As 2 σm := and bm = sup (aI )I∈m ∈B2 sup (aI )I∈m ∈B2 X X V aI ϕI (ξ1 ) I∈m aI ϕI I∈m ! ∞ ≤1 1 ≤ sup kϕI k∞ = sup p , P (I) I∈m I∈m we get by Klein-Rio’s inequality (see [30]), for every x, δ > 0, P χn (m) ≤ (1 − δ) E [χn (m)] − r 2x − n  1 +1 δ  bm x n ! ≤ exp (−x) . (39) 24 Saumard and Navarro q Note that we have bm ≤ Dm A−1 Λ . Now, we bound E [χn (m)] by below. By Theorem 11.10 in [19] applied to χn (m), we get, for any ζ > 0,   bm σ2 E χ2n (m) − E2 [χn (m)] ≤ m + 4 E [χn (m)] n qn Dm A−1 1 Λ ≤ +4 E [χn (m)] n n Dm A−1 1 Λ + ζE2 [χn (m)] . ≤ + 4ζ −1 n n2 ζa2 +ζ −1 b2 (40) q applied with a = E [χn (m)] and b = 2 Dm A−1 Λ /n. The latter inequality follows from 2ab ≤   As E χ2n (m) = Dm /n, (40) applied with ζ = n−1/2 gives s   1 Dm 1 −1 Dm E [χn (m)] ≥ − 4AΛ 3/2 − n n + 1 + n−1/2 n r   Dm −1/2 ≥ 1 − LAΛ Dm ∨ n−1/4 . (41) n p Hence, by using (41) and taking x = α ln(n + 1) and δ = n−1/4 ln(n + 1) in (39), we obtain with probability at least 1 − (n + 1)−α , χn (m) !r p   ln(n + 1) 1 Dm 1 1 − LAΛ √ ≥ 1− ∨ n n1/4 Dm n1/4 ! √ r n1/4 2α ln(n + 1) α Dm ln(n + 1) − p +1 − n n ln(n + 1)   s r p p ln(n + 1) ln(n + 1)  Dm  2α ln(n + 1) 1 ≥ 1 − LA Λ − Lα ∨√ − n Dm n1/4 n1/4 Dm   s r p ln(n + 1) Dm  ln(n + 1)  ∨ ≥ 1 − LAΛ ,α , 1/4 n Dm n which concludes the proof. 6.2 Proofs related to Section 4.2 In this section, our aim is to control for any histogram model m, the deviations of the empirical bias from its mean, which is the true bias. Concentration inequalities for the centered empirical bias are provided in Section 4.2. In order to prove oracle inequalities for the KL divergence, we relate the magnitude of these deviations to the true bias. This is done in Section 4.3. As we believe that the results of this section have some interest by themselves, we have stated them, when possible, for a general density in S rather for the projections fm . The results in this section based on the Cramèr-Chernoff method (see [18] for instance). Let Pare n us recall that if we set S := i=1 Xi − E [Xi ], where (Xi )ni=1 are n i.i.d. real random variables, and for any λ ≥ 0 and y ∈ R+ , ϕS (λ) := ln (E [exp (λS)]) = n (ln (E [exp (λX1 )]) − λE [X1 ]) and ϕ∗S (y) := sup {λy−ϕS (λ)} , λ∈R+ Model Selection as a Multiple Testing Procedure 25 then P (S ≥ y) ≤ exp (−ϕ∗S (y)) . (42) Proof of Proposition 4.4. We first prove concentration inequality (26). We set Xi := ln ( f / f∗ ) (ξi ) and use Inequality (42). For λ ∈ [0, 1], as E [X1 ] = −K (f∗ , f ), we have  h i ϕS (λ)/ n = ln P ( f / f∗ )λ + λK (f∗ , f ) ≤λ ln (P [ f / f∗ ]) + λK (f∗ , f ) = λK (f∗ , f ) , where the inequality derives from the concavity of the function x 7→ xλ . By setting K = K (f∗ , f ), we thus get ϕ∗S (y) ≥ sup {λy−ϕS (λ)} ≥ (y − nK)+ , λ∈[0,1] which implies, P ((Pn − P ) (ln (f /f∗ )) ≥ x) ≤ exp (−n(x − K)+ ) . (43) Inequality (26) is a direct consequence of (43). Moreover, we notice that for any u ∈ R, exp (u) ≤ 2 1 + u + u2 exp (u+ ) and ln (1 + u) ≤ u, where u+ = u ∨ 0. By consequence, for λ ∈ [0, 1], it holds ϕS (λ)/ n = ln (E [exp (λX1 )]) − λE [X1 ]    λ2  2 ≤ ln 1 + λE [X1 ] + E X1 exp λ (X1 )+ − λE [X1 ] 2  λ2  2  λ2 λ2  2 ≤ E X1 exp λ (X1 )+ ≤ E X1 exp (X1 )+ ≤ v. 2 2 2 Now, we get, for any y ≥ 0,     2  λ2 v y nv  1y>nv . ϕ∗S (y) ≥ sup {λy−ϕS (λ)} ≥ sup λy−n = 1y≤nv + y − 2 2nv 2 λ∈[0,1] λ∈[0,1] So, by using (42) with (44) taken with x = y/n, it holds   2   x v P ((Pn − P ) (ln ( f / f∗ )) ≥ x) ≤ exp −n . 1x≤v + x − 1x>v 2v 2 (44) (45) To obtain (27), we notice that Inequality (45) implies by simple calculations, for any z ≥ 0, ! r z 2vz v P (Pn − P ) (ln ( f / f∗ )) ≥ 1 + + 1 ≤ exp (−z) . n z≤nv/2 n 2 z>nv/2 p p To conclude the proof, it suffices to remark that 2vz/n1z≤nv/2 + (z/n + v/2) 1z>nv/2 ≤ 2vz/n + 2z/n. Proof of Proposition 4.5. Let us first prove concentration inequality h (28). i We set Xi := ln ( f∗ / f ) (ξi ) and use (42). For λ ∈ [0, r], we have by Hölder’s inequality, P ( f∗ / f )λ ≤ P [( f∗ / f )r ]λ/r . Hence,  h i ϕS (λ)/ n = ln P ( f∗ / f )λ − λK (f∗ , f )   1 r ln (P [( f∗ / f ) ]) − K (f∗ , f ) . ≤λ r Let us notice that by concavity of ln, we have any y ≥ 0, 1 r ln (P [( f∗ / f )r ]) − K (f∗ , f ) ≥ 0. Now we get, for ϕ∗S (y) ≥ sup {λy−ϕS (λ)} λ∈[0,r]     1 λ y−n ln (P [( f∗ / f )r ]) − K (f∗ , f ) r λ∈[0,r] ≥ sup = (ry−n (ln (P [( f∗ / f )r ]) − rK (f∗ , f )))+ . 26 Saumard and Navarro Using (42), we obtain, for any x ≥ 0, P ((Pn − P )(ln (f /f∗ )) ≤ −x) ≤ exp (−n(rx − ln [( f∗ / f )r ] + rK (f∗ , f ))+ ) . (46) Inequality (28) is a straightforward consequence of (46). As in the proof of Theorem 4.4, we notice 2 that for any u ∈ R, exp (u) ≤ 1 + u + u2 exp (u+ ) and ln (1 + u) ≤ u, where u+ = u ∨ 0. By consequence, for λ ∈ [0, r], it holds ϕS (λ)/ n = λE [X1 ] + ln (E [exp (−λX1 )])    λ2  2 ≤ ln 1 − λE [X1 ] + E X1 exp λ (−X1 )+ + λE [X1 ] 2  λ2  2  λ2 λ2  2 ≤ E X1 exp λ (−X1 )+ ≤ E X1 exp r (−X1 )+ ≤ wr . 2 2 2 Now we get, for any y ≥ 0, ≥ sup λ∈[0,r]  ϕ∗S (y) ≥ sup {λy−ϕS (λ)} λy− nλ2 w 2 r  λ∈[0,r] =  rnwr  y2 1y≤rnwr + r y − 1y>rnwr , 2nwr 2 which gives   2   x rnwr  P ((Pn − P )(ln (f /f∗ )) ≤ −x) ≤ exp −n 1x≤rnwr + r x − 1x>rnwr 2nwr 2 (47) Inequality (29) is again a consequence of (47), by the same kind of arguments as those involved in the proof of 27 in Lemma 4.4. 6.3 Proofs related to Section 4.3 Proof of Proposition 4.6. Let us take q > 1 such that 1/p + 1/q = 1. It holds "    2 # Z   2 f f f P ∨1 ln = (f ∨ f∗ ) ln dµ f∗ f∗ f∗   2 ! p1 + 1q Z f f∗ ∨ f (f∗ ∧ f ) ln dµ = f∗ ∧ f f∗   2!   2 ! 1q Z p f∗ ∨ f f f = (f∗ ∧ f ) ln dµ 1 ln f∗ f∗ (f∗ ∧ f ) q  1 p 1 !   2    Z Z q  2  (f∗ ∨ f )p f f   ≤ (f∗ ∧ f ) ln dµ ln dµ   p−1 f∗ f∗  (f∗ ∧ f )  | {z } :=I where in the last step we used Hölder’s inequality. Now, by Lemma 7.24 of Massart [35], it also holds   2 Z f 1 dµ ≤ K (f∗ , f ) . (f∗ ∧ f ) ln 2 f∗ In order to prove (31), it thus remains to bound I in terms of p, c+ and c− only. First, we decompose I into two parts,   2   2   2 Z Z Z (f∗ ∨ f )p f f∗p f∗ fp f dµ = ln 1f∗ ≥f dµ + ln 1f ≥f∗ dµ. p−1 ln f p−1 p−1 f f f∗ (f∗ ∧ f ) ∗ f∗ (48) Model Selection as a Multiple Testing Procedure 27 For the first term in the right-hand side of (48), we get Z   2   2 Z f∗ f∗ 1−p p ln 1 dµ ≤ c f dµ f∗ ≥f ∗ ln − f p−1 f c−    Z 1−p 2 f∗p (ln f∗ )2 ∨ 1 dµ < +∞ , ≤ 4c− (ln c− ) ∨ 1 f∗p (49)   where in the second inequality we used the following fact: (a + b)2 ≤ 4 a2 ∨ 1 b2 ∨ 1 , for any real numbers a and b. The finiteness of the upper bound is guaranteed by assumption (30). For the second term in the right-hand side of (48), it holds by same kind of arguments that lead to (49), Z   2 c+ dµ p−1 p−1 ln f ∗ f∗ f∗  Z   p 2 ≤ 4c+ (ln c+ ) ∨ 1 f∗1−p (ln f∗ )2 ∨ 1 dµ < +∞ , fp  ln  f f∗ 2 1f ≥f∗ dµ ≤ cp+ Z 1 (50)   where in the last inequality we used the following fact: (a − b)2 ≤ 4 a2 ∨ 1 b2 ∨ 1 . Again, the finiteness of the upper bound is guaranteed by (30). Inequality (31) then follows from combining (48), (49) and (50). Inequality (32) follows from the same kind of computations. Indeed, we have by the use of Hölder’s inequality, " r   2 # Z  r+1    2 f∗ f∗ f f P = ∨1 ln ∨ f ln dµ ∗ f f∗ fr f∗     2 !1− r+1   2(r+1) Z p r+1 r p f ∨ f f f f ∗ ∗   = (f∗ ∧ f ) ln dµ ln 1− r+1 f∗ f∗ p f r (f ∧ f ) ∗ ≤  r+1  p p rp Z   2 !1− r+1   2  Z p p r+1   f ∨ f f r+1 f f ∗ ∗   (f∗ ∧ f ) ln ln dµ dµ p   rp −1 f∗ f∗   f r+1 f∗r+1 ∧ f p−1 {z } | . :=Ir In order to prove (32), it thus remains to bound Ir in terms of p, c+ and c− only. Again, we split Ir into two parts, Z p rp f∗p ∨ f∗r+1 f r+1 rp p f r+1 f∗r+1 −1 ∧ f p−1   2   2   2 Z Z f f∗p f∗ f ln dµ = ln 1f∗ ≥f dµ+ f∗ ln 1f ≥f∗ dµ . p−1 f∗ f f f∗ (51) The first term in the right-hand side of (51) is given by (49) above. For the second term in the right-hand side of (51), it holds Z   2   2 Z c f f∗ ln 1f ≥f∗ dµ ≤ f∗ ln + dµ f∗ f∗   ≤2 (ln (c+ ))2 + 2P (ln f∗ )2 . (52)       Furthermore we have f∗p−1 +f∗−p ≥ 1, so P (ln f∗ )2 ≤ P f∗p−1 (ln f∗ )2 +P f∗−p (ln f∗ )2 ≤ J +Q and by (52),   2 Z   f f∗ ln 1f ≥f∗ dµ ≤ 2 (ln (c+ ))2 + J + Q < +∞ , f∗ where the finiteness of the upper bound comes from (30). Inequality (32) then easily follows. 28 Saumard and Navarro Proof of Proposition 4.7. Let us first prove Inequality (33). Considering the proof of Inequality (31) of Lemma 4.6 given above, we see that it is sufficient to bound the second term in the right-hand side of (48), applied with f = fm , in terms of Amin , J and p only. It holds Z fm f∗p−1    2   2 Z  fm p fm fm ln ln 1fm ≥f∗ dµ ≤ Amin dµ . f∗ Amin Amin (53) Now, we set h an auxilliary function, defined by h (x) = xp (ln x)2 for any x ≥ 1. It is easily seen that h is convex. So it holds, for any I ∈ Λm ,   Z  Z   f∗ fm (I) f∗ dµ dµ h =h ≤ h . Amin Amin µ (I) I I Amin µ (I) From the latter inequality and from (53), we deduce Z fm f∗p−1  ln  fm f∗ 2 1fm ≥f∗ dµ ≤ Amin Z h  fm Amin  dµ ≤ Amin Z h  f∗ Amin    1−p dµ ≤ 4Amin (ln Amin )2 ∨ 1 J . Inequality (33) is thus proved. In the same manner, to establish Inequality (34) it suffices to adapt the proof of inequality (32) given above by controlling the second term in the right-hand side of (51), applied with f = fm , in terms of Amin , p and P (ln f∗ )2 only. Let us notice that the function f defined on [1, +∞) by f (x) = x (ln x)2 is convex. We have   2   2  Z Z  fm fm fm f∗ ln 1fm ≥f∗ dµ ≤ fm ln dµ = Amin f dµ . f∗ Amin Amin  R  R    (I) dµ f∗ dµ ∗ = f I Afmin ≤ f Now, for any I ∈ Λm , it holds f fAmmin Amin µ(I) . Hence, I µ(I) Z Z    2 Z  f∗ fm f∗ ln 1fm ≥f∗ dµ ≤ Amin f dµ ≤ 2P (ln f∗ )2 + 2 (ln Amin )2 , f∗ Amin which gives the desired upper-bound and proves (34). In the case where f∗ ∈ L∞ (µ), we have to prove (35). We have inf z∈Z f∗ (z) ≤ inf z∈Z fm (z) ≤ kfm k∞ ≤ kf∗ k∞ , so it holds " " "   #    2 # r   2 #   2 kf∗ k∞ r∨1 fm f∗ fm fm fm P ∨1 ln ∨P ∨1 ln ≤ P ln . f∗ f∗ fm f∗ Amin f∗ Now, Inequality (35) is a direct consequence of Lemma 1 of Barron and Sheu [10], which contains the following inequality, "   #     2 fm fm P ln ≤ 2 exp ln K (f∗ , fm ) . f∗ f∗ ∞ This finishes the proof of Lemma 4.7. References [1] H. Akaike. Information theory and an extension of the maximum likelihood principle. In Second International Symposium on Information Theory (Tsahkadsor, 1971), pages 267–281. Akadémiai Kiadó, Budapest, 1973. [2] S. Arlot. Resampling and Model Selection. PhD thesis, University Paris-Sud 11, Dec. 2007. oai:tel.archives-ouvertes.fr:tel-00198803_v1. Model Selection as a Multiple Testing Procedure 29 [3] S. Arlot. V -fold cross-validation improved: V -fold penalization, Feb. 2008. arXiv:0802.0566v2. [4] S. Arlot. Model selection by resampling penalization. Electron. J. Stat., 3:557–624, 2009. [5] S. Arlot and P. L. Bartlett. Margin-adaptive model selection in statistical learning. Bernoulli, 17(2):687–713, 05 2011. [6] S. Arlot and A. Célisse. A survey of cross-validation procedures for model selection. Stat. Surv., 4:40–79, 2010. [7] S. Arlot and P. Massart. Data-driven calibration of penalties for least-squares regression. J. Mach. Learn. Res., 10:245–279 (electronic), 2009. [8] Y. Baraud, L. Birgé, and M. Sart. A new method for estimation and model selection: ρestimation. Invent. Math., 207(2):425–517, 2017. [9] A. Barron, L. Birgé, and P. Massart. Risk bounds for model selection via penalization. Probab. Theory Related Fields, 113(3):301–413, 1999. [10] A. Barron and C. Sheu. Approximation of density functions by sequences of exponential families. Ann. Statist., 19(3):1347–1369, 1991. [11] P. Bellec and A. Tsybakov. Bounds on the prediction error of penalized least squares estimators with convex penalty. In V. Panov, editor, Modern Problems of Stochastic Analysis and Statistics, pages 315–333, Cham, 2017. Springer International Publishing. [12] P. C. Bellec, G. Lecué, and A. B. Tsybakov. Towards the study of least squares estimators with convex penalty. arXiv preprint arXiv:1701.09120, 2017. [13] A. Berlinet and L. Devroye. A comparison of kernel density estimates. Publications de l’Institut de Statistique de l’Université de Paris, 38(3):3–59, 1994. [14] P. Bühlmann, L. Meier, and S. van de Geer. Discussion: “a significance test for the lasso”. Ann. Statist., 42(2):469–477, 04 2014. [15] L. Birgé. Model selection via testing: an alternative to (penalized) maximum likelihood estimators. Ann. Inst. H. Poincaré Probab. Statist., 42(3):273–325, 2006. [16] L. Birgé. Robust tests for model selection. In From probability to statistics and back: highdimensional models and processes, volume 9 of Inst. Math. Stat. (IMS) Collect., pages 47–64. Inst. Math. Statist., Beachwood, OH, 2013. [17] L. Birgé and Y. Rozenholc. How many bins should be put in a regular histogram. ESAIM Probab. Stat., 10:24–45 (electronic), 2006. [18] S. Boucheron, G. Lugosi, and P. Massart. Concentration Inequalities. Oxford University Press, 2013. [19] S. Boucheron, G. Lugosi, and P. Massart. Concentration Inequalities: A Nonasymptotic Theory of Independence. Oxford University Press, Oxford, 2013. [20] S. Boucheron and P. Massart. A high-dimensional Wilks phenomenon. Probab. Theory Related Fields, 150(3-4):405–433, 2011. [21] O. Bousquet. A Bennett concentration inequality and its application to suprema of empirical processes. C. R. Math. Acad. Sci. Paris, 334(6):495–500, 2002. [22] P. Burman. Estimation of equifrequency histogram. Statist. Probab. Lett., 56(3):227–238, 2002. 30 Saumard and Navarro [23] G. Castellan. Modified Akaike’s criterion for histogram density estimation. Technical report ]99.61, Université Paris-Sud, 1999. [24] G. Castellan. Density estimation via exponential model selection. IEEE Trans. Inform. Theory, 49(8):2052–2060, 2003. [25] S. Chatterjee. A new perspective on least squares under convex constraint. Ann. Statist., 42(6):2340–2381, 12 2014. [26] G. Claeskens and N. L. Hjort. Model selection and model averaging. Cambridge Series in Statistical and Probabilistic Mathematics. Cambridge University Press, Cambridge, 2008. [27] I. Csiszár. I-divergence geometry of probability distributions and minimization problems. Ann. Probab., 3(1):146–158, 1975. [28] P. D. Grünwald. The minimum description length principle. MIT press, 2007. [29] C. M. Hurvich and C.-L. Tsai. Model selection for least absolute deviations regression in small samples. Statist. Probab. Lett., 9(3):259–265, 1990. [30] T. Klein and E. Rio. Concentration around the mean for maxima of empirical processes. Ann. Probab., 33(3):1060–1077, 2005. [31] G. Lecué and M. Lerasle. Learning from mom’s principles: Le cam’s approach. 2017. [32] R. Lockhart, J. Taylor, R. J. Tibshirani, and R. Tibshirani. Rejoinder: “a significance test for the lasso”. Ann. Statist., 42(2):518–531, 04 2014. [33] R. Lockhart, J. Taylor, R. J. Tibshirani, and R. Tibshirani. A significance test for the lasso. Ann. Statist., 42(2):413–468, 04 2014. [34] E. Mammen and A. Tsybakov. Smooth discrimination analysis. Ann.Stat., 27:1808–1829, 1999. [35] P. Massart. Concentration inequalities and model selection, volume 1896 of Lecture Notes in Mathematics. Springer, Berlin, 2007. Lectures from the 33rd Summer School on Probability Theory held in Saint-Flour, July 6–23, 2003, With a foreword by Jean Picard. [36] P. Massart and E. Nédélec. Risks bounds for statistical learning. Ann.Stat., 34(5):2326–2366, 2006. [37] T. Mildenberger and H. Weinert. The benchden package: Benchmark densities for nonparametric density estimation. Journal of Statistical Software, Articles, 46(14):1–14, 2012. [38] A. Muro and S. van de Geer. Concentration behavior of the penalized least squares estimator. arXiv preprint arXiv:1511.08698, 2015. [39] A. Saumard. Optimal upper and lower bounds for the true and empirical excess risks in heteroscedastic least-squares regression. Electron. J. Statist., 6(1-2):579–655, 2012. [40] C. M. Stein. Estimation of the mean of a multivariate normal distribution. Ann. Statist., 9(6):1135–1151, 1981. [41] C. Stone. An asymptotically optimal histogram selection rule. In Proceedings of the Berkeley conference in honor of Jerzy Neyman and Jack Kiefer, Vol. II (Berkeley, Calif., 1983), Wadsworth Statist./Probab. Ser., pages 513–520, Belmont, CA, 1985. Wadsworth. [42] N. Sugiura. Further analysts of the data by Akaike’s information criterion and the finite corrections. Communications in Statistics - Theory and Methods, 7(1):13–26, 1978. Model Selection as a Multiple Testing Procedure 31 [43] A. Tsybakov. Optimal aggregation of classifiers in statistical learning. Ann.Stat., 32:135–166, 2004. [44] S. van de Geer and M. J. Wainwright. On concentration for (regularized) empirical risk minimization. Sankhya A, 79(2):159–200, Aug 2017. [45] H. Zou, T. Hastie, and R. Tibshirani. On the “degrees of freedom” of the lasso. Ann. Statist., 35(5):2173–2192, 2007. 32 A Saumard and Navarro Further Proofs and Theoretical Results A.1 Proofs Related to Section 3.1 Most of the arguments given in the proofs of this section are borrowed from Castellan [23]. We essentially rearrange these arguments in a more efficient way, thus obtaining better concentration bounds than in [23] (or [35], see also [18]). We also set, for any ε > 0, the event Ωm (ε) where some control of fˆm in sup-norm is achieved, ( ) fˆm − fm Ωm (ε) = ≤ε . fm ∞ As we have the following formulas for the estimators and the projections of the target, X Pn (I) 1I µ (I) fˆm = , fm = I∈Λm X P (I) 1I , µ (I) I∈Λm we deduce that, fˆm − fm fm T = sup I∈Λm ∞ |(Pn − P ) (I)| . P (I) (54) Hence, it holds Ωm (ε) = I∈m {|Pn (I) − P (I)| ≤ εP (I)}. Let us state the main result of this section, concerning upper and lower bounds for the true and empirical excess risks of the histograms on each model. These bounds are optimal to the first order. Before giving the proof of Theorem 3.1, the following lemma will be useful. It describes the consistency in sup-norm of the histogram estimators, suitably normalized by the projections of the target on each model. Lemma A.1 Let α, A+ and AΛ be positive constants. Consider a finite partition m of Z, with cardinality Dm . Assume 0 < AΛ ≤ Dm inf {P (I)} I∈m and 0 < Dm ≤ A+ n ≤n. ln(n + 1) (55) Then by setting Rn∞ (m) = s 2 (α + 1) Dm ln(n + 1) (α + 1) Dm ln(n + 1) + , AΛ n AΛ n we get P In other words, fˆm − fm fm ∞ ≤ ! Rn∞ (m) ≥ 1 − 2(n + 1)−α . (56) (57) P (Ωm (Rn∞ (m))) only depending on α, A+ ≥ 1 − 2(n + 1)−α . In addition, there exists a positive constant Ac , q Dm ln(n+1) ∞ and AΛ , such that Rn (m) ≤ Ac . Furthermore, if n √ √ (α + 1) A+ ≤ τ = 3 − 2 < 0.32 , AΛ or if n ≥ n0 (α, A+ , AΛ ), then Rn∞ (m) ≤ 1/2 . Proof of Lemma A.1. Let β > 0 to be fixed later. Recall that, by (54) we have fˆm − fm fm = sup ∞ I∈Λm |(Pn − P ) (I)| . P (I) (58) Model Selection as a Multiple Testing Procedure By Bernstein’s inequality (see Proposition 2.9 in [35]) applied to the random variables for all x > 0, " # r 2P (I) x x P |(Pn − P ) (I)| ≥ ≤ 2 exp (−x) . + n 3n 33 1ξi ∈I we get, Taking x = β ln(n + 1) and normalizing by the quantity P (I) > 0 we get " |(Pn − P ) (I)| P ≥ P (I) s # 2β ln(n + 1) β ln(n + 1) ≤ 2(n + 1)−β . + P (I) n P (I) 3n (59) Now, by the first inequality in (55), we have 0 < P (I)−1 ≤ A−1 Λ Dm . Hence, using (59) we get  |(Pn − P ) (I)| P ≥ P (I) s  2βDm ln(n + 1) βDm ln(n + 1)  + ≤ 2(n + 1)−β , AΛ n AΛ n We then deduce from (58) and (60) that " fˆm − fm P fm ∞ ≥ # Rn∞ (m) ≤ (60) 2Dm (n + 1)β and, since Dm ≤ n, taking β = α + 1 yields Inequality (57). The other facts of Lemma A.1 then follow from simple computations. Proof of Theorem 3.1. Recall that α is fixed. By Inequality (23) in Proposition 4.2 applied with θ = Rn∞ (m)—where Rn∞ (m) is defined in (56) with our fixed value of α—and x = α ln(n + 1), it holds with probability at least 1 − (n + 1)−α , χn (m) 1Ωm (Rn∞ (m)) ≤ As Rn∞ (m) ≤ Lα,A+ ,AΛ r  r ∞ (m) p Dm R 2α ln(n + 1) n + 1 + 2Rn∞ (m) + . n 6 n p Dm ln(n + 1)/n ≤ Lα,A+ ,AΛ , (61) gives χn (m) 1Ωm (Rn∞ (m)) We set the event Ω0 on which we have r Dm ln(n + 1) ≤ + Lα,A+ ,AΛ n  n  s r Dm  ln(n + 1)  = 1 + Lα,A+ ,AΛ . n Dm r fˆm − fm fm χn (m) ≤ and (61)  r ∞ ≤ Rn∞ (m) ,  Dm  1 + Lα,A+ ,AΛ n s χn (m) ≥ 1 − Ag  (62) ln(n + 1) ∨ Dm s  ln(n + 1)  , Dm  r p ln(n + 1)  Dm . n n1/4 (63) (64) In particular, Ω0 ⊂ Ωm (Rn∞ (m)). By (62), Lemma A.1 and Proposition 4.3, it holds P (Ω0 ) ≥ 1 − 4(n + 1)−α . It suffices to prove the inequalities of Theorem 3.1 on Ω0 . The following inequalities, 34 Saumard and Navarro between the excess risk on m and the chi-square statistics, are shown in [23] (Inequalities (2.13)). For any ε ∈ (0, 1), on Ωm (ε),   1−ε 2 ˆm ≤ 1 + ε χ2 (m) . χ (m) ≤ K f , f m n n 2 (1 + ε)2 2 (1 − ε)2 (65) ∞ Under the condition (α + 1) A+ A−1 Λ < τ , Proposition A.1 gives Rn (m) < 1. Hence, by applying the right-hand side of (65) with ε = Rn∞ (m) ≤ 1/2, using (63) and the fact that (1 − )−1 ≤ 1 + 2 for  ≤ 1/2, we get on Ω0 ,   K fm , fˆm ≤ 1 + Rn∞ (m) χ2n (m) 2 (1 − Rn∞ (m))2  2 s ! r 1 Dm ln(n + 1) Dm  ln(n + 1)  ≤ + Lα,A+ ,AΛ 1 + Lα,A+ ,AΛ . 2 n n Dm Then simple computations allow to get the right-hand side inequality in (16). By applying the left-hand side of (65) with ε = Rn∞ (m) ≤ 1/2 and using the fact that (1+)−1 ≥ 1 − , we also get on Ω0 ,   K fm , fˆm ≥ 1 − Rn∞ (m) 2 2 χn (m) ∞ 2 (1 + Rn (m))  s 2 p ln(n + 1) ln(n + 1)   Dm ≥(1 − Rn∞ (m))3 1 − Ag  ∨ Dm 2n n1/4   s p ln(n + 1) ln(n + 1)  Dm ≥(1 − (3Rn∞ (m) ∧ 1)) 1 − 2Ag  ∨ 1/4 Dm 2n n The left-hand side inequality in (16) then p p p follows by simple computations, noticing in particular that −1/4 n ln(n + 1) ≤ ln(n + 1)/Dm ∨ Dm ln(n + 1)/n. Inequalities in (17) follow from the same kind of arguments as those involved in the proofs of inequalities in (16). Indeed, from [35, Lemma 7.24]—or [23, Lemma 2.3] —, it holds 1 2 Z  fˆm ∧ fm  fˆm ln fm !2  dµ ≤ K fˆm , fm Z   1 ≤ 2  1+ε ≤ 2 fˆm ∨ fm  fˆm ln fm !2 dµ . We deduce that for ε ∈ (0, 1), we have on Ωm (ε), 1−ε 2 Z fm fˆm ln fm !2  dµ ≤ K fˆm , fm Z fm fˆm ln fm !2 dµ . (66) As for every x > 0, we have (1 ∨ x)−1 ≤ (x − 1)−1 ln x ≤ (1 ∧ x)−1 , (66) leads by simple computations to the following inequalities   1−ε 2 ˆm , fm ≤ 1 + ε χ2 (m) . χ (m) ≤ K f n n 2 (1 + ε)2 2 (1 − ε)2 We thus have the same upper and lower bounds, in terms of the chi-square statistic χ2n (m), for the empirical excess risk as for the true excess risk. Model Selection as a Multiple Testing Procedure A.2 35 Oracle inequalities and dimension guarantees Using the notations of Section 3.2, we define the set of assumptions (SA0 ) to be the conjunction of assumptions (P1), (P2), (Asm) and (Alr). The set of assumptions (SA) of Section 3.2 thus consists on assuming (SA0 ) together with (Ap). For some of the following results, we will also need the following assumptions. √ √ (P3) Richness of Mn : there exist m0 , m1 ∈ Mn such that Dm0 ∈ [ n, crich n] and Dm1 ≥ Arich n (ln(n + 1))−2 . (Apu ) The bias decreases as a power of Dm : there exist β+ > 0 and C+ > 0 such that −β+ K (f∗ , fm ) ≤ C+ Dm . (Ap) The bias decreases like a power of Dm : there exist β− ≥ β+ > 0 and C+ , C− > 0 such that −β− −β+ C− D m ≤ K (f∗ , fm ) ≤ C+ Dm . Theorem 3.2 is a direct corollary of the following theorem. Theorem A.2 Take n ≥ 1 and r ∈ (0, p − 1). Assume that the set of assumptions (SA0 ) holds and that for some θ ∈ (1/2, +∞) and ∆ > 0,  Dm pen (m) = θ + ∆ε+ , n (m) n for every model m ∈ Mn . Then there exists an event Ωn of probability 1 − (n + 1)−2 and some positive constants A1 , A2 depending only on the constants defined in (SA0 ) such that, if ∆ ≥ (θ − 1)− A1 + A2 > 0 then we have on Ωn , 3p−1−r n  o (ln(n + 1)) 2(p+1+r) ˆ . inf K f∗ , fm +L(SA),θ,r p m∈Mn n p+1+r (67) Assume furthermore that Assumption (Apu ) holds. Then it holds on Ωn ,  −1/2  1 + 2 (θ − 1) + L (SA),θ,r (ln(n + 1)) + K f∗ , fˆm ≤ b 1 − 2 (θ − 1)− Dm b ≤ L(SA),∆,θ,r n 1 2+β+ 1− r+1 p ( )p ln(n + 1) 1 , Dm∗ ≤ L(SA) n 1+β+ . In particular, if we are in the case where p < β+ then Inequality (67) reduces to 3p−1−r  (ln(n + 1)) 2(p+1+r) ˆ K f∗ , fm . p b ≤ L(SA),θ,r n p+1+r  (68) Grant Assumption (Ap). Then it holds on Ωn , β+ (1) L∆,θ,(SA) 1 n β− (1+β+ ) (ln(n + 1)) (1) 1 β− ≤ Dm b ≤ 2+β+ (1− (2) L∆,θ,(SA) n β+ (2) r+1 p )p ln(n + 1) , 1 L(SA) n (1+β+ )β− ≤ Dm∗ ≤ L(SA) n 1+β+ and − β+ p ln(n + 1) 3p−1−r n  o (ln(n + 1)) 2(p+1+r) ˆ inf K f∗ , fm +L(SA),θ,r p m∈Mn n p+1+r (69) Furthermore, if β− < p (1 + β+ ) /(1 + p + r) or p/(1 + r) > β− + β− /β+ − 1, then we have on Ωn ,  K f∗ , fˆm b  1 + 2 (θ − 1)+ + L(SA),θ,r n (1+β+ )β− ≤ 1 − 2 (θ − 1)− −1/2   1 + 2 (θ − 1) + L (SA),θ,r (ln(n + 1)) + K f∗ , fˆm ≤ b 1 − 2 (θ − 1)− inf m∈Mn n  o K f∗ , fˆm . (70) 36 Saumard and Navarro We obtain in Theorem A.2 oracle inequalities and dimension bounds for the oracle and selected models. In order to avoid cumbersome notations in the proofs of Theorem A.2, when generic constants L and n0 depend on constants defined in the sets of assumptions (SA0 ) or (SA), we will note L(SA) and n0 ((SA)). The values of the these constants may change from line to line, or even whithin one line. Proof of Theorem 3.2 • Proof of oracle Inequality (67): From the definition of the selected model m b given in (4), m b minimizes   crit (m) := Pn γ(fˆm ) + pen (m) , over the models m ∈ Mn . Hence, m b also minimizes crit0 (m) := crit (m) − Pn (γ (f∗ )) (71) over the collection Mn . Let us write     K f∗ , fˆm = P γ(fˆm ) − γ (f∗ )     = Pn γ(fˆm ) + Pn γ(fm ) − γ(fˆm ) + (Pn − P ) (γ (f∗ ) − γ(fm ))   + P γ(fˆm ) − γ(fm ) − Pn (γ (f∗ )) . By setting     p1 (m) = P γ(fˆm ) − γ(fm ) = K fm , fˆm ,     p2 (m) = Pn γ(fm ) − γ(fˆm ) = K fˆm , fm , δ̄ (m) = (Pn − P ) (γ (f∗ ) − γ(fm )) = (Pn − P ) (ln ( fm / f∗ )) and pen0id (m) = p1 (m) + p2 (m) + δ̄ (m) , we have and by (71),     K f∗ , fˆm = Pn γ(fˆm ) + p1 (m) + p2 (m) + δ̄ (m) − Pn (γ (f∗ ))    crit0 (m) = K f∗ , fˆm + pen (m) − pen0id (m) . (72) As m b minimizes crit0 over Mn , itis therefore sufficient by (72) to control pen (m) − pen0id (m) in terms of the excess risk K f∗ , fˆm , for every m ∈ Mn , in order to derive oracle inequalities. We further set " "    2 # r   2 # fm f∗ fm fm ∨1 ln and wm = P ∨1 ln . Km = K (f∗ , fm ) , vm = P f∗ f∗ fm f∗ Let Ωn be the event on which: • For all models m ∈ Mn , we set zn = (2 + αM ) ln(n + 1) + 2 ln 2 and we have, r 2vm zn 2zn δ̄ (m) ≤ + n n r 2wm zn 2zn −δ̄ (m) ≤ + n nr Dm ≤ p1 (m) − 2n Dm −L(SA),α ε− ≤ p2 (m) − n (m) 2n −L(SA),α ε− n (m) Dm Dm ≤ L(SA),α ε+ n (m) 2n 2n Dm Dm + ≤ L(SA),α εn (m) 2n 2n (73) (74) (75) (76) Model Selection as a Multiple Testing Procedure 37 By Theorem 3.1 applied with α = 5 + αM and Propositions 4.4 and 4.5 applied with z = zn , we get P (Ωn ) ≥ 1 − = 1− X  4(n + 1) −5−αM m∈Mn X m∈Mn (n + 1)−2−αM + 2  (n + 1)−2−αM ≥ 1 − (n + 1)−2 . Dm The following simple remark will be used along the proof: for any m ∈ Mn , zn /n ≤ L(SA) ε+ n (m) n . Notice also that ε− b ≤ ε+ b (see Theorem 3.1). n (m) n (m) (1) By using (33), (72), (73), (75) and (76), we get that on Ωn , for ∆ of the form (θ − 1)− L(SA) + (2) (1) (2) L(SA) with L(SA) and L(SA) sufficiently large, crit0 (m) b r   2vm 2zn b zn ˆ ≥K f∗ , fm b − p1 (m) b − p2 (m) b − − b + pen (m) n n   s 1−1/p  + zn 2AM R,− Km Dm Dm b −1 b b ≥K f∗ , fˆm + (θ − 1) + ∆ − L ε ( m) b − b (SA) n n n n     Dm Dm b −1 b ≥K f∗ , fˆm − L(SA) ε− b b − 2 (θ − 1)− n (m) 2n n s 1−1/p    zn 2AM R,− Km Dm (1) (2) b b + ∆ − L(SA) (θ − 1)− + L(SA) ε+ ( m) b − n n n s 1−1/p    2AM R,− Km zn b ≥ 1 − 2 (θ − 1)− K f∗ , fˆm − . b n (77)  Note that 1 − 2 (θ − 1)− > 0. Let us take η ∈ 0, 1/2 − (θ − 1)− , so that 1 − 2 (θ − 1)− − η > 1/2 − (θ − 1)− > 0 . p−1 p − p−1 2p 2p , b = η 2p By Lemma A.5 applied with a = (ηKm 2AM R,− zn /n, u = p−1 and v = b) have s   p   p−1 1−1/p 2AM R,− Km zn ln(n + 1) p+1 1 p+1 b ≤ ηKm . b + L(SA),α n n η 2p p+1 , we By using the latter inequality in (77) we obtain,   p   p−1  ln(n + 1) p+1 1 p+1 ˆ crit (m) b ≥ 1 − 2 (θ − 1)− − η K f∗ , fm . b − L(SA),α n η  0  (78) We compute now an upper bound on crit0 for each model m. By Lemma A.5 applied with a = p−r−1 − p−1−r p 2p 2p (ηKm ) 2p , b = η 2p 2AM R,− zn /n, u = p−1−r and v = p+1+r , we have s 1− r+1 p 2AM R,− Km n zn ≤ ηKm + L(SA),r  ln(n + 1) n  p p+1+r   p−1−r 1 p+1+r . η 38 Saumard and Navarro By (74), (72), (75), (76), (34) and by using Lemma A.5 we have on Ωn ,   0 ˆ crit (m) = K f∗ , fm + pen (m) − p1 (m) − p2 (m) − δ̄ (m)     D D m m − ≤K f∗ , fˆm + 2 (θ − 1)+ − L(SA) εn (m) 2n n s 1− r+1 p   2A K zn 2zn D M R,− m (2) (1) m + ∆ + (θ − 1)+ L(SA) + L(SA) ε+ (m) + + n n n nr      Dm (1) (2) ≤ 1 + 2 (θ − 1)+ + η K f∗ , fˆm + ∆ + (θ − 1)+ L(SA) + L(SA),r ε+ n (m) n   p   p−1−r p+1+r p+1+r ln(n + 1) 1 + L(SA),r . n η (2) (1) Recall that we took ∆ = L(SA) (θ − 1)− + L(SA) for some positive constants sufficiently large, so (1) (2) (1) (2) ∆ + (θ − 1)+ L(SA) + L(SA),r ≤ |θ − 1| L(SA) + L(SA),r and we finally get,      Dm (1) (2) crit0 (m) ≤ 1 + 2 (θ − 1)+ + η K f∗ , fˆm + |θ − 1| L(SA) + L(SA),r ε+ n (m) n   p   p−1−r ln(n + 1) p+1+r 1 p+1+r + L(SA),r . n η Now, as m b minimizes crit0 we get from (78) and (79), on Ωn ,    1 + 2 (θ − 1) + η   Dm ∗ + + ˆ ˆ K f∗ , fm K f∗ , fm∗ + L(SA),θ,r εn (m∗ ) b ≤ 1 − 2 (θ − 1)− − η n   p   p−1−r ln(n + 1) p+1+r 1 p+1+r +L(SA),θ,r . n η  We distinguish two cases. If Dm∗ ≥ L(SA) (ln(n + 1))2 with a constant L(SA) chosen such that 1 1 A0 ε+ ≤ √ <1, n (m∗ ) ≤ p 2 ln 2 2 ln(n + 1) where A0 and ε+ n (m) are defined in Theorem 3.1, then by Theorem 3.1 it holds on Ωn , !   1 Dm∗ K f∗ , fˆm∗ ≥ 1 − p . 2n 2 ln(n + 1) On the other hand, if Dm∗ ≤ L(SA) (ln(n + 1))2 then by Theorem 3.1 we have on Ωn ,   Dm ∗ (ln(n + 1))3 K f∗ , fˆm∗ + L(SA),θ,r ε+ ≤ L . (m ) ∗ (SA),θ,r n n n Hence, in any case we always have on Ωn ,   Dm ∗ K f∗ , fˆm∗ + L(SA),θ,r ε+ n (m∗ ) n    (ln(n + 1))3  ≤L(SA),θ,r + 1 + L(SA),θ,r (ln(n + 1))−1/2 K f∗ , fˆm∗ . n (79) (80) Model Selection as a Multiple Testing Procedure 39  By taking η = (ln(n + 1))−1/2 1/2 − (θ − 1)− and using the fact that in this case, 1 + 2 (θ − 1)+ + η 1 + 2 (θ − 1)+ + Lθ η ≤ , 1 − 2 (θ − 1)− − η 1 − 2 (θ − 1)− (81) we deduce that Inequality (80) gives,  −1/2  1 + 2 (θ − 1) + L (SA),θ,r (ln(n + 1)) + ˆ K f∗ , fm b ≤ 1 − 2 (θ − 1)− which is Inequality (67). • Proof of Inequality (68): 3p−1−r n  o (ln(n + 1)) 2(p+1+r) ˆ inf K f∗ , fm +L(SA),θ,r p m∈Mn n p+1+r 1 By Lemma A.4 we know that Dm∗ ≤ L(SA) n 1+β+ on Ωn . Furthermore, we have on Ωn , by simple computations,     K f∗ , fˆm =K (f∗ , fm ) + K fm , fˆm  Dm −β+ + 1 + L(SA) ε+ ≤C+ Dm n (m) 2n  D ln(n + 1) m −β+ + ≤L(SA) Dm + . n n This yields   n  o 1 Dm ln(n + 1) −β+ 1+β+ ˆ + ; m ∈ Mn , Dm ≤ L(SA) n K f∗ , fm ≤L(SA) inf Dm + inf m∈Mn n n β ≤L(SA) n + − 1+β + . To conclude, it suffices to notice that if β+ > p then β n + − 1+β + ≤n p − p+1 ≤n p − p+1+r , which finally gives 1 + 2 (θ − 1)+ + L(SA),θ,r (ln(n + 1))−1/2 1 − 2 (θ − 1)− 3p−1−r n  o (ln(n + 1)) 2(p+1+r) ˆ . inf K f∗ , fm ≤ L(SA),θ,r p M ∈Mn n p+1+r • Proof of Inequality (69): (1) (2) From (Ap), we know by Lemma A.4 that there exist L(SA) , L(SA) > 0 such that β+ (1) (2) 1 L(SA) n (1+β+ )β− ≤ DM∗ ≤ L(SA) n 1+β+ and so ε+ n (m∗ ) s ) Dm∗ ln(n + 1) ln(n + 1) ln(n + 1) ≤ max ; ; n Dm∗ Dm∗   β+ β+ p − − ≤L(SA) max n 2(1+β+ ) ; n 2(1+β+ )β− ln(n + 1) (r =L(SA) n Assume for now that we also have − β+ (1+β+ )β− p ln(n + 1) . −1/2 A0 ε+ , n (m∗ ) ≤ (ln(n + 1)) (82) (83) 40 Saumard and Navarro where A0 and ε+ n (m) are defined in Theorem 3.1. Then by Theorem 3.1 it holds on Ωn ,    D m∗ K f∗ , fˆm∗ ≥ 1 − (ln(n + 1))−1/2 . 2n In this case, we deduce that   Dm ∗ K f∗ , fˆm∗ + L(SA),θ,r ε+ n (m∗ ) n    β+  p − 1+β+ )β− ( ≤ 1 + L(SA),θ,r n ln(n + 1) K f∗ , fˆm∗ , (84) and Inequality (69) simply follows from using Inequality (80). If Inequality (83) is not satisfied, that is −1/2 A0 ε+ , n (m∗ ) > (ln(n + 1)) (85) then by (82), this means that there exists a positive constant L(SA) such that L(SA) n − β+ (1+β+ )β− p ln(n + 1) > (ln(n + 1))−1/2 . Consequently, this ensures that in the case where (85) is true, we also have n ≤ n0 ((SA)). Hence, as β+   −β− (1+β+ )β− > 0 , ≥ L n K f∗ , fˆm∗ ≥ C− Dm (SA) ∗ this yields Inequality (84) with a positive constant L(SA),θ,r in the right-hand term sufficiently large and then the result easily follows from using Inequality (80). • Proof of Inequality (70): If Dm∗ ≥ L(SA) (ln(n + 1))2 with a constant L(SA) chosen such that A 0 ε+ n (m∗ ) ≤ 1/2 , where A0 and ε+ n (m) are defined in Theorem 3.1, then by Theorem 3.1 it holds on Ωn ,   Dm ∗ −β− + . K f∗ , fˆm∗ ≥ C− Dm ∗ 4n β+ By Lemma A.4 we know that (1) L(SA) n (1+β+ )β− (2) 1 ≤ Dm∗ ≤ L(SA) n 1+β+ on Ωn . This gives β+   β −1+ − − (1+β+ )β− K f∗ , fˆm∗ ≥ L(SA) n 1+β+ + L(SA) n and we deduce by simple algebra that if β− < p (1 + β+ ) /(1+p+r) or p/(1+r) > β+ /(β− (1 + β+ ))− 1, then 3p−1−r   (ln(n + 1)) 2(p+1+r) −1/2 ˆ L(SA) (ln(n + 1)) K f∗ , fm∗ ≥ . p n p+1+r On the other hand, if Dm∗ ≤ L(SA) (ln(n + 1))2 , this implies in particular β+ (1) L(SA) n (1+β+ )β− ≤ L(SA) (ln(n + 1))2 . Hence, there exists an integer n0 ((SA)) such that n ≤ n0 ((SA)). In this case, we can find a constant L(SA) such that 3p−1−r   (ln(n + 1)) 2(p+1+r) −1/2 L(SA) (ln(n + 1)) K f∗ , fˆm∗ ≥ p n p+1+r and through the use of inequality (69), this conclude the proof of Inequality (70). Model Selection as a Multiple Testing Procedure 41 Lemma A.3 (Control on the dimension of the selected model) Assume that (SA0 ) holds top gether with (Apu ). If β+ ≤ r+1 then, on the event Ωn defined in the proof of Theorem A.2, we have Dm b ≤ L∆,θ,r,(SA) n 1 2+β+ 1− r+1 p ( If moreover (Ap) holds, then we get on the event Ωn , )p ln(n + 1) . β+ (1) L∆,θ,(SA) 1 n β− (1+β+ ) (ln(n + 1)) 1 β− ≤ Dm b ≤ 2+β+ (1− (2) L∆,θ,(SA) n (86) )p ln(n + 1) . r+1 p (87) Lemma A.4 (Control on the dimension of oracle models) Assume that (SA0 ) holds together with (Apu ). We have on the event Ωn defined in the proof of Theorem A.2, 1 Dm∗ ≤ L(SA) n 1+β+ . If moreover (Ap) holds, then we get on the event Ωn , (1) β+ 1 (2) L(SA) n (1+β+ )β− ≤ Dm∗ ≤ L(SA) n 1+β+ . (88) Proof of Lemma A.3. Recall that m b minimizes crit0 (m) = crit (m) − Pn γ (f∗ ) = Km − p2 (m) − δ̄ (m) + pen (m) over the models m ∈ Mn . Moreover, pen (m) = (θ + ∆ε+ n (m)) Dm /n. The analysis is restricted on Ωn . 1. Upper bound on crit0 (m):   1 Dm p2 (m) ≥ − L(SA) ε+ (m) n 2 n r 2wm zn 2zn −δ̄ (m) ≤ + . n nr 1− r+1 p Moreover, by Lemma 4.6, we have wm ≤ AM R,− Km and so, s 1− r+1   p 2A K zn 1 D M R,− m m crit0 (m) ≤Km + θ − + L∆,(SA) ε+ (m) + n 2 n n v     u u −β+ 1− r+1 p  −β Dm ln(n + 1) t Dm ln(n + 1)  +  . D ≤L∆,θ,(SA)  + + +  m  n n n Now, if β+ ≤ p r+1 , then for m0 such that Dm0 β β+ Dm0 − + − 1+β −β+ + ; ≤ 2n 1+β+ ; Dm ≤ n 0 n so we get  1  = n 1+β+ we have v   u u −β+ 1− r+1 p t Dm 0 n β crit0 (m0 ) ≤ L∆,θ,(SA) n + − 1+β + ≤n − ( ) β+ 2− r+1 +1 p 2(1+β+ ) p ln(n + 1) . β ≤n + − 1+β + , (89) 42 Saumard and Navarro Otherwise, if β+ > p r+1 , & then for m1 such that Dm1 = n 1 2+β+ 1− r+1 p ( ' ) , we have v   u 1+β+ (1− r+1 u −β+ 1− r+1 ( ) p ) p − − t r+1 D m1 2+β+ (1− p ) 2+β+ (1− r+1 p ) ; ; ≤ 2n ≤n n 1+β+ (1− r+1 β+ p ) − − 2+β+ (1− r+1 2+β+ (1− r+1 ) p p ) ≤n ≤n 1+β+ 1− r+1 p Dm1 n −β+ Dm 1 and − 0 0 crit (m1 ) ≤ L∆,θ,(SA) n 2. Lower bound on crit (m): we have ( ( 1+β+ 1− r+1 p 2+β+ 1− r+1 p ) p ) ln(n + 1) . (90)   1 Dm + p2 (m) ≤ + L(SA) εn (m) 2 n r 2vm zn 2zn −δ̄ (m) ≥ − − . n n 1− 1 Moreover, by Lemma 4.6, we have for some constant AM R,− > 0, vm ≤ AM R,− Km p . For ∆ large enough we thus get, s 1− 1   2AM R,− Km p zn 1 Dm 0 crit (m) ≥ Km + θ − − (91) 2 n n Assume that β+ ≤ p r+1 . p We take Dm ≤ L (n/ ln(n + 1)) (p+1)β− for some constant L > 0. If L is small enough, we have by (Ap) Km ≥ (8AM R,− zn /n)p/(p+1) and by (91), crit0 (m) ≥ Km /2. Now if   β+   p β− (1+β+ ) (1+p)β− n n  Dm ≤ L  ∧ (92) 1 ln(n + 1) 2β− (ln(n + 1)) with L sufficently small, only depending on ∆, θ and constants in (SA), then by (89) we p obtain crit0 (m) > crit0 (m0 ). As β+ ≤ r+1 < p, the upper bound in (92) reduces to Dm ≤ β+ 1 Ln β− (1+β+ ) / (ln(n + 1)) β− . This proves the left-hand side of (87). p Assume now that β+ > r+1 . If   1+β+ (1− r+1 p )  p r+1  (1+p)β− n n β− (2+β+ (1− p ))    Dm ≤ L  ∧  1  ln(n + 1)  2β− (ln(n + 1)) with L sufficiently small, only depending on ∆, θ and constants in (SA), then by (90) we p obtain crit0 (m) > crit0 (m1 ). As β+ ≤ r+1 < p, the upper bound in (92) reduces to Dm ≤ β+ 1 Ln β− (1+β+ ) / (ln(n + 1)) β− . This proves the left-hand side of (87). 1 1 p Assume that β+ ≤ r+1 . We take Dm ≤ L (n ln(n + 1)) 2+β+ (1− p ) for some constant L > 0. If L is large enough, then we get by (91) and simple calculations, crit0 (m) ≥ (θ/2 − 1/4) Dm /n. Furthermore, if ! 1 1 p 1 D ≥ L (n ln(n + 1)) 2+β+ (1− p ) ∧ n 1+β+ ln(n + 1) (93) m Model Selection as a Multiple Testing Procedure 43 with L sufficiently small, only depending on ∆, θ and constants in (SA), then by (89) we p obtain crit0 (m) > crit0 (m0 ). As β+ ≤ r+1 < p, the lower bound in (93) reduces to Dm ≤ 1 1 2+β+ 1− p ( ) . This proves the left-hand side of (87). L (n ln(n + 1)) p Assume now that β+ > r+1 . If   1 1 r+1 p 2+β 1− +( 1 p ) ln(n + 1) Dm ≥ L (n ln(n + 1)) 2+β+ (1− p ) ∨ n (94) with L sufficiently large, only depending on ∆, θ and constants in (SA), then by (89) we p obtain crit0 (m) > crit0 (m1 ). As β+ ≤ r+1 < p, the upper bound in (92) reduces to Dm ≤ β+ 1 Ln β− (1+β+ ) / (ln(n + 1)) β− . This proves the left-hand side of (87). As r > 0, (94) reduces to 1 p 2+β+ (1− r+1 p ) Dm ≥ Ln ln(n + 1), which proves (86) and the right-hand side of (87). Proof of Lemma A.4. By definition, m∗ minimizes   K f∗ , fˆm = Km + p1 (m) over the models m ∈ Mn . The analysis is restricted on Ωn .  ˆ 1. Upper bound on K f∗ , fm : we have     Dm 1 + −β+ ˆ + L(SA) εn (m) K f∗ , fm ≤C+ Dm + 2 n   Dm ln(n + 1) −β+ + ≤L(SA) Dm + . n n 1 Hence, if m0 is such that Dm0 = n 1+β+ , then   β − + K f∗ , fˆm0 ≤ L(SA) n 1+β+ . (95)   2. Lower bound on K f∗ , fˆm : there exists a constant A0 , only depending on constants in (SA), such that     Dm 1 − ˆ K f∗ , fm ≥Km + − A0 εn (m) 2 n ( ) p  Dm ln(n + 1) Dm Dm 3/2 p ≥Km + − A0 max ln(n + 1); . (96) 2n n n If (Ap) holds, then for Dm ≤ L(SA) min    n 3 3+2β− (ln(n + 1)) 1 3+2β− ; n 2 1+2β− 1 (ln(n + 1)) 1+2β− with L(SA) sufficiently small, we have −β− Km /2 ≥ C− Dm /2 ≥ A0 max ( Dm n 3/2 p ln(n + 1);    ) p Dm ln(n + 1) . n   −β In this case, we have by (96), K f∗ , fˆm ≥ Km /2 + (Dm ) /2n ≥ C− Dm − /2. Moreover, if m β+ is such that Dm ≤ L(SA) n (1+β+ )β− β+ Dm ≤ L(SA) n (1+β+ )β− with L(SA) sufficiently small, we also have   3 2 β+   3+2β− 1+2β− n n ≤ L(SA) min n (1+β+ )β− ; ; 1 1   (ln(n + 1)) 3+2β− (ln(n + 1)) 1+2β− 44 Saumard and Navarro     and by (95) we get K f∗ , fˆm0 < K f∗ , fˆm , which gives the left-hand side of (88). We turn now to the proof of the right-hand side of (88). Let m ∈ mn be such that Dm ≥ 1 L1 n 1+β+ . By (95) we deduce that if L1 is large enough, depending only on constants in (SA), then we have   Dm > K f∗ , fˆm0 . 4n In addition, if Dm ≥ L2 (ln(n + 1))2 and Dm ≤ L−1 2 n/ ln(n + 1) for some constant L2 sufficiently large, then ) ( p  Dm ln(n + 1) Dm Dm 3/2 p ln(n + 1); ≥ A0 max 4n n n     and by (96), we deduce that K f∗ , fˆm > K f∗ , fˆm0 . The latter inequality implies that 1 1 Dm∗ ≤ L1 n 1+β+ . Our reasoning is valid if n is such that L2 (ln(n + 1))2 ≤ L1 n 1+β+ ≤ 1 2 1+β+ , L−1 2 n/ ln(n+1). At the price of enlarging L1 , we can always achieve L2 (ln(n + 1)) ≤ L1 n 1 1+β+ with L1 not depending on n. Then if L−1 , we still have 2 n/ ln(n + 1) < L1 n Dm∗ ≤ max Dm ≤ AM,+ m∈Mn 1 n 1+β+ ≤ A L L n . 2 1 M,+ (ln(n + 1))2 In every case, there exists L > 0 only depending on constants in (SA) such that Dm∗ ≤ 1 Ln 1+β+ . Lemma A.5 Let (a, b) ∈ R2+ and (u, v) ∈ [1, ∞] such that 1/u + 1/v = 1. Then ab ≤ max {au ; bv } ≤ au + bv . Proof. By symmetry, we can assume au ≥ bv . Then b = (bv )1/v ≤ au/v = au−1 and so, ab ≤ aau−1 = au ≤ au + bv .
10math.ST
IEEE TRANSACTIONS ON SERVICE COMPUTING , VOL. , NO. , 2016 1 On Dynamic Job Ordering and Slot Configurations for Minimizing the Makespan Of Multiple MapReduce Jobs arXiv:1604.04471v1 [cs.DS] 15 Apr 2016 Wenhong Tian, Guangchun Luo, Ling Tian, and Aiguo Chen Abstract—MapReduce is a popular parallel computing paradigm for Big Data processing in clusters and data centers. It is observed that different job execution orders and MapReduce slot configurations for a MapReduce workload have significantly different performance with regarding to the makespan, total completion time, system utilization and other performance metrics. There are quite a few algorithms on minimizing makespan of multiple MapReduce jobs. However, these algorithms are heuristic or suboptimal. The best known algorithm for minimizing the makespan is 3-approximation by applying Johnson rule. In this paper, we propose an approach called UAAS algorithm to meet the conditions of classical Johnson model. Then we can still use Johnson model for an optimal solution. We explain how to adapt to Johnson model and provide a few key features of our proposed method. Index Terms—MapReduce; Hadoop; Batch Workload; Optimized Schedule; Minimized Makespan. F 1 I NTRODUCTION With the rapid increase in size and number of jobs that are being processed in the MapReduce framework, efficiently scheduling multiple jobs under this framework is becoming increasingly important. Job scheduling in MapReduce framework brings a new challenge to Cloud computing [1] such as minimizing the makespan, load balancing and reduce data skew etc., it has already received much attention. Originally, MapReduce was designed for periodically running large batch workloads with a FIFO (First-In-FirstOut) scheduler. As the number of users sharing the same MapReduce cluster increased, there are Capacity scheduler [11] and Hadoop Fair Scheduler (HFS) [7] which intend to support more efficient cluster sharing. There are also a few research prototypes of Hadoop schedulers that aim to optimize explicitly some given scheduling metrics, e.g., FLEX [8], ARIA [4]. A MapReduce simulator called SimMR [5] is also developed to • Prof. Tian is in the School of Information and Software Engineering, University of Electronic Science and Technology of China. E-mail: tian [email protected];This research is sponsored by the National Science Foundation of China with project ID 61450110440; • G.Luo and L. Tian and A. Chen are with the same University. simulate different workload and performance of MapReduce. Yao et al. [15] proposed a scheme which uses slot ratio between Map and Reduce tasks as a tunable knob for dynamically allocating slots. However, as pointed out in [1], the existing schedulers do not provide a support for minimizing the makespan for a set of jobs. Starfish project [9] proposes a workflow-aware scheduler that correlate data (block) placement with task scheduling to optimize the workflow completion time. Zhao et al. [16] propose a reference service framework for integrating scientific workflow management systems into various cloud platforms. Moseley et al. [10] formulate MapReduce scheduling as a generalized version of the classical two-stage flexible flow-shop problem with identical machines; they provide a 12-approximation algorithm for the offline problem of minimizing the total flow-time, which is the sum of the time between the arrival and the completion of each job. Zhu et al. [15] consider nonpreemptive case to propose 32 -approximation for offline scheduling regarding the makespan where they did not considering job ordering or applying Johnson model. In [1] and [2], the authors propose heuristics to minimize the makespan, the proposed algorithm called BalancedPools by considering two pools for a Hadoop cluster. Tang et al. [17] proposed a new algorithm called MK JR for minimizing the makespan. The works of [1] and [17] are closely related to our research in minimizing the makespan. However, our present work meets all the requirements of Johnson model and provide optimal solution to offline scheduling while Verma et al. [1] did not modify Johnson’s model and provided separating pools (called BalancedPools) for minimizing the makespan, and BalancedPools is a heuristic approach but not optimal in many cases. MK JR is a 3-approximation algorithm for minimizing the makespan. There is still room for improving the performance of MapReduce regarding minimize the makespan. reduce tasks all finish). The makespan for the workload {J1 , J2 , . . . , Jn } is defined as Cmax =maxi∈[n] ci . We denote |JiM | and |JiR | as the number of tasks in Ji ’s map stage and reduce stage, respectively. R Let tM i,j and ti,j denote the execution time of Ji ’s jth map task and jth reduce task, respectively. Let TiM and TiR denote the execution time of Ji ’s map and reduce stage respectively. Ji requests SiM × SiR MapReduce slots and has Map and Reduce stage durations (TiM , TiR ) respectively. The system scheduler can change a job’s MapReduce slots allocation depending on available resources. We aim to determine an order (a schedule) of execution of jobs Ji ∈ J such that the makespan of all jobs is minimized. Let us set the actually R allocated MapReduce slots for job Ji as |AM i |×|Ai |, the max available MapReduce slots in the Hadoop cluster is |SiM | × |SiR |. The original Johnson Rule [3] considers that There are n items which must go through one production stage or machine and then a second one. There is only one machine for each stage. At most one item can be on a machine at a given time. We consider MapReduce as two non-overlapped stages, i.e., map and reduce stage respectively, the same as in [1][17]. Also we classify all jobs into Map type and Reduce type. For Map type jobs, their map durations should be smaller than reduce durations while Reduce type jobs have longer reduce durations than map durations. Based on these assumptions and Johnson algorithm [1], we can obtain the optimal makespan of a set of jobs as follows: In summary, there is only a small number of scheduling algorithms with regarding to minimize the makespan of a set of MapReduce jobs in open literature and still much room for improving the performance of MapReduce regarding minimizing the makespan. Therefore, we propose new modeling and scheduling approaches for offline jobs in the following sections. The major contributions of this paper include: 1) provided a new modeling and scheduling approach for multiple MapReduce jobs; 2) proposed an optimal algorithm for offline scheduling considering Map and Reduce stages by adapting to classical Johnson’s model; 3) introduced a few key features (theorems) of our proposed algorithm (UAAS). 2 P ROBLEM F ORMULATION Cmax = n X TiR + maxnu=1 Ku (1) i=1 We consider the following problem as in [1] [17]. Let J= {J1 , J2 , . . . , Jn } be a set of n MapReduce jobs with no data dependencies between them. These jobs can be executed in any order. A MapReduce job Ji consists of two stages, a map stage M and reduce stage R. Each stage consists of a number of tasks. The workload is executed on a MapReduce cluster under FIFO scheduling by default, consisting of a set of (map and reduce) slots. Let S M and S R denote the set of map slots and reduce slots configured by MapReduce administrator (i.e., S=S M U S R ), so that the number of map slots and reduce slots are |S M | and |S R |, correspondingly. Let φ denote the job submission order for a MapReduce workload. We consider the offline case in which all the jobs are available at time 0. Let ci denote the completion time of Ji (i.e., the time when Ji ’s where Ku = u X i=1 TiM − u−1 X TiR . (2) i=1 Observation 1. If each job utilizes either all map or all reduce slots during its processing, there is a perfect match between the assumptions of the classic Johnson algorithm for twostage production system and MapReduce job processing, then Johnson’s algorithm can be applied to find optimal solution for minimizing the makespan of a set of MapReduce jobs. Based on our observations and intensive real test experiences, we propose a new method called UAAS (Utilizing All Available Slots) algorithm, with the pesudocode given in Algorithm 2.1. The 2 following theorem is the key strategy for our results. Theorem 1. Based on available MapReduce slots in the system, the scheduler can increase or decrease the number of MapReduce slots to the job to meet the requirements of JohnSon Rule, the result obtained by UAAS algorithm following Johnson rule is optimal regarding to minimize the makespan. input : the total number of MapReduce slots (|S M |, |S R |) for a Hadoop cluster, estimated all Jobs’ Map and Reduce durations (TiM , TiR ) [1] by utilizing all available Map and Reduce slots for each job in the cluster output: the scheduled jobs, the makespan Cmax 1 List the Map and Reduce’s durations in two vertical columns (implemented in a list) ; 2 for all Ji ∈ J do 3 Find the shortest one among all durations (min (TiM , TiR )); 4 In case of ties, for the sake of simplicity, order the item with the smallest subscript first. In case of a tie between Map and Reduce, order the item according to the Map ; 5 IF it is the first job of Map type, place the corresponding item at the first place ; 6 ELSE it is the first job of Reduce type, place the corresponding item at the last place ; 7 IF it is Map type job (and not the first job), place the corresponding item right next to the previous job (i.e., in non-decreasing order of Map durations) ; 8 ELSE it is Reduce type job (and not the first job), place the corresponding item left next to the previous job (i.e., in non-increasing order of Reduce durations) ; 9 Remove both durations for that job ; 10 Repeat these steps on the remaining set of jobs 11 end 12 Compute the makespan (Cmax ) Algorithm 2.1: Utilizing All Available Slots (UAAS) algorithm Proof: The original Johnson Rule [3] considers that ”there are n items which must go through one production stage or machine and then a second one. There is only one machine for each stage. At most one item can be on a machine at a given time”. To adapt the MapReduce model, we treat the Map and Reduce stage resources as a whole (like a single machine), i.e., to represent the resources as MapReduce slots in the whole in our algorithm UAAS. USSA algorithm allocates all available MapReduce slots to each job at each stage, so that UAAS meets all requirements of Johnson Rule. Since Johnson Rule obtains optimal results with regarding to minimize the makespan (the proof is provided in [3]), and our UAAS algorithm meets all requirements of Johnson Rule, therefore UAAS obtains the optimal result with regard to minimizing the makespan.  map   J2   1   4   J5   2 J3   3   4   J1   J4   reduce   30X30   5   6   20X20   10X10   30   30   20X20   5 10   15   4   Time  (in  units)   20   25   30   35   40   45   BalancedPools Algorithm [1]: is way to minimize the makespan for offline scheduling proposed in [1], it partitions the Hadoop cluster into two balanced pools and then allocated each job to a suitable pool to minimize the makespan. Observation 2. BalancedPool Algorithm does not meet the requirement of Johnson model but just order the job by Johnson rule and is a heuristic algorithm with computational complexity of O(n2 lognlogP ) where n is the number of jobs and P is the number of MapReduce slots. Fig. 1. Five MapReduce Jobs Execution in One Cluster by MK JR 3 T HREE A LGORITHMS C OMPARED In this section, we compare UAAS algorithm with two best known algorithms (BalancedPools and MK JR) regarding to minimize the makespan of a set of offline MapReduce Jobs. MK JR algorithm [17]: Divide the jobs set J into 3 5 10   15   m5   m2   m1   m4   20   25   30   MapReduce slots. There are five jobs, among them, J1 ,J2 and J5 require 30×30 MapReduce slots while J3 and J4 require 20×20 MapReduce slots. The total makespan by MK JR algorithm is 47 units, visualized in Fig.1. However, if we allow that any job can use all available MapReduce slots in the system when execution (this can be implemented easily in Hadoop, for example by splitting the input files based on available number MapReduce slots), the result is very different from both MK JR and BalancedPools algorithms. For the same example, in UAAS algorithm job J3 and J4 can use all available 30 × 30 MapReduce slots, then J3 will have Map and Reduce durations (20, 8 3 ), J4 will have Map and Reduce durations (4, 20) respectively. Therefore the total makespan will be 35 23 as shown in Fig. 2, where X1 =1. This result is smaller (about 31.76%) than the result (47 units) obtained by MK JR in [1]. The makespan of Pool1 and Pool2 is 39 and 40 time units respectively by applying BalancedPools algorithm, where Pool1 has configuration of 10×10 MapReduce slots and Pool2 has configuration of 20×20 MapReduce slots, and J1 ,J2 and J5 (short jobs) are with Pool1 while J2 and J3 (longer jobs) are with Pool2. Therefore, the UAAS result is about 12.14% smaller than the result (40 time units) obtained by BalancedPools algorithm. 35   map   m3   reduce   Map   1 2   X1     4   Reduce   20   4   4   3   5   20   8/3   r2   r5   r1   r4   r3   5me  (in  units)     Fig. 2. New Result of Five MapReduce Jobs Execution by UAAS TABLE 1 The example of 5 jobs Job ID J1 J2 J3 J4 J5 SrM 30 30 20 20 30 SrR 30 30 20 20 30 TiM 4 1 30 6 2 TiR 5 4 4 30 3 two disjoint sub-sets JA and JB . Set JA consists of those jobs Ji for which TiM < TiR . Set JB contains the remaining jobs. Sequence jobs in JA in non-decreasing order of TiM and those in JB in non-increasing order of TiR . The job order is obtained by appending the sorted set JB to the end of sorted set JA . Observation 3. MK JR algorithm does not meet the requirement of Johnson model but just order the job by Johnson rule after estimating the map and reduce durations of each job. Theorem 2. MK JR is an 3-approximation algorithm for the makespan optimization in general case. Proof: Applying the intermediate results from [17] (Equ. (8) in supplementary material for proof of THOREM 1 in [17]), we have The reason that BalancedPools and MK JR algorithms do not meet the requirement of Johnson model lies that they do not utilize all available MapReduce slots for each job in general case, though they estimate the job ordering by Johnson rule. Therefore, unlike UAAS algorithm, BalancedPools and MK JR algorithms are suboptimal. ˆ + maxnk=1 Cmax ≤ (Cmax k X n ˆ tM i + maxk=1 i=1 k X tˆR i ) i=1 (3) ˆ R where and ti is the estimated map and reduce duration for job Ji , respectively. Let us define ˆ tM i σ= maxn k=1 n ˆ M i=1 ti +maxk=1 Pk ˆ Cmax ˆR i=1 ti Pk , the same as in [17], ˆ is the theoretical optimal makespan where Cmax given by Equ. (1)-(2). Considering the worst case that there are two jobs J1 and J2 , T1M =1, T2M =C0 , and T1R =C0 , T2R =1; In this case, the optimal order Pk ˆ Pk ˆR n is J1 -J2 and maxnk=1 i=1 tM i =maxk=1 i=1 ti =C0 . P k ˆ =C +2 by M ˆ =C opt , C opt = maxn And Cmax t 0 max max k=1 i=1 i 0 +1 UAAS algorithm, we have σ= 2C C0 +2 ≤ 2. Therefore Table 1 shows an example from [2], where SrM and SrR is the requested number of slots for map and reduce stage respectively for job Ji . Example 1. Consider a scenario shown in Table 1 from [1], where the cluster has a configuration of 30×30 4 the approximation ratio of MK JR is 0 +1 C0 + 2 + 2C Cmax (M K JR) C0 + 2 + σ C0 +2 = = ≈3 opt C0 + 2 C0 + 2 Cmax (4)  It worths notice that the worst case is applied for approximation ratio. (1+σ)-appromixation algorithm where σ ∈ [0, 2], should be called 3approximation algorithm since σ is 3 in the worst case. Based on previous results, we have the following observation. Observation 4. BalancedPools and MK JR algorithms are suboptimal regarding to minimizing the makespan, they may not have the minimum makespan for a set of jobs; applying Theorem 1 to single Hadoop cluster always has optimal total makespan for a set of jobs. Theorem 3. Given a homogeneous environment where the Hadoop configurations of slave nodes are identical, the job order φ1 produced by UAAS for a batch of jobs are independent of the number of slave nodes (N ) but depends on the total number of available MapReduce slots (|S M |, |S R |), and is stable with regarding to the change of the total number of slave nodes. Proof: Let us set the execution durations of map and reduce stages for a given job Ji under a given configuration of Hadoop cluster with |S M | × |S R | MapReduce slots, as TiM and TiR , respectively. If the MapReduce slots configuration of Hadoop cluster |S M | is changed to |SxM |×|SxR | and set ρ0 = |S M . Applying x | UAAS algorithm, the execution duration of map and reduce stage for a given job Ji will change to 0 0 TiM and TiR . And we have 0 TiM = TiM 0 TiR = TiR |S M | = TiM ρ0 |SxM | (5) |S R | = TiR ρ0 |SxR | (6) This means execution duration of map and reduce stage for each job will change proportional to ρ0 but their relative relationship (ordering by their durations) will not change. Therefore the job order of UAAS is stable with regarding to the change of the total number of slave nodes.  Observation 5. The the job ordering of MK JR and BalancedPools is not stable when the total number of slave nodes changes. Let us consider the example given in [17]. There is a Hadoop cluster with 5 nodes, each configured with 2 map and 2 reduce slots. Let J1 be defined as follows: Map stage duration is 9 and requires 10 map slots. Reduce stage duration is 10 and requires 1 reduce slot. Let J2 be defined as follows: Map stage duration is 11 and requires 8 map slots and reduce stage duration is 15 and requires 1 reduce slot. In this case, the optimal job scheduling order by UAAS is J2 -J1 , and their corresponding map and reduce duration is (8.8,1.5) and (9,1) respectively by utilizing all 10 MapReduce slots in each stage, with the makespan of 18.8. The job order produced by MK JR is J1 -J2 with the makespan of 35, which is about 86.17% larger than optimal result. Now, if one node fails, then there are only 4 nodes left with 8 map and 8 reduce tasks available in the cluster. In this case, the optimal job scheduling by UAAS is still J2 -J1 , however, their corresponding map and reduce duration is (11.25,1.25) and (11, 1.875) respectively by utilizing all 8 MapReduce slots in each stage, with makespan of 23.5. The job order generated by MK JR keeps the same, i.e., J1 -J2 , with makespan of 43, about 82.97% larger than the optimal. Notice that BalancedPools algorithm has following results. When there are 5 nodes, J1 with duration (9,10) will be put into Pool1 with 2 nodes of 4 MapReduce slots and J2 will be allocated to Pool2 with 3 nodes of 6 MapReduce slots. Then J1 will have duration (22.5, 10) and J2 will have duration (14.67,15). If one node fail, J1 still with Pool1 and J2 with Pool2; J1 and J2 will have duration (32.5, 10) and (37, 10) respectively. In either case, BalancedPools is far from optimal results. Theorem 4. Let ρ be the ratio of map slots to M | reduce slots, i.e., ρ= |S . The optimal configu|S R | ration of ρ for makespan Cmax depends on the total number of slots (|S M |, |S R |), MapReduce workload as well as its job submission order φ. Proof: 5 [4] Cmax = n max k=1 k X n TiM + max i=1 i=k n X TiR f rom[17] M = [5] i=k R k |Ji | n |Ji | [6] 1 XX 1 XX tM + tR max( M i,j i,j ) R k=1 |S | |S | i=1 j=1 j=1 n i=k = 1 1 n max( |S R | k=1 ρ M k |J i | X X i=1 j=1 tM i,j + R n |J i | X X [7] tR i,j ) (7) i=k j=1 [8] This means the optimal configuration of ρ for makespan Cmax depends on the total number of R slots (|S M |,|S R |) MapReduce workload (tM i,j , ti,j ) as well as its job submission order φ(={1,..n}).  When the workload and job order are fixed, it is obvious that larger number of total number of MapReduce slots will lead to smaller value of Cmax . This is consistent with Theorem 1 and UAAS algorithm to utilize all available MapReduce slots (|S M |, |S R |). 4 [9] [10] [11] [12] C ONCLUSION Observing that there are quite a few algorithms on minimizing makespan of multiple MapReduce jobs and these algorithms are heuristic or suboptimal. In this paper, we proposed an optimal approach called UAAS algorithm to minimize the makespan of a set of MapReduce jobs. The proposed algorithm meets the requirements of classical Johnson algorithm and therefore is optimal with regarding to the makespan. We also conducted extensive tests in real Hadoop environment to validate our theoretical results by benchmarks provided in [13][14]. Because this is a short paper, we do not provide the test results yet. There are future research directions such as considering minimizing the makespan of online MapReduce jobs and minimizing the total completion time and total flow time of a set of Mapreduce jobs. [13] [14] [15] [16] [17] R EFERENCES [1] [2] [3] A. Verma, L. Cherkasova, R. H. Campbell, Orchestrating an Ensemble of MapReduce Jobs for Minimizing Their Makespan, IEEE Transactions on Dependable and Secure Computing, April 2013 (online version). A. Verma, L. Cherkasova, and R. H. Campbell, Two Sides of a Coin: Optimizing the Schedule of MapReduce Jobs to Minimize Their Makespan and Improve Cluster Performance. MASCOTS, page 11-18. IEEE Computer Society, (2012) S. Johnson, Optimal Two-and Three-Stage Production Schedules with Setup Times Included,Naval Res. Log. Quart., 1954. 6 A. Verma, L. Cherkasova, and R. H. Campbell, ARIA: Automatic Resource Inference and Allocation for MapReduce Environments,in Proc. of ICAC,pp.235-244, 2011,Germany. A. Verma, L. Cherkasova, and R. H. Campbell, Play It Again, SimMR! in Proc. of Intl. IEEE Cluster’2011, pp. 253261, IEEE Computer Society Washington, DC, USA, 2011. M. Garey and D. Johnson, Computers and Intractability: A Guide to the Theory of NP-completeness. WH Freeman & Co., 1979. M. Zaharia, D. Borthakur, J. Sen Sarma, K. Elmeleegy, S. Shenker, and I. Stoica, “Delay scheduling: A simple technique for achieving locality and fairness in cluster scheduling,in Proc. of EuroSys. ACM, 2010, pp. 265-278. J. Wolf and et al, FLEX: A Slot Allocation Scheduling Optimizer for MapReduce Workloads, ACM/IFIP/USENIX Intl. Middleware Conference, Lecture Notes in Computer Science Volume 6452, pp.1-20, 2010. H. Herodotou and S. Babu, Profiling, What-if Analysis, and Costbased Optimization of MapReduce Programs. in Proc. of the VLDB Endowment, pp.1111-1122, Vol. 4, No. 11, 2011. B. Moseley, A. Dasgupta, R. Kumar, and T.Sarl’s, On scheduling in map-reduce and flow-shops, in Proc. of SPAA, pp.289-298, ACM New York, NY, USA, 2011. Capacity Scheduler Guide. [Online]. Available: http://hadoop.apache.org/common/docs/r0.20.1/ capacity scheduler.html Y. Zheng, N. B. Shroff, P. Sinha, A New Analytical Technique for Designing Provably Efficient MapReduce Schedulers, In the Proceedings of INFOCOM 2013, pp.1600-1608, 14-19 April 2013,Turin. Wordcount, http://www.cs.cornell.edu/home/llee/data/simple/ http://sortbenchmark.org/YahooHadoop.pdf. Y. Zhu, Y. Jiang, W. Wu, L. Ding, A. Teredesai, D. Li, W. Lee, Minimizing makespan and total completion time in MapReduce-like systems, In Proceedings of INFOCOM 2014, pp.2166-2174, April 27 2014-May 2 2014, Toronto, ON. Yong Zhao ;Youfu Li ; I. Raicu ; Shiyong Lu ; Cui Lin ; Yanzhe Zhang ; Wenhong Tian ; Ruini Xue, A Service Framework for Scientific Workflow Management in the Cloud, IEEE Trans. Services Computing 8(6): 930-944 (2015). Shanjiang Tang, Bu-Sung Lee, Bingsheng He, Dynamic Job Ordering and Slot Configurations for mapreduce Workloads, IEEE Trans. Services Computing 9(1): 4-17 (2016).
8cs.DS
arXiv:1711.11117v1 [cs.CV] 29 Nov 2017 Towards Alzheimer’s Disease Classification through Transfer Learning 1st Marcia Hon 2nd Naimul Mefraz Khan Data Science Ryerson University Toronto, ON [email protected] Department of Electrical & Computer Engineering Ryerson University Toronto, ON [email protected] Abstract—Detection of Alzheimer’s Disease (AD) from neuroimaging data such as MRI through machine learning have been a subject of intense research in recent years. Recent success of deep learning in computer vision have progressed such research further. However, common limitations with such algorithms are reliance on a large number of training images, and requirement of careful optimization of the architecture of deep networks. In this paper, we attempt solving these issues with transfer learning, where state-of-the-art architectures such as VGG and Inception are initialized with pre-trained weights from large benchmark datasets consisting of natural images, and the fully-connected layer is re-trained with only a small number of MRI images. We employ image entropy to select the most informative slices for training. Through experimentation on the OASIS MRI dataset, we show that with training size almost 10 times smaller than the state-of-the-art, we reach comparable or even better performance than current deep-learning based methods. Index Terms—Alzheimer’s, Deep Learning, Transfer Learning, Entropy I. I NTRODUCTION Alzheimers Disease (AD) is a neurodegenerative disease causing dementia in elderly population. It is predicted that one out of every 85 people will be affected by AD by 2050 [1]. Early diagnosis of AD can be achieved through automated analysis of MRI images with machine learning. It has been shown recently that in some cases, machine learning algorithms can predict AD better than clinicians [2], making it an important field of research for computer-aided diagnosis. While statistical machine learning methods such as Support Vector Machine (SVM) [3] have shown early success in automated detection of AD, recently deep learning methods such as Convolutional Neural Networks (CNN) and sparse autoencoders have outperformed statistical methods. However, the existing deep learning methods train deep architectures from scratch, which has a few limitations [4], [5]: 1) properly training a deep learning network requires a huge amount of annotated training data, which can be a problem especially for the medical imaging field where physicianannotated data can be expensive, and protected from crossinstitutional use due to ethical reasons; 2) training a deep network with large number of images require huge amount of computational resources; and 3) deep network training requires careful and tedious tuning of many parameters, sub-optimal tuning of which can result in overfitting/underfitting, and, in turns, result in poor performance. An attractive alternative to training from scratch is finetuning a deep network (especially CNN) through transfer learning [6]. In popular computer vision domains such as object recognition, trained CNNs are carefully built using large-scale datasets such as ImageNet [7]. Through Transfer Learning , these trained networks can be used with smaller datasets with only fine-tuning the final fully-connected layers of CNN. Transfer learning has been proven to be robust even for cross-domain application, such as networks trained on natural images used with medical images [8]. In this paper, we investigate the adaptation of two popular CNN architectures into an AD diagnosis problem through transfer learning, namely VGG16 and Inception. These two architectures are previous winners of the ImageNet Large Scale Visual Recognition Challenge (ILSVRC), a yearly competition that evaluates object detection in images [7]. With the two winners being open source, the architectures as well as the pre-trained weights are readily available. Although the architectures are trained on a different domain (natural images of ImageNet as opposed to MRI images in our paper), we show that the pre-trained weights generalize very well for AD diagnosis when the training data is picked intelligently. Since our target was to test the robustness of transfer learning on a small training set, merely choosing training data at random may not provide us with a dataset representing enough structural variations in MRI. Instead, we picked the training data that would provide the most amount of information through image entropy. We show that through intelligent training selection and transfer learning, we can achieve comparable, or even better performance than training a deep network from scratch with minimal parameter optimization. II. R ELATED W ORKS Classical machine learning methods such as SVM and feedforward neural networks have been applied successfully to diagnose AD from structural MRI images [3], [9]. One such recent method is [9], where a dual-tree complex wavelet transform is used to extract features, and a feed-forward neural network is used to classify images. Elaborate discussion and comparative results with other popular classical methods can also be found in [9]. Recently, deep learning methods have outpeformed classical methods by a large margin. A combination of patches extracted from an autoencoder followed by convolutional layers for feature extraction were used in [10]. The method was further improved by using 3D convolution in [11]. Stacked autoencoders followed by a softmax layer for classification was used in [12]. Popular CNN architectures such as LeNet and the first Inception model were used in [13]. While these deep learning methods provide good accuracy results, as we show in the experiments, due to our intelligent training data selection and use of transfer learning, we get comparable, or even better accuracy while using only a fraction of the training data. Transfer learning or fine-tuning has also been explored in medical imaging. [14] provides an in-depth discussion and comparative results of training from scratch vs fine-tuning on some medical applications. They show that in most cases, finetuning outperforms training from scratch. Fine-tuned CNNs have been used to localize planes in ultrasound images [15], classify interstitial lung diseases [8], and retrieve missing or noisy plane views in cardiac imaging [16]. All these methods prove that employing transfer learning in the medical imaging domain has tremendous value, and has the potential to achieve high accuracy in AD detection with smaller training dataset when compared to training from scratch. III. M ETHODOLOGY A. Convolutional Neural Networks and Transfer Learning The core of Convolutional Neural Networks (CNN) are convolutional layers which can extract local features (e.g. edges) across an input image through convolution. Each node in a convolutional layer is connected to a small subset of spatially connected neurons. To reduce computational complexity, a max pooling layer follows convolutional layers, which reduces the size of feature maps by selecting the maximum feature response in a local neighborhood. Pairs of convolutional and pooling layers are followed by a number of fully-connected layers, where a neuron in one layer has connections to all activations in the previous layer. Fullyconnected layers help learning non-linear relationship among the local features extracted by convolutional layers. Finally, a soft-max layer follows the fully-connected layers, which normalizes the outputs to desired levels. CNNs are trained with the back-propagation algorithm, where in each iteration, weights associated with the neurons in the convolutional layers are updated in a way that minimizes a cost function. When training from scratch, the weights are typically initialized randomly, drawing from a normal distribution. However, with a small training dataset, this may result in the cost function getting stuck in a local minima, which may result in overfitting/underfitting. A better alternative in such case is transfer learning, where pre-trained weights from the same architecture, but on a different larger dataset from the same/different domain is used to initialize the network layers. Only the last fully-connected layer is re-trained with the training data. This not only provides us with a robust set of pre-trained weights to work with, it gives us the opportunity to employ proven network architectures in our problem. The two popular architectures that we will use in this paper are: 1) VGG16: VGG16 is a 16-layer network built by Oxfords Visual Geometry Group (VGG) [17]. It participated in the ImageNet competition in ILSVRC-2014. One of the main reasons that VGG16 won the competition, is that it is one of the first architectures to explore network depth by pushing to 16-19 layers and using very small (3x3) convolution filters. 2) Inception: The Inception architecture is a variant of deep learning architecture built by Google. Throughout the years, there have been different iterations. Inception V4, discussed in this article, was introduced in [18]. The Inceptions’ breakthrough is in the realization that non-linear functions can be learned by changing how convolutional layers are connected. Accordingly, the fully-connected layer is discarded in preference of a global average pooling that averages the feature maps and then connect with a softmax layer for classification. Thus, there are less parameters, and as a result, less overfitting. B. Most informative training data selection While transfer learning provides an opportunity to use smaller set of training data, choosing the best possible data for training is still critical to the success of the overall method. Typically, from a 3D MRI scan, we have a large number of images that we can choose from. In most recent methods, the images to be used for training are extracted at random. Instead, in our porposed method, we extract the most informative slices to train the network. For this, we calculate the image entropy of each slice. In general, for a set of M symbols with probabilities p1 , p2 , . . . , pM the entropy can be calculated as follows [19]: H=− M ∑ pi log pi . (1) i=1 For an image (a single slice), the entropy can be similarly calculated from the histogram [19]. The entropy provides a measure of variation in a slice. Hence, if we sort the slices in terms of entropy in descending order, the slices with the highest entropy values can be considered as the most informative images, and using these images for training will provide robustness. IV. E XPERIMENTAL R ESULTS In this section, we provide experimental results on the two aforementioned models. We implemented our deep learning methods using Keras with a TensorFlow backend, while the training data selection method described in Section III-B was implemented in MATLAB. Architecture models for TensorFlow and pre-trained weights were downloaded from open source repositories of the models 1 . Our target was to differentiate AD patients from Healthy Control (HC) through analyzing MRI scan data through the CNN architectures. A. Dataset (a) (b) Fig. 1. Images from the OASIS dataset (a) AD. (b) HC. We used structural MRI data from the Open Access Series of Imaging Studies (OASIS), accessible at (http://www.oasisbrains.org) [20]. Samples of MR brain images from the AD and the HC group are shown in Figure 1. OASIS provides two types of data: cross-sectional and longitudinal. Since our target was to simply differentiate between AD and HC patients through the images, we used crosssectional data. The dataset consists of 416 subjects whose ages are between 18 and 96. In our experiments, we randomly picked 200 subjects, 100 of whom were picked from the AD group, while the other 100 from the HC group. The grouping was determined by the Clinical Dementia Rating (CRD) variable ranging from 0 to 2. The assumption is that a 0 implies HC and those greater than 0 are AD. To test the generalization power of transfer learning, we only used a limited number of images from these scans to train our networks, especially when compared to other CNNbased Alzheimer’s detection algorithms (further comparison in Section IV-C). We used our entropy-based sorting mechanism to pick the most informative 32 images from the axial plane of each 3D scan. That resulted in a total of 6400 training images, 3200 of which were AD and the other 3200 were HC. To be compatible with the pre-trained models of VGG16 and Inception V4, the images were resized to be 150X150 for VGG16, and 299X299 for Inception V4. B. Accuracy results 5-fold cross-validation was used to obtain the results, with an 80% - 20% split between training and testing. To test the 1 https://github.com/flyyufelix/cnn finetune power of transfer learning, we also trained a VGG16 network from scratch for comparison. For the transfer learning models, pre-trained network weights from ImageNet were obtained. For VGG16, 100 epochs were used with a batch size of 40. For Inception V4, 100 epochs with a batch size of 8 was used. For the VGG16 model (both from scratch and with transfer learning), the RMSProp optimization model was used, which uses an adaptive learning rate. For the Inception V4 model, stochastic gradient descent optimization with a learning rate of 0.0001 was used 2 . These hyperparameter values were the recommended settings from the respective methods. There is a possibility that a hyperparameter search method such as grid search will result in further improvement, but as we see from the reported results below, the recommended settings already provide excellent results. Since grid search is computationally very expensive, we plan to explore this in future with cloud computing or additional hardware resources. TABLE I T ESTED MODELS AND CORRESPONDING AVERAGE ACCURACY FROM 5- FOLD CROSS - VALIDATION . S TANDARD DEVIATION OVER THE 5 FOLDS IN BRACKETS . Model VGG16 (from scratch) VGG16 (transfer learning) Inception V4 (transfer learning) Avg. Acc. (st. dev.) (%) 74.12 (1.55) 92.3 (2.42) 96.25 (1.2) Table I shows the accuracy results (with standard deviation) for the three models. As can be seen, VGG16, when trained from scratch, results in poor performance. This can be attributed towards the small training size that we used, which can result in overfitting/underfitting. However, using pre-trained model for transfer learning, the accuracy significantly increases. Finally, using Inception V4 with transfer learning results in high accuracy. This signifies the value of transfer learning, where using even a relatively smaller training dataset can result in an excellent automated system for AD detection. C. Comparison with other methods In this section, we discuss the results in relation to other recent methods, both in terms of accuracy and training size. It is important to note that while the other methods may have used different datasets and/or different experimental setups, the results are still comparable, since all the methods discussed below report the results with structural MRI images, which have high level of similarity across datasets, especially when the images have been preprocessed and the brain have been registered and segmented in the published datasets already. We compare our results with five recent methods, four of which are deep learning-based. For all these methods, the training size was calculated based on the reported sample size and the cross-validation/training-testing split (e.g. in our 2 Models, weights, dataset, and code available at https://github.com/ marciahon29/Ryerson MRP method, there are total 6,400 images; a 5-fold cross-validation/ 80% - 20% split therefore results in a training size of 5,120). TABLE II C OMPARISON WITH THE STATE - OF - THE - ART IN AND TRAINING SIZE . Model Wavelet + NN [9] DeepAD (Inception) [13] 3DConv [11] Sparse autoencoder + conv [10] Stacked autoencoders [12] Inception V4 (transfer learning) TERMS OF ACCURACY Average Acc.(%) 90.06 98.84 95.39 94.74 87.76 96.25 Training Size (# of Images) 3,629 46,751 117,708 103,683 21,726 5,120 As can be seen from Table II, our method outperforms every method except [13] in terms of accuracy. The most significant effect of transfer learning can be seen when comparing the training sizes. As we can see, only [9] used a smaller training set than ours, which is not a deep learning method, and therefore, does not require a large training set. While comparing with the deep learning methods, we can see that our training dataset is considerably smaller. Especially if we compare the training sizes between [13] and ours, both of which use the Inception architecture, we can see that our accuracy results are very close to theirs despite using a training size almost 10 times smaller (5,120 vs 46,751). This is due to the fact that we not only use transfer learning, but also employ an intelligent entropy-based method to pick the most informative training images. The combination of these two techniques results in very good performance with a comparatively smaller training dataset. A smaller training dataset is significant because it frees the method from dependence on large tediously annotated training data, and also, improves the training computational time significantly. V. C ONCLUSION In this paper, we propose a transfer learning-based method to detect AD from structural MRI images. We test two popular architectures, namely VGG16 and Inception V4. Through pre-trained weights from ImageNet and fine-tuning, we can only use a small number of training images to obtain highly accurate results. Moreover, we employ an intelligent entropybased technique to select the training dataset in a way that represents the most amount of information within a small set. We test our models on images from the OASIS brain imaging dataset, where 6,400 images extracted from MRI scans of 200 subjects are used to train the models. As we show, our method provides performance comparable to the state-of-theart despite having a training set many times smaller. In future, we plan to test the models with other datasets, and employ grid search to optimize the hyperparameters of the proposed models further to achieve better results. We also plan to test the robustness of our models for three-way classification with AD, HC, and Mild Cognitive Impairment (MCI). Keeping up with the spirit of reproducible research, all our models, dataset, and code can be accessed through the repository at: https://github.com/marciahon29/Ryerson MRP . R EFERENCES [1] R. Brookmeyer, E. Johnson, K. Ziegler-Graham, and H. M. Arrighi, “Forecasting the global burden of alzheimers disease,” Alzheimer’s & dementia, vol. 3, no. 3, pp. 186–191, 2007. [2] S. Klöppel, C. M. Stonnington, J. Barnes, F. Chen, C. Chu, C. D. Good, I. Mader, L. A. Mitchell, A. C. Patel, C. C. Roberts et al., “Accuracy of dementia diagnosisa direct comparison between radiologists and a computerized method,” Brain, vol. 131, no. 11, pp. 2969–2974, 2008. [3] C. Plant, S. J. Teipel, A. Oswald, C. Böhm, T. Meindl, J. MouraoMiranda, A. W. Bokde, H. Hampel, and M. Ewers, “Automated detection of brain atrophy patterns based on mri for the prediction of alzheimer’s disease,” Neuroimage, vol. 50, no. 1, pp. 162–174, 2010. [4] N. Tajbakhsh, J. Y. Shin, S. R. Gurudu, R. T. Hurst, C. B. Kendall, M. B. Gotway, and J. Liang, “Convolutional neural networks for medical image analysis: Full training or fine tuning?” IEEE transactions on medical imaging, vol. 35, no. 5, pp. 1299–1312, 2016. [5] D. Erhan, P.-A. Manzagol, Y. Bengio, S. Bengio, and P. Vincent, “The difficulty of training deep architectures and the effect of unsupervised pre-training,” in Artificial Intelligence and Statistics, 2009, pp. 153–160. [6] J. Yosinski, J. Clune, Y. Bengio, and H. Lipson, “How transferable are features in deep neural networks?” in Advances in neural information processing systems, 2014, pp. 3320–3328. [7] O. Russakovsky, J. Deng, H. Su, J. Krause, S. Satheesh, S. Ma, Z. Huang, A. Karpathy, A. Khosla, M. Bernstein et al., “Imagenet large scale visual recognition challenge,” International Journal of Computer Vision, vol. 115, no. 3, pp. 211–252, 2015. [8] M. Gao, U. Bagci, L. Lu, A. Wu, M. Buty, H.-C. Shin, H. Roth, G. Z. Papadakis, A. Depeursinge, R. M. Summers et al., “Holistic classification of ct attenuation patterns for interstitial lung diseases via deep convolutional neural networks,” Computer Methods in Biomechanics and Biomedical Engineering: Imaging & Visualization, pp. 1–6, 2016. [9] D. Jha, J.-I. Kim, and G.-R. Kwon, “Diagnosis of alzheimers disease using dual-tree complex wavelet transform, pca, and feed-forward neural network,” Journal of Healthcare Engineering, vol. 2017, 2017. [10] A. Gupta, M. Ayhan, and A. Maida, “Natural image bases to represent neuroimaging data,” in International Conference on Machine Learning, 2013, pp. 987–994. [11] A. Payan and G. Montana, “Predicting alzheimer’s disease: a neuroimaging study with 3d convolutional neural networks,” arXiv preprint arXiv:1502.02506, 2015. [12] S. Liu, S. Liu, W. Cai, S. Pujol, R. Kikinis, and D. Feng, “Early diagnosis of alzheimer’s disease with deep learning,” in Biomedical Imaging (ISBI), 2014 IEEE 11th International Symposium on. IEEE, 2014, pp. 1015–1018. [13] S. Sarraf, G. Tofighi et al., “Deepad: Alzheimer s disease classification via deep convolutional neural networks using mri and fmri,” bioRxiv, p. 070441, 2016. [14] N. Tajbakhsh, J. Y. Shin, S. R. Gurudu, R. T. Hurst, C. B. Kendall, M. B. Gotway, and J. Liang, “Convolutional neural networks for medical image analysis: Full training or fine tuning?” IEEE transactions on medical imaging, vol. 35, no. 5, pp. 1299–1312, 2016. [15] H. Chen, D. Ni, J. Qin, S. Li, X. Yang, T. Wang, and P. A. Heng, “Standard plane localization in fetal ultrasound via domain transferred deep neural networks,” IEEE journal of biomedical and health informatics, vol. 19, no. 5, pp. 1627–1636, 2015. [16] J. Margeta, A. Criminisi, R. Cabrera Lozoya, D. C. Lee, and N. Ayache, “Fine-tuned convolutional neural nets for cardiac mri acquisition plane recognition,” Computer Methods in Biomechanics and Biomedical Engineering: Imaging & Visualization, vol. 5, no. 5, pp. 339–349, 2017. [17] K. Simonyan and A. Zisserman, “Very deep convolutional networks for large-scale image recognition,” arXiv preprint arXiv:1409.1556, 2014. [18] C. Szegedy, S. Ioffe, V. Vanhoucke, and A. A. Alemi, “Inception-v4, inception-resnet and the impact of residual connections on learning.” in AAAI, 2017, pp. 4278–4284. [19] C. Studholme, D. L. Hill, and D. J. Hawkes, “An overlap invariant entropy measure of 3d medical image alignment,” Pattern recognition, vol. 32, no. 1, pp. 71–86, 1999. [20] D. S. Marcus, A. F. Fotenos, J. G. Csernansky, J. C. Morris, and R. L. Buckner, “Open access series of imaging studies: longitudinal mri data in nondemented and demented older adults,” Journal of cognitive neuroscience, vol. 22, no. 12, pp. 2677–2684, 2010.
1cs.CV
Comparison of Galled Trees Gabriel Cardona1 , Mercè Llabrés1 , Francesc Rosselló1 , and Gabriel Valiente2 arXiv:0906.1166v1 [q-bio.PE] 5 Jun 2009 1 Department of Mathematics and Computer Science, University of the Balearic Islands, E-07122 Palma de Mallorca, {gabriel.cardona,merce.llabres,cesc.rossello}@uib.es 2 Algorithms, Bioinformatics, Complexity and Formal Methods Research Group, Technical University of Catalonia, E-08034 Barcelona, [email protected] Abstract. Galled trees, directed acyclic graphs that model evolutionary histories with isolated hybridization events, have become very popular due to both their biological significance and the existence of polynomial time algorithms for their reconstruction. In this paper we establish to which extent several distance measures for the comparison of evolutionary networks are metrics for galled trees, and hence when they can be safely used to evaluate galled tree reconstruction methods. 1 Introduction The study of phylogenetic networks as a model of reticulate evolution began with the representation of conflicting phylogenetic signals as an implicit splits nework [2, 22], but it was soon realized that internal nodes in a splits network did not have any direct interpretation in evolutionary terms. Attention turned then to the study of explicit evolutionary networks, in which the internal nodes have a direct interpretation as reticulate evolutionary events such as recombination, hybridization, or lateral gene transfer. Unfortunately, the hardness of reconstructing an evolutionary network with as few recombination events as possible for a set of sequences, under the assumption of no repeated or back mutations, was soon established [6, 36, 37]. However, when the conflicting phylogenetic signals show a particular structure, such that the conflict graph of the set of sequences is biconvex, the evolutionary network with the smallest possible number of recombination events is unique, it can be reconstructed in polynomial time and it is a galled tree, an evolutionary network with hybrid nodes of in-degree 2 (because they correspond to explicit recombinations) and disjoint reticulation cycles [19]. Galled trees are also relevant from a biological point of view because, as Gusfield et al point out in loc. cit., reticulation events tend to be isolated, yielding to disjoint reticulation cycles, if the level of recombination is moderate, or if most of the observable recombinations are recent. Actually, several slightly different notions of galled tree have been introduced so far in the literature, depending on the degree of disjointness of their reticulation cycles. The original galled trees [19] have node-disjoint reticulation cycles, while the nested networks with nesting level 1 [25, 27] (dubbed, for simplicity, 1-nested networks in this paper) have arc-disjoint reticulation cycles. Between both notions lie the level-1 networks [16, 26], without biconnected components with more than one hybrid node. We have studied the relationships among these types of networks [35]: see Section 3 below. Now, various algorithms are known for reconstructing galled trees from either sequences [18–21], trees [33], distances [15], splits [23], or triplets [24], and metrics provide a safe way to assess phylogenetic reconstruction methods [28, 32]. A few polynomial time computable metrics, like the path multiplicity or µ-distance [14] or Nakhleh’s metric m for reduced networks [31], are known for tree child evolutionary networks [14], which include galled trees [35]. But most distance measures introduced so far were only known to be metrics on time consistent [4] tree-child phylogenetic networks, including the Robinson-Foulds distance [3, 13, 10], the tripartitions distance [13, 29], the nodal and splitted nodal distances [9, 11], and the triplets distance [11]. Since galled trees need not be time consistent, it was not known whether these distance measures define metrics for galled trees. On the other hand, Nakhleh gave in his PhD Thesis [30] two metrics for time consistent galled trees (based on splits and subtrees), but they are not metrics for arbitrary galled trees [14]. Recent simulation studies using the coalescent model with recombination show that only a small fraction of the simulated galled trees are time consistent [1]. In this paper, we study which of the aforementioned metrics for tree-child time consistent phylogenetic networks are also metrics for galled trees, under the various notions of the latter. We show that the Robinson-Foulds distance is only a metric in the binary case (in which the original galled trees, the level-1 networks and the 1-nested networks are the same objects); the tripartitions distance is a metric for 1-nested networks without any restriction on the degrees of their nodes (besides the general restriction that hybrid nodes have in-degree 2); and the splitted nodal distance is a metric in the semibinary (hybrid nodes of in-degree 2 and out-degree 1) case, in which the 1-nested and level-1 conditions define the same objects, but they are strictly weaker than the node-disjoint reticulation cycles condition). On the other hand, neither the nodal distance nor the triplets distance are metrics even for the most restrictive case of binary galled trees. 2 Preliminaries Given a set S, a S-rDAG is a rooted directed acyclic graph with its leaves bijectively labeled in S. A tree node of a S-rDAG N = (V, E) is a node of in-degree at most 1, and a hybrid node is a node of in-degree at least 2. A tree arc (respectively, a hybridization arc) is an arc with head a tree node (respectively, a hybrid node). A node v ∈ V is a child of u ∈ V if (u, v) ∈ E; we also say in this case that u is a parent of v. Two nodes are sibling when they have a common parent. We denote by u v any path in N with origin u and end v. Whenever there exists a path u v, we shall say that v is a descendant of u and also that u is an 2 ancestor of v. The length of a path is its number of arcs, and the distance from a node u to a descendant v of it is the length of a shortest path u v. A node v is a strict descendant of a node u in N when every path from the root of N to v contains the node u; thus, v is a non-strict descendant of u when it is a descendant of u, but there exist paths from the root to v that do not contain u. The following straightforward result, which is Lemma 1 in [10], will be used often, usually without any further notice. Lemma 1. Every strict ancestor of a node v is connected by a path with every ancestor of v. ⊓ ⊔ A tree path is a path consisting only of tree arcs, and a node v is a tree descendant of a node u when there is a tree path u v. The following result summarizes Lemma 3 and Corollary 4 in [13], and it will also be used many times in this paper without any further notice. Lemma 2. Let u v be a tree path in a S-rDAG. (1) Every other path w v ending in v either is contained in u v or contains u v. In particular, if w is a descendant of u and there exists a path w v, then this path is contained in the tree path u v. (2) The tree path u v is the unique path from u to v. (3) The node v is a strict descendant of u. ⊓ ⊔ Two paths in a S-rDAG are internally disjoint when they have disjoint sets of intermediate nodes. A reticulation cycle for a hybrid node h is a pair of internally disjoint paths ending in h and with the same origin. Each one of the paths forming a reticulation cycle for h is called generically a merge path, their common origin is called the split node of the reticulation cycle, and the hybrid node h, its end. The intermediate nodes of a reticulation cycle are the intermediate nodes of the merge paths forming it. A subgraph of an undirected graph is biconnected when it is connected and it remains connected if we remove any node and all edges incident to it. A subgraph of a S-rDAG N is said to be biconnected when it is so in the undirected graph associated to N . 3 1-nested networks In the rest of this paper, by a hybridization network on a set S we understand a S-rDAG without out-degree 1 tree nodes and with all its hybrid nodes of indegree 2. We shall also use the term hybridization network with n leaves to refer to a hybridization network on a set S with n elements. A phylogenetic tree is a hybridization network without hybrid nodes. 3 We shall say that a hybridization network is semibinary when its hybrid nodes have out-degree 1, and that it is binary when it is semibinary and its internal tree nodes have out-degree 2. A hybridization network is: – a galled tree, when every pair of reticulation cycles have disjoint sets of nodes [19]. – 1-nested, when every pair of reticulation cycles have disjoint sets of arcs: by [35, Prop. 12], this is equivalent to the fact that every pair of reticulation cycles for different hybrid nodes have disjoint sets of intermediate nodes, and hence it corresponds to the notion of nested (hybridization) network with nesting depth 1 [25, 27]. – level-1, when no biconnected component contains more than 1 hybrid node [16, 26]. To simplify the language, from now on we shall write simply 1-nested network to mean a 1-nested hybridization network. The following two results summarize the main results on 1-nested networks proved in [35]. Lemma 3. In a 1-nested network, every hybrid node is the end of exactly one reticulation cycle, and all the intermediate nodes of this reticulation cycle are of tree type. ⊓ ⊔ Theorem 1. (a) Every 1-nested network is tree-child, in the sense that every internal node has a child of tree type. (b) For general hybridization networks, galled tree =⇒ level-1 =⇒ 1-nested, and these implications are strict. (c) For semibinary hybridization networks, galled tree =⇒ level-1 ⇐⇒ 1-nested, and the first implication is strict. (d) For binary hybridization networks, galled tree ⇐⇒ level-1 ⇐⇒ 1-nested. ⊓ ⊔ The fact that every 1-nested network is tree-child implies, by [13, Lem. 2] the following result. Corollary 1. Every node in a 1-nested network has some tree descendant leaf, and hence some strict descendant leaf. ⊓ ⊔ The following result lies at the basis of most of our proofs. 4 Proposition 1. Every 1-nested network contains some internal tree node with all its children tree leaves, or a hybrid node with all its children tree leaves and such that all the intermediate nodes in its reticulation cycle have all their children outside the reticulation cycle tree leaves. Proof. Let N be a 1-nested network. Let the galled-length of a path in N be the number of reticulation cycles which the arcs of the path belong to, and the galled-depth of a node in N the largest galled-length of a path from the root to it. Notice that the galled-depth of a hybrid node is equal to the galled-depth of the intermediate nodes of its reticulation cycle (because every arc in N belongs at most to one reticulation cycle). Assume that N does not contain any internal tree node with all its children tree leaves. Let h be a hybrid node of largest galled-depth in N , and let v denote either h or any intermediate node in the reticulation cycle K for h. It turns out that v has no hybrid descendant other than h, because any path from v to any other hybrid node h′ 6= h would contain arcs belonging to at least one more reticulation cycle, making the galled-depth of h′ larger than that of v. Let v ′ be any descendant of v not belonging to K. Then, v ′ is a tree node and all its descendants are tree nodes, and therefore, since we assume that N does not contain any internal tree node with all its children tree leaves, we conclude that v ′ is a tree leaf. 4 Reductions for 1-nested networks We introduce in this section a set of reductions for 1-nested networks. Each of these reductions, when applied to a 1-nested network with n leaves and m nodes, produces a 1-nested network with at most n leaves and less than m nodes, and given any 1-nested network with more than one leaf, it is always possible to apply to it some of these reductions. We shall also show that suitable subsets of these reductions have similar properties for binary and for semibinary 1-nested networks. Similar sets of reductions for other types of evolutionary networks have already been published [7, 11]. The R reductions. Let N be a 1-nested network with n leaves, and let u be an internal node whose children are exactly the tree leaves i and j. The Ri;j reduction of N is the network Ri;j (N ) obtained by removing the leaves i and j, together with their incoming arcs, and labeling with i their former common parent u, which has become now a leaf; cf. Fig. 1.3 It is clear that Ri;j (N ) is a 1-nested network on S \ {j}, and it has 2 nodes less than N . The T reductions. Let N be a 1-nested network with n leaves, and let u be an internal node with two tree leaf children i, j and at least some other child. The Ti;j 3 In graphical representations of hybridization networks, we shall represent hybrid nodes by squares, tree nodes by circles, and indeterminate (that is, that can be of tree or hybrid type) nodes by pentagons. 5 ⇒ i i j Fig. 1. The Ri;j reduction. reduction of N is the network Ti;j (N ) obtained by removing the leaf j together with its incoming arc; cf. Fig. 2. It is clear that Ti;j (N ) is a 1-nested network on S \ {j} with 1 node less than N . u j i ⇒ ... u i ... Fig. 2. The Ti;j reduction. The G reductions. Let N be a 1-nested network with n leaves. Assume that N contains a reticulation cycle K consisting of two merge paths (u, v1 , . . . , vk , h) and (u, v1′ , . . . , vk′ ′ , h), with k > k′ (k′ can be 0, in which case the corresponding merge path is simply the arc (u, h), but then k > 0), such that – the hybrid node h has only one child, and it is the tree leaf i; – each intermediate node of K has only one child outside K, and it is a tree leaf: the child outside K of each vj is the leaf ij and the child outside K of each vj′ is the leaf i′j . Notice that u may have children outside K. The Gi;i1 ,...,ik ;i′1 ,...,i′ ′ reduction of N is the network Gi;i1 ,...,ik ;i′1 ,...,i′ ′ (N ) obtained k k by removing the nodes v1 , . . . , vk , v1′ , . . . , vk′ , h and the leaves i1 , . . . , ik , i′1 , . . . , i′k′ , i, together with all their incoming arcs, and then adding to the node u two new tree leaf children, labeled i and i1 ; cf. Fig. 3. Since we remove a complete reticulation cycle and all descendants of its intermediate nodes, and we replace it by two tree leaves, it is clear that Gi;i1 ,...,ik ;i′1 ,...,i′ ′ (N ) is a 1-nested network on k S \ {i2 , . . . , ik , i′1 , . . . , i′k′ } (and in particular, if k = 1 and k′ = 0, it has the same leaves as N ) with 2(k + k′ ) nodes less than N . The G reductions. The Gi;i1 ,...,ik ;i′1 ,...,i′ ′ reduction is the same as Gi;i1 ,...,ik ;i′1 ,...,i′ ′ , k k except for the fact that in order to apply the Gi;i1 ,...,ik ;i′1 ,...,i′ ′ reduction, the hybrid k node h must be the leaf labeled i, instead of the leaf’s parent: see Fig. 4. Then, Gi;i1 ,...,ik ;i′1 ,...,i′ ′ (N ) is a 1-nested network on S \ {i2 , . . . , ik , i′1 , . . . , i′k′ } and it has k 2(k + k′ ) − 1 nodes less than N . 6 =⇒ u v1 ′ v1 v2 ′ v2 vk ′ vk ′ i1 i2 .. . .. . u ... i1 i′1 i ... i′2 i′k′ ik h i Fig. 3. The Gi;i1 ,...,ik ;i′1 ,...,i′ ′ reduction. k =⇒ u v1 ′ v1 v2 ′ v2 vk ′ vk ′ i1 i2 .. . .. . u ... i1 i′1 i ... i′2 i′k′ ik i Fig. 4. The Gi;i1 ,...,ik ;i′1 ,...,i′ ′ reduction. k Remark 1. In the G and G reductions, we leave two tree leaves attached to the former split node of the removed reticulation cycle in order to ensure that their application never generates an out-degree 1 tree node, while avoiding to increase unnecessarily the number of reductions. Now we have the following basic applicability results. Proposition 2. Let N be a 1-nested network with more than one leaf. Then, at least one R, T , G, or G reduction can be applied to N , and the result is a 1-nested network. Proof. If N contains some internal node v with at least two children that are tree leaves, say i and j, then we can apply to N the Ri;j reduction, if the out-degree of v is 2, or the Ti;j reduction, if its out-degree is greater than 2. Assume now that N does not contain any internal node with more than one tree leaf child: in particular, it does not contain any internal tree node with all its children tree leaves. Then, by Proposition 1, it contains a hybrid node h with all its children tree leaves (and therefore, by the current assumption on N , h either is a leaf itself or has out-degree 1), and such that all the intermediate nodes in its reticulation cycle K have all their children outside K tree leaves (and therefore each one of them has exactly one child outside K, by Lemma 3 and the current 7 assumption on N ): let i1 , . . . , ik and i′1 , . . . , i′k′ , with k > k′ , be the tree leaf children of the intermediate nodes of the two respective merge paths of K, listed in descending order of their parents along the path. Then, if h has out-degree 1 and its child is the tree leaf i, we can apply to N the Gi;i1 ,...,ik ;i′1 ,...,i′ ′ reduction, while k if h is the leaf i, we can apply to N the Gi;i1 ,...,ik ;i′1 ,...,i′ ′ reduction. k The fact that the result of the application of a R, T , G, or G reduction to N is again a 1-nested network has been discussed in the definition of the reductions. Corollary 2. Let N be a semibinary 1-nested network with more than one leaf. Then, at least one R, T , or G reduction can be applied to N , and the result is a semibinary 1-nested network. Proof. Since N does not contain hybrid leaves, we cannot apply to it any G reduction, and therefore, by Proposition 2, we can apply to it at least one R, T , or G reduction. Now, if we can apply a Ri;j or Ti;j reduction to N , the common parent of the tree leaves i and j is a tree node, and if we can apply a Gi;i1 ,...,ik ;i′1 ,...,i′ ′ reduction, k the split node of the reticulation cycle for the hybrid parent of i is a tree node (in both cases because hybrid nodes in N have out-degree 1), and therefore neither application produces a hybrid node of out-degree different from 1. Corollary 3. Let N be a binary 1-nested network with more than one leaf. Then, at least one R or G reduction can be applied to N , and the result is a binary 1-nested network. Proof. Since N does not contain nodes with out-degree greater than 2, we cannot apply to it any T reduction, and thus, by Corollary 2, we can apply to it some R or G reduction. Now, if we apply a R reduction to N , we replace an internal tree node with two tree leaf children by a tree leaf, and the result is again binary. And if we apply to N a G reduction, the split node of the reticulation cycle we remove is, as in the semibinary case, a tree node, and in this case moreover without any child outside the reticulation cycle (because its out-degree must be 2), and after the application of the reduction it is still a tree node of out-degree 2. We shall call the inverses of the R, T , G, and G reductions, respectively, the −1 −1 −1 T −1 , G−1 , and G expansions, and we shall denote them by Ri;j , Ti;j , R−1 , −1 , and Gi;i1 ,...,ik ;i′1 ,...,i′ ′ . More specifically, for every 1-nested network G−1 i;i1 ,...,ik ;i′1 ,...,i′k′ k N: −1 – if N contains a leaf labeled with i but no leaf labeled with j, then the Ri;j −1 expansion can be applied to N , and Ri;j (N ) is obtained by unlabeling the leaf i and adding to it two tree leaf children labeled i and j; 8 – if N contains a tree leaf labeled with i that has some sibling, but no leaf labeled −1 −1 with j, then the Ti;j expansion can be applied to N , and Ti;j (N ) is obtained by adding to the parent of the leaf i a new tree leaf child labeled with j; – if N contains an internal node u with two tree leaf children i1 , i, but no leaf expanlabeled with i2 , . . . , ik , i′1 , . . . , i′k′ (with k > k′ ), then the G−1 i;i1 ,...,i ;i′ ,...,i′ k 1 k′ (N ) is obtained by removing the sion can be applied to N , and G−1 i;i1 ,...,ik ;i′1 ,...,i′k′ leaves i, i1 and their incoming arcs, and then starting in u two new internally disjoint paths with k and k′ , respectively, intermediate nodes and ending in the same hybrid node h, and then adding to each intermediate node of these paths one new tree leaf and labeling these leaves (in descending order along the paths) with i1 , . . . , ik and i′1 , . . . , i′k′ , respectively, and finally adding to h a new tree leaf child labeled with i; −1 – the application condition for the Gi;i1 ,...,ik ;i′1 ,...,i′ ′ expansion is exactly the same as for G−1 i;i1 ,...,i k −1 ′ ′ k ;i1 ,...,ik′ , and Gi;i1 ,...,ik ;i′1 ,...,i′ ′ (N ) is as G−1 i;i1 ,...,i k that the new hybrid node is itself a leaf labeled with i. ′ ′ k ;i1 ,...,ik′ (N ), except −1 ¿From these descriptions we easily see that the result of a R−1 , T −1 , G−1 or G expansion applied to a 1-nested network is always a 1-nested network. The following result is easily deduced from the explicit descriptions of the reductions and expansions. Lemma 4. Let N and N ′ be two 1-nested networks. If N ∼ = N ′ , then the result of ′ −1 applying to both N and N the same R expansion (respectively, T −1 expansion, −1 G−1 expansion or G expansion) are again two isomorphic 1-nested networks. Moreover, if we apply a R, T , G, or G reduction to a 1-nested network N , then we can apply to the resulting network the corresponding inverse R−1 , T −1 , G−1 , −1 or G expansion and the result is a 1-nested network isomorphic to N . ⊓ ⊔ 5 Proving metrics through reductions Let C be throughout this section a class endowed with a notion of isomorphism ∼ =. A metric on C is a mapping d:C×C →R satisfying the following axioms: for every A, B, C ∈ C, (a) (b) (c) (d) Non-negativity: d(A, B) > 0; Separation: d(A, B) = 0 if and only if A ∼ = B; Symmetry: d(A, B) = d(B, A); Triangle inequality: d(A, C) 6 d(A, B) + d(B, C). A metric space is a pair (X, d) where X is a set and d is a metric on X, taking as the notion of isomorphism in X the equality (that is, replacing ∼ = by = in the separation axiom). 9 All distances for hybridization networks considered in this paper are induced through representations, in the following sense. A representation of C in a metric space (X, d) is a mapping F :C→X such that if A ∼ = B, then F (A) = F (B). Given such a representation, the distance induced by d through F is the mapping dF : C × C → R defined by dF (A, B) = d(F (A), F (B)), for every A, B ∈ C. The metric axioms for d imply that this mapping is non-negative, symmetric, it sends pairs of isomorphic members of C to 0, and it satisfies the triangle inequality. So, to be a metric on C, dF only needs to satisfy that dF (A, B) = 0 implies A ∼ = B. Now, it is straightforward to prove the following result (cf. [12, Prop. 1]). Lemma 5. The mapping dF is a metric on C if, and only if, it is injective up to isomorphism, in the sense that, for every A, B ∈ C, if F (A) = F (B), then A ∼ = B. ⊓ ⊔ Reductions as those introduced in the last section can be used to prove the injectivity up to isomorphism of a representation F and hence, as a consequence, that the corresponding dF is a metric; it was done for specific classes C of evolutionary networks and specific metrics in [7, 11]. Since we shall use several times this kind of proofs in this paper, we make explicit here their general outline and the lemma they rely on. Let CS ′ ,m denote a class of 1-nested hybridization networks of S some specific type on a given set S ′ and with at most m nodes, and let CS ′ = m>|S ′ | CS ′ ,m . Assume we have a set of reductions R1 , . . . , Rs that can be applied to members of CS ′ , with inverse expansions R1−1 , . . . , Rs−1 . Consider the following conditions on these reductions and expansions: (R1) For every N ∈ CS ′ ,m with |S ′ | > 2, there exists some reduction Ri that can be applied to N . (R2) For every N ∈ CS ′ ,m and for every reduction Ri , Ri (N ) ∈ CSi′ ,mi for some Si′ ⊆ S ′ and mi < m; moreover, Si′ and mi only depend on S ′ , m and Ri , not on N . (R3) For every N ∈ CS ′ ,m and for every reduction Ri , if Ri can be applied to N , then Ri−1 can be applied to Ri (N ) and Ri−1 (Ri (N )) ∼ = N. ′ ′ (R4) For every reduction Ri and for every N, N ∈ CSi ,mi such that N ∼ = N ′ , if the −1 corresponding expansion Ri can be applied to N , then it can also be applied to N ′ and the resulting networks are isomorphic. The definitions and results given in Section 4 imply that: – The set of all R and G reductions satisfy conditions (R1) to (R4) for the classes CS ′ of all binary 1-nested hybridization networks on a set S ′ . 10 – The set of all R, T , and G reductions satisfy conditions (R1) to (R4) for the classes CS ′ of all semibinary 1-nested hybridization networks on a set S ′ . – The set of all R, T , G, and G reductions satisfy conditions (R1) to (R4) for the classes CS ′ of all 1-nested hybridization networks on a set S ′ . Now, we have the following result. Lemma 6. Let S be a given set of labels. For every S ′ ⊆ S, let CS ′ ,m and R1 , . . . , Rs be as above, and assume that these reductions satisfy conditions (R1) to (R4). For ′ every S ′ ⊆ S, let FS ′ : CS ′ → XS ′ be a representation in a metric space (XS ′ , d(S ) ). Then, FS is injective up to isomorphism if the following two conditions are satisfied for every S ′ ⊆ S, for every m > |S ′ |, for every reduction Ri , and for every N, N ′ ∈ CS ′ ,m such that FS ′ (N ) = FS ′ (N ′ ): (A) If Ri can be applied to N , then it can also be applied to N ′ . (R) If Ri is applied to N and N ′ , then FSi′ (Ri (N )) = FSi′ (Ri (N ′ )). (S) In particular, if these two conditions are satisfied, then dFS is a metric on CS . Proof. We shall prove by induction on |S ′ | + m the following statement: For every S ′ ⊆ S and m > |S ′ |, if N, N ′ ∈ CS ′ ,m are such that FS ′ (N ) = FS ′ (N ′ ), then N ∼ = N ′. The starting case, when |S ′ | + m = 2, is obvious because then S ′ must be a singleton, and there is, up to isomorphism, only one 1-nested hybridization network on a given singleton {i}: a single node labeled with i. Let now N, N ′ ∈ CS ′ ,m be such that FS ′ (N ) = FS ′ (N ′ ) and |S ′ | + m > 3. If |S ′ | = 1, we reason as in the starting case to deduce that N ∼ = N ′ , so we ′ assume that |S | > 2. By (R1), some reduction Ri can be applied to N , and since FS ′ (N ) = FS ′ (N ′ ), by (A) it can also be applied to N ′ . Then, by (R2), Ri (N ), Ri (N ′ ) ∈ CSi′ ,mi , with Si′ ⊆ S ′ and mi < m, and by (R) we have that FSi′ (Ri (N )) = FSi′ (Ri (N ′ )). Therefore the induction hypothesis applies, implying that Ri (N ) ∼ = Ri (N ′ ). But then, by (R3), Ri−1 can be applied to Ri (N ) and Ri (N ′ ) and Ri−1 (Ri (N )) ∼ = = N ′ , while, by (R4), Ri−1 (Ri (N )) ∼ = N and Ri−1 (Ri (N ′ )) ∼ −1 ′ ′ ∼ Ri (Ri (N )). This implies that N = N , as we wanted to prove. Thus, in particular, we have that for every m > |S|, if N, N ′ ∈ CS,m are such that FS (N ) = FS (N ′ ), then N ∼ = N ′ . Now notice that if N, N ′ ∈ CS , then there ′ exists some m such that N, N ∈ CS,m : take as m the largest number of nodes in N or in N ′ . Therefore, FS is injective up to isomorphism, as we claimed. Remark 2. If one wants to use a result like the last lemma to prove the injectivity up to isomorphism of a certain representation of S-rDAGs more general than 1nested networks, then it may be necessary to explicitly add to (A) and (R) a third condition that covers the starting case: 11 (S) For every i ∈ S, F{i} is injective up to isomorphism. We shall also use a couple of times the following straightforward fact. Lemma 7. Let F : C → X and F ′ : C → X ′ be two representations of C in metric spaces (X, d) and (X ′ , d′ ), and assume that F (A) = F (B) implies F ′ (A) = F ′ (B). Then, if F ′ is injective up to isomorphism, so is F . ⊓ ⊔ When the hypothesis of this lemma is satisfied, we say that F refines F ′ , and also that dF refines d′F ′ . Notice that if d′F ′ is a metric and dF refines it, then it is also a metric. 6 Robinson-Foulds distance Let N = (V, E) be a S-rDAG. For every node v ∈ V , the cluster of v in N is the set C(v) ⊆ S of leaves that are descendants of v. The cluster representation of N is the multiset C(N ) = {CN (v) | v ∈ V }, where each member appears with multiplicity the number of nodes having it as cluster. In particular, the cardinal of C(N ) (as a multiset, that is, every element counted with its multiplicity) is equal to the number of nodes in N . The Robinson-Foulds distance between a pair of S-rDAGs N, N ′ is dRF (N, N ′ ) = |C(N ) △ C(N ′ )|, where the symmetric difference and its cardinal refer to multisets. It is the natural generalization to S-rDAGs of the well known Robinson-Foulds distance for phylogenetic trees [34]. Remark 3. If v is an ancestor of u in N , then C(u) ⊆ C(v), but the converse implication is false, even in binary galled trees. See, for instance, Fig. 7 below: in both networks, the root and its tree child have the same cluster, but the root is not a descendant of its child. It is known that the Robinson-Foulds distance is a metric on the class of all regular evolutionary networks on a given set S (the networks N such that the mapping v 7→ C(v) induces an isomorphism of directed graphs between N and the Hasse diagram of (C(N ), ⊇)) [3] and on the class of all tree-child phylogenetic networks on a given set S that do not contain any hybrid node with two parents connected by a path [13]. Unfortunately, 1-nested networks, or even binary galled trees, need not be regular (by Remark 3) and they can contain reticulation cycles where one merge path is a single arc. So, we cannot use those results to prove that the Robinson-Foulds distance is a metric, even on the class of all binary galled trees. 12 As a matter of fact, the cluster representation is not injective up to isomorphism, and hence the Robinson-Foulds distance is not a metric, for 1-nested networks, or even galled trees, unless we restrict the possible in- and out-degrees of their nodes: they cannot contain either internal tree nodes of out-degree other than 2 (see Fig. 5), or hybrid nodes of out-degree 0 (see Fig. 6) or greater than 1 (see Fig. 7). Therefore, the Robinson-Foulds distance can only be a metric for binary 1-nested networks, that is, for binary galled trees. Now, we have the following result. 1 2 3 4 1 2 3 4 Fig. 5. Two non-isomorphic galled trees with the same cluster representation and internal tree nodes of out-degree 3. 1 2 1 2 Fig. 6. Two non-isomorphic galled trees with the same cluster representation and hybrid nodes of out-degree 0. 1 2 3 4 4 1 2 3 Fig. 7. Two non-isomorphic galled trees with the same cluster representation and hybrid nodes of out-degree 2. 13 Theorem 2. Let N, N ′ be two binary 1-nested networks on a given set S such that C(N ) = C(N ′ ). (A) If a specific R or G reduction can be applied to N , then it can also be applied to N ′ . (R) If a specific R or G reduction is applied to N and N ′ , the resulting networks have the same cluster representations. ⊓ ⊔ In order not to lose the thread of the paper, we postpone the proof of this theorem until §A2 in the Appendix at the end of the paper. Combining Lemma 6 with this theorem, we obtain the following result. Corollary 4. The Robinson-Foulds distance is a metric on the class of all binary galled trees on a given set S. ⊓ ⊔ 7 Tripartitions distance Let N = (V, E) be a S-rDAG. For every node v ∈ V , let A(v) ⊆ S be the set of (labels of) strict descendant leaves of v and B(v) = C(v) \ A(v) the set of nonstrict descendant leaves of v; B(v) may be empty, but A(v) 6= ∅ by Lemma 3. The tripartition associated to v [29] is θ(v) = (A(v), B(v), S \ C(v)). Notice that the tripartition associated to a node v refines its cluster C(v), by splitting it into A(v) and B(v). The tripartitions representation of N is the multiset θ(N ) = {θ(v) | v ∈ V } of tripartitions of the nodes of N . The tripartitions distance between a pair of S-rDAGs N, N ′ is dtri (N, N ′ ) = |θ(N ) △ θ(N ′ )|, where the symmetric difference and its cardinal refer to multisets. It turns out that the tripartitions distance is a metric on the class of all 1nested networks on a given set. It is a consequence of the following proposition, whose proof we postpone until §A3 in the Appendix. Theorem 3. Let N, N ′ be two 1-nested networks on a given set S such that θ(N ) = θ(N ′ ). (A) If a specific R, T , G, or G reduction can be applied to N , then it can also be applied to N ′ . (R) If a specific R, T , G, or G reduction is applied to N and N ′ , the resulting networks have the same tripartitions representations. ⊓ ⊔ 14 So, using Lemma 6, we deduce the following result. Corollary 5. The tripartitions distance is a metric on the class of all 1-nested networks on a given set S. ⊓ ⊔ Remark 4. Another refinement (in the sense of Lemma 7) of the Robinson-Foulds distance, the so-called µ-distance, was introduced by Cardona et al [14] and proved to be a metric on the class of all tree-child S-rDAGs for any given S: then, in particular, it is a metric on the class of all 1-nested networks on a set S. Soon later, L. Nakhleh [31] proposed a distance m that turned out to refine the µ-distance [12] and therefore that is also a metric on the class of all 1-nested networks on a set S. The interested reader can look up the aforementioned references for the specific definitions of these metrics. 8 Nodal and splitted nodal distances Let N = (V, E) be a S-rDAG; to simplify the language, throughout this section we assume that S = {1, . . . , n} with n = |S|. Recall from [10] that the least common semistrict ancestor, LCSA for short, of a pair of nodes u, v ∈ V is the node that is a common ancestor of u and v and strict ancestor of at least one of them, and that is a descendant of all other nodes in N satisfying these properties. Such a LCSA of a pair of nodes u, v always exists and it is unique [10, §IV], and we shall denote it by [u, v]. The LCSA of a pair of nodes in a phylogenetic tree is their lowest common ancestor. It turns out that such a characterization extends to 1-nested networks. Recall that a lowest common ancestor, LCA for short, of a pair of nodes u, v in a rDAG is any common ancestor of u and v that is not a proper ancestor of any other common ancestor of them [5]. Lemma 8. Every pair of nodes u, v in a 1-nested network has only one LCA, and it is their LCSA. Proof. Let x be any LCA of u and v, and let us prove that x must be a strict ancestor of u or v. Indeed, by Lemma 9 in §A1 in the Appendix, if x is not a strict ancestor of u, then it is intermediate in the reticulation cycle for a hybrid node hu that is a strict ancestor of u. In a similar way, if x is not a strict ancestor of v, then it is intermediate in the reticulation cycle for a hybrid node hv that is a strict ancestor of v. Now, if x were not a strict ancestor either of u or of v, then it either would happen that it is intermediate in reticulation cycles for two different hybrid nodes, which is impossible in a 1-nested network, or that it is a proper ancestor of a common ancestor of u and v, namely hu = hv , against the assumption that x is a LCA of u and v. So, x is a common ancestor of u and v and a strict ancestor of at least one of them, and thus it is an ancestor of [u, v]. Since x cannot have proper descendants that are common ancestors of u and v, we conclude that x = [u, v]. 15 For every pair of leaves i, j ∈ S, let ℓN (i, j) and ℓN (j, i) be the distances from [i, j] to i and to j, respectively, and let νN (i, j) = ℓN (i, j) + ℓN (j, i). The LCSA-path lengths matrix of N is the symmetric matrix   νN (1, 1) . . . νN (1, n)   .. .. .. ν(N ) =   . . . νN (n, 1) . . . νN (n, n) and the splitted LCSA-path lengths matrix of N is the (not necessarily symmetric) matrix   ℓN (1, 1) . . . ℓN (1, n)   .. .. .. ℓ(N ) =   . . . ℓN (n, 1) . . . ℓN (n, n) The nodal distance between a pair of S-rDAGs N, N ′ is half the Manhattan, or L1 , distance between ν(N ) and ν(N ′ ): dν (N, N ′ ) = 1 2 X |νN (i, j) − νN ′ (i, j)|. 16i6=j6n The splitted nodal distance between N and N ′ is the Manhattan distance between ℓ(N ) and ℓ(N ′ ): X dℓ (N, N ′ ) = |ℓN (i, j) − ℓN ′ (i, j)|. 16i6=j6n Of course, instead of using the Manhattan distance on the set of n × n matrices, one can use any other distance for real-valued matrices to compare LCSA-path lengths, or splitted LCSA-path lengths, matrices, like for instance the euclidean distance. The results in this section do not depend on the actual metric for realvalued matrices used. The nodal distance dν is the natural generalization to S-rDAGs of the classical nodal metric for binary phylogenetic trees [17, 38], while the splitted nodal distance dℓ generalizes to S-rDAGs the recently introduced homonymous metric for arbitrary phylogenetic trees [8]. It is known [9, 11] that dν is a metric on the class of all binary tree-child time consistent phylogenetic networks on a given set S, and that dℓ is a metric on the class of all tree-child time consistent phylogenetic networks on a given set S, but no binary galled tree containing a reticulation cycle with one merge path consisting of a single arc is time consistent, and therefore we cannot use these results to prove that dν or dℓ are metrics even for binary galled trees. It turns out that ν is not injective up to isomorphism, and hence dν is not a metric, even for binary galled trees, as Fig. 8 shows. As far as ℓ goes, it is not injective up to isomorphism for 1-nested networks, or even galled trees, that are not semibinary: if we allow hybrid nodes of out-degree 0 (see Fig. 9) or greater 16 1 2 2 1 Fig. 8. Two non-isomorphic binary galled trees on S = {1, 2} and whith the same LCSA-path length, 3, between their only two leaves. than 1 (see Fig. 10), there exist pairs of non-isomorphic galled trees with the same splitted LCSA-path length matrices. Therefore, dℓ can be a metric at most on the class of all semibinary 1-nested networks. Now, we have the following result. 1 2 1 2 Fig. 9. Two non-isomorphic galled trees with the same ℓ matrix and hybrid nodes of out-degree 0. 1 2 3 1 2 3 Fig. 10. Two non-isomorphic galled trees with the same ℓ matrix and hybrid nodes of out-degree greater than 1. Theorem 4. Let N, N ′ be two semibinary 1-nested networks on a given set S such that ℓ(N ) = ℓ(N ′ ). (A) If a specific R, T , or G reduction can be applied to N , then it can also be applied to N ′ . (R) If a specific R, T , G reduction is applied to N and N ′ , the resulting networks have the same splitted LCSA-path lengths matrices. ⊓ ⊔ As we did previously, we postpone the proof of this theorem until §A4 in the Appendix at the end of the paper. Combining Lemma 6 with this theorem, we obtain the following result. 17 Corollary 6. The splitted nodal distance is a metric on the class of all semibinary 1-nested networks on a given set S. ⊓ ⊔ 9 Conclusion Several slightly different definitions of galled tree, capturing the notion of a hybridization network with isolated reticulation cycles, have been proposed so far in the literature. The most general such definition is as a network with arc-disjoint reticulation cycles [16, 26], called in this paper 1-nested, and the most restrictive is Gusfield et al’s original definition of a galled tree as a network with node-disjoint reticulation cycles [19]: in between lie the level-1 networks of Janson, Sung et al [25, 27]. In the semibinary (hybrid nodes of in-degree 2 and out-degree 1) case, level-1 and 1-nested networks are the same, and in the binary (semibinary plus tree nodes of out-degree 2) case, galled trees, level-1 networks and 1-nested networks are the same objects. In this paper we have established for which classes of 1-nested networks on a fixed set of labels, several distance measures introduced so far in the literature satisfy the axioms of metrics: actually, only the separation axiom (distance 0 means isomorphism) is relevant here, because all other axioms of metrics are always satisfied by these distances. In summary, we have proved that: (a) The Robinson-Foulds distance [3, 10] is a metric only for binary galled trees. (b) The tripartitions distance [29], the µ-distance [14] and Nakhleh’s metric m for reduced networks [31] are metrics for arbitrary 1-nested networks. (c) The natural translation of the nodal distance for phylogenetic trees to evolutionary networks [9] is not a metric even for binary galled trees. (d) The splitted nodal distance [9, 11] is a metric for semibinary 1-nested networks, but not for arbitrary galled trees. We would like to mention that the 1-nested networks turn out to form the first welldefined class of evolutionary networks where the tripartitions distance is shown to be a metric but the Robinson-Foulds distance is not a metric. There are other distances that have not been discussed in this paper because they obviously fail to be metrics even for binary galled trees. This is the case of the triplets distance [11], which cannot be a metric for binary galled trees because there are many more binary galled trees with 3 leaves than possible triplets in the sense defined in the aforementioned paper. And, as it was already observed in [14, §II.D], it is also the case of any distance defined by comparing the multisets of induced subtrees, or the multisets of splits of induced subtrees: for instance, the pairs of galled trees depicted in Figs. 9 or 10 have the same multisets of induced subtrees. The splitted nodal distance and the triplets distance were introduced in [11] as suitable generalizations of the corresponding distances for phylogenetic networks 18 with the aim of obtaining metrics on the class of tree-child time consistent phylogenetic networks, and hence they were not designed to cope with reticulation cycles where one merge path is a single arc. This is the main reason of their failure as metrics for arbitrary 1-nested networks. But it seems not difficult to modify them to obtain metrics for 1-nested networks, by taking into account the restricted, and specific, topological structure of these networks: something similar was already done with the splitted nodal distance to make it work on tree-child time consistent evolutionary networks with hybrid nodes of (almost) arbitrary type [9]. Galled trees, 1-nested networks, and level-1 networks are defined as having hybrid nodes of in-degree 2, in the first case by semantical reasons and in the other two cases for practical reasons (to guarantee that certain reconstruction algorithms run in polynomial time), and we have kept this restriction in this paper. But, although Gusfield et al’s node-disjoint reticulation cycles condition implies that hybrid nodes must have in-degree 2, this restriction is not necessary in level1 and 1-nested networks, and polynomial time algorithms for the reconstruction of level-1 or 1-nested networks with hybrid nodes of arbitrary in-degree may be discovered in the future, in which case it would be interesting to know whether the distance measures discussed in this paper define metrics in this more general case and they can be used thus to assess these new algorithms. References 1. M. Arenas, G. Valiente, D. Posada, Characterization of phylogenetic reticulate networks based on the coalescent with recombination, Molecular Biology and Evolution 25 (12) (2008) 2517– 2520. 2. H.-J. Bandelt, A. W. Dress, Split decomposition: A new and useful approach to phylogenetic analysis of distance data, Molecular Phylogenetics and Evolution 1 (3) (1992) 242–252. 3. M. Baroni, C. Semple, M. Steel, A framework for representing reticulate evolution, Ann. Combin. 8 (4) (2004) 391–408. 4. M. Baroni, C. Semple, M. Steel, Hybrids in real time, Systematic Biology 55 (1) (2006) 46–56. 5. M. A. Bender, M. Farach-Colton, G. Pemmasani, S. Skiena, P. Sumazin, Lowest common ancestors in trees and directed acyclic graphs, Journal of Algorithms 57 (2) (2005) 75–94. 6. M. Bordewich, C. Semple, Computing the minimum number of hybridization events for a consistent evolutionary history, Discrete Applied Mathematics 155 (8) (2004) 914–928. 7. G. Cardona, M. Llabrés, F. Rosselló, G. Valiente, A distance metric for a class of tree-sibling phylogenetic networks, Bioinformatics 24 (13) (2008) 1481–1488. 8. G. Cardona, M. Llabrés, F. Rosselló, G. Valiente, Nodal distances for rooted phylogenetic trees, Journal of Mathematical BiologySubmitted. 9. G. Cardona, M. Llabrés, F. Rosselló, G. Valiente, Path lengths in tree-child time consistent hybridization networks, arXiv:0807.0087v1 [q-bio.PE]; submitted (2008). 10. G. Cardona, M. Llabrés, F. Rosselló, G. Valiente, Metrics for phylogenetic networks I: Generalizations of the Robinson-Foulds metric, IEEE/ACM Transactions on Computational Biology and Bioinformatics 6 (1) (2009) 1–16. 11. G. Cardona, M. Llabrés, F. Rosselló, G. Valiente, Metrics for phylogenetic networks II: Nodal and triplets metrics, IEEE/ACM Transactions on Computational Biology and Bioinformatics In press, DOI: 10.1109/TCBB.2008.127. 12. G. Cardona, M. Llabrés, F. Rosselló, G. Valiente, On Nakhleh’s metric for reduced phylogenetic networks, IEEE/ACM Transactions on Computational Biology and Bioinformatics In press, DOI: 10.1109/TCBB.2009.33. 19 13. G. Cardona, F. Rosselló, G. Valiente, Tripartitions do not always discriminate phylogenetic networks, Mathematical Biosciences 211 (2) (2008) 356–370. 14. G. Cardona, F. Rosselló, G. Valiente, Comparison of tree-child phylogenetic networks, IEEE/ACM Transactions on Computational Biology and Bioinformatics In press, DOI: 10.1109/TCBB.2007.70270. 15. H.-L. Chan, J. Jansson, T. W. Lam, S.-M. Yiu, Reconstructing an ultrametric galled phylogenetic network from a distance matrix, Journal of Bioinformatics and Computational Biology 4 (4) (2006) 807–832. 16. C. Choy, J. Jansson, K. Sadakane, W.-K. Sung, Computing the maximum agreement of phylogenetic networks, Theoretical Computer Science 335 (1) (2005) 93–107. 17. J. S. Farris, On comparing the shapes of taxonomic trees, Systematic Zoology 22 (1973) 50–54. 18. D. Gusfield, V. Bansal, V. Bafna, Y. S. Song, A decomposition theory for phylogenetic networks and incompatible characters, Journal of Computational Biology 14 (10) (2007) 1247– 1272. 19. D. Gusfield, S. Eddhu, C. Langley, Efficient reconstruction of phylogenetic networks with constrained recombination, in: Proc. 2nd IEEE Computer Society Bioinformatics Conf., 2003. 20. D. Gusfield, S. Eddhu, C. H. Langley, The fine structure of galls in phylogenetic networks, INFORMS Journal on Computing 16 (4) (2004) 459–469. 21. D. Gusfield, S. Eddhu, C. H. Langley, Optimal, efficient reconstruction of phylogenetic networks with constrained recombination, Journal of Bioinformatics and Computational Biology 2 (1) (2004) 173–213. 22. D. H. Huson, D. Bryant, Application of Phylogenetic Networks in Evolutionary Studies, Molecular Biology and Evolution 23 (2) (2006) 254–267. 23. D. H. Huson, T. H. Klöpper, Beyond galled trees—decomposition and computation of galled networks, in: Proc. 11th Annual Int. Conf. Research in Computational Molecular Biology, vol. 4453 of Lecture Notes in Computer Science, Springer, 2007, pp. 211–225. 24. J. Jansson, N. B. Nguyen, W.-K. Sung, Algorithms for combining rooted triplets into a galled phylogenetic network, SIAM Journal on Computing 35 (5) (2006) 1098–1121. 25. J. Jansson, W.-K. Sung, The maximum agreement of two nested phylogenetic networks, in: Proc. 15th Int. Symp. Algorithms and Computation, vol. 3341 of Lecture Notes in Computer Science, Springer, 2004, pp. 581–593. 26. J. Jansson, W.-K. Sung, Inferring a level-1 phylogenetic network from a dense set of rooted triplets, Theoretical Computer Science 363 (1) (2006) 60–68. 27. J. Jansson, W.-K. Sung, The maximum agreement of two nested phylogenetic networks, in: O. N. Terikhovsky, W. N. Burton (eds.), New Topics in Theoretical Computer Science, chap. 4, Nova Publishers, 2008, pp. 119–141. 28. M. M. Miyamoto, J. Cracraft, Phylogenetic Analysis of DNA Sequences, Oxford University Press, 1991. 29. B. M. E. Moret, L. Nakhleh, T. Warnow, C. R. Linder, A. Tholse, A. Padolina, J. Sun, R. Timme, Phylogenetic networks: Modeling, reconstructibility, and accuracy, IEEE/ACM Transactions on Computational Biology and Bioinformatics 1 (1) (2004) 13–23. 30. L. Nakhleh, Phylogenetic networks, Ph.D. thesis, University of Texas at Austin (2004). 31. L. Nakhleh, A metric on the space of reduced phylogenetic networks, IEEE/ACM Transactions on Computational Biology and Bioinformatics In press, DOI: 10.1109/TCBB.2009.2. 32. L. Nakhleh, J. Sun, T. Warnow, C. R. Linder, B. M. E. Moret, A. Tholse, Towards the development of computational tools for evaluating phylogenetic network reconstruction methods, in: Proc. 8th Pacific Symp. Biocomputing, 2003. 33. L. Nakhleh, T. Warnow, C. R. Linder, K. St. John, Reconstructing reticulate evolution in species—theory and practice, Journal of Computational Biology 12 (6) (2005) 796–811. 34. D. F. Robinson, L. R. Foulds, Comparison of phylogenetic trees, Mathematical Biosciences 53 (1/2) (1981) 131–147. 35. F. Rosselló, G. Valiente, All that glisters is not galled, arXiv:0904.2448v1 [cs.DM]; submitted (2009). 20 36. L. Wang, B. Ma, M. Li, Fixed topology alignment with recombination, Discrete Applied Mathematics 104 (1–3) (2000) 281–300. 37. L. Wang, K. Zhang, L. Zhang, Perfect phylogenetic networks with recombination, Journal of Computational Biology 8 (1) (2001) 69–78. 38. W. T. Williams, H. T. Clifford, On the comparison of two classifications of the same set of elements, Taxon 20 (4) (1971) 519–522. Appendix: Proofs of the main theorems A1 Some lemmas on clusters and tripartitions We establish in this subsection some basic properties of clusters on 1-nested networks that will be used in the proofs of the next two subsections. To simplify the notations, given a 1-nested network N on a set S, let CI (N ) denote the multiset of clusters of its internal nodes. CI (N ) is obtained by removing from C(N ) one copy of every singleton {i} with i ∈ S. Lemma 9. Let N be a 1-nested network on S. (a) For every i ∈ S and for every internal node v, C(v) = {i} if, and only if, i is a tree leaf and v is its parent and it has out-degree 1. (b) If two leaves i, j are such that there does not exist any member of CI (N ) containing one of them and not the other, then they are sibling. (c) Let v be a tree node and u its only parent. If C(u) 6= C(v), then C(u) is the only (up to multiplicities) minimal member of CI (N ) strictly containing C(v). If C(u) = C(v) and u has out-degree greater than 1, then u is the split node of a reticulation cycle such that one of the merge paths contains v as intermediate node and the other merge path is a single arc. (d) If a node v is a non-strict descendant of a node u, then u is intermediate in the reticulation cycle for a hybrid node that is a strict ancestor of v. Proof. (a) If v is a node with only one child and this child is the tree leaf i, then C(v) = {i} ∈ CI (N ). Conversely, let v be an internal node such that C(v) = {i}. Since every internal node in N has a tree descendant leaf, i must be a tree descendant leaf of v (and in particular a tree leaf). Let w be the parent of i, and let us prove that it has out-degree 1. Indeed, if u is a child of w other than i, it has a tree descendant leaf j, and j 6= i, because, otherwise, the only parent w of i would be a descendant of its child u. But then j ∈ C(v), against the assumption that C(v) = {i}. So, the tree path v i cannot have any intermediate node, because otherwise w would be intermediate in this path and hence it would be a tree node, but internal tree nodes in N have out-degree greater than 1. Therefore, v is the parent of i. But then, as we have just seen, it must have out-degree 1. (b) Assume that the every member of CI (N ) containing i or j contains both of them, but that i and j are not sibling. Let v1 be a parent of i: then i ∈ C(v1 ) 21 implies j ∈ C(v1 ) and, since v1 is not a parent of j, v1 is a proper ancestor of some parent w1 of j. Then, j ∈ C(w1 ) implies i ∈ C(w1 ) and thus, since w1 is not a parent of i, w1 is a proper ancestor of some parent v2 6= v1 (because v1 is a proper ancestor of w1 ) of i. Iterating this process, we obtain that v2 is a proper ancestor of another parent w2 6= w1 of j, and then that w2 is a proper ancestor of another parent v3 6= v1 , v2 of i, which is impossible because every node in N has at most 2 parents. (c) Let u be the parent of the tree node v. Assume that C(u) 6= C(v) and let i be a tree descendant leaf of v, and hence also of u. For every other internal node w, if C(v) ( C(w), then i ∈ C(w), and therefore either the path u i is contained in the path w i or conversely. But C(v) ( C(w) implies that w cannot be a descendant of v, and we conclude that u i is contained in the path w i, and hence u is a descendant of w, which implies that C(u) ⊆ C(w). Assume now that u has out-degree greater than 1 and that C(u) = C(v). Let v ′ be another child of u and let j be a tree descendant leaf of v ′ . Then, j ∈ C(v), and therefore either the path v j contains the path v ′ j or the path v ′ j contains the path v j. But the last situation is impossible, because if v belongs to the path v ′ j, its only parent u should also belong to it, and u cannot be a descendant of its child v ′ . So, we conclude that v ′ is a descendant of v, and therefore that v ′ is a hybrid node and its reticulation cycle consists of the arc (u, v ′ ) and a path (u, v, . . . , v ′ ). (d) Assume that v is a non-strict descendant of u. Let u v be any path from u to v, and r v a path from the root r of N to v not containing u. Let w be the first node in u v contained also in r v. Since, by assumption, w 6= u and, clearly, w 6= r, w will have different parents in both paths, which implies that it is hybrid. Let now r u be any path from the root to u and let x be the last node in this path belonging to the subpath r w of r v: again, u 6= x. Then, the subpath x w of r v and the concatenation of the subpath x u of r u and the subpath u w of u v are internally disjoint, and hence they form a reticulation cycle for w with split node x and having u as intermediate node. It remains to prove that w is a strict ancestor of v. But if it were not, then, as we have just seen, w would be intermediate in a reticulation cycle for an ancestor of v, which is impossible by Lemma 3. Lemma 10. Let N be a 1-nested network on S, let h be a hybrid node of N with C(h) = {i}, and let K be its reticulation cycle, with split node u. (a) No pair of intermediate nodes of K in different merge paths are connected by a path. (b) Every pair of intermediate nodes in K have different clusters, and different also from C(h). (c) The only non-strict descendant of each intermediate node of K is i. (d) The intersection of the clusters of any pair of intermediate nodes of different merge paths of K is {i}. 22 (e) i is a strict descendant of u. (f ) If v is a node outside K such that i ∈ C(v), then v is an ancestor of u and thus C(u) ⊆ C(v). (g) All clusters of intermediate nodes in K have multiplicity 1 in CI (N ), except the cluster of the child other than h of u when one of the merge paths consists of a single arc (u, h). (h) The minimal elements of CI (N ) strictly containing C(h) are the clusters of the parents of h that are intermediate in K. Proof. By Lemma 9.(a), C(h) = {i} implies that either h = i or that i is a tree child of h, and its only child. (a) If x and y were two intermediate nodes of K belonging to different merge paths and there existed a path x y, then the first node in this path also belonging to the path u y would have different parents in both paths, and therefore it would be hybrid, which is impossible by Lemma 3. (b) Let x and y be two different intermediate nodes of K: if they belong to the same merge path, we take them so that y is a proper descendant of x. We shall prove that C(x) 6= C(y). Since both nodes are of tree type, x has a child v outside K. Let l be a tree descendant leaf of v, and assume that l ∈ C(y). Then, either the path v l contains the path y l or vice versa. But the tree path u y contained in the merge path is the unique path from u to y, and it does not contain v, and therefore y cannot be a descendant of v. Thus, v is a descendant of y, and since x is not a descendant of y by (a), we conclude that v is a hybrid node such that its parent other than x is a descendant of y. But then, y is intermediate in the reticulation cycle of v, which is impossible because it is already intermediate in the reticulation cycle of h. So, we reach a contradiction that implies that l ∈ / C(y), and hence that C(x) 6= C(y). On the other hand, Lemma 9.(a) implies that, for every proper ancestor x of h, C(h) = {i} ( C(x). (c) Let x be an intermediate node of K and l a descendant leaf of x other than i. If l were a non-strict descendant of x, then x would be intermediate in the reticulation cycle of a hybrid ancestor of l by Lemma 9.(d), which is impossible because x is already intermediate in K and h is not an ancestor of l. Thus, every descendant leaf of x other than i is a strict descendant of x. On the other hand, the fact that i is a non-strict descendant of x is obvious: the composition of any path r u with the merge path u h not containing x, and ending, if necessary, with the arc (h, i), yields a path r i not containing x. (d) Let x and y be two intermediate nodes of different merge paths of K. If there existed some leaf l 6= i in C(x) ∩ C(y), then it would be a strict descendant of both x and y by (c), which would imply by Lemma 1 that x and y are connected by a path, against (a). (e) Any path r i contains h and therefore it contains one of its parents. But the merge path from u to any parent of h is a tree path, and hence it must be 23 contained in the subpath r r i. h of r i. This implies that u belongs to the path (f ) Let v be a node outside K such that i ∈ C(v). Then, by (e) and Lemma 1, u and v are connected by a path. Now, since v 6= h, v will be an ancestor of one of the parents of h, say x. But then, if v were a descendant of u, it would belong to the only path u x, which is contained in K, against the assumption that v does not belong to K. Thus, u is a descendant of v. (g) Let x be an intermediate node of K and assume that there exists some w 6= x such that C(w) = C(x). We know by (b) that w is neither h (because C(h) 6= C(x)) nor any intermediate node of K and therefore, by (f), C(u) ⊆ C(w) = C(x). Thus, C(x) contains all clusters of nodes in K, which implies that the merge path not containing x cannot contain any intermediate node (by (d)) and that x is the child of u in the only merge path of K of length greater than 1 (otherwise, the cluster of its parent in the merge path would strictly contain C(x), by (b), and would be included in C(u)). (h) Let v and v ′ be the parents of h. Since every proper ancestor w of h is an ancestor of v or v ′ , and hence C(w) contains C(v) or C(v ′ ), we deduce that C(v) and C(v ′ ) are the only possible minimal members of CI (N ) strictly containing C(h). Now, if C(v) and C(v ′ ) are two different such minimal members of CI (N ), then they do not contain each other and therefore v and v ′ are not connected by a path. This implies that neither v nor v ′ is the split node u of K, and therefore that they are intermediate in K. Conversely, if only one of these two clusters, say C(v), is minimal strictly containing C(h), then it is contained in the other. By (d), this implies that v ′ cannot be intermediate in K, and therefore v ′ = u. A2 Proof of Theorem 2 To ease the task of the reader, we split the proof of Theorem 2 into several lemmas. Throughout this subsection, N stands for a binary 1-nested network (or, equivalently, a binary galled tree) on a fixed set S. Lemma 11. The Ri;j reduction can be applied to N if, and only if, {i, j} ∈ CI (N ) but {i}, {j} ∈ / CI (N ). Proof. If N contains a node u whose children are the tree leaves i, j, then {i, j} = C(u) ∈ CI (N ), and {i}, {j} ∈ / CI (N ) by Lemma 9.(a). Conversely, if {i, j} ∈ CI (N ) and {i}, {j} ∈ / CI (N ), then i and j are tree leaves (by the binarity of N ) and their parents have out-degree greater than 1 by Lemma 9.(a). Let now u be the parent of i. Since every internal ancestor of i is an ancestor of its only parent u, the cluster of any internal ancestor of i must contain the cluster of u: in particular, i ∈ C(u) ⊆ {i, j}, which implies (since {i} ∈ / CI (N )) that C(u) = {i, j}. But then, if i ∈ C(v) for some internal node v, 24 then {i, j} ⊆ C(v). This shows that every member of CI (N ) that contains i also contains j. By symmetry, every member of CI (N ) that contains j also contains i. Then, Lemma 9.(b) applies. Lemma 12. The Gi;i1 ,...,ik ;∅ reduction can be applied to N if, and only if, the following conditions are satisfied: (1) (2) (3) (4) {i} ∈ CI (N ). For every j = 2, . . . , k, {ij , . . . , ik , i} ∈ C(N ) with multiplicity 1. {i1 , . . . , ik , i} ∈ C(N ) with multiplicity at least 2. Any member of CI (N ) containing some label among i1 , . . . , ik and not listed in (2)–(3), must contain {i1 , . . . , ik , i}. Proof. If N contains a reticulation cycle K consisting of the merge paths (u, h) and (u, v1 , . . . , vk , h) (and hence h and v1 are the only children of u), such that the only child of the hybrid node h is the leaf i and the child outside K of each tree node vj is the tree leaf ij , then C(h) = {i} C(vj ) = {ij , . . . , ik , i}, C(u) = {i1 , . . . , ik , i} j = 1, . . . , k and hence CI (N ) contains all clusters listed in (1)–(2), the latter with multiplicity 1 by Lemma 10.(g), as well as the cluster given in (3) with multiplicity at least 2. Now, let v be any internal node of N not belonging to K and such that C(v) contains some label i1 , . . . , ik . If ij ∈ C(v), then ij ’s only parent vj must also be a descendant of v. But then i ∈ C(vj ) ⊆ C(v) implies that C(u) ⊆ C(v) by Lemma 10.(f), as (4) claims. Conversely, assume that (1)–(4) are satisfied. Then, the parent h of i has outdegree 1 and therefore it is hybrid, and, by Lemma 10.(h), its parents are connected by a path, because there is only one minimal element of CI (N ) strictly containing {i}, namely {ik , i}. Therefore, the reticulation cycle K for h consists of an arc (u, h) and a tree path (u, v1 , . . . , vl , h) with l > 1. In this situation, Lemma 10 implies that: – C(vl ) is the minimal element of CI (N ) strictly containing {i}; – C(vl ) ( C(vl−1 ) ( · · · ( C(v1 ), and then, by Lemma 9.(c), each C(vj ), j = 1, . . . , l − 1, is the minimal element of CI (N ) containing C(vj+1 ); – C(v2 ), . . . , C(vl ) appear with multiplicity 1 in CI (N ); – C(u) = C(v1 ), because the only children of u are v1 and h. On the other hand, (1)–(4) imply that – The minimal element of CI (N ) strictly containing {i} is {ik , i}; – {ik , i} ( {ik−1 , ik , i} ( . . . ( {i1 , . . . , ik , i}, and each {ij , . . . , ik , i}, j = 1, . . . , k− 1, is the minimal element of CI (N ) strictly containing {ij+1 , . . . , ik , i}; 25 – {i2 , . . . , ik , i}, . . . , {ik , i} appear with multiplicity 1 in CI (N ); – {i1 , . . . , ik , i} appears with multiplicity at least 2 in CI (N ). The only possibility of making these two lists of properties compatible is that k = l and C(vj ) = {ij , . . . , ik , i} for every i = 1, . . . , k. It remains to prove that the only child of every vj outside K is the corresponding leaf ij . Let wj be the only parent of ij ; we want to prove that wj = vj . Since ij ∈ C(vj ), there exists a path vj wj and hence C(wj ) ⊆ C(vj ). On the other hand, ij ∈ C(wj ) implies, by (4), that i ∈ C(wj ) and therefore, by Lemma 10.(f), either wj belongs to K or it is an ancestor of u. The second case cannot hold, because wj is a proper descendant of u. Therefore, wj is a node of K that is a descendant of vj and an ancestor of ij : it must be vj . Lemma 13. The Gi;i1 ,...,ik ;i′1 ,...,i′ ′ reduction, with k > k′ > 0, can be applied to N k if, and only if, the following conditions are satisfied: (1) (2) (3) (4) (5) {i} ∈ CI (N ). For every j = 1, . . . , k, {ij , . . . , ik , i} ∈ C(N ) with multiplicity 1. For every j = 1, . . . , k′ , {i′j , . . . , i′k′ , i} ∈ C(N ) with multiplicity 1. {i1 , . . . , ik−1 , ik , i′1 , . . . , i′k′ −1 , i′k′ , i} ∈ C(N ). Any member of CI (N ) containing some label among i1 , . . . , ik , i′1 , . . . , i′k′ and not listed in (1)–(4), must contain {i1 , . . . , ik , i′1 , . . . , i′k′ , i}. Proof. The proof that if N contains a reticulation cycle K consisting of the merge paths (u, v1 , . . . , vk , h) and (u, v1′ , . . . , vk′ ′ , h), with k > k′ > 0, such that the only child of the hybrid node h is the leaf i, the child outside K of each tree node vj is the tree leaf ij , and the child of each tree node vj′ outside K is the tree leaf i′j , then it satisfies conditions (1) to (5), is similar to the proof of the corresponding implication in the previous lemma, and we do not repeat it here. As far as the converse implication goes, assume that conditions (1)–(5) in the statement are satisfied. Then, the parent h of i has out-degree 1 and therefore it is hybrid, and, by Lemma 10.(h), its two parents are not connected by a path, because there are two minimal elements of CI (N ) strictly containing {i}, namely {ik , i} and {i′k′ , i}. Therefore, the reticulation cycle K for h consists of two merge paths (u, v1 , . . . , vl , h) and (u, v1′ , . . . , vl′′ , h) with l, l′ > 1. In this situation, Lemma 10 implies that: – C(vl ) and C(vl′′ ) are the minimal elements of CI (N ) strictly containing {i}; – C(vl ) ( · · · ( C(v1 ), and then, by Lemma 9.(c), each C(vj ), j = 1, . . . , l − 1, is the minimal element of CI (N ) containing C(vj+1 ); – C(vl′′ ) ( · · · ( C(v1′ ), and then, by Lemma 9.(c), each C(vj′ ), j = 1, . . . , l′ − 1, ′ is the minimal element of CI (N ) containing C(vj+1 ); ′ ′ – C(v1 ), . . . , C(vl ), C(v1 ), . . . , C(vl′ ) appear with multiplicity 1 in CI (N ); – the minimal element of CI (N ) strictly containing C(v1 ) is the same as the minimal element of CI (N ) strictly containing C(v1′ ), and it is C(u). 26 On the other hand, (1)–(5) imply that: – The minimal elements of CI (N ) strictly containing {i} are {ik , i} and {i′k′ , i}; – {ik , i} ( . . . ( {i1 , . . . , ik , i}, and each {ij , . . . , ik , i}, j = 1, . . . , k − 1, is the minimal element of CI (N ) strictly containing {ij+1 , . . . , ik , i}; – {i′k , i} ( . . . ( {i′1 , . . . , i′k′ , i}, and each {i′j , . . . , i′k′ , i}, j = 1, . . . , k′ − 1, is the minimal element of CI (N ) strictly containing {i′j+1 , . . . , i′k′ , i}; – {ik , i}, . . . , {i1 , . . . , ik , i}, {i′k , i}, . . . , {i′1 , . . . , i′k′ , i} appear with multiplicity 1 in CI (N ); – the minimal element of CI (N ) strictly containing {i1 , . . . , ik , i} is the same as the minimal element containing {i′1 , . . . , i′k′ , i}, and it is {i1 , . . . , ik , i′1 , . . . , i′k′ , i}. The only possibility of making these two lists of properties compatible is that (up to the interchange of k and k′ ) k = l, k′ = l′ , C(vj ) = {ij , . . . , ik , i} for every j = 1, . . . , k, and C(vj′ ) = {i′j , . . . , i′k , i} for every j = 1, . . . , k′ . It remains to prove that the only child of every vj (respectively vj′ ) not belonging to the reticulation cycle for h is the corresponding leaf ij (respectively i′j ). This fact can be proved using the same argument as in the last paragraph of the proof of the previous lemma. Lemmas 11 to 13 prove that the fact that a given R or G reduction can be applied to N only depends on C(N ), from where point (A) in Theorem 2 follows. As far as point (R) goes, it is a consequence of the following straightforward lemma that shows that the application of a specific R or T reduction to N affects C(N ) in a way that does not depend on N itself, but only on its cluster representation; we leave its easy proof to the reader. Lemma 14. (a) If the Ri;j reduction can be applied to N , then C(Ri;j (N )) is obtained by removing from C(N ) the clusters {i} and {j}, and them removing from all remaining clusters the label j. (b) If the Gi;i1 ,...,ik ;∅ reduction can be applied to N , then C(Gi;i1 ,...,ik ;∅ (N )) is obtained by first removing from C(N ) all clusters listed in points (1)–(2) of Lemma 12, one copy of the cluster given in point (3) therein, and the clusters {i2 }, . . . , {ik }, and then removing the labels i2 , . . . , ik from all remaining clusters. (c) If the Gi;i1 ,...,ik ;i′1 ,...,i′ ′ (with k′ 6= 0) reduction can be applied to N , then k C(Gi;i1 ,...,ik ;i′1 ,...,i′ ′ (N )) is obtained by first removing from C(N ) all clusters k listed in points (1)–(3) of Lemma 13 and the clusters {i2 }, . . . , {ik }, {i′1 }, . . . , {i′k′ }, and then removing the labels i2 , . . . , ik , i′1 , . . . , i′k′ from all remaining clusters. ⊓ ⊔ A3 Proof of Theorem 3 As in the previous subsection, we split the proof of Theorem 3 into several lemmas to increase its readability. In the rest of this subsection, N stands for an arbitrary 27 1-nested network on some given set S. Since the set S is fixed, for every node v of N , if A(v) = {i1 , . . . , ik } and B(v) = {j1 , . . . , jl }, we shall use the following notation to denote the tripartition θ(v): θ(v) = {i1 , . . . , ik | j1 , . . . , jl }. To simplify the notations, we shall denote by θI (N ) the multiset of tripartitions of its internal nodes, which is obtained by removing from θ(N ) one copy of every tripartition {i | ∅} with i ∈ S. Lemma 15. Two leaves i, j are tree leaves and siblings if, and only if, the following conditions are satisfied: (a) There exists an internal node v such that i, j ∈ A(v) and C(v) is contained in the cluster of any internal ancestor of i or j. (b) For every node w of N such that i, j ∈ C(w), it happens that either i, j ∈ A(w) or i, j ∈ B(w). Moreover, when i and j are sibling tree leaves, they are the only children of their parent if, and only if, the node v in point (a) is such that C(v) = {i, j}. Proof. If i, j are two sibling tree leaves and v is their common parent, then they are strict descendants of v and C(v) is contained in the cluster of any ancestor of i or j. Let now w be any node such that i, j ∈ C(w). Then, w is ancestor of v. If v is a strict descendant of w, then i, j are also strict descendants of w, and if v is a non-strict descendant of w, then i, j are also non-strict descendants of w. Therefore, either i, j ∈ A(w) or i, j ∈ B(w). This finishes the proof of the ‘only if’ implication. As far as the converse implication goes, the existence of the internal node v with i, j ∈ A(v) and such that C(v) is contained in the cluster of every ancestor of i or j implies that there does not exist any internal node whose cluster contains one of the labels i, j but not the other, and therefore, by Lemma 9.(b), that i and j are siblings. Let v0 be a common parent of them: then, on the one hand, i, j ∈ C(v0 ) implies that C(v) ⊆ C(v0 ), and, on the other hand, since i, j ∈ A(v), v0 must be a descendant of v, and therefore C(v0 ) ⊆ C(v). We conclude that C(v0 ) = C(v). Let us prove now that i, j ∈ A(v0 ). Indeed, if one of them were a non-strict descendant of v0 , then by (b) both would be non-strict descendants of it. By Lemma 9.(d), and taking into account that v0 is a parent of i and j, this would imply that i and j are hybrid leaves and v0 intermediate in their reticulation cycles, which would contradict the 1-nested condition. This implies that there would exist paths from the root of N to i and j that do not contain v0 . This could only happen if both i and j were hybrid leaves and v0 intermediate in their reticulation cycles (if it were the split node of one of them, the corresponding hybrid leaf would be a strict descendant of it by Lemma 10.(e)), Let us prove now that i and j are tree leaves. Indeed, if, say, i is a hybrid leaf 28 and v0′ its other parent, then, since i ∈ A(v0 ), v0′ is a descendant of v0 and then intermediate in the reticulation cycle for i (which would have v0 as split node). Now, since i ∈ C(v0′ ), it must happen that j ∈ C(v0′ ) and, since v0′ cannot be an ancestor of v0 , we conclude that j is also hybrid and that v0′ is an ancestor of its other parent. But then, v0′ is also intermediate in the reticulation cycle for j (which j), which is impossible. consists of the arc (v0 , j) and the merge path v0 v0′ This shows that i and, by symmetry, j are tree leaves. This finishes the proof that i and j are tree sibling leaves if, and only if, (a) and (b) are satisfied; moreover, from this proof we deduce that we can take as v in (a) the common parent of i and j. Now, as far as the last assertion in the statement, if i and j are the only children of their common parent v, it is clear that C(v) = {i, j}. Conversely, if v has a child u different from i and j, then u cannot be an ancestor of i and j, and therefore any descendant leaf of it is an element of C(v) different from i and j, which shows that {i, j} ( C(v). As a direct consequence of this lemma we obtain the following two results. Lemma 16. The Ri;j reduction can be applied to N if, and only if, the following conditions are satisfied: (1) There exists an internal node v such that θ(v) = {i, j | ∅} and C(v) is contained in the cluster of any internal ancestor of i or j. (2) For every node w of N such that i, j ∈ C(w), it happens either that i, j ∈ A(w) or i, j ∈ B(w). ⊓ ⊔ Lemma 17. The Ti;j reduction can be applied to N if, and only if, the following conditions are satisfied: (1) There exists an internal node v such that i, j ∈ A(v), {i, j} ( C(v), and C(v) is contained in the cluster of any other internal ancestor of i or j. (2) For every node w of N such that i, j ∈ C(w), it happens either that i, j ∈ A(w) or i, j ∈ B(w). ⊓ ⊔ Let us consider now the G and G reductions. In contrast to the corresponding lemmas in §A2, here we do not need to distinguish between k′ = 0 and k′ > 0. Lemma 18. The Gi;i1 ,...,ik ;i′1 ,...,i′ ′ reduction (with k > k′ > 0) can be applied to N k if, and only if, the following conditions are satisfied: (1) (2) (3) (4) {i | ∅} ∈ θI (N ). For every j = 1, . . . , k, {ij , . . . , ik | i} ∈ θ(N ) with multiplicity 1. For every j = 1, . . . , k′ , {i′j , . . . , i′k′ | i} ∈ θ(N ) with multiplicity 1. For every θ(v) ∈ θI (N ), if C(v) contains some label among i1 , . . . , ik , i′1 , . . . , i′k′ and θ(v) is not listed in (2) or (3), then either i, i1 , . . . , ik , i′1 , . . . , i′k′ ∈ A(v) or i, i1 , . . . , ik , i′1 , . . . , i′k′ ∈ B(v). 29 Proof. If N contains a reticulation cycle K consisting of the merge paths (u, v1 , . . . , vk , h) and (u, v1′ , . . . , vk′ ′ , h) such that the only child of the hybrid node h is the tree leaf i and each tree node vj (respectively vj′ ) has only one child outside K and it is the tree leaf ij (respectively i′j ), then θ(h) = {i | ∅} θ(vj ) = {ij , . . . , ik | i}, j = 1, . . . , k θ(vj′ ) = {i′j , . . . , i′k′ | i}, j = 1, . . . , k′ and hence θI (N ) contains all tripartitions listed in points (1)–(3). Let now v be any internal node different from v1 , . . . , vk , v1′ , . . . , vk′ ′ that is an ancestor of some leaf i1 , . . . , ik , i′1 , . . . , i′k′ , say that ij ∈ C(v). Then it will be an ancestor of its parent vj and in particular i ∈ C(vj ) ⊆ C(v). Then, by Lemma 10.(f), u is a descendant of v. Now, if u is a strict descendant of v, then the leaves i1 , . . . , ik , i′1 , . . . , i′k′ , i are also strict descendants of v, while if u is a non-strict descendant of v, then they are also non-strict descendants of v. This proves (4) and that all tripartitions listed in (2) and (3) appear only once in θ(N ) (Lemma 10.(g) did not guarantee it for θ(v1 ) when k′ = 0). This finishes the proof of the ‘only if’ implication. Conversely, assume that (1)–(4) are satisfied. Using only the information of the clusters and arguing as in the proof of the ‘if’ implication in Lemmas 12 and 13, we already deduce that the parent h of i is hybrid, it has out-degree 1 and i is a tree child of it (using Lemma 9.(a)), that the reticulation cycle K for h consists of two tree merge paths (u, v1 , . . . , vl , h) and (u, v1′ , . . . , vl′′ , h), with l > k and l′ > k′ , and that θ(vl−j ) = {ik−j , . . . , ik | i}, for every j = 0, . . . , k − 1, and θ(vl′′ −j ) = {i′k′ −j , . . . , i′k′ | i} for every j = 0, . . . , k′ − 1. Now, if l > k, C(vl−k ) would strictly contain C(vl−(k−1) ) and i1 would be a strict descendant of vl−k (because it is a strict descendant of its tree child vl−(k−1) ) but i would be a nonstrict descendant of it, which would contradict (4). This implies then that k = l and C(vj ) = {ij , . . . , ik , i} for every i = 1, . . . , k, and then, by symmetry, k′ = l′ and C(vj′ ) = {i′j , . . . , i′k′ , i} for every i = 1, . . . , k′ . It remains to prove that the only child of every vj (respectively, vj′ ) not belonging to the reticulation cycle for h is the corresponding tree leaf ij (respectively, i′j ). Let us prove first that each ij is a tree leaf. Indeed, if ij were hybrid, then, since ij ∈ A(vj ), vj would be an ancestor of the split node wj of the reticulation cycle for ij . Since ij only belongs to the clusters of the nodes in K that are ancestors of vj , we conclude that wj does not belong to K and then, since ij ∈ A(wj ), by (4) we have that i ∈ A(wj ) and hence, by Lemma 10.(f), that wj is a strict ancestor of u, which is impossible. Let now uj be a child of vj different from ij and from vj ’s child in K. This node must be internal, because the other descendant leaves ij+1 , . . . , ik , i of vj are tree leaves and descendants of proper descendants of vj in K, and therefore vj is not their parent. Then, since C(uj ) ⊆ C(vj ) = {ij , . . . , ik , i}, by (4) we conclude that i ∈ C(uj ) and hence, since uj does not belong to K, by Lemma 10.(f) we conclude that uj is an ancestor of u, which is impossible. This shows that vj does not have 30 any child outside K different from ij , and moreover, since ij is a descendant of vj , that it is its child. Lemma 19. The Gi;i1 ,...,ik ;i′1 ,...,i′ ′ reduction (with k > k′ > 0) can be applied to N k if, and only if, the following conditions are satisfied: (1) (2) (3) (4) {i} ∈ / CI (N ). For every j = 1, . . . , k, {ij , . . . , ik | i} ∈ θ(N ) with multiplicity 1. For every j = 1, . . . , k′ , {i′j , . . . , i′k′ | i} ∈ θ(N ) with multiplicity 1. For every θ(v) ∈ θI (N ), if C(v) contains some label among i1 , . . . , ik , i′1 , . . . , i′k′ and θ(v) is not listed in (2) or (3), then either i, i1 , . . . , ik , i′1 , . . . , i′k′ ∈ A(v) or i, i1 , . . . , ik , i′1 , . . . , i′k′ ∈ B(v). Proof. If N contains a reticulation cycle K consisting of the merge paths (u, v1 , . . . , vk , h) and (u, v1′ , . . . , vk′ ′ , h) such that the hybrid node h is the leaf i and each tree node vj (respectively, vj′ ) has only one child outside K and it is the tree leaf ij (respectively i′j ), then, by Lemma 9.(a), {i} ∈ / CI (N ), and θ(vj ) = {ij , . . . , ik | i}, j = 1, . . . , k θ(vj′ ) = {i′j , . . . , i′k′ | i}, j = 1, . . . , k′ and hence N satisfies (1)–(3). The rest of the ‘only if’ implication can be proved as in Lemma 18. Conversely, assume that (1)–(4) are satisfied. To begin with, let us prove that i is a hybrid leaf. Indeed, if it were a tree leaf, then its parent v would be a strict ancestor of i, and therefore θ(v) would be none of the tripartitions listed in (2) or (3). On the other hand, v would be a descendant of the node w having tripartition {ik | i}, which would imply, since {i} = 6 C(v) by (1), that ik ∈ C(v). Then, by (4) and since i ∈ A(v), ik would also be a strict descendant of v . This would imply that w is a strict ancestor of v: any path r v not containing w followed by a path v ik (that does not contain w because w is an ancestor of v) would form a path r ik not containing w, against the assumption that ik ∈ A(w). But then the tree child i of v would be also a strict descendant of w, which would contradict the assumption that i ∈ B(w). Let us also denote by h this hybrid leaf labeled with i, so that C(h) = {i}. Since we can still apply Lemma 10, the same argument as in the proof of the ‘if’ implication in Lemma 18 implies that the reticulation cycle K for h consists of two merge paths (u, v1 , . . . , vk , h) and (u, v1′ , . . . , vk′ ′ , h) such that C(vj ) = {ij , . . . , ik , i}, for every j = 1, . . . , k, and C(vj′ ) = {i′j , . . . , i′k′ , i} for every j = 1, . . . , k′ . The proof that the only child of every vj (respectively, vj′ ) not belonging to K is the corresponding tree leaf ij (respectively, i′j ) is also similar to the one given for the corresponding fact in Lemma 18, and we do not repeat it here. Lemmas 16 to 19 prove condition (A) in Lemma 6 for the R, T , G, and G reductions and the tripartitions representation. As far as point (R) goes, it is a consequence of the following lemma. 31 Lemma 20. (a) If the Ri;j reduction can be applied to N , then θ(Ri;j (N )) is obtained by removing the tripartitions {i | ∅} and {j | ∅} from θ(N ), and then removing the label j from all remaining tripartitions in θ(N ). (b) If the Ti;j reduction can be applied to N , then θ(Ti;j (N )) is obtained by removing the label j from all tripartitions in θ(N ). (c) If the Gi;i1 ,...,ik ;i′1 ,...,i′ ′ reduction can be applied to N , then θ(Gi;i1 ,...,ik ;i′1 ,...,i′ ′ (N )) k k is obtained by first removing from θ(N ) all tripartitions listed in points (1)–(3) of Lemma 18 and the tripartitions {i2 | ∅}, . . . , {ik | ∅}, {i′1 | ∅}, . . . , {i′k′ | ∅}, and then removing the labels i2 , . . . , ik , i′1 , . . . , i′k′ from all remaining tripartitions. (d) If the Gi;i1 ,...,ik ;i′1 ,...,i′ ′ reduction can be applied to N , then θ(Gi;i1 ,...,ik ;i′1 ,...,i′ ′ (N ) k k is obtained by first removing from θ(N ) all tripartitions listed in point (2) of Lemma 19 and the tripartitions {i2 | ∅}, . . . , {ik | ∅}, {i′1 | ∅}, . . . , {i′k′ | ∅}, and then removing the labels i2 , . . . , ik , i′1 , . . . , i′k′ from all remaining tripartitions. ⊓ ⊔ A4 Proof of Theorem 4 We also split the proof of Theorem 4 into several lemmas, in parallel to the preceding subsections. In the rest of this subsection, N stands for a semibinary 1-nested network on S = {1, . . . , n}. Notice that all leaves in N are of tree type. For every pair of nodes u, v in N , we shall denote by CA(u, v) the set of common ancestors of u and v. By Lemma 8, [u, v] is the element of CA(u, v) that is a descendant of all other nodes in this set. The following result summarizes what Lem. 5 and Cor. 4 in [11] say about N . Although these results were stated therein for tree-child time consistent evolutionary networks with out-degree 1 hybrid nodes, it is straightforward to check that the time consistency is not used anywhere in their proofs, and therefore their thesis also holds for tree-child (and, in particular, for 1-nested) semibinary hybridization networks. In the following statement, and henceforth, by saying that a leaf j is a quasi-sibling of a leaf i, we mean that the parent of j is a hybrid node that is a sibling of i: cf. Fig. 11. j i Fig. 11. j is a quasi-sibling of i. Lemma 21. Let i, j be any labels in S. (a) ℓN (i, j) = 1 if, and only if, the parent of i is an ancestor of j. 32 (b) The leaves i, j are siblings if, and only if, ℓN (i, j) = ℓN (j, i) = 1. (c) The leaf j is a quasi-sibling of the leaf i if, and only if, ℓN (i, j) = 1, ℓN (j, i) = 2, and ℓN (j, k) > 1 for every k ∈ S \ {i, j}. ⊓ ⊔ As a consequence of this lemma, we have the following results. Lemma 22. The Ri;j reduction can be applied to N if, and only if, ℓN (i, j) = ℓN (j, i) = 1 and ℓN (i, k) > 1 for every k ∈ S \ {i, j}. Proof. The Ri;j reduction can be applied to N if, and only if, i, j are sibling leaves and their parent has out-degree 2. By the previous lemma we already know that ℓN (i, j) = ℓN (j, i) = 1 if, and only if, i, j are sibling leaves. Thus, it only remains to prove that the parent of i and j has out-degree 2 if, and only if, ℓN (i, k) > 1 for every k ∈ S \ {i, j}. Now, if there is a leaf k 6= j such that ℓN (i, k) = 1, then the parent of i and j is also an ancestor of k, which means that it has out-degree at least 3. Conversely, if the parent of i and j has out-degree at least 3 and v is a child of it other than i, j, then ℓN (i, k) = 1 for every descendant leaf k of v. A similar argument, using that the Ti;j reduction can be applied to N if, and only if, i and j are tree sibling leaves and their parent has some other child, proves the following result. Lemma 23. The Ti;j reduction can be applied to N if, and only if, ℓN (i, j) = ℓN (j, i) = 1 and there exists some k ∈ S \ {i, j} such that ℓN (i, k) = 1. ⊓ ⊔ We have now the following lemmas for the G reductions. Lemma 24. The Gi;i1 ,...,ik ;∅ reduction can be applied to N if, and only if, the following conditions are satisfied: (1) (2) (3) (4) (5) (6) ℓN (i, l) > 1 for every l ∈ S \ {i}. ℓN (ik , i) = 1 and ℓN (i, ik ) = 2. For every j = 1, . . . , k − 1, ℓN (ij , ij+1 ) = 1 and ℓN (ij+1 , ij ) = 2. For every j = 1, . . . , k and for every l 6= ij , ..., ik , i, ℓN (ij , l) > 1. For every j = 1, . . . , k, ℓN (i, ij ) = k − j + 2. For every l ∈ / {i, i1 , ..., ik }, ℓN (i, l) = ℓN (i1 , l) and ℓN (l, i) = ℓN (l, i1 ). Proof. Assume that N contains a reticulation cycle K consisting of the merge paths (u, v1 , . . . , vk , h) and (u, h) such that the only child of the hybrid node h is the leaf i and each tree node vj has only one child outside K, and it is the tree leaf ij . Then, (1) and (2) are satisfied because i is a quasi-sibling of ik , (3) is satisfied because the parent vj+1 of each ij+1 is a sibling of ij , (4) is satisfied because the only descendant leaves of the parent vj of ij are ij , ij+1 , . . . , ik , i, and (5) is satisfied because [ij , i] = vj and the only path vj i has length k −j +2. As far as condition (6) goes, let l be any label different from i, i1 , . . . , ik . Then, l is not a descendant of v1 and therefore every common ancestor of i or i1 and l must be an ancestor of 33 u. This implies that CA(i, l) = CA(u, l) = CA(i1 , l), from where we deduce that [i, l] = [u, l] = [i1 , l]. This clearly implies that ℓN (l, i) = ℓN (l, i1 ). On the other hand, any shortest path [u, l] i will consist of a shortest path [u, l] u followed by the path (u, h, i), and any shortest path [u, l] i1 will consist of a shortest path [u, l] u followed by the path (u, v1 , i1 ), which implies that ℓN (i, l) = ℓN (i1 , l). Conversely, assume that N satisfies conditions (1) to (6). Then, conditions (1) and (2) imply that i is a quasi-sibling of ik : let h be the hybrid parent of i and let vk be the parent of ik and h, which will be a tree node because it has out-degree at least 2. Now, condition (3) implies that, for every j = 1, . . . , k − 1, the parent of ij is also parent of the parent of ij+1 : if we let vj be the parent of ij , for every j = 1, . . . , k − 1, we obtain a path (v1 , . . . , vk ) consisting of tree nodes (because each node in it has out-degree at least 2) and such that each vj is the parent of the leaf ij . Now, vk may be either intermediate in the reticulation cycle K for h or the split node of K (in which case one of the merge paths would be the arc (vk , h)). But, if the latter happened, h would have another parent v and it would be a descendant of vk , and then, any tree descendant leaf l of v would be such that ℓN (ik , l) = 1, which would contradict (4). This implies that vk is intermediate in K. Let now v be the other parent of h, and assume that it is intermediate in the merge path of K not containing vk . Let l be a tree descendant leaf of v. By Lemma 10.(d), l ∈ / {i1 , . . . , ik }. Then, by (6), ℓN (i1 , l) = ℓN (i, l) = 2 and ℓN (l, i) = ℓN (l, i1 ). But the latter condition implies that [l, i1 ] = [l, i] = v, and then the former implies that v is the parent of v1 , which would imply that i1 ∈ C(v), leading to a contradiction again by Lemma 10.(d). We conclude that the merge path not containing vk is a single arc. In particular, this implies that no node v1 , . . . , vk−1 is the split node of K: if vj were the split node of K, then ℓN (i, ij ) = 2, against (5). So, the split node u of K is a proper ancestor of v1 . Let us see that u is the parent of v1 . Indeed, if u were not the parent w of v1 , then w would be intermediate in the merge path u v1 h: let w′ be a child of w outside K, and let l be a tree descendant leaf of w′ . Then, since l ∈ / {i, i1 , . . . , ik }, (6) would imply that ℓN (i, l) = ℓN (i1 , l) = 2, while it is clear that ℓN (i, l) = k + 2 (because [l, i] = w and the only path w i, along the merge path, has length k + 2). In summary, we have proved so far that if N satisfies conditions (1) to (6), then it contains a reticulation cycle for the hybrid parent h of i consisting of the merge paths (u, v1 , . . . , vk , h) and (u, h), and that each vj is the parent of the tree leaf ij . It remains to prove that v1 , ..., vk have out-degree 2. But, if some vj had some child wj other than ij or its child in K, and if l were a tree descendant leaf of wj , then l ∈ / {i, ij , . . . , ik } but ℓN (ij , l) = 1, against (4). Lemma 25. The Gi;i1 ,...,ik ;i′1 ,...,i′ ′ reduction (with k > k′ > 0) can be applied to N k if, and only if, the following conditions are satisfied: (1) ℓN (i, l) > 1 for every l ∈ S \ {i}. (2) ℓN (ik , i) = 1 and ℓN (i, ik ) = 2. 34 (2’) (3) (3’) (4) (4’) (5) ℓN (i′k′ , i) = 1 and ℓN (i, i′k′ ) = 2. For every j = 1, . . . , k − 1, ℓN (ij , ij+1 ) = 1 and ℓN (ij+1 , ij ) = 2. For every j = 1, . . . , k′ − 1, ℓN (i′j , i′j+1 ) = 1 and ℓN (i′j+1 , i′j ) = 2. For every j = 1, . . . , k and for every l 6= ij , ..., ik , i, ℓN (ij , l) > 1. For every j = 1, . . . , k′ and for every l 6= i′j , ..., i′k′ , i, ℓN (i′j , l) > 1. ℓN (i1 , i′1 ) = ℓN (i′1 , i1 ) = 2. Proof. Assume that N contains a reticulation cycle K consisting of the merge paths (u, v1 , . . . , vk , h) and (u, v1′ , . . . , vk′ ′ , h), with k > k′ > 0, such that the only child of the hybrid node h is the leaf i, each tree node vj has only one child outside K, and it is the tree leaf ij , and each tree node vj′ has only one child outside K, and it is the tree leaf i′j . The proof that it satisfies the conditions (1) to (4) and (1’) to (4’) is similar to the corresponding proof in the previous lemma, and (5) is a direct consequence of the fact that [i1 , i′1 ] = u (because v1 and v1′ are not connected by a path by Lemma 10.(a)) . Conversely, assume that N satisfies all conditions listed in the statement. Conditions (1), (2) and (2’) imply that i is a quasi-sibling of ik and i′k′ : let h be the hybrid parent of i, and let vk and vk′ ′ be, respectively, the parents of ik and i′k′ . As in the previous lemma, conditions (3) and (3’) imply the existence of paths (v1 , . . . , vk ) and (v1′ , . . . , vk′ ′ ) consisting of tree nodes and such that each vj is the parent of the leaf ij and each vj′ is the parent of the leaf i′j . Now, no node v1 , . . . , vk , v1′ , . . . , vk′ is the split node of K: if, say, vj were the split node of K, then in particular vk′ ′ , and hence i′k′ , would be a descendant of vj , which would imply that vj = [ij , i′k′ ] and thus ℓN (ij , i′k′ ) = 1, against (4). Therefore, the split node of K is a common ancestor of v1 and v1′ . Now, (6) implies that [i1 , i′1 ] is simultaneously the parent of v1 and v1′ , and therefore that this parent is the split node u of K. Finally, the proof that the intermediate nodes of K have out-degree 2 is similar to the proof of the corresponding fact in the previous lemma, using (4) and (4’). Lemmas 22 to 25 imply that the possibility of applying a specific R, T or G reduction to N depends only on ℓ(N ), from where condition (A) in Theorem 4 follows. As far as condition (R) goes, we have the following lemma. Lemma 26. (a) If the Ri;j reduction can be applied to N , then, for every k, l ∈ S \ {j}, – ℓRi;j (N ) (i, k) = ℓN (i, k) − 1 if k 6= i. – ℓRi;j (N ) (k, i) = ℓN (k, i) if k 6= i. – ℓRi;j (N ) (k, l) = ℓN (k, l) if k, l 6= i. (b) If the Ti;j reduction can be applied to N , then, for every k, l ∈ S \ {j}, ℓTi;j (N ) (k, l) = ℓN (k, l). (c) If the Gi;i1 ,...,ik ,i′1 ,...,i′ ′ reduction (with k > k′ > 0) can be applied to N , then, k for every j, l ∈ S \ {i2 , . . . , ik , i′1 , . . . , i′k′ }, 35 – ℓGi;i (i, j) = ℓN (i1 , j) − 1 if j 6= i1 , i – ℓGi;i (j, i) = ℓN (j, i) if j 6= i1 , i – ℓGi;i (i1 , j) = ℓN (i1 , j) − 1 if j 6= i1 , i – ℓGi;i (j, i1 ) = ℓN (j, i1 ) if j 6= i1 , i – ℓGi;i (i, i1 ) = ℓN (i1 , i) = 1 – ℓGi;i (j, l) = ℓN (j, l) if j, l 6= i1 , i ′ (N ) ′ 1 ,...,ik ,i1 ,...,ik′ ′ ′ (N ) 1 ,...,ik ,i1 ,...,ik′ ′ ′ (N ) 1 ,...,ik ,i1 ,...,ik′ ′ ′ (N ) 1 ,...,ik ,i1 ,...,ik′ ′ ′ (N ) 1 ,...,ik ,i1 ,...,ik′ ′ ′ (N ) 1 ,...,ik ,i1 ,...,ik′ Proof. (a) Ri;j (N ) is obtained by removing the leaf j and replacing the leaf i by its parent. This implies that, for every pair of remaining leaves, their LCA is the same node in N and in Ri;j (N ), and that any path ending in i is shortened in one arc, while all paths ending in any other remaining leaf are left untouched. The formulas for ℓRi;j (N ) given in the statement follow immediately from these observations. (b) Ti;j (N ) is obtained by removing the leaf j without modifying anything else. This implies that, for every pair of remaining leaves, their LCA is the same node in N and in Ti;j (N ) and no path ending in a remaining leaf is modified, and therefore that ℓTi;j (N ) = ℓN on S \ {j}. (c) Let us denote by N ′ the network Gi;i1 ,...,ik ,i′1 ,...,i′ ′ (N ), and let u be the split k node of the removed reticulation cycle. We remove all (and only) descendants of u, and we add to u two new tree leaf children i and i1 . This implies that the LCA in N ′ of i and i1 is u (and therefore ℓN ′ (i, i1 ) = ℓN ′ (i1 , i) = 1) and that the LCA of any other pair of remaining leaves is the same node in N ′ as in N . On the other hand, any path ending in i1 is shortened in one arc, the distance from any internal node to i in N ′ is the same as its distance to i1 , and all paths ending in remaining leaves other than i or i1 are not touched. From these observations, the formulas for ℓN ′ given in the statement easily follow. 36
5cs.CE
Languages of Play Towards semantic foundations for game interfaces Chris Martens Matthew A. Hammer North Carolina State University Raleigh, NC [email protected] arXiv:1703.05410v1 [cs.PL] 15 Mar 2017 ABSTRACT Formal models of games help us account for and predict behavior, leading to more robust and innovative designs. While the games research community has proposed many formalisms for both the “game half” (game models, game description languages) and the “human half” (player modeling) of a game experience, little attention has been paid to the interface between the two, particularly where it concerns the player expressing her intent toward the game. We describe an analytical and computational toolbox based on programming language theory to examine the phenomenon sitting between control schemes and game rules, which we identify as a distinct player intent language for each game. KEYWORDS game interfaces, programming languages, formal methods 1 INTRODUCTION To study how players interact with games, we examine both the rules of the underlying system and the choices made by the player. The field of player modeling has identified the value in constructing models of player cognition: while a game as a self-contained entity can allow us to learn about its mechanics and properties as a formal system, we cannot understand the dynamics of that system unless we also account for the human half of the equation. Meanwhile, Crawford [6] identifies the necessity of looking at the complete information loop created between a player and a digital game, defining interactivity in games as their ability to carry out a conversation with a player, including listening, processing, and responding, identifying the importance of all three to the overall experience. Given this understanding of games-as-conversation, we should expect to discover something like a language through which games and players converse. In Figure 1, we illustrate the game-player loop as a process which includes an interface constituting such a language. The Game Ontology Project [22] describes game interfaces as follows: The interface is where the player and game meet, the mapping between the embodied reactions of the player and the manipulation of game entities. It refers to both how the player interacts with the game and how the game communicates to the player. The first part, how the player interacts with the game, is called the input, which is further subdivided into input device and input method. Input devices are hardware controllers (mice, keyboards, joysticks, , © 2017 Copyright held by the owner/author(s). University of Colorado Boulder Boulder, CO [email protected] etc.) and input methods start to brush the surface of something more semantic: they include choices about locus of manipulation (which game entities can the player control?) and direct versus indirect action, such as selecting an action from a menu of options (indirect) versus pressing an arrow key to move an avatar (direct). However, any close look at interactive fiction, recent mobile games, or rhythm games (just to name a few examples) will reveal that design choices for input methods have much more variety and possibility than these two dimensions. In this paper, we propose a framework to support analyzing and exploring that design space. Our first step is to refine input methods to input languages: we are ultimately asking, how can a player communicate their intent, and how does a digital game recognize this intent? So, in linguistic terms, the “phonemes” of such a language are hardware controls such as button presses and joystick movement. Then, the syntax and semantics are defined by each game individually, depending on what meaning they give to each control input. This language defines the verbs of the game, which may include moving, selecting inventory items, examining world items, applying or using items, entering rooms, and combat actions. (Note that such a language is also distinct from a game’s mechanics: mechanics include system behavior which is out of the player’s control, such as falling with gravity, non-player character actions, and other autonomous behavior.) This language is both afforded by the game designer—she must communicate to players which verbs are available—and constrained by her—she may declare certain expressions invalid. Since the constraints on such a language are wholly determined by a piece of software (the game interface), we argue that it has more in common with a programming language1 (PL) than a natural language. Accordingly, each game in some sense defines its own programming language. In a slogan, we could term this project games as programming languages. Specifically, we propose player intent languages as a PL-inspired framework for designing playergame interfaces. This analogy opens up a whole field of methodology to try applying to games. The PL research community has a long and deep history of assigning mathematically formal semantics to languages and analyzing those semantics. As games researchers become more interested in the emergent consequences of the systems they assemble, the tools of PL theory have a lot to offer. For example, PL theory provides an account of compositionality, i.e. how fragments of expression fit together to form higher-level meanings. In games, this translates into being able to understand player skills or strategies as compositions of player actions, which we demonstrate in 1 We define programming languages broadly as formal languages whose meaning is fully grounded in a computational system. Chris Martens and Matthew A. Hammer Figure 1: A process diagram of a game loop: player and game conversation as it relates to language, interface, and cognition. this paper by using a formalized input language as a kind of “player AI scripting language.” Furthermore, by considering a player’s language of expression as an object of study in its own right, we center them as a co-designer of the experience afforded by a game. When we treat a player’s interactions as not simply an arbitrary sequence of button presses that advances and reveals the designer’s intent, but instead as its own distinct voice that a game system must listen and respond to, we enable the player to co-create with the system, potentially developing deeper systems understanding and emotional investment. In this paper, we propose player intent languages, a programming languages-based approach to designing player-game interfaces as formal objects. In the remainder of the paper, we tour this approach through concrete examples. Specifically, we consider a simple game design space and make points in this space precise by introducing the components of a programming language: abstract syntax (Section 4), type system (Section 6), and operational semantics (Section 5). For each, we give a corresponding concept in the game world. By grounding these game concepts in analogous programming language concepts, we gain powerful PL reasoning tools and design methodologies to benefit the game design process. We demonstrate the payoff of this line of thought by extending the metaphor with play traces as straight-line programs (Section 7), and player skills as general programs (e.g., programs with parameters, branching and looping) (Section 8). These structures give semantic logs and general strategies, respectively, for accomplishing a task in the game world. The framework of player intention languages gives rise to further research directions, which we briefly outline and discuss before concluding (Sections 9 and 10). 2 RELATED WORK Cardona-Rivera and Young [4] detailed a conceptual framework following the slogan games as conversation, grounding the communicative strategies of games in cognitive science for human-tohuman conversational understanding, such as Grice’s maxims [9]. They offer a linguistic and semiotic approach to understanding how a game communicates affordances (possibilities for action) to a player. For an account of the game’s half of the equation, which includes the visual, textual, and audio feedback mechanisms intended to be processed by the player, this application of linguistics, psychology, and design seems appropriate, much like the study of cinematic language for film. On the other hand, we argue that a PL approach better supports understanding of the player-to-game direction, since the language the player speaks toward a digital game is formal and unambiguous. Researchers have previously recognized the value in formalizing interaction vocabularies, realizing certain interaction conventions as a single “video game description language” [7] whose implementation as VGDL [19] has been used in game AI research. We suggest instead that the design space of player languages is as varied as the design space of programming languages and herein give an account of what it would mean to treat each language individually. Our project suggests that an appropriately expressive computational framework analogous to VGDL should be one that can accommodate the encoding of many such languages, such as a meta-logical framework like the Twelf system for encoding and analyzing programming language designs [18]. Any investigation into formalizing actions within an interactive system shares ideas with “action languages” in AI extending as far back as McCarthy’s situation calculus [13] and including planning languages and process calculi. These systems have been studied in the context of game design, e.g. the Ludocore system [20]; however, AI researchers are mainly interested in these formalisms as internal representations for intelligent systems and the extent to which they support reasoning. Conversely, we are interested their potential to support player expression and facilitate human-computer conversation. Some theoretical and experimental investigations have been carried out about differences between game interfaces along specific axes, such as whether the interface is “integrated” (or one might say Languages of Play diagetic), versus extrinsic to the game world in the form of menus and buttons [11, 12]. These investigations suggest an interest in more detailed and formal ontologies of game interfaces, which our work aims to provide. From the PL research side, we note existing efforts to apply PL methodology to user interfaces, specifically in the case of program editors. Hazelnut is a formal model of a program editor that enforces that every edit state is meaningful (it consists of a well-defined syntax tree, with a well-defined type) [14]. Its type system and editing semantics permit partial programs, which contain missing pieces and well-marked type inconsistencies. Specifically, Hazelnut proposes a editing language, which defines how a cursor moves and edits the syntax tree; the planned benefits of this model range from better editing assistance, the potential to better automate systematic edits, and further context-aware assistance and automation based on statistical analysis of (semantically-rich) corpora of recorded past edits, which consist of traces from this language [15]. Likewise, in the context of game design, we expect similar benefits from the lens of language design. 3 A FRAMEWORK FOR PLAYER INTENT LANGUAGES In the formal study of a programming langugage, one may define a language in three parts: syntax, type system, and operational semantics. • The syntax is written in the form of a (usually) context-free grammar describing the allowable expressions. One sometimes distinguishes between concrete syntax, the literal program tokens that the programmer strings together in the act of programming, and abstract syntax, the normalized “syntax tree” structures that ultimately get interpreted. • An operational semantics defines how runnable programs (e.g. a function applied to an argument) reduce to values. This part of the definition describes how actual computation takes place when programs in the language are run. It is important to note that the operational semantics need not reflect the actual implementation of the language, nor is it specific to a “compiled” versus “interpreted” understanding of the language: it is simply a mathematical specification for how any compiler or interpreter for the language should behave. • A type system further refines the set of syntactically valid expressions into a set of meaningful expressions, and provides a mapping between an expression and an approximation of its meaning. Type systems are usually designed in conjunction with the operational semantics to have the property that every expression assigned a meaning by the type system should have a well-defined runtime behavior. In practice, however, type systems can only approximate this correspondence. Some err on the more permissive side–e.g. C’s type system will permit invalid memory accesses with no language-defined behavior–and some err on the more restrictive side, e.g. Haskell’s type system does not permit any untracked side-effects, at the expense of easily authoring e.g. file input/output (without first learning the details of the type system). Game concept PL concept Syntax Recognized player intents (Section 4) Operational semantics Game mechanics (Section 5) Type system Contextual interface (Section 6) Straight-line programs Play traces (Section 7) General programs Player skills (Section 8) Table 1: Player intent languages: Formal decomposition (left) and correspondances (right). Providing a formal language definition in programming languages research has several purposes. One is that it enables researchers to explore and prove formal properties of their language, such as well-typed programs don’t go wrong, or in a language for concurrency, a property like deadlock freedom. However, an even more crucial advantage of a language specification is not mathematical rigor but human capacity to do science. A language definition is a specification, similar to an application programmer interface (API) or an IEEE standard: it describes an unambiguous interface to the language along an abstraction boundary that other human beings may access, understand, and implement, without knowing the internals of a language implementation. It is a necessary component of reproducibility of research, and it allows researchers to build on each other’s work. We believe that an embrace of formal specification in games research can play a similarly important function. Having provided loose definitions of these terms, we now wish to draw out the analogy between a language specification and a game specification. To treat a game in this manner, we wish to consider player affordances and actions, as well as their behavior (mechanics) in the context of the game’s running environment. We summarize the components of this correspondence in Table 1. We will use as a running example a minimal virtual environment with two player actions: (1) movement through a discrete set of rooms in a pre-defined map (move); (2) acquiring objects placed in those rooms to store in a player inventory (take). We consider five (somewhat aribitrary) possibilities in the design space of interfaces for such a game, summarized visually in Figure 2: • Point-and-Click: A first-person viewpoint interface where the meaning of each click is defined based on the region the cursor falls in. Clicking near any of the four screen edges moves in that direction; clicking on a sprite representing an item takes it. • Bird’s-Eye: A top-down viewpoint interface where the player can see multiple rooms at once, and can click on rooms and objects that are far away, but those clicks only do something to objects in the same room or adjacent rooms. • WASD+: A keyboard or controller-based interface with directional buttons (e.g. arrow keys or WASD) move an avatar in the correspondingi direction, and a separate key or button expresses the take action, which takes any object in the same room. (This interface may be used for either of the two views described above.) Chris Martens and Matthew A. Hammer • Command-Line: The player interacts by typing free-form text, which is then parsed into commands, such as take lamp and move north. • Hypertext: A choice-based interface where all available options are enumerated as textual links from which the player chooses. In the following sections, we will consider these possibilities in light of design choices relevant to the specified aspect of PL design. 4 PLAYER INTENT AS SYNTAX The syntax of a game is its space of recognized player intentions. Note that intention is different from action in the sense that we don’t necessarily expect each well-formed intention to change anything about the game state: a player can intend to move north, but if there is no room to the north of the player when she expresses this intent, no change to the game’s internal state will occur. Nonetheless, depending on the design goals of the game, we may wish to recognize this as a valid intent so that the game may respond in some useful way (e.g. with feedback that the player cannot move in that direction). In our example game, the choice of syntax answers questions such as: can the player click anywhere, or only in regions that have meaning? Can the player type arbitrary commands, or should we provide a menu or auto-complete text so as to prevent the player from entering meaningless commands? In PL, we can formalize these decisions by describing an abstract syntax for our language, which is typically assumed to be context-free and thus specified as a Bachus-Naur Form (BNF) grammar. Our examples below follow the interfaces shown visually in Figure 2. WASD+ Interface: One way of writing the BNF for the WASD+ interface is: syntax as follows (where direction and item are assumed to be defined as they were in the previous examples): intent ::= movehdirectioni | takehitemi Assuming the player “knows the language,” i.e. knows that move and take are valid commands, and in fact the only valid commands, and assuming that she knows how to map the visual affordances (e.g. image of the flask) to the typed noun (e.g. flask), the experience afforded by this interface is quite similar to the WASD+ interface. The main difference is that the player must specify an argument to the take command, asking the player to formulate a more complete (and unambiguous) intent by actually naming the object she wishes to take. Hypertext interface: Finally, we consider the intent language for the hypertext interface. This is one of the most difficult interfaces to formulate in linguistic terms, because it either requires that we formalize link selection in an acontextual way (e.g. as a numeric index into a list of options of unknown size) or that we formulate each link from each page as its own separate command, each of which has meaning in only one specific game context (namely, when the player is on the page containing that link). The former feels like a more general formulation of hypertext that is not relevant to any particular game, and since we are aiming to provide a correspondence between specific games and languages, we opt for the latter: intent ::= selecthchoicei choice ::= take flask from lab | take book from library | go south from lab | go east from lab direction ::= north | south | east | west | go west from lab intent ::= movehdirectioni | collect | go north from library | ... The hardware interface maps onto this syntax quite directly: each arrow key maps onto a move action in the corresponding direction, and the specified other key maps onto collect. Bird’s Eye View Mouse Interface: On the other hand, a clickingbased interface to a top-down map could enable the player to click on any room on the map and any item within a room. This syntax would look like: room ::= item ::= flask | book entity ::= room | item intent ::= clickhentityi courtyard | library | quarters | lab Note that this syntax, compared to that for WASD+, describes a larger set of possible utterances, even though it has the exact same set of permitted game behaviors (a player may only move into adjacent rooms and take items that share a room with them). Command Line Interface: The command-line interface would have an even larger space of expressible utterances if we consider all typed strings of characters to be valid expressions, but that syntax is too low-level for linguistic considerations. Supposing we interpose a parsing layer between arbitrary typed strings and syntactically-well-formed commands, we can define the abstract Some hypertext authors put a lot of effort into scaffolding the choicebased experience with a richer language, e.g. by repeating the same set of commands that behave in consistent ways across different pages, or by creating menu-like interfaces where text cycles between options on an otherwise static page. In this way, hypertext as a medium might be said as providing a platform for designers to create their own interface conventions, rather than relying on a set of pre-established ones; by the same token, hypertext games created by inexperienced interface (or language) designers may feel to players like being asked to speak a foreign language for each new game. Additive and subtractive properties of syntax By now we are able to observe that, just like the rest of a game’s rules, its syntax has both additive and subtractive properties. It provides the menu of options for which hardware interactions are relevant, i.e. likely to result in meaningful interaction with the game system, but it also establishes which utterances within that set are disallowed, or ill-formed—e.g. that it is not meaningful to say “take” without providing an object to the command, or that “take north” is ill-formed. Languages of Play Point-and-click Bird’s eye view/WASD+ Command-line Hypertext Figure 2: Four different user interfaces for the move/take game. Correspondingly, an important decision that impacts game design is (a) how discoverable the additive affordances are (e.g. can the player determine that “examine” is a meaningful verb without already possessing literacy in the game’s genre?) and (b) the extent to which the user interface makes meaningless expressions impossible to form. For example, in a hypertext interface, all links lead somewhere—so every intent the player can form, i.e. clicking a link on the page, will get a valid response from the game, whereas “take fnord” typed at a command-line interface may be recognized by the parser, but meaningless to a game where “fnord” is not a noun. Decisions about these two (related) dimensions will determine the extent to which learning the language, an exploratory but sometimes frustrating process, is a central challenge of the game. 5 GAME MECHANICS AS OPERATIONAL SEMANTICS Consider the right-hand-side of Figure 1: The game parses and interprets an unambiguous syntax of player intent, which either advances the game state (as shown in the figure), or the game state cannot advance as the player intended, which the game somehow signals to the player (not shown). We model a response to the move-take player intent with the following BNF definition, of resp: resp ::= success | failure Figure 1 shows the case where the player intent of “take flask” (formally, the syntax “take”) leads to the game world performing this intent as a successful action, and responding accordingly with “Taken.” Formally, we model this resp as “success,” as defined above. Likewise, if the flask cannot be taken (e.g., the flask is not near the player, or is already in the player’s possession, etc.), the game responds with failure. As with the player’s intent, which may exist as both raw input and as formal syntax, each formal response can be conveyed as raw output in a variety of ways (e.g., as textual words, pictures, or sounds). In real games there are often two two levels of game-toplayer feedback: Feedback through the game world, and feedback outside the game world (e.g., a pop-up message with an error, guidance or advice). For simplicity, move-take gives feedback outside of the game state, e.g., as pop-up messages. To capture the formal relationship between player intent as syntax, and game response as syntax, we introduce a four-place game-step relation: hG 1 ; intenti −→ hG 2 ; respi This relation formalizes the dynamic behavior of the right-handside of Figure 1. It consists of four parts: An initial game state G 1 , a player intent intent, a resulting game state G 2 and a game response resp. As is standard in PL formalisms, we give the rules that define this relation as inductive inference rules, which can each be read as a logical inference. That is, given evidence for the premises on the top of the rule, we may conclude the bottom of the rule. For instance, here are two example rules: G 1 ` playerNear flask playerTake(G 1 , flask) ≡ G 2 hG 1 ; takei −→ hG 2 ; successi Chris Martens and Matthew A. Hammer G ` not playerNear flask  hG; takei −→ hG; failurei The first rule formalizes the case shown in the RHS of Figure 1. The second rule formalizes the opposite outcome, where the flask cannot be taken. Notably, the first rule has two premises: To be taken by the player, it suffices to show that in the current game state G 1 , the flask is near the player (first premise), and that there exists an advanced game state G 2 that results from the player taking this flask (second premise). In the second rule, there is only one game state G, since the flask cannot be taken and consequently, the game state does not change. Like the syntax of player intent and game responses, these rules are also unambiguous. Consequently, we view these rules as a mathematical definition with an associated strategy for constructing formal (and informal) proofs about the game mechanics. For instance, we can formally state and attempt to prove that for all player intents intent and game worlds, G 1 , there exists a corresponding game world G 2 and game response resp. That is, the statement of the following conjecture: ∀G 1 , intent. ∃G 2 , resp. hG 1 ; intenti −→ hG 2 ; respi Using standard PL techniques, the proof of this conjecture gives rise to an abstract algorithm that implements the game mechanics by analyzing each possible case for the current game-state and player intent. Indeed, this is precisely the reasoning required to show that an implementation of the game is complete (i.e., there exists no state and input that will lead the game into an undefined situation). Reasoning about this completeness involves reasoning about when each rule is applicable. For instance, the rule for a successful player intent of take requires two premises: G 1 ` playerNear flask and playerTake(G 1 , flask) ≡ G 2 . The first is a logical judgment about the game world involving the proposition playerNear flask, which may or may not be true, but which is computable. The second is a semantic function that transforms a game state into one where the player takes a given object; in general, this function may be undefined, e.g., if the arguments do not meet the function’s pre-conditions. For instance, a precondition of the function playerTake(−, −) may be that the object is not already in the possession of the player. In this case, to show that the game mechanics do not “get stuck”, we must show that playerNear flask implies that the player does not already posses the flask. (Otherwise, we should add another rule to handle the case that the player intends to take the flask but already possesses it). The design process for programming language semantics often consists of trying to write examples and prove theorems, and failing; these experiences inform systematic revisions to the language definition. In the next section, we refine intents and semantics further by introducing the notion of a context. 6 CONTEXTUAL INTERFACES AS TYPE SYSTEMS Decisions about interface syntax can, to some extent, limit or expand the player’s ability to form intents that will be met with failure, such as moving through a wall or taking an object that does not exist. But sometimes, whether an utterance is meaningful or not will depend on the runtime game state, and can be considered a distinct question from whether it is well-formed. For example, whether or not we can take flask depends on whether the flask is present, but if the flask is an object somewhere in the game, we must treat this command as well-formed syntax and relegate its failure to integrate with the runtime game environment to the mechanics (operational semantics). However, some user interfaces nonetheless restrict the set of recognized utterances in a way that depends on current game state. Consider a point-and-click interface that changes the shape of the cursor to a hand whenever it hovers over an interactable object, and only recognizes clicks when it is in this state. Alternatively, consider the hypertext interface, which only recognizes clicks on links made available in the current page. Providing the player with only the option of saying those utterances that “make sense” in this regard corresponds to a strong static type system for a programming language. Type systems are typically formalized be defining a relation between expressions e and contexts Γ. Contexts are sets of specific circumstances in which an expression is valid, or well-typed. Usually, these circumstances have to do with variables in the program. For example, the program expression x + 3 is only well-typed if x is a number. “x is a number” is an example of a fact that would be contained in the context. Its well-typedness could be represented as x:num ` x + 3 ok. In the move-take game, we can include aspects of game state in our context, such as the location of the player and the adjacency mapping between rooms in the world. An example of a typing rule we might include to codify the “only present things are takeable” rule would be: Γ ` playerIn(R) Γ ` at(O, R) Γ ` takehOi ok We then need to define a relation between concrete game states G and abstract conditions on those states, Γ. We might write this relation G : Γ. After such rules are codified, we can refine the “game completeness” conjecture to handle only those utterances that are well-typed: ∀G 1 , intent. =⇒ ∃G 2 , resp. (G 1 : Γ) ∧ (Γ ` intent ok) hG 1 ; intenti −→ hG 2 ; respi This is nearly what we want to know about our game mechanics. However, we want to apply this reasoning iteratively as the game progresses, so that we reason next about the player intention that leads from game state G 2 to another possibly different game state G 3 ; but what context for player intent describes state G 2 ? For this reasoning to work, we generally need to update the original context Γ, possibly changing its assumptions, and creating Γ 0 . We write Γ ⊆ Γ 0 to mean that Γ 0 succeeds Γ in a well-defined way. Given that state G 1 and intent agree about the context of assumptions Γ, we wish to show that there exists a successor context Γ 0 that agrees with the new game state G 2 : =⇒ ∀G 1 , intent. ∃Γ 0, G 2 , resp. (G 1 : Γ) ∧ (Γ ` intent ok)  hG 1 ; intenti −→ hG 2 ; respi ∧(G 2 : Γ 0 ) ∧ (Γ ⊆ Γ 0 ) This statement closely matches the usual statement of progress for programming languages with sound type systems. Languages of Play 7 PLAY TRACES AS STRAIGHT-LINE PROGRAMS If we consider the analogy of game interfaces as programming languages, the natural question arises, what is a program written in this programming language? We want to at least consider individual, atomic player actions to be complete programs; the preceding text provides such an account. But typical programs are more than one line long—what does it mean to sequence multiple actions in a game language? In a typical account of an imperative programming language, we introduce a sequencing operator ; where, if c 1 and c 2 are commands in the language, then c 1 ; c 2 is also a command. The operational semantics of such a command involves the composition of transformations on states σ : hσ ; c 1 i −→ σ1 hσ1 ; c 2 i −→ σ2 hσ ; (c 1 ; c 2 )i −→ σ2 However, interactive software makes this account more complicated by introducing the program response as a component. Instead of issuing arbitrary commands in sequence, the player may wait for a response or process responses in parallel with their decisions. In this respect, a player’s “programming” activity more closely resembles something like live-coding than traditional program authoring. Execution of code happens alongside its authorship, interleaving the two activities. If we consider a round-trip through the game loop after each individual command issued, then what we arrive at is a notion of program that resembles a play trace: a log of player actions and game responses during a play session, e.g. PLAYER: go north GAME: failure PLAYER: take flask GAME: success PLAYER: go south GAME: success Depending on the richness of our internal mechanics model, this play trace may contain useful information about changes in internal state related to the preconditions and effects of player actions. But the main important thing to note is that, despite the informal syntax used to present them here, these traces do not consist of strings of text entered directly by the player or added as log information by the game programmer—they are structured terms with abstract syntax that may be treated to the same formal techniques of interpretation and analysis as any program. And this syntax is at a high level of game-relevant interactions, not at the level of hardware inputs and engine code. Researchers in academia and the games industry alike have recently been increasingly interested in play trace data for the sake of analytics, such as understanding how their players are interacting with different components of the game and responding to this information with updates that support player interest [8]. For the most part, this trace data is collected through telemetry or other indirect means, like game variable monitoring, after which it must be analyzed for meaning [3]. More recently, systems of structured trace terms that may be analyzed with logical queries have been proposed [16], identifying as a benefit an ability to support automated Figure 3: A screenshot from BOTS, an educational game in which players write programs to direct a player avatar. testing at the level of design intents. Our PL analogy supports this line of inquiry and warrants further comparison and collaboration. 8 PLAYER SKILLS AS GENERAL PROGRAMS While considering “straight-line” traces may have some utility in player analytics, a more exciting prospect for formalizing game interactions as program constructs is the possibility of encoding parameterized sequences of actions that may carry out complex tasks. After all, games with rich player action languages afford modes of exploratory and creative play: consider item crafting in Minecraft [17], puzzle solving in Zork [2], or creating sustainable autonomous systems like a supply chain in Factorio [21], a farm in Stardew Valley [1], or a transit system in Mini Metro [5]. Each of these activities asks the player to understand a complex system and construct multi-step sequences of actions to accomplish specific tasks. From the player’s perspective, these plans are constructed from higher-level activities, such as growing a crop or constructing a new tool, which themselves are constructed from the lower level game intent language. A language, as we have formalized it, gives us the atomic pieces from which we can construct these sequences, like Lego bricks can be used to construct reconfigurable components of a house or spaceship. Compositionality in language design is the principle that we may understand the meaning and behavior of compound structures (e.g. sequences) in terms of the meaning and behavior of each of its pieces (e.g. actions), together with the meaning of how they are combined (e.g. carried out one after the other, or in parallel). In this section, we describe how we might make sense of player skills in terms of programs written in a more complex version of the player language. Such programs might be integrated into a game’s mechanics so that a player explicitly writes such programs, as in the BOTS game, an interactive programming tutor that asks players to write small imperative programs that direct an avatar within a virtual Chris Martens and Matthew A. Hammer syntax: intent Figure 4: A screenshot from Stardew Valley showing the player’s farm, inventory, and avatar. world [10] (see Figure 3), or Cube Composer2 , in which players write functional programs to solve puzzles. However, for now, we primarily intend this account of player skills as a conceptual tool. 8.1 Example: Stardew Valley Our initial {move, take} example is too simple to craft really compelling examples of complex programs, so here we examine Stardew Valley and its game language for the sake of considering player skills. In Stardew Valley, the player has an inventory that permits varied interactions with the world, beginning with a number of tools for farming (axe, hoe, scythe, pickaxe) which do different things in contact with the resources in the surrounding environment; most include extracting some resource (wood, stone, fiber, and so on), which themselves enter the player’s inventory and can be used in further interaction with the game world. The player’s avatar is shown on-screen, moved by WASD. There are also context-sensitive interactions between the player and non-player characters (NPCs), interfaces through which new items may be purchased (shops), and mini-games including fishing (fish may also be sold at high value). See Figure 4 for a typical player view of the game. While a full account of the language that this game affords the player is beyond the scope of this paper, we include a representative sample of the actions and affordances found in this game that may be used to construct player skills. These include: directional avatar movement within and between world “rooms,” point-andclick actions for selecting items in one’s inventory, and interacting with in-room entities. The player avatar must be near an entity for the player to interact with it. They can then either apply the currently-selected inventory item to the in-world entity with a left-button click, or right-button click, which does something based on the entity type, e.g. doors and chests open, characters speak, and collectible items transfer to the player’s inventory. We refer to this last action as inquire. We also note that, for the sake of our example, movement towards an entity and movement offscreen (towards another room) are the only meaningful and distinct types of movement, which we refer to as move near and move offscreen. These actions yield the following 2 http://david-peter.de/cube-composer/ ::= selecthitemi | applyhentityi | inquirehentityi | move nearhentityi | move offscreenhdirectioni We leave the definition of items and entities abstract, but we could imagine it to simply list all possible items and entities in the world as terminal symbols. From these atomic inputs, we can start to construct higher-level actions performed in the game most frequently— tilling land, planting seeds, conversing with NPCs, and so on. These blocks of code may be assigned names like functions to be called in many contexts: action till action action action action = select hoe; move_near hard_ground; apply hard_ground plant = select seeds; move_near tilled_ground; apply tilled_ground mine = select pickaxe; move_near rock; apply rock talk = move_near npc; inquire npc enter_shop = move_near shop; inquire door(shop) In turn, these larger skill molecules may be combined to accomplish specific tasks or complete quests. 8.2 Branching programs as skills and strategies Note that we have naively sequenced actions without consideration for the game’s response. This approach to describing player skills does not take into account the possbility of a failed attempt, such as attempting to mine when there are no rocks on the current screen. One could simply assign a semantics to these sequences of action that threads failure through the program—if we fail on any action, the whole compound action fails. However, we can go further with describing robust player skills and strategies if we consider the possibility of handling failure, a common feature of day-to-day programming and indeed of gameplay. Recall our simplified game response language consisting of two possibilities, success and failure. We can introduce a case construct into our language to handle each of these possibilities as a distinct branch of the program: action mine = response = select pickaxe; case(response): success => { response' = move_near rock; case(response'): success => apply rock; | failure => fail; } | failure => fail; However, to avoid handling failure at every possible action, a better approach is to explicitly indicate as parameters the world resources that each action needs in order to complete successfully. The overall action definition for mining, or example, would require as a precondition to the action that a pickaxe is available in the player Languages of Play Figure 6: Growing a crop. Figure 5: Watering a crop until it may be harvested. try_harvest(g) inventory and a rock is in the same room. The actions for selecting the pickaxe and moving near the rock would depend on these resources, and the game response language could include the resources it guarantees as outputs. Then we can write the program using simpler notation that refers to resource dependencies of the appropriate type (using notation resource : type): action mine(p:pickaxe, r:rock) = select p; move_near r; apply r : mineral This notation together with a branching case construct scales to include nondeterminism in the game world, such as the fishing minigame in Stardew Valley: the game always eventually tells the player that something is tugging at her line, but some portion of the time it is a fish while the rest of the time it is trash. These constructs can also account for incomplete player mental models, such as knowing that one must water her seeds repeatedly day after day in order to grow a crop, but not knowing how many times. Below, we present a notation that accounts for these aspects of player skills: a do ... recv ... notation indicates a command and then binds the response to a pattern, or structured set of variables, which can then be case-analyzed. Our first example is watering a crop until it may be harvested: action water_until_harvestable[t](p: planted(t)) : crop(t) = do try_harvest(p) recv <result: crop(t) + growing(t)>. case result of c:crop(t) => c | g:growing(t) => water(g); wait(day); See Figure 5 for a control flow diagram of this code. The next example shows a parallel construct ||, which can be used to compose actions with distinct dependencies, as well as how an action definition may use other action definitions by threading resource dependencies through as arguments: fun grow_crop[t : croptype](s:soil, w:watering_can) : crop(t) = do get_seeds(t) || till_soil(s) recv <s: seeds(t), g: tilled_soil>. do plant(s, g) recv <p: planted(t)>.water_until_harvestable(p) See Figure 6 for a control flow diagram of this code. 9 DISCUSSION Having established a vocabulary of syntax and semantics for player languages, we can now revisit the potential benefits of this account mentioned in the introduction and discuss them in more detail. 9.1 Composing play traces, player skills One of the major things that a programming language account provides is compositionality: a system for making sense of meaning of a complex artifact in terms of the meaning of its pieces. This comes up in two places for looking at games: Structured play traces. With a formalized game language, the sequence of steps along the transition system described by the operational semantics forms a mathematical artifact that is subject to deeper analysis than what can be gained simply from screen or input device recordings. For example, we can carry out causal analysis, asking “why” queries of trace data, e.g. “Why was the Chris Martens and Matthew A. Hammer player able to unlock the door before defeating the boss?”, as well as filtering traces for desired properties: “Show me a play trace where the player used something other than the torch to light the room.” The recent PlaySpecs project [16] suggests interest in formulating traces this way to support this kind of query. Player skills as programs. While a play trace may be interpreted as a straight-line program, even more interesting is the idea of latent structure in player actions, such as composing multiple low-level game actions into a higher-level skill, following the cognitive idea of “chunking.” We map this idea onto that of functions in the programming language that take arguments, generalizing over state space possibilities (e.g.: the red key opened the red door, so for all colors C, a C key will open a C door). Further reasoning forms like case analysis to handle unpredictable game behavior and repeating an action until a condition holds are also naturally expressed as programming language constructs. and concurrent systems that may benefit from the protocol-based approach proposed here. 10 CONCLUSION We propose player intent languages, a systematic framework for applying programming language design principles to the design of player-game interfaces. We define this framework through simple examples of syntax (aka player intents), type systems (aka contextual interfaces) and operational semantics (aka game mechanics). We show how applying this framework to a player-game interface naturally gives rise to formal notions of play traces (as straight-line programs) and player skills (as general programs with branching and recursion). By defining a player intent language, game design concepts become formal objects of study, allowing existing PL methodology to inform and guide the design process. REFERENCES 9.2 Abstraction boundaries between input and mechanics Formalizing game interfaces gives us the tools to explore alternative interfaces to the same underlying mechanics, without needing to port game logic between different graphical interface frameworks. For example, the interactive fiction community has been exploring alternatives to the traditional dichotomy of “parser vs. hypertext” for presenting text-based games and interactive story-worlds. An abstraction boundary between the underlying mechanics, map, and narrative of the world, and the view and input mechanisms used to interact with it, could open the doors to research on user interfaces that support players’ mental models of a world conveyed in text. 9.3 Enabling co-creative play Finally, a PL formulation of player actions along with appropriate composition operators (parallel and sequential composition, branching, and passing resource dependencies) provides a “scripting language for free” to the game environment. Such a language can be used to test the game, provided as a game mechanic as in BOTS, or provided as an optional augmentation to the game’s mechanics for the sake of modding or adding new content to the game world. Especially in networked game environments, like multi-user domains, massively multiplayer online games, and social spaces like Second Life, the ability for the player to program not just her avatar but parts of the game world itself introduces new opportunities for creative and collaborative play. Our framework suggests a new approach to designing these affordances for players in a way that is naturally derived from the game’s existing mechanics and interface. In the spirit of celebrating the player, this year’s conference theme, we wish to enable the player as a co-designer of her own game experience. 9.4 Future Work In future work, we intend to build software for realizing game language designs and experimenting with protocol-based game AI developed as programs in these languages. In another direction, we aim to innovate in PL design outside of games, such as read-eval-print loops (REPLs) for live programming that includes rapid feedback loops motivated by gameplay, as well as distributed [1] Eric Barone. 2016. Stardew Valley. Digital distribution. (2016). [2] Marc Blank and David Lebling. 1980. Zork I: The Great Underground Empire. (1980). [3] Alessandro Canossa. 2013. Meaning in Gameplay: Filtering Variables, Defining Metrics, Extracting Features and Creating Models for Gameplay Analysis. Springer London, London, 255–283. DOI:http://dx.doi.org/10.1007/978-1-4471-4769-5 13 [4] Rogelio E Cardona-Rivera and R Michael Young. 2014. Games as conversation. In Proceedings of the 3rd Workshop on Games and NLP at the 10th AAAI Conference on Artificial Intelligence and Interactive Digital Entertainment. 2–8. [5] Dinosaur Polo Club. 2015. Mini Metro. (2015). [6] Chris Crawford. 2003. Chris Crawford on game design. New Riders. [7] Marc Ebner, John Levine, Simon M Lucas, Tom Schaul, Tommy Thompson, and Julian Togelius. 2013. Towards a video game description language. (2013). [8] M Seif El-Nasr, Anders Drachen, and Alessandro Canossa. 2013. Game analytics. New York, Sprint (2013). [9] H Paul Grice. 1975. Logic and conversation. 1975 (1975), 41–58. [10] Andrew Hicks. 2012. Creation, evaluation, and presentation of user-generated content in community game-based tutors. In Proceedings of the International Conference on the Foundations of Digital Games. ACM, 276–278. [11] Kristine Jørgensen. 2013. Gameworld interfaces. MIT Press. [12] Stein C Llanos and Kristine Jørgensen. 2011. Do players prefer integrated user interfaces? A qualitative study of game UI design issues. [13] John McCarthy and Patrick J Hayes. 1969. Some philosophical problems from the standpoint of artificial intelligence. Readings in artificial intelligence (1969), 431–450. [14] Cyrus Omar, Ian Voysey, Michael Hilton, Jonathan Aldrich, and Matthew A. Hammer. 2017. Hazelnut: A Bidirectionally Typed Structure Editor Calculus. In POPL. [15] Cyrus Omar, Ian Voysey, Michael Hilton, Joshua Sunshine, Claire Le Goues, Jonathan Aldrich, and Matthew A. Hammer. 2017. Toward Semantic Foundations for Program Editors. In SNAPL: The 2nd Summit on Advances in Programming Languages. [16] J Osborn, Ben Samuel, Michael Mateas, and Noah Wardrip-Fruin. 2015. Playspecs: Regular expressions for game play traces. Proceedings of AIIDE (2015). [17] Markus Persson, Jens Bergensten, Michael Kirkbride, Mark Darin, and Carl Muckenhoupt. 2011. Minecraft. (2011). [18] Frank Pfenning and Carsten Schürmann. 1999. System description: Twelf–a meta-logical framework for deductive systems. In International Conference on Automated Deduction. Springer, 202–206. [19] Tom Schaul. 2013. A video game description language for model-based or interactive learning. In Computational Intelligence in Games (CIG), 2013 IEEE Conference on. IEEE, 1–8. [20] Adam M Smith, Mark J Nelson, and Michael Mateas. 2010. Ludocore: A logical game engine for modeling videogames. In Computational Intelligence and Games (CIG), 2010 IEEE Symposium on. IEEE, 91–98. [21] Wube Software. 2012. Factorio. (2012). [22] José P Zagal, Michael Mateas, Clara Fernández-Vara, Brian Hochhalter, and Nolan Lichti. 2007. Towards an ontological language for game analysis. Worlds in Play: International Perspectives on Digital Games Research 21 (2007), 21.
6cs.PL
Stability of Valuations and Kollár Components Chi Li and Chenyang Xu April 13, 2017 arXiv:1604.05398v4 [math.AG] 12 Apr 2017 Abstract We show that among all Kollár components obtained by plt blow ups of a klt singularity o ∈ (X, D), there is at most one that is (log-)K-semistable. We achieve this by showing that if such a Kollár component exists, it uniquely minimizes the normalized volume function introduced in [Li15a] among all divisorial valuations. Conversely, we show any divisorial minimizer of the normalized volume function yields such a K-semistable Kollár component. We also prove that for any klt singularity, the infimum of the normalized function is always approximated by the normalized volumes of Kollár components. Contents 1 Introduction 1.1 Kollár components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.2 Approximation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.3 Equivariant K-semistability . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Preliminary 2.1 Normalized volume . . . . . . . 2.2 Properties of Kollár component 2.3 Deformation to cone . . . . . . 2.4 Filtrations and valuations . . . 1 3 4 5 . . . . 5 5 9 10 11 3 Volume of models 3.1 Local volume of models . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.2 Approximating by Kollár components . . . . . . . . . . . . . . . . . . . . . . 12 12 14 4 K-semistability implies minimum 4.1 Degeneration to initial ideals . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.2 Equivariant K-semistability and minimizing . . . . . . . . . . . . . . . . . . . 4.3 Proof of Theorem A . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 19 22 25 5 Uniqueness 5.1 Case of cone singularity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5.2 The general case . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 26 30 6 Minimizing Kollár component is K-semistable 32 7 Examples 35 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Introduction Throughout this paper, we work over the field C of complex numbers. It has been well known by people working in higher dimensional geometry that there is an analogue between the local object Kawamata log terminal (klt) singularities (X, o) and log Fano varieties as the global counterpart (cf. e.g. [Sho00, Xu14] etc.). From this comparison, since the stability theory of Fano varieties has been a central object in people’s study in the last three decades, it is natural to expect there is a local stability theory on singularities. The primary goal of this 1 preprint is to develope such a theory. In another word, we want to investigate singularities using the tools from the theory of K-stability, a notion which was first defined in [Tia97] and later algebraically formulated in [Don02]. We note that this interaction between birational geometry and K-stability theory has been proved to significantly fertilize both subjects (cf. [Oda12, Oda13, LX14, WX14, LWX14, Fuj15] etc.). For the stability theory of log Fano varieties, a crucial ingredient is the CM weight. Philosophically, the stability of log Fano varieties is equivalent to minimizing the CM weight. In the stability theory of singularities, we fix the singularity (X, o) and look for ‘the most stable’ valuations v. Thus the first step of establishing a local stability theory for (X, o) would be to find the right counterpart of CM weight in the local setting. In the work [Li15a], the c X,o on the space of valuations first named author defined the normalized volume function vol centered at o, which we believe should be the right invariant. In fact, its derivative at the canonical divisorial valuation over the cone singularity along certain tangent direction gives the the CM weight. So in the local picture, the normalized volume function indeed carries more information than the CM weight! By the above discussion, inspired by the global theory, we focus on studying the valuation minimizing the normalized volume function, which is conjectured to uniquely exist and ought to be thought as the ‘(semi-)stable’ object. This picture is understood well in the case of Sasakian geometry where one only considers the valuations coming from the Reeb vector fields on the torus (e.g. [MSY08, CS15]). Here we can naturally define the stability of the singularity using the one for the base. However, this requires the extra cone structure. By investigating the minimizer of the normalized volume function on all valuations, our plan, as we mentioned, built on the previous work ([Li15a, Li15b, LL16]), is to establish an intrinsic stability which only depends on the isomorphic class of the singularity. To revisit the cone singularity case, in fact it was shown in [Li15b, LL16] that a Fano manifold X is K-semistable, if and only if that among all valuations over the vertex o of the cone C(X) given by a multiple of −KX , the canonical valuation defined to be the one obtained by blowing up the vertex o ∈ C(X) minimizes the normalized volume function. This gives evidence to justify that at least for such singularities, our study is on the right direction. For an arbitrary klt singularity, there is no direct way to associate a global object. Nevertheless, in differential geometry, when there is a ‘canonical’ metric, the metric tangent cone around the singularity is the stable object in the category of metric space. With a similar philosophy, we expect the minimizer of the normalized volume function always gives a degeneration to a K-semistable Fano cone singularity in the Sasakian setting, and such c X,o . In the current paper, we work degeneration should be provided by the minimizer of vol out this picture in the case that the minimizer is divisorial, by implementing the machinery of the minimal model program (based on the foundational results in [BCHM10]). So our treatment will be purely algebraic though it is strongly inspired by profound analytic results. One ingredient we introduce is to define the volume associated to a birational model and then connect it to the normalized volume of a valuation. For studying the divisorial valuations, the class of models which play a central role here are the ones obtained by the construction of Kollár component (cf. [Xu14]): for an arbitrary n-dimensional klt singularity (X, o), we can use minimal model program to construct a birational model whose exceptional locus is an (n−1)-dimensional Q-Fano variety. We will systematically develop the tools of using Kollár components to understand the normalized local volume and its minimizer. In fact, Kollár components can be considered as the local analogue of special degenerations studied in [LX14]. In the case of Sasakian geometry, one Reeb vector gives a Kollár component if and only if it is rational, i.e., it is quasi-regular. Therefore, to summarize, the aim of this paper is of twofolds: on one hand, we aim at using the construction of Kollár components to get information of the valuations space, especially the minimizer of the normalized volume functions; On the other hand, in the reverse direction, we want to use the viewpoint of stability to study the birational geometry construction of Kollár components, and search out a more canonical object under suitable assumptions. We also expect for any klt singularity (X, o), even when the minimizer is not necessarily divisorial, we can still use suitable birational models to degenerate (X, o) to a K-semistable (possibly irregular) Sasakian singularity. However, it seems to involve a significant amount of new technical issues. In the below, we will give more details. 2 1.1 Kollár components Definition 1.1 (Kollár component). Let o ∈ (X, D) be a klt singularity. We call a proper birational morphism µ : Y → X provides a Kollár component E, if µ is isomorphic over X \ {o}, and µ−1 (o) is an irreducible divisor S, such that (Y, S + µ−1 ∗ D) is pure log terminal and −S is Q-Cartier and ample over X. We easily see the birational model Y is uniquely determined once the divisorial valuation S is fixed, and if we denote (KY + S + µ−1 ∗ D)|S = KS + ∆S , then (S, ∆S ) is a klt log Fano pair. Given any klt singularity (X, o), after the necessary minimal model program type result is established (see [BCHM10]), we know that there always exists a Kollár component (see [Pro00] or [Xu14, Lemma 1]), but it is often not unique (nevertheless, see the discussion in 7.1.4 for some known special cases for the uniqueness). From what we have discussed, instead of an arbitrary Kollár component, we want to study those which are ‘more stable’, and show if it exists, it provides a more canonical object. Indeed, we prove that if there is c a K-semistable Kollár component, then it gives the unique minimizer of vol(X, o) among all Kollár components. Compared to the global theory of degeneration of Fano varieties, this fits into the philosophy that K-stability provides a more canonical degeneration(cf. [LWX14, SSY16]) and it should minimize the CM weight among all degenerations. But one surprising thing to us is that K-semistability is enough, instead of K-polystability which was required in the global setting. The following theorem is our main theorem. Theorem 1.2. Let o ∈ (X, D) be klt singularity. A divisorial valuation ordS is a minimizer c X,D,o if and only if the following conditions are satisfied of vol 1. S is a Kollár component; 2. (S, ∆S ) is K-semistable. Moreover, such a minimizing divisorial valuation is unique. More precisely, we will prove Theorem 1.2 by proving the following four theorems. For each of them, we need somewhat different techniques. First we prove Theorem A. If o ∈ (X, D) is an algebraic klt singularity. Let S be a Kollár component c X,o is minimized at the valuation ordS . over X. If (S, ∆S ) is (log-)K-semistable. Then vol This extends the main theorem in [LL16] from cone singularities to the more general setting. For the proof, we indeed degenerate a general singularity to a cone singularity induced by its Kollár components. However, instead of degenerating the valuation, we degenerate the associated ideals and then use the result in [Liu16]. An extra subtlety is to treat the case of the cone singularity, we can not directly use [LL16] as there they only proved the result for the cone singularity over an analytic K-semistable Q-Fano variety, which we still do not know to be equivalent to the algebraic definition. As a redemption, we first show that it suffices to concentrate on the equivariant data and then use [Li15b] to finish the argument. In Section 7, we use this criterion to find minimizers for various examples of singularities including: quotient singularities, Ak and Ek singularities etc. Next, we turn to the result on the uniqueness. Theorem B. If o ∈ (X, D) is an algebraic klt singularity. Assume S is a Kollár component over X such that (S, ∆S ) is K-semistable. Then c X,o (ordS ) < vol c X,o (ordT ) vol for any other divisorial valuation T . 3 This is done by a detailed study of the geometry when the equality holds. In the cone singularity case, we investigate the equality condition in the calculation in [Li15b]. It posts a strong assumption which enables us to compute the corresponding invariants including nef thresholds and pseudo-effective thresholds. The argument is partially inspired by the work in [Liu16]. Once this is clear, the rest follows from a simple application of Kawamata’s base point free theorem. And the general case can be again reduced to the case of cone singularity using a degeneration process. Now we consider the converse direction. For any klt singularity, a minimizer of the normalized volume function always exists by [Blu16b]. The following theorem says that if a minimizer is divisorial, it always yields a Kollár component. We indeed prove slightly more for a general rational rank 1 minimizer. Theorem C. Given an arbitrary algebraic klt singularity o ∈ (X, D) where X = Spec(R). c X,o . Assume the valuation group of v is isomorphic Let v be a valuation that minimizes vol to Z, i.e., v has rational rank one, and one of the following two assumptions holds 1. v is a multiple of a divisorial valuation; or 2. the graded family of valuative ideals a• = {ak } where ak = {f ∈ R | v(f ) ≥ k} is finitely generated, i.e., there exists m ∈ N such that amk = (am )k for any k ∈ N. Then up to a rescaling, v is given by the divisorial valuation induced by a Kollár component S. The fact that the assumption 1 above implies v is given by a Kollár component is also independently proved in [Blu16b]. We note that a minimizer is conjectured to be quasimonomial ((cf. [Li15a, Conjecture 6.1.3])) and the graded family of valuative ideals for a minimizer of the normalized volume function is conjectured to be always finitely generated (cf. [Li15a, Conjecture 6.1.5]). So granted any one of these two conjectures, this result should presumably characterize all the cases with minimizers of rational rank 1. The proof uses the definition of the volumes of a model, and run the decreasing process of the volumes given by the minimal model program as in [LX14]. Next we turn to the stability of the minimizer. By using the techniques from the toric degeneration (see [Cal02, AB04, And13]) and the relation between CM weight and normalized volumes, we will prove Theorem D. We use the same notation as in Theorem C. Let µ : Y → X be the morphism which extracts S, and write (KY + S + µ−1 ∗ D)|S = KS + ∆S , then (S, ∆S ) is a K-semistable log Fano pair. 1.2 Approximation In a different direction, we also obtain results which describe the minimizer of the normalized volume function from the viewpoint of Kollár components. We show for a general klt singularity, although the minimizer of its associated normalized volume function might not be given by a Kollár component, but we can always approximate it by a sequence of Kollár components. Theorem 1.3. Given an arbitrary algebraic klt singularity o ∈ (X, D), and a minimizer v m c X,o , there always exists a sequence of Kollár components {Si } and positive numbers cj of vol such that lim cj · ordSj → v in ValX,o j→∞ and c c m lim vol(ord Si ) = vol(v ). i→∞ Here ValX,o consists of all valuations centered at o, and is endowed with the weakest topology as in [JM12, Section 4.1]. 4 1.3 Equivariant K-semistability By relating a Fano variety and the cone over it, we can compare the calculation in [Li15b] for a cone and [Fuj16] for its base. Then an interesting by product of our method is the following theorem. Theorem 1.4. Let T ∼ = (C∗ )r be a torus. Let (V, ∆) be a log Fano variety with a T -action. Then (V, ∆) is K-semistable if and only if any T -equivariant special test configuration S → A1 of (V, ∆) has its generalized Futaki invariant Fut(V) ≥ 0. When S is smooth and ∆ = 0, this follows from the work of [DS15] with an analytic argument. Our proof is completely algebraic. It again uses the techniques of degenerating any ideal to an equivariant one and showing it has a smaller invariant. The paper is organized in the following way: In Section 2, we give some necessary backgrounds. In Section 3, we introduce one key new tool: the volume of a model. By combining the normalized volume function on valuations with the local volume defined in [Ful13], and applying minimal model program, we prove Theorem 1.3 and Theorem C. In Section 4, we prove Theorem A, by connecting it to the infimum of lct(X, D; a)n · mult(a) for all m-primary ideals a centered on o. We note that this latter invariant indeed has also been studied in other context (cf. [dFEM04]). In Section 5, we prove Theorem B. We first prove it for the cone singularity case, using heavily the ideas and calculations in [LL16]. Then we use a degeneration argument to reduce the general case to the case of cone singularities. In Section 6, we prove Theorem D, which verifies the K-semistability of a minimizing Kollár component. In Section 7, we give some examples on how to apply our techniques to calculate the minimizer for various classes of klt singularities. History: Since [Li15a], the study of the minimizer of the normalized volume function moves forward rapidly. Our preprint is inspired by the earlier work of [Li15a, Li15b] and [LL16]. It also uses ideas from [Liu16], which is written in the same period as the first version of our preprint. After we posted our preprint, the existence of the minimizer is completely settled in [Blu16b]. Inspired by this work, in the revision, we improve our work by showing that for a C∗ -equivariant singularity, we only need to consider the equivariant valuations for minimizing the normalized local volume. We also include his result on the existence of the minimizer in the exposition. In particular, this allows us to stay with the algebraic definition of K-semistability. Another major improvement we achieve in the revision is that we can indeed show that any Kollár component which minimizes the normalized local volume is always K-semistable. Acknowledgement: We thank Yuchen Liu, Dhruv Ranganathan and Xiaowei Wang for helpful discussions and many useful suggestions. We especially want to thank Harold Blum and Mircea Mustaţǎ for pointing out a gap in an earlier draft. CL is partially supported by NSF DMS-1405936. CX is partially supported by ‘The National Science Fund for Distinguished Young Scholars (11425101)’. Part of the work was done when CX visited Imperial College London and Massachusetts Institute of Technology. He wants to thank Paolo Cascini and Davesh Maulik for the invitation and providing a wonderful environment. 2 Preliminary Notation and Conventiones: We follow the standard notation in [Laz04a, KM98, Kol13]. A log Fano pair (X, D) is a projective klt pair such that −KX − D is ample. For a local ring (R, m) and a an m-primary ideal, we denote by lR (R/a) the length of R/a. For the K-semistability of a log Fano pair, see [Tia97, Don02] (also see [Oda13, LX14]). 2.1 Normalized volume Let (X, o) be a normal algebraic singularity and v ∈ ValX,o , which is the space of all valuations centered on o. Let D ≥ 0 be a Q-divisor such that KX + D is Q-Cartier. We can define the volume volX,o (v) and the log discrepancy AX,D (v) (if the context is clear, we will 5 abbreviate it as vol(v) and A(v)) following [ELS03] and [JM12] (see e.g. [Li15a, Section 1.1]). In particular, if S is a divisor with center on X to be o, we have AX,D (S) := AX,D (ordS ) = a(S; X, D) + 1 the same as the standard log discrepancy. c X,D,o (v) (or Definition 2.1. Notation as above. We denote the normalized volume by vol c X,o (v) if D is clear or vol c X,D (v) if o is clear or simply vol(v) c vol if there is no confusion) to be volX,o (v) · An (v) if An (v) < +∞; and +∞ if An (v) = +∞. c Recall that it was conjectured that vol(v) achieves the minimum at a valuation v ∈ ValX,o . In [Li15a], it is showed that the space c {v ∈ ValX,o | v(m) = 1, vol(v) ≤ C} for any constant C > 0 forms a compact set. However, in general the volume function vol is c only upper continuous on ValX,o although we expect it is continuous at a minimizer of vol. Proposition 2.2. If {vi } is a sequence of valuations, such that vi → v in the weakest topology, then vol(v) ≥ lim sup vol(vi ). i Proof. The valuation v determines a sequence of graded ideas ak = ak (v) = {f ∈ R | v(f ) ≥ k}. By [Mus02], we know that for any  > 0, there exists a sufficiently large k such that 1 mult(ak ) < vol(v) + . kn Since R is Noetherian, we know that there exist finitely many generators fp (1 ≤ p ≤ j) of ak = (f1 , ..., fj ). As v(fp ) ≥ k, we know that for any δ, there exists sufficiently large i0 such that for any i ≥ i0 , vi (fp ) ≥ k − δ. Thus (i) ak−δ = {f ∈ R | vi (f ) ≥ k − } ⊃ ak . Therefore, vol(vi ) ≤ 1 1 kn (i) mult(ak− ) ≤ mult(ak ) ≤ (vol(v) + ). n n (k − δ) (k − δ) (k − δ)n Proposition 2.3. Let (X, o) = (Spec(R), m) be a singularity. Let v and v 0 be two real valuations in ValX,o . Assume vol(v) = vol(v 0 ) > 0 v(f ) ≥ v 0 (f ) and for any f ∈ R∗ , then v = v 0 . Proof. We prove it by contradiction. Assume this is not true, we fix g ∈ R such that v(g) = l > v 0 (g) = s. Denote by r = l − s > 0. Fix k ∈ R>0 . Consider ak := {f ∈ R| v(f ) ≥ k} and bk := {f ∈ R| v 0 (f ) ≥ k}. So bk ⊂ ak , and we want to estimate the dimension of dim(R/bk ) − dim(R/ak ) = dim(ak /bk ). 6 Fix a positive integer m < k l and a set (1) (km ) gm , ..., gm ∈ bk−ml whose images in bk−ml /bk−ml+r form a C-linear basis. We claim that k (j) {f m · gm } (1 ≤ m ≤ , 1 ≤ j ≤ km ) l are C-linear independent in ak /bk . Granted this for now, we know since vol(v) > 0, then 1 n lim k→∞ k lim sup X X km = lim sup lim k→∞ 1≤m≤ kl 1≤m≤ kl 1 dim(bk−ml /bk−ml+r ) > 0, kn which then implies vol(v) > vol(v 0 ). Now we prove the claim. Step 1: For any 1 ≤ m ≤ kl , 1 ≤ j ≤ km , (j) v(f m · gm ) (j) v(f m ) + v(gm ) = (j) ≥ ml + v 0 (gm ) ≥ ml + k − ml ≥ k. (j) Thus f m · gm ∈ ak . Step 2: If k , 1 ≤ j ≤ km ) l are not C-linear independent in ak /bk , then there is an equality X hm = b ∈ bk , (j) {f m · gm } (1 ≤ m ≤ m where there exists cj ∈ C, such that X hm = f m · (j) cj gm 1≤j≤km and some hm 6= 0. Consider the maximal m, such that hm 6= 0. Since X (j) v 0 (hm ) = v 0 (f m · cj gm ) 1≤j≤km 0 = v (f ) + v 0 ( m X (j) cj gm ) 1≤j≤km < ms + k − ml + r = k − (m − 1)l + (m − 1)s, where the third inequality follows from that X (j) cj gm ∈ / bk−ml+r . 1≤j≤km However, we have v 0 (hm ) = v 0 (b − X hj ) j<m  ≥ min v 0 (b), v 0 (h1 ), ....v 0 (hm−1 ) = min {k, js + k − jl} 1≤j≤m−1 = k − (m − 1)l + (m − 1)s, which is a contradiction. 7 Several results in our work depend on a relation between the normalized volume and some normalized multiplicity. The latter quantity was first considered in the smooth case in [dFEM04], and since then it has been studied in many other work, including positive characteristic versions (see e.g. [TW04]). Its relevance to the normalized volume appeared in [Li15a, Example 3.7]. We have the following more precise observation in [Liu16]. Proposition 2.4 ([Liu16, Section 4.1], cf. [Li15a, Example 3.7]). Let (X, o) = (SpecR, m) and D ≥ 0 a Q-divisor, such that o ∈ (X, D) is a klt singularity. Then we have c X,o (v) = inf lctn (X, D; a) · mult(a), inf vol v a (1) where on the left hand side the infimum runs over all the valuations centered at o, and on the right hand side it runs over all the m-primary ideals. Moreover, the left hand side can be c X,o (v) where DivX,o denotes the space of all divisorial valuations replaced by inf v∈DivX,o vol with center at o. For the reader’s convenience we provide a sketch of the proof. Proof. We first use the same argument as in [Li15a, Example 2.7]) to prove that the left hand side is greater or equal to the right hand side. For any real valuation v, consider the graded family of valuative ideals ak = ak (v) = {f ∈ R | v(f ) ≥ k}. Then v(ak ) ≥ k and we can estimate:  n AX,D (v) mult(ak ) ≥ · mult(ak ) ≥ lctn (X, D; ak ) · mult(ak ). AX,D (v)n · kn v(ak ) Since for a• = {ak } is a graded family of m-primary ideals on X, mult(ak ) lR (R/ak ) = lim . n k→+∞ k→+∞ k kn mult(a• ) = lim c (see e.g. [ELS03, Mus02, LM09, Cut12]), as k → +∞, the left hand side converges to vol(v) and we get one direction. For the other direction of the inequality, we follow the argument in [Liu16]. For any mprimary ideal a, we can choose a divisorial valuation v calculating lct(a). Then v is centered at o. Assume v(a) = k, or equivalently a ⊆ ak (v). Then we have al ⊆ ak (v)l ⊆ akl (v) for any l ∈ Z>0 . So we can estimate: lctn (X, D; a) · mult(a) = = n AX,D (v)n n mult(a)l · mult(a) = A (v) · X,D kn (kl)n mult(al ) mult(akl ) AX,D (v)n · ≥ AX,D (v)n · . (kl)n (kl)n As l → +∞, then again the right hand side converges to c AX,D (v)n · mult(a• (v)) = vol(v). So we have proved the right-hand-side is bigger than the left-hand-side in (1). The last statement follows easily from the above proof. In a very recent preprint [Blu16b], it is proved that a minimizer always exists. c X,D (v) always has a minimizer Theorem 2.5 (Blum). For any klt singularity o ∈ (X, D), vol v m in ValX,o . 8 2.2 Properties of Kollár component The concept of Kollár component is defined in Definition 1.1. It always exists (cf. see [Pro00] or [Xu14, Lemma 1]). In this section, we establish some of their properties using the machinery of the minimal model program. The following statement is the local analogue of [LX14, Theorem 1.6], which can be also easily obtained by following the proof of the existence of Kollár component. (See e.g. the proof of [Xu14].) Proposition 2.6. Let o ∈ (X, D) be a klt singularlty. Let µ : Y → X be a model, such that µ is an isomorphism over X \ {o} and (Y, E + µ−1 ∗ D) is dlt where E is the divisorial part of µ−1 (o). Then we can choose a model W → Y and run MMP to obtain W 99K Y 0 , such that Y 0 → X gives a Kollár component S with a(Y, E; S) = −1. We also have the following straightforward lemma. c Lemma 2.7. If S is a Kollár component, then vol(ordS ) = (−S|S )n−1 and vol(ord S) = n−1 n (−(KY + S + µ−1 D)| ) · A (S) . S X,D ∗ Proof. For any k ≥ 0, we have an exact sequence, 0 → OY (−(k + 1)S) → OY (−kS) → OS (−kS) → 0. Because −S is ample over X, we have the vanishing R1 f∗ (OY (−(k + 1)S)) = 0, from which we get H 0 (S, −kS|S ) ∼ = ak (ordS ) H 0 (Y, −kS) = . + 1)S) ak+1 (ordS ) H 0 (Y, −(k So we get the identity: dimC (OX,o /am (ordS )) = m−1 X dim H 0 (S, −kS|S ). k=0 Then the result follows easily from the Hirzebruch-Riemann-Roch formula. As KY + S + µ∗ D ∼Q,X AX,D (S) · S, the second identity is implied by the first statement. Remark 2.8. Inspired by the above simple calculation, we indeed can extend the definition of normalized volumes to any model f : Y → (X, o), such that f is isomorphic over X \ {o}. See Section 3. Lemma 2.9. Let f : (X 0 , o0 ) → (X, o) be a finite morphism, such that f ∗ (KX + D) = KX 0 + D0 for some effective Q-divisors. We assume (X, D) and (X 0 , D0 ) are klt. If S is a Kollár component given by Y → X over o, then Y ×X X 0 → X 0 induces a Kollár component S 0 over o0 ∈ (X 0 , D0 ). Conversely, if X 0 → X is Galois with Galois group G, then any G-invariant Kollár component S 0 over o ∈ (X 0 , D0 ) is the pull back from a Kollár component over o ∈ (X, D). 0 0 Proof. The first part is standard. In fact, denote by S 0 = f −1 (S), then (Y 0 , µ0−1 ∗ D + S ) is 0 log canonical, such that if we restrict to T a component of S , 0 0 (KY 0 + µ0−1 ∗ D + S )|T = KT + ∆T , then (T, ∆T ) is klt, which by Kollár-Shokurov connectedness theorem implies that T = S 0 . For the converse, let 0 0 L ∼X 0 −m(KY 0 + µ0−1 ∗ D +E ) 1 be a divisor of general position for sufficiently P divisible m and H := m L, then (Y 0 , E 0 + 1 0−1 0 ∗ µ∗ D + H) is plt. Replacing H by HG := |G| ( g∈G g H), we know that (X 0 , D0 + µ∗ HG ) is G-invariant, and there exists a Q-divisor HX ≥ 0, such that f ∗ (KX + D + HX ) = KX 0 + D0 + µ∗ HG . 9 Therefore, (X, D + HX ) is plt, and its unique log canonical place is a divisor S which is a Kollár component over o ∈ (X, D) whose pull back gives the Kollár component S 0 over o0 ∈ (X 0 , D0 ). We prove a change of volume formula for Kollár components under a finite map. Lemma 2.10. With the same notation as in Lemma 2.9, then c X,D (ordS ) = vol c X 0 ,D0 (ordS 0 ), d · vol where d is the degree of X 0 → X. Proof. Since the pull back of S is S 0 which is irreducible by Lemma 2.9, let the degree of S 0 → S be a and the ramified degree be r, we have ar = d and rAX,D (ordS ) = AX 0 ,D0 (ordS 0 ) (see [KM98, 5.20]). By Lemma 2.7, we know that c X,D (ordS ) d · vol = n−1 ar · AX,D (ordS ) · ((KY + S + µ−1 ∗ D)|S ) = n−1 (rAX,D (ordS )) · (a(KY + S + µ−1 ∗ D)|S ) =  0 n−1 AX 0 ,D0 (ordS 0 ) · ((KY 0 + S 0 + µ0−1 , ∗ D )|S 0 ) = c X 0 ,D0 (ordS 0 ), vol  where for the third equality we use the projection formula of intersection numbers. 2.3 Deformation to cone Let (X, o) = (Spec(R), m) be an algebraic singularity such that (X, D) is klt for a Q-divisor D ≥ 0. Let S be a Kollár component and ∆ = ∆S be the different divisor defined by adjunction (KY + S + µ−1 ∗ D)|S = KS + ∆S where Y → X is the extraction of S. Denote v0 := ordS and +∞ +∞ M M T = ak (v0 )/ak+1 (v0 ) = Tk k=0 k=0 and the d-th truncation T (d) = +∞ M adk (v0 )/adk+1 (v0 ) = k=0 +∞ M Tdk for d ∈ N. k=0 Now we give a more geometric description of Spec(T ) and Spec(T (d) ) using the idea of degenerating o ∈ (X, D) to an (orbifold) cone over the Kollár component S. Assume µ : Y → X is the extraction of the Kollár component S of (X, o). Then µA1 : Y ×A1 → X ×A1 has the exceptional divisor S × A1 . The divisor S is not necessarily Cartier, but only QCartier. Thus we can take the index 1 covering Deligne-Mumford stack π : Y → Y for S. So π is isomorphic over Y \ S and π ∗ (S) = S is Cartier on Y. We consider the deformation to the normal cone construction for S ⊂ Y. More precisely, we consider the blow up π1 : Z → Y × A1 along S × {0}. Denote by E the exceptional divisor of π1 and by T the strict transform of S × A1 . We note that E has a stacky structure along the 0 and ∞ section, but a scheme structure at other places. Then T ⊂ Z is a Cartier divisor which is proper over A1 and can be contracted to a normal Deligne-Mumford stack Ψ1 : Z → W and in this way we get a flat family W → A1 such that Wt ∼ = X and W0 ∼ = C¯ ∪ Y0 , where Y0 is the birational transform of Y × {0}. To understand C if we denote by Z 0 := Z \ Y0 , then the fiber Z 0 over 0 is isomorphic to C which is an affine orbifold cone over S with the polarization given by OY (−S)|S . Moreover, C¯ is the projective orbifold cone completing C. Let d be a positive integer such that d · S is Cartier in Y , then C (d) given by the cone over OY (−d · S)|S is a degree d cyclic quotient of C, which is a usual (A1 -)cone over S. We denote by C and C (d) the underlying coarse moduli space of C and C (d) . We also denote S to be the coarse moduli space of S. 10 Applying the exact sequence, 0 → OY (−(k + 1)S) → OY (−kS) → OS (−kS) → 0, since h1 (OY (−(k + 1)S)) = 0 by the Grauert-Riemenschneider vanishing theorem, we get: H 0 (S, O(−kS|S )) ∼ = H 0 (OY (−kS))/H 0 (OY (−(k + 1)S)). Notice that the right hand side is equal to: ak (v0 ) µ∗ OY (−kS) = . µ∗ OY (−(k + 1)S) ak+1 (v0 ) In particular, C = Spec(T ). Similarly, C (d) = Spec(T (d) ). There is also a degree d cyclic quotient morphism h : C → C (d) , and we know that (d) (d) h∗ (KC̄ (d) + C∆ + CD ) = KC̄ + CD , (d) where CD is the intersection of C̄ with the birational transform of D × A1 and C∆ (resp. (d) CD ) on C̄ (d) is the induced cone over the branched Q-divisor on S of S → S (resp. µ−1 ∗ D|S ). (d) (d) In particular, C∆ + CD is the cone over ∆S . 2.4 Filtrations and valuations Assume F is a Z-graded filtration on R. We have the Rees algebra and extended Rees algebra: +∞ +∞ M M (F k R)t−k , (2) (F k R)t−k , R0 := R0 (F) = R := R(F) = k=−∞ k=0 and the associated graded ring: grF (R) = R0 /tR0 = +∞ M (F k R/F k+1 R)t−k =: k=0 +∞ M Ak . (3) k=0 Assuming R0 is finitely generated, X := SpecC[t] (R0 ) can be seen as a C∗ -equivariant flat degeneration of X into X0 = SpecC (R0 /tR0 ) = SpecC (grF R). Denote E = Proj(grF (R)), X̃ = ProjR R. Then the natural map X̃ → X is the filtered blow up associated with the F such that E is the exceptional divisor. Moreover X̃ can be seen as a flat deformation of a natural filtered blow up on X0 . Indeed following [TW89, 5.15], we have a filtration F on R0 : ( +∞ )  X  m 0 max(k,m) −k F R = F R t . k=−∞ The objects associated to the corresponding Rees algebra and graded algebra over R0 are: +∞ +∞ M M r 0 −r X̃ = ProjR0 (F R )T , E = ProjC (F r R0 /F r+1 R0 )T −r . r=0 r=0 Then we have the following commutative diagram (see [TW89, Proposition 5.17]): C̃p ←−−−−   y E −−−−→   y E ←−−−−   y E   y X̃ −−−−→   y X̃ ←−−−−   y X̃0   y Cp ←−−−− X −−−−→ X ←−−−− X0 There is a natural C∗ -action on X0Lassociated to the natural N-grading such that the quotient is isomorphic to E. Let J = k≥0 F k+1 t−k = tR0 ∩ R so that R/J ∼ = grF (R) ∼ = 11 R0 /tR0 . Now we assume furthermore that E is a normal projective variety. This implies both R and R0 are normal (see [TW89]). Let P be the unique minimal prime ideal of R over J that corresponds to E, and w the valuation of K(t) attached to P. Then the restriction of w to R is equal to b · ordE . Assume a = w(t). Thus the filtration F is equivalent to the filtration that is given by: (tm R0 ) ∩ R = {f ∈ R; ordE (f ) ≥ ma/b}. Remark 2.11. There is a general Valuation Theorem about the relation between finitely generated filtrations and valuations proved by Rees for which we refer the reader to [Ree88]. See also [BHJ15]. 3 Volume of models One very useful tool for us to study the minimzer of the normalized local volume is the concept of a local volume of a model. It is this concept which enables us to apply the machinery of the minimal model program to construct different models, especially those yielding Kollár components. 3.1 Local volume of models In this section, we extend the definition of volume to models in the ‘normalized’ sense. We use the concept of local volumes as in [ELS03, Ful13]. Let us first recall the definition, which is from [Ful13]. Definition 3.1 (Local volume). (cf. See [Ful13]) Let X be a normal algebraic variety of dimension at least two and let o be a point on X. Fixing a proper birational map µ : Y → X, for an arbitrary Cartier divisor D on Y , we define the local volume of D at x to be volF o (D) = lim sup m→∞ where h1o (mD) := 1 dim H{o} (X, f∗ OY h1o (mD) , mn /n! (mD)). We can define the volume of a Q-Cartier divisor D to be volF o (D) := volF o (mD) , mn for sufficiently divisible m. Lemma 3.2. Let µ : Y → X be a birational morphism. If D ≥ 0 is an exceptional Q-divisor, such that Supp(D) ⊂ µ−1 (o). Then volF o (−D) = lim sup k→∞ lR (OX /ak ) , k n /n! where k is sufficiently divisible and ak = µ∗ (OY (−kD)). Proof. This follows from [Ful13, Remark 1.1(ii)] (see also [Ful13, Remark 1.31 and 1.32]). The right hand side of the above display is also the volume vol(a• ) defined in [ELS03, Definition 3.1, Proposition 3.11]. In particular, given a prime divisor D over o with log discrepancy a, then we see that c volF o (−aD) = volX,o (ordD ). Definition 3.3. Let o ∈ (X, D) be a klt singularity. Let µ : YP→ (X, o) be a birational morphism, such that µ is an isomorphism over X \ {o}. Let E = i Gi be the divisorial part of µ−1 (o). Then we define the volume vol(X,D),o (Y ) (abbreviated as volX,o (Y ) or vol(Y ) if (X, D; o) is clear) of Y to be X F −1 vol(X,D),o (Y ) := volF −ai Gi ), o (−KY − E − µ∗ (D)) = volo ( i where ai = AX,D (Gi ) is the log discrepancy. 12 We mainly combine the above definition with the following construction. Definition 3.4. For a klt pair (X, D) with an idea a, we denote by c its log canonical threshold lct(X, D; a). We say µ : Y → X is a dlt modification of (X, D + c · a), if P 1. denote the divisorial part of µ∗ (a) by O(− mi Gi ) and denote by µ∗ (KX + D) = KY + DY , then X DY + c · mi Gi = µ−1 ∗ (D) + E where E is the reduced divisor on Ex(µ); P 2. (Y, DY + c · mi Gi ) is dlt; and 3. for any divisor F , a(F ; Y, DY + c · X mi Gi ) = −1 if and only if a(F ; X, D + c · a) = −1. By the argument in [OX12], we know that it follows the MMP result in [BCHM10] that the dlt modification of (X, D + c · a) always exists. More precisely, we can choose general elements fj ∈ a (1 ≤ j ≤ l) which generate a such that l > 1c . Let Dj = (fj ), then Y is the Pl dlt modification of (X, D + c · 1l j=1 Dj ). We do not need property 3 in our argument, but it seems to us it is natural to require this by comparing with [Kol13, Theorem 1.34]. Lemma 3.5. We can indeed assume that −KY − µ−1 ∗ D − E is nef over X. Proof. Since (X, D) is klt, we know that X KY + µ−1 ∗ D + E ∼Q,X a i Gi with ai = AX,D (Gi ) > 0. Running an MMP with scaling by an ample divisor, we obtain a relative minimal model Y 99K Y 0 of l KY + µ−1 ∗ (D + c · X X 1X Dj ) + E ∼Q,X −c · mi Gi + ai Gi = 0. l j=1 i KY + µ−1 ∗ (D + c · X 1X Dj ) + E −  ai Gi = −(KY + µ−1 ∗ D + E), l j=1 So we have l −1 and hence −KY 0 − µ0 ∗ D − E 0 is nef over X. Furthermore, since l 1 −1 X KY + µ−1 Dj , ∗ D + E ∼Q,X −c · µ∗ l j=1 Y 0 also gives a minimal model of the dlt pair l Y, µ−1 ∗ (D  1X + c(1 + ) · Dj ) + E , l j=1 −1 which implies (Y 0 , µ0 ∗ D + E 0 ) is a dlt modification of (X, D + c · we can replace Y by Y 0 . 1 l Pl j=1 Dj ). Therefore, c X,o (ordE ). We can also generalize Lemma When E is irreducible, then volX,o (Y ) = vol 2.7 to the dlt case. Lemma 3.6. In the setting of Definition 3.3, if we assume that −KY − µ−1 ∗ D − E is nef over X. Then X n−1 volX,o (Y ) = ai (−KY − µ−1 . ∗ D − E)|Ei i 13 −1 Proof. Let m be sufficiently divisible such P that L := m(KY + µ∗ D + E) is Cartier. Denote by F the effective Cartier divisor F := i mai Gi . Then 0 → OY (L⊗−(k+1) ) → OY (L⊗−k ) → OF (L⊗−k ) → 0. Since L−1 is nef, we know that R1 µ∗ (L⊗−(k+1) ) = 0. Thus volF o (L) = vol(L|F ), then we conclude by dividing mn in both sides. Lemma 3.7. Let a be an m-primary ideal, we define c = lct(X, D; a) and (Y, E) → X be the dlt modification of (X, D + c · a). Then volX,o (Y ) ≤ lctn (a) · mult(a). P ∗ Proof. Write KY + µ−1 ∗ D + E = µ (KX + D) + i ai Gi , where E is the reduced divisor on Ex(µ). If we denote the vanishing order of µ∗ a along Gi by mi , then since c is the log canonical threshold and for every i, Gi computes the log canonical threshold, we know that c · mi = ai . Thus X ak ⊂ µ∗ OY (− kmi Gi ) =def bk . i It suffices to show that mult(b• ) = volF o (− X mi Gi ), but this follows Lemma 3.2. Lemma 3.8. Notations as above. Then there exists a Kollár component S, such that c vol(ord S ) ≤ vol(Y ). Proof. It follows from Proposition 2.6 that we can choose a model W → Y and run MMP to obtain W 99K Y 0 , such that Y 0 → X gives a Kollár component S with a(Y, E; S) = −1. If we fix a common resolution p : W 0 → Y and q : W 0 → Y 0 , then since −(KY + E) is nef and AY,E (S) = 0, we know −p∗ (KY + E) + q ∗ (KY 0 + S) is q-nef and q-exceptional. By the negativity lemma, we get p∗ (KY + E) ≥ q ∗ (KY 0 + S). Thus c vol(ord S ) = vol(−KY 0 − S) ≤ vol(−KY − E) = vol(Y ). 3.2 Approximating by Kollár components With the above discussions, we can start to prove our theorems. Proof of Theorem 1.3. By Proposition 2.4, we know c X,o (v) = inf lctn (a) · mult(a). inf vol v a By the above construction in Lemma 3.7 and 3.8, for any m-primary ideal a, we know that there exists a Kollár component S, such that n c vol(ord S ) ≤ lct (a) · mult(a). This finishes the proof of the first part of Theorem 1.3. We continue to prove the second part of the theorem. Let {ak }k∈Φ be the associated graded family of valuation ideals induced by v where Φ ∈ R is the value semigroup. For each ak (k ∈ Φ), we denote by ck := lct(X, D; ak ). 14 Let µk : Yk → X be a dlt modification of (X, D; ck · ak ) and Ek the exceptional divisor of Yk over X. Assume the model we obtain from Lemma 3.8 is Yk0 with the Kollár component Sk . We consider the valuation ck · k vk = ordSk . AX,D (S) By [JM12], we know 1 AX,D (v 0 ) ck · k = lct(X, D; ak ) = inf0 1 0 k ≤ AX,D (v) < ∞. v k k v (a ) Then by the Izumi type estimate in [Li15a, Proposition 1.2], we know that vk (m)ordo ≤ vk ≤ c · ordo , c k) for some positive constant c and all k. And by [Li15a, Theorem 2.3] and the fact that vol(v is bounded from above, we know that vk (m) is bounded from below. In particular, by the compactness result [JM12, Proposition 5.9] and Proposition 3.9, we know that there is an infinite sequence {vkj }kj ∈Φ with kj → +∞ which has a limit in ValX,o . Denote by v 0 = lim vki , i→∞ then we know that AX,D (v 0 ) ≤ lim inf AX,D (vki ) = lim cki · ki ≤ AX,D (v) i→∞ i→∞ as AX,D is lower semicontinuous (see [JM12, Lemma 5.7]). We claim for any f , we have v 0 (f ) ≥ v(f ), c 0 ) ≤ vol(v). c and this clearly implies that vol(v 0 ) ≤ vol(v), which then implies vol(v Denote by v(f ) = p. For a fixed kj , choose l such that (l − 1)p < kj ≤ lp. Let k = kj in the previous construction, then v(f ) = p =⇒ v(f l ) = pl, =⇒ f l ∈ apl , =⇒ f l ∈ akj , =⇒ l · ordEi (f ) ≥ mkj ,i for any i, 1 , =⇒ l · ordSkj (f ) ≥ AX,D (Skj ) · ckj kj p =⇒ vkj (f ) ≥ >p− . l l The fourth arrow is because if f l ∈ akj , then f l vanishes along mkj ,i Ei ; and the fifth arrow is because that X KYkj + Ykj + µ−1 mkj ,i Ei , kj ∗ D + Ekj ∼Q,X ckj · and the pull back of KYkj + Ykj + µk−1 D + Ekj is larger than the one from j∗ 0 KYk0 + µk−1 D + Skj ∼Q,X AX,D (Skj )Skj . j∗ j Thus v 0 (f ) = lim vkj (f ) ≥ p = v(f ). Proposition 3.9. Let o ∈ (X, D) be a klt singularity. Let a and b be two positive numbers. Then the subset Ka,b of Valx,X which consists of all valuations with a ≤ v(m) and is sequential compact. 15 AX,D (v) ≤ b Proof. Let {vi } be a sequence contained in K. Let {ai,k } be its associated graded valuative ideals for k ∈ Φi . We can find a countably generated field F ⊂ C, such that R = Spec(RF )×F C for some finitely generated F -algebra RF and D, x are defined over F . Furthermore, we can assume for each pair (i, k), ai,k = (ai,k )F ×F C, for some ideal (ai,k )F ⊂ RF . Denote by XF := Spec(RF ) and DF the divisor of D descending on XF . Now let (vi )F be the restriction of vi on RF . By our definition, we know that ai,k = {f ∈ RF |(vi )F (f ) ≥ k}, and (vi )F ∈ (Ka,b )F where (Ka,b )F is defined for all v ∈ Valx,XF with a ≤ v(mF ) and AXF ,DF (v) ≤ b. By [HLP12, Theorem 1.1], Valx,XF has the same topology as a set of some Euclidean space, thus (Ka,b )F is sequential compact as it is compact by [JM12, Proposition 5.9]. Therefore after passing through a subsequence, (vi )F has a limit (v∞ )F , which can be extended to a valuationPv∞ := (v∞ )F ⊗ C. In fact, v∞ is defined as follows: for any f ∈ R m it can be written f = j=1 fj ⊗F hj such that 0 6= fj ∈ R and h1 , ..., hm ∈ C are linearly independent over F , then m v∞ (f ) = min(v∞ )F (fj ). j=1 We claim vi = (vi |RF ) ⊗F C. In fact, for any f , if vi (f ) = k, then f ∈ ai,k = (ai,k )F ⊗F C, thus (vi |RF ) ⊗F C(f ) = k. To see that for any f , v∞ (f ) = lim vi (f ), we know for some j, v∞ (f ) = (v∞ )F (fj ) = lim(vi |RF )(fj ) ≥ lim sup vi (f ). i i For another direction, if we have a subsequence of i, such that limi vi (f ) < v∞ (f ), after passing to a subsequence again, we can find a j, such that lim vi (f ) = lim vi (fj ) = lim(v∞ )F (fj ) ≥ v∞ (f ), i i i a contradiction. As Example 7.2 shows that for a general klt singularity (X, o), the minimum is not always achieved by a Kollár component. Thus we have to take a limit process. However, if the minimizer v has rational rank 1, then it should always yield a Kollár component. First we have the following result which is inspired by the work in [Blu16a]. We note that it is also independently obtained in [Blu16b]. c Lemma 3.10. If E ∈ ValX,o such that ordE minimizes vol(X, D). Then the Rees algebra associated to ordE is finitely generated. Proof. If we let {a• } be the graded valuative ideas associated to ordE , then we know that c vol(ord E) = ≥ ≥ mult(ak ) kn lim lct(X, D; ak )n · mult(ak ) lim AX,D (ordE )n · k→∞ k→∞ c vol(ord E) c by Proposition 2.4 and our assumption that ordE is a minimizer of vol(X, D). So we conclude that (see [Mus02]) lct(X, D; a• ) := lim k · lct(X, D; ak ) = AX,D (ordE ), k→∞ which we denote by c. Therefore, we can choose  sufficiently small, such that the discrepancy a(E; X, D + (1 − )c · a• ) ∈ (−1, 0), On the other hand, we know lct(X, D; a• ) = lim m · lct(X, D; am ). m→∞ So for sufficiently large m, we know that for all G, the discrepancy a(G; X, D + 1 (1 − )c · am ) > −1. m 16 1 (1−)c·am ) < 0. Then similar to the discussion in 3.4, we can find We also have a(E; X, D+ m 1 1 general Q-divisor ∆, such that (X, D + m (1−)c·∆) is klt and a(E; X, D + m (1−)c·∆) < 0. In particular, we can apply [BCHM10] to obtain a model µ : Y → X such that Ex(µ) = E and −E is µ-ample, which implies the finite generation. Proof of Theorem C. Applying Lemma 3.10, the assumption in Case 1 which says v is a divisorial valuation implies the assumption in Case 2, thus we only need to treat the Case 2. By the proof of Proposition 2.4, we know that if we let ak be the ideal of elements with values at least k, then  n AX,D (v) n mult(ak ) ≥ AX,D (v) · · mult(ak ) ≥ lctn (X, D; ak ) · mult(ak ). kn v(ak ) By the finite generation assumption, we know that akl = alk for sufficiently divisible k and any l. So replace k by kl in the above display and let l → +∞, we know that c X,o (v) ≥ lctn (X, D; ak ) · mult(ak ) ≥ vol c X,o (v). vol Take µ : Y → X to be the dlt modification of (X, D + lct(X, D, ak ) · ak ) as given in Lemma 3.5. The above discussion then implies that c X,o (v) = volX,o (Y ). lctn (X, D; ak ) · mult(ak ) ≥ vol It follows from Proposition 2.6, that we can choose a model W → Y and running MMP to obtain W 99K Y 0 , such that µ0 : Y 0 → X gives a Kollár component S with a(S; Y, µ−1 D∗ + E) = −1. We only need to show that if Y 0 and Y are not isomorphic in codimension 1, then volX,o (Y 0 ) < volX,o (Y ). This is the the local analog of the argument in [LX14, Proposition 5]. We give the details for the reader’s convenience. Let π : Y → Y c be the canonical model of −KY − µ−1 ∗ D − E over X, which exists because −1 −(KY + µ−1 ∗ D + E) ∼Q,X KY + µ∗ (D + c · X 1X Dj ) + E −  AX,D (Gi )Gi l i is a klt pair for  sufficiently small. The assumption that Y 0 and Y are not isomorphic in codimension 1 implies Y c 6= Y . Take p : Ŷ → Y and q : Ŷ → Y 0 a common log resolution, and write −1 ∗ 0 p∗ (KY + µ−1 ∗ D + E) = q (KY 0 + µ ∗ D + S) + G. By negativity lemma (cf. [KM98, 3.39]), we conclude that G ≥ 0. Since X KY + µ−1 AX,D (Gi )Gi ∗ D + E ∼Q,X i and −1 KY 0 + µ0 ∗ D + S ∼Q,X AX,D (S), we know that X p∗ ( AX,D (Gi )Gi ) = q ∗ (AX,D (S)) + G. i For 0 ≤ λ ≤ 1, let Lλ = q ∗ (AX,D (S)) + λG = X bi (λ)Fi , i where Fi runs over all divisor supports on Ŷo := Ŷ ×X {o}, and −Lλ |Ŷo is nef. Define f (λ) = X bi (λ)(−Lλ |Fi )n−1 , i 17 thus f (λ) is non-decreasing as G ≥ 0. By Lemma 2.7 and 3.6, we know that f (1) = volX,o (Y ) f (0) = volX,o (Y 0 ). and Since Y 99K Y 0 are not isomorphic incodimension 1, it must contract some component G1 of E, and the coefficient of G1 in G is a := AY 0 ,µ0 −1 (G1 ) > 0. ∗ D+S Then df (λ) |λ=1 dλ ≥ n−1 n · G · − p∗ (KY + µ−1 ∗ D + E) n−1 n · aG1 · − π∗ (KY + µ−1 ∗ D + E) > 0. = Thus volX,o (Y 0 ) = f (0) < f (1) = volX,o (Y ). With all this discussion, we also obtain the following result, which characterizes the equality condition in Proposition 2.4 and is a corresponding generalization of [dFEM04, Theorem 1.4] (see Remark 3.12) for smooth point. See [Laz04b, 9.6] for more background. Theorem 3.11. Let (X, o) = (Spec(R), m). Assume (X, D) is a klt singularity for a Qdivisor D ≥ 0. If there exists an m-primary ideal b, such that lctn (X, D; b) · mult(b) is equal c to inf v∈ValX,o vol(v), then (X, D) is minimized at a Kollár component. Moreover, for an ideal a, lctn (X, D; a) · mult(a) = inf v∈ValX,o c vol(v), if and only if there exists a Kollár component S and a positive integer k such that ordS computes the log canonical threshold of a on o ∈ (X, D) with c vol(ord S) = inf v∈ValX,o c vol(v), and the only associated Rees valuation of ak is ordS . Proof. By the argument in Theorem C, we see that lctn (X, D; b) · mult(b) c X,o if and only if the dlt modification of reaches the minimum of vol (X, D; c · b) where c = lct(X, D; b) is a model µ : Y → X which only extracts a Kollár component S of (X, D) such that ordS c X,o . is a minimizer of vol Now we fix an ideal a such that lctn (X, D; a) · mult(a) = inf v∈ValX,o c vol(v), and S is the Kollár component we obtain as above. Let µ∗ a have the vanishing order m along S. Since S is Q-Cartier, then let k be a positive integer such that mkS is Cartier. We claim that µ∗ (ak ) = OY (−mkS). Granted this for now, then we know that Y coincides with the normalized blow up X + → X of ak , i.e., S is the only associated Rees valuation for ak . To see the claim, since −mkS is Cartier, we know that µ∗ (ak ) = c · OY (−mkS) for some ideal c ⊂ OY , 18 and we aim to show that c is indeed trivial. If not, we take a normalized blow up φ : Y + → Y of c, so φ∗ c = OY + (−E) for some effective Cartier divisor E. Since −S is ample over X, we can choose l sufficiently big, such that −D := −φ∗ (mklS) − E on Y + is ample over X. Since (µ ◦ φ)∗ akl = OY + (−φ∗ (mklS) − lE) ⊂ OY + (−φ∗ (mklS) − E), we know that ∗ mult(akl ) ≥ volF o (−φ (mklS) − E) = volF o (−D) = mkl(−D|φ∗ S )n−1 + (−D|E )n−1 > mkl(mkl(−S)|S )n−1 = (mkl)n vol(ordS ). Since lctn (X, D; a) = 1l · AX,D (ordS ), we can easily see the above inequality is contradictory to the assumption that c lctn (X, D; a) · mult(a) = vol(ord S ). Here the inequality in the fourth row comes from a similar but easier calculation as in the proof of of Theorem C. For the converse direction, since a reaches the minimum if and only if ak reaches the minimum, then we can replace a by ak and assume its only associated Rees valuation is ordS , i.e., we know that the normalized blow up µ : X + → X, has the property that µ∗ (a) = OX + (−mS). Then the valuative ideal amk = ak , where ak means the integral closure of ak . And lct(X, D; a) = AX,D (S) . m We claim that n! · lR (R/ak ) , k→+∞ kn mult(a) = lim and this immediately implies that n c vol(ord S ) = lct(X, D; a) · mult(a). To see the claim, if we denote by J (ak ) = J (X, D; ak ) the multiplier ideal, then we know that n! · lR (R/J (ak )) mult(a) = lim , k→+∞ kn by the local Skoda Theorem [Laz04b, 9.6.39]. On the other hand, since (X, D) is klt, we have ak ⊂ J (ak ), thus we are done. Remark 3.12. In the proof, we indeed show that for any k such that mkS is Cartier on Y , the integral closure ak coincides with the valuative ideal amk of ordS . 4 4.1 K-semistability implies minimum Degeneration to initial ideals Let (X, o) = (Spec(R), m) be an algebraic singularity such that (X, D) is klt for a Q-divisor D ≥ 0. Denote by m the maximal ideal of o ∈ X. Suppose b is an m-primary ideal on X. We consider its flat degeneration W/A1 where W is the underlying coarse moduli space of W 19 defined in Section 2.3. We keep the notation in Section 2.3 and denote by v0 the valuation ordS . Next we will describe explicitly a way of obtaining an ideal B on X such that B⊗OX×C∗ = b and B ⊗ OC ∼ = in(b) by considering the closure of b × C∗ on the pull back Z. For this we consider the extended Rees algebra (see [Eis94, 6.5]): M M R0 = R0k := ak t−k ⊂ R[t, t−1 ]. k∈Z k∈Z Notice that if k ≤ 0, then ak = R. It is well known that: R0 ⊗C[t] C[t, t−1 ] ∼ = R[t, t−1 ], R0 ⊗C[t] C[t]/(t) ∼ = +∞ M (ak /ak+1 )t−k ∼ = T. k=0 Geometrically this exactly means W = Spec(R0 ) and W ×A1 (A1 \ {0}) = X × (A1 \ {0}), W ×A1 {0} = C. Notice that there is a natural Gm -action on R0 given by the Z-grading. For any f ∈ R, supposing v0 (f ) = k then we define f˜ = t−k f ∈ ak t−k ⊂ R0 , and denote in(f ) = [f ] = [f ]ak+1 ∈ ak /ak+1 = Tk , where we use [f ]a to denote the image of f in R/a. Then we define the ideal B to be the ideal in R0 generated by {f˜; f ∈ b}, and in(b) the ideal of T generated by {in(f ); f ∈ b}. The first two items of the following lemma is similar to (but not the same as) [Eis94, Theorem 15.17] and should be well known to experts. Notice that here we degenerate both the ambient space and the ideal. A version of the equality (4) was proved in [Li15b, Proposition 4.3]. Lemma 4.1. 1. There are the identities: (R0 /B) ⊗C[t] C[t, t−1 ] ∼ = (R/b)[t, t−1 ], (R0 /B) ⊗k[t] k[t]/(t) ∼ = T /in(b). 2. The C[t]-algebra R0 /B is free and thus flat as a C[t]-module. In particular, we have the identity of dimensions: dimC (R/b) = dimC (T /in(b)) . (4) 3. If b is mR -primary, then in(b) is an mT -primary homogeneous ideal. Proof. The statement (1) follows easily from the definition. Next wen prove (2). Denote by o ck = Tk ∩ in(b) the k-th homogeneous piece of in(b). We (k) fix a basis in(fi ); 1 ≤ i ≤ dk of Tk /ck . We want to show that  h  i g (k) (k) fi = fi A :=  0 B 1 ≤ i ≤ dk ⊂ R0 /B is a C[t]-basis of R0 /B. We first verify that A0 is a linearly independent set. To prove this, we just need to show that A0 is a C[t, t−1 ]-linearly independent subset of (R/b)[t, t−1 ]. It is then enough to show that n o (k) (k) A := [fi ] = [fi ]b | 1 ≤ i ≤ dk ⊂ R/b. (5) is C-linearly independent, which can be verified directly as in [Li15b, Proposition 4.3]. See also [Eis94, Proposition 15.3]. So we just need to show that A0 spans R0 /B. Equivalently, we need to show that for any f ∈ R, [f˜] = [f˜]B ∈ R0 /B is in the C[t]-span of A0 . This can be shown again with the help of A in (5), that is, it is enough to prove that A C-spans R/b. Indeed, assuming the latter, 20 P (k) for any f ∈ R, there exists a linear combination g = i,k cik fi such that f − g =: h ∈ b. If m = v0 (f ), then X (k) f˜ = t−m f = cik t−m fi + t−m h i,k Because t−m h ∈ B, the above indeed implies [f˜] is in the C[t]-span of A0 . To prove that A indeed C-spans R/b, we first claim that the following set is finite: {v0 (g) | g ∈ R − b}. Indeed because b is m-primary, there exists N > 0 such that mN ⊆ b ⊆ m. So R−b ⊆ R−mN . Now the claim follows from the fact that for any element f ∈ mN , v0 (f ) ≤ c · A(v0 ) · N by Izumi’s theorem, where c is a uniform constant not depending on f . If there is [f ] 6= 0 ∈ R/b that is not in the span of A, then we can choose a maximal k = v0 (f ) such that this happens. There are two cases: (k) 1. If in(f ) ∈ Tk \ ck , then because in(fi ) is a basis of Tk /ck , there exists tj ∈ R such Pdk (k) that in(f ) − j=1 tj in(fj ) = in(g) ∈ ck for some g ∈ b. So we get:  v0 f − dk X  (k) tj fj − g  > k. j=1 Pdk Pdk (k) (k) By maximality of k, [f − j=1 tj fj − g] = [f ] − j=1 tj [fj ] and hence [f ] is in the span of A. Contradiction. 2. If in(f ) ∈ ck = in(b) ∩ Tk . Then in(f ) = in(g) for some g ∈ b. So v0 (f − g) > k and hence [f − g] is in the span of A by the maximal property of k. But then [f ] = [f − g] + [g] = [f − g] is in the span of A. Contradiction. To prove part 3 of the Lemma, we need to show that there exists N ∈ Z>0 such that N1 mN T ⊆ in(b) ⊆ mT . Because b is mR primary, there exists N1 ∈ Z>0 such that mR ⊆ b ⊆ mR . m By Izumi’s theorem, there exists l ∈ Z>0 such that alm ⊆ mR for any m ∈ Z>0 . By letting N = lN1 , it’s easy to see that mN T ⊆ in(b) ⊆ mT . Lemma 4.2. If b• = {bk } is a graded family of ideals of R, then in(b• ) := {in(bk )} is also a graded family of ideals of T . Proof. We need to show that: in(bk ) · in(bl ) ⊆ in(bk+l ). If v0 (f ) = k and v0 (g) = l, then v0 (f g) = k + l. in(f ) · in(g) = [f ]ak+1 · [g]al+1 = [f g]ak+l+1 = in(f · g). Lemma 4.3. If b• is a graded family of ideals, then lctn (b• ) · mult(b• ) ≥ lctn (in(b• )) · mult(in(b• )). (6) Proof. By the flatness of B and the lower semicontinuity of log canonical thresholds, we have lct(bk ) ≥ lct(in(bk )). Therefore, by (4) lctn (bk ) · lR (R/bk ) ≥ lctn (in(bk )) · lT (T /in(bk )). Taking limits as k → +∞, we then get the inequality (6). 21 4.2 Equivariant K-semistability and minimizing In this section, we will take a detour to show the discussion in Section 4.1 can be used to study the equivariant K-semistability. Here for a Q-Fano variety (X, D) with an action by an algebraic group G, we call it G-equivariantly K-semistable (resp. Ding semistable) if for any G-equivariant test configuration, its generalized Futaki (resp. Ding) invariant is nonnegative. Let T = (C∗ )k be a torus. First we improve the two approximating results to the equivariant case. Lemma 4.4. Let (X, o) = (SpecR, m) and D ≥ 0 a Q-divisor, such that o ∈ (X, D) is a klt singularity. Assume x ∈ (X, D) admits a T -action. Then we have c X,o (v) = inf lctn (X, D; a) · mult(a) = inf vol c X,o (ordS ), min vol v a S (7) where on the left hand side the infimum runs over all the valuations centered at o, and on the middle it runs over all the T -equivariant m-primary ideals; and at the end, it runs over all T -equivariant Kollár components. Proof. Let {a• } = {ak } be a graded sequence for an m-primary ideal a. The discussion in Section 4.1 implies that for {b• } =defn in(a• ) lctn (X, D; b• ) · mult(b• ) ≤ lctn (X, D; a• ) · mult(a• ). Since lctn (X, D; b• ) · mult(b• ) = lim lctn (X, D; bm ) · mult(bm ), m we conclude the first inequality as a corollary of Proposition 2.4. For the second equality, we just need to show that the construction in Section 3.1 can be established T -equivariantly. This is standard, which relies on two facts: first, we can always take an equivariant log resoltuion of (X, D, a) (see [Kol07]); second, as T is a connected group, for any curve C in a T -variety and any t ∈ T , t·C will always be numerically equivalent to C; as the minimal model program only depends on the numerical class [C], we know that any MMP sequence is automatically T -equivariant. Therefore, for any T -equivariant m-primary ideal a, we can find a T -equivariant dlt modication Y → X and then a T -equivariant Kollár component S, such that c lctn (X, D; a) · mult(a) ≥ vol(Y ) ≥ vol(ord S ). In the below, we also need use the main idea from Fujita’s work (see [Fuj15, Fuj16]). Proposition 4.5 ([Fuj16]). Let (V, ∆) be an (n − 1)-dimensional log-Fano pair which is T equivariantly log-Ding-semistable. Let δ be a positive rational number such that −δ −1 (KV + ∆) is Cartier. Let IM ⊂ · · · ⊂ I1 ⊂ OV be a sequence of T -invariant coherent ideal sheaves and assume I := IM + IM −1 t1 + · · · + I1 tM −1 + (tM ) ⊂ OV ×C form a flag ideal. Let Π : V → V × C be the blowup along I. Denote D = Π∗ (∆ × C). Let E ⊂ X be the Cartier divisor defined by OV (−E) = I · OV , and let  L := Π∗ OV ×C −δ −1 (KV ×C/C + ∆ × C) ⊗ OX (−E). Assume that L is semi ample over C. Then (V, D; L) is naturally seen as a (possibly nonnormal) semi test configuration of (S, ∆; −δ −1 (KV + D)). Under these conditions, ((V × C1 , ∆ × C); I δ · (t)d ) must be sub log canonical, where d := 1 + δ n L̄n . n(−KV − ∆)n−1 The following argument is essentially in [Li15b]. 22 Proposition 4.6. If (V, ∆) is a projective log Fano variety and o ∈ (X, D) is the cone of (V, ∆) induced by some ample Cartier divisor L = −r−1 (KV + ∆). Then the canonical c X,D if and only if (V, ∆) is Kvaluation obtained by blowing up the vertex minimizes vol semistable. Proof. First we assume (S, ∆) is (n − 1)-dimensional log-K-semistable and prove the volume minimizing. By Lemma 4.4, we only need to prove that for any C∗ -invariant divisorial valuation v over (X, o), c c vol(ord V ) ≤ vol(v). L+∞ L+∞ 0 Let c1 = v(V ) > 0 and R = k=0 Rk = k=0 H (V, kL) thus X = Spec(R). On R, we define a filtration M FR(t) = F kt Rk , k where F x Rk := H 0 (V, L⊗k ⊗ ax ), and ax = {f ∈ OV | v(f ) ≥ x}. Then the volume is defined to be vol(FR(t) ) := lim sup m→∞ dimC F mt Rm . mn /n! By [Li15b, (18)], we get a formula for vol(v): vol(v) = = = n! dimC R/am (v) mn Z +∞   dt Ln−1 − vol FR(t) n+1 n c1 t c1  Z +∞ (t) dvol FR . − tn c1 lim m→+∞ Then we consider the following function Z +∞   Ln−1 λsdt (t) Φ(λ, s) = − n vol FR n (λc1 s + (1 − s)) (1 − s + λst)n+1 c1 Z +∞ −d vol(FR(t) ) = . ((1 − s) + λst)n c1 Φ(λ, s) satisfies the following properties: 1. For any λ ∈ (0, +∞), we have: Φ(λ, 1) = vol(λv) = λ−n vol(v), Φ(λ, 0) = vol(v0 ) = Ln−1 . 2. For any λ ∈ (0, +∞), Φ(λ, s) is continuous and convex with respect to s ∈ [0, 1]. 3. The directional derivative of Φ(λ, s) at s = 0 is equal to:  Z +∞    1 vol FR(t) dt . Φs (λ, 0) = nλLn−1 λ−1 − c1 − n−1 L c1 r Let λ∗ = A(X,C(D)) (v) . By Item 1 and 2, we just need to prove Φs (λ∗ , 0) ≥ 0. Let v̄ = v|C(S) be the restriction of v under the inclusion C(S) ,→ C(X). It is known that v̄ = b · ordE where b > 0 and ordE is a divisorial valuation on C(S). Using Adjunction formula, it is easy to show that: λ−1 − c1 = A(X,D) (v) − c1 = AV,∆ (v̄) = b · AV,∆ (E). r By change of variables we get: Z +∞ Z   (t) vol FR dt = c1 0 23 +∞   vol Fv̄ R(t) dt. where Fv̄ R(t) = M H 0 (V, L⊗k ⊗ akt ), and akt = {f ∈ OV | v̄(f ) ≥ kt}. k So we get: Φs (λ∗ , 0)  Z +∞    1 vol Fv̄ R(t) dt = nλ∗ Ln−1 A(V,∆) (v̄) − n−1 L 0  Z +∞    1 n−1 (t) = nλ∗ L b A(V,∆) (E) − n−1 dt . vol FordE R L 0 By the valuative criterion of (log-)K-semistability derived in [Li15b, Fuj16, LL16], we get Φs (λ∗ , 0) ≥ 0 (see e.g. Proposition 4.5). Conversely the statement follows immediately by the valuative criterion for log-K-semistability in [Li15b, Fuj16, LL16] by choosing a family of valuation vs emanating from v0 = ordS in the direction of ordE as in [Li15b, Section 7]. Remark 4.7. The fact that K-semistability implies the canonical valuation is a minimizer was proved in [LL16], where (V, ∆) is assumed to be analytic K-semistable, i.e., if there exists a special test configuration (X , D) that degenerates (X, D) to a log Fano (X0 , D0 ) with a conic Kähler-Einstein metric. If (V, ∆) is analytic K-semistable, then we know (V, ∆) is K-semistable. The converse implication conjecturally true, and known for smooth X when D = 0 (see [CDS15, Tia15]). With all the techniques we have, we can prove Theorem 1.4. Proof of Theorem 1.4. Let (X, D) be a cone of −r(KV + ∆) over (V, ∆) for some sufficiently divisible positive integer r. And we consider the minimizing problem of the normalized local volume at the T -singularity o which is the vertex. We aim to show that if (V, ∆) is c X,D . T -equivariantly K-semistable then ordV minimizes vol Following the proof of Lemma 4.4, by degenerating the ideal r times, we can find a sequence of T -equivariant ideals {a}i∈I such that inf lctn (X, D; a) · mult(a) = i∈I c min vol(v). v∈ValX,o Then using the equivariant resolution and running an MMP process, we can find a sequence of T -equivariant Kollár components Si such that c inf vol(ord Si ) = i c min vol(v). v∈ValX,o Since we assume that for any T -equivariant special degeneration of (S, ∆), the generalized Futaki invariant is non-negative, and for special test configuration, the generalized Futaki invariant is the same as Ding invariant, we know that the Ding invariant for any T -equivariant special test configuration is non-negative. Using the fact that MMP decreases Ding invariant (see [Fuj16, Corollary 3.4] and its proof), we know this implies that the Ding invariant for any T -equvariant test configuration is nonnegative. Then for any T -equivariant Kollár component Si , we consider v = ordSi ∈ ValX,o . Denote its induced divisorial valuation b · ordE on S. Restricting the calculation in [Fuj16] to the equivariant setting, we conclude that Z +∞   1 vol FordE R(t) dt ≥ 0. A(V,∆) (E) − n−1 L 0 Running the construction as in the proof of Proposition 4.6, then we know that Φs (λ∗ , 0) ≥ 0 which gives that c ∗ ) ≤ vol(ord c vol(v Si ). This implies that the canonical component is a minimizer which then implies that (V, ∆) is K-semistable by Proposition 4.6 . 24 4.3 Proof of Theorem A Let (X, o) = (Spec(R), m) be an algebraic singularity such that (X, D) is klt for a Q-divisor D ≥ 0. Let S be a Kollár component and ∆ = ∆S be the different divisor defined by adjunction (KY + S + µ−1 ∗ D)|S = KS + ∆S where Y → X is the extraction of S. We follow the notation in Section 2.3. Lemma 4.8. Let b• be a graded sequence of m0 -primary ideal. If (S, ∆S ) is K-semistable, then we have c C,C ,o (ordS ). lctn (b• ) · mult(b• ) ≥ vol ∆ Proof. Using the result in [JM12], we have lctn (b• ) · mult(b• ) = = n mult(bk ) k · lct(bk ) · kn n lim lct (bk ) · mult(bk ). lim k→+∞ k→+∞ c C,C ,o (ordS ) is equal to By Proposition 2.4, it suffices to show that vol ∆ c C,C ,o (v) min vol ∆ v for v runs over valuations centered on o. It follows from Proposition 4.6 that if we choose d sufficiently divisible, such that C (d) = C(S, H) is constructed as the cone over S with some ample Cartier divisor H proportional c (d) (d) (d) . By to −(KS + ∆S ), then the canonical valuation ordS is a minimizer of vol C ,C∆ +CD Proposition 4.9, this implies the same for C. c (C,C ) minimizes at ordS if and only if Proposition 4.9. Under the above notation, vol D c (d) (d) (d) minimizes at ordS (d) . vol (C ,C +C ) ∆ D Proof. The degree d cover h : C → C (d) is a fiberwise map and the Galois group G =defn Z/d is a natural subgroup C∗ . Let E be a Kollár component over C (d) , by Lemma 2.9 we know h∗ (E) is a Kollár component over C, and it follows from Lemma 2.10 (or [Li15b, Lemma 6.9]) that c c ∗ d · vol(ord E ) = vol(h E). c C,C , then the corresponding canonical valuation also minimizes So if ordS minimizes vol ∆ c (d) (d) (d) . vol C ,C∆ +CD For the converse, let E be a T -invariant Kollár component over C, since it is G-invariant, by Lemma 2.9 we know it is a pull back of a Kollár component F over C (d) . If the canonc (d) (d) (d) , then we see over C, vol(ord c ical valuation minimizes vol S ) is less or equal to C ,C∆ +CD c c vol(ord E ) for any T -equivariant Kollár component E, therefore ordS is a minimizer of volC,C∆ by Lemma 4.4. Proof of Theorem A. With the notation as in Section 2.3, we denote by D the birational transform of D × A1 on Z 0 and write aT ∼Q,X KZ 0 + T . Restricting over a general fiber and taking the coarse moduli spaces, we obtain aS ∼X,Q KY + S + µ−1 ∗ (D), then a = AX,D (S). Similarly, over the central fiber over 0, we get aS0 ∼X,Q KY0 + S0 + µ−1 0,∗ CD , thus a = AC,CD (S0 ), where µ0 : Y0 → C is the blow up of the vertex with the exceptional divisor S0 . We also know that volX,o (ordS ) = (−S|S )n−1 = (−S0 |S0 )n−1 = volC,p (ordS0 ). 25 Combining all the above, we know that for any ideal b on X, if we let b• = {bk }, then c X,o (ordS ) vol = volX,o (ordS ) · AnX,D (S) = volC,p (ordS0 ) · AnC,CD (S0 ) = inf volC,p (ordv ) · AnC,CD (v) v ≤ lctn (in(b• )) · mult(in(b• )) ≤ lctn (b) · mult(b), where the last two inequalities follow from Lemma 4.3 and 4.8. Thus we conclude that c X,o (ordS ) ≤ inf lctn (b) · mult(b) = inf vol c X,o (v), vol v b where the second equality follows from Proposition 2.4. 5 Uniqueness In this section, we will prove Theorem B about the uniqueness of the minimizers among all Kollár components. There are two steps: first we prove this for cone singularities; then for a general singularity, we combine the deformation construction with some results from the minimal model program to essentially reduce it to the case of cone singularities. 5.1 Case of cone singularity We first settle the case of cone singularities. It can be proved using Proposition 5.9 and [Li15b, Theorem 3.4]. Here we give a different proof, which analyzes the geometry in more details. A similar argument in the global case appears in the proof of [Liu16, Theorem 3], where a characterization of quotients of Pn is given by achieving the maximal possible volumes among all K-semistable Q-Fano varieties with only quotient singularities. Let (V, ∆) be an (n − 1)-dimensional log Fano variety and −(KV + ∆) = rH for an ample Cartier divisor H and r ≤ n. Assume X 0 := C(V, H) is the affine cone over the base V with the vertex o and let X be the projective cone and D be the cone divisor over ∆ on X. In the below, for a variety •, we denote the product • × A1 by •A1 . Consider a Kollár component S over o ∈ (X, D) with the extraction morphism µ : Y → X. Let µA1 (= µ × id) : YA1 → XA1 be the extraction of SA1 . We carry out the deformation process in Section 2.3 with respect to S. Here X is a projective variety instead of a local singularity, but the construction is exactly the same. We denote by Z (resp. W ) the coarse moduli space of Z (resp. W), so there are morphisms, ψ1 : Z → W , φ1 : Z → YA1 and π : W → XA1 . We denote by φ = µA1 ◦ φ1 . 26 Then we have the following equalities: ∗ 1. KYA1 + (µA1 )−1 ∗ (DA1 ) = µA1 (KXA1 + DA1 ) + aSA1 with a = AX,D (S) − 1;  −1 ∗ 2. KZ + φ−1 ∗ (DA1 ) = φ1 KYA1 + (µA1 )∗ DA1 + F;  −1 ∗ 3. KZ + φ−1 ∗ DA1 = ψ1 KW + (DA1 )W + aSA1 , where (DA1 )W := ψ1∗ φ∗ (DA1 ). The first two equalities imply: KZ + φ−1 ∗ (DA1 )  = φ∗1 KYA1 + (µA1 )−1 ∗ DA1 + F = φ∗1 µ∗A1 (KXA1 + DA1 ) + aφ∗1 SA1 + F = φ∗ (KXA1 + DA1 ) + aSA1 + (a + 1)F. So AXA1 ,DA1 (F) = a + 2 = AX,D (S) + 1. This implies: KW + (DA1 )W = π ∗ KXA1 ,DA1 + AX,D (S)C̄. Recall that −KX − D = (1 + r)L, where L = O(1) for the cone construction, so we get: KW + (DA1 )W = −(1 + r)ρ∗ L + AX,D (S)C̄, where ρ : W → X the composite of π : W → XA1 with the first projection XA1 → X. Remark 5.1. 1. As in [LL16], we define the cone angle parameter β = nr . Denote by V∞ the section at infinite place of X and V∞ the birational transform of (V∞ )A1 . Then −(KX + D + (1 − β)V∞ ) = δL with δ = r n+1 n , we get: KW + (DA1 )W + (1 − β)V∞ =  π ∗ KXA1 + DA1 + (1 − β)V∞ + AX,D (S)C̄ = −δρ∗ L + AX,D (S)C̄. (8) (9) ∗ 2. Because KY + µ−1 ∗ D = µ (KX + D) + (AX,D (S) − 1)S, we have:  ∗ KY + µ−1 ∗ D + (1 − β)V∞ = µ KX + D + (1 − β)V∞ + (AX,D (S) − 1)S = −δµ∗ L + (AX,D (S) − 1)S. The above construction works for any Kollár component. From now on we assume that (V, ∆) is K-semistable and S minimizes the normalized volume, i.e. it satisfies n n−1 c c vol(ord ), S ) = vol(ordV0 ) = r (H (10) where V0 denotes the canonical divisor obtained by blowing up the vertex of the cone and we aim to show S = V is the canonical component. We note that by Proposition 4.6 , we c know that vol(ord V0 ) is the minimal normalized volume. Then we have: c rn (H n−1 ) vol(ord S) = . vol(ordS ) = AX,D (S)n AX,D (S)n In Section 4.2, we have used the filtration induced by a valuation (see also [BHJ15, Fuj15]). Here we use the same construction but for sections on the projective cone instead of the base. Definition 5.2 (Filtration by valuation). Fixed a valuation v. Let Sm = H 0 (X, L⊗m ). Define F x Sm ⊂ Sm to be a decreasing filtration (with respect to x) as follows: F x Sm := H 0 (X, L⊗m ⊗ ax ), where ax = {f ∈ OX | v(f ) ≥ x}. L L On m=0 Sm , we define FS (t) = F kt Sk . Then the volume is defined to be vol(FS (t) ) := lim sup m→∞ 27 dimC (F mt Sm ) . mn /n! Proposition 5.3. With the above notation, if the case (V, ∆) is log K-semistable, then (X, D + (1 − β)V∞ ) is log K-semistable. As a consequence, Z +∞ δ vol(FS (x) )dx ≥ 0. AX,D (S) − n (L ) 0 Proof. By Theorem 1.4, we only need to check this is true for C∗ -equvariant special test configuration (X , D + (1 − β)V)/P1 of (X, D + (1 − β)V∞ ), where we consider the test configuration over P1 by adding a trivial fiber over {∞}. Consider the closure of V ⊃ V∞ ×(P1 \{0}). As (1+r)V ∼Q −(KX +D), we know that if we denote by L the polarization on the test configuration extending L, then (1 + r)V ∼Q,P1 −KX − D = (1 + r)L as the fiber over 0 is irreducible. Let ∆∞ (= ∆) = V∞ ∩ D and E be the closure of ∆∞ × (P1 \ {0}), then (KX + D + V)|V = KV + E as X is smooth along the codimension 2 points over 0 and so there is no different divisor. Then the generalized Futaki invariant of (X , D + (1 − β)V)/P1 is Fut(X ) = − 1 (−KX /P1 − D − (1 − β)V)n+1 . (n + 1)(δL)n Since V∞ ∼ L and δ = r n+1 n , it’s easy to verify that the generalized Futaki invariant of the induced test configuration of (V, ∆) is Fut(V) = − 1 nrn−1 H n−1 ((−KV/P1 − E)|V )n = Fut(X ). Recall the log-K-semistability is equivalent to the log-Ding-semistablity (see e.g. [Fuj16]). Then the second part is a standard generalization of [LL16, Proposition 4.5] to the log setting, and we skip it. The key calculations are given by the following results proved in in [LL16]. Proposition 5.4. Suppose (V, ∆) is log-K-semistable. If S is a Kollár component obtaining c over (X, o), then the graded filtration induced by S satisfies the following the minimum of vol two conditions: 1. AX,D (S) − 2. Denote τ := q n (Ln ) vol(ordS ) . δ (Ln ) Z +∞ vol(FS (x) )dx = 0. 0 We have:   vol FS (x) = volY (µ∗ L − xS) = (Ln ) − vol(ordS )xn for any x ∈ [0, τ ]. Proof. By Proposition 5.3, we know (X, D + (1 − β)V∞ ) is log K-semistable. Then it follows from precisely the equality case of the Formula (25) and (29) in [LL16]. Lemma 5.5. We have τ = AX,D (S) . r Proof. Combining 1 and 2 in Proposition 5.4, we know that Z  r(1 + n) τ n AX,D (S) − L − vol(ordS )xn dx = AX,D (S) − r · τ = 0. n · Ln 0 By arguing as in [Fuj15] (see also [Liu16]), we know that: Lemma 5.6. We know τ is the nef threshold, i.e. τ = sup {x| µ∗A1 L − xS is ample } . 28 Proof. When the point is smooth, this follows from [Fuj15, Theorem 2.3(2)]. Exactly the same argument can be used to treat the current case. Theorem 5.7. If S is a Kollár component obtaining the minimum of the normalized volume, then S is the canonical component V0 . We first show the following statements. Lemma 5.8. 1. ρ∗ L − τ C̄ is base-point-free, and contracts Y to S∞ (∼ = S) ⊂ C̄ as the section at the infinite place. 2. AX,D (S) = r and there is a special test configuration degenerating (V, ∆) into (E, ∆E ). Moreover, there is a special test configuration of (X, D + (1 − β)V∞ ; L) to (C̄, DC̄ + (1 − β)S∞ ; L0 ) which is indeed an isomorphism, where DC̄ is the intersection of C̄ with (D × A1 )W . Proof. The proof of this part is along the similar line in [Liu16, Proof of Lemma 33]. First we observe the following restrictions of ρ∗ L − xC̄: 1. ρ∗ L − xC̄ Xt ∗ 2. ρ L − xC̄ 3. ρ∗ L − xC̄ Y0 C̄ = L, t 6= 0; = µ∗ L − xS; = −xC̄|C̄ = xY0 |C̄ = xS∞ = xOC̄ (1). So by Lemma 5.6, it is easy to see that ρ∗ L − xC̄ is ample when x ∈ (0, τ ). To show that ρ∗ L − τ C̄ is base-point-free, we calculate by using (8): m(ρ∗ L − xC̄) − KW − (DA1 )W Notice that: = m(ρ∗ L − xC̄) + (1 + r)ρ∗ L − AX,D (S)C̄   mx + AX,D (S) ∗ = (m + 1 + r) ρ L − C̄ . m+1+r mx + AX,D (S) AX,D (S) <τ = m+1+r r if and only if x<   1 AX,D (S) 1+ . m r Because this is satisfied for x=τ = AX,D (S) r for any m > 0, the first statement holds by base-point-free theorem [KM98, Theorem 3.13]. Next we claim that H 0 (Y, m(µ∗ L − τ S)) ∼ (11) = H 0 (S, −mτ S) for any m sufficiently divisible. To see this, we consider the exact sequence: 0 → OY (m(µ∗ L − τ S) − S) → OY (m(µ∗ L − τ S)) → OY (m(µ∗ L − τ S)) ⊗ OS → 0, (12) and its associated long exact sequence of cohomology groups. By the above discussion, and m(µ∗ L − τ S) − S − KY = m(µ∗ L − AX,D (S) S) + (1 + r)µ∗ L − AX,D (S)S r is ample, it follows from the Kawamata-Viehweg vanishing theorem that  H 1 Y, m(µ∗ L − τ S) ⊗ O(−S) = 0 for any m ≥ 0. We also have  H 0 Y, m(µ∗ L − τ S) ⊗ O(−S) = 0 for any m ≥ 0. as τ is also the pseudo-effective threshold. Thus we know |m(ρ∗ L − τ C̄)| contracts the fiber W ×A1 {0} to C̄ for sufficiently divisible m. This finishes the proof of (1). We denote by θ : W → X the induced morphism and there is an ample line bundle L on X such that θ∗ L = ρ∗ L − τ C̄. 29 Next we prove (2). Let (DA1 )X be the push forward of (DA1 )W on X . Then −KX − (DA1 )X and (1 + r)L coincide outside X0 , they must be linearly equivalent on the whole X because X0 is irreducible. In particular, they are linearly equivalent when restricted to X0 . Since (KY + µ−1 ∗ D + S)|S = KS + ∆S ∼Q AX,D (S) · S|S , we know that −KX − (DA1 )X |X0 = −KC̄ − DC̄ ∼Q (1 + AX,D (S))S∞ . Similarly, we have L|X0 ∼Q τ S with τ = AX,D (S) . r Therefore, 1 + AX,D (S) = (1 + r) AX,D (S) , r which implies AX,D (S) = r and τ = 1. The degree of V∞ under L is L|n−1 X0 · V ∞ = Ln−1 · V∞ = Ln , while the degree of S is L|n−1 X0 · S = τ −1 Ln0 = Lnt = Ln0 . The restriction θ|V∞ : V∞ → S is finite since (ρ∗ L − τ C̄)|V∞ = L|V∞ is ample. And the degree is 1 by the above calculation on degrees, which implies this is an isomorphism. We claim Y is indeed the P1 -bundle over V∞ induced by blowing up the vertex of X, S is a section and the morphism θ is just contracting the P1 -bundle. Granted this for now, we then indeed have an isomorphism from (X, D + (1 − β)V∞ ; L) to (C̄, DC̄ + (1 − β)S∞ ; L0 ). To see the claim, let l be a curve contracted by θ, we want to show that it is the birational transform of a ruling line of X. To see this, since (ρ∗ (L)− C̄)·l = 0, we know that ρ∗ (L)·l = 1. So the image ρ∗ l of l in X is a line, and it passes through the vertex. Therefore, it is a ruling of the cone. By the above proof, let V be the birational transform of (V∞ )A1 on X , and H the extension of HA1 \ {0} on X , we know that: ! +∞ M X = ProjV Sk , k=0 where Sk = k M (H 0 (V, iH) · uk−i ). i=0 From this we easily see that S and V give the same component over the vertex. 5.2 The general case In this section, we prove Theorem B in the general case. We first show that the cone case we prove in Section 5.1 can be generalized to orbifold cone. Let T = C∗ . c X,x is Proposition 5.9. Let x ∈ (X, D) be a T -singularity. Assume a minimizer v of vol given by a rescaling of ordF for a Kollár component F , then v is T -equivariant. 30 Proof. Let a be an ideal whose normalized blow up gives the model of extracting the Kollár component F (see the proof of Proposition 3.11). Denote the degeneration of {a• } := {ap } by b := {in(ap )} (which in general is not necessarily equal to but only contains (in(a))p ). Since n c mult(a) · lctn (X, D; a) = vol(ord F ) ≥ mult(b• ) · lct (X, D; b• ), But mult(a) = mult(b• ) and lct(X, D, a) ≥ lct(X, D, b• ), we know that 1 lct(X, D, a) = lct(X, D, b• ) = lim lct(X, D, bk ), k→∞ k which we denote by c. In particular, for we can choose  sufficiently small, and k sufficiently large, such that the log discrepancy al (F, X, D + (c − )a) < 1 and (X, D + (c − ) k1 bk ) is klt. Thus by [BCHM10] we can construct a model Z → W =defn X × A1 extracting only the irreducible divisor FZ which gives F over the generic fiber. Furthermore, we can assume −FW is ample over W and we denote by W0 = X × {0}. Therefore, W and Y ×A1 where Y = W ×A1 {t} are isomorphic incodimension 1, with the exceptional divisors antiample over X × A1 . Thus we conclude that they are isomorphic. Proposition 5.10. Under the notation in Section 2.3, S is the unique minimizer among all c (C,C ) if and only if the same holds for C (d) on vol c (d) (d) (d) . Kollár components for vol ∆ (C ,C +C ) ∆ D c X,D is T -equivalent, Proof. By Proposition 5.9, any minimizing Kollár component E of vol therefore it is G = Z/d equivalent. So E is the pull back of a Kollár component on C (d) by Lemma 2.9, which can be only the canonical component obtained by blowing up the vertex by our assumption and Lemma 2.10. Proof of Theorem B. We first notice that by Theorem 5.7 and Proposition 5.10, we know that for the coarse moduli space of an orbifold cone over a K-semistable log Fano pair, the only Kollár component which minimizes the normalized volume function is given by the canonical component. Now we consider the case of a general klt singularity o ∈ (X, D). Let us assume that there is another component F such that c X,o (ordS ) = vol c X,o (ordF ), vol c X,o by Theorem A. in particular, they take the minimal value of vol Let W → B be the family which degenerates X to X0 = Y0 ∪ C̄, where Y0 ∼ = Y extracting S over X and C̄ is the the coarse moduli space of the orbifold cone over S = C̄ ∩ Y0 . Then we argue as in the proof Proposition 5.9: Let a be an ideal whose normalized blow up gives the model of extracting the Kollár component F (see the proof of Proposition 3.11). Denote the degeneration of {a• } := {ap } by b• := {in(ap )}. Since c X (ordF ) = vol c Y (ordS ) ≤ mult(b• ) · lctn (C̄, b• ), mult(a) · lctn (X, a) = vol 0 0 0 where the last inequality is from the assumption that S0 is K-semistable and Theorem A. But mult(a) = mult(b• ) and lct(X, a) ≥ lct(C̄, b• ), we know that 1 lct(X, a) = lct(C̄, b• ) = lim lct(C̄, bk ), k→∞ k which we denote by c. In particular, for we can choose  sufficiently small, and k sufficiently large, such that the log discrepancy al (F, X, D + (c − )a) < 1 and (C, CD + (c − ) k1 bk ) is klt. Thus by [BCHM10] we can construct a model Z → W extracting only the irreducible divisor FZ which gives F over the generic fiber. Furthermore, 31 we can assume −FW is ample over W and after a base change, we can assume FW |X0 is reduced. We claim that Z0 → W0 also only extracts a Kollár component. In fact, locally over the vertex v of C̄, since (−FW |X )n = (−FW |X0 )n , then by Lemma 3.6, c X (ordF ) = vol(Z c 0 /W0 ) = vol c Y (ordS ). vol 0 0 c X,o (F ), which is equal to Thus we conclude that the volume of the model Z0 is equal to vol c C̄,v . It follows from the argument in the proof of the minimum of the normalized volume vol Theorem C that over v, Z0 → W0 yields a Kollár component F0 . By the proof in the cone case Theorem 5.7, F0 has to be the same as the canonical component S0 . In particular, this implies that the birational transform P of C̄ in Z is the extract of the canonical component. Thus there is a morphism P → S. Let l be the fiber class of P → S. Consider KZ + µ−1 ∗ (DA1 ) + FZ , which satisfies that  KZ + µ−1 ∗ (DA1 ) + FZ |F0 = KF0 + ∆F0 is anti-ample,  KZ + µ∗−1 (DA1 ) + FZ |S = KS + ∆S is anti-ample, and  KZ + µ−1 ∗ (DA1 ) + FZ · l = 0. Thus l is an extremal ray in N1 (Z/XA1 ). Hence we know that there is a morphism Z → W 0 which contracts P and W 0 admits a morphism χ : W 0 → XA1 . Restricting over 0, the central fiber is the birational model µ : Y → X which extracts S. On the other hand, let µF : YF → X be the birational model which extracts the Kollár component F . As YF × A1 and W 0 is isomorphic in codimension 1, if we denote by FW 0 the push forward of FZ on W 0 , we have M  W 0 = Proj µ1 ∗ OW 0 − mFW 0 m = Proj M  µ2 ∗ OYF ×A1 − m(F × A1 ) m = YF × A1 . Consider the central fiber over 0, this implies that YF = Y . 6 Minimizing Kollár component is K-semistable In this section, we aim to prove the a Kollár component is minimizing only if it is Ksemistable. The method used in the proof of this result is motivated by a method used in the study of toric degenerations (see [Cal02, Section 3.2], [AB04, Proposition 2.2] and [And13, Proposition 3]). In particular this method allows us to reduce two-step degenerations to a one-step degeneration. (d) Proof of Theorem D. By Proposition 4.6 we know that the canonical valuation of (C (d) , C∆ + (d) CD ) minimizes the normalized local volume if and only if (S, ∆S ) is K-semistable. Thus by Proposition 4.9, to show that (S, ∆S ) is K-semistable, it suffices to show that the canonc X ,D for (X0 , D0 ) =defn (C, CD ), which is the special ical component is a minimizer of vol 0 0 degeneration associated to S. Let (X, D) be a Q-Gorenstein klt singularity with X = SpecC (R). Assume that S is a c (X,D;o) and appears as the exceptional divisor in a plt Kollár component that minimizes vol blow-up X 0 → X. Let ∆S be the divisor on S satisfying KX 0 + S|S = KS + ∆S . By Theorem 1.3 (and Lemma 4.4), to show that (S, ∆S ) is K-semistable, it suffices to show that c X ,D (ordS ) ≤ vol c X ,D (ordF ) vol 0 0 0 0 32 for any C∗ -invariant Kollár component F over o0 ∈ (X0 , D0 ). Let (Y, E) be the associated special degeneration which degenerates (X0 , D0 ) to a pair (Y0 , E0 ) where Y0 is an orbifold cone over (F, ∆F ). Then we have a Z≥0 × Z≥0 -valued function on R: w:R f −→ 7→ Z≥0 × Z≥0 (13) (ordS (f ), ordF (in(f ))) . We give Z≥0 × Z≥0 the following lexicographic order: (m1 , u1 ) < (m2 , u2 ) if and only if m1 < m2 , or m1 = m2 and u1 < u2 . If we denote by Γ the valuative monoid and denote the associated graded ring by M grw R = R≥(m,u) /R>(m,u) , (m,u)∈Γ then it’s easy to see that Y0 = SpecC (grw R). We will also denote: M M A= R≥m /R>m = Am . m∈N m∈N Then SpecC (A) = X0 = Y . Moreover if we define the extended Rees ring of A with respect to the filtration associated to ordF : M M A0 := Ak := bk t−k ⊂ A[t, t−1 ], k∈Z k∈Z where bk = {f ∈ A; ordF (f ) ≥ k}. Then the flat family Y → C is given by the SpecC[t] (A0 ). In particular, we have A0 ⊗C[t] C[t, t−1 ] ∼ = A[t, t−1 ], A0 ⊗C[t] C[t]/(t) ∼ = grw R. Pick up a set of homogeneous generators f¯1 , . . . , f¯p for grw R with deg(f¯i ) = (mi , ui ). Lift them to generators f1 , . . . , fp for A such that fi ∈ Ami . Set P = C[x1 , . . . , xp ] and give P the grading by deg(xi ) = (mi , ui ) so that the surjective map P → grw R given by xi 7→ fi is a map of graded rings. Let ḡ1 , . . . , ḡq ∈ P be a set of homogeneous generators of the kernel and assume deg(ḡj ) = (nj , vj ). Since ḡj (f¯1 , . . . , f¯p ) = 0 ∈ grw R, it follows ḡj (f1 , . . . , fp ) ∈ (Anj )>vj for each j. By the flatness of A over C[t], there exist liftings gj ∈ ḡj + (Pnj )>vj of the relation ḡj such that gj (f1 , . . . , fp ) = 0 for 1 ≤ j ≤ q. So gj 0 s form a Gröbner basis of J with respect to the order function ordV , where J is the kernel of the surjection P → A. In other words, if we let K = (ḡ1 , . . . , ḡq ) denote the kernel P → A0 , then K is the initial ideal of J with respect to the order determined by ordF . As a consequence, we have: A = P [τ ]/(g̃1 , . . . , g̃q ), where g̃j = τ vj gj (τ −u1 x1 , . . . , τ −up xp ). Now we lift f1 , . . . , fp further to generators F1 , . . . , Fp of R. Then we have: gj (F1 , . . . , Fp ) ∈ R>mj . By the flatness of R over C[t], there exist Gj ∈ gj + P>nj such that Gj (F1 , . . . , Fp ) = 0. 33 Let I be the kernel of P → R. Then Gj 0 s form a Gröbner basis with respect to the order function w in (13) and the associated initial ideal is I. As a consequence, we have: R = P [ζ]/(G̃1 , . . . , G̃q ) where G̃j = ζ nj Gj (ζ −m1 x1 , . . . , ζ −mp xp ). In summary we have (C∗ )2 action on Cp generated by two 1-parameter subgroups λ0 (t) = m t and λ0 (t) = tu . λ0 degenerates (X, D) to (X0 , D0 ) and λ0 degenerates (X0 , D0 ) further to (Y0 , E0 ). We now claim that, for 0 <   1, there is a family of one parameter subgroups λ (t) : C∗ → (C∗ )2 such that the following conditions are satisfied: 1. λ (t) degenerates X to Y0 . For this to happen, we need to make sure that the initial term of Gj with respect to the weight function π defined by λ (t) is exactly ḡj . For the latter condition to hold it suffices: π (n0j , vj0 ) > π (nj , vj ) where (n0j , vj0 ) = deg(Gj − ḡj ). 2. As  → 0, λ → λ0 in the sense that λ (t) → λ0 (t) for any t ∈ C∗ . 3. For 0 <   1 ∈ Q, S = Y0 /λ (t) is a Kollár component over (X, o). Moreover as  → 0, ordT → ordS . Denote by B ⊂ Z × Z be the finite set consisting of the differences (n0j , vj0 ) − (nj , vj ), together with 0 and the two generators of N × N. Let M be a positive integer that is larger than all coordinates of (m, u) − (n, v) for all pairs of elements (m, u), (n, v) ∈ B and let  be sufficiently small such that 1 > M . Define π = e∗0 − e∗1 . Then for  sufficiently small, π is a linear projection π : Z × Z → Z such that 0 < π(nj , vj ) < π(n0j , vj0 ). So by choosing M  1 so that   1 we see that indeed there is a family of linear projections π approaches π0 which corresponds to ordS . We can define λ (t) to be one parameter subgroup corresponding to π . Let λ = λ (t) be the C∗ -action induced by a choice of rational . Now we claim that Y0 /(λ (t)) yields a Kollár component S over both (X, o) and (X0 , D0 ). Moreover the associated special degeneration has the central fibre equal to (Z, λ ). Because ordS is a minimizer c X,D , we have: on vol c X,D (ordS ) ≥ vol c X,D (ordS ). vol  On the other hand, we have c X,D (ordS ) = vol c X ,D (ordS ) = vol c Y ,E (ordS ). vol  0 0  0 0  c Y ,E is a convex function with respect to . So we conclude vol c Y ,E (ordF ) ≥ It’s known that vol 0 0 0 0 c Y ,E (ordT ). As a consequence we have: vol 0 0 0 c X ,D (ordF ) = vol c Y ,E (ordF ) ≥ vol c Y ,E (ordT ) = vol c X ,D (ordS ). vol 0 0 0 0 0 0 0 0 0 To see the construction of S , we define a filtration: ( ! ) p X a1 N ap F R = SpanC f1 . . . fp ; π ai (mi , ui ) ≥ N i=1 = {f ; there exists F ∈ P such that F |X = f and λ (F ) ≥ N }. b p → Cp and the Then {F N R} is the weighted filtration induced by the weighted blow up C associated graded ring of the above filtration is isomorphic to grw R with the grading given by the weight function λ . Denote the strict transform of X by X̂. Then the exceptional divisor X̂ → X is isomorphic to S = Y0 /λ by the discussion in Section 2.4. By Proposition 6.1, (S , ∆ ) = (Y0 , E0 )/λ is a klt log-Fano-variety and a Kollár component over (X, D; o). 34 Proposition 6.1. For any 0 <   1 with  ∈ Q+ , let (S , ∆ ) = Y0 /λ . Then S is a Kollár component over o ∈ (X, D). Proof. For 0 <   1 with  ∈ Q+ , ξ generates a C∗ -action. We have a log orbifold C∗ bundle π : (Y0◦ , E0◦ ) := (Y0 \ {v}, E0 \ {v}) → (S , ∆ ) where v is the vertex of Y0 . The Chern class of this orbifold C∗ -bundle, denoted by c1 (Y0◦ /S ), is contained in Pic(S ) and is ample. Y0◦ can be compactified by adding the zero section S so that we get a birational morphism µ : Y → Y0 with the exceptional divisor isomorphic to be S . Because Y0 has klt singularity, by [Kol04, 40-42] (see also [BG08]) we know that c1 (Y0◦ /S ) = −1 −r (KS + ∆ ) and (S , ∆ ) has klt singularities. So (S , ∆ ) is a Kollár component over v ∈ (Y0 , E0 ). To transfer this to (X, o), we notice that the graded ring of w is isomorphic to grwt C[Y0 ]. The exceptional divisor of the filtered blow-up associated to w is isomorphic to Proj(grwt C[Y0 ]) which is isomorphic to (S , ∆ ). Since (S , ∆ ) is klt, by inversion of adjunction we know that the filtered blow up is indeed a plt blow up and hence S is a Kollár component over (X, o). 7 Examples In this section, we find out the minimizer for some examples of klt singularities (X, o) = (SpecR, m). We note that by Proposition 2.4 and 3.11, this also explicit calculates inf lct(X, a)n · mult(a) a for all m-primary ideals a and gives the equality condition, which generalizes the results in [dFEM04] on a smooth point. Example 7.1. We explicitly compute the minimizer for quotient, Ak , Ek and weakly exceptional singularities in the below. 1. (cf. [LL16, Example 4.9]) Let (X, o) = (Cn , 0)/G be an n-dimensional quotient singularity. Let E ∼ = Pn−1 be the exceptional divisor over Cn obtained by blowing up 0. Then denote by S the valuation over (X, o) which is the quotient of E by G. Applying Lemma 2.9 to the pull back of Kollár components on X, we know that c X,o (ordS ) ≤ vol c ord vol E c X,o minimizes at ordS with for any Kollár component E over (X, o). So vol n c X,o (ordS ) = n . vol |G| 2. Consider the n-dimensional Ak−1 singularity: k X = Ank−1 := {z12 + · · · + zn2 + zn+1 = 0}. We consider cases when k > 2(n−1) n−2 (for other cases, see [LL16, Example 4.7]). We want to show that the valuation corresponding to the weight w∗ = (n − 1, · · · , n − 1, n − 2) c X,o . In [Li15a, Example 2.8], these are is a minimizer among all valuations in vol computed out as the minimizer among all valuations obtained by weighted blow ups on the ambient space Cn+1 . We notice that under the weighted blow up corresponding to w∗ , we have a birational morphism Y → X with exceptional divisor S isomorphic to the weighted hypersurface S := {Z12 + · · · + Zn2 = 0} ⊂ P(n − 1, · · · , n − 1, n − 2) =: Pw∗ . Because Pw∗ ∼ = P(1, · · · , 1, n − 2), it is easy to see that S is isomorphic to C̄(Q, −KQ ) −1 where Q = Qn−2 = {Z12 + · · · + Zn2 = 0} ⊂ Pn−1 (notice that KQ = (n − 2)H). On the other hand, because Pw∗ is not well-formed, we have codimensional 1 orbifold locus along the infinity divisor Q∞ ⊂ S with the isotropy group Z/(n− 1)Z. So the  corresponding Kollár component is the log Fano pair S, (1 − 35 1 n−1 )Q∞ . Because Q∞  has KE, by [LL16] there is a conical KE on the pair S, (1 − 1 n−1 )Q∞  . So by Theorem c that is the unique minimizer A and Theorem B, ordS is indeed a global minimizer of vol among all Kollár components. Notice that for any higher order klt perturbation of these singularities, w∗ is also a minimizer. 3. We can also use Theorem A to verify that the valuations in [Li15a, Example 2.8] for Ek c X,o , which are unique among Kollár components. (k=6,7,8) are indeed minimizers in vol To avoid repetition, we will only do this for E7 singularities. The argument for other two cases are similar. So consider the (n + 1)-dimensional E7 singularity: 3 3 X n+1 = {z12 + z22 + · · · + zn2 + zn+1 zn+2 + zn+2 = 0} ⊂ Cn+2 . (a) If n + 1 = 2, then X 2 is a quotient singularity C2 /E7 and so we get the unique polystable component by [LL16, Example 4.9] and example 1 above. (b) If n + 1 = 3, then X 3 = {z12 + z22 + z33 z4 + z43 = 0} ⊂ C4 ∼ = {w1 w2 + w33 w4 + w43 = 4 0} ⊂ C by the change of variables. This singularity has a (C∗ )2 -action and is an example of T -variety of complexity one. By the recent work in [CS15, Theorem 7.1 (II)], X 3 indeed has a Ricci flat cone Kähler metric associated to the canonical C∗ -action associated to w∗ . So by [LL16, Theorem 1.7], the unique K-polystable Kollár component is given by the orbifold X 3 /hw∗ i. (c) n + 1 = 4, then under the weighted blow up corresponding to w∗ = (9, 9, 9, 5, 6), we have a birational morphism X̂ → X with exceptional divisor E isomorphic to the weighted hypersurface E = {z12 + z22 + z32 + z53 = 0} ⊂ P(9, 9, 9, 5, 6) = P(w∗ ). Since P(w∗ ) is not well-formed, we have: E∼ = {z12 + z22 + z32 + z53 = 0} ⊂ P(3, 3, 3, 5, 2) = P0 . with orbifold locus of isotropy group Z/3Z along V = {z12 + z22 + z32 + z53 = 0} ⊂ P(3, 3, 3, 2). Alternatively, E is a weighted projective cone over theweighted hypersurface. It is easy to see that as an orbifold (V, ∆) ∼ = P2 , (1 − 31 )Q where Q = {z12 + z22 + z32 = 2 0} ⊂ P . By [LS14], there exists an orbifold Kähler-Einstein metric on (V, ∆). Notice that −(KV + ∆) = 3L − 43 L = 53 L where L is the hyperplane bundle of P2 . Denoting by H the hyperplane bundle of P0 , then H|V = L/3. If V is considered as a divisor of E, then  5 V |V = {z4 = 0} ∩ E = 5H|V = L. 3 So −(KV + ∆) = V |V . Then by [LL16, Theorem 1.7], there exists an orbifold Kähler-Einstein metric on E because the cone angle at infinity is β = 1/3. Thus the unique log-K-semistable   (actually log-K-polystable) Kollár component is given by the pair E, 1 − 13 V . (d) n + 1 = 5, under the weighted blow up corresponding to w∗ = (3, 3, 3, 3, 2, 2), we have a birational morphism X̂ → X with exceptional divisor E isomorphic to the weighted hypersurface: E = {z12 + z22 + z32 + z42 + z63 = 0} ⊂ P(3, 3, 3, 3, 2, 2) =: P(w∗ ). This is a weighted projective cone over the weighted hypersurface: V = {z12 + z22 + z32 + z42 + z63 = 0} ⊂ P(3, 3, 3, 3, 2).  As orbifold, we have (V, ∆) = P3 , (1 − 31 )Q . By [LS14, Li13], (V, ∆) is log-Ksemistable and degenerates to a conical Kähler-Einstein pair. So by [LL16], we know that (E, (1 − β)V∞ ) is log-K-semistable. To determine β, we notice that 4 8 2 −(KV + ∆) = 4L − L = L = 4 · L = 4 · V∞ |V . 3 3 3 So β = 1 and we conclude that the unique (strictly) K-semistable Kollár component is indeed the Q-Fano variety E. 36 (e) n + 1 ≥ 6. Under the weighted blow up corresponding to w∗ = (n − 1, . . . , n − 1, n − 2, n − 2), we have a birational morphism X̂ → X with exceptional divisor E isomorphic to the weighted hypersurface: E = {z12 + · · · + zn2 = 0} ⊂ P(n − 1, · · · , n − 1, n − 2, n − 2) =: P(w∗ ). This is the weighted projective cone over V = {z12 + · · · + zn2 = 0} ⊂ P(n − 1, · · · , n − 1, n − 2). By the discussion in the above Ank−1 singularity case, we know that as an orbifold,   1 )Q∞ , which has an orbifold Kähler-Einstein met(V, ∆) = C̄(Q, −KQ ), (1 − n−1 ric. Notice that −(KV + ∆) = (n(n − 1) + n − 2)H|V − 2(n − 1)H|V = n(n − 2)H|V . By [LL16, Theorem 1.7], the Q-Fano variety E indeed has an orbifold KählerEinstein metric (β = n/n = 1 at infinity) and hence by Theorem A is the unique K-semistable (actually K-polystable) Kollár component. We remark that, however, in the case of Dk+1 singularities, since the valuations computed out in [Li15a, Example 2.8] could be irrational, our method can not directly tell whether it is a minimizer in ValX,o . 4. A notion called weakly-exceptional singularity is introduced in [Pro00]. As the name suggested, this is a weaker notion than the exceptional singularity introduced in [Sho00], which forms a special class of singularities in the theory of local complements. In our language, a singularity (X, o) is weakly-exceptional if and only if it has a unique Kollár component S. We know that if a singularity is weakly-exceptional, then the log αinvariant for the log Fano (S, ∆S ) is at least 1 (see [Pro00, Theorem 4.3] and [CS14]). In particular, we know that (S, ∆S ) is K-semistable (see [OS14, Theorem 1.4] or [Ber13, Theorem 3.12]). And by Theorem A and B, we know ordS is the unique minimizer of c vol(S) among all Kollár components. See [CS14] for examples of weakly exceptional singularities. The following example is indeed a prototype of our study. Example 7.2. If a log terminal singularity o ∈ X has a quasi-regular Sasakian-Einstein c x,X . metric, then the C∗ -quotient provides a Kollár component which minimizes vol Assume X = SpecR is an affine variety with effective torus action and Q-Gorenstein klt isolated singularity at o ∈ X. Denote the torus by T := (Gm )d . Then we have a weight decomposition: M R= Rα , α∈Γ where • For any α ∈ Zd , Rα = {f ∈ R ; t · f = tα f for any t ∈ (Gm )d }. • Γ = {α ∈ Zd ; Rα 6= 0}. The Reeb cone of X is the following conic subset of the Lie algebra of T = (Gm )d : RC := {ξ ∈ Rd ; hα, ξi > 0 for any α ∈ Γ}. Notice that the elements in thePReeb cone RC can be considered as holomorphic vector fields d on X via the map ξ 7→ σξ := i=1 ξi σi where σi is the infinitesimal generator of the action of the i-th factor of (Gm )d . If we denote by {ei } the standard basis of Rd , then σi (p) = d ds exp(sei ) ◦ p − √ s=0 −1 d ds √ exp( −1sei ) ◦ p. s=0 Suppose that there is a Kähler cone metric gξ = dr2 + r2 gL on X where 37 1. r : X − {o} → R>0 is a smooth radius function, L = {r = 1} ⊂ X is the link of the isolated singularity (X, o). √ ∂ ∂ 2. r ∂r − −1J(r ∂r ) = σξ . Now assume that gξ is a Ricci-flat Kähler metric, equivalently the link L has a Sasaki-Einstein metric (see [BG08]). There are two different cases: ∂ ) is closed, gL is called a quasi1. (quasi-regular case) If the generic orbit of ∂θ := J(r ∂r regular Sasaki-Einstein metric. σξ generates a Gm -subgroup of T. the quotient X/Gm is an Fano orbifold (V, ∆) with orbifold Kähler-Einstein metric. By [LL16] ordV is a c X,o . By Theorem B, this is the unique minimizer among all Kollár minimizer of vol components. 2. (irregular case) If the generic orbit of ∂θ is not closed, gL is called an irregular SasakiEinstein metric. Explicit examples can be found in [GMSW04a, GMSW04b, FOW09]. Since ξ ∈ Rd is an irrational vector, we can approximate it by a sequence of rational vectors {ξk } ⊂ RC ∩ Qd . Each ξk generates a Gm -subgroup Gk of T, and we get a sequence of quotients X/Gk = (Vk , ∆k ). It is easy to see that Vk are all Kollár components. It is possible to show that a suitable rescaling ck · ordVk converges to c (X,o) , which corresponds to the vector field σξ . The details will be a minimizer of vol discussed in a future work. As we mentioned, there is a related differential geometry study on the metric tangent cone. Example 7.3. In the notation of [DS15], let p ∈ Z be a singularity appearing on the GromovHausdorff limit of a sequence of KE Fano manifolds. Assume the Reeb vector of the weight tangent cone W is quasi-regular, then the C∗ -quotient of W indeed gives a minimizer of p ∈ Z. Assume (X, o) is an algebraic germ on a normal affine variety that is embedded into CN . Assume that we have a weight vector w = (a1 , . . . , aN ) ∈ ZN >0 satisfying that there is no common factor of ai . Then it defines a filtration on R = OX,o : F k = {f ∈ R; there exists g ∈ OCN ,o with g|X = f and w(g) ≥ k}. (14) From this we can form the Rees algebra and extended Rees algebra: R= +∞ M F k t−k , R0 = k=0 M F k t−k , k∈Z where F k = R if k ≤ 0. We also have the associated graded ring of (R, F): G= +∞ M  F k /F k+1 · t−k ∼ = R0 /tR0 . k=0 In our discussion, we always assume that G is a finitely generated C-algebra that is also a normal domain. Then we can get a normal affine variety W = Spec(G). As in [DS15], we call W to be a weighted tangent cone of (X, o). Notice that there is a natural C∗ -action on G and hence it is an orbifold cone over the base E = Proj(G) (by Pinkham-Demazure’s construction). d N → CN given by: On the other hand, the weight w defines a weighted blow up πw : C ! +∞ M −k d N C = Proj Ak · t , k=0 where Ak = {g ∈ C[z1 , · · · , zn ]; w(g) ≥ k}. Notice that the exceptional divisor of πw is the weighted projective space with weight w. We have the following observation, which implies that the discussion can be put in the setting of filtered blowing-ups as studied in [TW89]. 38 Lemma 7.4. 1. If Y denotes the strict transform of X under πw , then Y = Proj(R). In particular the Rees algebra R is finitely generated. Moreover, the exceptional divisor of ψ the natural birational morphism Y −→ X is isomorphic to E. 2. The filtration F = {F k }k≥0 is the same as the filtration induced by the divisorial valuation ordE . Proof. Denoting by ιX : X → CN the embedding morphism, then F k in (14) coincides with the inverse image ideal ι−1 X Ak · OX,o (cf. [Har77, 7.15]). So Y is indeed the strict transform of X under the weighted blow up πw . The second statement is standard (see [TW89, 1.2.1]). Item 2 follows from the discussion in Section 2.4 (see [TW89, (2.2)]). If (X, o) is a klt singularity appearing in a Gromov-Hausdorff limit of a sequence of KählerEinstein Fano manifolds, Donaldson-Sun ([DS15]) constructed an affine variety W using the metric structure on the Gromov-Hausdorff limit and showed that it specially degenerates to the metric tangent cone C(Y ). The degeneration can be realized under a common embedding of W and C(Y ) into some ambient CN . More precisely W is a weighted tangent cone associated to some weight under the common embedding. The weight is determined by the Reeb vector field of the singular Ricci flat metric on C(Y ). If the Reeb vector field is quasiregular, that is, if it generates a C∗ -action, then the weight can be normalized to have integer components so that we are in the situation discussed above. Moreover it is shown in this case E = W \ {0}/C∗ specially degenerates to C(Y ) \ {0}/C∗ and C(Y ) \ {0}/C∗ admits a weak Kähler-Einstein metric (see [DS15]). This implies E is analytically K-semistable, which then implies it is (algebraically) K-semistable. So we can apply our result Theorem A to see that c over (X, o), which is the unique minimizer among ordE is indeed a global minimizer of vol all Kollár components. References [AB04] V. Alexeev, M. Brion, Toric degenerations of spherical varieties. Selecta Math. (N.S.) 10 (2004), no. 4, 453–478. [And13] D. Anderson, Okounkov bodies and toric degenerations. Math. Ann. 356 (2013), no. 3, 1183–1202. [BCHM10] C. Birkar, P. Cascini, C. D. Hacon, and J. Mc Kernan; Existence of minimal models for varieties of log general type, J. Amer. Math. Soc. 23 (2010), 405-468. [Ber13] R. Berman; A thermodynamic formalism for Monge-Ampère equations, MoserTrudinger inequalities and Kähler-Einstein metrics, Adv. Math. 248 (2013), 12541297. [Ber15] R. Berman; K-polystability of Q-Fano varieties admitting Kähler-Einstein metrics, Invent. Math. 203 (2015), no. 3, 973-1025. [BG08] C. Boyer and K. Galicki; Sasakian Geometry, Oxford Mathematical Monographs, Oxford University Press, Oxford, 2008. [BHJ15] S. Boucksom, T. Hisamoto and M. Jonsson. Uniform K-stability, DuistermaatHeckman measures and singularities of pairs, arXiv:1504.06568. [Blu16a] H. Blum; On Divisors Computing MLD’s and LCT’s. arXiv:1605.09662. [Blu16b] H. Blum; Existence arXiv:1606.08894. [Cal02] of valuations with smallest normalized volume, P. Caldero. Toric degenerations of Schubert varieties. Transform. Groups 7 (2002), 51-60. [CDS15] X. Chen, S. Donaldson and S. Sun; Kähler-Einstein metrics on Fano manifols, I-III, J. Amer. Math. Soc. 28 (2015), 183-197, 199-234, 235-278. [CS14] I. Chelsov and C. Shramov; Weakly-exceptional singularities in higher dimensions, J. Reine Angew. Math., 689 (2014), 201-241. [CS15] T. Collins and G. Székelyhidi; arXiv:1512.07213 39 Sasaki-Einstein metrics and K-stability, [Cut12] S.D. Cutkosky; Multiplicities associated to graded families of ideals, Algebra Number Theory 7 (2013), no. 9, 2059-2083. [DS15] V. Datar and G. Székelyhidi; Kähler-Einstein metrics along the smooth continuity method, arXiv:1506.07495. [Don02] S. Donaldson; Scalar curvature and stability of toric varieties, J. Diff. Geom. 62 (2002), no. 2, 289-349. [dFEM04] T. de Fernex, L. Ein and M. Mustaţă; multiplicities and log canonical threshold, J. Alg. Geom. 13 (2004), 603-615. [DS15] S. Donaldson and S. Sun; Gromov-Hausdorff limits of Kähler manifolds and algebraic geometry, II, to appear in J. Diff. Geom., arXiv:1507.05082. [Eis94] D. Eisenbud; Commutative algebra with a view toward algebraic geometry, Grad. Texts in Math. 150, Springer-Verlag, 1994. [ELS03] L. Ein, R. Lazarsfeld and K. E. Smith; Uniform approximation of Abhyankar valuation ideals in smooth function fields, Amer. J. Math. 125 (2003), 409-440. [FOW09] A. Futaki, H. Ono and G. Wang; Transverse Kähler geometry of Sasaki manifolds and toric Sasakian-Einstein manifolds, J. Diff. Geom., 83 (2009) 585-635. [Fuj15] K. Fujita; Optimal bounds for the volumes of Kähler-Einstein Fano manifolds, to appear in Amer. J. Math., arXiv:1508.04578. [Fuj16] K. Fujita; A valuative criterion for uniform K-stability of Q-Fano varieties, to appear in J. Reine Angew. Math., arXiv:1602.00901. [Ful13] M. Fulger; Local volumes of Cartier divisors over normal algebraic varieties, Ann. Inst. Fourier (Grenoble) 63 (2013), no. 5, 1793-1847. [GMSW04a] J.P. Gauntlett, D. Martelli, J. Sparks and W. Waldram; Sasaki- Einstein metrics on S2 × S3 , Adv. Theor. Math. Phys. 8 (2004), 711- 734. [GMSW04b] J.P. Gauntlett, D. Martelli, J. Sparks and W. Waldram; A new infinite class of Sasaki-Einstein manifolds, Adv. Theor. Math. Phys. 8 (2004), 987-1000. [Har77] R. Hartshorne; Algebraic Geometry. Springer-Verlag, New York, 1977, Graduate Texts in Mathematics, No. 52. [HLP12] E. Hrushovski, F. Loeser, B. Poonen. Berkovich spaces embed in Euclidean spaces. arXiv:1210.6485. [HX13] C. Hacon and C. Xu; Existence of log canonical closures, Invent. Math. 192 (2013), no. 1, 161-195. [JM12] M. Jonsson and M. Mustaţă; Valuations and asymptotic invariants for sequences of ideals, Ann. Inst. Fourier (Grenoble) 62 (2012), no. 6, 2145-2209. [KM98] J. Kollár and S. Mori; Birational geometry of algebraic varieties, Cambridge Tracts in Math. 134, Cambridge Univ. Press, Cambridge, 1998. [Kol04] J. Kollár, Seifert Gm -bundles, arXiv:0404386. [Kol07] J. Kollár; Lectures on resolution of singularities. Annals of Mathematics Studies, 166. Princeton University Press, Princeton, NJ, 2007 [Kol13] J. Kollár; Singularities of the Minimal Model Program, Cambridge Tracts in Math., 200, Cambridge Univ. Press, Cambridge, 2013. [Laz04a] R. Lazarsfeld; Positivity in algebraic geometry, I: Classical setting: line bundles and linear series, Erger Mathematik und ihrer Grenzgebiete. (3) 48, Springer-Verlag, Berlin, 2004. [Laz04b] R. Lazarsfeld; Positivity in algebraic geometry, II. Positivity for vector bundles, and multiplier ideals. Erger Mathematik und ihrer Grenzgebiete. (3) 49, SpringerVerlag, Berlin, 2004. [Li11] C. Li; Remarks on logarithmic K-stability, Commun. Contemp. Math. 17 (2015), no. 2, 1450020, 17 pp. [Li13] C. Li; Yau-Tian-Donaldson correspondence for K-semistable Fano manifolds, to appear in J. Reine Angew. Math., arXiv:1302.6681. 40 [Li15a] [Li15b] [Liu16] [LL16] C. Li; Minimizing normalized volumes of valuations, arXiv:1511.08164. C. Li; K-semistability is equivariant volume minimization, arXiv:1512.07205v3. Y. Liu; The volume of singular Kähler-Einstein Fano varieties, arXiv:1605.01034. C. Li and Y. Liu; Kähler-Einstein metrics and volume minimization, arXiv:1602.05094. [LM09] R. Lazarsfeld and M. Mustaţă; Convex bodies associated to linear series, Ann. Sci. Éc. Norm. Supér. 42 (2009), no. 5, 783-835. [LS14] C. Li, S. Sun; Conical Kähler-Einstein metrics revisited, Comm. Math. Phys. 331 (2014), no. 3, 927-973. [LWX14] C. Li, X. Wang and C. Xu; Degeneration of Fano Kähler-Einstein manifolds, arXiv:1411.0761. [LX14] C. Li, and C. Xu; Special test configurations and K-stability of Fano varieties, Ann. of Math. (2) 180 (2014), no.1, 197-232. [MSY08] D. Martelli, J. Sparks and S.-T. Yau; Sasaki-Einstein manifolds and volume minimisation, Comm. Math. Phys. 280 (2008), 611-673. [Mus02] M. Mustaţă; On multiplicities of graded sequences of ideals, Journal of Algebra 256 (2002), 229-249. [Oda12] Y. Odaka; The Calabi conjecture and K-stability. Int. Math. Res. Not. (2012), no. 10, 2272-2288. [Oda13] Y. Odaka; The GIT stability of polarized varieties via discrepancy, Ann. of Math. (2) 177 (2013), no. 2, 645-661. [OS14] Y. Odaka and Y. Sano; Alpha invariant and K-stability of Q-Fano varieties. Advances in Mathematics 229, Issue 5, 2818-2834. [OX12] Y. Odaka and C. Xu; Log-canonical models of singular pairs and its applications, Math. Res. Lett. 19 (2012), no.2, 325-334. [Pro00] Y. Prokhorov; Blow-ups of canonical singularities, Algebra (Moscow, 1998), 301317, de Gruyter, Berlin, 2000. [Ree88] D. Rees, Lectures on the asymptotic theory of ideals, London Mathematical Society Lecture Notes Series 113, Cambridge University Press, 1988. [Sho00] V. Shokurov; Complements on surfaces, Algebraic geometry, 10. J. Math. Sci. (New York) 102 (2000), no. 2, 3876-3932. [SSY16] C. Spotti, S. Sun and S. Yao; Existence and deformations of Kähler-Einstein metrics on smoothable Q-Fano varieties, Duke Math. J. 165 (2016), no. 16, 3043–3083. [Sze16] G. Székelyhidi, The partial C 0 -estimate along the continuity method. J. Amer. Math. Soc. 29 (2016), no. 2, 537–560. [Tia97] G. Tian; Kähler-Einstein metrics with positive scalar curvature, Invent. Math. 130 (1997), no. 1, 1-37. [Tia15] G. Tian; K-stability and Kähler-Einstein metrics, Comm. Pure and Applied Math., 68 (2015), no. 7, 1085-1156. [TW89] M. Tomari and K. Watanabe; Filtered rings, filtered blowing-ups and normal twodimensional singularities with “star-shaped” resolution, Publ. RIMS. Kyoto Univ. 25 (1989), 681-740. [TW04] S. Takagi and K. Watanabe; On F -pure thresholds, J. Algebra 282 (2004), 278-297. [WX14] X. Wang and C. Xu; Nonexistence of asymptotic GIT compactification, Duke Math. J. 163 (2014), no. 12, 2217-2241. [Xu14] C. Xu; Finiteness of algebraic fundamental groups, Compos. Math. 150 (2014), no. 3, 409-414. Chi Li Department of Mathematics, Purdue University, West Lafayette, IN 47907-2067 [email protected] Chenyang Xu Beijing International Center for Mathematical Research, Beijing 100871, China [email protected] 41
0math.AC
PRODUCTS OF IDEALS MAY NOT BE GOLOD arXiv:1506.09129v2 [math.AC] 12 Sep 2016 ALESSANDRO DE STEFANI Abstract. We exhibit an example of a product of two proper monomial ideals such that the residue class ring is not Golod. We also discuss the strongly Golod property for rational powers of monomial ideals, and introduce some sufficient conditions for weak Golodness of monomial ideals. Along the way, we ask some related questions. 1. Introduction Let k be a field, and let (R, m, k) Ldenote a Noetherian positively graded k-algebra, with R0 = k and irrelevant maximal ideal m = i>1 Ri . Consider the Poincaré series of R X i PR (t) = dimk TorR i (k, k)t i>0 which is, in general, not rational [Ani82]. If n = dimk m/m2 is the embedding dimension of R, Serre showed that PR (t) is bounded above term by term by the following rational series (1 + t)n X . 1−t dimk (Hi (R)) ti i>1 Here Hi (R) is the i-th homology of the Koszul complex on a minimal homogeneous generating set of m, over the ring R. The ring R is called Golod if equality holds. As a consequence, Golod rings have rational Poincaré series. The main purpose of this article is to answer, in negative, the following question Question 1.1. [MP13, Problem 6.18] Let k be a field, and let (R, m, k) be positively graded k-algebra. Let I, J be two proper homogeneous ideals in R. Is the ring R/IJ always Golod? As reported in [MP13], Question 1.1 was first asked by Volkmar Welker. The general belief, supported by strong computational evidence, was that this question had positive answer. The first result in this direction is a theorem of Herzog and Steurich [HS79]: let S be a polynomial ring over a field, and let I,J be two proper homogeneous ideals of S. If I ∩ J = IJ, then S/IJ is Golod. Another reason to believe that Question 1.1 had positive answer comes from a result of Avramov and Golod [AG71], which says that Golod rings are never Gorenstein, unless they are hypersurfaces. This is consistent with a result of Huneke [Hun07], according to which S/IJ is never Gorenstein, unless I and J are principal. More recently, Herzog and Huneke show that, if I is a homogeneous ideal in a polynomial ring S over a field of characteristic zero, then, for all d > 2, the ring S/I d is Golod [HH13, Theorem 2.3 (d)]. In [SFW14, Theorem 1.1] Seyed Fakhari and Welker write that any product of proper monomial ideals in a polynomial ring over a field is Golod. The key step in their proof is to show that products of monomial ideals always satisfy the strong-GCD condition. This condition is the existence of a linear order on a minimal monomial generating set of the ideal, satisfing certaintain properties [Jöl06, Definition 3.8]. The fact that monomial ideals that satisfy the strong-GCD condition are Golod is first stated by Jöllenbeck in [Jöl06, Theorem 7.5], provided 2010 Mathematics Subject Classification. Primary 13A02; Secondary 13D40. Key words and phrases. Golod rings; product of ideals; Koszul homology; Koszul cycles; strongly Golod. 1 2 ALESSANDRO DE STEFANI an extra assumption, called Property (P), is satisfied, and then by Berglund and Jöllenbeck in [BJ07, Theorem 5.5], where the extra assumption is removed. In Section 2, we provide examples of products of proper monomial ideals in a polynomial ring S over a field, such that the residue class ring is not Golod. For instance, Example 2.1: Example. Let k be a field, and let S = k[x, y, z, w] be a polynomial ring, with standard grading. Consider the monomial ideals m = (x, y, z, w) and J = (x2 , y 2 , z 2 , w2 ) inside S. Let I := mJ = (x3 , x2 y, x2 z, x2 w, xy 2 , y 3 , y 2 z, y 2 w, xz 2 , yz 2 , z 3 , z 2 w, xw2 , yw2 , zw2 , w3 ) be their product, and set R = S/I. Then, the ring R is not Golod. Our example satisfies the strong-GCD condition. Indeed, the argument of [SFW14, Theorem 1.1] is correct, but it only shows that products of monomial ideals satisfy the strong-GCD condition. We have not been able to locate specifically where the mistake in [Jöl06] or [BJ07] may be. In Section 3 we study the strongly Golod property for rational powers of monomial ideals. Let S = k[x1 , . . . , xn ] be a polynomial ring over a field k of characteristic zero, and let I ⊆ S. In [HH13] Herzog and Huneke introduce the following notion: I is called strongly Golod if ∂(I)2 ⊆ I, where ∂(I) is the ideal of S generated by the partial derivatives of elements in I. The main point of this definition is that, if an ideal I is strongly Golod, then the ring S/I is Golod [HH13, Theorem 1.1]. Among other things, in Section 3 we show that if I is a strongly Golod monomial ideal, then so is I p/q , for any p > q. This generalizes [HH13, Proposition 3.1]. It is easy to find examples of ideals that are Golod, but not strongly Golod. In [HH13], Herzog and Huneke introduce the notion of squarefree strongly Golod ideal, that applies to squarefree monomial ideals. This is a weakening of the strongly Golod definition, but it still implies that the multiplication on the Koszul homology is identically zero. We will say that a ring is weakly Golod if the multiplication on Koszul homology is trivial. In [BJ07, Theorem 5.1], Berglund and Jöllenbeck show that, in case the ideal in question is monomial, weak Golodness and Golodness are equivalent notions. Herzog and Huneke use this result in [HH13, Theorem 3.5] to conclude that squarefree strongly Golod ideals are Golod. See Section 5 for more discussions and questions about this topic. In Section 4 we introduce lcm-strongly Golod monomial ideals, which are a more general version of squarefree strongly Golod ideals. We show that lcm-strongly Golod ideals are weakly Golod. In Section 5, we give some sufficient conditions for an ideal to be strongly Golod, and we ask several related questions. In Appendix A we record a minimal free resolution for Example 2.5, for convenience of the reader. All computations are made using the computer software system Macaulay2 [GS]. 2. Examples of products that are not Golod Golod rings were named after Evgenii S. Golod, who proved that the upper bound in Serre’s inequality is achieved if and only if the Eagon resolution is minimial [Gol62]. This happens if and only if all the Massey operations of the ring vanish. Since the vanishing of the second Massey operation means that every product of Koszul cycles of positive homological degree is a boundary, Golod rings have, in particular, trivial multiplication on the positive degree Koszul homology. We will use this fact in the proofs of our examples in this section. See [GL69, Chapter 4] or [Avr98, Section 5.2] for details and more general statements. If (R, m, k) is a Noetherian positively graded algebra over a field k, we can write R ∼ = S/I, where S = k[x1 , . . . , xn ] is a polynomial ring, and I ⊆ S is a homogeneous ideal. If m = (x1 , . . . , xn ) denotes the irrelevant maximal ideal of S, we can always assume that I ⊆ m2 . Let K• be the Koszul complex on the elements x1 , . . . , xn of S, which is a minimal free resolution of k over S. We have that K1 is a free V S-module of rank n, and we denote by {ex1 , . . . , exn } a basis. In addition, ∼ we have that Ki = i K1 for all i = 1, . . . , n, and the differential δi : Ki → Ki−1 on a basis element PRODUCTS OF IDEALS MAY NOT BE GOLOD 3 is given by δi (et1 ∧ . . . ∧ eti ) = i X (−1)j−1 tj et1 ∧ . . . ∧ etj−1 ∧ etj+1 ∧ . . . ∧ eti , j=1 and extended by linearity to Ki . Let K• (R) = K• ⊗S R be the Koszul complex on R. We denote by Z• (R) the Koszul cycles, and by H• (R) the Koszul homology on R. We are now ready for the first example. Example 2.1. Let k be a field, and let S = k[x, y, z, w], with the standard grading. Let m = (x, y, z, w) be the irrelevant maximal ideal, consider the monomial ideal J = (x2 , y 2 , z 2 , w2 ) and let I := mJ = (x3 , x2 y, x2 z, x2 w, xy 2 , y 3 , y 2 z, y 2 w, xz 2 , yz 2 , z 3 , z 2 w, xw2 , yw2 , zw2 , w3 ). Then, the ring R = S/I is not Golod. Proof. Golod rings have trivial multiplication on H• (R)>1 . Therefore, to show that R is not Golod, it is enough to show that there exist two elements α, β ∈ H• (R)>1 such that αβ 6= 0. Consider the element u = (ex ∧ ey ) ⊗ xy ∈ K2 (R). It is a Koszul cycle: δ2 (u) = ey ⊗ x2 y − ex ⊗ xy 2 = 0 in K1 (R), because x2 y ∈ I and xy 2 ∈ I. Then, let α := [u] ∈ H2 (R) be its residue class in homology. Similarly, let v = (ez ∧ ew ) ⊗ zw ∈ Z2 (R), and let β := [v] ∈ H2 (R). We want to show that uv = (ex ∧ ey ∧ ez ∧ ew ) ⊗ xyzw ∈ Z4 (R) is not a boundary, so that αβ = [uv] 6= 0 in H4 (R). Note that K5 (R) = 0, hence such a product is zero in homology if and only if xyzw ∈ I. But xyzw ∈ / I, as every monomial generator of I contains the square of a variable.  Remark 2.2. We keep the same notation as in Example 2.1. Using Macaulay2 [GS], one can compute the first Betti numbers of k over R: ... / R11283 / R2312 / R493 / R98 / R22 / R4 /R /k / 0. Therefore the Poincaré series of R is PR (t) = 1 + 4t + 422t2 + 98t3 + 493t4 + 2312t5 + 11283t6 + . . . On the other hand, the upper bound given by Serre’s inequality is (1 + t)4 = 1 + 4t + 22t2 + 98t3 + 493t4 + 2313t5 + 11288t6 + . . . 1 − 16t2 − 30t3 − 20t4 − 5t5 Since the two series are not coefficientwise equal, R is not Golod. We also checked that R is not Golod using the Macaulay2 command isGolod(S/I) which computes the generators of all the Koszul homology modules, and determines whether their products are zero. Example 2.3. If one is looking for an example where the ideals are generated in higher degrees, for j > 1 one can consider, along the lines of Example 2.1, the following family of products, suggested to us by Aldo Conca: (xj+1 , y j+1 , z j+1 , wj+1 )(xj , y j , z j , wj ) ⊆ k[x, y, z, w]. As in Example 2.1, one can show that the product of cycles ((ex ∧ ey ) ⊗ xj y j ) · ((ez ∧ ew ) ⊗ z j wj ) is not zero as a cycle and, hence, in homology. Remark 2.4. We want to point out that Example 2.1 is not the first example of a non-Golod product of ideals that we discovered. In fact, Example 2.1 was suggested to the author by Srikanth Iyengar, after some discussions about Example 2.5. Given the proof of Example 2.1, it becomes easy to show that the ring of Example 2.5 is not Golod. In fact, going modulo a regular sequence of linear forms in the ring of Example 2.5, one obtains a ring isomorphic to the one of Example 2.1. 4 ALESSANDRO DE STEFANI Then, one can use [Avr98, Proposition 5.2.4 (2)], adapted to the graded case. The original proof that Example 2.5 is not Golod is much more involved. Nonetheless, since this was the first example discovered by this author, we want to briefly describe the argument in the rest of this section. The original proof relies on lifting Koszul cycles. More specifically, we use the double-complex proof of the fact that TorS• (k, S/I) can be computed in two ways, to lift a Koszul cycle to a specific element of a finitely generated k-vector space. The results that we use are very well known, so we will not explain all the steps. We refer the reader to [Wei94] or [Rot09] for more details. Let S = k[x1 , . . . , xn ] be a polynomial ring over a field k, not necessarily standard graded, and let m be the irrelevant maximal ideal. Let I ⊆ m2 be a homogeneous ideal in S, and consider the residue class ring R = S/I. Since K• is a free resolution of k over S, we have that Hi (R) := Hi (K• ⊗S R) ∼ = TorSi (k, R), and its dimension as a k-vector space is the i-th Betti number, βi , of R as an S-module. On the other hand, if F• → R → 0 is a minimal free resolution of R over S, then Hi (k ⊗S F• ) ∼ = k ⊗ Fi is also isomorphic to TorSi (k, R). There is map ψ : Zi (R) → k ⊗ Fi , which is constructed by ”lifting cycles”. Since the boundaries map to zero via ψ, this induces a map ψ : Hi (R) → k ⊗S Fi , which is an isomorphism. See [Her92] for a canonical way to construct Koszul cycles from elements in k ⊗ Fi (that is, a canonical choice of an inverse for ψ). We are now ready to illustrate the example. We refer the reader to Appendix A for an explicit expression of the differentials in a resolution of R = S/I as a module over S. Example 2.5. Let k be a field, and let S = k[a, b, c, d, x, y, z, w]. Consider the monomial ideals I1 = (ax, by, cz, dw) and I2 = (a, b, c, d) inside S. Let I := I1 I2 = (a2 x, abx, acx, adx, aby, b2 y, bcy, bdy, acz, bcz, c2 z, cdz, adw, bdw, cdw, d2 w) be their product, and set R = S/I. Then, the ring R is not Golod. Proof. Let 0 → F4 → F3 → F2 → F1 → F0 → R → 0 be a minimal free resolution of R over S, with maps ϕj : Fj → Fj−1 , j = 1, . . . , 4, and ϕ0 : F0 = S → R being the natural projection. For (i) each i = 0, . . . , 4 and each free module Fi = S βi fix standard bases Ej , j = 1, . . . , βi . In this way, the differentials can be represented by matrices (see Appendix A for an explicit description). We have the following staircase: S ⊗S S 5 δ0 ⊗1S 5 1S ⊗ϕ4 K1 ⊗S S 20 δ1 ⊗1S 20 1K1 ⊗ϕ3 K2 ⊗S S 30 δ2 ⊗1S 30 1K2 ⊗ϕ2 K3 ⊗S S 16 δ3 ⊗1S 16 1K3 ⊗ϕ1 K4 ⊗S S δ4 ⊗1S 1K4 ⊗ϕ0  K4 ⊗S R  / K3 ⊗S S  / K2 ⊗S S 16  / K1 ⊗S S 30  / S ⊗S S 20 / k ⊗S S 5 PRODUCTS OF IDEALS MAY NOT BE GOLOD 5 Let u = (ex ∧ey )⊗(ab), and v = (ez ∧ew )⊗(cd), inside K2 (R) = K2 ⊗S R. As they are cycles, we can consider their classes α = [u] and β = [v] in homology. We want to construct a lifting ψ(uv) of the Koszul cycle uv = (ex ∧ ey ∧ ez ∧ ew ) ⊗ (abcd) ∈ K4 (R). Given (ex ∧ ey ∧ ez ∧ ew ) ⊗ (abcd) ∈ K4 ⊗S R (0) we consider the lift (ex ∧ ey ∧ ez ∧ ew ) ⊗ (abcd E1 ) ∈ K4 ⊗S S, and then apply the differential δ4 ⊗ 1S : (0) +(ey ∧ ez ∧ ew ) ⊗ (abcdxE1 ) (0) −(e (0) x ∧ ez ∧ ew ) ⊗ (abcdy E1 ) (δ4 ⊗ 1S )((ex ∧ ey ∧ ez ∧ ew ) ⊗ (abcd E1 )) = (0) +(ex ∧ ey ∧ ew ) ⊗ (abcdz E1 ) (0) −(ex ∧ ey ∧ ez ) ⊗ (abcdw E1 ) This is now a boundary, and, in fact, it is equal to  (1)  +(ey ∧ ez ∧ ew ) ⊗ (cd E2 )  (1)  −(ex ∧ ez ∧ ew ) ⊗ (cd E5 ) (1K3 ⊗ ϕ1 )  (1)  +(ex ∧ ey ∧ ew ) ⊗ (ab E12 ) (1) −(ex ∧ ey ∧ ez ) ⊗ (ab E15 ) Now we apply δ3 ⊗ 1S 16 to this element: (1) (1) +(ez ∧ ew ) ⊗ (cdy E2 − cdx E5 ) (1) (1) (1) +(ey ∧ ez ∧ ew ) ⊗ (cd E2 ) −(ey ∧ ew ) ⊗ (cdz E2 − abx E12 )  (1)  (1) (1) −(ex ∧ ez ∧ ew ) ⊗ (cd E5 ) +(ey ∧ ez ) ⊗ (cdw E2 − abx E15 ) = (δ3 ⊗ 1S 16 )  (1)  (1) (1) +(ex ∧ ey ∧ ew ) ⊗ (ab E12 ) +(ex ∧ ew ) ⊗ (cdz E5 − aby E12 ) (1) (1) (1) −(ex ∧ ey ∧ ez ) ⊗ (ab E15 ) −(ex ∧ ez ) ⊗ (cdw E5 − aby E15 ) (1) (1) +(ex ∧ ey ) ⊗ (abw E12 − abz E15 )   This is a boundary. Namely, it is equal to   (2) −(ez ∧ ew ) ⊗ (cd E13 )  (2) (2) (2)   +(ey ∧ ew ) ⊗ (dz E3 + bx E17 + bd E20 )     −(ey ∧ ez ) ⊗ (cw E (2) + bx E (2) + bc E (2) )  5 23 28  (1K2 ⊗ ϕ2 )  −(e ∧ e ) ⊗ (dz E (2) + ay E (2) + ad E (2) )  x w 8 18 21   (2) (2) (2)   +(ex ∧ ez ) ⊗ (cw E10 + ay E24 + ac E29 )  (2) −(ex ∧ ey ) ⊗ (ab E30 ) We now apply the map δ2 ⊗ 1S 30 to such a lift:   (2) −(ez ∧ ew ) ⊗ (cd E13 )  (2) (2) (2)   +(ey ∧ ew ) ⊗ (dz E3 + bx E17 + bd E20 )     −(ey ∧ ez ) ⊗ (cw E (2) + bx E (2) + bc E (2) )  5 23 28  (δ2 ⊗ 1S 30 )  −(e ∧ e ) ⊗ (dz E (2) + ay E (2) + ad E (2) ) =  x w 8 18 21   (2) (2) (2)   +(ex ∧ ez ) ⊗ (cw E10 + ay E24 + ac E29 )  (2) −(ex ∧ ey ) ⊗ (ab E30 ) (2) (2) (2) (2) (2) (2) +ex ⊗ (dzw E82 − czw E10 + ayw E18 + adw E21 − ayz E24 − acz E29 + aby E30 ) (2) (2) (2) (2) (2) (2) (2) −ey ⊗ (dzw E3 − czw E5 + bxw E17 + bdw E20 − bxz E23 − bcz E28 + abx E30 ) = (2) (2) (2) (2) (2) (2) (2) +ez ⊗ (−cyw E5 + cxw E10 + cdw E13 − bxy E23 + axy E24 − bcy E28 + acx E29 ) (2) (2) (2) (2) (2) (2) (2) −ew ∧ (−dyz E3 + dxz E8 + cdz E13 − bxy E17 + axy E18 − bdy E20 + adx E21 ) 6 ALESSANDRO DE STEFANI Again, this element is a boundary. In fact, it is equal to  (3) (3)  +ex ⊗ (zw E7 + a E20 )  (3) (3)   −e ⊗ (zw E4 + b E19 )  (1K1 ⊗ ϕ3 )  y (3) (3)   +ez ⊗ (xy E13 + c E18 )  (3) (3) −ew ⊗ (xy E10 + d E17 ) One more time, we apply δ1 ⊗ 1S 20 , to get  (3) (3)  +ex ⊗ (zw E7 + a E20 )  (3) (3)   −e ⊗ (zw E4 + b E19 )  (δ1 ⊗ 1S 20 )  y (3) (3)  =  +ez ⊗ (xy E13 + c E18 )  (3) (3) −ew ⊗ (xy E10 + d E17 ) (3) (3) (3) (3) (3) (3) = 1 ⊗ (−yzw E4(3) + xzw E7(3) − xyw E10 + xyz E13 − dw E17 + cz E18 − by E19 + ax E20 ). (4) This is a boundary: it is equal to (1S ⊗ ϕ4 )(1 ⊗ E5 ). When applying δ0 ⊗ 1S 5 to the lift, we finally get the image of uv under the map ψ : Z4 (R) → k ⊗S S 5 . Namely: (4) (4) ψ(uv) = (δ0 ⊗ 1S 5 )(1 ⊗ E5 ) = 1 ⊗ E5 ∈ k ⊗S S 5 and since the latter is non-zero, because it is part of a k-basis of k ⊗S S 5 , we obtain that uv is not a boundary of the Koszul complex. Thus, αβ is non-zero in H4 (R), and R is not Golod.  Remark 2.6. As pointed out in Remark 2.4, with the same notation as in Example 2.5, we have that x − a, y − b, z − c, w − d is a regular sequence modulo I. Going modulo such a regular sequence of linear forms, one recovers the ring of Example 2.1. Recall that a monomial ideal I satisfies the strong-GCD condition (see [Jöl06, Definition 3.8]) if there exists a linear order ≺ on the set MinGen(I) of minimal monomial generators of I such that, for any two monomials u ≺ v in MinGen(I), with gcd(u, v) = 1, there exists a monomial w ∈ MinGen(I), v 6= w, with u ≺ w and such that w divides uv. The ring in Example 2.5 satisfies the strong-GCD condition, being a product (see [SFW14, Theorem 1.1] and the discussion in the Introduction). We present here another ideal that satisfies the strong-GCD condition, that is not Golod. Although it is not a product, it has the advantage of having fewer generators than our previous ideals. Another example has been discovered by Lukas Katthän [Kat], who considers the ideal I = (x1 x2 y, x2 x3 y, x3 x4 y, x4 x5 , x5 x1 ) in the polynomial ring k[x1 , x2 , x3 , x4 , x5 , y]. Example 2.7. Let S = k[x, y, z], and let I = (x2 y, xy 2 , x2 z, y 2 z, z 2 ). Set R = S/I. The ideal I satisfies the strong-GCD condition, for example choosing x2 y ≺ xy 2 ≺ x2 z ≺ y 2 z ≺ z 2 . Using Macaulay2 [GS], we checked that the Poincaré series of R starts as PR (t) = 1 + 3t + 8t2 + 21t3 + 55t4 + 144t5 + 377t6 + . . . and that the right-hand side of Serre’s inequality is (1 + t)3 = 1 + 3t + 8t2 + 21t3 + 56t4 + 148t5 + 393t6 + . . . 1 − 5t2 − 5t3 − t4 Therefore, R is not Golod. Alternatively, one can use the Macaulay2 command isGolod(S/I), or one can show, with arguments similar to the ones used above, that the product of Koszuyl cycles ((ex ∧ ey ) ⊗ xy) · (ez ⊗ z) ∈ K3 (R) is not zero in homology. Looking for a squarefree example, using polarization, one obtains that I ′ = (axy, bxy, axz, byz, cz) ⊆ k[a, b, c, x, y, z] satisfies the strong GCD condition, and is not Golod. PRODUCTS OF IDEALS MAY NOT BE GOLOD 7 3. Strongly Golod property for rational powers of monomial ideals Let k be a field, and let S = k[x1 , . . . , xn ], with deg(xi ) = di > 0. We recall the definition of rational powers of an ideal. Definition 3.1. For an ideal I ⊆ S and positive integers p, q define the ideal I p/q := {f ∈ R | f q ∈ I p }. The integral closure of I p inside the definition is needed in order to make the set into an ideal, and to make it independent of the choice of the representation of p/q as a rational number. Remark 3.2. We would like to warn the reader about a potential source of confusion. When p = q, the ideal I p/q = I 1/1 is the integral closure I of I, and should not be regarded as the ideal I 1 = I, even though the exponents 1/1 and 1 are equal. Remark 3.3. If I ⊆ S is a monomial ideal, then so is I p/q . P Proof. Let f = di=1 λi ui ∈ I p/q , where 0 6= λi ∈ k and ui are monomials. Since I p is monomial, and we have that f qr ∈ I pr for all integers r ≫ 0 [HH11, Theorem 1.4.2]. Also, I pr is monomial, therefore every monomial appearing in f qr belongs to I pr , and in particular for any i = 1, . . . , d we pr for all r ≫ 0. This shows that uq ∈ I p , that is u ∈ I p/q for all i = 1, . . . , d, and have that uqr i i ∈I i hence I p/q is monomial.  In the rest of the section, we assume that the characteristic of k is zero. Definition 3.4 ([HH13]). A proper homogeneous ideal I ⊆ S is called strongly Golod if ∂(I)2 ⊆ I. Here, ∂(I) denotes the ideal of S generated by the partial derivatives of elements in I. By [HH13, Theorem 1.1], if I is strongly Golod, then S/I is Golod. This condition, however, is only sufficient. For example, the ideal I = (xy, xz) ⊆ k[x, y, z] is Golod [Sha69], or [Avr98, Proposition 5.2.5]. However, it is not strongly Golod. This example is not even squarefree strongly Golod (see Section 4 for the definition). In case I is monomial, being strongly Golod is equivalent to the requirement that, for all minimal monomial generators u, v ∈ I, and all integers i, j such that xi divides u and xj divides v, one has uv/xi xj ∈ I. The following argument is a modification of [HH13, Proposition 3.1]. Theorem 3.5. Let I ⊆ S be a strongly Golod monomial ideal. If p > q, then I p/q is strongly Golod. Proof. Let u ∈ I p/q be a monomial generator, then uqr ∈ I pr for all r ≫ 0. Let j be an index such that xj | u, we claim that (u/xj )qr ∈ I pr/2 for all even r ≫ 0. Notice that if x2j | u then, for any even r, r ≫ 0, we have !qr/2  qr u u = uq(r/2) ∈ I p(r/2) , xj x2j as desired. Now suppose that xj divides u, but x2j does not. Since for any r ≫ 0 we have that uqr ∈ I pr , we can write uqr = m1 m2 · · · mpr , where mi ∈ I for all i. Again, we can assume that r is even. For i = 1, . . . , pr let di be the maximum non-negative integer such that xdj i divides mi . Then we can rewrite uqr = m1 · · · ma ma+1 · · · ma+b ma+b+1 · · · mpr , 8 ALESSANDRO DE STEFANI where di = 0 for 1 6 i 6 a, di = 1 for a + 1 6 i 6 a + b and di > 2 for a + b + 1 6 i 6 pr. Because of the assumption x2j 6 | u we have that qr = pr X di = b + i=1 pr X di > b + 2(pr − b − a). i=a+b+1 But we assumed that p > q, therefore pr > b + 2(pr − b − a), which gives a + b/2 > pr/2 and also a + ⌊b/2⌋ > pr/2 because pr/2 is an integer. Write  qr u uqr ma+b ma+b+1 · · · mpr ma+1 , = qr = m1 · · · ma ··· xj xj xj xj xjqr−b b then ma+1 . . . ma+b /xbj ∈ I ⌊b/2⌋ because I is strongly Golod, so that ∂(I)b ⊆ I ⌊ 2 ⌋ . Furthermore, m1 · · · ma ∈ I a . Therefore  qr u ∈ I a+⌊b/2⌋ ⊆ I pr/2 . xj Now let v ∈ I p/q be another monomial generator, and assume that xi |v. Then, for all even r ≫ 0 we have   uv qr ∈ I pr xj xi which implies that uv/xj xi ∈ I p/q . Since u and v were arbitrary monomial generators, I p/q is strongly Golod.  Corollary 3.6. [HH13, Proposition 3.1] Let I ⊆ S be a monomial strongly Golod ideal, then I is strongly Golod. Proof. Choose p = q in Theorem 3.5.  Proposition 3.7. Let I ⊆ S be a monomial ideal. If p > 2q, then I p/q is strongly Golod. Proof. Since the ideal I p/q does not depend on the representation of p/q as a rational number, without loss of generality we can assume that p is even. Let u ∈ I p/q be a monomial generator, so that uqr ∈ I pr for all r ≫ 0. Let j be such that xj | u, then we can write  qr m1 . . . mpr mpr−qr+1 . . . mpr u uqr = m1 . . . mpr−qr · , = qr = qr xj xj xj xqr j for some mi ∈ I. But then (u/xj )qr ∈ I pr−qr ⊆ I pr/2 because q 6 p/2. Let v ∈ I p/q be another monomial generator and assume that xi | v. For r ≫ 0 we have again that (v/xi )qr ∈ I pr/2 , so that   uv qr ∈ I pr xj xi for all r ≫ 0, and thus uv/xj xi ∈ I p/q . Since u and v were arbitrary, we have that I p/q is strongly Golod.  If I is not strongly Golod and 2q > p > q, it is not true in general that I p/q is strongly Golod, as the following family of examples shows. Example 3.8. Let 2q > p > q be two positive integers and consider the ideal I = (xy, z q ) inside the polynomial ring S = k[x, y, z], where k is a field of characteristic zero. Then (xy)q (z q )p−q = (xyz p−q )q ∈ I p , 2 / Ip that is xyz p−q ∈ I p/q . Thus, u := y 2 z 2p−2q ∈ ∂(I p/q )2 . On the other hand, uq = y 2q z 2pq−2q ∈ p p because the only monomial generator of I that can appear in an integral relation for u is z q. But y 2qn z 2pqn−2q 2n ∈ / (z pqn ) PRODUCTS OF IDEALS MAY NOT BE GOLOD 9 for any n because pqn > 2pqn − 2q 2 n ⇐⇒ p < 2q, and we have the latter by assumption. As a consequence, u ∈ / I p/q , and thus I p/q is not strongly Golod. Remark 3.9. If we choose p = q = 2 in Example 3.8, we have in addition that I p/q = I = I = (xy, z 2 ) is not even Golod, because it is a complete intersection of height two. As a consequence, not all integrally closed ideals, even if assumed monomial, are Golod. A more trivial example is the irrelevant maximal ideal m. However, as noted above in Corollary 3.6, if I is a strongly Golod monomial ideal, then I is strongly Golod. More generally, if I ⊆ S = k[x1 , . . . , xn ] is homogeneous, then I j is strongly Golod for all j > n + 1 [HH13, Theorem 2.11]. It is still an open question whether I j is strongly Golod, or, at least, Golod, for any ideal I and j > 2. Since for j > 2, the ideal I j is strongly Golod, one can ask the following more general question, which has already been raised by Craig Huneke: Question 3.10. [MP13, Problem 6.19] Let I ⊆ S be a strongly Golod ideal. Is I [strongly] Golod? Remark 3.11. We checked with Macaulay2 [GS] that the ideal I of Example 2.5 is integrally closed. Therefore, the integral closure of a product of ideals, even monomial ideals in a polynomial ring, may not be Golod. We end the section with a more generic question about Golodness of the ideal I 3/2 . Note that for each ideal I = (xy, z q ) of the family considered in Example 3.8, the rational power I 3/2 is not strongly Golod. However, it is Golod. In fact, it is not hard to see that I 3 = I 3 = q 3q (x3 y 3 , x2 y 2 z q , xyz 2q , z 3q ). As a consequence, we have I 3/2 = (x2 y 2 , xyz ⌈ 2 ⌉ , z ⌈ 2 ⌉ ). Consider the linear form x − y ∈ m r m2 , which is a non-zero divisor modulo I 3/2 . The image of I 3/2 in the q 3q polynomial ring S ′ = S/(x − y) ∼ = k[x, z] is (x4 , x2 z ⌈ 2 ⌉ , z ⌈ 2 ⌉ ). Such an ideal is easily seen to be strongly Golod, hence Golod. By [Avr98, Proposition 5.2.4 (2)], the ideal I 3/2 is then Golod. Question 3.12. Let I ⊆ S be a proper homogeneous ideal. Is I 3/2 always Golod? Is it true if I is monomial? 4. lcm-strongly Golod monomial ideals Let k be a field, and let S = k[x1 , . . . , xn ], with deg(xi ) = di > 0. Definition 4.1. Let m ∈ S be a monomial, and let I ⊆ S be a monomial ideal. Define Im ⊆ I to be the ideal of S generated by the monomials of I which divide m. We say that I is m-divisible if I = Im . Remark 4.2. Note that, choosing m = x1 · · · xn , then m-divisible simply means squarefree. We now recall the Taylor resolution of a monomial ideal. Let I ⊆ S be a monomial ideal, with minimal monomial generating set {m1 , . . . , mt }. For each subset Λ ⊆ [t] := {1, . . . , t} let LΛ := lcm(mi | i ∈ Λ). Let aΛ ∈ Nn be the exponent vector of the monomial LΛ , andLlet S(−aΛ ) be the free module, with generator in multi-degree aΛ . Consider the free modules Ti := |Λ|=i S(−aΛ ), with basis {eΛ }|Λ|=i . Also, set F0 := S. The differential τi : Ti → Ti−1 acts on an element of the basis eΛ , for Λ ⊆ [t], |Λ| = i, as follows: X LΛ ·e τi (eΛ ) = sign(j, Λ) · LΛr{j} Λr{j} j∈Λ Here sign(j, Λ) is (−1)s+1 if j is the s-th element in the ordering of Λ ⊆ [t]. The resulting complex is a free resolution of S/I over S, called the Taylor resolution. The following was already noted in [BH95, Corollary 3.2], and [Iye97, Corollary to Theorem 1]. 10 ALESSANDRO DE STEFANI Remark 4.3. [BH95, Corollary 3.2] Let I be an m-divisible monomial ideal. Then, the Koszul homology H• (S/I) is Zn -multigraded, and it is concentrated in multidegrees aΛ′ ∈ Nn such that (a′ )n (a ) the monomial x1 Λ′ 1 · · · xn Λ = LΛ′ divides m. In [HH13], given a squarefree monomial ideal, Herzog and Huneke introduce the notion of squarefree strongly Golod monomial ideal. Given Remark 4.2, we generalize it to the notion of lcm-strongly Golod. Let I be a monomial ideal, and let m := lcm(I) be the least common multiple of the monomials appearing in the minimal monomial generating set of I. By definition, I is always m-divisible. Also, if I is m′ -divisible for some other monomial m′ , then m divides m′ . In what follows, we assume that the characteristic of k is zero. Definition 4.4. Let I ⊆ S be a monomial ideal, and let m := lcm(I) be as defined above. Let ∂(I)[2] denote the ideal (∂(I)2 )m . We say that I is lcm-strongly Golod if ∂(I)[2] ⊆ I. We also make the following definition Definition 4.5. Let I ⊆ S be a proper homogeneous ideal. We say that R = S/I is weakly Golod if the multiplication on Koszul homology is identically zero. The following is the main result of the section, and justifies the previous definition. It is a generalization of [HH13, Theorem 3.5]. Theorem 4.6. Let I ⊆ S be an lcm-strongly Golod monomial ideal. Then, S/I is weakly Golod. Proof. Let m := lcm(I), so that I is m-divisible and ∂(I)[2] ⊆ I. By Remark 4.3, we can choose a k-basis of H• (S/I) consisting of elements of multidegrees αΛ , where xαΛ divides m. Let a, b be two such elements. If ab has multidegree α ∈ Nn , such that xα does not divide m, then necessarily ab = 0 because of the multigrading on H• (S/I). So assume that the multidegree α of ab is such that xα divides m. By [Her92], a and b can be represented by cycles whose coefficients are k-linear combinations of elements in ∂(I). Since I is monomial, so is ∂(I). Because of the multidegree of ab, we then have that a and b can be represented by cycles whose coefficients are k-linear combinations of monomials u, v ∈ ∂(I), such that the products uv divide m. Then uv ∈ ∂(I)[2] ⊆ I for each product uv appearing in these sums, and, as a consequence, ab = 0 in H• (S/I).  Discussion. It is easy to see that being lcm-strongly Golod is only sufficient to be weakly Golod. For example, the ideal (xy, xz) ⊆ k[x, y, z] is even Golod [Sha69], but not lcm-strongly Golod. The proof of Theorem 4.6, as well as the proofs of [HH13, Theorem 1.1] and [HH13, Theorem 3.5], are based on a canonical description of Koszul cycles whose residue classes form a k-basis for the Koszul homology H• (S/I) [Her92]. We want to suggest a slightly different definition of strong Golodness: Potentially, one has to check that ∂i (f )∂j (g) ∈ I for any f, g ∈ I, and any i, j = 1, . . . , n, where ∂i = ∂/∂xi and ∂j = ∂/∂xj . However, by [Her92], each ∂i (f ) appears as a factor in some coefficient of a Koszul cycle, which has the form (ei ∧ . . .) ⊗ ∂i (f ) ∈ K• ⊗ S/I = K• (S/I). Therefore, the corresponding product ∂i (f )∂j (g) will appear inside some coefficient of the form (ei ∧ ej ∧ . . .) ⊗ ∂i (f )∂j (g). For i = j, we have that ei ∧ ej = 0. Hence we may consider only products ∂i (f )∂j (g), for i 6= j, in the definition of strongly Golod and lcm-strongly Golod. With this modification, the ideal (xy, xz) becomes lcm-strongly Golod. The ideal (x2 , xy) in the polynomial ring k[x, y], which is lcm-strongly xy 2 / (x2 , xy) is the product Golod, with this modification becomes strongly Golod. In fact, xy x · x =y ∈ that is preventing it from being strongly Golod. However, the partial derivatives, in this case, are both with respect to x, so we can disregard such a product. Here follows an example of a non-squarefree ideal which is lcm-strongly Golod, but not strongly Golod, even with the modified definition. PRODUCTS OF IDEALS MAY NOT BE GOLOD 11 Example 4.7. Let k be a field of characteristic zero, and let I = (x2 y 2 , x2 z, y 2 z) ⊆ k[x, y, z]. Then I is not strongly Golod, even in the definition suggested above. In fact, xz, yz ∈ ∂(I) come from taking derivative with respect to x and y, respectively, but their product is xz · yz ∈ / I. However, 2 2 such an element does not divide lcm(I) = x y z, therefore it can be disregarded when looking at the lcm-strongly Golod condition. In fact, one can check that ∂(I)[2] ⊆ I, that is, I is lcm-strongly Golod in this case. As shown in [HH13, Proposition 3.7] for the squarefree part, if m is a monomial in S, then the m-divisible part of a strongly Golod monomial ideal is lcm-strongly Golod. We record it in the next proposition. Proposition 4.8. Let I ⊆ S be a strongly Golod monomial ideal, and let m be a monomial. Then Im is lcm-strongly Golod. In particular, I is lcm-strongly Golod. Proof. We have that ∂(Im )[2] = (∂(Im )2 )m ⊆ (∂(I)2 )m ⊆ Im .  As mentioned in Section 3, if I is a strongly Golod monomial ideal, then I is strongly Golod. It is natural to ask the following question: Question 4.9. If I ⊆ S is an lcm-strongly Golod monomial ideal, is I (lcm-strongly) Golod? For integers p > q, is the ideal I p/q (lcm-strongly) Golod? The inequality p > q seems reasonable to require, given previous results. 5. Golodness of products and further questions Throughout this section, unless otherwise specified, k is a field of characteristic zero, and S = k[x1 , . . . , xn ] is a polynomial ring over k, with deg(xi ) = di > 0. It is easy to see that arbitrary intersections of strongly Golod ideals are strongly Golod [HH13, Theorem 2.3 (a)]. Given a proper homogeneous ideal I ⊆ S, one may ask what is the intersection of all the strongly Golod ideals containing I. In other words, what is the smallest ideal that contains I and that is strongly Golod. Clearly, such an ideal must contain I + ∂(I)2 . On the other hand, note that ∂(∂(I)2 )) ⊆ ∂(I), therefore ∂(I + ∂(I)2 )2 ⊆ I + ∂(I)2 . Thus, I + ∂(I)2 is strongly Golod, and it is indeed the smallest strongly Golod ideal containing I. We now introduce a sufficient condition, which is far from being necessary, for the product of two ideals to be strongly Golod. Definition 5.1. Let S = k[x1 , . . . , xn ] and let I, J ⊆ S be two ideals. (I, J) is called a strongly Golod pair if ∂(I)2 ⊆ I : J and ∂(J)2 ⊆ J : I. Note that, for examples of small size, the conditions from Definition 5.1 can easily be checked with the aid of a computer. The following proposition is the main motivation behind the definition. Proposition 5.2. If (I, J) is a strongly Golod pair, then IJ is strongly Golod. Proof. We noted above that the smallest strongly Golod ideal containing IJ is IJ + ∂(IJ)2 . In our assumptions, we have ∂(IJ)2 ⊆ (∂(I)J + I∂(J))2 ⊆ ∂(I)2 J 2 + I 2 ∂(J)2 + IJ ⊆ IJ. Therefore, IJ + ∂(IJ)2 = IJ, which is then strongly Golod.  12 ALESSANDRO DE STEFANI Note that, looking at the proof of Proposition 5.2, one may notice that the conditions ∂(I)2 ⊆ IJ : J 2 and ∂(J)2 ⊆ IJ : I 2 are sufficient in order for the product IJ to be strongly Golod. However, when studying properties of the product IJ, one can replace the ideal I with IJ : J without affecting the product. In fact: IJ ⊆ (IJ : J)J ⊆ IJ, forcing equality. Repeating the process, one gets an ascending chain of ideals containing I, that eventually stabilizes. Therefore one can assume that IJ : J = I. Similarly, one can assume that IJ : I = J. Therefore the conditions above become ∂(I)2 ⊆ IJ : J 2 = (IJ : J) : J = I : J, which is precisely the requirement in the definition of strongly Golod pair. Similarly for the other colon ideal. Of course, as long as one can write an ideal in terms of a Golod pair, one gets that the ideal is strongly Golod. Therefore, one may keep in mind the weaker colon conditions that come from the proof of Proposition 5.2. Examples of strongly Golod pairs include: (1) (I r , I s ), for any proper ideal I ⊆ S and any integers r, s > 1. (2) If I and J are strongly Golod, then (I, J) is a strongly Golod pair. (3) If I ⊆ J and I is strongly Golod, then (I, J) is a strongly Golod pair. (4) (I, I : ∂(I)2 ) is a strongly Golod pair for any proper ideal I ⊆ S. Remark 5.3. Let I1 , . . . , In be proper ideals in S. Assume that, for all i = 1, . . . , n there exists j 6= i such that (Ii , Ij ) is a strongly Golod pair, then the product I := I1 · · · In is strongly Golod. In fact ∂(I1 I2 . . . In ) ⊆ ∂(I1 )I2 . . . In + I1 ∂(I2 ) . . . In + . . . + I1 I2 . . . ∂(In ). Thus ∂(I)2 ⊆ ∂(I1 )2 I22 · · · In2 + I12 ∂(I2 )2 · · · In2 + . . . + I12 I22 · · · ∂(In )2 + I. By assumption, for each i there exists j 6= i such that ∂(Ii )2 Ij ⊆ Ii , and the claim follows. More generally, one could define (I1 , . . . , In ) to be a strongly Golod n-uple provided ∂(Ii )2 ⊆ I : (I1 · · · Ii−1 · Ii+1 · · · In ) for all i = 1, . . . , n. Then, the above argument shows that if (I1 , . . . , In ) is a strongly Golod n-uple, the product I1 · · · In is strongly Golod. All the conditions discussed above are sufficient, but evidently not necessary, for a product of two ideals to be Golod. We raise the following general question: Question 5.4. Is there some relevant class of [pairs of] ideals for which products are [strongly] Golod? In particular, note that in all the examples of Section 2, the ideals appearing in the product are not Golod. It is then natural to ask: Question 5.5. If one of the two ideals I1 , I2 [or both] is Golod, is then S/I1 I2 Golod? Another problem relating Golod rings to products is the following. Let I, J be two proper homogeneous ideals in a polynomial rings S = k[x1 , . . . , xn ], with m = (x1 , . . . , xn ). Suppose that S/IJ is Cohen-Macaulay. In [Hun07], Huneke asks whether the Cohen-Macaulay type, that is, t(S/IJ) = dimk Extdepth(S/IJ) (k, S/IJ), is always at least the height of IJ. This was motivated by the fact that Gorenstein rings are never products, unless they are hypersurfaces. Thus, when S/IJ is Cohen-Macaulay and not a hypersurface, the type is always at least two. As noted in [Hun07], the case when I = m and J is m-primary, follows by Krull’s height theorem. In our context, it seems natural to ask the following question: PRODUCTS OF IDEALS MAY NOT BE GOLOD 13 Question 5.6. Let I ⊆ S be a homogeneous ideal such that S/I is Cohen-Macaulay and Golod. Is it true that the Cohen-Macaulay type t(S/I) is always at least ht(I)? Is the Cohen-Macaulay assumption needed? As pointed out by Frank Moore, there is still no example of a ring which is not Golod, and for which the second Massey operation is trivial. With our notation, this means that it is not known whether weakly Golod rings are always Golod. As explained earlier in this article, it has been claimed in [BJ07, Theorem 5.1] that this is true in case the ideal is monomial. Given the examples in Section 2, and our previous discussions, we do not know whether such an argument is still valid. We decided to raise the general question here again: Question 5.7. Are weakly Golod rings always Golod? Is it true for monomial ideals? Is there any relevant class of ideals for which this holds true? In [HH13, Proposition 2.12], Herzog and Huneke show that the Ratliff Rush filtration of a strongly Golod ideal is strongly Golod. We obtain a similar statement, using Golod pairs. Proposition 5.8. If (I, J) is a strongly Golod pair, then the ideal [  I n+1 J : I n n>0 is strongly Golod. Proof. Let f ∈ S be such that f I n−1 ⊆ I n J for some n. Then f I n ⊆ I n+1 J. Let ∂ denote a partial derivative with respect to any variable. Taking partial derivatives, from the containment above we obtain that ∂(f )I n ⊆ f I n−1 ∂(I) + I n ∂(I)J + I n+1 ∂(J) ⊆ I n ∂(I)J + I n+1 ∂(J). Let f, g ∈ S n>0 I n+1 J : I n and choose n ≫ 0 such that f I n−1 ⊆ I n J and gI n−1 ⊆ I n J. Then ∂(f )∂(g)I 2n ⊆ I 2n ∂(I)2 J 2 + I 2n+2 ∂(J)2 + I 2n+1 J ⊆ I 2n+1 J because ∂(I)2 J ⊆ I and I∂(J)2 ⊆ J.  In particular, Proposition 5.8 shows that the Ratliff-Rush closure of any power I d , d > 2, is strongly Golod. In fact, it is enough to apply Proposition 5.8 to the strongly Golod pair (I d−1 , I). This already follows from [HH13, Proposition 2.12], since I d is strongly Golod for any d > 2. Given that the Ratliff-Rush closure of a strongly Golod ideal is strongly Golod we ask: Question 5.9. Given a strongly Golod ideal I ⊆ S, is every coefficient ideal of I [strongly] Golod? Question 5.9 is a more general version of Question 3.10. In fact, both the integral closure and the Ratliff-Rush closure are coefficient ideals. See [Sha91] for details about coefficient ideals. We conclude the section with two questions regarding the notion of strongly Golod ideal. The definition of strongly Golod ideals is restricted to homogeneous ideals in a polynomial ring S = k[x1 , . . . , xn ], with k a field of characteristic zero. This is because Herzog’s canonical lift of Koszul cycles [Her92] can be applied only under these assumptions. Question 5.10. Is there a suitable definition of strongly Golod for local rings, at least when the ring contains a field? Question 5.11. Is there a notion of strongly Golod that does not require the characteristic of k to be zero? 14 ALESSANDRO DE STEFANI Acknowledgements We would like to thank Craig Huneke for stimulating discussions about this project, and for constant encouragement and support. We also thank David Eisenbud for significant help with some Macaulay2 computations and for valuable suggestions. We are indebted to Srikanth Iyeangar, for fruitful conversations that led to Example 2.1. These took place at the AMS-MRC workshop in Commutative Algebra, Snowbird 2015. Therefore, we would like to thank the American Mathematical Society for providing such a great opportunity to this author. We thank Adam Boocher, Aldo Conca, Lukas Katthän and Volkmar Welker for very helpful comments and suggestions. We also thank the anonymous referee, for helpful suggestions that improved the exposition of this article. A. The minimal free resolution of Example 2.5 Let k be a field, and let S = k[a, b, c, d, x, y, z, w]. Consider the monomial ideals I1 = (ax, by, cz, dw) and I2 = (a, b, c, d) inside S. Let I := I1 I2 be their product, and set R = S/I. Let T = Z[a, b, c, d, x, y, z, w], and let J be the ideal I inside T . Then, using the Macaulay2 command res J, we get a resolution of J over T ϕ4 / T5 F• : 0 ϕ3 / T 20 ϕ2 / T 30 ϕ1 / T 16 ϕ0 /T / T /I / 0. Assume that char(k) = p > 0. We checked with Macaulay2 [GS] that (a2 x) ⊆ I(ϕ1 ), where I(ϕ1 ) is the Fitting ideal of the map ϕ1 . This is still a regular element after tensoring with − ⊗Z Z/(p), so that grade(I(ϕ1 ⊗ 1Z/(p) )) > 1. Similarly, one can see that (a12 x3 , b12 y 3 ) ⊆ I(ϕ2 ) (a15 x3 , b15 y 3 , c15 z 3 ) ⊆ I(ϕ3 ) (a5 x, b5 y, c5 z, d5 w) ⊆ I(ϕ4 ) Since the former stay regular sequences after tensoring with − ⊗Z Z/(p) we obtain that grade(I(ϕi ⊗ 1Z/(p) )) > i for all i = 1, . . . , 4. In addition, the ranks of the maps add up to the correct numbers after tensoring. By Buchsbaum-Eisenbud’s criterion for exactness of complexes [BE73], F• ⊗Z Z/(p) is a minimal free resolution of J ⊗Z Z/(p) as an ideal of T ⊗Z Z/(p) ∼ = Z/(p)[a, b, c, d, x, y, z, w]. Finally, since the map T ⊗Z Z/(p) → S is faithfully flat, tensoring with (F• ⊗Z Z/(p)) ⊗Z/(p) S gives a minimal free resolution of I over S, using Buchsbaum-Eisenbud’s criterion for exactness of complexes [BE73] once again. When char(k) = 0, one can use Q instead of Z/(p) and the same arguments can be applied. Therefore we get a resolution ϕ4 / S5 F• ⊗Z S : 0 ϕ3 / S 20 / S 30 ϕ2 / S 16 ϕ1 /S ϕ0 /R / 0. Lβi (i) Letting Ej be the canonical bases of the modules Fi ∼ = j=1 T , for i = 0, . . . , 4, the matrices representing the differentials of the minimal free resolution of J over T are the same as the ones of a minimal free resolution of I over S. Here follows a description of such matrices. All the missing entries should be regarded as zeros: ϕ1 (0) E1 (1) E1 (1) E2 (1) E3 (1) E4 (1) E5 (1) E6 (1) E7 (1) E8 (1) E9 (1) (1) (1) (1) (1) (1) (1) E10 E11 E12 E13 E14 E15 E16 a2 x abx acx adx aby b2 y bcy bdy acz bcz c2 z cdz adw bdw cdw d2 w (2) (2) (2) (2) (2) (2) (2) (2) (2) (2) (2) (2) (2) (2) (2) (2) (2) (2) (2) (2) (2) (2) (2) (2) (2) (2) (2) (2) (2) (2) ϕ2 E1 E2 E3 E4 E5 E6 E7 E8 E9 E10 E11 E12 E13 E14 E15 E16 E17 E18 E19 E20 E21 E22 E23 E24 E25 E26 E27 E28 E29 E30 (1) E1 (1) E2 (1) E3 (1) E4 (1) E6 (1) E7 (1) E8 (1) E9 (1) E10 (1) E11 (1) E12 (1) E13 (1) E14 (1) E15 (1) E16 a −d −c a −d b −y −d a b −z c −w −b −c a −d −c a x −d b −d a b −z c −w −b −c a −d −c a x −d b y −d a b c −w −b −c a −d −c a x −d b y −d a PRODUCTS OF IDEALS MAY NOT BE GOLOD (1) E5 −b −c b z c 15 16 ALESSANDRO DE STEFANI (3) (3) (3) (3) (3) (3) (3) (3) (3) (3) (3) (3) (3) (3) (3) (3) ϕ3 E1 E2 E3 E4 E5 E6 E7 E8 E9 E10 E11 E12 E13 E14 E15 E16 (2) E1 c d (2) E2 −b d (2) E3 a d (2) E4 −b −c (2) E5 a −c (2) E6 a b (2) E7 c d (2) E8 −b d (2) E9 a d (2) E10 −b −c (2) E11 a −c (2) E12 a b (2) E13 (2) E14 c d (2) E15 −b d (2) E16 a d (2) E17 −b −c (2) E18 a −c (2) E19 a b (2) E20 (2) E21 (2) E22 c d (2) E23 −b d (2) E24 a d (2) E25 −b −c (2) E26 a −c (2) E27 a b (2) E28 (2) E29 (2) E30 (3) (3) (3) (3) E17 E18 E19 E20 −yz −yw −zw xz xw −zw cz dw −xy xw yw −by ax dw dw −xy −xz −yz −by −cz ax −cz ax by PRODUCTS OF IDEALS MAY NOT BE GOLOD ϕ4 (4) E1 (3) −d (3) c (3) −b (3) a E1 E2 E3 E4 (4) E2 −d (3) c (3) −b (3) a E6 E7 E8 −d (3) c (3) −b (3) a E10 E11 E12 −xyw (3) −d (3) c (3) −b (3) a E13 E14 E15 E16 (4) E5 xzw (3) E9 (4) E4 −yzw (3) E5 (4) E3 xyz (3) −dw (3) cz (3) −by (3) ax E17 E18 E19 E20 17 18 ALESSANDRO DE STEFANI References [AG71] L. L. Avramov and E. S. Golod. The homology of algebra of the Koszul complex of a local Gorenstein ring. Mat. Zametki, 9:53–58, 1971. 1 [Ani82] David J. Anick. A counterexample to a conjecture of Serre. Ann. of Math. (2), 115(1):1–33, 1982. 1 [Avr98] Luchezar L. Avramov. Infinite free resolutions. In Six lectures on commutative algebra (Bellaterra, 1996), volume 166 of Progr. Math., pages 1–118. Birkhäuser, Basel, 1998. 2, 4, 7, 9 [BE73] David A. Buchsbaum and David Eisenbud. What makes a complex exact? J. Algebra, 25:259–268, 1973. 14 [BH95] Winfried Bruns and Jürgen Herzog. On multigraded resolutions. Math. Proc. Cambridge Philos. Soc., 118(2):245–257, 1995. 9, 10 [BJ07] Alexander Berglund and Michael Jöllenbeck. On the Golod property of Stanley-Reisner rings. J. Algebra, 315(1):249–273, 2007. 2, 13 [GL69] Tor H. Gulliksen and Gerson Levin. Homology of local rings. Queen’s Paper in Pure and Applied Mathematics, No. 20. Queen’s University, Kingston, Ont., 1969. 2 [Gol62] E. S. Golod. Homologies of some local rings. Dokl. Akad. Nauk SSSR, 144:479–482, 1962. 2 [GS] Daniel R. Grayson and Michael E. Stillman. Macaulay2, a software system for research in algebraic geometry. Available at http://www.math.uiuc.edu/Macaulay2/. 2, 3, 6, 9, 14 [Her92] Jürgen Herzog. Canonical Koszul cycles. In International Seminar on Algebra and its Applications (Spanish) (México City, 1991), volume 6 of Aportaciones Mat. Notas Investigación, pages 33–41. Soc. Mat. Mexicana, México, 1992. 4, 10, 13 [HH11] Jürgen Herzog and Takayuki Hibi. Monomial ideals, volume 260 of Graduate Texts in Mathematics. SpringerVerlag London, Ltd., London, 2011. 7 [HH13] Jürgen Herzog and Craig Huneke. Ordinary and symbolic powers are Golod. Adv. Math., 246:89–99, 2013. 1, 2, 7, 8, 9, 10, 11, 13 [HS79] Jürgen Herzog and Manfred Steurich. Golodideale der Gestalt a ∩ b. J. Algebra, 58(1):31–36, 1979. 1 [Hun07] Craig Huneke. Ideals defining Gorenstein rings are (almost) never products. Proc. Amer. Math. Soc., 135(7):2003–2005 (electronic), 2007. 1, 12 [Iye97] Srikanth Iyengar. Shifts in resolutions of multigraded modules. Math. Proc. Cambridge Philos. Soc., 121(3):437–441, 1997. 9 [Jöl06] Michael Jöllenbeck. On the multigraded Hilbert and Poincaré-Betti series and the Golod property of monomial rings. J. Pure Appl. Algebra, 207(2):261–298, 2006. 1, 2, 6 [Kat] Lukas Katthän. Personal communication. 6 [MP13] Jason McCullough and Irena Peeva. Infinite graded free resolutions. Available online at http://www.math.cornell.edu/ irena/papers/infiniteRes.pdf, 2013. 1, 9 [Rot09] Joseph J. Rotman. An introduction to homological algebra. Universitext. Springer, New York, second edition, 2009. 4 [SFW14] S. A. Seyed Fakhari and V. Welker. The Golod property for products and high symbolic powers of monomial ideals. J. Algebra, 400:290–298, 2014. 1, 2, 6 [Sha69] Jack Shamash. The Poincaré series of a local ring. J. Algebra, 12:453–470, 1969. 7, 10 [Sha91] Kishor Shah. Coefficient ideals. Trans. Amer. Math. Soc., 327(1):373–384, 1991. 13 [Wei94] Charles A. Weibel. An introduction to homological algebra, volume 38 of Cambridge Studies in Advanced Mathematics. Cambridge University Press, Cambridge, 1994. 4 Department of Mathematics, University of Virginia, Charlottesville, VA 22903 Email address: [email protected]
0math.AC
arXiv:1404.4885v1 [math.AC] 18 Apr 2014 THE ANALOGUE OF IZUMI’S THEOREM FOR ABHYANKAR VALUATIONS BY G. ROND AND M. SPIVAKOVSKY Dedicated to the memory of Shreeram Abhyankar and David Rees. Abstract. A well known theorem of Shuzo Izumi, strengthened by David Rees, asserts that all the divisorial valuations centered in an analytically irreducible local noetherian ring (R, m) are linearly comparable to each other. This is equivalent to saying that any divisorial valuation ν centered in R is linearly comparable to the m-adic order. In the present paper we generalize this theorem to the case of Abhyankar valuations ν with archimedian value semigroup Φ. Indeed, we prove that in a certain sense linear equivalence of topologies characterizes Abhyankar valuations with archimedian semigroups, centered in analytically irreducible local noetherian rings. In other words, saying that R is analytically irreducible, ν is Abhyankar and Φ is archimedian is equivalent to linear equivalence of topologies plus another condition called weak noetherianity of the graded algebra grν R. We give some applications of Izumi’s theorem and of Lemma 2.7, which is a crucial step in our proof of the main theorem. We show that some of the classical results on equivalence of topologies in noetherian rings can be strengthened to include linear equivalence of topologies. We also prove a new comparison result between the m-adic topology and the topology defined by the symbolic powers of an arbitrary ideal. 1. Introduction Let (R, m, k) be a local noetherian domain with the maximal ideal m and residue field k. Let K denote the field of fractions of R. Consider a valuation ν : K∗ ։ Γ of K with value group Γ. We denote by Rν its valuation ring and by mν its maximal ideal. Definition 1.1. We say that ν is centered in R if ν is non-negative on R and strictly positive on m. Consider a valuation ν : R −→ Γ, centered in R. Then mν ∩ R = m; thus k is a subfield of Rν . kν := m ν Definition 1.2. We say that ν is a divisorial valuation if its value group Γ = Z and tr.degk kν = dim R − 1. The purpose of this paper is to generalize the following theorem of Shuzo Izumi and David Rees (often called Izumi’s Theorem for short) to a larger class of valuations than just the divisorial ones. Theorem 1.3. [Iz85], [Re89] Let R be an analytically irreducible local domain. Then for any two divisorial valuations ν and ν ′ , centered in R, there exists a constant k > 0 such that ν(f ) ≤ k ν ′ (f ) ∀f ∈ R. 2000 Mathematics Subject Classification. Primary: 13A18. Secondary: 13A15, 16W60. 1 2 BY G. ROND AND M. SPIVAKOVSKY This result has played a central role in the study of ideal-adic topologies and other questions about commutative rings during the last decades. To highlight its applications, we start with some basic definitions and then recall two related theorems due to David Rees. Let R be a commutative noetherian ring and I an ideal of R. For an element f ∈ R the I-order of f is defined to be I(f ) := max{n ∈ N | f ∈ I n }. This function takes its values in N ∪ {∞} and I(f ) = ∞ if and only if f ∈ I n for all n ∈ N. Moreover it is easy to see that I(f g) ≥ I(f ) + I(g) for all f , g ∈ R since I is an ideal. Next we introduce a more invariant notion, defined by David Rees and Pierre Samuel, namely the reduced order: n ¯ ) := lim I(f ) . I(f n→∞ n ¯ ) is a rational number, or even finite. The fact that I(f ¯ ) A priori, it is not obvious that I(f is always rational in a noetherian domain R is a consequence of the following theorem of D. Rees: Theorem 1.4. [Re55][Re56a] For any ideal I in a noetherian domain R there exists a unique finite set of valuations {νi }1≤i≤r of R (with values in Z) such that ¯ ) = min νi (f ) I(f 1≤i≤r νi (I) and this representation is irredundant. These valuations νi are called the Rees valuations of the ideal I. Remark 1.5. This Theorem has been stated and proved by Rees assuming only that R is noetherian (not necessarily a domain); here we restrict ourselves to the case of domains in order to simplify the exposition. Remark 1.6. In view of Theorem 1.4, Theorem 1.3 can be reformulated as follows: every divisorial valuation ν is linearly equivalent to the m-adic order. This means that there exists a positive integer k such that ν(f ) < km(f ) for all f ∈ R. In the case R is a local domain and I = m, the valuations νi appearing in the statement of Theorem 1.4 are divisorial valuations centered in R. ¯ ) ≥ I(f ) for all f . We will need the following result From the definitions we see easily that I(f of D. Rees in order to derive some corollaries of Theorem 1.3 about ideal-adic topologies in noetherian rings: Theorem 1.7. [Re56b] Let R be an analytically unramified local ring. Then there exists a constant C > 0 such that ¯ ) ≤ I(f ) + C I(f ∀f ∈ R. The goal of this paper is to generalize Theorem 1.3 to a larger class of valuations: the Abhyankar valuations whose semigroup is archimedean. Let us begin with some definitions. Let K denote the field of fractions of a local domain R. Consider a valuation ν : K∗ ։ Γ of K with value group Γ, centered in R. Let Rν denote THE ANALOGUE OF IZUMI’S THEOREM FOR ABHYANKAR VALUATIONS 3 the valuation ring of ν and mν the maximal ideal of Rν . Since ν is centered in R, we have a ν natural injection k ⊂ R mν . The three basic invariants associated with ν are   Rν tr.degk ν := tr.deg (1) /k mν (2) rat.rk ν := dimQ (Γ ⊗Z Q) (3) rk ν := dimRν , where “dimension” means the Krull dimension. In 1956 S. Abhyankar proved that (4) rat.rk ν + tr.degk ν ≤ dimR (cf. [Ab56], Theorem 1, p. 330). This inequality is called the Abhyankar Inequality. An Abhyankar valuation is a valuation centered in R such that the above inequality is an equality. Any divisorial valuation centered in R satisfies rat.rk ν = 1 and tr.degk ν = dimR − 1; hence it is an Abhyankar valuation. Let Φ := ν(R \ {0}) ⊂ Γ. Then Φ is an ordered semigroup contained in Γ. Since R is noetherian, Φ is a well-ordered set. For α ∈ Φ, let pα := {x ∈ R | ν(x) ≥ α} and pα+ := {x ∈ R | ν(x) > α} (here we adopt the convention that ν(0) > α for any α ∈ Γ). Ideals of R which are contractions to R of ideals in Rν are called ν-ideals. All of the pα and pα+ are ν-ideals and {pα }α∈Φ is the complete list of ν-ideals in R. Specifying all the ν-ideals in R is equivalent to specifying ν (see [ZS60], Appendix 3). The following is a characterization of ν-ideals: an ideal I ⊂ R is a ν-ideal if and only if, for any elements a ∈ R, b ∈ I such that ν(a) ≥ ν(b) we have a ∈ I. We associate to ν the following graded algebra: M p α . grν R := pα+ α∈Φ Definition 1.8. We say that Φ is archimedian if for any α, β ∈ Φ, α 6= 0, there exists r ∈ N such that rα > β. This is equivalent to saying that every ν-ideal in R is m-primary and weaker than saying that rk ν = 1. For l ∈ N, let Ql denote the ν-ideal (5) Ql := {x ∈ R | ν(x) ≥ lν(m)}. Of course, ml ⊂ Ql for all l ∈ N. Definition 1.9. We say that the ν-adic and the m-adic topologies are linearly equivalent if there exists r ∈ N such that Qrl ⊂ ml for all l ∈ N. 4 BY G. ROND AND M. SPIVAKOVSKY Thus Theorem 1.3 is equivalent to saying that for any divisorial valuation ν of R the ν-adic topology M is linearly equivalent to the m-adic topology. Let A = Aα be a Φ-graded k-algebra. Assume that A0 = k. By abuse of notation, let α∈Φ us denote 1 := ν(m) and for l ∈ N l := l · 1. Definition 1.10. We say that A is weakly noetherian of dimension d if A contains d algebraically independent elements and the function X F (l) = dimk Aα 0≤α≤l is bounded above by a polynomial in l of degree d. If A is weakly noetherian then dimk Aα < ∞ for all α ∈ Φ. We now state the main theorem of this paper. Theorem 1.11. Let (R, m, k) be a local noetherian domain with field of fractions K. Let ν be a valuation of K centered in R with value semigroup Φ. Then the following two conditions are equivalent: (1) R is analytically irreducible, Φ is archimedian and (6) rat.rk ν + tr.degk ν = dim R (2) the ν-adic and the m-adic topologies are linearly equivalent and grν R is weakly noetherian. This theorem is proved in Part 2. Part 3 is devoted to applications of Izumi’s Theorem and of Lemma 2.7. The most difficult part in the proof of Theorem 1.11 is the implication (1)=⇒ "linear equivalence between the ν-adic and the m-adic topologies". Let us mention that this implication has been proved by D. Cutkosky [ELS03] in the case R contains a characteristic zero field. More precisely he proved in this case that an Abhyankar valuation is quasi-monomial after a sequence of blow-ups. Thus, by Theorem 1.3, the ν-adic and the m-adic topologies are linearly equivalent. This implication has also been proved in the case when (R, m) is a complete local ring containing a field of positive characteristic and ν is the composition of a R , and of the morphism R −→ S, where (S, m0 ) is a regular complete local ring with mS0 ≃ m m0 -adic valuation of S (see [Ro09]). Theorem 1.11 has been announced by the second author and a proof was sketched in [Sp90] without details but the entire proof was never published. The proof presented here follows the sketched proof announced in [Sp90]. 1.1. Conventions. Let R be an integral domain with field of fractions K. Let ν be a valuation of K with value group Γ. The notation Rν will stand for the valuation ring of ν (the ring of all the elements of K whose values are non-negative) and mν the maximal ideal of Rν (the elements with strictly positive values). If p ⊂ R is an ideal, we put ν(p) := min {ν(x) | x ∈ p}. THE ANALOGUE OF IZUMI’S THEOREM FOR ABHYANKAR VALUATIONS 5 If R is noetherian, this minimum is always achieved. If x is an element of R, x̄ will always mean the natural image of x in grν R. We freely use the multi-index notation: if x = (x1 , · · · , xn ), α = (α1 , · · · , αn ) ∈ Nn0 , then xα n n P Q i αi . xα stands for i . The syumbol |α| will stand for i=1 i=1 Let R be a regular local ring with regular system of parameters x = (x1 , · · · , xn ). A valuation ν, centered at R, is said to be monomial with respect to x if all the ν-ideals of R are generated by monomials in x. 2. Proof of Theorem 1.11 The purpose of this section is to prove Theorem 1.11. We start with a few remarks. Remark 2.1. Suppose the m-adic and the ν-adic topologies in R are equivalent. Then Φ is archimedian. Indeed, to say that Φ is not archimedian is equivalent to saying that there exists a ν-ideal p in R which is not m-primary. But then p is open in the ν-adic topology, but not in the m-adic topology, which is a contradiction. Moreover, the equivalence of topologies implies that R is analytically irreducible. Indeed, let {an }, {bn } be two Cauchy sequences for the m-adic topology in R such that lim an 6= 0 (7) n→∞ lim bn 6= 0, (8) n→∞ but lim an bn = 0. n→∞ By the equivalence of topologies, (7) and (8), ν(an ) and ν(bn ) are independent of n for n ≫ 0, hence so is ν(an bn ), which contradicts the fact that lim an bn = 0 n→∞ in the ν-adic topology. Remark 2.2. The fact that Φ is archimedian together with the equality (6) implies that the m-adic and the ν-adic topologies are equivalent (see [Z49], pp. 63–64). Lemma 2.3. Let R be any local domain whatsoever and ν any valuation of the field of fractions, centered in R. Let x1 , · · · , xr be elements of R such that {ν(xi )}1≤i≤r are linearly independent over Z. Let y1 , · · · , yt be elements of Rν such that the natural images ȳi of the Rν yi in m are algebraically independent over k. Assume that there exists a monomial b = xω ν such that byi ∈ R for all i, 1 ≤ i ≤ t. Then the natural images of x1 , · · · , xr , by1 , · · · , byt in grν R are algebraically independent over k. Proof. The algebra grν R is an integral domain, on which ν induces a natural valuation, which we shall also denote by ν. Let zi := byi , Consider an algebraic relation X (9) c̄α,β x̄α z̄ β = 0, α,β 1 ≤ i ≤ s. α ∈ Nr0 , β ∈ Ns0 , c̄α,β ∈ k, 6 BY G. ROND AND M. SPIVAKOVSKY where the c̄α,β are not all zero. Here x̄i , z̄i denote the natural images in grν R of xi and zi , respectively. We may assume that (9) is homogeneous with respect to ν. At least two of the c̄α,β must be non-zero. Take a pair (α, β), (γ, δ) ∈ Ns+r such that 0 c̄α,β 6= 0 (10) c̄γ,δ 6= 0. (11) Then x̄α b̄|β| = x̄γ b̄|δ| otherwise the equality ν(c̄α,β x̄α z̄ β ) = ν(c̄γ,δ x̄γ z̄ δ ) would give a rational dependence between the ν(xi ). This implies that (9) can be rewritten in the form X x̄λ c̄α,β ȳ β = 0 α,β and hence X (12) c̄α,β ȳ β = 0, α,β since grν R is an integral domain. But this contradicts the choice of the yi and the Lemma is proved.  Corollary 2.4. Under the assumptions of Lemma 2.3, let (13) r : = rat.rk ν (14) t : = tr.degk ν. Then tr.degk grν R = r + t. Here we allow the possibility for both sides to be infinite. In particular, if grν R is weakly noetherian, its dimension must be r + t. Proof. We work under the assumption that r and t are finite and leave the general case as an easy exercise. Let y1 , · · · , yt be a maximal set of elements of Rν such that the ȳi are algebraically independent over k. Let x1 ∈ R be any element of strictly positive value such that x1 yi ∈ R for all i, 1 ≤ i ≤ t. Choose x2 , · · · , xr in such a way that {ν(xi )}1≤i≤r form a basis for Γ ⊗Z Q over Q. By Lemma 2.3, x̄1 , · · · , x̄r , x̄1 ȳ1 , · · · , x̄1 ȳt are algebraically independent over k in grν R. Hence, tr.degk grν R ≥ r + t. On the other hand, take any z ∈ R. By the choice of the xi , there exist l ∈ N, ci ∈ Z such that ! r Y  ci l xi . ν z =ν i=1 l Qr z̄ Writing down the alBy the choice of the yi , ci is algebraic over k(ȳ1 , · · · , ȳt ). i=1 x̄i gebraic dependence relation and clearing denominators, we get that z̄ is algebraic over k[x̄1 , · · · , x̄r , x̄1 ȳ1 , · · · , x̄1 ȳt ] and the proof is complete.  Proof of Theorem 1.11 (2) =⇒ (1). By Remark 2.1 we only have to prove that rat.rk ν + tr.degk ν = dim R. Let d := rat.rk ν + tr.degk ν THE ANALOGUE OF IZUMI’S THEOREM FOR ABHYANKAR VALUATIONS and for l ∈ N 7 R Ql where Ql is as in (5). By Corollary 2.4, grν R is weakly noetherian of dimension d. Hence N (l) is bounded above by a polynomial in l of degree d. By the linear equivalence of topologies, there exists r ∈ N such that Qrl ⊂ ml for all l ∈ N. N (l) := length Hence length R R ≤ length , l m Qrl and so length mRl is bounded above by a polynomial of degree d in l. Therefore dim R ≤ d, hence dim R = d by Abhyankar’s Inequality (4). (1) =⇒ (2). Let d be as above. By Corollary 2.4, grν R contains d algebraically independent elements over k. For l ∈ N, ml ⊂ Ql , so that length R R ≥ length . ml Ql Therefore length QRl is bounded above by a polynomial in l of degree d and grν R is weakly noetherian. We have now come to the hard part of the Theorem: proving the linear equivalence of topologies. b be the m-adic completion of R. Since R is analytically irreducible and Φ archimedian, Let R b (see [Z49], pp. 63–64). Moreover, νb has the same there exists a unique extension νb of ν to R Rνb Rν value group as ν and mνb = mν . Since b = (mR) b n, mn R b it is sufficient to prove that the νb-adic and the mR-adic topologies are linearly equivalent in b Thus we may assume that R is complete. R. Claim. There exists a system of parameters (x1 , · · · , xd ) of R such that x̄1 , · · · , x̄d are algebraically independent in grν R over k, and if char(R) = 0 and char(k) = p > 0 we have x1 = p. Proof of Claim. We construct the xi recursively. First of all we choose any non-zero element x1 in m except in the case char(R) = 0 and char(k) = p > 0 where we choose x1 := p. Assume that we already constructed elements x1 , · · · , xi ∈ m such that x̄1 , · · · , x̄i are algebraically independent over k and ht(x1 , · · · , xi ) = i < d. By Corollary 2.4 there exists y ∈ R such that ȳ is transcendental over k[x̄1 , · · · , x̄i ] in grν R. Let P1 , · · · , Ps denote the minimal prime ideals of (x1 , · · · , xi )R. Renumbering the Pj , if necessary, we may assume that there exists j ∈ {0, · · · , s} such that y ∈ Pl , 1 ≤ l ≤ j and y∈ / Pl , j < l ≤ s. j j s s T S S T Pl = R if j = s), Pl = ∅ if j = 0 and Pl (where we take Pl \ Take any z ∈ l=j+1 l=1 l=1 and let xi+1 := y + z N , l=j+1 8 BY G. ROND AND M. SPIVAKOVSKY where N is an integer such that N ν(z) > ν(y). We have constructed elements x1 , · · · , xi , xi+1 ∈ m such that x̄1 , · · · , x̄i+1 are algebraically independent over K and ht(x1 , · · · , xi+1 ) = i + 1. For i = d we obtain the desired system of parameters (x1 , · · · , xd ). The Claim is proved.  If R is not equicharacteristic, it contains a complete non-equicharacteristic Dedekind domain W (cf. [Ma80], Theorem 84) whose maximal ideal is generated by p = x1 . Since R is an integral domain, R is finite over k[[x1 , · · · , xd ]] or W [[x2 , · · · , xd ]], depending on whether R is equicharacteristic or not (cf. [Ma80], Theorem 84). Let S := k[[x1 , · · · , xd ]] or W [[x2 , · · · , xd ]], depending on which of the two cases we are in. Let L denote the field of fractions of S and m0 := m ∩ S. Let t1 , · · · , tn be a system of generators of R as an S-algebra. Let T1 , · · · , Tn be independent variables and write S[T1 , · · · , Tn ] , p R= where p is the kernel of the natural map S[T ] → R, given by Ti → ti , 1 ≤ i ≤ n. Let   xd x2 ,··· , S̃ = S x1 x1 and let S̄ be the localization of S̃ at the prime ideal (x1 )S̃: S̄ = S̃(x1 ) . The ring S̄ is the local ringh of the generic i point of the exceptional divisor of the blowing-up xd x2 of σ S at m0 . Let R̄ := R x1 , · · · , x1 . Then R̄ is a semi-local integral domain, finite over S̄ and birational to R. Let q0 := m0 S̄ = (x1 )S̄; q := mR̄. Let ν0 denote the restriction of ν to L. Lemma 2.5. Let (S, m0 , k) be a regular local ring with regular system of parameters x = (x1 , · · · , xd ) and field of fractions L. Let ν0 be a valuation of L, centered at S, such that x̄1 , · · · , x̄d are algebraically independent in grν0 S over k. Then the valuation ν0 is monomial with respect to x. Proof. In what follows, "monomial” will mean a monomial in x and "monomial ideal” - an ideal, generated by monomials in x. For an element f ∈ S, let M (f ) denote the smallest (in the sense of inclusion) monomial ideal of S, containing f . The ideal M (f ) is well defined: it is nothing but the intersection of all the monomial ideals containing f . Let M on(f ) denote the minimal set of monomials generating I(f ). In other words, M on(f ) is the smallest set of monomials in x such that f belongs to the ideal of S generated by M on(f ). The set M on(f ) can also be characterized as follows. It is the unique set {ω1 , · · · , ωs } of monomials, none of which divide each other and such that f can be written as (15) f= s X i=1 ci ω i with ci units of S. THE ANALOGUE OF IZUMI’S THEOREM FOR ABHYANKAR VALUATIONS 9 A key point is the following: since x̄1 , · · · , x̄n are algebraically independent in grν0 S by assumption, (15) implies that (16) ν0 (f ) = min {ν(ωi )}. 1≤i≤s If I is an ideal of S, let M (I) denote the smallest monomial ideal, containing I. The ideal M (I) is generated by the set {M on(f ) | f ∈ I}. We want to prove that all the ν0 -ideals of S are monomial. Let I be a ν0 -ideal of S. It is sufficient to prove that I = M (I). Obviously, I ⊂ M (I). To prove the opposite inclusion, take a monomial ω ∈ M (I). By the above, there exists f ∈ I and ω ′ ∈ M on(f ) such that (17) ω ′ | ω. By (16), we have ν0 (ω ′ ) ≥ ν0 (f ). Since I is a ν0 -ideal, this implies that ω ′ ∈ I. Hence ω ∈ I by (17). This completes the proof.  Lemma 2.6. Let (S, m0 , k) be a regular local ring with regular system of parameters x = (x1 , · · · , xd ) and field of fractions L. Let ν0 be a monomial valuation of L, centered at S, such that the semigroup ν0 (S \ {0}) is archimedian. Then the ν0 -adic topology on S is linearly equivalent to the m0 -adic topology. Proof. Renumbering the xi , if necessary, we may assume that ν0 (x1 ) ≤ ... ≤ ν0 (xd ). Since ν0 (S \ {0}) is archimedian, there exists a natural number N such that ν0 (xd ) ≤ N ν0 (x1 ). For l ∈ N, let Ql denote the ν0 -ideal (18) Ql := {x ∈ S | ν0 (x) ≥ lν0 (m0 )}. Then for all l ∈ N we have QN l ⊂ ml0 ⊂ Ql . This completes the proof of the Lemma.  Next, R′ be the normalization of R. Since R is complete, R′ is a local ring [Na62], (37.9). Let m′ be the maximal ideal of R′ . If the m′ -adic topology in R′ is linearly equivalent to the ν-adic one then the same is true for the m-adic topology in R. Hence we may assume that R is normal. Let K1 be a finite extension of K which is normal over L (in the sense of field theory). Then there exists a valuation ν1 of K1 whose restriction to K is ν [ZS60], Chapter VI, 4,6,11. Let R1 be the integral closure of R in K1 . Then R1 is a product of complete local rings and since it is an integral domain (it is a subring of K1 ) it is a complete local ring. Then ν1 is centered in thei maximal ideal m1 of R1 . We have dim(R1 ) = dimR, rat.rk ν1 = rat.rk ν h R Rν and mνν1 : m < ∞. The ring R1 is analytically irreducible by [Na62], (37.8). Finally, ν 1 since R1 is algebraic over R, for any x ∈ R1 there exist n ∈ N and y ∈ R such that nν1 (x) ≥ ν1 (y) = ν(y). Hence ν1 is archimedian on R1 . Therefore ν1 satisfies (1) of Theorem 1.11. To prove that the m-adic topology on R is linearly equivalent to the ν-adic one, it is sufficient to prove that the same is true of the m1 -adic topology on R1 . Thus we may assume that the field extension L ֒→ K is normal. Let p = char K if char K > 0 and p = 1 otherwise. Let pn denote the inseparability degree of K over L. By Lemmas 2.5–2.6 the ν0 -adic topology on S is linearly equivalent to the m0 -adic topology. Now, let f ∈ m. Since R is assumed to be integrally closed in K, it equals the integral closure of S in K. Therefore R is mapped to itself by all the automorphisms of K over L. In 10 BY G. ROND AND M. SPIVAKOVSKY particular, for every σ ∈ Aut(K/L) we have ν(σf ) > 0. Then   Y n σf p  = ν(NK/L (f )) = ν0 (NK/L (f )). ν(f ) < ν  σ∈Aut(K/L) By the linear equivalence of topologies on S, there exists r ∈ N, such that ν0 (NK/L (f )) ≤ rm0 (NK/L (f )). Now Theorem 1.11 follows from the next Lemma (we state Lemma 2.7 in greater generality than is necessary for Theorem 1.11 for future reference). Lemma 2.7. Let S ⊂ R be two noetherian domains with fields of fractions L and K, respectively. Let m be a maximal ideal of R and m0 := m ∩ S. Assume that Sm0 and Rm are analytically irreducible and that Rm is finite over Sm0 . Assume that at least one of the following conditions holds: (1) for any f ∈ R, NK/L (f ) ∈ S. (2) The m0 -adic order on S is a valuation (so that the expression m0 (NK/L (f )) makes sense). Then there exists r ∈ N such that for any f ∈ R m0 (NK/L (f )) ≤ rm(f ). Proof. Arguing as above, we reduce the problem to the case when R and S are complete local rings, R is integrally closed in K and the field extension L ֒→ K is normal. We will work under all these assumptions from now on. First, we prove the equivalence of topologies under the additional assumptions that K is separable (hence Galois) over L and S is regular. We fix a regular system of parameters x = (x1 , · · · , xd ) of S. Let G := Gal(K/L). Then G acts on R. Let R̄ be as above and let R̄′ denote the integral closure of R̄ in K. Then R̄′ is a 1-dimensional semi-local ring, finite over S̄. Let m1 ,..., ms denote the maximal ideals of R̄′ . Write qR̄′ = s \ mki i = s Y mki i . i=1 i=1 Then (19) qn R̄′ = s \ i = mnk i s Y i mnk i . i=1 i=1 Each mi defines a divisorial valuation of K, centered in R. We denote it by νi . The group G acts on R̄′ and permutes the mi . By Theorem 1.3, all the νi are linearly comparable in R to the m-adic pseudo-valuation of R. Hence there exists r ∈ N such that for any i, 1 ≤ i ≤ s and any f ∈ R, νi (f ) ≤ rm(f ). (20) Since S is a UFD, q0 (f ) = m0 (f ) for all f ∈ S. Now, take any f ∈ R. Without loss of generality, assume that ν1 (f ) = max νi (f ). 1≤i≤s l Finally, let l ∈ N be such that q ∩ S ⊂ q0 . Then for any g ∈ S, q0 (g) ≤ lq(g). We have THE ANALOGUE OF IZUMI’S THEOREM FOR ABHYANKAR VALUATIONS (21) (22) 11 m0 (NK/L (f )) = q0 (NK/L (f )) ≤ lq(NK/L (f )) ≤ (23) (24) ≤ l max ki max νi (NK/L (f )) 1≤i≤s 1≤i≤s Y ≤ l max ki max νi (σf ) 1≤i≤s 1≤i≤s σ∈G ≤ l max ki [K : L]ν1 (f ) ≤ rl max ki [K : L]m(f ). 1≤i≤s 1≤i≤s This proves Lemma 2.7 in the case when K is Galois over L and S is regular. Continue to assume that S is regular, but drop the assumption of separability of K over L. Let Ks denote the maximal separable extension of L in K. Let Rs := R ∩ Ks . Suppose n char K = p > 0. Then there exists n ∈ N such that Rp ⊂ Rs . Let ms denote the maximal ideal of Rs . Since ms ⊂ m, for any g ∈ Rs we have ms (g) ≤ m(g). By the separable case there exists r ∈ N such that for any f ∈ Rs ν(f ) ≤ rms (f ). Then for any f ∈ R, (25) (26) n n r 1 ν(f p ) ≤ n ms (f p ) n p p r pn ≤ n m(f ) ≤ rm(f ). p ν(f ) = Hence ν(f ) and m(f ) are linearly comparable, as desired. This proves Lemma 2.7 assuming S is regular. Finally, drop the assumption that S is regular. There exists a complete regular local ring T ⊂ S such that S is finite over T . Since Lemma 2.7 is already known for T , it is also true for S by the multiplicativity of the norm. This proves Lemma 2.7 and with it Theorem 1.11.  3. Applications The rest of the paper is devoted to the applications of Izumi’s Theorem and of Lemma 2.7. The first application is to rewrite some of the classical theorems on comparison of topologies in noetherian rings (which were traditionally proved by Chevalley lemma) to include linear equivalence of topologies. The following observation will be useful in the sequel. Lemma 3.1. Let R be a noetherian ring, m a maximal ideal of R. Let ϕ : R → Rm denote the localization homomorphism. Then ϕ−1 (mn Rm ) = mn + Ker ϕ = mn . In other words, the symbolic powers of m coincide with the usual powers. In particular, the m-adic topology on R coincides with the restriction of the mn Rm -adic topology to R. Proof. Consider an element x ∈ ϕ−1 (mn Rm ). Then there exists u ∈ R \ m such that ux ∈ mn . For every natural number n, we have (u) + mn = R. Then there exist vn ∈ R, mn ∈ mn such that uvn + mn = 1. We have 12 BY G. ROND AND M. SPIVAKOVSKY x = x · 1 = x(uvn + mn ) = xuvn + xmn ∈ mn . This proves that ϕ−1 (mn Rm ) ⊂ mn for all natural numbers n, and the Lemma follows.  The following Corollary is a partial generalization of Corollary 2, [ZS60] p. 273: Corollary 3.2. Let R be a noetherian ring and m a maximal ideal of R, such that Rm is an analytically irreducible local domain. Let R̄ be a finitely generated R-algebra, containing R. Let p be a prime ideal of R̄, lying over m. Then the p-adic topology on R is linearly equivalent to the m-adic topology. In other words, there exists r ∈ N such that for any n ∈ N prn ∩ R ⊂ mn . Proof. By Lemma 3.1, we may assume that R is an analytically irreducible local noetherian b denote domain with maximal ideal m. Let K be the field of fractions of R. Let ψ : R → R the m-adic completion of R. The homomorphism ψ is faithfully flat, hence so is the induced b which lies over p. The ring b Then there exists a prime ideal b p in R̄ ⊗R R map R̄ → R̄ ⊗R R. b is finitely generated over R, b so we may assume that R is m-adically complete. R̄ ⊗R R If R̄ is a purely transcendental extension of R, then pn ∩ R = mn and the Corollary is trivial. The normalization R′ of R is a complete local domain, finite over R ([Na62], Corollary 37.9). Hence the Corollary is true when R̄ = R′ . Replacing (R, R̄) with (R′ , R′ ⊗R R̄), we may assume that R is normal, hence analytically normal. Since we know the Corollary for the case of purely transcendental extensions, we may replace R by the normalization of a maximal purely transcendental extension of R, contained in R̄. Thus we may assume that the total ring of fractions of R̄ is finite over K. Let q be a minimal prime of R̄ such that q ⊂ p. Since R is a domain, p ∩ R = (0). Replacing R̄ with R̄ q , we may assume that R̄ is a domain. Let K̄ denote its field of fractions. Let π : X → Spec R̄ be the normalized blowing-up along p. Since R is Nagata, so is R̄ and π is of finite type. Let E be any irreducible component of π −1 (p). Let ν denote the divisorial valuation of K̄ associated to E, and let pl := {x ∈ R̄ | ν(x) ≥ l}, l ∈ N. Then pl ⊂ pl for all l ∈ N. Hence it is sufficient to show that the ν-adic and the m-adic topologies in R are linearly equivalent. Since [K̄ : K] < ∞, ν induces a divisorial valuation of K, centered in R. Now the Corollary follows from Theorem 1.11.  The above Corollary can be strengthened as follows. Corollary 3.3. Let R be a noetherian ring and m a maximal ideal of R such that Rm is an analytically irreducible local domain. Let R̄ be a finitely generated R-algebra, containing R. Let p be a prime ideal of R̄ lying over m and I an ideal of R̄ such that I ⊂ p and I ∩ R = (0). Then there exists r ∈ N such that for any n ∈ N, (I + prn ) ∩ R ⊂ mn . Proof. Replacing R̄ by Corollary 3.2. R̄ I does not change the problem. Now Corollary 3.3 follows from  Remark 3.4. In terms of the analogy with functional analysis, this Corollary says that if I ∩ R = (0), then I is “transversal” to R. THE ANALOGUE OF IZUMI’S THEOREM FOR ABHYANKAR VALUATIONS 13 Corollary 3.5. Let R be a noetherian ring and T = (T1 , · · · , Tn ) independent variables. Let m be a maximal ideal of R. Let R̄ be a finitely generated extension of R and p̄ ⊂ m̄ ⊂ R̄[[T ]] a pair of prime ideals of R̄[[T ]] such that m̄ ∩ R[[T ]] = (m, T ). Let (27) Assume that n∈N R[[T ]](m,T ) p p := p̄ ∩ R[[T ]] ⊂ (m, T ). is analytically irreducible. Then there exists r ∈ N such that for all (m̄rn + p̄) ∩ R[[T ]] ⊂ (m, T )n + p. Remark 3.6. In particular, we can apply this Corollary to the following situation. Let R, T , m, R̄, m̄ be as in Corollary 3.5. Assume, in addition, that R is a UFD. Let p = (F ) be a principal prime ideal generated by a single irreducible power series F ∈ R[[T ]]. Let (28) pR̄[[T ]] = q1 ∩ · · · ∩ qs √ be a primary decomposition of p in R̄[[T ]]. We must have qi ⊂ m̄ for some i. Let √ p̄ := qi . Finally, assume that the equality (27) is satisfied. The equality (28) corresponds to a factorization F in R̄[[T ]]. Say, F = F1 F2 in R̄[[T ]]. Then Corollary 3.5 says that there exists r ∈ N such that if F̃ ≡ F1 F̃2 mod m̄rn , where F̃2 ∈ R̄[[T ]], F̃ ∈ R[[T ]], then F̃ ∼ = F g mod (m, T )n for some g ∈ R[[T ]]. Thus F1 (F2 g − F̃2 ) ∈ (m, T )n ⊂ m̃n and by Artin-Rees Lemma there exists a constant c depending only on F1 such that F̃2 ∼ = F2 g mod m̄n−c . In other words, approximate factorization of an element of R[[T ]] in R̄[[T ]] is close to an actual factorization, and the estimate is linear in n. Proof of Corollary 3.5. Let R̃ := R̄[[T ]]m̄ and let S = R[[T ]](m,T ) ⊗R R̄m̄∩R̄ ⊂ R̃. Let m0 := m̄R̃ ∩ S. Then R̃ is the (T )-adic completion of S, followed by localization at m̄. We can decompose the injective homomorphism S → R̃ in two steps: S → Sm0 → R̃, where the second arrow is a faithfully flat homomorphism and the first a localization with respect to a maximal ideal. By faithful flatness, we have m̄n ∩ Sm0 = mn0 R̃ ∩ Sm0 = mn0 Sm0 , so that the m̄-adic topology on Sm0 is linearly equivalent to the m0 -adic topology. Combining this with Lemma 3.1, we see that the m̄-adic topology on S is linearly equivalent to the m0 -adic topology. The ring S is a localization of a finitely generated R[[T ]]-algebra, and we apply ]] S ֒→ p̄∩S . This completes the proof.  Corollary 3.2 to the ring extension R[[T p Remark 3.7. Corollary 3.5 can be strengthened as follows. Let R be a noetherian ring, T1 , · · · , Tn independent variables and A a noetherian ring such that R[T ] ⊂ A ⊂ R[[T ]]. Let m be a maximal ideal of R. Let R̄ be a finitely generated R-algebra and let B be a noetherian R̄-algebra such that A ⊗R R̄ ⊂ B ⊂ R̄[[T ]]. Assume that (m, T ) is a maximal ideal of A and that both A ⊗R R̄ and B have R̄[[T ]] as their (T )-adic completion. Let m̄ be any prime ideal of R̄ lying over (m, T ) and p̄ a prime ideal of B such that p̄ ⊂ m̄. 14 BY G. ROND AND M. SPIVAKOVSKY Let p := p̄ ∩ A. Assume that that for any n ∈ N Am̄∩A pAm̄∩A is analytically irreducible. Then there exists r ∈ N such (m̄rn + p̄) ∩ A ⊂ (m, T )n + p. The proof is exactly the same as for Corollary 3.5. The following result is not a corollary of Theorem 1.11 but uses Theorem 1.4: Proposition 3.8. (cf. [Na62] Theorem 3.12, p. 11). Let R be a noetherian domain and I an ideal of R. Let x be a non-zero element of R. Assume that R is analytically unramified. Then there exists r ∈ N such that for any k, n ∈ N I k : xn ⊂ I k−rn . Here we adopt the convention that I n = R if n ≤ 0. Proof. By Theorem 1.4, there exist valuations ν1 , · · · , νs such that for any f ∈ R ¯ ) = min νi (f ) . I(f 1≤i≤s νi (I) By Theorem 1.7 there exists r1 ∈ N such that for any n ∈ N and any f ∈ R (29) ¯ ) ≤ r1 + I(f ). I(f ¯ ) ≥ r1 + l then f ∈ I l . For any y ∈ I k : xn we must have Hence, for any l ∈ N, if I(f νi (y) + nνi (x) ≥ kνi (I) for all i, 1 ≤ i ≤ s. Now take a positive integer R such that r ≥ max 1≤i≤s νi (x) + r1 . νi (I) Then for any y ∈ I k : xn and any i ∈ {1, · · · , s} we have νi (y) ≥ kνi (I) − nνi (x) ≥ kνi (I) − n(r − r1 )νi (I) ≥ (k − nr + r1 )νi (I). By (29) this implies that y ∈ I k−nr , as desired.  The following corollary is a generalization of the main result of [Mo13]: Corollary 3.9. Let R be an analytically irreducible noetherian local ring. Then there exists a ∈ N such that for any proper ideal I of R we have: I (ac) ⊂ mc ∀c ∈ N. Here, if W denotes the complement of the union of the associated primes of I, I (n) is the contraction of I n RW to R where RW denotes the localization of R with respect to the multiplicative system W . The ideal I (n) is called the n-th symbolic power of I. Let us mention that it is known that if (R, m) is a regular local ring of dimension d then I (dc) ⊂ I c for any ideal I of R and any integer c [HH02]. If (R, m) has is an isolated singularity ring then I (kc) ⊂ I c for any ideal I of R and any integer c [HKV09] for some constant k independent on p. For a general local ring R and for any ideal I, there exists a constant k depending on I such that I (kc) ⊂ I c for any c [Sw00] but it is still an open question to know if such a k may be chosen independently of I in general. THE ANALOGUE OF IZUMI’S THEOREM FOR ABHYANKAR VALUATIONS 15 Proof. First let us prove the result when R is a complete local domain and I = p is a prime ideal. By Cohen’s structure theorem R is finite over a ring of power series over a field or over a compete Dedekind domain S. We denote by m0 the maximal ideal of S. Let K (resp. L ) denote the field of fractions of R (resp. S). First let us assume that K/L is Galois and R is normal. Let q := p ∩ S. Since K/L is Galois and R is the integral closure of S in K, there exists an integer l which is independent of p such that for any integer N , x ∈ p(N ) implies NK/L (x)l ∈ q(N ) (see Proposition 3.10 of [Ho71]). Since S is a regular local ring we have q(k) ⊂ mk0 for any k (see [Ho71] p. 9). By Lemma 2.7 there exists an integer r ∈ N such that for any f ∈ R, m0 (NK/L (f )) ≤ rm(f ). rk k Thus if x ∈ p(rkl) then NK/L (x)l ∈ mrkl 0 , hence NK/L (x) ∈ m0 and we have x ∈ m . Finally we obtain p(rlc) ⊂ mc ∀p ⊂ R prime and c ∈ N. Next, keep the assumptions that R is complete and p is prime, but drop the assumptions that R is normal and that the extension L → K is Galois. Let p = char K if char K > 0 and p = 1 otherwise. Let pn be the inseparability degree of K over L. Let Ks be the maximal separable extension of L in K and set Rs := R ∩ Ks . Then Rs is a complete local domain n whose maximal ideal ms equals m ∩ Rs and Rp ⊂ Rs . The ideal ps := p ∩ Rs is a prime n ideal of Rs and pp ⊂ ps . For any element y ∈ p(c) there exists a ∈ R\p such that ay ∈ pc . n n n (c) Thus ap y p ∈ pcs and y p ∈ ps . n n n (αpn c) (αc) ⊂ mps c . Thus If ps ⊂ mcs for any integer c, then for any x ∈ p(αp c) we have xp ∈ ps n n xp ∈ mp c and by Rees theorem there exists a constant c0 depending only on R such that x ∈ mc−c0 . Thus we may assume that K/L is separable. In this case let us denote by K1 a finite separable field extension of K which is normal over L and let R1 be the integral closure of R in K1 . Then R1 is a direct sum of complete local rings and since R1 is a domain (it is a subring of a field) it is a complete local domain. Let m1 be the maximal ideal of R1 . By Lemma 2.4 [Ro09] there exists α ∈ N such that c mαc 1 ∩ R ⊂ m for any integer c. Since R → R1 is finite there exists a prime ideal p1 of R1 lying over p. Thus by replacing R and p by R1 and p1 , we may assume that K/L is Galois and R is normal and this case has been proved above. Now let us assume that R is an analytically irreducible local ring and I = p is a prime b ideal of R. Let us consider an irredundant primary decomposition of pR: b = q1 ∩ · · · ∩ qs pR b denotes the completion of R and the qi are primary ideals of R. b Let pi be the where R b radical of qi for all i and set W := R\ ∪i pi . Since pi ∩ R = p for any i, we have an inclusion of multiplicative systems: R\p ⊂ W . Thus we have for any integer n: (n) b bb bW ∩ R b ⊂ p(n) R bR\p ∩ R ⊂ pn R p(n) = pn RR\p ∩ R ⊂ pn R 1 R\p ∩ R = p1 . 1 By the previous case there exist a and b such that b c ∩ R = mc the theorem is proved in this case. m (ac+b) p1 bc ⊂ m for all integers c. Since Finally let us assume that R is an analytically irreducible local ring and I is any ideal of R, not necessarily prime. Let p1 ,..., ps be the associated primes of I and set W = R\ ∪i pi . 16 BY G. ROND AND M. SPIVAKOVSKY Then we have for any integer n: (n) I (n) = I n RW ∩ R ⊂ pn1 RW ∩ R ⊂ pn1 RR\p1 ∩ R = p1 . Since the theorem is proved for the symbolic powers of p1 , this proves the theorem for any ideal I.  References [Ab56] S. S. Abhyankar, On the valuations centered in a local domain, Amer. J. Math, 78, 1956, 321-348. [ELS03] L. Ein, R. Lazarsfeld, K. Smith, Uniform approximation of Abhyankar valuation ideals in smooth function fields, Amer. J. Math, 125, 2003, 409-400. [Ho71] M. Hochster, Symbolic powers in Noetherian domains, Illinois J. Math., 15, 1971. [HH02] M. Hochster, C. Huneke, Comparison of symbolic and ordinary powers of ideals, Invent. Math., 147, 2002, 349-369. [HKV09] C. Huneke, D. Katz, J. Validashti, Uniform equivalence of symbolic and adic topologies, Illinois J. Math, 53, 2009, 325-338. [HS0] C. Huneke, I. Swanson, Integral closure of ideals, rings and modules, London Mathematical Society Lecture Note Series, 336, Cambridge University Press, Cambridge, 2006. [Iz85] S. Izumi, A mesure of integrity for local analytic algebras, Publ. RIMS, Kyoto Univ., 21, (1985), 719-736. [Ma80] H. Matsumura, Commutative Algebra, Mathematics Lecture Note Series, 56, Benjamin/Cummings Publishing Co., Inc., Reading, Mass., 1980. [Mo13] A. More, Uniform bounds on symbolic powers, J. of Algebra, 383, 2013, 29-41. [Na62] M. Nagata, Local rings, Interscience Tracts in Pure and Applied Mathematics, 13, New York, (1962). [Re55] D. Rees, Valuations associated with a local ring (I), Proc. London Math. Soc., 5, 1955, 107-128. [Re56a] D. Rees, Valuations associated with ideals (II), J. London Math. Soc., 31, 1956, 221-228. [Re56b] D. Rees, Valuations associated with a local ring (II), J. London Math. Soc., 31, 1956, 228–235. [Re89] D. Rees, Izumi’s theorem, Commutative algebra (Berkeley, CA, 1987), 407–416, Math. Sci. Res. Inst. Publ., 15, (1989). [Ro09] G. Rond, Homomorphisms of local algebras in positive characteristic, J. of Algebra, 322, no. 12, (2009), 4382-4407. [Sp90] M. Spivakovsky, Valuations, the linear Artin approximation theorem and convergence of formal functions, Proceedings of the II SBWAG, Santiago de Compostela, Felipe Gago and Emilio Villanueva, editors, ALXEBRA, 54, (1990), 237-254. [Sw00] I Swanson, Linear equivalence of topologies, Math. Z., 234, 2000, 755-775. [Z49] O. Zariski, A simple analytical proof of a fundamental property of birational transformations, Proc. Nat. Acad. Sci., 35, 1949, 62-66. [ZS60] O. Zariski, P. Samuel, Commutative Algebra II, D. Van Nostrand, Springer, Princeton, New Jersey, 1960. Institut de Mathématiques de Marseille, Université d’Aix-Marseille, Campus de Luminy, Case 907, 13288 Marseille Cedex 9 E-mail address: [email protected] Institut de Mathématiques de Toulouse Université Paul Sabatier, 118 route de Narbonne, 31062 Toulouse Cedex 9 , France E-mail address: [email protected]
0math.AC
A validation methodology aid for improving a thermal building model : case of diffuse radiation accounting in a tropical climate A.J.P. LAURET, T. A. MARA, H. BOYER, L. ADELARD, F. GARDE Université de La Réunion, Laboratoire de Génie Industriel, Equipe Génie Civil, BP 7151 15 avenue René Cassin, 97705 Saint-Denis Cedex, Ile de la Réunion, FRANCE __________________________________________________________________________________________ Abstract As part of our efforts to complete the software CODYRUN validation, we chose as test building a block of flats constructed in Reunion Island, which has a humid tropical climate. The sensitivity analysis allowed us to study the effects of both diffuse and direct solar radiation on our model of this building. With regard to the choice and location of sensors, this stage of the study also led us to measure the solar radiation falling on the windows. The comparison of measured and predicted radiation clearly showed that our predictions over-estimated the incoming solar radiation, and we were able to trace the problem to the algorithm which calculates diffuse solar radiation. By calculating view factors between the windows and the associated shading devices, changes to the original program allowed us to improve the predictions, and so this article shows the importance of sensitivity analysis in this area of research. keywords: model validation; shadow mask; sensitivity analysis; diffuse solar radiation; time-frequency analysis __________________________________________________________________________________________ obtained for direct radiation is applied to the total incident radiation. 1. Introduction This article treats the solar radiation which enter In recent years, major efforts have been made to a building through windows (or other glass develop methods for estimating the radiation flux frontages), and which are protected by a veranda, falling on various surfaces (walls of buildings, solar which is a very common set-up in tropical and photo-voltaic panels, etc.). Many theoretical architecture. In this case, the simplifications models are therefore available, covering both short mentioned earlier would lead us to overestimate the and long wave radiation and also radiation sources indoor solar radiation, and we will see that certain (such as direct or diffuse radiation from the sky [1] improvements should be made to the theoretical or ground reflected diffuse radiation[2-3]) model. With regard to the interaction of these fluxes with the envelope of a building, their coupling with 2. The context of the study other transfer phenomena has also been studied intensively [4-5]. These aspects can be successfully 2-1 The Climate incorporated into program codes, provided we take into account accepted (and justified) assumptions concerning the solar radiation (such as the partition Reunion Island is situated at a latitude of 21° between short and long wavelengths, the South and a longitude of 55° East. The climate is ‘transparency’ of the air as far as radiation are humid tropical. There is a dry season (May to concerned, etc.) and also concerning the walls and October)- mainly cool and dry, predominated by the windows (unidirectional conduction heat trade winds and a wet season (November to April)exchanges, constant radiation properties, etc.). hotter and wetter with light winds. In a humid The calculation of the impact of near or further tropical climate, the source of discomfort arises shading devices is also well-known, carried out from a temperature increase due to bad architectural using either trigonometry [6-7] or other methods design, as far as insulation is concerned. Solar [8]. Design of shading devices is easily radiation accounts for 80% with the rest due to accomplished by classical methods [9-10], but only conduction exchanges. Under the humid tropical in the case of direct beam radiation. However, most climate, the readings made on the short wave of the program codes do not calculate in detail the diffuse radiation show the importance of this kind influence of near shading devices on diffuse of input. In particular, a quick analysis of the daily radiation, apart from certain reference programs graphs on Reunion Island shows often significant such as DOE-2 [11] and S3PAS [12]. In diffuse radiation when the direct beam is low. The TRNSYS[13] for example, the shading reduction diffuse radiation therefore represents a significant Buildenv12 fraction of the total (40% on the coast and about 50% for the interior of the island). As a result, the solar protection of windows is fundamental, not only because this represents 1520% of the thermal gains, but also because the windows contribute to the increase in the discomfort experienced by the occupant, due to the instant heating of the ambient air temperature and exposure to direct or reflected sunlight. All the windows must therefore be protected by some sort of shading device (overhanging horizontal canopies, screens, shadow masks etc.). The measurement programme lasted throughout January 1998. For the meteorological data, equipment was set-up on the roof of the dwelling, giving half-hourly data for outdoor dry temperature, sky temperature, relative humidity, global and diffuse horizontal radiation and also wind speed and direction. Ambient temperatures (dry and resultant) and relative humidity were measured in two places and at different heights in each room of the dwelling. Furthermore, some interior and exterior wall and roof surface temperatures were included in the experimental results. 2-1 The chosen building 2-2 The software CODYRUN We have experimented with a typical dwelling of collective housing in Reunion island. This assessment is part of a technical evaluation of the building standards [14] for French overseas territories. The dwelling, represented in Fig. 1, includes three bedrooms and a living room. A veranda in effect enlarges the living room through the use of large bay windows. Our analysis is based on the temperatures measured in the living-room, as the standard ECODOM concentrates exclusively on comfort improvement of living areas. Fig.1. Typical dwelling CODYRUN is a detailed building thermal simulation software regrouping design and research aspects. This software has already been covered in various publications [15-18]. Essentially, it involves multiple-zone software including natural ventilation and humidity transfer. Another key feature of CODYRUN is its multiple-model aspect. Indeed, before one simulation, the expert user has the possibility to choose between different models. The counterpart of this flexibility is the necessity for the building physics researcher to set up various models of different accuracy for each physical phenomenon. The multiple-model aspect is detailed in [16], the thermal model in [17], the pressure airflow in [18], the data-structuration and the description of the front-end in [15]. Paper [14] focuses on both guidelines for tropical climate based on simulations with CODYRUN and split system modelling embedded in the software. With regard to the validation of the program, CODYRUN was successfully ‘BESTESTed’ [21] and compared with other in situ measurements. For the building chosen for this study, because of the large surface area of the bay windows (particularly on the West side), the largest energy source is from solar radiation. The performance of the building is therefore heavily influenced by the incoming radiation. It is recognised that for homes in cold climates with moderately sized windows and high levels of foundation insulation, energy simulation software should be fairly accurate [22]. The afore-mentioned article emphasises that for homes in hot climates, with large solar apertures and thermal mass, the situation is less clear. Simulation results for these situations should be used with caution. Bearing in mind these elements, a recognised stepby-step validation procedure was used, including in particular a sensitivity analysis which is discussed in the following section. Buildenv12 Sensitivity analysis (SA) of the model output is a very important stage in model building and analysis. In the building thermal simulation field, SA is being applied more and more [23-26]. Indeed, SA can help increase the reliability of the predictions made by building thermal simulation software. This method identifies the most influential factors and inputs and evaluates their effect. In the validation methodology, the results are helpful as they give precise information on how to plan experiments. In particular, SA pinpoints the parameters or inputs that must be known accurately. In this way, we know which special measurements should be performed to ensure reliable predicted results. capacity. These latter three parameters represent, in effect, the thermal inertia of the building. As far as the heat sources are concerned, this study clearly shows the importance of properly taking into account solar heat gains (both direct and diffuse). 1 0.9 0.8 0.7 %of total variance 3 Use of sensitivity analysis to plan the experiment 0.6 Thickness Diffuse solar rad. Direct solar rad. outdoor air Temp. Spec. Heat cap.. density 0.5 0.4 0.3 0.2 0.1 0 5 10 15 20 Time (h) 3.1. The methodology Fig.2. Assessment of the most important parameters Using a MATLAB program which was specially developed for the chosen building, we conducted a sensitivity study, with the aim of determining the most significant parameters and input data for the prediction of the indoor dry air temperature. The analysis was complete, in the sense that it treated both parametric variables (material properties associated with the building envelope) and non-parametric (meteorological data). We will not give details of the method, as these can be found in another article [27]. The proposed method involves performing several simulation runs by oscillating each input sinusoidally over its range of interest. Analysing the spectrum (Fourier transform or power spectral density) of the output reveals the most influential factors. 1024 simulations were performed by making each factor (input or parameter) vary as a sinusoid ranging over 10% with respect to its base-case value. In the following study, we are looking for the most important parameters for the predicted indoor air temperature ; once the simulations are achieved we can calculate the power spectrum density (PSD) of the residual. As PSD is defined as the spectral decomposition of a signal’s variance, we evaluate the influence of each parameter upon the output calculating the variance of the temperature differences ( var( Ti ) ) due to each parameter. We note in particular that the contribution due to diffuse solar radiation increases at 3p.m. As the absorptance of the walls for short wavelengths do not appear in the preceding analysis, the sensitivity of the apartment to shortwave radiation depends on solar gains through the windows. Therefore, in order to determine the interaction between the building envelope and the outside solar radiation, in addition to the measurements mentioned earlier, we introduced two pyranometers on each side of the largest bay window. This was in the living room, facing West and so heavily exposed in the afternoon. In the photograph below, one can see the bay window as well as the shading screen. In this way, we obtained a measurement of the global incident solar radiation (without the shading effect, because this was placed at the edge of the plant tub) and of that transmitted by the bay (after the effect of the shading device and the glass). 3.2. Results The figure below shows that the input data and parameters which account for 90% of the residual variance are : direct and diffuse solar radiation, concrete walls thickness, density and specific heat Fig.3. The dwelling (West side) Buildenv12 The initial detailed simulation software (CODYRUN) was modified to include the exterior global and interior radiation calculations (for each window) in the output file. This study may guide the building physics researcher in the right direction for improving the model. 4.1. Use of time-frequency analysis 4. Initial comparison of model and measurements For this ‘initial’ comparison, the diffuse exterior are considered to be unaffected by the presence of near-field shading. For the weather conditions experienced at the time of the measurements, all the exterior and interior openings were closed and cautiously sealed. The building was therefore behaving in a thermally pure mode, with no incoming airflow. For modelling purposes, five zones were considered, including the zone ‘living room’. All our analysis is centred on comparisons of measurements with the model for dry air temperatures in the living room. MEASUREMENT Temp (°C) CODYRUN 35 34.5 34 33.5 33 32.5 32 31.5 31 30.5 30 1 3 2 4 Time ( Day) Fig.4. Dry air temperature of the living room Figures 4 and 5 show the comparison between the predicted indoor dry air temperature in the living room and its measurement. The maximum acceptable measurement error is 0.5C . As the residual does not fall within these limits, the model is rejected. The mean and standard deviation are the following : Mean -0.39 Std 0.369 Residual ( °C) 1 0.5 0 -0.5 -1 -1.5 1 2 Time (Day) 3 4 Fig.5. Residual To find the source of the error, one has to search for correlation between the inputs and the residual. Instead of classical spectral analysis [28-29] that shows some limitations when the inputs are correlated (as in the case of meteorological data), time-frequency analysis is a powerful tool capable of de-segregating the actual effects of several inputs at different time-scales. Time-frequency analysis is a modern technique to extract information from signals. The first and natural time-frequency tool is the short-scale Fourier Transform (SFTT). The key feature of these tools is that they simultaneously decompose a signal in time and frequency. One can imagine that the information obtained is richer than that given in only spectral or in time domain analysis. The representation of an SFTT is called the spectrogram. The goal of our study is to check whether the spectrogram of the residual is similar to the one of the inputs. In order to obtain useful spectograms, low frequency data must be filtered out. For this purpose, a fourth-order Butterworth is used to remove frequencies lower than 0.02h -1. Filtering is justified in our case as the range of interest is around 1 day-1 harmonic (~0.041h -1). Unlike classical spectral analysis, spectograms of climatic data show that the time-frequency signature of the outdoor air-temperature is very different from that of the solar radiation. It is possible here to distinguish outdoor air temperature from the other inputs. The main drawback of classical frequency analysis is avoided. 4.2. Application to our case Spectograms of diffuse and direct solar radiation illustrate the complementarity of these two inputs. Consequently, it will be difficult to identify which of these 2 inputs is really correlated with the residual. Nevertheless, physically, the influence of the diffuse component seems more relevant. Comparison of the 2 spectograms clearly shows a correlation between diffuse solar radiation and the residual at times 90 and 130. The source of the error seems to be in the way the model account for diffuse solar radiation Buildenv12 Signal in time -1 Wind speed (m.s ) Residual (°C) Signal in time 0.5 0 -0.5 2 1 0 -1 Spectrogram of wind speed 0.9 0.9 0.8 0.8 Energy spectral density 0.6 0.5 0.4 0.3 0.7 -1 -1 Frequency [h ] 0.7 Frequency [h ] Energy spectral density Spectrogram of the residual 0.2 0.1 0.1 0 80 100 120 Time [h] 140 1.8 160 0.9 0 60 x 10 4 Dif. solar rad. (W\.m-²) 60 Out. air temp. (°C) 0 Signal in time 4 2 0 -2 0 0.8 0.6 0.5 0.4 0.7 -1 Frequency [h ] -1 Frequency [h ] 160 200 0.8 0.3 0.6 0.5 0.4 0.3 0.2 0.2 0.1 0.1 0 0 60 80 x 104 100 120 Time [h] 140 160 3 2 1 0 60 x 10 8 80 100 120 Time [h] 140 160 Signal in time - Dir. solar rad. (W\.m ²) 140 Spectrogram of diffuse solar radiation Energy spectral density Energy spectral density 100 120 Time [h] Signal in time 0.9 0 80 400 0.9 0.7 4 0.4 0.3 Spectrogram of outdoor air temperature 8 0.5 0.2 0 1114 557 0.6 800 600 400 200 0 -200 Spectrogram of direct solar radiation 0.9 Energy spectral density 0.8 -1 Frequency [h ] 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0 8 4 0 x 108 60 80 100 120 Time [h] 140 160 Fig.6. Spectograms of the residual and the inputs 5. Improvement of the model 5.1. Comparison of incoming radiation Because of the two pyranometers installed after the sensitivity analysis, we are able to compare the global exterior solar radiation with the interior one, both for the actual measurements and for the model predictions. Given that the agreement for the exterior values is excellent, we clearly see that our initial model overestimates by 30 to 40% the interior radiation contributions in the living room (see fig.7). Considering that the measurement error is approximately 6%, and that the error due to imprecise positioning of the pyranometers is neglectable, an error of 30 to 40% is evidently very significant. Further, as the sensitivity analysis had shown that the transmittance of the glass was not an Buildenv12 important factor, the near shading device formed by the protection around the west bay window is clearly responsible for the overestimation of the solar gains. As CODYRUN has already been tested with respect to the effect of shading devices on the direct radiation [21], we decided to improve the model by introducing the possibility of reducing the diffuse solar radiation with near shading devices. Vert. Glob. Solar -2 Radiation (W.m ) CODYRUN MEASUREMENT Fig.9. The bay window in its egg-crate 250 200 150 100 50 0 1 3 2 4 Time (Day) Fig.7. Comparison of the global solar radiation 5.2 The chosen method As a near shading device is generally composed of several elements (top-flap, vertical fins, low walls,…), the calculation of the analytic shape factor involving the window and the shading device proved complex. We therefore preferred a simplified approach which uses properties of the view factors. By using projections perpendicular to the planes containing the windows and each element of the shade, the calculation of the global shape factor can be achieved by combining several view factors of the same type ; these view factors are those obtained for orthogonal parallelepipeds with a common edge [29] . l A h w 90° As a first step, we limited ourselves to one dimension per element of the shade. In this way the left side was represented by a parallelepiped of width equal to the top side. An alternative, more comprehensive approach has been tried, but was not integrated into the program, because of the small (approximately 1%) reduction obtained. One should note that our method does not take into account the solar radiation reflected off the shade. This has been studied by Barozzi [6] for example, and could prove useful for a more detailed calculation of the radiation diffused around the window. Finally, the calculation for a near shading device uses a constant percentage of reduction for the diffuse solar radiation. 5.3. Integration into CODYRUN Figure 10 describes the data inputs associated to the West bay window. The dimensions of the elements composing the shade are given in a standard way. Some parts of the data input window are disabled because some of these dimensions are considered infinite (the width of the top flap, for example). Given the importance of the effect of the near shading devices on the incident diffuse around the window (see the preceding method), the percentage of reduction of diffuse is now indicated and taken into account at each step of simulation. B Fig.8. Calculation of the shape factor For the West bay window which concerns us here (see Fig. 3), this approach requires us to find, in the following figure 9, the view factor between the window (coloured grey) and the elements composing the shade (hatched). Fig. 10. Shadow mask data capture window Buildenv12 In the case which interests us, 60% of the incident diffuse radiation on the West wall are blocked by the near shading device before reaching the glass. . MEASUREMENT CODYRUN Temp (°C) 35 34.5 34 33.5 6. New comparison 33 32.5 32 6.1. Comparison of fluxes 31.5 31 30.5 Vert. Glob. Solar -2 Radiation (W.m ) CODYRUN MEASUREMENT 30 1 2 3 4 Time (Day) 250 200 Fig.12. New comparison of the dry air temperature 150 100 50 0 1 2 3 4 Regarding the validation, the new model has allowed us to increase the number of points for which the residual is included within the maximum acceptable error limits, that is -0.5 to +0.5 °C. Time (Day) Fig.11. New comparison of the global solar radiation In the interior, the new model is manifestly better than the old one at calculating the radiation transmitted into the zone. The relative average daily error in the density of transmitted flux has changed from 22% to 4% over the whole period. In particular, the prediction due to the model is much improved during days 4 and 5, which correspond to the periods when the diffuse radiation was dominant (the relative error is reduced from 32% to 1% in days 4 and 5). It should be noted that the model used here to represent the diffuse radiation is known as ‘isotropic’. Other simulations have shown us that, as could be expected, the choice of a non-isotropic model (in which some of the diffuse radiation is directional) modifies slightly the incoming energy contributions. In fact, the direct and diffuse parts of the flux falling on the bay window are respectively reduced by the direct solar factor associated with the shading device and the reduction factor for the diffuse part. Our building model is therefore sensitive to the diffuse radiation reconstitution. 6.2 Comparison of temperatures The variable which interested us most was the dry air temperature in the living room, and the modification of the model led to a better prediction of this temperature (fig. 12). Thus, over the 5 day sequence considered, the average residual changed from about 0.4°C to 0°C, with a standard deviation of about 0.3°C slightly improved (from 0.37 to 0.34). Further, by concentrating the study on one day when the diffuse solar radiation was more important, an even better improvement was observed. Fig.13. New and old residual As the residual curve obtained was nearly always within these limits , the new building model is therefore considered as improved. . Mean -0.04 Std 0.336 We should note however that the method only leads to an improvement in the prediction of the steady state (correction of the mean). It is nevertheless an important step, which has to be completed before moving on to improve the prediction of the dynamic response. 7. Conclusion We have used a step-by-step approach to validate the thermal behaviour of a simulation program. We have seen the advantages of a systematic application of the validation procedure. The sensitivity analysis combined with appropriate sensors has allowed us to highlight the weaknesses of the model for calculating the energy contributions due to diffuse solar radiation from the windows. In the case of experimental validation, sensitivity analysis has once again proved its ability to be a powerful tool for improving simulation models. Buildenv12 Regarding the aspects as basic as the calculation of the solar gains due to the windows, it is noteworthy that the use of computer codes written for an architecturally and climatically different context should be done with care. In conclusion, this paper illustrates that under our tropical climate and for the architectural rules currently applied, an adapted model must be used. [12] S3PAS 1.0, Simulacion de Sistemas Solares Pasivos. Manual de Usuario. Catédra de Termotecnia, ESII, Sevilla, 1988 [13] TRNSYS, A transient system simulation program. Solar Energy Laboratory, University of Wisconsin, Madison, WI (1990) [14] F. Garde, H. Boyer, J.C. Gatina, Demand side REFERENCES [1] A. Lebru, Estimation des irradiations solaires horaires dans un plan quelconque à partir de la donnée de l'irradiation horaire globale (et éventuellement diffuse) horizontale. Cahiers du Centre Scientifique et Technique du Bâtiment, 1983, n°239, Cahier 1847. 39 p. [2] P. Ineichen, R. Perez, R. Seals, The importance of correct albedo determination for adequately modeling energy received by tilted surfaces, Solar Energy, 1987, Vol. 39, n°4. pp. 301-305. [3] P. Ineichen, A. Zelenka, O. Guisan, A. Razafindraibe, Solar radiation transposition models applied to a plane tracking the sun. Solar Energy, 1988, Vol. 41, n°4. pp. 371-377 [4] A.J. Ness., Solution of a thermal network on a digital computer, Solar Energy, 3, 1, 37-37 (1959) [5] B.A. Price, T.F. Smith, Thermal response of composite building envelopes accounting for thermal radiation, Energy Conversion and Management ,36, 1, 23-33 (1995) [6] G. S. Barozzi, R. Grossa., Shading effect of eggcrate devices on vertical windows of arbitrary orientation, Solar Energy, 39, 4, 329-342 (1987) [7] R.E. Jones Jr, Effects of overhang shading of windows having arbitrary azimuth, Solar Energy, 24, 4, 305-312 (1980) [8] D. Caccavelli, Modélisation du comportement thermique des bâtiments multizones : adaptation à un processus de conception. Thèse : Sci. : Institut National des Sciences Appliquées de Lyon, 1988. 477 p. [9] A. Olgyay, V Olgyay, Solar control and shading Design, Wiley, New York (1977) [10] E. Mazria, The passive Solar Energy book. RodalePress, Emmaus, PA (1979) [11] D. York, C. Cappiello, DOE-2 Engineer’s Manual, eds Berkeley, CA : Laurence Berkeley Laboratory, Nov. 1981. management in tropical island buildings. Elaboration of global quality standards for natural and low energy cooling in buildings, Building and Environment, 34 (1998), 1, pp. 71-84 [15] H. Boyer, Conception thermo-aeraulique de batiments multizonzes.proposition d’un outil à choix multiples de modèles. PhD thesis. Institut National des Sciences Appliquées de Lyon, France 1993. [16] H. Boyer, F. Garde, J.C. Gatina J. Brau, A multi model approach of thermal building simulation for design and research approach. Energy and Building, 28, pp. 71-78 (1998) [17] H. Boyer, J.P. Chabriat , B. Grondin Perez, C. Tourrand, J. Brau, Thermal building simulation and computer generation of nodal models, Building and Environment, Vol. 31, n° 3, 1996, pp. 207-214 [18] H. Boyer, A.P. Lauret, L. Adelard, T.A. Mara, Building ventilation : a pressure airflow model computer generation and elements of validation, Energy and Buildings, 29 (1999),pp. 283-292 [20] F. Garde, F. Lucas, H. Boyer, J. Brau. Multiple model approach of a residential heat pump for integration in a building thermal simulation code and comparison with experimental results, Accepted at ASHRAE Transactions, Janv. 2000. [21] T. Soubdhan, T.A. Mara, H. Boyer, A. Younès, use of BESTEST procedure to improve a building thermal simulation program, World Renewable Energy Congress, Brighton, U.H., pp. 1800-1803 Part III, 1-7, July 2000 [22] Energy Design update, April 1996,pp 5-15 (Source: AIVC recent additions to airbase, N° 73, Sept. 96, p.3 [23] K. Lomas, H. Eppel, 1992, Sensitivity analysis techniques for building thermal simulation programs, Energy and Buildings ,Vol. 19, pp. 21-44 [24] J.M. Furbringer., Sensitivity Analysis for modellers, Air Infiltration Review, Vol. 17, n° 4, Sept. 1996. [25] N. Rahni, N. Ramdani, Y. Candau, G. Guyon, Applicatio of group screening to dynamic building Buildenv12 energy simulation models, J. Statist.Comput.Simul, Vol.57, pp.285-304,1997. [26] P. Aude, C. Beghein, P. Depecker, C. Inard, perturbation of the input data of models used for the prediction of turbulent air flow in an enclosure, Numerical Heat Transfer part B, Vol. 34, Issue 2. pp. 139-164. [27] T.A . Mara, F. Garde, H. Boyer, M. Mamode, Empirical Validation of the thermal model of a passive Solar test-cell, submitted at Energy and Buildings, Aug. 2000 [28] N. Ramdani, Y. Candau, S. Dautin, S. Delille, N. Rahni, P. Dalicieux, How to improve building thermal simulation programs by use of spectral analysis, Energy and buildings 25 (1997) 223-242 [29] F.P. Incropera, D.P. DeWitt, Introduction to Heat transfer, 3rd Edition, J. Wiley and Sons, 1996.
5cs.CE
arXiv:1606.01888v2 [math.GR] 6 Feb 2017 IRREDUCIBLE p-CONSTANT CHARACTERS OF FINITE REFLECTION GROUPS MARCO ANTONIO PELLEGRINI Abstract. A complex irreducible character of a finite group G is said to be p-constant, for some prime p dividing the order of G, if it takes constant value at the set of p-singular elements of G. In this paper we classify irreducible pconstant characters for finite reflection groups, nilpotent groups and complete monomial groups. We also propose some conjectures about the structure of the groups admitting such characters. 1. Introduction Let G be a finite group. Fixing a prime p that divides the order of G, we denote by Σp (G) the set of the p-singular elements of G, i.e. the elements whose orders are divisible by p. We say that a (complex) irreducible character χ of G is pconstant if it takes constant value at Σp (G), that is, if there exists a constant cχ such that χ(g) = cχ for all g ∈ Σp (G). By [9, Lemma 2.1], the constant cχ must be a rational integer. It is easy to see that the irreducible characters χ of p-defect zero (i.e. whose degree equals the order of a Sylow p-subgroup of G) are precisely the irreducible p-constant characters with cχ = 0. In view of this, we can look at p-constant characters as a generalization of p-defect zero characters (a different generalization to the reducible case was considered in [8]). In this paper we will always consider the case cχ 6= 0: for future convenience, we denote by Υp (G) the set of the irreducible p-constant characters of G of non-zero p-defect. The problem of classifying irreducible p-constant characters was firstly introduced in [9], where finite quasi-simple groups have been studied. In particular, the following result was obtained. Theorem 1.1. [9, Theorem 1.5] Let G be a finite simple group admitting an irreducible p-constant character χ for some prime p dividing the order of G. Then, one of the following holds: (i) cχ ∈ {0, ±1}; (ii) G = M22 , p = 3, χ(1) = 385 and cχ = −2; (iii) G is a group of Lie type of characteristic r 6= p with a non-cyclic Sylow p-subgroup. In the same paper, also the p-constant characters of the symmetric groups were classified. Starting from that result, in the present paper we study the other finite 2010 Mathematics Subject Classification. 20C15, 20F55, 20D15. Key words and phrases. Coxeter groups; Nilpotent groups; Irreducible characters; p-singular elements; wreath products. This work was supported by the “National Group for Algebraic and Geometric Structures, and their Applications” (GNSAGA-INDAM). 1 2 MARCO ANTONIO PELLEGRINI reflection groups as well as other notable classes of groups as nilpotent groups, direct and wreath products of groups. In Section 2 we prove in particular that any non-linear irreducible p-constant character of a finite nilpotent group must be of p-defect zero. In Section 3 we classify the finite reflection groups admitting p-constant characters proving the following results. Theorem 1.2. Let G be a finite reflection group. Then, for any prime p dividing the order of G and for any χ ∈ Υp (G) we have cχ = ±1. Theorem 1.3. Let G be a finite reflection group. Then, Υ2 (G) 6= {1G} if and only if G is a dihedral group of order 2n with n odd. In this case, Υ2 (G) consists of the two linear characters of G. The classification of p-constant characters for groups of type Bn relies on a combinatorial version of Murnaghan-Nakayama rule given in [7]. The same techniques used here can be also applied for studying endotrivial modules of such groups (as done for symmetric groups in [5]). In Section 4 we present some open problems and conjectures that we hope can attract the interest on this subject. For any odd prime p, we construct a Frobenius group admitting an irreducible p-constant character χ with cχ = 2. We also classify the p-constant characters of PSL3 (q) and PSU3 (q), proving that case (iii) of Theorem 1.1 contains an infinite number of groups. It is worth of observe that by [6, Theorem 6.1] case (iii) may contain only groups whose Sylow p-subgroups have rank ≤ 2, with the possible exceptions of PSL5 (q), PSU5 (q) and E8 (q). Notations. To avoid misunderstanding with the reflection groups, we denote the cyclic group of order n by Cyc(n). By Alt(n) and Sym(n) we mean, respectively, the alternating and the symmetric group of degree n. Given a finite group G and a positive integer n, Gn denotes the direct product of n copies of G. If p is a prime, |G|p denotes the order of a Sylow p-subgroup of G. 2. Linear characters and nilpotent groups Let G be a finite group. Clearly, the principal character 1G of G is p-constant for any prime p dividing the order of G (i.e., 1G ∈ Υp (G) whenever |G|p > 1). More in general, for linear characters we prove the following. Proposition 2.1. Let χ be a linear character of a finite group G. Then, χ is p-constant for some prime p if, and only if, one of the following cases occurs: (i) cχ = +1 and Σp (G) ⊆ ker(χ); (ii) cχ = −1, p = 2 and G = ker(χ) ⋊ hxi, where ker(χ) has odd order and x is an involution. Proof. Since χ is linear, if χ is p-constant then cχ ∈ Z and so cχ = ±1. Clearly, if cχ = 1 then Σp (G) ⊆ ker(χ). If cχ = −1 then p = 2 and ker(χ) has odd order. Working in H = G/ ker(χ), consider the linear character χ̄ induced by χ on H. Since χ̄ is a faithful linear character of H, then H is cyclic, say H = hx̄i. From χ̄(x̄) = −1 we get x̄2 ∈ ker(χ̄) and so |H| = 2. Hence, G = ker(χ) ⋊ hxi for some involution x.  We start our analysis considering finite p-groups and nilpotent groups. We first recall the following result. IRREDUCIBLE p-CONSTANT CHARACTERS OF FINITE REFLECTION GROUPS 3 Lemma 2.2. [9, Lemma 2.2] Let G be a finite group and let 1G 6= χ ∈ Υp (G) for some prime p dividing the order of G. Then, one of the following holds: (i) p does not divide |Z(G)|, Z(G) ≤ ker(χ) and the corresponding character χ̄ of G/Z(G) is an irreducible p-constant character; (ii) p = 2, |G|2 = 2 and G = ker(χ) × O2 (G). As consequence of the previous lemma we get the following. Corollary 2.3. Let p be a prime and let G be a finite p-group. Then Υp (G) 6= {1G } if and only if |G| = p = 2. Proposition 2.4. Let H, K be two finite groups and let G = H ×K. Let χ ∈ Υp (G) for some prime p dividing the order of G. If p divides both |H| and |K|, then χ = 1G . If p divides |H| but does not divide |K|, then χ = ψ ⊗ 1K for some ψ ∈ Υp (H). Proof. Suppose that p divides the order of H. Since G is a direct product of groups, χ = ψ ⊗ ϕ for some ψ ∈ Irr(H) and ϕ ∈ Irr(K). Fix an element h ∈ Σp (H): for any k ∈ K, we have hk ∈ Σp (G) and χ(hk) = ψ(h)ϕ(k) = cχ 6= 0. Hence, ϕ(k) has the same value for all k ∈ K and so ϕ = 1K , i.e. χ = ψ ⊗ 1K . It follows that for any h ∈ Σp (H) we have χ(h) = ψ(h) = cχ , proving that ψ is p-constant with cψ = cχ 6= 0. Now, assume that p also divides the order of K. Proceeding as before, by symmetry we obtain that χ = 1H ⊗ 1K = 1G .  Corollary 2.5. Let G = H × K, where H is a finite p-group and K is a finite r-group for some primes p 6= r. If there exists 1G 6= χ ∈ Υp (G), then p = |H| = 2 and χ = ǫ ⊗ 1K , where ǫ is the non-principal character of H. Proof. By Proposition 2.4, χ = ψ ⊗ 1K for some ψ ∈ Υp (H). Now, since H is a p-group and χ 6= 1G , by Corollary 2.3, we have p = |H| = 2 and ψ = ǫ.  Corollary 2.6. Let G be a finite nilpotent group and let χ ∈ Υp (G). Then χ is linear and either χ = 1G or p = |G|2 = 2. Proof. The result follows from Corollary 2.5, writing G as direct product of its Sylow pi -subgroups.  3. Finite reflection groups In this section we consider finite groups generated by reflections (in real euclidean spaces). We will refer to [2] for construction, properties and notation concerning this class of groups. We recall in particular that the finite reflection groups are precisely the finite Coxeter groups. Completely classified by Coxeter himself, they are direct products of members of four infinite families (An , Bn , Dn , I2 (n)) and six ‘exceptional’ groups (E6 , E7 , E8 , F4 , H3 , H4 ). Therefore, by Proposition 2.4 we may restrict our attention to the ‘irreducible’ finite reflection groups. The p-constant characters of exceptional reflection groups can be classified using the character tables available, for instance, in [1]. In the following proposition, χm denotes the m-th irreducible character, according to the ordering of [1, CTblLib 1.2.2]. Proposition 3.1. Let G be a reflection group of type E6 , E7 , E8 , F4 , H3 or H4 and let 1G 6= χm ∈ Irr(G). Then χm ∈ Υp (G) if and only if one of the following cases occurs: 4 MARCO ANTONIO PELLEGRINI (i) G = E6 , p = 5 and (m, χm (1)) ∈ {(5, 6), (13, 24), (23, 64), (25, 81)}; (ii) G = E7 and p = 5: (m, χm (1)) ∈ {(9, 56), (11, 84), (18, 189), (22, 216)} or p = 7: (m, χm (1)) ∈ {(3, 15), (6, 27), (15, 120), (22, 216), (28, 405), (30, 512)}; (iii) G = E8 , p = 7 and (m, χm (1)) ∈ {(9, 50), (18, 300), (36, 972), (61, 3200), (62, 4096), (66, 6075)}; (iv) G = H3 ∼ = Cyc(2) × Alt(5) and p = 3: (m, χm (1)) ∈ {(4, 4), (5, 5)} or p = 5: (m, χm (1)) = (4, 4). In all these cases we have cχm = ±1. We now consider the four infinite families An , Bn , Dn and I2 (n). Groups of type An are isomorphic to the symmetric group Sym(n + 1). The irreducible characters of Sym(n + 1) are parametrized by the partitions λ of n + 1, see [3]. From [9, Theorem 1.3, Lemma 3.1, Lemma 3.3 and Proposition 3.4] we get the following result. Proposition 3.2. Let G be a group of type An with n ≥ 2. Let χλ be the irreducible character of G associated to the partition λ of (n+1). Suppose that χλ is non-linear of non-zero p-defect. Then, χ is p-constant for some prime p ≤ n + 1 if, and only if, one of the following conditions holds: (i) n = p − 1 ≥ 2 and λ = (b, 1p−b ), where 2 ≤ b ≤ p − 1; (ii) n = p ≥ 3 and λ = (b + 1, 2, 1p−b−2 ), where 1 ≤ b ≤ p − 2; (iii) n + 1 = p + r ≥ 5, 2 ≤ r ≤ p and λ is one of the following partitions (p − a, r + 1, 1a−1 ), 1 ≤ a ≤ p − r − 1; (r, b, 1p−b ), 1 ≤ b ≤ r. In all these cases cχλ = ±1. Applying Lemma 2.1, it is easy to see that the linear character χ(1n ) of Sym(n) is p-constant if and only if n = p, p + 1. Finite reflection groups of type Bn , n ≥ 2, are isomorphic to the wreath products Cyc(2) ≀ Sym(n). We then consider the more general case of wreath products G = H ≀ Sym(n) = H n ⋊ Sym(n), where H is any finite group. The classification of the irreducible p-constant characters of H ≀ Sym(n) (which is sometimes called the complete monomial group) shall be obtained applying the combinatorial version of the Murnaghan-Nakayama rule given in [7]. We recall here some of the basic properties of G with respect to conjugacy classes and irreducible characters. For further details, see [7]. We can think G as the group of the n × n monomial matrices whose entries are elements of H. In particular, if π is the k-cycle (i1 , i2 , . . . , ik ) of Sym(n), we denote by (h1 i1 , h2 i2 , . . . , hk ik ) the permutation matrix corresponding to the cycle π whose entries 1 are replaced by the elements h1 , . . . , hk ∈ H. If C1 = {1}, C2, . . . , Cr are the r conjugacy classes of H, an element (h1 i1 , h2 i2 , . . . , hk ik ) is said to be a Cj -cycle if hk · · · h2 h1 ∈ Cj . If γ = (γ1 , . . . , γt ) is a partition of n, we write γ ⊢ n (or |γ| = n) and ℓ(γ) = t → − for the number γ we denote a r-tuple (γ 1 , . . . , γ r ) of partitions P of iparts of γ. By− → i γ such that i |γ | = n (we use γ ⊢ n to emphasize the integer n). We also allow → that some of the components of − γ can be the empty partition ∅. Then, the set of → − − − conjugacy classes of G is given by {C→ γ is the set of elements of γ : γ ⊢ n}, where C→ G whose Cj -cycles have a cyclic decomposition γ j , for all j = 1, . . . , r. Similarly, we IRREDUCIBLE p-CONSTANT CHARACTERS OF FINITE REFLECTION GROUPS 5 → − → have Irr(G) = {χ γ : − γ ⊢ n}. In particular, the irreducible characters of G obtained → − → by inflation from Irr(Sym(n)) are the characters χ γ , where − γ = (γ, ∅, . . . , ∅) with ((n),∅,...,∅) γ ⊢ n (so, 1G = χ ). → − χ The Murnaghan-Nakayama rule gives the value χ→ − of the irreducible character δ → − → − → − − . Following [7], given γ ⊢ n, we denote by ⋆ γ = χ γ on the conjugacy class C→ δ γ 1 ⋆ . . . ⋆ γ r the skew shape formed by placing the Ferrers diagrams of γ 1 , . . . , γ r corner to corner (the Ferrers diagram of a partition γ is constructed taking γ1 boxes in the first row from the top, γ2 boxes in the second row and so on). Let T be a → − → → ⋆-rim hook tableau of shape − γ and type δ , i.e. a rim hook tableaux of shape ⋆− γ, → − where the lengths of the rim hooks are found in the parts of the components of δ . Let η j,i (T ) be the partition formed by the lengths of the rim hooks of δ j placed in the Ferrers diagram of γ i in T . Set ⋆ω(T ) = sgn(T ) r Y j,i (ψji )ℓ(η (T )) , i,j where ψji is the value of the i-th irreducible character of H on the class Cj (taking ψ 1 = 1H ) and sgn(T ) is the product of the signs of the rim hooks in T (i.e., (−1)t−1 where t is the number of rows occupied by the rim hook). Then X → − γ χ→ ⋆ω(T ), − = δ − → − where the sum runs over all ⋆-rim hook tableaux of shape → γ and type δ . Theorem 3.3. Let H be a finite group. An irreducible character χ of H ≀ Sym(n) of non-zero p-defect is p-constant if and only if p does not divide |H|, H n ≤ ker(χ) and the corresponding character χ̄ of Sym(n) is p-constant. → − Proof. Let χ = χ γ ∈ Υp (G) for some prime p dividing the order of G = H ≀Sym(n). → We want to prove that p ≤ n and − γ = (γ, ∅, . . . , ∅) for some γ ⊢ n. Assume first that p divides the order of H. For any conjugacy class Cj of H → − − , C− → of G, where δj is the contained in Σp (H), consider the conjugacy classes C→ η− j,k δj r-tuple whose unique non-empty component is the partition (n) at j-th position and − → is the r-tuple having only two non-empty components: the partition (n − 1) at ηj,k →, ⊆ − , C− j-th position and the partition (1) at k-th position (j 6= k). Clearly, C→ η− j,k δj → − → − → − Σp (G). Since χ γ is non-zero on δj , then γ has a unique non-empty component, → say at position i: − γ = (∅, . . . , ∅, γ, ∅, . . . , ∅), where γ ⊢ n must be a hook, i.e. → − γ a i γ = (1a , n − a) for some 0 ≤ a ≤ n − 1. Furthermore, χ→ − = (−1) ψj and so the δj character ψ i is a p-constant character of H. Now, suppose 1 ≤ a ≤ n − 2. Then → − γ a−1 i i ψ1 ψj + (−1)a ψ1i ψji = 0, χ− → = (−1) η− j,1 → − → − γ γ n−2 i i n−1 i ψ1 ψj implies ψj = χ− a contradiction. If γ = (1n ), then χ→ → = (−1) − = (−1) η− j,1 δj → − γ i i i that ψ1i = −1 is the degree of ψ i , an absurd. So, γ = (n). We get χ→ − = ψj = ψ1 ψj → − δj γ i i i and so ψ i is linear. Now, χ− → = ψk ψj implies ψk = 1 for all k 6= j. It follows that µ− j,k either ψ i = 1H (and so χ = 1G ) or p = 2 and G = Cyc(2) ≀ Sym(n). 6 MARCO ANTONIO PELLEGRINI → Hence, we may now assume p ≤ n. Our next goal is to prove that − γ has a − defined unique non-empty component. The choice of the conjugacy classes C→ δ → below is functional also for proving Proposition 3.5. Assume that − γ has at least two non-empty components and write n = pk + t with 0 ≤ t < p. If t = 0, take → − γ → − − = 0, a contradiction. It t > 0, α = ((pk), ∅, . . . , ∅). Then C→ − α ⊆ Σp (G), but χ→ α take the classes of p-singular elements of G corresponding to the following r-tuples: − → = ((t, pk), ∅, . . . , ∅) , − → = ((t), (pk), ∅, . . . , ∅) , α α 1 2 → = ((t), ∅, . . . , ∅, (pk)) ; − → = ((t), ∅, (pk), ∅, . . . , ∅) , . . . , − α α r 3 − → − → → − β2 = (∅, (t, pk), ∅, . . . , ∅) , β3 = (∅, ∅, (t, pk), ∅, . . . , ∅) , . . . , βr = (∅, . . . , ∅, (t, pk)) . → − γ → − From χ− → 6= 0 it follows that γ has at most two non-empty components. Then α 1 → − γ has exactly two non-empty components, say in position i and j, that must be hooks of length, respectively, pk and t. For any s = 2, . . . , r we have → − → − γ γ i j i j χ− → = ǫψs ψ1 6= 0, → = ǫψ1 ψ1 = χ− α α s 1 for some ǫ = ±1, and so ψ i = 1H (i.e. i = 1). Now, → − → − j γ γ j χα → = ǫψs − → = ǫψ1 = χ− 1 βs j for all s = 2, . . . , r also implies ψ = 1H and j = 1, a contradiction. → We conclude that − γ has a unique non-empty component, γ ⊢ n at the i-th position. We prove now that actually i = 1. For all s = 2, . . . , r we have → − → − γ γ i i i i χα − → = νψs ψ1 6= 0, − → = νψ1 ψ1 = χα s 1 → for some ν ∈ {±1, ±2}, which implies ψ i = 1H and so − γ = (γ, ∅, . . . , ∅) for some n partition γ of n. As observed before, in this case H ≤ ker(χ) and the corresponding character χ̄ must be a p-constant character of Sym(n). We are left to consider the case when p = 2 divides |H| and χ̄ is a 2-constant character of Sym(n): this happens only when n = 2, 3 and χ̄ is linear. However, G = Cyc(2) ≀ Sym(2) is a 2-group and by Lemma 2.3, χ = 1G . Also G = Cyc(2) ≀ Sym(3) is isomorphic to Cyc(2) × Sym(4) and, by Proposition 2.4, we get χ = 1G .  Corollary 3.4. Let G be a group of type Bn with n ≥ 2. Let χ be an irreducible character of G of non-zero p-defect. Then, χ is p-constant for some prime p ≤ n if and only if p > 2, Cyc(2)n ≤ ker(χ) and the corresponding character χ̄ of Sym(n) is p-constant. The groups Dn are subgroups of index 2 in Bn . Let α, β be partitions of some 0 ≤ t ≤ n such that |α| + |β| = n and let χ(α,β) be the corresponding irreducible character of H = Cyc(2) ≀ Sym(n). If α 6= β, the characters χ(α,β) and χ(β,α) restrict to the same irreducible character of G = Dn . The character χ(α,α) splits (α,α) (α,α) on G as the sum of two irreducible characters χ+ , χ− of G. Furthermore, a class C(α,β) of H belongs to G only if β has even length and a class C(α,β) of H splits into two classes of G if and only if β = ∅ and the parts of α are all even (see [10]). Proposition 3.5. Let G be a group of type Dn with n ≥ 4. Let χ be an irreducible character of G of non-zero p-defect. Then, χ is p-constant for some prime p ≤ n if and only if χ is the restriction to G of an irreducible p-constant character of Bn . IRREDUCIBLE p-CONSTANT CHARACTERS OF FINITE REFLECTION GROUPS 7 Proof. Suppose that χ ∈ Υp (G). Our first goal is to show that χ is the restriction to G of a character χ(α,∅) of H = Bn . So, let χ be the restriction to G of some character χ(α,β) (or one of the two (α,α) characters χ± ). Let n = pk + t with 0 ≤ t < p. If pk and t are not both even, we can prove that β = ∅, arguing as as done proving Theorem 3.3, since the classes C((t,pk),∅) and C(∅,(t,pk)) belong to G. Suppose now that β 6= ∅ and that both pk and t are even. If t ≥ 2, we consider → − → − → → the classes C− η1 , C− η2 of G, where η1 = (∅, (t, pk)) and η2 = ((pk), (1, t − 1)). From (α,β) χ− → η1 6= 0 we get that α, β are both hooks of length, respectively, pk and t and (α,β) (α,β) (α,β) ,a = −χη− 6= 0 we get β = (t) or (1t ). In this case, we have χη− from χ− → → → η2 2 1 contradiction. Now, let t = 0 and n = pk ≥ 4 be even (whence k ≥ 2). Consider the classes → − → − → − − → − , C→ − , where δ1 = (∅, (p, pk − p)) and δ2 = (∅, (n/2, n/2)). Observe that δ1 = δ2 C→ δ δ 1 2 (α,β) if, and only if, n = 2p. From χ→ − δ1 6= 0 we get that α, β are both hooks of length, (α,β) = 0, unless n = 2p. So, respectively, pk − p and p. However in this case, χ→ − δ → 2 − (α,β) − , where δ3 = ((1, p − 1, p), ∅): χ→ suppose n = 2p and take the class C→ = 0, − δ 3 (α,β) δ3 (α,β) always and χ→ unless β = (p) or (1p ). In this case, comparison between χ→ − − δ3 δ2 produces an absurd. We conclude that χ is the irreducible restriction to G of χ(α,∅) for some α ⊢ n. As we already remarked, the characters χ(α,∅) are obtained by inflation from Sym(n). Hence, we are left to exclude that the character χ(α,∅) |G is p-constant, even if the corresponding character χα of Sym(n) is not p-constant. In particular we have to −−→ of p-singular elements of G, such that consider suitable conjugacy classes C− (α,∅) α ⊢ n does not consist of even parts. However, this was already done in the original proof of Proposition 3.2 in [9] and [5], where the conjugacy classes that were analyzed never consist of even parts.  Finally, we consider the dihedral groups I2 (n) of order 2n. A direct check of their character table, that can be found, for instance, in [4], gives the following result. Proposition 3.6. Let G be a group of type I2 (n) with n ≥ 3 and let χ be a nonlinear irreducible character of G of non-zero p-defect. Then, χ is p-constant for some prime p dividing 2n if and only if p = 3 = |G|3 and χ = ψn/3 , in the notation of [4, page 182]. In particular, cχ = −1. Proof of Theorem 1.2. Let G be a finite reflection group. Suppose that 1G 6= χ ∈ Υp (G), for some prime p dividing |G|. Since G can be written as direct product of irreducible reflection groups G = H1 × . . . × Hr , by Proposition 2.4, p divides |Hi | for a Q unique value of i ∈ {1, . . . , r}. Furthermore, χ = ψ ⊗ 1K , where ψ ∈ Υp (Hi ), K = j6=i Hj and cχ = cψ . Now, by Propositions 3.1 and 3.2, cψ = ±1 if Hi is of exceptional type or Hi = Sym(n) for n ≥ 3. If Hi is of type Bn , then ψ is obtained by inflation from a p-constant character of Sym(n) (Corollary 3.4) and so, also in this case, cψ = ±1. Clearly, cψ = ±1 even when Hi is of type Dn (Proposition 3.5). Finally, if Hi is a dihedral group, by Proposition 3.6 we have cψ = −1.  8 MARCO ANTONIO PELLEGRINI Proof of Theorem 1.3. As done proving Theorem 1.2, write G as direct product of irreducible reflection groups G = H1 × . . . × Hr . Since p = 2 divides the order of any Hi , by Proposition 2.4, r = 1. Now, by Propositions 2.4, 2.5 and 3.5 and Corollary 3.4, G must be a dihedral group I2 (n) where n ≥ 1 (I2 (1) ∼ = Cyc(2)). Now, by Proposition 3.6 we obtain that χ must be a linear character of G. Finally, by Proposition 2.1, G has order 2n, where n is odd. The statement follows from the fact that, when n is odd, I2 (n) has only two linear characters.  4. Open problems Our final aim is to characterize the finite groups for which Υp (G) 6= {1G }. From Propositions 2.1 and 2.4 and Lemma 2.2, we are reduced to consider non-linear characters of indecomposable groups with trivial center. The condition cχ = ±1 seems to be too weak for a possible classification. Namely, by Theorem 1.2, the p-constant characters (of non-zero p-defect) of all finite reflection groups have this property. On the other hand, one may focus on p-constant characters χ such that |cχ | > 1. Using [1, SmallGroups], the following conjecture has been verified for all groups of size less than 1250: Conjecture 4.1. Let G be a finite group which admits an irreducible p-constant character χ such that |cχ | > 1. Then p 6= 2 and the Sylow p-subgroups of G are homocyclic. Notice that when cχ = ±1 we can observe a different behavior. For instance, the irreducible character χ of Alt(6) of degree 9 is 2-constant with cχ = +1 and the irreducible character of PSL3 (2) of degree 7 is 2-constant with cχ = −1. However, in both cases the Sylow 2-subgroups are dihedral of order 8. The smallest group that admits an irreducible p-constant character with |cχ | > 1 is obtained taking p = 3 in the following: Lemma 4.2. For any odd prime p, there exists a finite group G admitting an irreducible p-constant character χ with cχ = +2. Proof. For any prime p, take a 2-dimensional space V defined over the field Fp . The group Q8 = {±1, ±i, ±j, ±k} admits an irreducible representation Φ with space of representation V , given by     a b 0 −1 Φ(i) = , Φ(j) = , b −a 1 0 where a, b ∈ Fp are chosen such that a2 + b2 + 1 = 0. Define    1 0 G(p) = : v ∈ V, g ∈ Q8 ∼ = V ⋊ Q8 . v Φ(g) The group Q8 acts on V as a group of fixed-point free automorphisms and so G(p) is a Frobenius group. The elements of G(p) have order {1, 2, 4, p}. The irreducible character χ of G(p) of degree 2, obtained by inflation from Q8 , is p-constant with cχ = +2.  The smallest group that satisfies Conjecture 4.1 with a Sylow p-subgroup which is not elementary abelian is G248,253 whose structure is (Cyc(9) × Cyc(9)) ⋊ Q8 , while the smallest one with a Sylow p-subgroup of rank > 2 is G248,730 whose structure is (Cyc(3) × Cyc(3) × Cyc(3) × Cyc(3)) ⋊ Q8 (here Gn,k denotes the k-th group of size n, according to [1]). In both cases, p = 3 and χ(1) = cχ = +2. IRREDUCIBLE p-CONSTANT CHARACTERS OF FINITE REFLECTION GROUPS 9 The smallest group admitting an irreducible p-constant character with cχ < −1 is M10 (cχ = −2 and χ(1) = 16), while the smallest perfect group with |cχ | > 1 is the following. Example 4.3. Consider the group H = hh1 , h2 , h3 i ≤ SL2 (11), where       3 1 0 1 2 0 h1 = , h2 = , h3 = . 1 −3 −1 0 0 6 The group H is isomorphic to SL2 (5) and acts regularly on V = F211 , hence the group G = V ⋊ H is a Frobenius group with a single class of 11-singular elements. We get that Υ11 (G) = Irr(G). Also, for χ(1) = 1, 2, 3, 4, 5, 6 we obtain cχ = χ(1) and for χ(1) = 120 we get cχ = −1. Clearly the Sylow 11-subgroups of G are elementary abelian of order 112 . Looking at the perfect groups, we can state a stronger version of Conjecture 4.1. Indeed, a direct check on the perfect groups of size < 15360, whose character tables are contained in the package AtlasRep 1.5.0, seems to confirm the following. Conjecture 4.4. Let G be a finite perfect group admitting an irreducible p-constant character χ such that |cχ | > 1. Then p = 3, cχ = ±2 and the Sylow 3-subgroups of G are isomorphic to Cyc(3) × Cyc(3). Notice that the only simple sporadic group admitting irreducible p-constant characters with cχ = ±2 is the Mathieu group M22 , that satisfies Conjecture 4.4. The other known simple groups satisfying Conjecture 4.4 are the groups PSL3 (q) when gcd(q − 1, 9) = 3 and PSU3 (q) when gcd(q + 1, 9) = 3. Indeed, in these cases, the Sylow 3-subgroups are isomorphic to Cyc(3) × Cyc(3) and using the character tables described in [11] we may prove that following. Proposition 4.5. Let G ∈ {PSL3 (q), PSU3 (q)} and let r be a prime dividing |G| such that gcd(r, q) = 1. Let δ = +1 if G = PSL3 (q), δ = −1 if G = PSU3 (q). Set d = gcd(q − δ, 3). Then 1G 6= χ ∈ Υr (G) if and only if one of the following holds: (i) r divides (q 2 + δq + 1)/d and (a) χ(1) = q 2 + δq: in this case cχ = −1; (b) χ(1) = q 3 : in this case cχ = δ. (ii) 2 6= r divides (q + δ) and (a) χ(1) = q 3 : in this case cχ = −δ; (b) d = 1, gcd(q + δ, 9) = r = 3 and χ(1) = q 3 − δ: in this case cχ = δ. (iii) d = r = gcd(q − δ, 9) = 3 and (a) χ(1) = q 2 + δq: in this case cχ = +2; (b) χ(1) = q 3 : in this case cχ = δ; 2 (c) χ(1) = (q+δ)(q 3+δq+1) : in this case cχ = −δ. References [1] The GAP Group, GAP – Groups, Algorithms, and Programming, Version 4.6.4 of 4 May 2013, (http://www.gap-system.org). [2] J.E. Humphreys, Reflection groups and Coxeter groups, Cambridge Studies in Advanced Mathematics, 29. Cambridge University Press, Cambridge, 1990. [3] G. James and A. Kerber, The representation theory of the symmetric group, Encyclopedia of Mathematics and its Applications, 16. Addison-Wesley Publishing Co., Reading, Mass., 1981. 10 MARCO ANTONIO PELLEGRINI [4] G. James and M. Liebeck, Representations and characters of groups, Cambridge Mathematical Textbooks. Cambridge University Press, Cambridge, 1993. [5] C. Lassueur, G. Malle and E. Schulte, Simple endotrivial modules for quasi-simple groups, J. reine angew. Math. 712 (2016), 141–174. [6] F. Lübeck and G. Malle, A Murnaghan-Nakayama rule for values of unipotent characters in classical groups, Represent. Theory 20 (2016), 139–161. [7] A. Mendes, J. Remmel and J. Wagner, A λ-ring Frobenius characteristic for G ≀ Sn , Electron. J. Combin. 11 (2004), no. 1, Research Paper 56, 33 pp. [8] M.A. Pellegrini and A.E. Zalesski, On characters of Chevalley groups vanishing at the nonsemisimple elements, Internat. J. Algebra Comput. 26 (2016), 789–841. [9] M.A. Pellegrini and A. Zalesski, Irreducible characters of finite simple groups constant at the p-singular elements, Rend. Semin. Mat. Univ. Padova 136 (2016), 35–50. [10] G. Pfeiffer, Character tables of Weyl groups in GAP, Bayreuth. Math. Schr. 47 (1994), 165– 222. [11] W.A. Simpson, J.S. Frame, The character tables for SL(3, q), SU(3, q 2 ), PSL(3, q), PSU(3, q 2 ), Canad. J. Math. 25 (1973), 486–494. Dipartimento di Matematica e Fisica, Università Cattolica del Sacro Cuore, Via Musei 41, 25121 Brescia, Italy E-mail address: [email protected]
4math.GR
A SHM method for detecting damage with incomplete observations based on VARX modelling and Granger causality 1 U. Ugalde1, J. Anduaga1, F. Martínez1 and A. Iturrospe2 1 2 Department of Sensors, IK4-Ikerlan, Mondragon, Spain ([email protected]) Department of Electronics and Computer Sciences, Mondragon Goi Eskola Politeknikoa, Mondragon, Spain Abstract—A SHM method is proposed that minimises the required number of sensors for detecting damage. The damage detection method consists of two steps. In an initial characterization step, substructuring approach is applied to the healthy structure in order to isolate the substructures of interest and later, each substructure is identified by a Vector Auto-Regressive with eXogenous inputs (VARX) model measuring all DOFs. Then, pairwise conditional Granger causality analysis is carried out with data measured from substructural DOFs to evaluate the information loss when measurements from all DOFs are not available. This analysis allows selecting those accelerometers that can be suppressed minimising the information loss. In the evaluation phase, vibration data from the reduced set of sensors is compared to the estimated data obtained from the healthy substructure’s VARX model, and as a result a damage indicator is computed. The proposed detection method is validated by finite element simulations in a lattice structure model. 1 INTRODUCTION Structural Health Monitoring (SHM) is a technological area which implements a damage detection and characterization strategies for engineering structures [1]. SHM is regarded as a very important engineering field in order to secure structural and operational safety; issuing early warnings on damage or deterioration, avoiding costly repairs or even catastrophic collapses [2]. Most of the existing vibration based SHM methods can be classified into two different approaches: global approaches and local approaches [3]. In the global approaches, the goal is to monitor the health of the entire structure. These global methods have been tested and implemented in different types of structures during the last 30-40 years [4]. However, for many large systems, global monitoring is not viable due to the lack of sensitivity of global features regarding local damages, inaccuracies of developed models, high cost of the computational operations etc [5]. On the other hand, local SHM methods are focused on evaluating the state of reduced parts within the entire structures by means of substructuring methods. This approach aims to overcome global method’s limitations, dividing the whole structure into substructures and analysing each one individually. Several papers have been published proposing substructuring methods for large scale structures. Koh et al [6] presented a “divide and conquer” strategy to monitor large structures based on the division of the whole structure into isolated substructures. For each substructure, structural parameters are identified using the extended Kalman filter (EKF). However, the EKF usually requires a prior analytical model, which is not always available [7]. Most recently, Xing et al [8] proposed another damage detection method using Auto-Regressive Moving Average with eXogenous input (ARMAX) 1 models. The method is based on the extraction of natural frequencies from the ARMAX models and in their posterior analysis. Nonetheless it is preferably applicable to small and simple structures. The authors of this article proposed in [9] a damage localization method based on the substructuring approach and Vector Auto-Regressive with eXogenous input (VARX) models. VARX models incorporate data from multiple DOFs and the method allows locating and quantifying damages within larger substructures. It is necessary to measure all substructural DOFs and consequently the amount of sensors that must be placed remain too high. In general, if the number of sensors placed on a structure increases, the obtained information is more detailed. However, the high cost of data acquisition systems and accessibility limitations constrain in many cases the use of large number of sensors on a structure. Optimal sensor placement (OPS) methods aims to select a set of minimum number of sensors from all possibilities, such that the data collected can provide adequate information for the identification of the structural behaviour [10]. Different criteria can be used to evaluate the suitability of sensor locations, such as modal assurance criterion (MAC), measured energy per mode, information entropy (IE) or mutual information (MI). Krammer [11] proposed an optimal sensor placement method based on modal properties. The measured mode shape vectors must be as linearly independent as possible in order to distinguish the measured or identified modes. MAC based sensor optimization methods aim to select points from all candidates to keep the original properties of the structure as well as it is possible. Measured energy per mode criterion based OPS methods chooses those sensor positions with large amplitudes, which is critical in harsh and noisy circumstances. Heo et al. [12] focused on a kinetic energy to determine the optimal sensor placement on a long span bridge. The two methods mentioned above are generally used when an analytical model (FEM) of the monitored structure is available. Nevertheless, if only experimental measurements are available, methods like the ones that are based on mutual information or information entropy can be used. The mutual information (MI) of two random variables gives a measure of the mutual dependence between them and quantifies the “amount of information” obtained about one variable through the other variable. The optimal sensor locations can be obtained analysing which configuration gives the minimal mutual information values between sensors [13]. In SHM, it is desirable to design a certain sensor placement configuration that assures the measurement of representative data about the structural model parameters. The information entropy, as the measure of the uncertainty in the system parameters, gives the amount of useful information in the measured data. Information entropy theory is used to select the most informative sensors [14][15]. Granger causality (G-causality) is a statistical concept broadly applied in other scientific fields like neuroscience [16], climatology [17] or econometrics [18] with the purpose of analyse the causality among different time series. As mutual information and information entropy, does not require an analytical model and it is based on auto-regressive models. In this paper, a SHM method is proposed for detecting damage with incomplete observations. Substructuring approach and VARX modelling are used to isolate and identify the healthy substructure. Pairwise conditional Granger causality analysis is carried out with data from all substructural DOFs to determinate which variables are the most proper ones to be observed. Damage is detected using the healthy VARX model and the data measured from the selected nodes. The rest of the paper is organised as follows. In section 2, the proposed method is presented. In section 3, the method is evaluated by series of simulations and the obtained results are discussed. Finally the concluding remarks are exposed in section 4. 2 THE PROPOSED METHOD A SHM method is proposed for detecting damage with incomplete observations. The substructuring approach is applied to isolate multi-DOF substructures from the healthy structure and each substructure is modelled by a corresponding VARX model as in [9]. In the healthy condition all DOFs of the substructure are measured and pairwise conditional Granger causality analysis is carried out with the data in order to determine which variables can be suppressed assuring the minimum worsening as it is possible. During the evaluation phase, a reduced set of data is measured again and by means of the healthy substructure’s VARX model the condition of the substructure is evaluated. 2 2.1. Substructure pairwise conditional Granger causality analysis Granger causality analysis measures the causal influence between stochastic processes and determines also the functional connectivity between them [19]. Traditionally, Granger causality analysis has been carried out between two stochastic processes. Assuming two jointly distributed stochastic processes (X=X1,X2…Xn and Y=Y1,Y2...Yn ) it is said that Y does not cause X (according to Granger) if X is only conditioned by its own past and therefore, X is independent of the past of Y. Otherwise, if the past of Y contains information about the future of X, it is said that Y causes X according to Granger. More recently Barnett and Seth [20] developed a Multivariate Granger Causality (MVGC) toolbox, where time and frequency domain based multivariate G-causality approaches are available. Within time domain multivariate G-causality approaches, pairwise conditional Granger causality is one of the most popular ones. In pairwise conditional G-causality, it is supposed that the universe U is splits into three jointly distributed processes (X, Y, Z): X   U Y  Z   (1) The analysis wishes to eliminate any joint effect of Z on the inference of Granger causality from Y to X. Full and reduced VAR models are estimated from the multivariate processes and as is shown in equation 2 and 3, the difference between them is that variable Y is not included in the reduced model: p p p k 1 k 1 k 1 (2) X n   Axx,k X nk   Axy ,k Ynk   Axz ,k Z nk   x ,n p p k 1 k 1 (3) X n   Axx ,k X nk   Axz ,k Z n k   x,n A and A’ matrices correspond to the coefficients of the full and reduced VAR models, whereas residuals of both models. Furthermore, p is the model order.  and   are the The causality from Y to X conditioned on Z (FY  X|Z) is stated as: | ' FY  X |Z  ln | xx | (4) xx | where  xx and xx are the covariance matrices of the residuals of the full and reduced VAR models. Figure 1 describes the proposed method for the selection of a certain substructural variable from a set of variables for its posterior suppression. In this method a G-causality value from each substructural variable to the whole set of substructural variables is analysed by a pairwise conditional G-causality approach. MVGC toolbox [20] is adapted to carry out the analyses. The first step is the measurement of the displacements from the substructure (U). Once U is measured, it is split into X, Y and Z variables. X contains the displacement data that must be estimated, Y contains the variables that their causality will be analysed and Z holds the rest of measurements. As it is shown in figure 1, different variables are assigned to X, Y and Z in each iteration and the corresponding individual causality value (FY  X|Z) is calculated. When all combinations have been analysed, the individual causality values that are calculated setting the same variable in Y are added together in order to obtain a general causality value (FG Y  X|Z) for each variable. 3 The suppression of the variables with the lowest general causality values (FG Y  X|Z) cause the minimum worsening in the VAR model, so these variables are the most appropriate ones to be suppressed. Figure 1. Selection of variables for their suppression –flow chart 2.2. Substructure damage detection with incomplete observations A SHM method that aims to detect damages within substructures by means of incomplete measurements is described in this section. The method evaluates the condition of the structure using the VARX model of the healthy substructure and a set of variables that have been selected applying the approach described in the previous section. We assume that the monitored substructure can be represented by the VARX model of equation 5. The VARX model contains n endogenous variables (y) and m exogenous variables (x), whereas p and q are the endogenous and exogenous model orders. Ai and Bi are endogenous and exogenous coefficient matrices. We also assume that variable y1 has been selected to be suppressed, so it is not measured never again during the evaluation phase. Thus, y2…yn and x1, x2… xm are the measured displacements from the substructure, whereas yˆ1 , yˆ2 ... yˆn are the estimated displacement data.  yˆ1 (k )   yˆ1 (k  1)   yˆ1 (k  2)   yˆ1 ( k  p)   yˆ (k )   y (k  1)   y (k  2)     2 A 2  A  2   ...  A  y2 ( k  p)   1 2 p  ...   ...      ... ...          yˆ n (k )   yn (k  1)   yn (k  2)   yn ( k  p )   x1 (k  1)   x1 (k  2)   x1 (k  q )   x (k  1)   x (k  2)    2 B  2   ...  B  x2 (k  q )   B1  2 q  ...   ...   ...         xm (k  1)   xm (k  2)   xm (k  q )  4 (5) As it is shown in equation 5, the displacement data corresponding to the endogenous variables at time instant k is estimated combining the VARX model and the measured and estimated variables (if it corresponds to the suppressed variable) at previous time instants. This process is carried out repeatedly from k equal to p until k equal to N+p in order to estimate N samples of the endogenous variables yˆ1 , yˆ 2 ... yˆ n . Once the total displacement data have been estimated, a damage indicator (DI) is computed as in equation 6. This damage indicator is obtained as the total mean deviation between the measured endogenous variables and their corresponding estimated values: M N (6) DI   ( | yˆ k 1 i 1 ki  y ki |) M *N N represents the amount of estimated samples for each endogenous variable and M represents the amount of measured variables. Taking into account the assumptions that we have made during this section, the measured endogenous variables are (y2…yn) and their corresponding estimated values are ( yˆ 2 ... yˆ n ), so M is equal to n-1. 3 NUMERICAL RESULTS A linear and time invariant two-dimensional lattice structure is monitored in this section (see figure 2). The structure consists of stainless steel bars that are connected together by rigid joints and we assume that the forces can only be transmitted along the axial direction of the bars and the load can only be applied at the two ends of each bar. The structural behaviour is described by a lumped parameter model, where we assume that all object are rigid bodies and all interactions between the rigid bodies take place via springs. As is shown in figure 2, a ten DOFs substructure is selected from the entire structure for its monitoring. Figure 2. Isolated substructure in the structural model The healthy structure is excited in the third mass (outside the substructure) by a Gaussian white noise and the displacements are measured for each substructure DOF using a data sampling frequency of 1000 Hz during 2 seconds. By means of the substructuring method explained in [9], the selected substructure is isolated from the general structure. The isolated substructure is represented as a four exogenous and six endogenous variables VARX model. The exogenous variables are the measured absolute displacements in z4x, z4y, z5x and z5y and the endogenous variables are the measured absolute displacement in z6x, z6y, z7x, z7y, z8x and z8y. On the other hand, A1 and A2 are 6 x 6 endogenous coefficient matrices and B1 is a 6 x 4 exogenous coefficient matrix. The healthy VARX model is estimated by the Multivariate Least-Square estimator (MLS) [21]. 5  z6 x z  6y  z7 x   z7 y  z8 x   z8 y (k )   z6 x  z (k )   6y   z7 x (k )   A1  (k )   z7 y  z8 x (k )    (k )   z8 y (k  1)   z6 x  z (k  1)   6y   z7 x (k  1)   A2  (k  1)   z7 y  z8 x (k  1)    ( k  1)   z8 y ( k  2)  (7) ( k  2)   z4 x (k  1)    z (k  1)  ( k  2)  4y    B1   z5 x (k  1)  ( k  2)    ( k  2)  z5 y (k  1)    ( k  2)  3.1. Substructure pairwise conditional Granger causality analysis The pairwise conditional Granger causality analysis between all measured substructural DOFs (healthy state) is done in this section in order to determine which are the most appropriate ones to be suppressed. The bidirectional displacement data corresponding to each endogenous node is assigned to an individual data set. The first data set contains displacement data from node 6 (z6x, z6y), the second data set contains the displacement data from node 7 (z7x, z7y) and the last data set is formed by displacement data from node 8 (z8x, z8y). Once the data sets are defined, an individual pairwise conditional Granger causality analysis is carried out between them as is explained in section 2. As is shown in table 1, six combinations are analysed individually and their respective individual G-causality value (FY  X|Z) is calculated. Table 1. Substructure’s individual pairwise conditional Granger causality analysis FY  X|Z X Y Z z7 x , z7 y z6 x , z6 y z8 x , z8 y 1.22e z8 x , z8 y z6 x , z6 y z7 x , z7 y 1.26e z6 x , z6 y z7 x , z7 y z8 x , z8 y 8.52e z8 x , z8 y z7 x , z7 y z6 x , z6 y 1.06e z6 x , z6 y z8 x , z8 y z7 x , z7 y 8.67e z7 x , z7 y z8 x , z8 y z6 x , z6 y 1.09e 2 2 3 2 3 2 The individual G-causality values that are calculated assigning the same data set to Y are added together in order to obtain a general causality value (FG Y  X|Z) for each set of displacements. The result is shown in table 2. Table 2. Substructure’s global pairwise conditional Granger causality analysis FG Y  X|Z Y z6 x , z6 y 2.480e z7 x , z7 y 1.912e z8 x , z8 y 1.957e 2 2 2 The set that contains displacement data of node 6 has the higher global G-causality value, whereas data sets corresponding to nodes 7 and 8 have similar values between them, but significantly lower than the previous case. Therefore, data from node 6 (z6x, z6y) is the least appropriate to be suppressed. 6 3.2. Substructure damage detection with incomplete observations Different scenarios (healthy and damaged) are assessed by the developed SHM method. All considered damages are stiffness losses of a specific spring (20%) within the structure. Furthermore, three different damage locations are evaluated. In some of them, the damaged springs are within the substructure (k6,7 and k7,8) and in the others, they correspond to external springs (k1,3). As in the healthy state, the damaged structures are excited in the third mass (outside the substructure) by a Gaussian white noise. The displacements are measured for all substructural DOFs using a data sampling frequency of 1000 Hz during 2 seconds. Granger causality analysis has determined that displacement data from nodes 7 or 8, even both, are appropriate to be suppressed. Therefore, the condition of the simulated scenarios is evaluated by the developed damage detection method suppressing firstly data from node 7, secondly data from node 8 and finally displacement data from nodes 7 and 8. Although a particular case (suppression of data from nodes 7 and 8) is described below, the steps that must be followed are equals in the other two cases. These steps are summarised in figure 1. The displacement data of the endogenous variables ( zˆ6 x , zˆ6 y , zˆ7 x , zˆ7 y , zˆ8 x , zˆ8 y ) at time instant k is estimated combining the healthy VARX model (A1, A2, B1) and the measured (z4x, z4y, z5x, z5y, z6x, z6y) and estimated ( zˆ7 x , zˆ7 y , zˆ8 x , zˆ8 y ) variables at previous time instants. This process is carried out repeatedly from k equal to 2 until 2002 in order to estimate 2000 samples of the endogenous variables.  zˆ6 x  zˆ  6y  zˆ7 x   zˆ7 y  zˆ8 x   zˆ8 y (k )   z6 x  z (k )   6y  zˆ7 x (k )     A1  (k )   zˆ7 y  zˆ8 x (k )    (k )   zˆ8 y (k  1)   z6 x  z (k  1)   6y  zˆ7 x (k  1)    A2  (k  1)   zˆ7 y  zˆ8 x (k  1)    ( k  1)   zˆ8 y (k  2)  (8) (k  2)   z4 x (k  1)    z (k  1)  (k  2)  4y    B1   z5 x (k  1)  (k  2)    (k  2)  z5 y (k  1)    (k  2)  Once the total displacement data ( zˆ6 x , zˆ6 y , zˆ7 x , zˆ7 y , zˆ8 x , zˆ8 y ) have been estimated, a damage indicator (DI) is computed as in equation 6. This damage indicator is obtained as the total mean deviation between the measured endogenous variables (z6x, z6y) and their corresponding estimated values ( zˆ6 x , zˆ6 y ). Figure 3 shows the obtained results for three kinds of scenarios; healthy (a), damage out of the substructure (b) and damage within substructure (c). Blue and green bars represent the DI values when data from node 7 or node 8 is suppressed respectively, whereas the results obtained suppressing the data from both nodes is depicted by brown bars. (a) (b) Figure 3. Calculated DI values for the simulated scenarios 7 (c) Regarding to the results, when the whole structure is healthy or when the damage is introduced out of the substructure (reducing k1,3), the calculated DI values are always almost zero. On the other hand, if the damages are introduced within the substructure (k6,7 and k7,8) the DI values are much higher than in the previous cases. Besides, the mentioned conclusions are valid even thought data from the two nodes is suppressed. Figure 3 shows that the DI values are practically the same if k7,8 is reduced and z7 and z8 are suppressed individually. However, if k6,7 is modified, the corresponding DI values are different. This fact is related to the position of the damaged element, because k7,8 correspond to a spring situated between node 7 and node 8, whereas k6,7 has more influence in node 7 than in node 8. 4 CONCLUSIONS This paper proposes a SHM method to detect damages within substructures using incomplete measurements. In the characterization step, which corresponds to the healthy state, the displacements from all substructural nodes are measured and the corresponding VARX model is estimated. Furthermore, pairwise conditional Granger causality analysis is carried out with the measured data in order to select which displacement data is the most appropriate to be suppressed. In the evaluation phase, the healthy VARX model and the displacement data measured from the selected nodes are used to determine the condition of the substructure. A linear and time invariant model of a two-dimensional lattice structure is simulated to validate the proposed method. The results show that the method allows detecting damages within substructures using a unique accelerometer. The proposed method is also suited for three dimensional lattice structures, where the number of element’s connections increases. Our research group is already applying this method in a real structure and the results will be published soon. 5 ACKNOWLEDGEMENT This study is partially funded by the Ministry of Economy and Competitiveness of the Spanish Government (WINTURCON project, DPI2014-58427-C2-2-R). Any opinions, findings and conclusions expressed in this article are those of the authors and do not necessarily reflect the views of the funding agency. REFERENCES [1]J. Ko and Y. Ni, "Technology developments in structural health monitoring of large-scale bridges," Engineering structures, vol. 27, pp. 1715-1725, 2005. [2]A. Mita, "Structural dynamics for health monitoring," Sankeisha Co., Ltd, Nagoya, vol. 114, 2003. [3]L. Jankowski, Lukasz and I. P. P. o. Techniki, Dynamic load identification for structural health monitoring: Institute of Fundamental Technological Research Polish Academy of Sciences, 2013. [4]S. W. Doebling, C. R. Farrar, M. B. Prime, and others, "A summary review of vibration-based damage identification methods," Shock and vibration digest, vol. 30, pp. 91-105, 1998. [5]J. Hou, L. Jankowski, Lukasz, and J. Ou, "Structural damage identification by adding virtual masses," Structural and Multidisciplinary Optimization, vol. 48, pp. 59-72, 2013. [6]C. G. Koh, L. M. See, and T. Balendra, "Estimation of structural parameters in time domain: a substructure approach," Earthquake Engineering \& Structural Dynamics, vol. 20, pp. 787-801, 1991. [7]A. W. Oreta and T.a. Tanabe, "Element identification of member properties of framed structures," Journal of Structural Engineering, vol. 120, pp. 1961-1976, 1994. [8]Z. Xing and A. Mita, "A substructure approach to local damage detection of shear structure," Structural Control and Health Monitoring, vol. 19, pp. 309-318, 2012. [9]U. Ugalde, J. Anduaga, Martínez, F, and A. Iturrospe, "Novel SHM method to locate damages in substructures based on VARX models," in Journal of Physics: Conference Series, 2015, p. 012013. 8 [10]T.-H. Yi and H.-N. Li, "Methodology developments in sensor placement for health monitoring of civil infrastructures," International Journal of Distributed Sensor Networks, vol. 2012, 2012. [11]D. C. Kammer, "Sensor placement for on-orbit modal identification and correlation of large space structures," Journal of Guidance, Control, and Dynamics, vol. 14, pp. 251-259, 1991. [12]G. Heo, M. Wang, and D. Satpathi, "Optimal transducer placement for health monitoring of long span bridge," Soil Dynamics and Earthquake Engineering, vol. 16, pp. 495-502, 1997. [13] R. J. Barthorpe and K. Worden, " Sensor Placement Optimization for Structural Health Monitoring, Encyclopedia of Structural Health Monitoring, John Wiley & Sons, New York, NY, USA, 2009. [14]C. Papadimitriou, J. L. Beck, and S.-K. Au, "Entropy-based optimal sensor location for structural model updating," Journal of Vibration and Control, vol. 6, pp. 781-800, 2000. [15]K.-V. Yuen, L. S. Katafygiotis, C. Papadimitriou, and N. C. Mickleborough, "Optimal sensor placement methodology for identification with unmeasured excitation," Journal of dynamic systems, measurement, and control, vol. 123, pp. 677-686, 2001. [16]A. K. Seth, A. B. Barrett, and L. Barnett, "Granger Causality Analysis in Neuroscience and Neuroimaging," The Journal of Neuroscience, vol. 35, pp. 3293-3297, 2015. [17]T. J. Mosedale, D. B. Stephenson, M. Collins, and T. C. Mills, "Granger causality of coupled climate processes: Ocean feedback on the North Atlantic Oscillation," Journal of Climate, vol. 19, pp. 1182-1194, 2006. [18]S. N. Sulku, "Causality Relation between Real Exchange Series and Emerging Stock Markets: Panel Common Factor Analysis," Journal of Applied Economics \& Business Research, vol. 1, 2011. [19]L. Barnett and A. K. Seth, "Granger causality for state-space models," Physical Review E, vol. 91, p. 040101, 2015. [20]L. Barnett and A. K. Seth, "The MVGC multivariate Granger causality toolbox: a new approach to Granger-causal inference," Journal of neuroscience methods, vol. 223, pp. 50-68, 2014. [21] H. Lutkepohl, "New introduction to multiple time series analysis: Springer, 2007". 9
3cs.SY
Intelligent Information Systems Proceedings of a Workshop held in Augustów, Poland, 7-11 June, 1993 arXiv:1705.08440v1 [cs.AI] 23 May 2017 pages 210- 238 Knowledge Acquisition, Representation & Manipulation in Decision Support Systems M.Michalewicz, S.T.Wierzchoń, M.A. Klopotek Institute of Computer Science Polish Academy of Sciences 01-237 Warsaw, ul. Ordona 21, Poland e-mail: [email protected] Abstract. In this paper we present a methodology and discuss some implementation issues for a project on statistical/expert approach to data analysis and knowledge acquisition. We discuss some general assumptions underlying the project. Further, the requirements for a user-friendly computer assistant are specified along with the nature of tools aiding the researcher. Next we show some aspects of belief network approach and Dempster-Shafer (DST) methodology introduced in practice to system SEAD. Specifically we present the application of DS methodology to belief revision problem. Further a concept of an interface to probabilistic and DS belief networks enabling a user to understand the communication with a belief network based reasoning system is presented 1 Introduction A statistical database is a collection of aggregated information at a given time. The purpose of such database is to derive or infer facts; statistics is helpful in extracting patterns from quantative (and qualitative) data [6]. Data are analysed to extract information and the result of such analysis must be validated to increase our knowledge about modeled domain. KNOWLEDGE ACQUISITION, REPRESENTATION & MANIPULATION 211 Several statistical packages (e.g. MINITAB SAS) are used for such statistical analysis of data. However, they do not inform the user about underlying assumptions, seldom warn against obvious misuse, do not provide guidance in the process of analysis, and hardly assist in the interpretation of the results [8]. Clearly, there is a need for statistical expert systems [11], [14], [15], [16], which would include the statistical expertise. In [17] the authors provide a general characteristic of statistical expert systems. They wrote: “As statistical expert system is a computer program which can act in the role of expert statistical consultant. That is, it can give expert advice on how to design a study, what data should be collected to answer the research question, and how to analyse the data. Moreover, since the fundamental tool of statistical analysis is the computer, on which the expert system will be run, it is normally envisaged that the expert system and data analysis routines will be an integrated whole. thus, not only does the system advise on the analysis, but it also actually carries it out, discussing the results and the direction of further analyses with the user.” In this paper we deal with some aspects of creative data analysis. In particular we are interested in applications of AI techniques for development of a software environment which would allow to process both data and knowledge; such software should provide an easy interface for formulating hypotheses and their statistical verification. The paper is organized as follows. The next section discusses the architecture of a creative data analysis system. Section 3 presents knowledge acquisition strategies. Section 4 introduces some aspects of new version of SEAD System, based on belief network approach and DST. Section 5 is devoted to DS methodology: after describing the nature of evidential reasoning we present mathematics of evidential resoning and next details of the message propagation algorithm is introduced and its application to belief revision is presented. In Section 6 a user interface to belief network is described. 2 Data Analysis System Information systems are designed for storing and manipulating data (from some domain) and for drawing conclusions when a problem from that domain is formulated. Clearly, this is of value insofar as the data are meaningful and the domain formalization is sufficiently adequate. There are at least two main categories of such systems, termed tentatively standard decision aid tools (like statistical systems, pattern recognition programs, etc. and knowledge based systems. Although proven to be useful, systems of both categories suffer from some drawbacks limiting their applicability. 212 M.MICHALEWICZ, S.T.WIERZCHOŃ, M.A. KlOPOTEK The main disadvantage of systems from the first category is that a user is forced to (1) formulate his (her) problem in a formal language, (2) check the input data validity, and (3) translate solutions produced by the system to the language appropriate for a given domain. In fact, to solve real-life problems the user must cooperate with professional task analyzer. When developing knowledge based systems an important obstacle concerning knowledge acquisition emerges. Knowledge bases generated by experts in different areas remain incomplete, subjective and even contradictory. Additional difficulties arise in cases where there is a need for processing data and knowledge simultanously. In both categories of systems the process of hypotheses generation is left to the user. The above approaches, considered separately, are especially inefficient when formalizing poorly recognized domains or domains with large amount of vagueness. In case of medical diagnosis, for instance, although the characteristics of certain diseases are fixed, the formal relationships among symptoms and diseases are hard to determine and serious difficulties in formulating scientific hypotheses may occur. To formalize such domains one must combine data, partial knowledge and tentative hypotheses. In summary, an effective information system must provide the following features: data storing, knowledge acquisition and manipulation, automated generation of hypotheses, performing standard statistical analyses, including tests of research hypotheses, and easy communication between the knowledge base and database. Such experimental information system (called SEAD for Statistical and Expert system for Analysis of Data) was recently implemented in the Institute of Computer Science, Polish Academy of Sciences [26]. The system architecture reflects a typical understanding of the notion of science according which science is viewed as a progressive development of theoretical generalizations of observations and experiments leading to new observations and new experiments. So, scientific research means permanent moving within the cycle “observation – generalization – theory – application – observation”. Various tools have been developed to support a researcher in different parts of his cycle, including tools supporting storing observations and experiments (data base systems) and storing the acquired theoretical generalizations (knowledge base systems). Also the tools supporting the knowledge acquisition are included, such as the ability to generalize over a data base (statistical data analysis systems and numerous “learning from examples” systems), tools allowing verification against new incoming experiments results in the data base (statistical analysis systems), or against new single cases (expert systems). These tools are placed in specialized submodules, which are the main components of the system: data base system, knowledge base system, expert system, knowledge acquisition and verification tools. The main feature of this system is implementation of all four components into one KNOWLEDGE ACQUISITION, REPRESENTATION & MANIPULATION 213 organism, whose heart is DB pumping and absorbing data. Such a solution (based on unified data formats and unified access methods) results in a research tool of quite new and unique quality. The user can also employ each system’s component as an independent unit or (s)he can add his (her) own modules. 3 Knowledge Acquisition Strategies The completion of knowledge base by human experts is a bottleneck in the process developing an expert systems. Usually, experts engaged in the process are excessively cautious (especially when dealing with poorly recognized domains), they use different semantics (often with vague and ambiguous notions) that results in a extremely long completion period without any warrant that the set of rules is complete and that it doesn’t contain contradictory assertions. Another question concerns rules validity. According to methodological considerations, to refine a rule we search for so-called idealizing law (being the heart of the rule) first, and next we release systematically simplifying assumptions. Of course, such a process must be stopped at a reasonable time, and since some assumptions still remain hidden, the rule in its symbolic version is valid to some extent only. Hence we may address two questions: – were the most important assumptions embodied into the rule?, and – how to estimate the degree of validity of such rule? To answer these questions and to optimize the knowledge acquisition process a number of tools have been developed in the SEAD system. These tools can be divided into two categories described in sections 3.1 and 3.2. 3.1 Passive user If certain aspect of the problem under the considerations is either ill-recognized or the knowledge about it is too general, some data preprocessing might be necessary. the aim of such preprocessing is to generate tentative rules directly from an existing data base. At this stage the user plays a passive role contrary to the further stages realized with his active collaboration. Here the user has a few possibilities: – Discretization of a continuous variable under a criterion of diagnosis accuracy maximization. – Some optimization but for a set of discrete variables. – Identification of irrelevant variables. – Generation of elementary hypotheses for specific values of variables. – Generation of rules. 214 3.2 M.MICHALEWICZ, S.T.WIERZCHOŃ, M.A. KlOPOTEK Active user By an active knowledge acquisition we mean the simultaneous utilization of the DB and the KB, and the statistical verification of the partial knowledge. The following tools are helpful in these tasks. – Tools for rules identification. These the search for rules with given condition or conclusion, the identification of rules contexually analogical to a given rule, etc. Any hypothetical rule can be therefore compared by the user with those existing in the knowledge base. – Search for data in the DB relevant to a given hypothesis; particularly search for data contradicting given rule. these operations are realized through queries to the DB. A specialized interface allow simultaneous access to the KB and the DB. – Rules formation from incomplete schemata (called suppositions). This is the active strategy attempting to find a rule (or possibly a set of rules) satisfying constraints imposed by the user. The constraints concern values of some attributes as well as degrees of truth which should be attached to the rules. – KB verification with respect to the contents of the DB. If the DB is sufficiently large we are interested in how accurate the rules are, i.e. how strong is their expressive power (measured in terms of misclassification error). To answer these questions we employ the Statistical Module, which assists the user in his research (search for the strongest relationships in the set of variables for a given group of objects, marginal analysis for each variable, graphics for pairs of variables, et.). 3.3 Problems of Automatic Rule Generation In very large statistical databases the generation of hypotheses (classification rules) is done on the basis of small samples of data. However, all known methods for automatic generation of classification rules aim at the precise partition of the attributevalued space.They are create “long” conjunctions of the pairs (attribute, value), which precisely classify all data sets [28]. Such approaches provide reasonable results for (large) databases, where the classification problems are well defined. However, for databases where classification is done on the basis of small samples of data (typical case for “soft sciences”), this is not the case. In such databases there is a need for preprocessing data, i.e. for generating a first iteration of hypotheses which are true with a high probability. This first iteration of hypotheses should yield simple formulae expressed in a language understandable for a user. The precise, “long” classification rules (hypotheses) would be useless: they are precise only for a small sample of data and don’t provide a guidance for the next iterations of hypotheses. Because of this, the development of new classification methods for a single attribute and small sets(i.e. 2 or 3) of attributes are of KNOWLEDGE ACQUISITION, REPRESENTATION & MANIPULATION 215 particular interest. Summarizing, notice, that there are several problems connected with automatic rule generation in small databases (these include also large databases, where a data sampling was performed): – the set of data is not representative for drawing conclusions strictly dividing the attribute/value space, – the generated rules are hardly interpretable, if at all possible; rules are detailed and concerned with only several cases, – a new sample (or a new set of data) can easily provide a contradiction, – the set of rules usually is too large; this might be appropriate for an expert system or diagnostic automata, but not for data analysis, – in many methods the domains of attributes must be discrete; the process of discretization is usually left to the expert (user). Taking into account the above drawbacks, we decided to construct a rule generating algorithm which would start from a single attribute (“bottom up” approach). We present the main idea of the method for creating the reasoning rules. This is based on (1) an optimization process defined on the set of discrete values of a given attribute and (2) a process of dividing a continous domain of an attribute into subsets; such optimal divisions are converted into the set of classification rules [25] 4 SEAD.2 – the new version Some experiences of exploitation of SEAD system caused several significant modifications, which were entered into the next version of SEAD: 4.1 Data Base Data base, built for SEAD 1 by our group, compatible to dBase family, appeared to be ineffective. Especially much difficulties was noticed when cooperation of data base with expert and statistical parts (written in C language) was needed. We decided to accommodate CODEBASE, which includes both libraries of procedures of access to data bases like dBase IV, Fox Base or CLIPPER written in C and libraries for user interfaces near to dBase IV or CLIPPER for MS DOS and MS WINDOWS. 4.2 Knowledge Base Knowledge base now is the bayesian network with uncertainty propagation based on Dempster-Schafer model, instead of rule-based knowledge base with uncertainty propagation near to MYCIN [37] used in former version of SEAD. This changes was caused by following drawbacks of rule approaches: 216 M.MICHALEWICZ, S.T.WIERZCHOŃ, M.A. KlOPOTEK – independence of variables is assumed, several appearances of the same variable in chain causes some computation complications (each appearance of concrete variable is treated as appearance of separate variable) – independence of rules is assumed; data base appears as a rubbish where rules are entered de facto without any control process. – Shortliffe’s approach assumed the use certainty factor CF [37], nature of which was defined not clearly enough. Even if rule’s CF was interpreted in terms of probability, combination of rules lead very fast to loss of interpretability. Meanwhile the belief networks has the following advantages: – there exists well defined relationship between variables (conditional or not) – these relationships are to be tested very simply, what can be used for new rules generation for example – one cannot add/remove rules without retribution, because it can break relationships between variables Approach based on belief networks and Dempster-Schafer methodology generates many theoretical and practical problems. Some of them are showed below in section 5 4.3 Rule preceiving of bayesian knowledge base It is easy to notice, that rule approach has several significant advantages. The most important of them are following: simplicity, rule interpretability and naturalness and comparatively easiness of introducing some knowledge acquisition mechanisms. That was the reason of introducing to new version of SEAD systems some special methods, which make possible for the user to preceive bayesian knowledge base as a set of rules. These methods are described below in section 6. 5 5.1 DS Approach to Knowledge Representation and Manipulation The Nature of Evidential Reasoning The term evidential reasoning coined by Lowrance and Garvey in [23] covers a set of techniques designed for processing and reasoning from row data (evidence) which are currently accessible to an agent. It is based upon the Dempster-Shafer theory (DST) of belief functions. This theory was founded by G. Shafer in his monograph [32] and was highly influenced by the works of A. P. Dempster [9, 10]. DST is based on two principal ideas: “the idea of obtaining degrees of belief for one question from subjective probabilities for a related question and Dempster’s rule for combining such degrees of belief when they are based on independent items of evidence” [34] p. 474. KNOWLEDGE ACQUISITION, REPRESENTATION & MANIPULATION 217 To give a concise rationale for this theory (see [29]) for deeper discussion) we should note that the information required to understand the current state of the world, or to solve a real problem, comes from multiple sources, like real-time sensor data, accumulated domain knowledge and current contextual information. Information coming from sensors, called evidence, provides a support for certain conclusions. The very nature of evidence can be summarized as follows:(1) it is uncertain, i.e it allows for multiple possible explanations, (2) it is incomplete as the sensors rarely has a full view of situation, (3) it may be completely or partial incorrect . Because of its nature, evidence is not readily represented either by logical or by classical probabilistic formalism. The ad hoc proposed methods for handling uncertain information (like e.g. CF factors) cause difficulties in interpretation and in extending the capabilities of such methodologies. DST, in contrast, provides a natural representation for evidential information, a formal basis for drawing conclusions from evidence, and a representation for belief. In evidential reasoning a knowledge source is allowed to express probabilistic opinions about the (partial) truth or falsity of statements composed of subsets of propositions from a space of distinct, exhaustive possibilities (called the frame of discernment ). The beliefs can be assigned to the individual (elementary) propositions in the space or to disjunctions of these propositions (i.e. to compound propositions) or both. When belief is assigned to a disjunction, a knowledge source is explicitly stating that it does not has enough information to distribute this belief more precisely. Hence a knowledge source can distribute its belief to statements whose granularity is appropriate to its state of knowledge. Further, the statements to which belief is assigned are not necessarily distinct from one another. The distribution of beliefs over a frame of discernment is called a body of evidence. The easiest way to formally represent a body of evidence is to define a mass function m being a probability distribution over a set ofPsubsets of a frame of discernment Θ (as such it must satisfy the obvious condition that {m(A) | A ⊆ Θ} = 1). Now, if the mass function is positive on singletons of Θ only then our model reduces to standard probability distribution. On the other extreme, a mass function can take the form m(A) = 1 for some A ⊆ Θ. When A = Θ then such a function represents total ignorance about current state of the world. When A ⊂ Θ, then the mass function describes our certainty that the truth lies in A; when Θ is a Cartesian product of frames describing related questions then m(A) = 1 defines a logical belief function. Thus, Boolean logic is another special case of belief functions. DST is therefore a generalization of both Boolean logic and probability calculus. This generalization lies deep in the representation of belief functions and has effects on many aspects of the theory. The heart of this theory is Dempster’s Rule of Combination, or DRC for short, being a formal tool for fusing different bodies of evidence. The result is a 218 M.MICHALEWICZ, S.T.WIERZCHOŃ, M.A. KlOPOTEK new body of evidence representing the consensus among the original bodies of evidence. In special cases this rule behaves like Bayes’ rule and in other cases like set intersection. Thus belief function provide a framework in which propositional logic and probabilistic statements can be freely mixed and processed under common formalism. Belief functions, however, provide more general models. Particularly, random sets are a generalization of the fixed sets of logical models and upper (plausibility functions) and lower (belief functions) bound intervals are a generalization of point probabilities. Current automated reasoning systems are most effective when domain knowledge can be modeled as a set of loosely interconnected concepts (propositions) what justifies an incremental approach to updating beliefs. Applying DST formalism, independent opinions are expressed by independent bodies of evidence and dependent opinions can either be expressed by a single body of evidence or by a network describing the interrelationships among several bodies of evidence (so called belief networks). Updating the belief (by using Dempster’s Rule of combination) in one proposition affects the entire body of evidence. This allows to involve whole the knowledge already accumulated in the system (contrary to rule-based systems where only fragmentary knowledge is used during the process). In this paper we assume some familiarity with the DST, although the appropriate definitions are included in the next section. In the sequel we will focus on the mathematics of evidential reasoning, mainly on so-called belief revision. 5.2 Mathematics of Evidential Reasoning In this section we briefly review a mathematical formalization of the evidential reasoning. It consists of two main parts. In static part we simply represent our knowledge about a problem in terms of belief functions and dynamic part allows to express knowledge evolution. Basic notions X = {X1 , . . . , Xn } is a set of variables and Θi = Dom(Xi ) is a discrete set of possible values of i-th variable. (The case of continuous variable is considered by [33] or [44].) By A, B, C,. . . we shall denote subsets of the set X .Θ will denote the Q configurations space or frame of discernment, Θ = ×{Θ | i = 1 . . . n}, and Θ.A = {Θ | Xi ∈ A} will denote the marginal frame. If x is a configuration from Θ then x.A stands for the projection of x onto Θ.A; x.A is obtained by dropping from x the components being members of Θi for all Xi ∈ X \ A. Knowledge representation Assume (Ω, B, P ) is a probability space, Ξ is a discrete space and X is a mapping which KNOWLEDGE ACQUISITION, REPRESENTATION & MANIPULATION 219 assigns subsets of Ξ to points of Ω, i.e. X(ω) ⊆ Ξ for each ω ∈ Ω. Treating Ξ as the set of elementary hypotheses we identify each subset of Ξ as a compound hypothesis. If Ω is viewed as a set of observations then X(ω) = A can be interpreted as a rule “If observation = ω then hypothesis = A”. According to classical approach the mapping X induces a measure µ defined on POW - the power set of the set of all compound hypotheses: µ(A) = P ({ω ∈ Ω | X(ω) ∈ A}), A ∈ POW (1) Note that when X is a function, i.e. X(ω) ∈ Ξ for all ω ∈ Ω then POW can be reduced to the power set of Ξ and (1) reduces to the definition of the random variable. Under the general setting X constitutes so-called random set [47]. Of special importance are the next set functions derived from (1) and defined for all A ⊆ Ξ, A 6= ∅: m(A) = P ({ω ∈ Ω | X(ω) = A}), (2) Bel(A) = P ({ω ∈ Ω | X(ω) ⊆ A, X(ω) 6= ∅}) (3) P l(A) = P ({ω ∈ Ω | (X(ω) ∩ A) 6= ∅}), (4) Assuming that all observations are relevant, i.e. X(ω) 6= ∅ for all ω ∈ Ω, we easily recover the main properties of the basic probability assignment, m, i.e. m(∅) = 0, and P {m(A) | A ⊆ Ξ} = 1. In general case, when m(∅) > 0, the mass function should be modified according to the assignment m(A) := m(A)/(1 − m(∅) and m(∅) = 0. The m-function plays the role analogical to the probability distribution P (X = x), x ∈ ΘX ; particularly when m(A) is positive on the singletons only then m is just a probability distribution. The belief and plausibility functions can be computed from m by means of the identities X X Bel(A) = {m(B) | B ⊆ A}, P l(A) = {m(B) | B ∩ A 6= ∅} (5) Similarly plausibility function can be deduced from a belief function by means of the equation P l(A) = 1 − Bel(Ξ − A), A ∈ Ξ. Shafer [32] proposes further formulas enabling to express one set function in terms of other set function and fast algorithms for doing this task are reported in [18]. In the sequel we shall use multivariate belief functions, i.e. belief function defined on the family of subsets of the space Θ introduced at the beginning of this section. Special class of multivariate belief functions form so called logical belief functions satisfying the condition m(A) = 1 for some A ⊂ Θ. (When A = Θ then the mass function represents vacuous belief function; it models total ignorance about the possible location of X inΘ.) To be more illustrative we present four elementary situations: 220 M.MICHALEWICZ, S.T.WIERZCHOŃ, M.A. KlOPOTEK (a) the logical expression “X1 = x1 and X2 = x2 . . . and Xn = xn ” is represented by the element θ =< x1 , x2 , . . . , x >∈ Θ, (b) the logical expression Sn “X1 = x1 or X2 = x2 . . . or Xn = xn ”is represented by the subset of the form i=1 ({xi } × Θ.(X − {Xi })), (c) the logical expression “not (X1 = x1 )” is represented by the subset of the form (Θ1 − {x1 }) × Θ.(X − {X1 }). (d) the logical expression “if ((X1 = x1 ) or . . . or (Xn−1 = xn−1 ) then (Xn = xn )” is represented by the subset of the form {x1 , x2 , . . . , xn } ∪ (Θ1 − {x1 }) × (Θ2 − {x2 }) × . . . × (Θn−1 − {xn−1 }) × Θn . When the logical assertions cannot be stated with full certainty we convert them to so called simple support function by setting m(A) = α and m(Θ) = 1 − α, where α ∈ (0, 1) and A is a subset of Θ representing appropriate assertion. Knowledge evolution Up to this moment we have assumed that all the belief functions are defined on the common space Θ. Suppose we have two belief functions defined on the frames Θ.A and Θ.B, respectively. How to represent beliefs expressed by means of the attributes (variables) from the set A in terms of the attributes from the set B? We answer these questions now. Minimal extension. Suppose that to describe a domain we used attributes from the set A ⊂ X and as a result we obtained belief function BelA defined over the space Θ.A. After a time we decided to use larger set of attributes B ⊃ A. To translate the function BelA into the belief function BelB defined over the Qspace Θ.B observe that using the attributes from the set A we are able to create m = i∈A |Θi| (where |Θi| stands for the cardinality of the set Θi ) elementary propositions q of the form “Xi1 = xi1 and Xi2 = xi2 and . . . and Xir = xir ” where Xij ∈ A, xij ∈ Θij and |A|= r. In other words the θ’s are the only atomic propositions of the language LA . Since the values of the attributes form the set B − A are unknown to a subject using the language LA then each atomic proposition θ ∈ Θ.A translates into the compound proposition θ × Θ.(B − A) ⊂ Θ.B. Similarly each A ⊆ Θ.A translates into the subset A × Θ.(B − A) of Θ.B. Thus the mass function mA characterizing the belief function BelA translates into the mass function mB of the form mB (B) =  mA (a) if B = A × Θ.(B − A), A ⊆ θ.A 0 otherwise (6) In the sequel we shall denote the function mB derived from mA by means of the above procedure as m↑AB . KNOWLEDGE ACQUISITION, REPRESENTATION & MANIPULATION 221 Marginalization. Assume now that we reduce the set B of attributes to its subset A. Obviously each atomic proposition θ ∈ Θ.B points to a proposition ξ ∈ Θ.A if its projection onto Θ.A (defined as “dropping coordinates form B − A”) equals to ξ. Thus the mass function mB translates to a mass mA via the equation X mA (A) = {mB (B) | B ⊆ Θ.B, proj(B) = A} (7) In the sequel we shall denote the function mA derived from mB by means of the above procedure as m↓A . B Fusing evidence. When m1 and m2 are two separate and independent bodies of evidence defined on a common frame Θ, to arrive to the final conclusions we combine them by means of Dempster’s Rule of Combination (DRC for short). That is we crate new mass function m(A) = (m1P⊕ m2 )(A) = κ · {m1 (A ∪ B) · m1 (A ∪ C) | A, B ⊆ (Θ − A), A ∩ B = ∅} (8) where κ is a normalizing constants defined as κ−1 = 1 − m(∅). Note that when m1 and m2 are categorical mass functions, i.e. m1 (A) = 1 and m1 (B) = 1 for some A, B ⊆ Θ then the rule produces categorical mass function with m(A ∩ B) = 1. Hence DRC generalizes classical sets intersection. To illustrate the notions introduced in this section assume that p and q are two propositional variables, and their frames Ξ and Λ are such that Ξ = Λ = {t, f } where t and f stand respectively for “true” and “false”. The logical implication can be described by the mass function mp→q on Θ = Ξ × Λ with one focal (i.e. positive) element mp→q ({{f, f }, {f, t}, {t, t}}) = 1. Similarly the fact “p is true” is represented by the categorical mass function mp on the frame Ξ, that is mp ({t}) = 1. To combine these two functions we must extend mp to the bpa on Θ: m↑Θ p ({t, f }, {t, t}}) = 1. Now, combining mp→q with m↑Θ we obtain the bpa m of the form m({t, t}) = 1. Projecting this m onto p the space Λ we state that m↓Λ ({t}) = 1 what means that “q is true” what agrees with the standard logical inference pattern Modus Ponens. Note that if we combine mp→q with m-function representing statement “p is false” then the resulting function (after projection on the frame Λ) has the form m({{f }, {t}}), i.e. nothing can be said about the truth of the proposition q (what again agrees with classical logic). Similarly combining mp→q with the m function stating that “q is false” we obtain a counterpart of the Modus Tollens pattern. This example shows that the formalism of belief functions perfectly agrees with the propositional calculus. In general, reasoning with categorical belief functions corresponds to the idea of using set valued description of variables to estimation and testing hypotheses - cf [31]. 222 M.MICHALEWICZ, S.T.WIERZCHOŃ, M.A. KlOPOTEK Conditioning. When Bel is a belief function over Θ and Belo is a categorical belief function focused on a subset A of Θ then the combination of Bel with Belo results in the conditional belief function Bel(· | A). Its properties are described in [32], [46] and [38]. 5.3 Reasoning under Uncertainty With the DRC the problem of reasoning can be stated as follows: Given a collection of unrelated pieces of evidence ε1 , ε2 , . . . , εm (each of which is translated to the appropriate belief function) we turn them into a single body of the form ε1 ∧ε2 ∧· · ·∧εm characterized by a belief function being the orthogonal sum the appropriate belief functions. Adding to the resulting body some findings which are possibly certain, we obtain a conditional belief function. This closely corresponds to the probabilistic reasoning where the bodies of evidence are represented by the (conditional) probabilities from which the joint probability distribution is derived; having this distribution we are looking for a distribution conditioned on a subset of Θ. To formalize the problem observe that each body εi is represented as a belief function over a subset Hi ⊆ X . Denoting H the family of subsets Hi , i = 1 . . . m we are interested in a belief function BelX (· | e) = (⊕{Bel|H ∈ H})↓{X} (9) where e is a subset of Θ representing current findings. This corresponds to deriving a conditional probability distribution P (X | e) from the joint probability distribution Q P (X1 , . . . , Xm ) = {P (Xi | Π(Xi ) | i = 1 . . . m} given the set of observations (instantiated variables) e; here Π(Xi ) is the set of immediate causes for Xi – see [27]. Note that under probabilistic setting the subsets Hi are defined as the sum of {Xi } and Π(Xi ); further the operator ⊕ is replaced by the multiplication and the projection operator ↓{X} corresponds to the summation over all variables form the set X − {X}. Hence the equation (9) nicely summarizes both the probabilistic and strictly evidential problem of reasoning. Because immediate derivation of BelX (· | e) is numerically very expensive, a number of procedures has been designed to this problem - cf. [27], [22], [36]. The simplest and more attractive procedure seems to be that of Shafer and Shenoy. It relies upon the observation that deleting a single variable Y from the set X results in a belief function (here X ′ = X − {Y }) ′ Bel↓X = (⊕{BelH | H ∈ H, Y 6∈ H}) ⊕ (⊕BelH | H ∈ H, Y ∈ H)↓X ′ and follows from the fact that (1) the operator ⊕ is commutative and associative, and (2) if BelA and BelB are two belief function defined over Θ.A and Θ.B, respectively, ↓(A∩B) then (BelA ⊕ BelB )↓A = BelA ⊕ BelB . Note that after performing the above KNOWLEDGE ACQUISITION, REPRESENTATION & MANIPULATION 223 ′ computations the original family H reduces S to new family H consisting of all H’s such ′ that Y 6∈ H, and the new set H = ( {H | Y ∈ H}) − {Y }. In its very nature the procedure is closely related to the approach used by [2] in solving nonserial dynamic problems and it says that to find a margin over Θ.{X} it suffices to delete one by one variables from the set X −{X}, each time combining belief functions over relatively small frame being the sum of these H’s which contain the currently removed variable. This last operation is allowed because the projection operator is such that (3) if I ⊂ J are two subsets of X then Bel↓I = (Bel↓J )↓I . The three properties (1), (2) and (3) can be viewed as the necessary and sufficient conditions for local computations described below- cf. [36]. Obviously, the numerical complexity of this new procedure hardly depends on the order in which the variables from the set X ′ are removed - see [2] for details. Shafer and Shenoy (1986) observed that an optimal order can be recovered if we arrange the original family H into a join tree – consult [24] – (Markov tree in their nomenclature) which has a nice property stating that when L ∈ H is a leaf node in the tree and P ∈ H is its parent node then the variables from the set L − P occurs only in the set L. (Of course when H is not an acyclic hypergraph it must be embedded in such a hypergraph first – see [48] for an appropriate algorithm). ′ Now the procedure of finding Bel↓X can be summarized as follows. Assume that H is organized into a join tree rooted on the node corresponding to the variable X. Each node in the tree can be imagined as a separate processor equipped with local information in the form of a component belief function (when a node was added to H in the process of the tree formation its local information has the form of vacuous belief function). Each node communicates with its neighbors by passing messages (belief functions) to the neighbors. There are two kinds op operations: a propagation operation which describes how messages are passed from node to node so that all of the local information is globally distributed, and a fusion rule which describes how the messages incoming to a node are combined to make marginal belief functions and outgoing messages. In other words propagation takes place along the edges of the tree and fusion takes place within the nodes. Both the operations can be formalized as follows. Let N (H; T ) denote the set of all neighbors of the node H in the join tree T . The message which the node H sends to a neighbor H ′ equals to ′ M H→H = (BelH ⊕ (⊕{M G→H | G ∈ (N (H; T ) − {H ′ })}))↓(H∩H ′ ) (10) ′ The operation in the parentheses corresponds to fusion and (·)↓(H∩H ) represents propagation. Note that (10) allows for parallel belief updating. When a node received messages from all its neighbors, a marginal belief is computed Bel↓H = BelH ⊕ (⊕{M H ′ →H | H ′ ∈ N (H; T )}) (11) This procedure with some modifications reducing the number of summations ⊕, described in [47]., has been successfully implemented in our system. 224 5.4 M.MICHALEWICZ, S.T.WIERZCHOŃ, M.A. KlOPOTEK Belief Revision The aim of belief revision is, according to [27] Ch. 5 to identify a composite set of propositions (one from each variable) which “best” explains the evidence at hand. Under probabilistic context this formalizes as follows. Given e, the set of instantiated variables (evidence), let x stand for an assignment of values to the variables in X consistent with e; such an x is said to be explanation, interpretation or extension of e. The most probable explanation (MPE) of the evidence at hand is such an extension xe which maximizes the conditional probability P (X = x | e). This task can be performed locally by letting each variable X in X compute the function β(x | e) = max{P (x, x’) | e} x’ (12) where x’ stands for an explanation projected on the space Θ(X − {X}). That 12 can be computed locally follows from the fact that the pair (·, max) satisfies the requirements (1)-(3) specified in section 5.3. Note that in 12 the operation of summation – requested when computing conditional probabilities P (X | e) – was replaced by the maximum operator. When we use belief function the maximum operator appears both in the ⊕-summation and in the projection operator. Hence to fit the rule (9) to the formula (12) we must redefine both the operators. First, instead ⊕-summation we must define new ⊕ − max operator (m1 ⊕max m2 )(A) = max{m1 (A∪C)·m2 (A∪D) | C, D ⊆ (Θ−A), C∩D = ∅}(13) Here, contrary to the ⊕-summation, normalization is unnecessary as the relative strengths are more important than the absolute values of commitment to a given set of propositions. Similarly, the projection operator takes now the form (we assume that A ⊂ B) m↓maxB = max{mB (B) | B ⊆ Θ.B, proj(B) = A} A (14) Using these operators in equation (10) we obtain a message passing algorithm for belief updating. This algorithm can be used in two main modes described below. Explanatory mode. Rooting the join tree on a variable X we are searching for the instantiations of other variables which explain computed value ox X at best. Hypothesizing. Again we root the tree on a variable X and we assume that X takes a value xo . Our algorithm allow to find the best explanation for such an assignment (i.e. we are searching an answer for the question “which settings of the remaining variables explain the condition “X = xo ” at best?”) Conditioning. We choose a group of variables, say ε, and we instantiate them to the values e ∈ Θ.ε. Now our algorithm allows to answer the question “what will happen if ε = e?”. KNOWLEDGE ACQUISITION, REPRESENTATION & MANIPULATION 6 225 Viewing Belief Network as a Set of Rules A natural phenomenon of human expression of knowledge is a widespread usage of implications: most mathematical theorems are of the form ”if < premise > then < conclusion >”, though obviously they are equivalent to for example a CNF or DNF representation. Furthermore, humans use implication-like statements even if described phenomena fail to be deterministic, e.g. in describing course of chemical reactions, laws in social sciences etc. The term ”rule” for implication-like expression of knowledge found a wide-spread use in artificial intelligence, e.g. in MYCIN-like expert systems. Taking into account this phenomenon, also our group made an effort to find a way for describing the contents of a belief-network based knowledge bases (which is very different in nature from modular production rules based knowledge bases) in terms of rule-like constructs. This transcription should support the user by helping him: – – – – to to to to understand the contents of the knowledge base formulate queries to the knowledge base enter and update the knowledge base and understand the justifications of the system for results of its reasoning The last item has just been subject of the preceding sections. To understand better the the nature of the rule-like transcription let us first give the general definition of a belief network: 6.1 The Concept of a Belief Network We generalize here the definition of belief network from [12] (bayesian networks), while using the denotation of [36]. Definition 1. We define a mapping ⊙ : V V × V V → V V called decombination such that: if BEL12 = BEL1 ⊙BEL2 then BEL1 = BEL2 ⊙ BEL12 . In case of probabilities, decombination means memberwise division: P r12 (A) = P r1 (A)/P r2 (A). In case of DS P belief functions, let us remaind that the commonality function Q is defined as Q(A) = B;A⊆B m(B). Hence for Bel12 = Bel1 ⊕Bel2 then Q12 (A) = c·Q1 (A)·Q2 (A) (c - normalizing factor). Let us remaind also that by a pseudo-belief function a function over powerset is understood which differs from the proper belief function by the fact, 226 M.MICHALEWICZ, S.T.WIERZCHOŃ, M.A. KlOPOTEK that also negative mass function (m) values are allowed, but only to such extent that the commonality function Q remains non-negative. Then let us define the operator ⊖ as yieldiing a DS pseudo-belief function such that: whenever Bel12 = Bel1 ⊖ Bel2 then Q12 (A) = c · Q1 (A)/Q2 (A) (c - normalizing constant) for non-zero Q2 (A). It is easy to check that such a function always exists. Obviously, Bel1 = Bel1 ⊕ Bel12 . The operator ⊖ means then the decombination of two DS belief functions. Both for probabilities and for DS belief functions decombination may be not uniquely determined. Moreover, for DS belief functions not always a decombined DS belief function will exist. Hence we extend the domain to DS pseudo-belief functions which is closed under this operator. We claim here without a proof (which is simple) that DS pseudo-belief functions fit the axiomatic framework of Shenoy/Shafer. Also, we claim that if an (ordinary) DS belief function is represented by a factorization in DS pseudo-belief functions, then any propagation of uncertainty yields the very same results as when it would have been factorized into ordinary DS belief functions. Let us define now the concept of pseudo-conditioning. Definition 2. By pseudo-conditioning | of a belief function BEL on a set of variables h we understand the transformation: BEL|h = BEL⊙BEL↓h . Notably, pseudo-conditioning means in case of probability functions proper conditioning. In case of DS pseudo-belief functions the operator | has meaning entirely different from traditionally used notion of conditionality - pseudo-conditioning is a technical term used exclusively for valuation of nodes in belief networks. Notice: some other authors e.g. [3] recognized also the necessity of introduction of two different notions in the context of the Shenoy/Shafer axiomatic framework (compare a priori and a posteriori conditionals in [3]). [3] introduces 3 additional axioms governing the ’a priori’ conditionality to enable propagation with them. Our pseudo-conditionality is bound only to the assumption of executability of the ⊙ operation and does not assume any further properties of it. We will discuss the consequences of this difference elsewhere. Let us define now the general notion of belief networks: Definition 3. A belief network is a pair (D,BEL) where D is a dag (directed acyclic graph) and BEL is a belief distribution called the underlying distribution. Each node i in D corresponds to a variable Xi in BEL, a set of nodes I corresponds to a set of variables XI and xi , xI denote values drawn from the domain of Xi and from the (cross product) domain of XI respectively. Each node in the network is regarded as a storage cell for any distribution BEL↓{Xi }∪Xπ(i) |Xπ(i) where Xπ(i) is a set of nodes corresponding to the parent nodes π(i) of i. The underlying distribution represented by a belief network is KNOWLEDGE ACQUISITION, REPRESENTATION & MANIPULATION computed via: BEL = n K 227 BEL↓{Xi }∪Xπ(i) |Xπ(i) i=1 The notion of belief network just introduced possesses several important characteristics: – The relationship between the global belief function BEL and its constituting factors BEL↓{Xi }∪Xπ(i) |Xπ(i) is local: this means that having an empirical model of BEL and knowing the structure D of he distribution BEL we can estimate factors BEL↓{Xi }∪Xπ(i) |Xπ(i) separately for each one by projection of the empirical model onto the subset {Xi } ∪ Xπ(i) of variables. – Removal of a leave node from D (and hence the respective factor from the above ”product”) is equivalent to projection of BEL onto the space spanned by variables associated with the remaining odes: this enables to apply the technique of uncertainty propagation by edge reversals. – A belief network reflects causal dependencies among variables (by directions of arrows) – We can reason about conditional independence of disjunctive sets of variables given another set of variables using only graphical properties of dag-representation D and without referring to numerical properties of the underlying distribution. In case of probabilistic distributions the first to properties are obvious. The last property has been studied very carefully for probabilistic belief networks by Geiger, Verma and Pearl [12]. It is easily checked that the defining formula for the underlying distribution in probabilistic case reduces to: P (x1 , ..., xn ) = n Y P (xi |xπ(i) ) i=1 In their paper they introduce the notion of d-separation (implying conditional independence) as follows: Definition 4. [12] A trail in a dag is a sequence of links that form a path in the underlying undirected graph. A node β is called a head-to-head node with respect to a trail t if there are two consecutive links α → β and β ← γ on that t. Definition 5. [12] A trail t connecting nodes α and β is said to be active given a set of nodes L, if (1) every head-to-head-node wrt t either is or has a descendent in L and (2) every other node on t is outside L. Otherwise t is said to be blocked (given L). Definition 6. [12] If J,K and L are three disjoint sets of nodes in a dag D, then L is said to d-separate J from K, denoted I(J, K|L)D iff no trail between a node in J and a node in K is active given L. 228 M.MICHALEWICZ, S.T.WIERZCHOŃ, M.A. KlOPOTEK It has been shown in [13] that Theorem 7. [13] Let L be a set of nodes in a dag D, and let α, β ∈ / L be two additional nodes in D. Then α and β are connected via an active trail (given L) iff α and β are connected via a simple (i.e. not possessing cycles in the underlying undirected graph) active trail (given L). Definition 8. [12] If XJ , XK , XL are three disjoint sets of variables of a distribution P, then XJ , XK are said to be conditionally independent given XL (denoted I(XJ , XK |XL )P iff P (xJ , xK |xL ) = P (xJ |xL ).P (xK |xL ) for all possible values of XJ , XK , XL for which P (xL ) > 0. I(XJ , XK |XL )P is called a (conditional independence) statement Theorem 9. [12] Let PD = {P |(D,P) is a Bayesian network}. Then: I(J, K|L)D iff I(XJ , XK |XL )P for all P ∈ PD . The ”only if” part (soundness) states that whenever I(J, K|L)D holds in D, it must represent an independence that holds in every underlying distribution. The ”if” part (completeness) asserts that any independence that is not detected by d-separation cannot be shared by all distributions in PD and hence cannot be revealed by non-numeric methods. In case of DS belief functions, our defining equation for the underlying distribution of a belief network has the form: Bel = n M Bel↓{Xi }∪Xπ(i) |Xπ(i) i=1 It is easily seen that the first two properties hold for DS belief networks as defined in this paper. The notion of d-separation and its relationship with conditional independence are easily transferred onto DS belief networks.This definition differs significantly from what is generally considered to be a DS belief network (e.g. in [36]). Usually, a DS belief network is considered to have the defining equation of the form: Bel = n M Beli i=1 where Beli is a DS belief function in some subset of variables of Bel without any assumption of the nature of Beli . The deviation from traditional approach seems to be significant one and requires some explanation. First of all the traditional DS belief network has in general none of the above-mentioned three properties hold. The advantages of KNOWLEDGE ACQUISITION, REPRESENTATION & MANIPULATION 229 our DS belief network definition are obvious. The question remains whether there are any disadvantages. Ones connected with uncertainty propagation within the Shenoy/Shafer axiomatic framework [36] is of particular interest for implementation of this expert system. Shenoy and Shafer [36] consider it unimportant whether or not the factorization should refer to conditional probabilities in case of probabilistic belief networks. We shall make at this point the remark that for expert system inference engine it is of primary importance how the contents of the knowledge base should be understood by the user as beside computation an expert system is expected at least to justify its conclusions and it can do so only referring to elements of the knowledge base. So if a belief network (or a hypergraph) is to be used as the knowledge base, as much elements as possible have to refer to experience of the user. In our opinion, the major reason for this remark of Shenoy and Shafer is that in fact the Dempster-Shafer belief function cannot be decomposed in terms of the traditional conditional belief function as defined in the previous section 5. This can only be done if a pseudo-conditioning like ours is introduced. But an intriguing question remains whether the traditional DS belief networks extend essentially the class of DS belief functions suitable for Shenoy/Shafer propagation of uncertainty. The sad result that really Theorem 10. [20] Traditional DS belief network induced hypergraph (as considered by Shenoy and Shafer [36]) may for a given joint belief distribution have simpler structure than (be properly covered by) the closest hypergraph induced by a new DS belief network (as defined above.) This fact, however, is compensated completely by another one. Shenoy/Shafer propagation does not run in hypergraphs, but in hypertrees. And: Theorem 11. [20] No traditional DS belief network induced hypertree (as considered by Shenoy and Shafer [36]) may for a given joint belief distribution have simpler structure than (be properly covered by) the closest hypertree induced by a new DS belief network (as defined above.) This fully justifies, in our opinion, the usage of the new belief network definition. 6.2 Understanding a Belief Network in Terms of Rules A dag structure of a belief network was presented in Fig.1. Let us consider a fragment of a belief network in Fig.2 consisting of a node (and the associated variable, or attribute, or feature) Y and all of its parents: X and Z. Let the values of them range for Y: {y1 , y2 , y3 }, 230 M.MICHALEWICZ, S.T.WIERZCHOŃ, M.A. KlOPOTEK p3 ✉ ✲ p1 ✉ p5 p4 ✉ p2 ✲ ❅ ❘ ❅ ✻ ❅ ✲ ✉ ❅ ❅ ✉ p6 ✉ ❄ ✉ ✲ p7 ❄ ❅ ❅ ❅ ❘ ❅ ✉ p8 Fig. 1. Belief Network - An Example ✉X ❅ ❅ ❅ ❅ ❅ ❘ Y✠ ❅ ✉ ✉Z Fig. 2. A Typical Node of a Belief Network for X:{x1 , x2 }, for Z:{z1 , z2 , z3 , z4 }, resp. Then a table of valuations will be associated with the node Y. In probabilistic case the valuation will take the form given in table 1. In general, it will be an exhaustive table of conditional probabilities of each value of a node given each value combination of its parents. In case of Dempster-Shafer valuation, only some (that is focal point) conditional valuations will be given, e.g. as in table 2. KNOWLEDGE ACQUISITION, REPRESENTATION & MANIPULATION Table 1. Probabilistic Node Valuation X x1 x1 x1 x1 x1 x1 x1 x1 x1 x1 x1 x1 x2 x2 x2 x2 x2 x2 x2 x2 x2 x2 x2 x2 Z z1 z1 z1 z2 z2 z2 z3 z3 z3 z4 z4 z4 z1 z1 z1 z2 z2 z2 z3 z3 z3 z4 z4 z4 Y Cond. Probability P (y|x, z) y1 p111 y2 p112 y3 p113 y1 p121 y2 p122 y3 p123 y1 p131 y2 p132 y3 p133 y1 p141 y2 p142 y3 p143 y1 p211 y2 p212 y3 p213 y1 p221 y2 p222 y3 p223 y1 p231 y2 p232 y3 p233 y1 p241 y2 p242 y3 p243 Table 2. Dempster-Shafer Valuation of a Node X {(x1 , {(x1 , (x1 , {(x2 , {(x1 , (x1 , (x2 , (x2 , Z z1 , z1 , z3 , z2 , z4 , z4 , z4 , z4 , Y bpa function m↓{Y,X,Z}|{X,Z}(y, x, z) y1 )} m1 y2 ), y2 )} m2 y3 )} m3 y1 ), y3 ), y1 ), y3 )} m4 231 232 M.MICHALEWICZ, S.T.WIERZCHOŃ, M.A. KlOPOTEK Each table of this form may be displayed for presentation purposes as a ”beam” of rules: in probabilistic case: IF X = x1 AND Z = z1 THEN Y = y1 WITH p111 IF X = x1 AND Z = z1 THEN Y = y2 WITH p112 IF X = x1 AND Z = z1 THEN Y = y3 WITH p113 IF X = x2 AND Z = z1 THEN Y = y1 WITH p211 ......... IF X = x2 AND Z = z4 THEN Y = y3 WITH p243 and in Dempster-Shafer case for the valuation in table 2: IF X=x1 AND Z=z1 THEN Y=y1 WITH Q1 IF X=x1 AND Z=z1 THEN Y=y2 AND IF X=x1 AND Z=z3 THEN Y=y2 WITH Q2 IF X=x2 AND Z=z2 THEN Y=y3 WITH Q3 IF X=x1 AND Z=z4 THEN Y=y1 AND IF X=x1 AND Z=z4 THEN Y=y3 AND IF X=x2 AND Z=z4 THEN Y=y1 AND IF X=x2 AND Z=z4 THEN Y=y3 WITH Q4 while measures Q (commonality) are calculated according to the principles of the Dempster-Shafer Theory [32]. First of all notice that we are talking always about a ”beam of rules” and not of a single rule - this was rarely considered in production rule systems. In probabilistic case, it should be clear from the very beginning what is meant by a single rule (of the beam): the certainty factor after the word ”with” expresses the proportion of cases fitting the ”rule” among those meeting the premise. At the same time, the above examples exhaust the richness of the language needed for presenting contents of the knowledge base to the user. The Dempster-Shafer case is more subtle. Here, all the variables (X,Y,Z) are treated as potentially set-valued, and the equality sign in the expressions should be rather treated as ”is containing” and not as set equality sign. The certainty factor after the word ”with” expresses again the proportion of cases fitting the ”rule” among those meeting the premise. At the same time, the above examples exhaust the richness of the language needed for presenting contents of the knowledge base to the user. The representation language for knowledge base has not only syntactic restrictions, KNOWLEDGE ACQUISITION, REPRESENTATION & MANIPULATION 233 but also semantica ones: within a rule, only direct predecessors of a given node may occur in the premise part of a rule. 6.3 Rule-oriented Queries to the Knowledge Base A knowledge base in belief network notation means something more than just the sum of rules. The built-in system of uncertainty propagation can for the given network give the level of probability (belief) for more general formulae without any restrictions provided by network topology: – for logical expressions (with operators AND, OR, NOT) in atomic formulae of the form <variable> = <value>. - the system may deduce what is the unconditional probability/belief of such a formulae to hold, - the same question may be also answered conditionally: what is the probability/belief of the expression given some of the variables of the network have restricted value ranges, - the same question may be also answered conditionally: what is the probability/belief of the expression given some constraints expressed in terms of logical expressions are imposed onto the network, – for beams of rules of the type IF attr1=? AND attr2=? AND attr3=? ... THEN attr=? - the complete beam can be inferred unconditionally, or conditionally or for a given set of constraints as described for logical expressions. For probabilistic case, the methods of implementation of the above query-answering is described in [27]. Implementation for Dempster-Shafer Theory runs along the same lines. Let us consider as an example the network in Fig.1. Let us assume that each of the nodes p1 ,...,p8 takes only one of two values: ’y’ and ’n’. We intend to ask the question: p5 =′ y ′ .or.p1 =′ n′ . The belief network is to be amended temporarily by a node x1 , taking values ’y’ i ’n’, which we connect with p5 and p1 (see Fig.3). With this node, we associate the rules: IF p5 =′ t′ AND p1 =′ n′ THEN x1 =′ t′ WITH 1. IF p5 =′ t′ AND p1 =′ t′ THEN x1 =′ t′ WITH 1. IF p5 =′ n′ AND p1 =′ n′ THEN x1 =′ t′ WITH 1. IF p5 =′ n′ AND p1 =′ t′ THEN x1 =′ n′ WITH 1. and for the remaining rules the probability is equal 0. 234 M.MICHALEWICZ, S.T.WIERZCHOŃ, M.A. KlOPOTEK p3 p5 p4 ✉ ✲ ❡ ✿ ✘ ✘✘ ✘ ❅ ✘✘ ✘ ✘ ❅ ❘✘✘✘ ❅ ✻ ✘ p1 p✘ 2 ✘✘ ❅ ❅ p6 ✘✘ ✉✘ ✲ ✉ ✉ ❄ ✉ ✲ x1 ✉ ✲ ❄ ✉ p7 ✲ ❅ ❅ ❅ ❘ ❅ ✉ p8 Fig. 3. A Belief Network with Query-Node: x1 : p5 =′ y ′ .or.p1 =′ n′ The answer is the final valuation of the node x1 after uncertainty propagation. Now let’s turn to checking validity of the query of the form: x3 : if (p5 =′ t′ .or. p1 =′ n′ ) .and. p3 =′ n′ then p6 =′ t′ with respect to contents of the knowledge base. Node x1 connected with p5 and p1 , node x2 connected with p3 and p1 and node x3 connected with p6 and p1 (see Fig.4). Let nodes x1 and x2 take values ’y’ or ’n’, and the node x3 - ’y’, ’n’, ’ ?’. Node x1 is associated with a beam of rules as mentioned above, and x2 - with: IF p3 =′ t′ AND x1 =′ t′ THEN x2 =′ t′ WITH 1. IF p3 =′ t′ AND x1 =′ n′ THEN x2 =′ n′ WITH 1. IF p3 =′ n′ AND x1 =′ t′ THEN x2 =′ n′ WITH 1. IF p3 =′ n′ AND x1 =′ n′ THEN x2 =′ n′ WITH 1. with the remaining rule probabilities equal 0. Node x3 is associated with rule beam: IF p6 =′ t′ AND x2 =′ t′ THEN x3 =′ t′ WITH 1. IF p6 =′ t′ AND x2 =′ n′ THEN x3 =′ n′ WITH 1. IF p6 =′ n′ AND x2 =′ t′ THEN x3 =′ ?′ WITH 1. IF p6 =′ n′ AND x2 =′ n′ THEN x3 =′ ?′ WITH 1. KNOWLEDGE ACQUISITION, REPRESENTATION & MANIPULATION 235 with the remaining rule probabilities equal 0. p3 p4 p5 ✉ ✲ ✲ ✉ ✲ ✉ ❳❳ ✿ ✘ ❳❳❳ ✘✘ ✘ ❅❳ ✘ ❳ ✘ ✘ ❳❳✘ ❅ ❳✘ ❘✘✘ ❅ ✻ ✘ ❳❳ ❳❳❳ p1 p✘ 2 ✘✘ ❅ ❅ p6 ❳❳ ✘ ✘ ③ ✘ ✉ ✲ ✉ ✉ ❄ ❳ ❍ ❅❍❍ ❅ ❍❍ ❄ ❍❍ ❅ ❘ ❅ ❥ ❍ ✉ ✲ ✉ p7 p8 x1 ❡ x2 ❄ ❡ ❄ ❡ x3 Fig. 4. x3 : if (p5 =′ t′ .or. p1 =′ n′ ) .and. p3 =′ n′ then p6 =′ t′ The final answer is the valuation of the node x3 after uncertainty propagation. The probability of x3 =′ t′ indicates how frequently the rule fires and is correct,probability of the event x3 =′ ?′ indicates how often the rule did not fire (and only for this reason is considered by logicians to be true). probability of x3 =′ n′ indicates, how frequently the rule fires, but is in error. (The respective 3-valued logic is considered in [19]. 6.4 Belief Network Construction To construct a belief network correctly, one should: – properly uncover the causal structure governing the attribute, and thereafter – calculate the valuations of each of the node of the network. For the probabilistic case, a number of respective causal-structure-from-data reconstruction algorithms have been elaborated [1], [4], [5], [7], [13], [30], [39], [40], [41], [42], [43], [45]. 236 M.MICHALEWICZ, S.T.WIERZCHOŃ, M.A. KlOPOTEK Node valuation can be also calculated from data [5] as relative conditional frequency. The Dempster-Shafer case is more difficult as clear relationship between data and the joint belief distribution is still subject of disputes. Set this issue aside, proper Q-value quotients may be exploited. However, the knowledge base may be only partially reflected by data. Thenm there emerges the necessity to manipulate manually the knowledge base. The user is then requested to enter a consistent description of the network structure. Given this, the entrance of the valuations may be run precisely following the vary same pattern as the contents of the knowledge base are presented to the user. References 1. Acid S., deCampos L.M., Gonzales A., Molina R., Perez de la Blanca N.: Learning with CASTLE, Symbolic and Quantitative Approaches to Uncertainty, Kruse R., Siegel P. (eds), Lecture Notes In Computer Science 548, Springer-Verlag 1991, 99-106 2. Bertelè, U., and Brioschi, F., 1972. Nonserial Dynamic Programming. Academic Press, New York. 3. Cano J., Delgado M., Moral S.: An axiomatic framework for propagating uncertainty in directed acyclic networks, International Journal of Approximate Reasoning. 1993:8, 253280. 4. Chow C.K., Liu C.N.: Approximating discrete probability distributions with dependence trees, IEEE Transactions on Information Theory , Vol. IT-14, No.3, (maj 1968), 462-467 5. Chow C.K., Wagner T.J.: Consistency of an estimate of tree-dependent probability distribution, IEEE Transactions on Information Theory , IT-19, (1973), 369-371 6. Chowdhury, S.I., Statistical Expert Systems — A Special Application Area for KnowledgeBased Computer Methodology, Technical Report No. 104, Department of Computer and Information Science, Linköping University, Sweden, 1987. 7. Cooper G.F., Herskovits E.: A Bayesian method for the induction of probabilistic networks from data, Machine Learning 9, 309-347 (1992). 8. Darius, P., Expert Systems and Statistics, Proceedings SEAS Spring Meeting 1984, Vol.II, pp.529-538. 9. Dempster, A.P., 1966. New methods for reasoning towards posterior distributions based on sample data. Annals of Mathematical Statistics, 37:355-374. 10. Dempster, A.P., 1967. Upper and lower probabilities induced by a multivalued mapping. Annals of Mathematical Statistics, 38: 325-339. 11. French,J.C., Support for Scientific Database Management in Statistical and Scientific Databases, Z. Michalewicz (Editor), Ellis Horwood, 1991, pp.51-82. 12. Geiger D., Verma T, Pearl J.: d-Separation: From theorems to algorithms, M.Henrion, R.D.Shachter, L.N.Kamal, J.F.Lemmer (Eds): Uncertainty in Artificial Intelligence 5, Elsevier Science Publishers B.V. (North-Holland), 1990, pp. 139-148. KNOWLEDGE ACQUISITION, REPRESENTATION & MANIPULATION 237 13. Geiger D., Paz A., Pearl J.: Learning causal trees from dependence information, Proc. of AAAI (pp.770-776), Boston MA, MIT-Press. 14. Hand, D.J., Expert Systems in Statistics, The Knowledge Engineering Review, 1, pp.1-10, 1986 15. Hand, D.J., A Statistical Knowledge Enhancement System, Journal of the Royal Statistical Society, Series A, 150, pp.334-345, 1987 16. Hand, D.J., Emergent Themes in Statistical Expert Systems, in Knowledge, Data, and Computer Assisted Decisions, M. Schader and W. Gaul (Editors), Springer-Verlag, Berln, pp.279-288, 1990. 17. Hand, D.J. and Cubitt, R., Statistical Expert Systems, in Statistical and Scientific Databases, Z. Michalewicz (Editor), Ellis Horwood, 1991, pp.421-429. 18. Kennes, R., 1990. Computational aspects of the Mobius transform of a graph. Technical Report TR/IRIDIA/90-13, IRIDIA, B-1050 Bruxelles, Belgium. 19. Klopotek M.A.: Beliefs and Probability in Bacchus’ l.p. Logic: A 3-Valued Logic Solution to Apparent Counter-intuition, [in:] R. Trappl ed: Cybernetics and Systems Research, Proc. 11t h European Meeting on Cybernetics and System Research EMCSR’92, Wien, Österreich, 20. April 1992. World Scientific Singapore, New Jersey, London, HongKong vol. 1, 519-526 20. Klopotek M.A.: Beliefs in Markov Trees - From Local Computations to Local Valuation, to appear in Proceedings of 12th European Meeting on Cybernetics and System Research, Vienna, 5-8 April 1994 21. Kong, A., 1986. Multivariate belief functions and graphical models. Doctoral Dissertation, dept. of Statistics, Harvard Univ. 22. Lauritzen, D.J., and Spiegelhalter, S.L., 1988. Fast manipulation of probabilities with local representations - with applications to expert systems (with discussion). J. Roy. Statist. Soc., B-50, 205-247. 23. Lowrance, J.D. and Garvey, T.D., 1982. Evidential reasoning: An implementation for multisensor integration. Tech. Rep. 307, AI Center, SRI International, Menlo Park, CA. 24. Maier, D., 1983. The Theory of Relational Databases. Rockville Computer Sci. Press. 25. Michalewicz, M. and Michalewicz, Z., Automated Rules Generation, Proceedings of the Sixth International Symposium on Methodologies for Intelligent Systems, Charlotte, NC, October 16-19, 1991, Springer-Verlag Lecture Notes in Artificial Intelligence, Vol.542, pp.389-398. 26. Michalewicz, M., Wierzchoń, S. T., Syropiatko, E., Pacan, A., Matuszewski, A., Klopotek, M., Statistical-Expert System for Data Analysis and Knowledge Acquisition, in Statistical and Scientific Databases, Z. Michalewicz (Editor), Ellis Horwood, 1991. 27. Pearl J.: Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Influence, Morgan and Kaufmann, 1988 28. Quinlann, J.R., Induction of Decision Trees, Machine Learning, Vol.1, No.1, 1986. 29. Ruspini, E.H. et al., 1992. Understanding evidential reasoning. Intn. J. Approximate Reasoning, 6, 401-424. 30. Rebane G., Pearl J.: The recovery of causal poly-trees from statistical data, w Uncertainty in Artificial Intelligence 3, Kanal L.N., Levit T.S., Lemmer J.F. eds., Elsevier Science Publishers B.V., (North Holland) 1989, 175-182 31. Schweppe, F.C., 1973. Uncertain Dynamic Systems. Prentice-Hall, New Jersey, 238 M.MICHALEWICZ, S.T.WIERZCHOŃ, M.A. KlOPOTEK 32. Shafer, G., 1976. A Mathematical Theory of Evidence. Princeton University Press, Princeton. 33. Shafer, G., 1979. Allocations of probability. Ann. Probab., 7, 827-839. 34. Shafer, G., 1990. Belief functions. In: G. Shafer and J. Pearl (Eds.) ”Readings in Uncertain Reasoning”, Morgan Kaufmann, Palo Alto, pp. 473-481. 35. Shafer, G., and Shenoy, P., 1990. Axioms for probability and belief function propagation. In: R.D. Shachter (eds.), Uncertainty in Artificial Intelligence 4, North-Holland, Amsterdam, pp. 169-198. 36. Shenoy P.P., Shafer G.: Axioms for probability and belief-function propagation, [w:] Shachter R.D., Levitt T.S., Kanal L.N., Lemmer J.F. (eds): Uncertainty in Artificial Intelligence 4, Elsevier Science Publishers B.V. (North Holland), 1990, 37. Shortliffe, E.H. and Buchanan, B.G., Model of Inexact Reasoning in Medicine, Mathematical Biosciences, Vol.23, pp.251-379, 1975 38. Smets, P., (1988). Belief functions. In: P. Smets, A. Mamdani, D. Dubois and H. Prade (Eds.), Non-Standard Logics for Automated Reasoning, New York: Academic Press, pp. 253-286. 39. Spirtes P., Glymour C., Scheines R.: Causality from probability, [w:] G.McKee (Ed.):Evolving knowledge in natural and artificial intelligence, London: Pitman, 1990. 40. Spirtes P., Glymour C., Scheines R.: An algorithm for fast recovery of sparse causal graphs, Social Science Computer Review 9, 62-72. 41. Srinivas S.,Russel S., Agogino A.: Automated construction of sparse Bayesian networks from unstructured probabilistic models and domain information, Henrion M., Shachter R.D.,Kanal L.N., Lemmer J.F.: Uncertainty in Artificial Intelligence 5, Elsevier Science Publishers B.V (North-Holland) (1990), 295- 308 42. Valiveti R.S., OommenB.J.: On using the chi-squared statistics for determining statistic dependence, Pattern Recognition Vol. 25 No. 11, pp. 1389-1400, 1992 43. Verna T.S., Pearl J.: Equivalence and synthesis of causal models, Proc. of the Conference on Uncertainty in Artificial Intelligence (pp. 220-227), Cambridge MA, 1990 44. Wasserman, L.A., 1990. Prior envelopes based on belief functions. Ann. Stat., 18, 454-464. 45. Wermuth N., Lauritzen S.: Graphical and recursive models for contingency tables, Biometrica 72, 537-552 46. Wierzchon, S.T., 1987. An Inference rule based on Sugeno measure. In: J.C. Bezdek (ed.) Analysis of Fuzzy Information, CRC Press, vol. 1, pp. 85-96. 47. Wierzchon, S.T., 1993a. Representation and processing of uncertain information in the Dempster-Shafer framework (forthcoming) 48. Wierzchon, S.T., 1993b. Constraint propagation over restricted space of configurations, in: M. Fedrizzi, J. Kacprzyk and R.R. Yager (eds.) Advances in the Dempster-Shafer Theory of Evidence, J. Willey, N.Y.
2cs.AI